/openssl/crypto/pem/ |
H A D | pem_lib.c | 527 if ((header == NULL) || (*header == '\0') || (*header == '\n')) in PEM_get_EVP_CIPHER_INFO() 534 header += strspn(header, " \t"); in PEM_get_EVP_CIPHER_INFO() 536 if (*header++ != '4' || *header++ != ',') in PEM_get_EVP_CIPHER_INFO() 538 header += strspn(header, " \t"); in PEM_get_EVP_CIPHER_INFO() 546 header += strspn(header, " \t\r"); in PEM_get_EVP_CIPHER_INFO() 560 header += strspn(header, " \t"); in PEM_get_EVP_CIPHER_INFO() 567 header += strcspn(header, " \t,"); in PEM_get_EVP_CIPHER_INFO() 568 c = *header; in PEM_get_EVP_CIPHER_INFO() 571 *header = c; in PEM_get_EVP_CIPHER_INFO() 572 header += strspn(header, " \t"); in PEM_get_EVP_CIPHER_INFO() [all …]
|
H A D | pem_info.c | 58 char *name = NULL, *header = NULL, *str; in STACK_OF() local 82 i = PEM_read_bio(bp, &name, &header, &data, &len); in STACK_OF() 145 if ((int)strlen(header) > 10 /* assume encrypted */ in STACK_OF() 157 if (!PEM_get_EVP_CIPHER_INFO(header, &cipher)) in STACK_OF() 173 if (!PEM_get_EVP_CIPHER_INFO(header, &xi->enc_cipher)) in STACK_OF() 182 OPENSSL_free(header); in STACK_OF() 183 header = NULL; in STACK_OF() 212 OPENSSL_free(header); in STACK_OF()
|
/openssl/fuzz/ |
H A D | pem.c | 26 char *name = NULL, *header = NULL; in FuzzerTestOneInput() local 35 if (PEM_read_bio_ex(in, &name, &header, &data, &outlen, buf[0]) == 1) { in FuzzerTestOneInput() 38 BIO_write(in, header, strlen(header)); in FuzzerTestOneInput() 43 OPENSSL_secure_free(header); in FuzzerTestOneInput() 47 OPENSSL_free(header); in FuzzerTestOneInput()
|
/openssl/test/ |
H A D | pemtest.c | 36 char *name = NULL, *header = NULL; in test_b64() local 47 || !TEST_true(PEM_read_bio_ex(b, &name, &header, &data, &len, in test_b64() 58 OPENSSL_free(header); in test_b64() 66 char *name = NULL, *header = NULL; in test_invalid() local 76 || TEST_true(PEM_read_bio_ex(b, &name, &header, &data, &len, in test_invalid() 83 OPENSSL_free(header); in test_invalid() 106 char *name = NULL, *header = NULL; in test_empty_payload() local 116 if (!TEST_false(PEM_read_bio_ex(b, &name, &header, &data, &len, 0))) in test_empty_payload() 122 OPENSSL_free(header); in test_empty_payload()
|
H A D | recordlentest.c | 29 unsigned char header[SSL3_RT_HEADER_LENGTH]; in write_record() local 35 header[0] = rectype; in write_record() 36 header[1] = (recversion >> 8) & 0xff; in write_record() 37 header[2] = recversion & 0xff; in write_record() 38 header[3] = (len >> 8) & 0xff; in write_record() 39 header[4] = len & 0xff; in write_record() 41 if (!BIO_write_ex(b, header, SSL3_RT_HEADER_LENGTH, &written) in write_record()
|
H A D | x509aux.c | 25 char *header = 0; in test_certs() local 36 for (c = 0; !err && PEM_read_bio(fp, &name, &header, &data, &len); ++c) { in test_certs() 151 OPENSSL_free(header); in test_certs()
|
H A D | danetest.c | 95 char *header = 0; in STACK_OF() local 107 && PEM_read_bio(fp, &name, &header, &data, &len) == 1; in STACK_OF() 131 OPENSSL_free(header); in STACK_OF() 133 name = header = NULL; in STACK_OF() 144 OPENSSL_free(header); in STACK_OF()
|
/openssl/crypto/cmp/ |
H A D | cmp_protect.c | 46 prot_part.header = msg->header; in ossl_cmp_calc_protection() 49 if (msg->header->protectionAlg == NULL) { in ossl_cmp_calc_protection() 53 X509_ALGOR_get0(&algorOID, &pptype, &ppval, msg->header->protectionAlg); in ossl_cmp_calc_protection() 124 msg->header->protectionAlg, /* sets X509_ALGOR */ in ossl_cmp_calc_protection() 229 return id == NULL || ossl_cmp_hdr_set1_senderKID(msg->header, id); in set_senderKID() 242 X509_ALGOR_free(msg->header->protectionAlg); in ossl_cmp_msg_protect() 243 msg->header->protectionAlg = NULL; in ossl_cmp_msg_protect() 252 if ((msg->header->protectionAlg = pbmac_algor(ctx)) == NULL) in ossl_cmp_msg_protect() 271 if ((msg->header->protectionAlg = X509_ALGOR_new()) == NULL) in ossl_cmp_msg_protect() 305 if (!(ossl_cmp_general_name_is_NULL_DN(msg->header->sender) in ossl_cmp_msg_protect() [all …]
|
H A D | cmp_vfy.c | 52 prot_part.header = msg->header; in verify_signature() 56 msg->header->protectionAlg, msg->protection, in verify_signature() 289 "sender field", msg->header->sender->d.directoryName)) in cert_acceptable() 292 if (!check_kid(ctx, X509_get0_subject_key_id(cert), msg->header->senderKID)) in cert_acceptable() 465 GENERAL_NAME *sender = msg->header->sender; in check_msg_find_cert() 468 const ASN1_OCTET_STRING *skid = msg->header->senderKID; in check_msg_find_cert() 569 || msg->header == NULL || msg->body == NULL) { in OSSL_CMP_validate_msg() 574 if (msg->header->protectionAlg == NULL /* unprotected message */ in OSSL_CMP_validate_msg() 580 switch (ossl_cmp_hdr_get_protection_nid(msg->header)) { in OSSL_CMP_validate_msg() 710 if (!ossl_assert(ctx != NULL && msg != NULL && msg->header != NULL)) in ossl_cmp_msg_check_update()
|
H A D | cmp_msg.c | 71 return msg->header; in OSSL_CMP_MSG_get0_header() 172 if (!ossl_cmp_hdr_init(ctx, msg->header) in ossl_cmp_msg_create() 176 && !ossl_cmp_hdr_generalInfo_push1_items(msg->header, in ossl_cmp_msg_create() 410 if (ctx->implicitConfirm && !ossl_cmp_hdr_set_implicitConfirm(msg->header)) in ossl_cmp_certreq_new() 512 if (ctx->implicitConfirm && !ossl_cmp_hdr_set_implicitConfirm(msg->header)) in ossl_cmp_certrep_new() 896 if (!ossl_cmp_hdr_set_pvno(msg->header, OSSL_CMP_PVNO_3)) in ossl_cmp_certConf_new() 1182 if (!ossl_cmp_hdr_set_transactionID(ctx, msg->header)) in OSSL_CMP_MSG_update_transactionID() 1184 return msg->header->protectionAlg == NULL in OSSL_CMP_MSG_update_transactionID() 1190 if (ctx == NULL || msg == NULL || msg->header == NULL) { in OSSL_CMP_MSG_update_recipNonce() 1196 if (!ossl_cmp_asn1_octet_string_set1(&msg->header->recipNonce, in OSSL_CMP_MSG_update_recipNonce() [all …]
|
/openssl/doc/man3/ |
H A D | PEM_read.pod | 13 int PEM_read(FILE *fp, char **name, char **header, 15 int PEM_read_bio(BIO *bp, char **name, char **header, 18 int PEM_get_EVP_CIPHER_INFO(char *header, EVP_CIPHER_INFO *cinfo); 22 int PEM_write(FILE *fp, const char *name, const char *header, 24 int PEM_write_bio(BIO *bp, const char *name, const char *header, 42 type B<name>, any additional B<header> information, and the raw 54 Optional header line(s) may appear after the begin line, and their 59 B<header> is the header value or NULL, and B<data> and B<len> specify 71 are returned in B<header> and the base64-decoded content and its length are 83 When the header is malformed, or not supported or when the cipher is unknown [all …]
|
H A D | OSSL_HTTP_REQ_CTX.pod | 68 I<wbio>), and the maximum expected response header line length I<buf_size>. 73 which collects the HTTP request header lines. 92 For example, to add a C<Host> header for C<example.com> you would call: 103 is included in the HTTP header of the response and return an error if not. 107 in the header line, followed by a C<;> character and any further text. 145 the HTTP header C<Content-Type> is also added with the given string value. 146 The header lines are added to the internal memory B<BIO> for the request header. 159 If the C<Content-Length> header is present in the response 197 the number of HTTP header lines allowed to be received in a response. 218 create the I<wbio>, any C<Host> header, and the host specified in the [all …]
|
H A D | SSL_rstate_string.pod | 25 consisting of header and body. When working in a blocking environment, 37 =item "RH"/"read header" 39 The header of the record is being evaluated. 52 header" in normal conditions.
|
H A D | PEM_read_bio_ex.pod | 15 int PEM_read_bio_ex(BIO *in, char **name, char **header, 21 the name of the type of contained data, the header information regarding 45 The caller must release the storage allocated for *name, *header, and *data.
|
/openssl/ssl/record/methods/ |
H A D | ssl3_meth.c | 257 unsigned char header[75]; in ssl3_mac() 259 memcpy(header + j, mac_sec, md_size); in ssl3_mac() 261 memcpy(header + j, ssl3_pad_1, npad); in ssl3_mac() 263 memcpy(header + j, seq, 8); in ssl3_mac() 265 header[j++] = rec->type; in ssl3_mac() 266 header[j++] = (unsigned char)(rec->length >> 8); in ssl3_mac() 267 header[j++] = (unsigned char)(rec->length & 0xff); in ssl3_mac() 272 header, rec->input, in ssl3_mac()
|
H A D | tls1_meth.c | 471 unsigned char header[13]; in tls1_mac() local 503 memcpy(header, dtlsseq, 8); in tls1_mac() 505 memcpy(header, seq, 8); in tls1_mac() 508 header[8] = rec->type; in tls1_mac() 509 header[9] = (unsigned char)(rl->version >> 8); in tls1_mac() 510 header[10] = (unsigned char)(rl->version); in tls1_mac() 511 header[11] = (unsigned char)(rec->length >> 8); in tls1_mac() 512 header[12] = (unsigned char)(rec->length & 0xff); in tls1_mac() 528 if (EVP_DigestSignUpdate(mac_ctx, header, sizeof(header)) <= 0 in tls1_mac()
|
H A D | ssl3_cbc.c | 129 const unsigned char *header, in ssl3_cbc_digest_record() argument 376 md_transform(md_state.c, header); in ssl3_cbc_digest_record() 377 memcpy(first_block, header + md_block_size, overhang); in ssl3_cbc_digest_record() 384 memcpy(first_block, header, 13); in ssl3_cbc_digest_record() 410 b = header[k]; in ssl3_cbc_digest_record()
|
/openssl/test/recipes/70-test_quic_multistream_data/ |
H A D | verify-qlog.py | 110 def check_packet_header(filename, event, header): argument 111 if type(header) != dict: 125 packet_type = header.get('packet_type') 129 if type(header.get('dcid')) != str: 131 if packet_type != '1RTT' and type(header.get('scid')) != str: 138 if type(header.get('packet_number')) != int:
|
/openssl/doc/internal/man7/ |
H A D | deprecation.pod | 19 functions in our public header files, F<< <openssl/*.h> >>). 66 including an internal header file very early in the affected translation 70 from public view, it should be moved to an internal header file, with the 72 use that symbol should adjust their header inclusions accordingly. 80 In public header files (F<< <openssl/*.h> >>), this is what a deprecation is 96 any OpenSSL header file) in the translation unit that implements it and in 106 its declaration in the public header file is: 119 other OpenSSL header file) in the translation unit that implements it and in
|
/openssl/doc/man7/ |
H A D | openssl-core_names.h.pod | 13 The F<< <openssl/core_names.h> >> header defines a multitude of macros 32 I<This header file does not constitute a general registry of names>. 38 to the names provided in this header to work in a compatible manner.
|
/openssl/crypto/err/ |
H A D | README.md | 41 The generated C error code file `xxx_err.c` will load the header 43 header file must load any additional header files containing any
|
/openssl/doc/internal/man3/ |
H A D | ossl_cmp_msg_protect.pod | 22 according to the algorithm and parameters in the message header's protectionAlg 24 Unless I<msg->header->protectionAlg> is B<PasswordBasedMAC>, 32 It also sets the protectionAlg field in the message header accordingly.
|
/openssl/ |
H A D | HACKING.md | 7 either add a prototype in one of the existing OpenSSL header files; 8 or provide a new header file and edit
|
/openssl/VMS/ |
H A D | test-includes.com | 1 $! Quick script to check how well including individual header files works
|
/openssl/apps/ |
H A D | asn1parse.c | 70 char *name = NULL, *header = NULL, *prog; in asn1parse_main() local 183 if (PEM_read_bio(in, &name, &header, &str, &num) != 1) { in asn1parse_main() 315 OPENSSL_free(header); in asn1parse_main()
|