/openssl/apps/lib/ |
H A D | tlssrp_depr.c | 163 if (p->login == NULL && p->user == NULL) { in ssl_srp_server_param_cb() 169 if (p->user == NULL) { in ssl_srp_server_param_cb() 175 (s, p->user->N, p->user->g, p->user->s, p->user->v, in ssl_srp_server_param_cb() 176 p->user->info) < 0) { in ssl_srp_server_param_cb() 182 p->login, p->user->info); in ssl_srp_server_param_cb() 186 SRP_user_pwd_free(p->user); in ssl_srp_server_param_cb() 187 p->user = NULL; in ssl_srp_server_param_cb() 198 srp_callback_parm->user = NULL; in set_up_srp_verifier_file() 222 SRP_user_pwd_free(srp_callback_parm->user); in lookup_srp_user() 226 if (srp_callback_parm->user != NULL) in lookup_srp_user() [all …]
|
/openssl/apps/ |
H A D | srp.c | 132 cb_tmp.prompt_info = user; in srp_verify_user() 168 cb_tmp.prompt_info = user; in srp_create_user() 176 user, g, N); in srp_create_user() 330 user = *argv++; in srp_main() 427 if (user == NULL) { in srp_main() 461 user); in srp_main() 491 user); in srp_main() 501 user); in srp_main() 569 user); in srp_main() 579 user = *argv++; in srp_main() [all …]
|
/openssl/Configurations/ |
H A D | 15-android.conf | 117 $user{CC} = "clang" if ($user{CC} !~ m|clang|); 119 $user{CC} = "$tridefault$api-clang"; 121 $user{CROSS_COMPILE} = undef; 123 $user{AR} = "llvm-ar"; 124 $user{ARFLAGS} = [ "rs" ]; 125 $user{RANLIB} = ":"; 128 my $cc = $user{CC} // "clang"; 137 $user{CC} = $cc; 138 $user{CROSS_COMPILE} = "$triarch-"; 139 } elsif ($user{CC} eq "clang") { [all …]
|
/openssl/crypto/x509/ |
H A D | v3_sxnet.c | 45 ASN1_SIMPLE(SXNETID, user, ASN1_OCTET_STRING) 85 ASN1_STRING_print(out, id->user); 120 int SXNET_add_id_asc(SXNET **psx, const char *zone, const char *user, int userlen) in SXNET_add_id_asc() argument 128 if (!SXNET_add_id_INTEGER(psx, izone, user, userlen)) { in SXNET_add_id_asc() 137 int SXNET_add_id_ulong(SXNET **psx, unsigned long lzone, const char *user, in SXNET_add_id_ulong() argument 148 if (!SXNET_add_id_INTEGER(psx, izone, user, userlen)) { in SXNET_add_id_ulong() 160 int SXNET_add_id_INTEGER(SXNET **psx, ASN1_INTEGER *zone, const char *user, in SXNET_add_id_INTEGER() argument 166 if (psx == NULL || zone == NULL || user == NULL) { in SXNET_add_id_INTEGER() 171 userlen = strlen(user); in SXNET_add_id_INTEGER() 199 if (!ASN1_OCTET_STRING_set(id->user, (const unsigned char *)user, userlen)){ in SXNET_add_id_INTEGER() [all …]
|
/openssl/test/ssl-tests/ |
H A D | 23-srp.cnf.in | 23 "SRPUser" => "user", 31 "SRPUser" => "user", 45 "SRPUser" => "user", 53 "SRPUser" => "user", 68 "SRPUser" => "user", 76 "SRPUser" => "user", 90 "SRPUser" => "user", 98 "SRPUser" => "user",
|
H A D | 23-srp.cnf | 37 SRPUser = user 41 SRPUser = user 72 SRPUser = user 76 SRPUser = user 107 SRPUser = user 111 SRPUser = user 142 SRPUser = user 146 SRPUser = user
|
/openssl/crypto/srp/ |
H A D | srp_vfy.c | 519 SRP_user_pwd *user; in find_user() local 526 if (strcmp(user->id, username) == 0) in find_user() 527 return user; in find_user() 559 SRP_user_pwd *user; in SRP_VBASE_get1_by_user() local 569 return srp_user_pwd_dup(user); in SRP_VBASE_get1_by_user() 577 if ((user = SRP_user_pwd_new()) == NULL) in SRP_VBASE_get1_by_user() 601 if (SRP_user_pwd_set0_sv(user, in SRP_VBASE_get1_by_user() 604 return user; in SRP_VBASE_get1_by_user() 609 SRP_user_pwd_free(user); in SRP_VBASE_get1_by_user() 629 if ((user == NULL) || in SRP_create_verifier_ex() [all …]
|
H A D | srp_lib.c | 144 BIGNUM *SRP_Calc_x_ex(const BIGNUM *s, const char *user, const char *pass, in SRP_Calc_x_ex() argument 153 if ((s == NULL) || (user == NULL) || (pass == NULL)) in SRP_Calc_x_ex() 167 || !EVP_DigestUpdate(ctxt, user, strlen(user)) in SRP_Calc_x_ex() 191 BIGNUM *SRP_Calc_x(const BIGNUM *s, const char *user, const char *pass) in SRP_Calc_x() argument 193 return SRP_Calc_x_ex(s, user, pass, NULL, NULL); in SRP_Calc_x()
|
/openssl/doc/man1/ |
H A D | openssl-srp.pod.in | 26 [I<user> ...] 35 For B<-list>, if no I<user> is given then all users are displayed. 54 Add a user and SRP verifier. 58 Modify the SRP verifier of an existing user. 62 Delete user from verifier file. 85 adding or modifying a user.
|
/openssl/include/openssl/ |
H A D | srp.h.in | 85 /* to simulate a user */ 119 char *SRP_create_verifier_ex(const char *user, const char *pass, char **salt, 123 char *SRP_create_verifier(const char *user, const char *pass, char **salt, 126 int SRP_create_verifier_BN_ex(const char *user, const char *pass, BIGNUM **salt, 131 int SRP_create_verifier_BN(const char *user, const char *pass, BIGNUM **salt, 183 BIGNUM *SRP_Calc_x_ex(const BIGNUM *s, const char *user, const char *pass, 186 BIGNUM *SRP_Calc_x(const BIGNUM *s, const char *user, const char *pass); 203 /* This method ignores the configured seed and fails for an unknown user. */
|
H A D | ui.h.in | 67 to the collection of strings in the user interface. 89 be safe to ignore if the expected user action is obvious, for example with 127 * the application, it might for example be in the user data set with 155 * If the ui_method doesn't contain a pointer to a user-defined prompt 169 * The following function is used to store a pointer to user-specific data. 176 * Note that the UI_OpenSSL() method completely ignores the user data. Other 181 * Alternatively, this function is used to duplicate the user data. 183 * be used to free the user data in this case. 186 /* We need a user data retrieving function as well. */ 307 UIT_INFO, /* Send info to the user */ [all …]
|
/openssl/doc/man3/ |
H A D | OSSL_INDICATOR_set_callback.pod | 22 OSSL_INDICATOR_set_callback() sets a user callback I<cb> associated with a 25 The user's callback may be triggered multiple times during an algorithm operation 28 Non approved operations may only occur if the user has deliberately chosen to do 32 The user's callback B<OSSL_INDICATOR_CALLBACK> I<type> and I<desc> 36 If the user callback returns 0, an error will occur in the caller. This can be
|
H A D | ASYNC_WAIT_CTX_new.pod | 100 by an engine immediately prior to calling ASYNC_pause_job() and not by end user 116 ASYNC_pause_job() to return control to the user code. The user code can then 118 similar function on the wait file descriptor. The engine can signal to the user 126 engine. This additional method can be used when the user thinks that a file 131 callback will be called to notify user code when an engine completes a 153 The engine has a fatal problem with this request. The user code should clean up 163 full, so user code should resume the job. 168 If the status is any value other than B<ASYNC_STATUS_OK> then the user code 175 code would call ASYNC_pause_job() to return control to the user code. After 176 that, user code can perform other tasks. When the hardware completes the [all …]
|
H A D | SRP_user_pwd_new.pod | 10 - Functions to create a record of SRP user verifier information 32 The SRP_user_pwd_new() function allocates a structure to store a user verifier 39 user info to B<info> for B<user_pwd>. 43 The SRP_user_pwd_set0_sv() function sets the user salt to B<s> and the verifier
|
H A D | OSSL_CALLBACK.pod | 20 user input or direct (possibly optional) user output could be implemented 41 user for a passphrase. When calling this callback function, a buffer to
|
H A D | SRP_VBASE_new.pod | 11 - Functions to create and manage a stack of SRP user verifier information 60 The SRP_VBASE_get1_by_user() function returns the password info for the user 63 If no matching user is found but a seed_key and default gN parameters have been 69 If no matching user is found and the seed_key is not set, NULL is returned.
|
H A D | SRP_create_verifier.pod | 21 int SRP_create_verifier_BN_ex(const char *user, const char *pass, BIGNUM **salt, 25 char *SRP_create_verifier_BN(const char *user, const char *pass, BIGNUM **salt, 27 char *SRP_create_verifier_ex(const char *user, const char *pass, char **salt, 30 char *SRP_create_verifier(const char *user, const char *pass, char **salt,
|
H A D | UI_new.pod | 13 UI_get_method, UI_set_method, UI_OpenSSL, UI_null - user interface 71 prompt the user for text-based information. Through user-written methods 83 user-defined random data can be passed down to the underlying method 121 and to verify a password (i.e. having the user enter it twice and check 162 UI_add_user_data() adds a user data pointer for the method to use at any 167 UI_dup_user_data() duplicates the user data and works as an alternative 168 to UI_add_user_data() when the user data needs to be preserved for a longer
|
H A D | SSL_CTX_set_srp_password.pod | 41 int SSL_set_srp_server_param_pw(SSL *s, const char *user, const char *pass, 117 user salt, B<v> the password verifier and B<info> is the optional user info. 121 B<user> is the username, B<pass> the password and B<grp> the SRP group parameters 133 The SSL_get_srp_userinfo() function returns the SRP user info for B<s>, or from
|
/openssl/ |
H A D | Configure | 742 my %user = ( 839 if (exists $user{$1}) 841 $user{$1} = ref $user{$1} eq "ARRAY" ? [] : undef; 1225 foreach (keys %user) { 1240 } elsif (!defined $user{$_}) { 1241 $user{$_} = $value; 1246 if (grep { /-rpath\b/ } ($user{LDFLAGS} ? @{$user{LDFLAGS}} : ()) 1390 my $cc = $user{CC} // 'cc'; 1447 foreach (keys %user) { 1448 my $ref_type = ref $user{$_}; [all …]
|
/openssl/test/ |
H A D | http_test.c | 255 char *user, *host, *port, *path, *query, *frag; in test_http_url_ok() local 261 res = TEST_true(OSSL_HTTP_parse_url(url, &ssl, &user, &host, &port, &num, in test_http_url_ok() 268 if (res && *user != '\0') in test_http_url_ok() 269 res = TEST_str_eq(user, "user:pass"); in test_http_url_ok() 274 OPENSSL_free(user); in test_http_url_ok()
|
/openssl/doc/internal/man3/ |
H A D | OSSL_DEPRECATED.pod | 20 for compilers that support user specified deprecation messages. 25 compilers that support user specified deprecation messages.
|
/openssl/crypto/http/ |
H A D | http_lib.c | 59 const char *user, *user_end; in OSSL_parse_url() local 94 user = user_end = host = p; in OSSL_parse_url() 167 || !copy_substring(puser, user, user_end) in OSSL_parse_url()
|
/openssl/crypto/ |
H A D | README-sparse_array.md | 8 tree contains a block of pointers to either the user supplied leaf values or 49 except for the single pointer to the user's data (N = SA_BLOCK_MAX for 76 user's new data:
|
/openssl/test/recipes/90-test_sslapi_data/ |
H A D | passwd.txt | 1 …yurNlumMXTduHImB1ZMkZ1af5dggKaQG4bJe9WbF6KYxmeRwV 1oFJIzMwXA0RFKXCGcSV0nAToL5 test 8192 A test user
|