/openssl/crypto/bn/ |
H A D | bn_lib.c | 550 int xor = 0, carry = 0, ext = 0; in bn2binpad() local 573 ext = (n * 8 == n8) in bn2binpad() 579 tolen = n + ext; in bn2binpad() 580 } else if (tolen < n + ext) { /* uncommon/unlike case */ in bn2binpad() 586 if (tolen < n + ext) in bn2binpad()
|
/openssl/crypto/ct/ |
H A D | ct_prn.c | 106 BIO_hex_string(out, indent + 16, 16, sct->ext, sct->ext_len); in SCT_print()
|
H A D | ct_vfy.c | 90 if (sct->ext_len && !EVP_DigestUpdate(ctx, sct->ext, sct->ext_len)) in sct_ctx_update()
|
H A D | ct_local.h | 71 unsigned char *ext; member
|
/openssl/test/helpers/ |
H A D | quictestlib.h | 206 unsigned int exttype, unsigned char *ext,
|
/openssl/crypto/crmf/ |
H A D | crmf_lib.c | 335 X509_EXTENSION *ext) in OSSL_CRMF_MSG_push0_extension() argument 340 if (tmpl == NULL || ext == NULL) { /* also crm == NULL implies this */ in OSSL_CRMF_MSG_push0_extension() 351 if (!sk_X509_EXTENSION_push(tmpl->extensions, ext)) in OSSL_CRMF_MSG_push0_extension()
|
/openssl/crypto/x509/ |
H A D | v3_san.c | 341 X509_EXTENSION *ext; in copy_issuer() local 353 if ((ext = X509_get_ext(ctx->issuer_cert, i)) == NULL in copy_issuer() 354 || (ialt = X509V3_EXT_d2i(ext)) == NULL) { in copy_issuer()
|
H A D | v3_pci.c | 52 static int i2r_pci(X509V3_EXT_METHOD *method, PROXY_CERT_INFO_EXTENSION *ext,
|
H A D | v3_purp.c | 917 X509_EXTENSION *ext = X509_get_ext((X509 *)x, i_ext); in check_purpose_code_sign() local 918 if (!X509_EXTENSION_get_critical(ext)) in check_purpose_code_sign()
|
/openssl/ssl/statem/ |
H A D | statem.c | 225 if (s->ext.early_data != SSL_EARLY_DATA_REJECTED) in ossl_statem_skip_early_data() 1032 return s->ext.early_data == SSL_EARLY_DATA_ACCEPTED in ossl_statem_export_early_allowed() 1033 || (!s->server && s->ext.early_data != SSL_EARLY_DATA_NOT_SENT); in ossl_statem_export_early_allowed()
|
H A D | statem_lib.c | 150 memset(s->ext.extflags, 0, sizeof(s->ext.extflags)); in tls_setup_handshake() 1457 s->ext.ticket_expected = 0; in tls_finish_handshake() 1913 if (sctx->ext.servername_cb != NULL in is_tls13_capable() 1914 || s->session_ctx->ext.servername_cb != NULL) in is_tls13_capable()
|
/openssl/ssl/ |
H A D | ssl_local.h | 303 IS_MAX_FRAGMENT_LENGTH_EXT_VALID(session->ext.max_fragment_len_mode) 305 (512U << (session->ext.max_fragment_len_mode - 1)) 552 } ext; member 1068 } ext; member 1669 } ext; member 2418 return ((sc->server && sc->ext.server_cert_type == TLSEXT_cert_type_rpk) in tls12_rpk_and_privkey() 2419 || (!sc->server && sc->ext.client_cert_type == TLSEXT_cert_type_rpk)) in tls12_rpk_and_privkey() 2461 *pgroups = s->ext.peer_supportedgroups; in tls1_get_peer_groups() 2462 *pgroupslen = s->ext.peer_supportedgroups_len; in tls1_get_peer_groups()
|
H A D | tls13_enc.c | 510 && s->session->ext.max_early_data == 0) { in tls13_change_cipher_state() 518 s->psksession->ext.max_early_data)) { in tls13_change_cipher_state() 890 && s->session->ext.max_early_data == 0) in tls13_export_keying_material_early()
|
/openssl/crypto/cmp/ |
H A D | cmp_msg.c | 134 X509_EXTENSION *ext; in add1_extension() local 140 if ((ext = X509V3_EXT_i2d(nid, crit, ex)) == NULL) in add1_extension() 143 res = X509v3_add_ext(pexts, ext, 0) != NULL; in add1_extension() 144 X509_EXTENSION_free(ext); in add1_extension()
|
/openssl/crypto/ts/ |
H A D | ts_rsp_sign.c | 83 static int def_extension_cb(struct TS_resp_ctx *ctx, X509_EXTENSION *ext, in def_extension_cb() argument 613 X509_EXTENSION *ext = sk_X509_EXTENSION_value(exts, i); in ts_RESP_process_extensions() local 620 ok = (*ctx->extension_cb) (ctx, ext, NULL); in ts_RESP_process_extensions()
|
/openssl/doc/man3/ |
H A D | X509V3_get_d2i.pod | 22 void *X509V3_EXT_d2i(X509_EXTENSION *ext); 63 I<ext> and returns a pointer to an extension specific structure or NULL
|
/openssl/include/openssl/ |
H A D | crmf.h.in | 148 int OSSL_CRMF_MSG_push0_extension(OSSL_CRMF_MSG *crm, X509_EXTENSION *ext);
|
/openssl/doc/man1/ |
H A D | openssl-x509.pod.in | 45 [B<-ext> I<extensions>] 163 The B<-ext> option can be used to further restrict which extensions to copy. 310 =item B<-ext> I<extensions> 736 openssl x509 -in cert.pem -noout -ext subjectAltName 740 openssl x509 -in cert.pem -noout -ext subjectAltName,nsCertType
|
H A D | openssl-req.pod.in | 47 [B<-addext> I<ext>] 389 =item B<-addext> I<ext>
|
/openssl/crypto/chacha/asm/ |
H A D | chacha-armv8.pl | 873 "&ext ('$c','$c','$c',8)", 874 "&ext ('$d','$d','$d',$odd?4:12)", 875 "&ext ('$b','$b','$b',$odd?12:4)"
|
/openssl/test/certs/ |
H A D | setup.sh | 465 ./mkcert.sh geneeextra server.example ee-key ee-cert-noncrit-unknown-ext ca-key ca-cert "1.2.3.4=DE… 468 ./mkcert.sh geneeextra server.example ee-key ee-cert-crit-unknown-ext ca-key ca-cert "1.2.3.4=criti…
|
/openssl/crypto/err/ |
H A D | openssl.txt | 1394 custom ext handler already installed 1429 SSL_R_EXT_LENGTH_MISMATCH:163:ext length mismatch 1557 SSL_R_RENEGOTIATE_EXT_TOO_LONG:335:renegotiate ext too long 1580 ssl3 ext invalid max fragment length 1581 SSL_R_SSL3_EXT_INVALID_SERVERNAME:319:ssl3 ext invalid servername 1582 SSL_R_SSL3_EXT_INVALID_SERVERNAME_TYPE:320:ssl3 ext invalid servername type
|
/openssl/doc/designs/quic-design/ |
H A D | quic-fault-injector.md | 339 * the type of the extension to be deleted. |ext| points to the extension block. 344 unsigned int exttype, unsigned char *ext,
|
/openssl/crypto/objects/ |
H A D | objects.txt | 238 !Cname ext-req 439 !Cname ms-ext-req 456 ms-corp 25 2 : ms-ntds-sec-ext : Microsoft NTDS CA Extension 883 !Cname ext-key-usage 945 ext-key-usage 0 : anyExtendedKeyUsage : Any Extended Key Usage
|
/openssl/apps/lib/ |
H A D | apps.c | 1254 X509_EXTENSION *ext = sk_X509_EXTENSION_value(exts, i); in copy_extensions() local 1255 ASN1_OBJECT *obj = X509_EXTENSION_get_object(ext); in copy_extensions() 1269 if (!X509_add_ext(x, ext, -1)) in copy_extensions()
|