/openssl/util/perl/OpenSSL/Test/ |
H A D | Utils.pm | 176 require IO::Socket::IP; 177 my $s = IO::Socket::IP->new(
|
/openssl/doc/man3/ |
H A D | BIO_s_connect.pod | 41 round the platform's TCP/IP socket connection routines. 43 Using connect BIOs, TCP/IP connections can be made and data 66 The hostname can be an IP address; if the address is an IPv6 one, it 78 BIO_set_conn_ip_family() sets the IP family. 90 BIO_get_conn_ip_family() returns the IP family of the connect BIO. 101 If domain name resolution yields multiple IP addresses all of them are tried
|
H A D | BIO_s_accept.pod | 42 round the platform's TCP/IP socket accept routines. 44 Using accept BIOs, TCP/IP connections can be accepted and data 103 BIO_get_accept_ip_family() returns the IP family accepted by the BIO I<b>, 106 BIO_set_accept_ip_family() sets the IP family I<family> accepted by BIO I<b>. 187 BIO_get_accept_ip_family() returns the IP family or <= 0 on error.
|
H A D | OSSL_CMP_validate_msg.pod | 44 L<OSSL_CMP_CTX_set_option(3)>, for an Initialization Response (IP) message 47 used also to validate the issued certificate returned in the IP message. This is
|
H A D | DTLSv1_listen.pod | 30 address. An attacker could forge its source IP address and then send handshake 32 the forged source IP. If the response messages are larger than the original 36 the source IP) then it is susceptible to this type of attack. TLSv1.3 is
|
H A D | BIO_parse_hostserv.pod | 38 The host part can be a name or an IP address. If it's a IPv6
|
H A D | X509_check_host.pod | 22 certificate matches a given hostname, email address, or IP address. 64 explicitly marked addresses in the certificates are considered; IP
|
H A D | X509_VERIFY_PARAM_set_flags.pod | 200 X509_VERIFY_PARAM_get1_ip_asc() returns the expected IP address as a string. 203 X509_VERIFY_PARAM_set1_ip() sets the expected IP address to B<ip>. 205 B<iplen> must be set to 4 for IPv4 and 16 for IPv6. When an IP 209 X509_VERIFY_PARAM_set1_ip_asc() sets the expected IP address to
|
H A D | BIO_s_datagram.pod | 172 estimate the final size of the Layer 3 (e.g. IP) packet which will contain the 187 Fragment mode, in which datagrams will be set with the IP Don't Fragment (DF)
|
H A D | OSSL_HTTP_parse_url.pod | 55 The host (or server) component may be a DNS name or an IP address
|
H A D | OSSL_CMP_CTX_new.pod | 331 error messages as well as certificate responses (IP/CP/KUP) and 346 to validate the certificate chain of an IP message. 382 (which may be a hostname or IP address or NULL) in the given I<ctx>. 732 been called) on the last received certificate response message IP/CP/KUP. 736 response message (of type IP, CP, or KUP),
|
H A D | X509_STORE_CTX_get_error.pod | 392 =item B<X509_V_ERR_IP_ADDRESS_MISMATCH: IP address mismatch> 394 IP address mismatch.
|
H A D | SSL_alert_type_string.pod | 126 =item "IP"/"illegal parameter"
|
/openssl/test/recipes/80-test_cmp_http_data/Mock/ |
H A D | test.cnf | 130 IP.0 = 127.0.0.1 131 IP.1 = 192.168.1.1
|
/openssl/crypto/des/ |
H A D | des_enc.c | 28 IP(r, l); in DES_encrypt1() 162 IP(l, r); in DES_encrypt3() 182 IP(l, r); in DES_decrypt3()
|
H A D | des_local.h | 199 # define IP(l,r) \ macro
|
/openssl/doc/man5/ |
H A D | x509v3_config.pod | 241 B<IP> (an IP address), 252 The IP address used in the B<IP> option can be in either IPv4 or IPv6 format. 266 subjectAltName = IP:192.168.7.1 268 subjectAltName = IP:13::17 503 is not supported and the B<IP> form should consist of an IP addresses and 508 nameConstraints = permitted;IP:192.168.0.0/255.255.0.0
|
/openssl/util/perl/TLSProxy/ |
H A D | Proxy.pm | 55 require IO::Socket::IP; 56 my $s = IO::Socket::IP->new( 65 $IP_factory = sub { IO::Socket::IP->new(@_); };
|
/openssl/test/recipes/80-test_cmp_http_data/ |
H A D | test_connection.csv | 5 disabled as not supported by some host IP configurations,server domain name, -section,, -server,_SE… 17 TBD,server IP address with TLS port, -section,, -server,_SERVER_IP:_SERVER_TLS,,,,,BLANK,,,,BLANK,,…
|
/openssl/doc/man7/ |
H A D | ossl-guide-quic-client-block.pod | 29 understanding of UDP/IP and sockets. The example code that we build in this 95 * Lookup IP address info for the server. 154 Secondly, we take note of the IP address of the peer that we are connecting to. 228 /* Set the IP address of the remote peer */
|
H A D | ossl-guide-quic-introduction.pod | 12 understanding of UDP/IP and sockets. It also assumes that you are familiar with 57 connections to seamlessly survive IP address changes.
|
/openssl/ |
H A D | README-QUIC.md | 33 initiation; and connection migration (enabling a connection to survive IP
|
/openssl/doc/internal/man3/ |
H A D | ossl_cmp_certreq_new.pod | 71 which can be either of IP/CP/KUP, depending on the given I<bodytype>,
|
/openssl/doc/man1/ |
H A D | openssl-cmp.pod.in | 349 One or more IP addresses, email addresses, DNS names, or URIs 513 The I<host> domain name or IP address and optionally I<port> 515 IP address may be for v4 or v6, such as C<127.0.0.1> or C<[::1]> for localhost. 542 List of IP addresses and/or DNS names of servers 676 =item * negative certificate responses (IP/CP/KUP) 724 if a positive certificate response (i.e., IP, CP, or KUP) message was received 1020 This may be a DNS name or an IP address. 1207 CA certificates to be included in mock Initialization Response (IP) message. 1262 certificate responses (IP/CP/KUP), and revocation responses (RP).
|
/openssl/doc/designs/quic-design/ |
H A D | glossary.md | 100 a datagram. The MDPL may vary based on both local source IP and destination IP
|