Searched refs:extension (Results 51 – 75 of 106) sorted by relevance
12345
/openssl/doc/man1/ |
H A D | openssl-req.pod.in | 391 Add a specific extension to the certificate (if B<-x509> is in use) 395 If an extension is added using this option that has the same OID as one 396 defined in the extension section of the config file, it overrides that one. 403 A poison extension will be added to the certificate, making it a 406 These SCTs can then be embedded into the pre-certificate as an extension, before 561 extension section format. 761 added. It includes the B<keyUsage> extension which determines the type of 763 by the script in an B<extendedKeyUsage> extension.
|
H A D | openssl-ca.pod.in | 292 the altName extension of the certificate. When this option is set the 309 extension section format. 446 include. If no CRL extension section is present then a V1 CRL is 447 created, if the CRL extension section is present (even if it is 452 extension section format. 623 request are copied to the certificate: if the extension is already present 811 request contains a basicConstraints extension with CA:TRUE and the 817 Then if the request contains a basicConstraints extension it will be
|
H A D | openssl-s_server.pod.in | 247 must encode a TLS ServerHello extension (2 bytes type, 2 bytes length, 248 followed by "length" bytes of extension data). If the client sends 249 an empty TLS ClientHello extension matching the type, the corresponding 250 ServerHello extension will be returned. 424 the response headers are generated by the server, and the file extension is 440 extension is larger than 1024 bytes. 453 Servername for HostName TLS extension. 788 or Next Protocol Negotiation (NPN) extension, respectively. ALPN is the
|
H A D | openssl-version.pod.in | 100 the <ctx> extension is derived from the B<OSSL_WINCTX> variable. The values of
|
H A D | openssl-x509.pod.in | 316 See the L<x509v3_config(5)> manual page for the extension names. 485 extension section format. 703 Retain default extension behaviour: attempt to print out unsupported 734 Print the "Subject Alternative Name" extension of a certificate: 797 name extension. Only unique email addresses will be printed out: it will
|
H A D | openssl-s_client.pod.in | 229 Set the TLS SNI (Server Name Indication) extension in the ClientHello message to 231 If B<-servername> is not provided, the TLS SNI extension will be populated with 244 Suppresses sending of the SNI (Server Name Indication) extension in the 359 to the server in the B<certificate_authorities> extension. Only supported 749 or Next Protocol Negotiation (NPN) extension, respectively. ALPN is the 756 client to advertise support for the TLS extension but disconnect just 788 For TLSv1.3 only, send the Post-Handshake Authentication extension. This will
|
/openssl/apps/ |
H A D | openssl-vms.cnf | 193 # SET-ex3 = SET extension number 3 262 # DER hex encoding of an extension: beware experts only! 265 # You can even override a supported extension:
|
H A D | openssl.cnf | 193 # SET-ex3 = SET extension number 3 262 # DER hex encoding of an extension: beware experts only! 265 # You can even override a supported extension:
|
H A D | build.info | 87 # without extension must be installed as well. Unix or Unix lookalike only.
|
/openssl/doc/man3/ |
H A D | EVP_BytesToKey.pod | 37 otherwise a non standard extension is used to derive the extra data.
|
H A D | CMS_add1_recipient_cert.pod | 54 have a subject key identifier extension.
|
H A D | OSSL_CRMF_MSG_set0_validity.pod | 61 OSSL_CRMF_MSG_push0_extension() pushes the X509 extension I<ext> to the
|
H A D | SSL_CTX_set_tlsext_ticket_key_cb.pod | 36 session when session ticket extension is presented in the TLS hello 46 extension to the server. The client must send exactly one session ticket.
|
H A D | CMS_add1_signer.pod | 76 have a subject key identifier extension.
|
H A D | X509_VERIFY_PARAM_set_flags.pod | 163 alternative name extension. 254 B<X509_V_FLAG_IGNORE_CRITICAL> disables critical extension checking. By default 371 CRLs from the CRL distribution points extension.
|
H A D | CMS_encrypt.pod | 56 have a subject key identifier extension.
|
H A D | PKCS12_create.pod | 67 I<keytype> adds a flag to the store private key. This is a non standard extension
|
H A D | CMS_sign.pod | 76 have a subject key identifier extension.
|
/openssl/ |
H A D | NEWS.md | 651 * Rewrite of the extension handling code 1096 * Add TLS padding extension workaround for broken servers. 1273 * Fix mishandling of absent EC point format extension. 1305 * Supported points format extension for ECC ciphersuites. 1308 * Opaque PRF Input TLS extension support. 1325 * Support for RFC5746 TLS renegotiation extension. 1424 * New engine module: VIA PadLOck ACE extension in VIA C3 1541 * Security: counter the Klima-Pokorny-Rosa extension of 1614 * Security: counter the Klima-Pokorny-Rosa extension of 1748 * Support of authority information access extension [all …]
|
H A D | CHANGES.md | 7560 from CRLDP extension in certificates. 8895 * TLS pad extension: draft-agl-tls-padding-03 10309 * Support for freshest CRL extension. 10333 * Add support for policy mappings extension. 10973 server_name extension. 11680 server_name extension. 13277 * Add Delta CRL to the extension code. 14072 particular extension is supported. 19227 to use the new extension code. 19503 extension option. [all …]
|
H A D | .gitignore | 129 # Anything without an extension is an executable on Unix, so we keep files
|
/openssl/include/openssl/ |
H A D | ct.h.in | 242 * Set *ext to point to the extension data for the SCT. ext must not be NULL. 283 * The origin of this SCT, e.g. TLS extension, OCSP response, etc. 288 * Set the origin of this SCT, e.g. TLS extension, OCSP response, etc.
|
/openssl/crypto/objects/ |
H A D | objects.txt | 700 # access descriptors for authority info access extension 950 !Cname netscape-cert-extension 955 netscape-cert-extension 1 : nsCertType : Netscape Cert Type 957 netscape-cert-extension 2 : nsBaseUrl : Netscape Base Url 959 netscape-cert-extension 3 : nsRevocationUrl : Netscape Revocation Url 961 netscape-cert-extension 4 : nsCaRevocationUrl : Netscape CA Revocation Url 963 netscape-cert-extension 7 : nsRenewalUrl : Netscape Renewal Url 965 netscape-cert-extension 8 : nsCaPolicyUrl : Netscape CA Policy Url 967 netscape-cert-extension 12 : nsSslServerName : Netscape SSL Server Name 969 netscape-cert-extension 13 : nsComment : Netscape Comment [all …]
|
/openssl/ssl/statem/ |
H A D | extensions.c | 637 PACKET extension; in tls_collect_extensions() local 641 !PACKET_get_length_prefixed_2(&extensions, &extension)) { in tls_collect_extensions() 691 thisex->data = extension; in tls_collect_extensions()
|
/openssl/doc/HOWTO/ |
H A D | documenting-functions-and-macros.md | 131 reason for the `.num` extension.
|
Completed in 124 milliseconds
12345