/openssl/doc/man3/ |
H A D | BIO_parse_hostserv.pod | 7 - utility routines to parse a standard host and service string 30 host + ':' + service 31 host + ':' + '*' 32 host + ':' 35 host 38 The host part can be a name or an IP address. If it's a IPv6 47 host + ':' + service => *host = "host", *service = "service" 48 host + ':' + '*' => *host = "host", *service = NULL 49 host + ':' => *host = "host", *service = NULL 50 ':' + service => *host = NULL, *service = "service" [all …]
|
H A D | OSSL_HTTP_parse_url.pod | 45 Return the determined proxy host unless the exclusion value, 53 C<[scheme://][userinfo@]host[:port][/path][?query][#fragment]> and splits it up 54 into scheme, userinfo, host, port, path, query, and fragment components. 55 The host (or server) component may be a DNS name or an IP address 78 otherwise the first path element is interpreted as the host. 80 Calling the deprecated function OCSP_parse_url(url, host, port, path, ssl) 82 OSSL_HTTP_parse_url(url, ssl, NULL, host, port, NULL, path, NULL, NULL).
|
H A D | BIO_ADDRINFO.pod | 24 int BIO_lookup_ex(const char *host, const char *service, int lookup_type, 26 int BIO_lookup(const char *host, const char *service, 45 BIO_lookup_ex() looks up a specified B<host> and B<service>, and 47 be if B<host> is B<NULL>. B<family>, B<socktype> and B<protocol> are used to 57 parameter and expects the B<host> parameter to hold the path to the socket file.
|
/openssl/crypto/http/ |
H A D | http_lib.c | 60 const char *host, *host_end; in OSSL_parse_url() local 94 user = user_end = host = p; in OSSL_parse_url() 95 host = strchr(p, '@'); in OSSL_parse_url() 96 if (host != NULL) in OSSL_parse_url() 97 user_end = host++; in OSSL_parse_url() 99 host = p; in OSSL_parse_url() 102 if (host[0] == '[') { in OSSL_parse_url() 110 host_end = strchr(host, ':'); in OSSL_parse_url() 118 host_end = host + strlen(host); in OSSL_parse_url() 261 char host[NI_MAXHOST]; in use_proxy() local [all …]
|
H A D | http_client.c | 374 int add_host = host != NULL && *host != '\0'; in add1_headers() 385 if (add_host && !OSSL_HTTP_REQ_CTX_add1_header(rctx, "Host", host)) in add1_headers() 952 const char *host = server; in http_new_bio() local 960 host = proxy; in http_new_bio() 964 port = explict_or_default_port(host, port, use_ssl); in http_new_bio() 966 cbio = BIO_new_connect(host /* optionally includes ":port" */); in http_new_bio() 1220 char *host; in OSSL_HTTP_get() local 1242 rctx = OSSL_HTTP_open(host, port, proxy, no_proxy, in OSSL_HTTP_get() 1270 OPENSSL_free(host); in OSSL_HTTP_get() 1279 OPENSSL_free(host); in OSSL_HTTP_get() [all …]
|
/openssl/crypto/bio/ |
H A D | bio_addr.c | 245 host, sizeof(host), serv, sizeof(serv), in addr_strings() 271 *hostname = OPENSSL_strdup(host); in addr_strings() 558 if (h != NULL && host != NULL) { in BIO_parse_hostserv() 561 *host = NULL; in BIO_parse_hostserv() 563 *host = OPENSSL_strndup(h, hl); in BIO_parse_hostserv() 564 if (*host == NULL) in BIO_parse_hostserv() 642 int BIO_lookup(const char *host, const char *service, in BIO_lookup() argument 695 if (addrinfo_wrap(family, socktype, host, strlen(host), 0, res)) in BIO_lookup_ex() 718 if (host != NULL && family == AF_UNSPEC) in BIO_lookup_ex() 812 if (host == NULL) { in BIO_lookup_ex() [all …]
|
H A D | bio_sock.c | 252 int BIO_get_accept_socket(char *host, int bind_mode) in BIO_get_accept_socket() argument 258 if (!BIO_parse_hostserv(host, &h, &p, BIO_PARSE_PRIO_SERV)) in BIO_get_accept_socket() 305 char *host = BIO_ADDR_hostname_string(&res, 1); in BIO_accept() local 307 if (host != NULL && port != NULL) { in BIO_accept() 308 *ip_port = OPENSSL_zalloc(strlen(host) + strlen(port) + 2); in BIO_accept() 318 strcpy(*ip_port, host); in BIO_accept() 322 OPENSSL_free(host); in BIO_accept()
|
/openssl/test/ |
H A D | http_test.c | 255 char *user, *host, *port, *path, *query, *frag; in test_http_url_ok() local 261 res = TEST_true(OSSL_HTTP_parse_url(url, &ssl, &user, &host, &port, &num, in test_http_url_ok() 263 && TEST_str_eq(host, exp_host) in test_http_url_ok() 275 OPENSSL_free(host); in test_http_url_ok() 285 char *host, *path; in test_http_url_path_query_ok() local 288 res = TEST_true(OSSL_HTTP_parse_url(url, NULL, NULL, &host, NULL, NULL, in test_http_url_path_query_ok() 290 && TEST_str_eq(host, "host") in test_http_url_path_query_ok() 292 OPENSSL_free(host); in test_http_url_path_query_ok() 326 char *host = "1", *port = "1", *path = "1"; in test_http_url_invalid() local 332 && TEST_ptr_null(host) in test_http_url_invalid() [all …]
|
H A D | servername_test.c | 29 static const char *host = "dummy-host"; variable 120 SSL_set_tlsext_host_name(con, host); in client_setup_sni_before_state() 138 if (!TEST_str_eq(hostname, host)) in client_setup_sni_before_state() 183 SSL_set_tlsext_host_name(con, host); in client_setup_sni_after_state() 191 if (!TEST_str_eq(hostname, host)) in client_setup_sni_after_state() 217 SSL_set_tlsext_host_name(serverssl, host); in server_setup_sni()
|
H A D | v3nametest.c | 233 int host; member 299 } else if (fn->host) { in run_cert() 314 } else if (fn->host) { in run_cert()
|
/openssl/apps/ |
H A D | s_time.c | 35 static SSL *doConnection(SSL *scon, const char *host, SSL_CTX *ctx); 124 char *host = SSL_CONNECT_NAME, *certfile = NULL, *keyfile = NULL, *prog; in s_time_main() local 148 host = opt_arg(); in s_time_main() 279 if ((scon = doConnection(NULL, host, ctx)) == NULL) in s_time_main() 331 if ((scon = doConnection(NULL, host, ctx)) == NULL) { in s_time_main() 360 if ((doConnection(scon, host, ctx)) == NULL) in s_time_main() 413 static SSL *doConnection(SSL *scon, const char *host, SSL_CTX *ctx) in doConnection() argument 422 if (BIO_set_conn_hostname(conn, host) <= 0 in doConnection()
|
H A D | s_client.c | 117 static int is_dNS_name(const char *host); 1629 if (tmp_host != host) in s_client_main() 1660 thost = OPENSSL_strdup(host); in s_client_main() 1668 if (tmp_host != host) in s_client_main() 2117 if (host == NULL || is_dNS_name(host)) in s_client_main() 2118 servername = (host == NULL) ? "localhost" : host; in s_client_main() 3342 OPENSSL_free(host); in s_client_main() 3735 size_t length = strlen(host); in is_dNS_name() 3747 char c = host[i]; in is_dNS_name() 3774 && host[i + 1] != '.' in is_dNS_name() [all …]
|
H A D | s_server.c | 458 char *host, *path, *port; member 513 host = srctx->host; in get_ocsp_resp_from_responder() 581 OPENSSL_free(host); in get_ocsp_resp_from_responder() 1044 char *host = NULL; in s_server_main() local 1150 OPENSSL_free(host); host = NULL; in s_server_main() 1161 OPENSSL_free(host); host = NULL; in s_server_main() 1179 OPENSSL_free(host); host = NULL; in s_server_main() 1194 OPENSSL_free(host); host = NULL; in s_server_main() 1205 OPENSSL_free(host); host = OPENSSL_strdup(opt_arg()); in s_server_main() 2334 unlink(host); in s_server_main() [all …]
|
H A D | ocsp.c | 234 char *host = NULL, *port = NULL, *path = "/", *outfile = NULL; in ocsp_main() local 287 &host, &port, NULL /* port_num */, in ocsp_main() 292 thost = host; in ocsp_main() 297 host = opt_arg(); in ocsp_main() 673 || host != NULL || add_nonce || ridx_filename != NULL)) { in ocsp_main() 731 } else if (host != NULL) { in ocsp_main() 733 resp = process_responder(req, host, port, path, opt_proxy, opt_no_proxy, in ocsp_main() 1231 OCSP_RESPONSE *process_responder(OCSP_REQUEST *req, const char *host, in process_responder() argument 1249 app_http_post_asn1(host, port, path, proxy, no_proxy, in process_responder()
|
H A D | cmp.c | 775 static int truststore_set_host_etc(X509_STORE *ts, const char *host) in truststore_set_host_etc() argument 787 return (host != NULL && X509_VERIFY_PARAM_set1_ip_asc(ts_vpm, host)) in truststore_set_host_etc() 788 || X509_VERIFY_PARAM_set1_host(ts_vpm, host, 0); in truststore_set_host_etc() 1343 static SSL_CTX *setup_ssl_ctx(OSSL_CMP_CTX *ctx, const char *host, in setup_ssl_ctx() argument 2124 &host, &port, &portnum, in setup_client_ctx() 2139 if (!OSSL_CMP_CTX_set1_server(ctx, host) in setup_client_ctx() 2147 opt_tls_used ? "s" : "", host, port, in setup_client_ctx() 2249 info->ssl_ctx = setup_ssl_ctx(ctx, host, engine); in setup_client_ctx() 2250 info->server = host; in setup_client_ctx() 2251 host = NULL; /* prevent deallocation */ in setup_client_ctx() [all …]
|
/openssl/doc/man7/ |
H A D | EVP_KEYEXCH-DH.pod | 60 The examples assume a host and peer both generate keys using the same 62 Both the host and peer transfer their public key to each other. 65 to transfer to the host: 75 To convert the received peer's public key from DER format on the host: 82 To derive a shared secret on the host using the host's key and the peer's public 114 using the host's public key and the peer's generated key pair.
|
H A D | EVP_KEYEXCH-ECDH.pod | 74 Keys for the host and peer must be generated as shown in 80 To derive a shared secret on the host using the host's key and the peer's public
|
/openssl/test/recipes/ |
H A D | 80-test_cmp_http.t | 305 my ($host, $port); 311 ($host, $port, $pid) = ($1, $2, $3) 315 if ($server_host eq '*' && defined $host) { 316 $server_host = "[::1]" if $host eq "[::]"; 317 $server_host = "127.0.0.1" if $host eq "0.0.0.0";
|
/openssl/apps/lib/ |
H A D | s_socket.c | 75 int init_client(int *sock, const char *host, const char *port, in init_client() argument 91 ret = BIO_lookup_ex(host, port, BIO_LOOKUP_CLIENT, family, type, protocol, in init_client() 287 int do_server(int *accept_sock, const char *host, const char *port, in do_server() argument 307 if (!BIO_lookup_ex(host, port, BIO_LOOKUP_SERVER, family, type, protocol, in do_server() 458 unlink(host); in do_server()
|
/openssl/providers/implementations/kdfs/ |
H A D | kbkdf.c | 91 static uint32_t be32(uint32_t host) in be32() argument 97 return host; in be32() 99 big |= (host & 0xff000000) >> 24; in be32() 100 big |= (host & 0x00ff0000) >> 8; in be32() 101 big |= (host & 0x0000ff00) << 8; in be32() 102 big |= (host & 0x000000ff) << 24; in be32()
|
/openssl/doc/man1/ |
H A D | openssl-ocsp.pod.in | 32 [B<-host> I<host>:I<port>] 34 [B<-proxy> I<[http[s]://][userinfo@]host[:port][/path][?query][#fragment]>] 169 with B<-serial>, B<-cert> and B<-host> options). 173 Specify the responder host and optionally port and path via a URL. 177 For details, see the B<-host> and B<-path> options described next. 179 =item B<-host> I<host>:I<port>, B<-path> I<pathname> 181 If the B<-host> option is present then the OCSP request is sent to the host 182 I<host> on port I<port>. 183 The I<host> may be a domain name or an IP (v4 or v6) address, 189 http:// and the given I<host>, I<port>, and optional I<pathname>. [all …]
|
H A D | openssl-s_client.pod.in | 13 [B<-connect> I<host>:I<port>] 14 [B<-host> I<hostname>] 16 [B<-bind> I<host>:I<port>] 17 [B<-proxy> I<host>:I<port>] 140 [I<host>:I<port>] 165 =item B<-connect> I<host>:I<port> 170 is made to connect to the local host on port 4433. 173 =item B<-host> I<hostname> 181 =item B<-bind> I<host>:I<port> 188 =item B<-proxy> I<host>:I<port> [all …]
|
H A D | openssl-s_time.pod.in | 12 [B<-connect> I<host>:I<port>] 36 connects to a remote host using SSL/TLS. It can request a page from the server 50 =item B<-connect> I<host>:I<port> 52 This specifies the host and optional port to connect to. 53 If the host string is an IPv6 address, it must be enclosed in C<[> and C<]>.
|
/openssl/apps/include/ |
H A D | s_apps.h | 24 int do_server(int *accept_sock, const char *host, const char *port, 37 int init_client(int *sock, const char *host, const char *port,
|
/openssl/Configurations/ |
H A D | 15-android.conf | 108 my $host=$1; 116 . "/$tritools-4.9/prebuilt/$host";
|