Home
last modified time | relevance | path

Searched refs:header (Results 1 – 25 of 105) sorted by relevance

12345

/openssl/crypto/pem/
H A Dpem_lib.c503 if ((header == NULL) || (*header == '\0') || (*header == '\n')) in PEM_get_EVP_CIPHER_INFO()
510 header += strspn(header, " \t"); in PEM_get_EVP_CIPHER_INFO()
512 if (*header++ != '4' || *header++ != ',') in PEM_get_EVP_CIPHER_INFO()
514 header += strspn(header, " \t"); in PEM_get_EVP_CIPHER_INFO()
522 header += strspn(header, " \t\r"); in PEM_get_EVP_CIPHER_INFO()
536 header += strspn(header, " \t"); in PEM_get_EVP_CIPHER_INFO()
543 header += strcspn(header, " \t,"); in PEM_get_EVP_CIPHER_INFO()
544 c = *header; in PEM_get_EVP_CIPHER_INFO()
547 *header = c; in PEM_get_EVP_CIPHER_INFO()
548 header += strspn(header, " \t"); in PEM_get_EVP_CIPHER_INFO()
[all …]
H A Dpem_info.c58 char *name = NULL, *header = NULL, *str; in STACK_OF() local
82 i = PEM_read_bio(bp, &name, &header, &data, &len); in STACK_OF()
145 if ((int)strlen(header) > 10 /* assume encrypted */ in STACK_OF()
157 if (!PEM_get_EVP_CIPHER_INFO(header, &cipher)) in STACK_OF()
173 if (!PEM_get_EVP_CIPHER_INFO(header, &xi->enc_cipher)) in STACK_OF()
182 OPENSSL_free(header); in STACK_OF()
183 header = NULL; in STACK_OF()
212 OPENSSL_free(header); in STACK_OF()
/openssl/fuzz/
H A Dpem.c26 char *name = NULL, *header = NULL; in FuzzerTestOneInput() local
35 if (PEM_read_bio_ex(in, &name, &header, &data, &outlen, buf[0]) == 1) { in FuzzerTestOneInput()
38 BIO_write(in, header, strlen(header)); in FuzzerTestOneInput()
43 OPENSSL_secure_free(header); in FuzzerTestOneInput()
47 OPENSSL_free(header); in FuzzerTestOneInput()
/openssl/test/
H A Dpemtest.c36 char *name = NULL, *header = NULL; in test_b64() local
47 || !TEST_true(PEM_read_bio_ex(b, &name, &header, &data, &len, in test_b64()
58 OPENSSL_free(header); in test_b64()
66 char *name = NULL, *header = NULL; in test_invalid() local
76 || TEST_true(PEM_read_bio_ex(b, &name, &header, &data, &len, in test_invalid()
83 OPENSSL_free(header); in test_invalid()
106 char *name = NULL, *header = NULL; in test_empty_payload() local
116 if (!TEST_false(PEM_read_bio_ex(b, &name, &header, &data, &len, 0))) in test_empty_payload()
122 OPENSSL_free(header); in test_empty_payload()
H A Drecordlentest.c29 unsigned char header[SSL3_RT_HEADER_LENGTH]; in write_record() local
35 header[0] = rectype; in write_record()
36 header[1] = (recversion >> 8) & 0xff; in write_record()
37 header[2] = recversion & 0xff; in write_record()
38 header[3] = (len >> 8) & 0xff; in write_record()
39 header[4] = len & 0xff; in write_record()
41 if (!BIO_write_ex(b, header, SSL3_RT_HEADER_LENGTH, &written) in write_record()
H A Dx509aux.c25 char *header = 0; in test_certs() local
36 for (c = 0; !err && PEM_read_bio(fp, &name, &header, &data, &len); ++c) { in test_certs()
151 OPENSSL_free(header); in test_certs()
H A Ddanetest.c95 char *header = 0; in STACK_OF() local
107 && PEM_read_bio(fp, &name, &header, &data, &len) == 1; in STACK_OF()
131 OPENSSL_free(header); in STACK_OF()
133 name = header = NULL; in STACK_OF()
144 OPENSSL_free(header); in STACK_OF()
/openssl/crypto/cmp/
H A Dcmp_protect.c46 prot_part.header = msg->header; in ossl_cmp_calc_protection()
49 if (msg->header->protectionAlg == NULL) { in ossl_cmp_calc_protection()
53 X509_ALGOR_get0(&algorOID, &pptype, &ppval, msg->header->protectionAlg); in ossl_cmp_calc_protection()
124 msg->header->protectionAlg, /* sets X509_ALGOR */ in ossl_cmp_calc_protection()
225 return id == NULL || ossl_cmp_hdr_set1_senderKID(msg->header, id); in set_senderKID()
238 X509_ALGOR_free(msg->header->protectionAlg); in ossl_cmp_msg_protect()
239 msg->header->protectionAlg = NULL; in ossl_cmp_msg_protect()
248 if ((msg->header->protectionAlg = pbmac_algor(ctx)) == NULL) in ossl_cmp_msg_protect()
267 if ((msg->header->protectionAlg = X509_ALGOR_new()) == NULL) in ossl_cmp_msg_protect()
301 if (!(ossl_cmp_general_name_is_NULL_DN(msg->header->sender) in ossl_cmp_msg_protect()
[all …]
H A Dcmp_vfy.c52 prot_part.header = msg->header; in verify_signature()
56 msg->header->protectionAlg, msg->protection, in verify_signature()
289 "sender field", msg->header->sender->d.directoryName)) in cert_acceptable()
292 if (!check_kid(ctx, X509_get0_subject_key_id(cert), msg->header->senderKID)) in cert_acceptable()
465 GENERAL_NAME *sender = msg->header->sender; in check_msg_find_cert()
468 const ASN1_OCTET_STRING *skid = msg->header->senderKID; in check_msg_find_cert()
569 || msg->header == NULL || msg->body == NULL) { in OSSL_CMP_validate_msg()
574 if (msg->header->protectionAlg == NULL /* unprotected message */ in OSSL_CMP_validate_msg()
580 switch (ossl_cmp_hdr_get_protection_nid(msg->header)) { in OSSL_CMP_validate_msg()
710 if (!ossl_assert(ctx != NULL && msg != NULL && msg->header != NULL)) in ossl_cmp_msg_check_update()
H A Dcmp_msg.c68 return msg->header; in OSSL_CMP_MSG_get0_header()
169 if (!ossl_cmp_hdr_init(ctx, msg->header) in ossl_cmp_msg_create()
173 && !ossl_cmp_hdr_generalInfo_push1_items(msg->header, in ossl_cmp_msg_create()
399 if (ctx->implicitConfirm && !ossl_cmp_hdr_set_implicitConfirm(msg->header)) in ossl_cmp_certreq_new()
463 if (ctx->implicitConfirm && !ossl_cmp_hdr_set_implicitConfirm(msg->header)) in ossl_cmp_certrep_new()
838 if (!ossl_cmp_hdr_set_pvno(msg->header, OSSL_CMP_PVNO_3)) in ossl_cmp_certConf_new()
1097 if (!ossl_cmp_hdr_set_transactionID(ctx, msg->header)) in OSSL_CMP_MSG_update_transactionID()
1099 return msg->header->protectionAlg == NULL in OSSL_CMP_MSG_update_transactionID()
1105 if (ctx == NULL || msg == NULL || msg->header == NULL) { in OSSL_CMP_MSG_update_recipNonce()
1111 if (!ossl_cmp_asn1_octet_string_set1(&msg->header->recipNonce, in OSSL_CMP_MSG_update_recipNonce()
[all …]
/openssl/doc/man3/
H A DPEM_read.pod13 int PEM_write(FILE *fp, const char *name, const char *header,
15 int PEM_write_bio(BIO *bp, const char *name, const char *header,
18 int PEM_read(FILE *fp, char **name, char **header,
20 int PEM_read_bio(BIO *bp, char **name, char **header,
23 int PEM_get_EVP_CIPHER_INFO(char *header, EVP_CIPHER_INFO *cinfo);
30 type B<name>, any additional B<header> information, and the raw
42 Optional header line(s) may appear after the begin line, and their
47 B<header> is the header value or NULL, and B<data> and B<len> specify
59 are returned in B<header> and the base64-decoded content and its length are
71 When the header is malformed, or not supported or when the cipher is unknown
[all …]
H A DOSSL_HTTP_REQ_CTX.pod69 I<wbio>), and the maximum expected response header line length I<buf_size>.
74 which collects the HTTP request header lines.
93 For example, to add a C<Host> header for C<example.com> you would call:
104 is included in the HTTP header of the response and return an error if not.
108 in the header line, followed by a C<;> character and any further text.
114 that an ASN.1 sequence header is required, its length field is checked, and
143 the HTTP header C<Content-Type> is also added with the given string value.
144 The header lines are added to the internal memory B<BIO> for the request header.
183 If the C<Content-Length> header is present and exceeds this value or
208 create the I<wbio>, any C<Host> header, and the host specified in the
[all …]
H A DSSL_rstate_string.pod25 consisting of header and body. When working in a blocking environment,
37 =item "RH"/"read header"
39 The header of the record is being evaluated.
52 header" in normal conditions.
H A DPEM_read_bio_ex.pod15 int PEM_read_bio_ex(BIO *in, char **name, char **header,
21 the name of the type of contained data, the header information regarding
45 The caller must release the storage allocated for *name, *header, and *data.
H A DOSSL_HTTP_transfer.pod143 The I<buf_size> parameter specifies the response header maximum line length.
166 OSSL_HTTP_set1_request() sets up in I<rctx> the request header and content data
169 (and optionally port) needs to be placed in the header; thus it must be present
178 The optional list I<headers> may contain additional custom HTTP header lines.
182 is included in the HTTP header of the response and return an error if not.
183 In the content-type header line the specified string should be present either
186 in the header line, followed by a C<;> character and any further text.
215 If the response header contains one or more "Content-Length" header lines and/or
230 for connecting but the hostname is used, as usual, for the C<Host> header.
/openssl/ssl/record/methods/
H A Dssl3_meth.c257 unsigned char header[75]; in ssl3_mac()
259 memcpy(header + j, mac_sec, md_size); in ssl3_mac()
261 memcpy(header + j, ssl3_pad_1, npad); in ssl3_mac()
263 memcpy(header + j, seq, 8); in ssl3_mac()
265 header[j++] = rec->type; in ssl3_mac()
266 header[j++] = (unsigned char)(rec->length >> 8); in ssl3_mac()
267 header[j++] = (unsigned char)(rec->length & 0xff); in ssl3_mac()
272 header, rec->input, in ssl3_mac()
H A Dtls1_meth.c471 unsigned char header[13]; in tls1_mac() local
503 memcpy(header, dtlsseq, 8); in tls1_mac()
505 memcpy(header, seq, 8); in tls1_mac()
508 header[8] = rec->type; in tls1_mac()
509 header[9] = (unsigned char)(rl->version >> 8); in tls1_mac()
510 header[10] = (unsigned char)(rl->version); in tls1_mac()
511 header[11] = (unsigned char)(rec->length >> 8); in tls1_mac()
512 header[12] = (unsigned char)(rec->length & 0xff); in tls1_mac()
528 if (EVP_DigestSignUpdate(mac_ctx, header, sizeof(header)) <= 0 in tls1_mac()
H A Dssl3_cbc.c129 const unsigned char *header, in ssl3_cbc_digest_record() argument
376 md_transform(md_state.c, header); in ssl3_cbc_digest_record()
377 memcpy(first_block, header + md_block_size, overhang); in ssl3_cbc_digest_record()
384 memcpy(first_block, header, 13); in ssl3_cbc_digest_record()
410 b = header[k]; in ssl3_cbc_digest_record()
/openssl/test/recipes/70-test_quic_multistream_data/
H A Dverify-qlog.py110 def check_packet_header(filename, event, header): argument
111 if type(header) != dict:
125 packet_type = header.get('packet_type')
129 if type(header.get('dcid')) != str:
131 if packet_type != '1RTT' and type(header.get('scid')) != str:
138 if type(header.get('packet_number')) != int:
/openssl/doc/internal/man7/
H A Ddeprecation.pod19 functions in our public header files, F<< <openssl/*.h> >>).
66 including an internal header file very early in the affected translation
70 from public view, it should be moved to an internal header file, with the
72 use that symbol should adjust their header inclusions accordingly.
80 In public header files (F<< <openssl/*.h> >>), this is what a deprecation is
96 any OpenSSL header file) in the translation unit that implements it and in
106 its declaration in the public header file is:
119 other OpenSSL header file) in the translation unit that implements it and in
/openssl/doc/man7/
H A Dopenssl-core_names.h.pod13 The F<< <openssl/core_names.h> >> header defines a multitude of macros
32 I<This header file does not constitute a general registry of names>.
38 to the names provided in this header to work in a compatible manner.
/openssl/crypto/err/
H A DREADME.md41 The generated C error code file `xxx_err.c` will load the header
43 header file must load any additional header files containing any
/openssl/doc/internal/man3/
H A Dossl_cmp_msg_protect.pod22 according to the algorithm and parameters in the message header's protectionAlg
24 Unless I<msg->header->protectionAlg> is B<PasswordBasedMAC>,
32 It also sets the protectionAlg field in the message header accordingly.
/openssl/
H A DHACKING.md7 either add a prototype in one of the existing OpenSSL header files;
8 or provide a new header file and edit
/openssl/VMS/
H A Dtest-includes.com1 $! Quick script to check how well including individual header files works

Completed in 63 milliseconds

12345