/openssl/crypto/ |
H A D | trace.c | 101 static int trace_free(BIO *channel) in trace_free() argument 103 if (channel == NULL) in trace_free() 284 if (channel != NULL && *channel != NULL) { in set_trace_data() 302 if (channel != NULL && *channel != NULL) { in set_trace_data() 329 BIO *channel = NULL; in ossl_trace_cleanup() local 384 BIO *channel = NULL; in OSSL_trace_set_callback() local 410 BIO_free(channel); in OSSL_trace_set_callback() 461 BIO *channel = NULL; in OSSL_trace_begin() local 472 if (channel != NULL) { in OSSL_trace_begin() 490 return channel; in OSSL_trace_begin() [all …]
|
/openssl/crypto/bn/ |
H A D | bn_ctx.c | 82 static void ctxdbg(BIO *channel, const char *text, BN_CTX *ctx) in ctxdbg() argument 88 BIO_printf(channel, "%s\n", text); in ctxdbg() 89 BIO_printf(channel, " (%16p): ", (void*)ctx); in ctxdbg() 91 BIO_printf(channel, "%03x ", in ctxdbg() 96 BIO_printf(channel, "\n"); in ctxdbg() 98 BIO_printf(channel, " %16s : ", ""); in ctxdbg() 101 BIO_printf(channel, " "); in ctxdbg() 102 BIO_printf(channel, "^^^ "); in ctxdbg() 106 BIO_printf(channel, "\n"); in ctxdbg()
|
/openssl/crypto/x509/ |
H A D | pcy_tree.c | 17 static void expected_print(BIO *channel, in expected_print() argument 23 BIO_puts(channel, " Not Mapped\n"); in expected_print() 29 BIO_puts(channel, " Expected: "); in expected_print() 33 BIO_puts(channel, ", "); in expected_print() 34 i2a_ASN1_OBJECT(channel, oid); in expected_print() 36 BIO_puts(channel, "\n"); in expected_print() 40 static void tree_print(BIO *channel, in tree_print() argument 52 BIO_printf(channel, "Printing Up to Level %ld\n", in tree_print() 57 BIO_printf(channel, "Level %ld, flags = %x\n", in tree_print() 63 X509_POLICY_NODE_print(channel, node, 2); in tree_print() [all …]
|
/openssl/test/testutil/ |
H A D | testutil_init.c | 72 BIO *channel; in setup_trace_category() local 80 channel = BIO_push(bio, in setup_trace_category() 86 || (trace_data->bio = channel) == NULL in setup_trace_category() 96 BIO_free_all(channel); in setup_trace_category()
|
/openssl/doc/man3/ |
H A D | OSSL_trace_enabled.pod | 22 void OSSL_trace_end(int category, BIO *channel); 63 I<trace channel> is attached to it. A trace channel is simply a 66 The application has two different ways of registering a trace channel, 70 tracing code both channel types are effectively indistinguishable. 71 We call them a I<simple trace channel> and a I<callback trace channel>, 75 trace channel (i.e., the BIO object) using OSSL_trace_begin(), write 77 channel using OSSL_trace_end(). The OSSL_trace_begin()/OSSL_trace_end() 90 enabled (see L</Configure Tracing> below) and a trace channel has been 94 channel for the given I<category> in form of a BIO.
|
H A D | SSL_get_fd.pod | 19 read or the write channel, which can be different. If the read and the 20 write channel are different, SSL_get_fd() will return the file descriptor 21 of the read channel.
|
H A D | OSSL_trace_set_channel.pod | 31 I<trace channel> to it, which in the simplest case is just a BIO object 37 For the tracing code, both trace channel types are indistinguishable. 38 These are called a I<simple trace channel> and a I<callback trace channel>, 49 by attaching the B<BIO> I<bio> object as (simple) trace channel. 52 an extra line for each channel, to be output before and after group of 64 dedicated BIO object, the so-called I<callback trace channel>. 73 Calling OSSL_trace_set_channel() with NULL for I<channel> or 131 will be lost if the tracing channel or callback were cleaned away 245 An example with just a channel and constant prefix / suffix.
|
H A D | SSL_set_fd.pod | 30 for the read channel or the write channel, which can be set independently.
|
H A D | SSL_get_rbio.pod | 17 read or the write channel, which can be different. The reference count
|
H A D | UI_create_method.pod | 63 example by opening a channel to a tty, or by creating a dialog box. 91 by closing the channel to the tty, maybe by destroying a dialog box.
|
H A D | OSSL_STORE_open.pod | 67 and opens a channel to the data located at the URI and returns a 115 OSSL_STORE_close() takes a B<OSSL_STORE_CTX>, closes the channel that was opened
|
H A D | SSL_accept.pod | 16 The communication channel must already have been set and assigned to the
|
H A D | SSL_connect.pod | 16 channel must already have been set and assigned to the B<ssl> by setting an
|
H A D | RSA_padding_add_PKCS1_type_1.pod | 136 as this would create a small timing side channel which could be
|
/openssl/crypto/ui/ |
H A D | ui_openssl.c | 168 static unsigned short channel = 0; variable 466 status = sys$assign(&terminal, &channel, 0, 0); in open_console() 475 status = sys$qiow(0, channel, IO$_SENSEMODE, &iosb, 0, 0, tty_orig, 12, in open_console() 501 status = sys$qiow(0, channel, IO$_SETMODE, &iosb, 0, 0, tty_new, 12, in noecho_console() 533 status = sys$qiow(0, channel, IO$_SETMODE, &iosb, 0, 0, tty_new, 12, in echo_console() 561 status = sys$dassgn(channel); in close_console()
|
/openssl/apps/ |
H A D | openssl.c | 169 BIO *channel; in setup_trace_category() local 177 channel = BIO_push(bio, dup_bio_err(FORMAT_TEXT)); in setup_trace_category() 182 || (trace_data->bio = channel) == NULL in setup_trace_category() 192 BIO_free_all(channel); in setup_trace_category()
|
/openssl/include/openssl/ |
H A D | trace.h | 82 int OSSL_trace_set_channel(int category, BIO* channel); 156 void OSSL_trace_end(int category, BIO *channel);
|
H A D | ui.h.in | 251 a channel to a tty, or by opening a window. 264 the channel to the tty, or closing the window.
|
/openssl/doc/man7/ |
H A D | ossl_store.pod | 21 The functionality supports the pattern "open a channel to the 23 by closing the channel".
|
/openssl/ |
H A D | README.md | 150 There are various ways to get in touch. The correct channel depends on
|
H A D | CHANGES.md | 2553 * Add blinding to ECDSA and DSA signatures to protect against side channel 3172 * Add blinding to ECDSA and DSA signatures to protect against side channel 3540 lack of side-channel resistant code, which is incompatible with 4455 ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack" 4957 * Add blinding to ECDSA and DSA signatures to protect against side channel 5265 order to avoid side channel attacks. A flaw in the OpenSSL DSA 5547 * Side channel attack on modular exponentiation 6466 order to avoid side channel attacks. A flaw in the OpenSSL DSA 6749 * Side channel attack on modular exponentiation 7403 ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack" [all …]
|
H A D | NEWS.md | 489 * Fix side channel attack on modular exponentiation ([CVE-2016-0702]) 590 * Fix side channel attack on modular exponentiation ([CVE-2016-0702])
|