Home
last modified time | relevance | path

Searched refs:service (Results 1 – 25 of 28) sorted by relevance

12

/openssl/doc/man3/
H A DBIO_parse_hostserv.pod7 - utility routines to parse a standard host and service string
30 host + ':' + service
33 ':' + service
34 '*' + ':' + service
36 service
41 The service part can be a service name or its port number. A service name
47 host + ':' + service => *host = "host", *service = "service"
48 host + ':' + '*' => *host = "host", *service = NULL
50 ':' + service => *host = NULL, *service = "service"
51 '*' + ':' + service => *host = NULL, *service = "service"
[all …]
H A DBIO_ADDRINFO.pod24 int BIO_lookup_ex(const char *host, const char *service, int lookup_type,
26 int BIO_lookup(const char *host, const char *service,
45 BIO_lookup_ex() looks up a specified B<host> and B<service>, and
56 For the family B<AF_UNIX>, BIO_lookup_ex() will ignore the B<service>
H A DBIO_connect.pod25 BIO_bind() binds the source address and service to a socket and
29 BIO_connect() connects B<sock> to the address and service given by
34 BIO_listen() has B<sock> start listening on the address and service
H A DSSL_CTX_set_session_id_context.pod33 to use e.g. the name of the application and/or the hostname and/or service
H A DSSL_set1_host.pod37 is required for DANE TLSA in the presence of service name indirection
H A DBIO_ADDR.pod93 service name of the port of the given B<BIO_ADDR>. If B<numeric>
H A DBIO_should_retry.pod99 it is possible to service several BIOs in a single thread, though
H A DDTLSv1_listen.pod77 denial-of-service attack or allow unencrypted information in the DTLS handshake
H A DBIO_s_connect.pod72 numerical form or a service string such as "http", which
/openssl/crypto/bio/
H A Dbio_addr.c272 if (service != NULL) in addr_strings()
278 if (service != NULL) { in addr_strings()
286 || (service != NULL && *service == NULL)) { in addr_strings()
291 if (service != NULL) { in addr_strings()
292 OPENSSL_free(*service); in addr_strings()
293 *service = NULL; in addr_strings()
313 char *service = NULL; in BIO_ADDR_service_string() local
316 return service; in BIO_ADDR_service_string()
571 *service = NULL; in BIO_parse_hostserv()
574 if (*service == NULL) in BIO_parse_hostserv()
[all …]
H A Dbss_conn.c541 char *service = BIO_ADDR_service_string(addr, 1); in conn_ctrl() local
543 ret = host != NULL && service != NULL; in conn_ctrl()
548 data->param_service = service; in conn_ctrl()
554 OPENSSL_free(service); in conn_ctrl()
/openssl/apps/lib/
H A Ds_socket.c218 void get_sock_info_address(int asock, char **hostname, char **service) in get_sock_info_address() argument
224 if (service != NULL) in get_sock_info_address()
225 *service = NULL; in get_sock_info_address()
231 if (service != NULL) in get_sock_info_address()
232 *service = BIO_ADDR_service_string(info.addr, 1); in get_sock_info_address()
244 char *hostname, *service; in report_server_accept() local
246 get_sock_info_address(asock, &hostname, &service); in report_server_accept()
247 success = hostname != NULL && service != NULL; in report_server_accept()
253 hostname, service) > 0; in report_server_accept()
257 OPENSSL_free(service); in report_server_accept()
/openssl/
H A DNOTES-WINDOWS.md236 non-interactive service applications might feel concerned about
238 with interactive desktop, which is not available to service
240 currently executed, GUI, console app or service, and act accordingly,
243 actually keep them off service process should consider implementing
H A DLICENSE.txt140 names, trademarks, service marks, or product names of the Licensor,
H A DCHANGES.md627 leading to a denial of service.
1411 contents or enact a denial of service.
1423 to cause a denial of service attack.
1559 denial of service).
3568 service attack.
5065 memory to service the multiple requests.
6845 service for a specific DTLS connection.
8046 service for a specific DTLS connection.
8911 are subject to a denial of service attack.
9048 fuzzing as a service testing platform.
[all …]
/openssl/apps/include/
H A Ds_apps.h22 void get_sock_info_address(int asock, char **hostname, char **service);
/openssl/doc/designs/
H A Dfips_indicator.md21 - A module must have an approved mode of operation that requires at least one service to use an app…
22 - A FIPS 140-3 compliant module requires a built-in service indicator capable of indicating the use…
23 …manner an implicit indicator can be used (e.g. successful completion of a service is an indicator).
26 …ify that the indicator provides an unambiguous indication of whether the service utilizes an appro…
/openssl/crypto/http/
H A Dhttp_client.c934 char *service = NULL; in explict_or_default_port() local
936 if (!BIO_parse_hostserv(hostserv, NULL, &service, BIO_PARSE_PRIO_HOST)) in explict_or_default_port()
938 if (service == NULL) /* implicit port */ in explict_or_default_port()
940 OPENSSL_free(service); in explict_or_default_port()
/openssl/crypto/property/
H A DREADME.md87 against a denial of service attack. The cache cannot be permitted to grow
/openssl/doc/man1/
H A Dtsget.pod141 and at port 8443 for HTTPS requests, the TSA service is available at the /tsa
/openssl/include/openssl/
H A Dbio.h.in837 int BIO_parse_hostserv(const char *hostserv, char **host, char **service,
842 int BIO_lookup(const char *host, const char *service,
845 int BIO_lookup_ex(const char *host, const char *service,
/openssl/crypto/err/
H A Dopenssl.txt133 BIO_R_AMBIGUOUS_HOST_OR_SERVICE:129:ambiguous host or service
149 BIO_R_MALFORMED_HOST_OR_SERVICE:130:malformed host or service
153 no accept addr or service specified
154 BIO_R_NO_HOSTNAME_OR_SERVICE_SPECIFIED:144:no hostname or service specified
/openssl/doc/man7/
H A Dopenssl-quic.pod413 Most applications will service the SSL object by calling L<SSL_read(3)> or
713 The implementation may or may not use a common thread or thread pool to service
H A Dossl-guide-tls-client-non-block.pod109 * update a GUI, or service other connections).
/openssl/doc/man5/
H A Dconfig.pod174 a configuration error will completely prevent access to a service.

Completed in 99 milliseconds

12