Home
last modified time | relevance | path

Searched refs:host (Results 1 – 25 of 69) sorted by relevance

123

/openssl/doc/man3/
H A DBIO_parse_hostserv.pod7 - utility routines to parse a standard host and service string
30 host + ':' + service
31 host + ':' + '*'
32 host + ':'
35 host
38 The host part can be a name or an IP address. If it's a IPv6
47 host + ':' + service => *host = "host", *service = "service"
48 host + ':' + '*' => *host = "host", *service = NULL
49 host + ':' => *host = "host", *service = NULL
50 ':' + service => *host = NULL, *service = "service"
[all …]
H A DOSSL_HTTP_parse_url.pod45 Return the determined proxy host unless the exclusion value,
53 C<[scheme://][userinfo@]host[:port][/path][?query][#fragment]> and splits it up
54 into scheme, userinfo, host, port, path, query, and fragment components.
55 The host (or server) component may be a DNS name or an IP address
78 otherwise the first path element is interpreted as the host.
80 Calling the deprecated function OCSP_parse_url(url, host, port, path, ssl)
82 OSSL_HTTP_parse_url(url, ssl, NULL, host, port, NULL, path, NULL, NULL).
H A DBIO_ADDRINFO.pod24 int BIO_lookup_ex(const char *host, const char *service, int lookup_type,
26 int BIO_lookup(const char *host, const char *service,
45 BIO_lookup_ex() looks up a specified B<host> and B<service>, and
47 be if B<host> is B<NULL>. B<family>, B<socktype> and B<protocol> are used to
57 parameter and expects the B<host> parameter to hold the path to the socket file.
/openssl/crypto/http/
H A Dhttp_lib.c60 const char *host, *host_end; in OSSL_parse_url() local
94 user = user_end = host = p; in OSSL_parse_url()
95 host = strchr(p, '@'); in OSSL_parse_url()
96 if (host != NULL) in OSSL_parse_url()
97 user_end = host++; in OSSL_parse_url()
99 host = p; in OSSL_parse_url()
102 if (host[0] == '[') { in OSSL_parse_url()
110 host_end = strchr(host, ':'); in OSSL_parse_url()
118 host_end = host + strlen(host); in OSSL_parse_url()
261 char host[NI_MAXHOST]; in use_proxy() local
[all …]
H A Dhttp_client.c374 int add_host = host != NULL && *host != '\0'; in add1_headers()
385 if (add_host && !OSSL_HTTP_REQ_CTX_add1_header(rctx, "Host", host)) in add1_headers()
952 const char *host = server; in http_new_bio() local
960 host = proxy; in http_new_bio()
964 port = explict_or_default_port(host, port, use_ssl); in http_new_bio()
966 cbio = BIO_new_connect(host /* optionally includes ":port" */); in http_new_bio()
1220 char *host; in OSSL_HTTP_get() local
1242 rctx = OSSL_HTTP_open(host, port, proxy, no_proxy, in OSSL_HTTP_get()
1270 OPENSSL_free(host); in OSSL_HTTP_get()
1279 OPENSSL_free(host); in OSSL_HTTP_get()
[all …]
/openssl/crypto/bio/
H A Dbio_addr.c245 host, sizeof(host), serv, sizeof(serv), in addr_strings()
271 *hostname = OPENSSL_strdup(host); in addr_strings()
558 if (h != NULL && host != NULL) { in BIO_parse_hostserv()
561 *host = NULL; in BIO_parse_hostserv()
563 *host = OPENSSL_strndup(h, hl); in BIO_parse_hostserv()
564 if (*host == NULL) in BIO_parse_hostserv()
642 int BIO_lookup(const char *host, const char *service, in BIO_lookup() argument
695 if (addrinfo_wrap(family, socktype, host, strlen(host), 0, res)) in BIO_lookup_ex()
718 if (host != NULL && family == AF_UNSPEC) in BIO_lookup_ex()
812 if (host == NULL) { in BIO_lookup_ex()
[all …]
H A Dbio_sock.c252 int BIO_get_accept_socket(char *host, int bind_mode) in BIO_get_accept_socket() argument
258 if (!BIO_parse_hostserv(host, &h, &p, BIO_PARSE_PRIO_SERV)) in BIO_get_accept_socket()
305 char *host = BIO_ADDR_hostname_string(&res, 1); in BIO_accept() local
307 if (host != NULL && port != NULL) { in BIO_accept()
308 *ip_port = OPENSSL_zalloc(strlen(host) + strlen(port) + 2); in BIO_accept()
318 strcpy(*ip_port, host); in BIO_accept()
322 OPENSSL_free(host); in BIO_accept()
/openssl/test/
H A Dhttp_test.c255 char *user, *host, *port, *path, *query, *frag; in test_http_url_ok() local
261 res = TEST_true(OSSL_HTTP_parse_url(url, &ssl, &user, &host, &port, &num, in test_http_url_ok()
263 && TEST_str_eq(host, exp_host) in test_http_url_ok()
275 OPENSSL_free(host); in test_http_url_ok()
285 char *host, *path; in test_http_url_path_query_ok() local
288 res = TEST_true(OSSL_HTTP_parse_url(url, NULL, NULL, &host, NULL, NULL, in test_http_url_path_query_ok()
290 && TEST_str_eq(host, "host") in test_http_url_path_query_ok()
292 OPENSSL_free(host); in test_http_url_path_query_ok()
326 char *host = "1", *port = "1", *path = "1"; in test_http_url_invalid() local
332 && TEST_ptr_null(host) in test_http_url_invalid()
[all …]
H A Dservername_test.c29 static const char *host = "dummy-host"; variable
120 SSL_set_tlsext_host_name(con, host); in client_setup_sni_before_state()
138 if (!TEST_str_eq(hostname, host)) in client_setup_sni_before_state()
183 SSL_set_tlsext_host_name(con, host); in client_setup_sni_after_state()
191 if (!TEST_str_eq(hostname, host)) in client_setup_sni_after_state()
217 SSL_set_tlsext_host_name(serverssl, host); in server_setup_sni()
H A Dv3nametest.c233 int host; member
299 } else if (fn->host) { in run_cert()
314 } else if (fn->host) { in run_cert()
/openssl/apps/
H A Ds_time.c35 static SSL *doConnection(SSL *scon, const char *host, SSL_CTX *ctx);
124 char *host = SSL_CONNECT_NAME, *certfile = NULL, *keyfile = NULL, *prog; in s_time_main() local
148 host = opt_arg(); in s_time_main()
279 if ((scon = doConnection(NULL, host, ctx)) == NULL) in s_time_main()
331 if ((scon = doConnection(NULL, host, ctx)) == NULL) { in s_time_main()
360 if ((doConnection(scon, host, ctx)) == NULL) in s_time_main()
413 static SSL *doConnection(SSL *scon, const char *host, SSL_CTX *ctx) in doConnection() argument
422 if (BIO_set_conn_hostname(conn, host) <= 0 in doConnection()
H A Ds_client.c117 static int is_dNS_name(const char *host);
1629 if (tmp_host != host) in s_client_main()
1660 thost = OPENSSL_strdup(host); in s_client_main()
1668 if (tmp_host != host) in s_client_main()
2117 if (host == NULL || is_dNS_name(host)) in s_client_main()
2118 servername = (host == NULL) ? "localhost" : host; in s_client_main()
3342 OPENSSL_free(host); in s_client_main()
3735 size_t length = strlen(host); in is_dNS_name()
3747 char c = host[i]; in is_dNS_name()
3774 && host[i + 1] != '.' in is_dNS_name()
[all …]
H A Ds_server.c458 char *host, *path, *port; member
513 host = srctx->host; in get_ocsp_resp_from_responder()
581 OPENSSL_free(host); in get_ocsp_resp_from_responder()
1044 char *host = NULL; in s_server_main() local
1150 OPENSSL_free(host); host = NULL; in s_server_main()
1161 OPENSSL_free(host); host = NULL; in s_server_main()
1179 OPENSSL_free(host); host = NULL; in s_server_main()
1194 OPENSSL_free(host); host = NULL; in s_server_main()
1205 OPENSSL_free(host); host = OPENSSL_strdup(opt_arg()); in s_server_main()
2334 unlink(host); in s_server_main()
[all …]
H A Docsp.c234 char *host = NULL, *port = NULL, *path = "/", *outfile = NULL; in ocsp_main() local
287 &host, &port, NULL /* port_num */, in ocsp_main()
292 thost = host; in ocsp_main()
297 host = opt_arg(); in ocsp_main()
673 || host != NULL || add_nonce || ridx_filename != NULL)) { in ocsp_main()
731 } else if (host != NULL) { in ocsp_main()
733 resp = process_responder(req, host, port, path, opt_proxy, opt_no_proxy, in ocsp_main()
1231 OCSP_RESPONSE *process_responder(OCSP_REQUEST *req, const char *host, in process_responder() argument
1249 app_http_post_asn1(host, port, path, proxy, no_proxy, in process_responder()
H A Dcmp.c775 static int truststore_set_host_etc(X509_STORE *ts, const char *host) in truststore_set_host_etc() argument
787 return (host != NULL && X509_VERIFY_PARAM_set1_ip_asc(ts_vpm, host)) in truststore_set_host_etc()
788 || X509_VERIFY_PARAM_set1_host(ts_vpm, host, 0); in truststore_set_host_etc()
1343 static SSL_CTX *setup_ssl_ctx(OSSL_CMP_CTX *ctx, const char *host, in setup_ssl_ctx() argument
2124 &host, &port, &portnum, in setup_client_ctx()
2139 if (!OSSL_CMP_CTX_set1_server(ctx, host) in setup_client_ctx()
2147 opt_tls_used ? "s" : "", host, port, in setup_client_ctx()
2249 info->ssl_ctx = setup_ssl_ctx(ctx, host, engine); in setup_client_ctx()
2250 info->server = host; in setup_client_ctx()
2251 host = NULL; /* prevent deallocation */ in setup_client_ctx()
[all …]
/openssl/doc/man7/
H A DEVP_KEYEXCH-DH.pod60 The examples assume a host and peer both generate keys using the same
62 Both the host and peer transfer their public key to each other.
65 to transfer to the host:
75 To convert the received peer's public key from DER format on the host:
82 To derive a shared secret on the host using the host's key and the peer's public
114 using the host's public key and the peer's generated key pair.
H A DEVP_KEYEXCH-ECDH.pod74 Keys for the host and peer must be generated as shown in
80 To derive a shared secret on the host using the host's key and the peer's public
/openssl/test/recipes/
H A D80-test_cmp_http.t305 my ($host, $port);
311 ($host, $port, $pid) = ($1, $2, $3)
315 if ($server_host eq '*' && defined $host) {
316 $server_host = "[::1]" if $host eq "[::]";
317 $server_host = "127.0.0.1" if $host eq "0.0.0.0";
/openssl/apps/lib/
H A Ds_socket.c75 int init_client(int *sock, const char *host, const char *port, in init_client() argument
91 ret = BIO_lookup_ex(host, port, BIO_LOOKUP_CLIENT, family, type, protocol, in init_client()
287 int do_server(int *accept_sock, const char *host, const char *port, in do_server() argument
307 if (!BIO_lookup_ex(host, port, BIO_LOOKUP_SERVER, family, type, protocol, in do_server()
458 unlink(host); in do_server()
/openssl/providers/implementations/kdfs/
H A Dkbkdf.c91 static uint32_t be32(uint32_t host) in be32() argument
97 return host; in be32()
99 big |= (host & 0xff000000) >> 24; in be32()
100 big |= (host & 0x00ff0000) >> 8; in be32()
101 big |= (host & 0x0000ff00) << 8; in be32()
102 big |= (host & 0x000000ff) << 24; in be32()
/openssl/doc/man1/
H A Dopenssl-ocsp.pod.in32 [B<-host> I<host>:I<port>]
34 [B<-proxy> I<[http[s]://][userinfo@]host[:port][/path][?query][#fragment]>]
169 with B<-serial>, B<-cert> and B<-host> options).
173 Specify the responder host and optionally port and path via a URL.
177 For details, see the B<-host> and B<-path> options described next.
179 =item B<-host> I<host>:I<port>, B<-path> I<pathname>
181 If the B<-host> option is present then the OCSP request is sent to the host
182 I<host> on port I<port>.
183 The I<host> may be a domain name or an IP (v4 or v6) address,
189 http:// and the given I<host>, I<port>, and optional I<pathname>.
[all …]
H A Dopenssl-s_client.pod.in13 [B<-connect> I<host>:I<port>]
14 [B<-host> I<hostname>]
16 [B<-bind> I<host>:I<port>]
17 [B<-proxy> I<host>:I<port>]
140 [I<host>:I<port>]
165 =item B<-connect> I<host>:I<port>
170 is made to connect to the local host on port 4433.
173 =item B<-host> I<hostname>
181 =item B<-bind> I<host>:I<port>
188 =item B<-proxy> I<host>:I<port>
[all …]
H A Dopenssl-s_time.pod.in12 [B<-connect> I<host>:I<port>]
36 connects to a remote host using SSL/TLS. It can request a page from the server
50 =item B<-connect> I<host>:I<port>
52 This specifies the host and optional port to connect to.
53 If the host string is an IPv6 address, it must be enclosed in C<[> and C<]>.
/openssl/apps/include/
H A Ds_apps.h24 int do_server(int *accept_sock, const char *host, const char *port,
37 int init_client(int *sock, const char *host, const char *port,
/openssl/Configurations/
H A D15-android.conf108 my $host=$1;
116 . "/$tritools-4.9/prebuilt/$host";

Completed in 89 milliseconds

123