/openssl/doc/man3/ |
H A D | BIO_parse_hostserv.pod | 7 - utility routines to parse a standard host and service string 30 host + ':' + service 33 ':' + service 34 '*' + ':' + service 36 service 41 The service part can be a service name or its port number. A service name 47 host + ':' + service => *host = "host", *service = "service" 48 host + ':' + '*' => *host = "host", *service = NULL 50 ':' + service => *host = NULL, *service = "service" 51 '*' + ':' + service => *host = NULL, *service = "service" [all …]
|
H A D | BIO_ADDRINFO.pod | 24 int BIO_lookup_ex(const char *host, const char *service, int lookup_type, 26 int BIO_lookup(const char *host, const char *service, 45 BIO_lookup_ex() looks up a specified B<host> and B<service>, and 56 For the family B<AF_UNIX>, BIO_lookup_ex() will ignore the B<service>
|
H A D | BIO_connect.pod | 25 BIO_bind() binds the source address and service to a socket and 29 BIO_connect() connects B<sock> to the address and service given by 34 BIO_listen() has B<sock> start listening on the address and service
|
H A D | SSL_CTX_set_session_id_context.pod | 33 to use e.g. the name of the application and/or the hostname and/or service
|
H A D | SSL_set1_host.pod | 37 is required for DANE TLSA in the presence of service name indirection
|
H A D | BIO_ADDR.pod | 93 service name of the port of the given B<BIO_ADDR>. If B<numeric>
|
H A D | BIO_should_retry.pod | 99 it is possible to service several BIOs in a single thread, though
|
H A D | DTLSv1_listen.pod | 77 denial-of-service attack or allow unencrypted information in the DTLS handshake
|
H A D | BIO_s_connect.pod | 72 numerical form or a service string such as "http", which
|
/openssl/crypto/bio/ |
H A D | bio_addr.c | 272 if (service != NULL) in addr_strings() 278 if (service != NULL) { in addr_strings() 286 || (service != NULL && *service == NULL)) { in addr_strings() 291 if (service != NULL) { in addr_strings() 292 OPENSSL_free(*service); in addr_strings() 293 *service = NULL; in addr_strings() 313 char *service = NULL; in BIO_ADDR_service_string() local 316 return service; in BIO_ADDR_service_string() 571 *service = NULL; in BIO_parse_hostserv() 574 if (*service == NULL) in BIO_parse_hostserv() [all …]
|
H A D | bss_conn.c | 541 char *service = BIO_ADDR_service_string(addr, 1); in conn_ctrl() local 543 ret = host != NULL && service != NULL; in conn_ctrl() 548 data->param_service = service; in conn_ctrl() 554 OPENSSL_free(service); in conn_ctrl()
|
/openssl/apps/lib/ |
H A D | s_socket.c | 218 void get_sock_info_address(int asock, char **hostname, char **service) in get_sock_info_address() argument 224 if (service != NULL) in get_sock_info_address() 225 *service = NULL; in get_sock_info_address() 231 if (service != NULL) in get_sock_info_address() 232 *service = BIO_ADDR_service_string(info.addr, 1); in get_sock_info_address() 244 char *hostname, *service; in report_server_accept() local 246 get_sock_info_address(asock, &hostname, &service); in report_server_accept() 247 success = hostname != NULL && service != NULL; in report_server_accept() 253 hostname, service) > 0; in report_server_accept() 257 OPENSSL_free(service); in report_server_accept()
|
/openssl/ |
H A D | NOTES-WINDOWS.md | 236 non-interactive service applications might feel concerned about 238 with interactive desktop, which is not available to service 240 currently executed, GUI, console app or service, and act accordingly, 243 actually keep them off service process should consider implementing
|
H A D | LICENSE.txt | 140 names, trademarks, service marks, or product names of the Licensor,
|
H A D | CHANGES.md | 627 leading to a denial of service. 1411 contents or enact a denial of service. 1423 to cause a denial of service attack. 1559 denial of service). 3568 service attack. 5065 memory to service the multiple requests. 6845 service for a specific DTLS connection. 8046 service for a specific DTLS connection. 8911 are subject to a denial of service attack. 9048 fuzzing as a service testing platform. [all …]
|
/openssl/apps/include/ |
H A D | s_apps.h | 22 void get_sock_info_address(int asock, char **hostname, char **service);
|
/openssl/doc/designs/ |
H A D | fips_indicator.md | 21 - A module must have an approved mode of operation that requires at least one service to use an app… 22 - A FIPS 140-3 compliant module requires a built-in service indicator capable of indicating the use… 23 …manner an implicit indicator can be used (e.g. successful completion of a service is an indicator). 26 …ify that the indicator provides an unambiguous indication of whether the service utilizes an appro…
|
/openssl/crypto/http/ |
H A D | http_client.c | 934 char *service = NULL; in explict_or_default_port() local 936 if (!BIO_parse_hostserv(hostserv, NULL, &service, BIO_PARSE_PRIO_HOST)) in explict_or_default_port() 938 if (service == NULL) /* implicit port */ in explict_or_default_port() 940 OPENSSL_free(service); in explict_or_default_port()
|
/openssl/crypto/property/ |
H A D | README.md | 87 against a denial of service attack. The cache cannot be permitted to grow
|
/openssl/doc/man1/ |
H A D | tsget.pod | 141 and at port 8443 for HTTPS requests, the TSA service is available at the /tsa
|
/openssl/include/openssl/ |
H A D | bio.h.in | 837 int BIO_parse_hostserv(const char *hostserv, char **host, char **service, 842 int BIO_lookup(const char *host, const char *service, 845 int BIO_lookup_ex(const char *host, const char *service,
|
/openssl/crypto/err/ |
H A D | openssl.txt | 133 BIO_R_AMBIGUOUS_HOST_OR_SERVICE:129:ambiguous host or service 149 BIO_R_MALFORMED_HOST_OR_SERVICE:130:malformed host or service 153 no accept addr or service specified 154 BIO_R_NO_HOSTNAME_OR_SERVICE_SPECIFIED:144:no hostname or service specified
|
/openssl/doc/man7/ |
H A D | openssl-quic.pod | 413 Most applications will service the SSL object by calling L<SSL_read(3)> or 713 The implementation may or may not use a common thread or thread pool to service
|
H A D | ossl-guide-tls-client-non-block.pod | 109 * update a GUI, or service other connections).
|
/openssl/doc/man5/ |
H A D | config.pod | 174 a configuration error will completely prevent access to a service.
|