/openssl/crypto/pem/ |
H A D | pem_lib.c | 498 if ((header == NULL) || (*header == '\0') || (*header == '\n')) in PEM_get_EVP_CIPHER_INFO() 505 header += strspn(header, " \t"); in PEM_get_EVP_CIPHER_INFO() 507 if (*header++ != '4' || *header++ != ',') in PEM_get_EVP_CIPHER_INFO() 509 header += strspn(header, " \t"); in PEM_get_EVP_CIPHER_INFO() 517 header += strspn(header, " \t\r"); in PEM_get_EVP_CIPHER_INFO() 531 header += strspn(header, " \t"); in PEM_get_EVP_CIPHER_INFO() 538 header += strcspn(header, " \t,"); in PEM_get_EVP_CIPHER_INFO() 539 c = *header; in PEM_get_EVP_CIPHER_INFO() 542 *header = c; in PEM_get_EVP_CIPHER_INFO() 543 header += strspn(header, " \t"); in PEM_get_EVP_CIPHER_INFO() [all …]
|
H A D | pem_info.c | 58 char *name = NULL, *header = NULL, *str; in STACK_OF() local 82 i = PEM_read_bio(bp, &name, &header, &data, &len); in STACK_OF() 145 if ((int)strlen(header) > 10 /* assume encrypted */ in STACK_OF() 157 if (!PEM_get_EVP_CIPHER_INFO(header, &cipher)) in STACK_OF() 173 if (!PEM_get_EVP_CIPHER_INFO(header, &xi->enc_cipher)) in STACK_OF() 182 OPENSSL_free(header); in STACK_OF() 183 header = NULL; in STACK_OF() 212 OPENSSL_free(header); in STACK_OF()
|
/openssl/test/ |
H A D | pemtest.c | 36 char *name = NULL, *header = NULL; in test_b64() local 47 || !TEST_true(PEM_read_bio_ex(b, &name, &header, &data, &len, in test_b64() 58 OPENSSL_free(header); in test_b64() 66 char *name = NULL, *header = NULL; in test_invalid() local 76 || TEST_true(PEM_read_bio_ex(b, &name, &header, &data, &len, in test_invalid() 83 OPENSSL_free(header); in test_invalid()
|
H A D | recordlentest.c | 29 unsigned char header[SSL3_RT_HEADER_LENGTH]; in write_record() local 35 header[0] = rectype; in write_record() 36 header[1] = (recversion >> 8) & 0xff; in write_record() 37 header[2] = recversion & 0xff; in write_record() 38 header[3] = (len >> 8) & 0xff; in write_record() 39 header[4] = len & 0xff; in write_record() 41 if (!BIO_write_ex(b, header, SSL3_RT_HEADER_LENGTH, &written) in write_record()
|
H A D | x509aux.c | 26 char *header = 0; in test_certs() local 37 for (c = 0; !err && PEM_read_bio(fp, &name, &header, &data, &len); ++c) { in test_certs() 152 OPENSSL_free(header); in test_certs()
|
H A D | danetest.c | 95 char *header = 0; in STACK_OF() local 107 && PEM_read_bio(fp, &name, &header, &data, &len) == 1; in STACK_OF() 131 OPENSSL_free(header); in STACK_OF() 133 name = header = NULL; in STACK_OF() 144 OPENSSL_free(header); in STACK_OF()
|
/openssl/crypto/cmp/ |
H A D | cmp_protect.c | 44 prot_part.header = msg->header; in ossl_cmp_calc_protection() 47 if (msg->header->protectionAlg == NULL) { in ossl_cmp_calc_protection() 51 X509_ALGOR_get0(&algorOID, &pptype, &ppval, msg->header->protectionAlg); in ossl_cmp_calc_protection() 235 return id == NULL || ossl_cmp_hdr_set1_senderKID(msg->header, id); in set_senderKID() 246 X509_ALGOR_free(msg->header->protectionAlg); in ossl_cmp_msg_protect() 247 msg->header->protectionAlg = NULL; in ossl_cmp_msg_protect() 256 if ((msg->header->protectionAlg = pbmac_algor(ctx)) == NULL) in ossl_cmp_msg_protect() 275 if ((msg->header->protectionAlg = sig_algor(ctx)) == NULL) in ossl_cmp_msg_protect() 308 if (!(ossl_cmp_general_name_is_NULL_DN(msg->header->sender) in ossl_cmp_msg_protect() 309 && msg->header->senderKID == NULL)) in ossl_cmp_msg_protect()
|
H A D | cmp_vfy.c | 52 prot_part.header = msg->header; in verify_signature() 56 msg->header->protectionAlg, msg->protection, in verify_signature() 266 "sender field", msg->header->sender->d.directoryName)) in cert_acceptable() 269 if (!check_kid(ctx, X509_get0_subject_key_id(cert), msg->header->senderKID)) in cert_acceptable() 447 GENERAL_NAME *sender = msg->header->sender; in check_msg_find_cert() 450 const ASN1_OCTET_STRING *skid = msg->header->senderKID; in check_msg_find_cert() 550 || msg->header == NULL || msg->body == NULL) { in OSSL_CMP_validate_msg() 555 if (msg->header->protectionAlg == NULL /* unprotected message */ in OSSL_CMP_validate_msg() 561 switch (ossl_cmp_hdr_get_protection_nid(msg->header)) { in OSSL_CMP_validate_msg() 688 if (!ossl_assert(ctx != NULL && msg != NULL && msg->header != NULL)) in ossl_cmp_msg_check_update()
|
/openssl/doc/man3/ |
H A D | PEM_read.pod | 13 int PEM_write(FILE *fp, const char *name, const char *header, 15 int PEM_write_bio(BIO *bp, const char *name, const char *header, 18 int PEM_read(FILE *fp, char **name, char **header, 20 int PEM_read_bio(BIO *bp, char **name, char **header, 23 int PEM_get_EVP_CIPHER_INFO(char *header, EVP_CIPHER_INFO *cinfo); 30 type B<name>, any additional B<header> information, and the raw 42 Optional header line(s) may appear after the begin line, and their 47 B<header> is the header value or NULL, and B<data> and B<len> specify 59 are returned in B<header> and the base64-decoded content and its length are 71 When the header is malformed, or not supported or when the cipher is unknown [all …]
|
H A D | OSSL_HTTP_REQ_CTX.pod | 65 I<wbio>), and the maximum expected response header line length I<buf_size>. 70 which collects the HTTP request header lines. 84 For example, to add a C<Host> header for C<example.com> you would call: 95 is included in the HTTP header of the response and return an error if not. 99 in the header line, followed by a C<;> character and any further text. 105 that an ASN.1 sequence header is required, its length field is checked, and 134 the HTTP header C<Content-Type> is also added with the given string value. 135 The header lines are added to the internal memory B<BIO> for the request header. 174 If the C<Content-Length> header is present and exceeds this value or 193 create the I<wbio>, any C<Host> header, and the host specified in the [all …]
|
H A D | SSL_rstate_string.pod | 25 consisting of header and body. When working in a blocking environment, 37 =item "RH"/"read header" 39 The header of the record is being evaluated.
|
H A D | PEM_read_bio_ex.pod | 15 int PEM_read_bio_ex(BIO *in, char **name, char **header, 21 the name of the type of contained data, the header information regarding 45 The caller must release the storage allocated for *name, *header, and *data.
|
H A D | OSSL_HTTP_transfer.pod | 139 The I<buf_size> parameter specifies the response header maximum line length. 162 OSSL_HTTP_set1_request() sets up in I<rctx> the request header and content data 165 (and optionally port) needs to be placed in the header and thus must be present. 171 The optional list I<headers> may contain additional custom HTTP header lines. 175 is included in the HTTP header of the response and return an error if not. 176 In the content-type header line the specified string should be present either 179 in the header line, followed by a C<;> character and any further text. 208 If the response header contains one or more "Content-Length" header lines and/or 223 for connecting but the hostname is used, as usual, for the C<Host> header.
|
/openssl/ssl/record/methods/ |
H A D | ssl3_meth.c | 241 unsigned char header[75]; in ssl3_mac() 243 memcpy(header + j, mac_sec, md_size); in ssl3_mac() 245 memcpy(header + j, ssl3_pad_1, npad); in ssl3_mac() 247 memcpy(header + j, seq, 8); in ssl3_mac() 249 header[j++] = rec->type; in ssl3_mac() 250 header[j++] = (unsigned char)(rec->length >> 8); in ssl3_mac() 251 header[j++] = (unsigned char)(rec->length & 0xff); in ssl3_mac() 256 header, rec->input, in ssl3_mac()
|
H A D | tls1_meth.c | 436 unsigned char header[13]; in tls1_mac() local 468 memcpy(header, dtlsseq, 8); in tls1_mac() 470 memcpy(header, seq, 8); in tls1_mac() 473 header[8] = rec->type; in tls1_mac() 474 header[9] = (unsigned char)(rl->version >> 8); in tls1_mac() 475 header[10] = (unsigned char)(rl->version); in tls1_mac() 476 header[11] = (unsigned char)(rec->length >> 8); in tls1_mac() 477 header[12] = (unsigned char)(rec->length & 0xff); in tls1_mac() 493 if (EVP_DigestSignUpdate(mac_ctx, header, sizeof(header)) <= 0 in tls1_mac()
|
H A D | ssl3_cbc.c | 130 const unsigned char *header, in ssl3_cbc_digest_record() argument 377 md_transform(md_state.c, header); in ssl3_cbc_digest_record() 378 memcpy(first_block, header + md_block_size, overhang); in ssl3_cbc_digest_record() 385 memcpy(first_block, header, 13); in ssl3_cbc_digest_record() 411 b = header[k]; in ssl3_cbc_digest_record()
|
/openssl/doc/internal/man7/ |
H A D | deprecation.pod | 19 functions in our public header files, F<< <openssl/*.h> >>). 66 including an internal header file very early in the affected translation 70 from public view, it should be moved to an internal header file, with the 72 use that symbol should adjust their header inclusions accordingly. 80 In public header files (F<< <openssl/*.h> >>), this is what a deprecation is 96 any OpenSSL header file) in the translation unit that implements it and in 106 its declaration in the public header file is: 119 other OpenSSL header file) in the translation unit that implements it and in
|
/openssl/ssl/record/ |
H A D | ssl3_record.c | 536 unsigned char header[13]; in tls1_mac_old() local 578 memcpy(header, dtlsseq, 8); in tls1_mac_old() 580 memcpy(header, seq, 8); in tls1_mac_old() 582 header[8] = rec->type; in tls1_mac_old() 583 header[9] = (unsigned char)(sc->version >> 8); in tls1_mac_old() 584 header[10] = (unsigned char)(sc->version); in tls1_mac_old() 585 header[11] = (unsigned char)(rec->length >> 8); in tls1_mac_old() 586 header[12] = (unsigned char)(rec->length & 0xff); in tls1_mac_old() 588 if (EVP_DigestSignUpdate(mac_ctx, header, sizeof(header)) <= 0 in tls1_mac_old()
|
/openssl/doc/man7/ |
H A D | openssl-core_names.h.pod | 13 The F<< <openssl/core_names.h> >> header defines a multitude of macros 32 I<This header file does not constitute a general registry of names>. 38 to the names provided in this header to work in a compatible manner.
|
H A D | ssl.pod | 79 Currently the OpenSSL B<ssl> library provides the following C header files 86 This is the common header file for the SSL/TLS API. Include it into your 90 inside this header file. 99 This is the sub header file dealing with the SSLv3 protocol only. 103 This is the sub header file dealing with the TLSv1 protocol only.
|
/openssl/crypto/err/ |
H A D | README.md | 41 The generated C error code file `xxx_err.c` will load the header 43 header file must load any additional header files containing any
|
/openssl/ |
H A D | HACKING.md | 7 either add a prototype in one of the existing OpenSSL header files; 8 or provide a new header file and edit
|
/openssl/VMS/ |
H A D | test-includes.com | 1 $! Quick script to check how well including individual header files works
|
/openssl/apps/ |
H A D | asn1parse.c | 70 char *name = NULL, *header = NULL, *prog; in asn1parse_main() local 182 if (PEM_read_bio(in, &name, &header, &str, &num) != 1) { in asn1parse_main() 311 OPENSSL_free(header); in asn1parse_main()
|
/openssl/doc/internal/man3/ |
H A D | ossl_cmp_msg_protect.pod | 22 according to the algorithm and parameters in the message header's protectionAlg 29 It also sets the protectionAlg field in the message header accordingly.
|