Home
last modified time | relevance | path

Searched refs:IP (Results 1 – 25 of 44) sorted by relevance

12

/openssl/util/perl/OpenSSL/Test/
H A DUtils.pm176 require IO::Socket::IP;
177 my $s = IO::Socket::IP->new(
/openssl/doc/man3/
H A DBIO_s_connect.pod41 round the platform's TCP/IP socket connection routines.
43 Using connect BIOs, TCP/IP connections can be made and data
66 The hostname can be an IP address; if the address is an IPv6 one, it
78 BIO_set_conn_ip_family() sets the IP family.
90 BIO_get_conn_ip_family() returns the IP family of the connect BIO.
101 If domain name resolution yields multiple IP addresses all of them are tried
H A DBIO_s_accept.pod42 round the platform's TCP/IP socket accept routines.
44 Using accept BIOs, TCP/IP connections can be accepted and data
103 BIO_get_accept_ip_family() returns the IP family accepted by the BIO I<b>,
106 BIO_set_accept_ip_family() sets the IP family I<family> accepted by BIO I<b>.
187 BIO_get_accept_ip_family() returns the IP family or <= 0 on error.
H A DOSSL_CMP_validate_msg.pod44 L<OSSL_CMP_CTX_set_option(3)>, for an Initialization Response (IP) message
47 used also to validate the issued certificate returned in the IP message. This is
H A DDTLSv1_listen.pod30 address. An attacker could forge its source IP address and then send handshake
32 the forged source IP. If the response messages are larger than the original
36 the source IP) then it is susceptible to this type of attack. TLSv1.3 is
H A DBIO_parse_hostserv.pod38 The host part can be a name or an IP address. If it's a IPv6
H A DX509_check_host.pod22 certificate matches a given hostname, email address, or IP address.
64 explicitly marked addresses in the certificates are considered; IP
H A DX509_VERIFY_PARAM_set_flags.pod200 X509_VERIFY_PARAM_get1_ip_asc() returns the expected IP address as a string.
203 X509_VERIFY_PARAM_set1_ip() sets the expected IP address to B<ip>.
205 B<iplen> must be set to 4 for IPv4 and 16 for IPv6. When an IP
209 X509_VERIFY_PARAM_set1_ip_asc() sets the expected IP address to
H A DBIO_s_datagram.pod172 estimate the final size of the Layer 3 (e.g. IP) packet which will contain the
187 Fragment mode, in which datagrams will be set with the IP Don't Fragment (DF)
H A DOSSL_HTTP_parse_url.pod55 The host (or server) component may be a DNS name or an IP address
H A DOSSL_CMP_CTX_new.pod331 error messages as well as certificate responses (IP/CP/KUP) and
346 to validate the certificate chain of an IP message.
382 (which may be a hostname or IP address or NULL) in the given I<ctx>.
732 been called) on the last received certificate response message IP/CP/KUP.
736 response message (of type IP, CP, or KUP),
H A DX509_STORE_CTX_get_error.pod392 =item B<X509_V_ERR_IP_ADDRESS_MISMATCH: IP address mismatch>
394 IP address mismatch.
H A DSSL_alert_type_string.pod126 =item "IP"/"illegal parameter"
/openssl/test/recipes/80-test_cmp_http_data/Mock/
H A Dtest.cnf130 IP.0 = 127.0.0.1
131 IP.1 = 192.168.1.1
/openssl/crypto/des/
H A Ddes_enc.c28 IP(r, l); in DES_encrypt1()
162 IP(l, r); in DES_encrypt3()
182 IP(l, r); in DES_decrypt3()
H A Ddes_local.h199 # define IP(l,r) \ macro
/openssl/doc/man5/
H A Dx509v3_config.pod241 B<IP> (an IP address),
252 The IP address used in the B<IP> option can be in either IPv4 or IPv6 format.
266 subjectAltName = IP:192.168.7.1
268 subjectAltName = IP:13::17
503 is not supported and the B<IP> form should consist of an IP addresses and
508 nameConstraints = permitted;IP:192.168.0.0/255.255.0.0
/openssl/util/perl/TLSProxy/
H A DProxy.pm55 require IO::Socket::IP;
56 my $s = IO::Socket::IP->new(
65 $IP_factory = sub { IO::Socket::IP->new(@_); };
/openssl/test/recipes/80-test_cmp_http_data/
H A Dtest_connection.csv5 disabled as not supported by some host IP configurations,server domain name, -section,, -server,_SE…
17 TBD,server IP address with TLS port, -section,, -server,_SERVER_IP:_SERVER_TLS,,,,,BLANK,,,,BLANK,,…
/openssl/doc/man7/
H A Dossl-guide-quic-client-block.pod29 understanding of UDP/IP and sockets. The example code that we build in this
95 * Lookup IP address info for the server.
154 Secondly, we take note of the IP address of the peer that we are connecting to.
228 /* Set the IP address of the remote peer */
H A Dossl-guide-quic-introduction.pod12 understanding of UDP/IP and sockets. It also assumes that you are familiar with
57 connections to seamlessly survive IP address changes.
/openssl/
H A DREADME-QUIC.md33 initiation; and connection migration (enabling a connection to survive IP
/openssl/doc/internal/man3/
H A Dossl_cmp_certreq_new.pod71 which can be either of IP/CP/KUP, depending on the given I<bodytype>,
/openssl/doc/man1/
H A Dopenssl-cmp.pod.in349 One or more IP addresses, email addresses, DNS names, or URIs
513 The I<host> domain name or IP address and optionally I<port>
515 IP address may be for v4 or v6, such as C<127.0.0.1> or C<[::1]> for localhost.
542 List of IP addresses and/or DNS names of servers
676 =item * negative certificate responses (IP/CP/KUP)
724 if a positive certificate response (i.e., IP, CP, or KUP) message was received
1020 This may be a DNS name or an IP address.
1207 CA certificates to be included in mock Initialization Response (IP) message.
1262 certificate responses (IP/CP/KUP), and revocation responses (RP).
/openssl/doc/designs/quic-design/
H A Dglossary.md100 a datagram. The MDPL may vary based on both local source IP and destination IP

Completed in 52 milliseconds

12