Home
last modified time | relevance | path

Searched refs:list (Results 1 – 25 of 261) sorted by relevance

1234567891011

/openssl/include/internal/
H A Dlist.h58 OSSL_LIST_DBG(struct ossl_list_st_ ## name *list) \
70 ossl_list_##name##_init(OSSL_LIST(name) *list) \
72 memset(list, 0, sizeof(*list)); \
81 ossl_list_##name##_is_empty(const OSSL_LIST(name) *list) \
94 || list->alpha->ossl_list_ ## name.list == list); \
101 || list->omega->ossl_list_ ## name.list == list); \
123 assert(elem->ossl_list_ ## name.list == list); \
143 OSSL_LIST_DBG(elem->ossl_list_ ## name.list = list) \
157 OSSL_LIST_DBG(elem->ossl_list_ ## name.list = list) \
172 OSSL_LIST_DBG(elem->ossl_list_ ## name.list = list) \
[all …]
/openssl/doc/internal/man3/
H A DDEFINE_LIST_OF.pod12 - doubly linked list
18 #include "internal/list.h"
24 void ossl_list_TYPE_init(OSSL_LIST(name) *list);
60 to zero which creates an empty list.
77 the I<list>. It is illegal to remove an element that isn't in the list.
80 must not be in the list, into the first position in the I<list>.
83 must not be in the list, into the last position in the I<list>.
86 which must not be in the list, into the I<list> immediately before the
90 which must not be in the list, into the I<list> immediately after the
99 list.
[all …]
/openssl/crypto/
H A Dmem_sec.c355 return list; in sh_getlist()
363 OPENSSL_assert(list >= 0 && list < sh.freelist_size); in sh_testbit()
374 OPENSSL_assert(list >= 0 && list < sh.freelist_size); in sh_clearbit()
386 OPENSSL_assert(list >= 0 && list < sh.freelist_size); in sh_setbit()
411 *list = ptr; in sh_add_to_list()
623 bit = (ONE << list) + (ptr - sh.arena) / (sh.arena_size >> list); in sh_find_my_buddy()
643 list--; in sh_malloc()
644 if (list < 0) in sh_malloc()
699 size_t list; in sh_free() local
724 list--; in sh_free()
[all …]
/openssl/doc/man3/
H A DSSL_CTX_set0_CA_list.pod18 - get or set CA list
25 void SSL_set_client_CA_list(SSL *s, STACK_OF(X509_NAME) *list);
82 any. The returned list should not be freed by the caller.
94 returned list should not be freed by the caller.
115 B<ctx>. The returned list should not be freed by the caller.
119 returned list should not be freed by the caller.
122 list of CAs sent to peer for B<ctx>.
141 If the list of acceptable CAs is compiled in a file, the
147 list was specified before using SSL_CTX_set_client_CA_list(),
149 new CA list for B<ctx> or B<ssl> (as appropriate) is opened.
[all …]
H A DEVP_PKEY_get_attr.pod39 in the I<key> attribute list. The search starts at the position after I<lastpos>.
43 first call, in order to start searching from the start of the attribute list.
47 See <openssl/obj_mac.h> for a list of NID_*.
50 I<key> attribute list. I<loc> should be in the range from 0 to
54 the I<key> attribute list.
57 to the I<key> attribute list. A new I<key> attribute list is created if required.
64 list then an error occurs.
68 See <openssl/obj_mac.h> for a list of NID_*.
72 See <openssl/obj_mac.h> for a list of SN_* names.
77 attribute list or -1 if the attribute list is NULL.
[all …]
H A DX509_REQ_get_attr.pod40 first call, in order to start searching from the start of the attribute list.
44 See <openssl/obj_mac.h> for a list of NID_*.
47 I<req> attribute list. I<loc> should be in the range from 0 to
51 the I<req> objects list of attributes. An error occurs if I<req> is NULL.
54 to the I<req> object's attribute list. An error will occur if either the
55 attribute list is NULL or the attribute already exists.
60 to the I<req> object's attribute list. I<req> must be non NULL or an error
65 See <openssl/obj_mac.h> for a list of NID_*.
69 See <openssl/obj_mac.h> for a list of SN_* names.
76 attribute list or -1 if the attribute list is NULL.
[all …]
H A DSSL_CTX_set_ctlog_list_file.pod6 load a Certificate Transparency log list from a file
17 SSL_CTX_set_default_ctlog_list_file() loads a list of Certificate Transparency
21 SSL_CTX_set_ctlog_list_file() loads a list of CT logs from a specific path.
26 These functions will not clear the existing CT log list - it will be appended
27 to. To replace the existing list, use L<SSL_CTX_set0_ctlog_store(3)> first.
35 return 1 if the log list is successfully loaded, and 0 if an error occurs. In
36 the case of an error, the log list may have been partially loaded.
H A DX509_ATTRIBUTE.pod110 See <openssl/obj_mac.h> for a list of NID_*.
117 the list of attributes I<x>.
120 to the list I<x>.
124 attribute type) already exists in the attribute list.
131 already exists in the attribute list then an error occurs.
135 See <openssl/obj_mac.h> for a list of NID_*.
139 See <openssl/obj_mac.h> for a list of SN_* names.
171 object. See <openssl/obj_mac.h> for a list of NID_*.
175 object. See <openssl/obj_mac.h> for a list of SN_* names.
181 the attribute list I<attr>. I<idx> should be in the
[all …]
H A DSSL_get_ciphers.pod12 - get list of available SSL_CIPHERs
38 The list depends on settings like the cipher list, the supported protocol
42 The list of ciphers that would be sent in a ClientHello can differ from
43 the list of ciphers that would be acceptable when acting as a server.
45 a gap in the list of supported protocols, and some ciphers may not be
50 list received from the client on B<ssl>. If B<ssl> is NULL, no ciphers are
66 SSL_get_shared_ciphers() creates a colon separated and NUL terminated list of
68 the buffer that should be populated with the list of names and B<size> is the
70 error. If the supplied buffer is not large enough to contain the complete list
71 of names then a truncated list of names will be returned. Note that just because
[all …]
H A DSSL_CTX_set_cipher_list.pod11 - choose list of available SSL_CIPHERs
28 SSL_CTX_set_cipher_list() sets the list of available ciphers (TLSv1.2 and below)
30 in L<openssl-ciphers(1)>. The list of ciphers is inherited by all
34 SSL_set_cipher_list() sets the list of ciphers (TLSv1.2 and below) only for
38 ciphersuites for B<ctx>. This is a simple colon (":") separated list of TLSv1.3
59 An empty list is permissible. The default value for this setting is:
80 It should be noted, that inclusion of a cipher to be used into the list is
81 a necessary condition. On the client side, the inclusion into the list is
95 When these conditions are not met for any cipher in the list (e.g. a
103 cipher list defines are deprecated as of 3.0.
[all …]
H A DCMS_signed_get_attr.pod79 the signed attribute list.
83 See <openssl/obj_mac.h> for a list of NID_*.
86 I<si> signed attribute list. I<loc> should be in the range from 0 to
90 the I<si> signed attribute list. An error occurs if the I<si> attribute list
94 to the I<si> signed attribute list. A new signed attribute list is created if
100 to the I<key> object's attribute list.
104 See <openssl/obj_mac.h> for a list of NID_*.
108 See <openssl/obj_mac.h> for a list of SN_* names.
117 objects in the signed attribute list that match I<obj>.
129 SignerInfo I<si>, or -1 if the signed attribute list is NULL.
[all …]
H A DX509_add_cert.pod7 X509 certificate list addition functions
18 X509_add_cert() adds a certificate I<cert> to the given list I<sk>.
20 X509_add_certs() adds a list of certificate I<certs> to the given list I<sk>.
22 It does not modify the list I<certs> but
52 because otherwise likely not for all members of the I<certs> list
53 the ownership is transferred to the list of certificates I<sk>.
H A DSSL_CTX_set_alpn_select_cb.pod53 set the list of protocols available to be negotiated. The B<protos> must be in
55 B<protos_len>. Setting B<protos_len> to 0 clears any existing list of ALPN
64 vector in protocol-list format. The value of the B<out>, B<outlen> vector
74 described below. The first item in the B<server>, B<server_len> list that
78 least one valid (nonempty) protocol entry in the list.
89 client needs to select a protocol from the server's provided list, and a
102 when a TLS server needs a list of supported protocols for Next Protocol
103 Negotiation. The returned list must be in protocol-list format, described
104 below. The list is
120 this function need not be a member of the list of supported protocols
[all …]
H A DX509_REQ_get_extensions.pod20 X509_REQ_get_extensions() returns the first list of X.509 extensions
22 The returned list is empty if there are no such extensions in I<req>.
23 The caller is responsible for freeing the list obtained.
25 X509_REQ_add_extensions_nid() adds to I<req> a list of X.509 extensions I<exts>,
27 I<req> is unchanged if I<exts> is NULL or an empty list.
H A DSSL_COMP_add_compression_method.pod27 the identifier B<id> to the list of available compression methods. This
28 list is globally maintained for all SSL operations within this application.
52 will unconditionally send the list of all compression methods enabled with
54 Unlike the mechanisms to set a cipher list, there is no method available to
55 restrict the list of compression method on a per connection basis.
59 when a matching identifier is found. There is no way to restrict the list
/openssl/doc/man1/
H A Dopenssl-list.pod.in6 openssl-list - list algorithms and features
10 B<openssl list>
70 Only list algorithms that match this name.
113 Display a list of standard commands.
155 Display a list of encoders.
164 Display a list of decoders.
180 Display a list of public key methods.
184 Display a list of key managers.
196 Display a list of signature algorithms.
211 Display a list of store loaders.
[all …]
H A Dopenssl-s_time.pod.in100 This list will be combined with any TLSv1.3 ciphersuites that have been
102 take the first supported cipher in the list sent by the client. See
108 list will be combined with any TLSv1.2 and below ciphersuites that have been
110 take the first supported cipher in the list sent by the client. See
111 L<openssl-ciphers(1)> for more information. The format for this list is a
112 simple colon (":") separated list of TLSv1.3 ciphersuite names.
152 options B<before> submitting a bug report to an OpenSSL mailing list.
156 list to choose from. This is normally because the server is not sending
157 the clients certificate authority in its "acceptable CA list" when it
158 requests a certificate. By using L<openssl-s_client(1)> the CA list can be
[all …]
/openssl/test/ssl-tests/
H A D25-cipher.cnf7 test-2 = 2-cipher-server-client-list
10 test-5 = 5-cipher-server-pref-client-list
66 [2-cipher-server-client-list]
67 ssl_conf = 2-cipher-server-client-list-ssl
69 [2-cipher-server-client-list-ssl]
73 [2-cipher-server-client-list-server]
79 [2-cipher-server-client-list-client]
143 [5-cipher-server-pref-client-list]
146 [5-cipher-server-pref-client-list-ssl]
150 [5-cipher-server-pref-client-list-server]
[all …]
H A D09-alpn.cnf21 test-16 = 16-alpn-empty-client-list
22 test-17 = 17-alpn-empty-server-list
624 [16-alpn-empty-client-list]
625 ssl_conf = 16-alpn-empty-client-list-ssl
627 [16-alpn-empty-client-list-ssl]
631 [16-alpn-empty-client-list-server]
636 [16-alpn-empty-client-list-client]
654 [17-alpn-empty-server-list]
657 [17-alpn-empty-server-list-ssl]
661 [17-alpn-empty-server-list-server]
[all …]
/openssl/crypto/ts/
H A Dts_conf.c316 STACK_OF(CONF_VALUE) *list = NULL; in TS_CONF_set_policies()
324 for (i = 0; i < sk_CONF_VALUE_num(list); ++i) { in TS_CONF_set_policies()
340 sk_CONF_VALUE_pop_free(list, X509V3_conf_free); in TS_CONF_set_policies()
348 STACK_OF(CONF_VALUE) *list = NULL; in TS_CONF_set_digests()
355 if ((list = X509V3_parse_list(digests)) == NULL) { in TS_CONF_set_digests()
359 if (sk_CONF_VALUE_num(list) == 0) { in TS_CONF_set_digests()
363 for (i = 0; i < sk_CONF_VALUE_num(list); ++i) { in TS_CONF_set_digests()
378 sk_CONF_VALUE_pop_free(list, X509V3_conf_free); in TS_CONF_set_digests()
387 STACK_OF(CONF_VALUE) *list = NULL; in TS_CONF_set_accuracy()
394 for (i = 0; i < sk_CONF_VALUE_num(list); ++i) { in TS_CONF_set_accuracy()
[all …]
/openssl/crypto/property/
H A Dproperty_query.c24 ossl_property_find_property(const OSSL_PROPERTY_LIST *list, in ossl_property_find_property() argument
29 if (list == NULL || name == NULL in ossl_property_find_property()
33 return ossl_bsearch(&name_idx, list->properties, list->num_properties, in ossl_property_find_property()
34 sizeof(*list->properties), &property_idx_cmp, 0); in ossl_property_find_property()
/openssl/
H A DAUTHORS.md4 This is the list of OpenSSL authors for copyright purposes.
5 It does not necessarily list everyone who has contributed code,
7 To see the full list of contributors, see the revision history in
/openssl/crypto/hashtable/
H A Dhashtable.c380 HT_VALUE_LIST *list = OPENSSL_zalloc(sizeof(HT_VALUE_LIST) in ossl_ht_filter() local
385 if (list == NULL) in ossl_ht_filter()
392 list->list = (HT_VALUE **)(list + 1); in ossl_ht_filter()
400 list->list[list->list_len++] = (HT_VALUE *)v; in ossl_ht_filter()
401 if (list->list_len == max_len) in ossl_ht_filter()
407 return list; in ossl_ht_filter()
410 void ossl_ht_value_list_free(HT_VALUE_LIST *list) in ossl_ht_value_list_free() argument
412 OPENSSL_free(list); in ossl_ht_value_list_free()
/openssl/Configurations/
H A Dgentemplate.pm88 my @list = @{ $self->{info}->{depends}->{$thing} //
95 foreach my $item (@list) {
156 my @list = @_;
157 print STDERR "DEBUG[reducedepends]> ", join(' ', @list), "\n"
161 while (@list) {
162 my $item = shift @list;
164 if (grep { $extensionlessitem eq extensionlesslib($_) } @list) {
/openssl/.github/workflows/
H A Dcompiler-zoo.yml111 | sudo tee /etc/apt/sources.list.d/llvm.list
113 | sudo tee -a /etc/apt/sources.list.d/llvm.list
115 cat /etc/apt/sources.list.d/llvm.list

Completed in 40 milliseconds

1234567891011