/openssl/test/ssl-tests/ |
H A D | 26-tls13_client_auth.cnf | 6 test-1 = 1-client-auth-TLSv1.3-request 11 test-6 = 6-client-auth-TLSv1.3-request-post-handshake 48 [1-client-auth-TLSv1.3-request] 49 ssl_conf = 1-client-auth-TLSv1.3-request-ssl 51 [1-client-auth-TLSv1.3-request-ssl] 52 server = 1-client-auth-TLSv1.3-request-server 53 client = 1-client-auth-TLSv1.3-request-client 55 [1-client-auth-TLSv1.3-request-server] 63 [1-client-auth-TLSv1.3-request-client] 210 [6-client-auth-TLSv1.3-request-post-handshake] [all …]
|
H A D | 04-client_auth.cnf | 6 test-1 = 1-client-auth-flex-request 14 test-9 = 9-client-auth-TLSv1-request 70 [1-client-auth-flex-request] 73 [1-client-auth-flex-request-ssl] 77 [1-client-auth-flex-request-server] 83 [1-client-auth-flex-request-client] 294 [9-client-auth-TLSv1-request] 297 [9-client-auth-TLSv1-request-ssl] 477 [15-client-auth-TLSv1.1-request] 660 [21-client-auth-TLSv1.2-request] [all …]
|
H A D | 26-tls13_client_auth.cnf.in | 36 name => "client-auth-TLSv1.3-request", 133 name => "client-auth-TLSv1.3-request-post-handshake", 243 name => "client-auth-TLSv1.3-request-force-client-post-handshake", 262 name => "client-auth-TLSv1.3-request-force-server-post-handshake", 281 name => "client-auth-TLSv1.3-request-force-both-post-handshake",
|
/openssl/doc/man3/ |
H A D | OSSL_HTTP_REQ_CTX.pod | 60 used to collect all the necessary data to perform that request. 74 which collects the HTTP request header lines. 76 OSSL_HTTP_REQ_CTX_free() frees up the HTTP request context I<rctx>. 85 I<path> provides the HTTP request path; if left NULL, C</> is used. 132 OSSL_HTTP_REQ_CTX_set1_req() finalizes the HTTP request context. 135 and an ASN.1-encoded request should be sent. 197 I/O error when trying to send the next request via I<rctx>. 209 request URL do not match. 213 First, the HTTP request context must be allocated: 216 Then, the HTTP request must be prepared with request data: [all …]
|
H A D | CMS_get1_ReceiptRequest.pod | 7 - CMS signed receipt request functions 29 CMS_ReceiptRequest_create0_ex() creates a signed receipt request 42 The CMS_add1_ReceiptRequest() function adds a signed receipt request B<rr> 45 int CMS_get1_ReceiptRequest() looks for a signed receipt request in B<si>, if 48 CMS_ReceiptRequest_get0_values() retrieves the values of a receipt request. 65 a signed receipt request structure or NULL if an error occurred. 69 CMS_get1_ReceiptRequest() returns 1 is a signed receipt request is found and 70 decoded. It returns 0 if a signed receipt request is not present and -1 if
|
H A D | OSSL_CMP_exec_certreq.pod | 66 Timeout values may be given per request-response pair and per transaction. 82 For IR, CR, and KUR, the certificate template to be used in the request 89 until the server side can fully process and ultimately answer the request. 97 it continues polling for the pending request 98 unless the I<req_type> argument is < 0, which aborts the request. 129 until the server can fully process and ultimately answer the request. 135 until the server can fully process and ultimately answer the request. 150 OSSL_CMP_get1_rootCaKeyUpdate() uses a genm request message 175 OSSL_CMP_get1_certReqTemplate() uses a genm request message with 179 request template was provided by the server. [all …]
|
H A D | OCSP_REQUEST_new.pod | 7 OCSP_request_onereq_get0 - OCSP request functions 31 OCSP_REQUEST_free() frees up the request structure B<req>. 36 extensions to the request. The B<id> parameter B<MUST NOT> be freed up after 39 OCSP_request_sign() signs OCSP request B<req> using certificate 42 will be included in the request. 44 OCSP_request_add1_cert() adds certificate B<cert> to request B<req>. The 73 An OCSP request structure contains one or more B<OCSP_ONEREQ> structures
|
H A D | OCSP_sendreq_new.pod | 39 These functions perform an OCSP POST request / response transfer over HTTP, 40 using the HTTP request functions described in L<OSSL_HTTP_REQ_CTX(3)>. 44 optionally the OCSP request I<req>, and a response header maximum line length 54 OCSP_sendreq_nbio() attempts to send the request prepared in I<rctx> 71 OSSL_HTTP_REQ_CTX_set1_req(rctx, "application/ocsp-request", it, req) 75 OSSL_HTTP_REQ_CTX_set1_req(rctx, "application/ocsp-request",
|
H A D | OCSP_request_add1_nonce.pod | 19 OCSP request B<req>. If B<val> is B<NULL> a random nonce is used. If B<len> 41 are present and unequal 0 is returned. If the nonce is present in the request 46 For most purposes the nonce value in a request is set to a random value so 49 An OCSP nonce is typically added to an OCSP request to thwart replay attacks 61 additionally covers the case where the nonce is present in the request only:
|
H A D | SSL_key_update.pod | 30 updated and the peer will be informed of the change along with a request for the 63 SSL_renegotiate_abbreviated() behave identically. They both schedule a request 66 appropriate, the request is sent. The client may or may not respond with a new 71 If an OpenSSL client receives a renegotiation request from a server then again 78 renegotiation request has been scheduled but not yet acted on, or 0 otherwise. 105 SSL_renegotiate_pending() returns 1 if a renegotiation or renegotiation request
|
H A D | X509_get_pubkey.pod | 7 X509_REQ_get_X509_PUBKEY - get or set certificate or certificate request 41 X509_REQ_get_X509_PUBKEY() are similar but operate on certificate request B<req>. 46 cached in the certificate or certificate request itself. Subsequent calls
|
H A D | SSL_CTX_set_num_tickets.pod | 36 client following a request by the server using 46 SSL_new_session_ticket() is used by a server application to request that a new 56 request additional tickets be sent; all such requests are queued and written 59 SSL_new_session_ticket() indicates only that the request to send a ticket was
|
/openssl/.github/ISSUE_TEMPLATE/ |
H A D | feature_request.md | 2 name: Feature request 3 labels: 'issue: feature request' 9 Thank you for your feature request. If this is your first one,
|
/openssl/doc/man1/ |
H A D | openssl-ocsp.pod.in | 113 Add the certificate I<filename> to the request. 122 Don't include any certificates in signed request. 127 B<num> is added to the request. The serial number is interpreted as a 139 the OCSP request is not signed. 143 Additional certificates to include in the signed request. 149 Normally if an OCSP request is input using the B<-reqin> option no 218 the complete request is received. 396 running instead of terminating upon receiving a malformed request. 484 Create an OCSP request and write it to a file: 504 As above but exit after processing one request: [all …]
|
H A D | openssl-ts.pod.in | 22 [B<-in> I<request.tsq>] 23 [B<-out> I<request.tsq>] 32 [B<-queryfile> I<request.tsq>] 50 [B<-queryfile> I<request.tsq>] 93 creating a timestamp request based on a data file, 126 request with the following options: 175 =item B<-in> I<request.tsq> 182 =item B<-out> I<request.tsq> 221 =item B<-queryfile> I<request.tsq> 324 =item B<-queryfile> I<request.tsq> [all …]
|
H A D | openssl-req.pod.in | 91 This specifies the input filename to read a request from. 93 A request is only read if the creation options 132 Prints out the certificate request in text form. 136 Prints out the certificate request subject 214 certificate request. 248 This specifies the message digest to sign the request. 270 when processing a certificate request. 275 in the request. 392 or certificate request. The argument must have the form of 651 Examine and verify certificate request: [all …]
|
H A D | tsget.pod | 22 [I<request> ...] 26 This command can be used for sending a timestamp request, as specified 33 This command sends the following HTTP request for each timestamp request: 43 ...binary request specified by the user... 64 This option can be specified only when just one request is sent to the 72 The name of the currently processed request is printed on standard 122 =item I<request> ... 125 requests are specified only one request will be sent to the server and it will 155 Create a timestamp request, write it to F<file3.tsq>, send it to the server and
|
H A D | CA.pl.pod | 67 F<newkey.pem> and the request written to the file F<newreq.pem>. 72 Creates a new certificate request. The private key is written to the file 73 F<newkey.pem> and the request written to the file F<newreq.pem>. 109 Calls the L<openssl-ca(1)> command to sign a certificate request. It expects the 110 request to be in the file F<newreq.pem>. The new certificate is written to the 117 configuration file section B<v3_ca> and so makes the signed request a 163 Complete certificate creation example: create a CA, create a request, sign 164 the request and finally create a PKCS#12 file containing it.
|
/openssl/test/ |
H A D | cmp_server_test.c | 23 static OSSL_CMP_MSG *request = NULL; variable 116 fixture->req = request; in test_handle_request() 124 OSSL_CMP_MSG_free(request); in cleanup_tests() 152 if (!TEST_ptr(request = load_pkimsg(request_f, libctx))) { in OPT_TEST_DECLARE_USAGE()
|
/openssl/doc/HOWTO/ |
H A D | certificates.txt | 29 keys, so before you create a certificate or a certificate request, you 42 3. Creating a certificate request 44 To create a certificate, you need to start with a certificate request 46 signing request", since that's exactly what they do, they sign it and 48 policies). A certificate request is sent to a certificate authority 53 The certificate request is created like this: 61 certificate request in the right format and you will have to use one 78 request, but creates a certificate instead of a certificate request.
|
/openssl/test/smime-certs/ |
H A D | ca.cnf | 25 # req_extensions = v3_req # The extensions to add to a certificate request 36 # These extensions are added when 'ca' signs a request for a normal end-entity 55 # These extensions are added when 'ca' signs a request for an end-entity 63 # These extensions are added when 'ca' signs a request for a code-signing
|
/openssl/crypto/bio/ |
H A D | bss_bio.c | 69 size_t request; /* valid iff peer != NULL; 0 if len != 0, member 127 peer_b->request = 0; /* will be set in "retry_read" situation */ in bio_read() 138 peer_b->request = size; in bio_read() 143 peer_b->request = peer_b->size; in bio_read() 217 peer_b->request = 0; in bio_nread0() 284 b->request = 0; in bio_write() 361 b->request = 0; in bio_nwrite0() 486 ret = (long)b->request; in bio_ctrl() 495 b->request = 0; in bio_ctrl() 639 b1->request = 0; in bio_make_pair() [all …]
|
/openssl/crypto/ts/ |
H A D | ts_rsp_sign.c | 351 return ctx->request; in TS_RESP_CTX_get_request() 423 ctx->request = NULL; in ts_RESP_CTX_init() 431 TS_REQ_free(ctx->request); in ts_RESP_CTX_cleanup() 432 ctx->request = NULL; in ts_RESP_CTX_cleanup() 442 TS_REQ *request = ctx->request; in ts_RESP_check_request() local 450 if (TS_REQ_get_version(request) != 1) { in ts_RESP_check_request() 457 msg_imprint = request->msg_imprint; in ts_RESP_check_request() 498 ASN1_OBJECT *requested = ctx->request->policy_id; in ts_RESP_get_policy() 571 if ((nonce = ctx->request->nonce) != NULL in ts_RESP_create_tst_info() 608 STACK_OF(X509_EXTENSION) *exts = ctx->request->extensions; in ts_RESP_process_extensions() [all …]
|
/openssl/demos/certs/apps/ |
H A D | apps.cnf | 24 # req_extensions = v3_req # The extensions to add to a certificate request 36 # These extensions are added when 'ca' signs a request for an end entity 44 # These extensions are added when 'ca' signs a request for an end entity
|
/openssl/demos/certs/ |
H A D | ca.cnf | 24 # req_extensions = v3_req # The extensions to add to a certificate request 35 # These extensions are added when 'ca' signs a request for an end entity 57 # These extensions are added when 'ca' signs a request for an end entity
|