/openssl/doc/man3/ |
H A D | SSL_set1_initial_peer_addr.pod | 5 SSL_set1_initial_peer_addr - set the initial peer address for a QUIC connection 15 SSL_set1_initial_peer_addr() sets the initial destination peer address to be used 19 representing a UDP destination address of the server to connect to. 23 destination peer address can be detected automatically; if 24 B<BIO_CTRL_DGRAM_GET_PEER> returns a valid (non-B<AF_UNSPEC>) peer address and 25 no valid peer address has yet been set, this will be set automatically as the 26 initial peer address. This behaviour can be overridden by calling 27 SSL_set1_initial_peer_addr() with a valid peer address explicitly. 29 The destination address used by QUIC may change over time in response to 33 destination address being used for communication at any later time in the [all …]
|
H A D | X509_check_host.pod | 13 int X509_check_email(X509 *, const char *address, size_t addresslen, 17 int X509_check_ip_asc(X509 *, const char *address, unsigned int flags); 22 certificate matches a given hostname, email address, or IP address. 46 is stored at the address passed in B<peername>. The application 51 email B<address>. The mailbox syntax of RFC 822 is supported, 54 SmtpUTF8Mailbox address in subjectAltName according to RFC 8398, 58 characters in the address string or zero in which case the length 59 is calculated with strlen(B<address>). 62 IPv6 address. The B<address> array is in binary format, in network 69 string B<address> is first converted to the internal representation. [all …]
|
H A D | BIO_sendmmsg.pod | 65 on a per-datagram basis, and the source address of received datagrams to be 67 will be read by BIO_sendmmsg() and used as the destination address for sent 68 datagrams, and written by BIO_recvmmsg() with the source address of received 72 datagrams to be specified on a per-datagram basis, and the destination address 83 system does not report a local address for a specific received message, the 87 loopback address or the IP address of a local non-loopback interface. This is 89 before local address support was enabled for a receiving socket. These are 116 whether local address support is enabled. To enable local address support, call 118 local address support is not available for the platform. 144 are written with the relevant address. [all …]
|
H A D | BIO_ADDR.pod | 47 address data in B<ap>. 56 size B<wherelen> with an address in network byte order pointed at 70 BIO_ADDR_rawaddress() will write the raw address of the given 72 and will set B<*l> to be the amount of bytes the raw address 74 A technique to only find out the size of the address is a call 75 with B<p> set to B<NULL>. The raw address will be in network byte 87 will contain the numerical form of the address. This only works for 107 network byte order address of a specific site. Internally, those are 110 depending on the protocol family the address is for.
|
H A D | BIO_connect.pod | 25 BIO_bind() binds the source address and service to a socket and 29 BIO_connect() connects B<sock> to the address and service given by 34 BIO_listen() has B<sock> start listening on the address and service 41 socket B<accept_sock>. When it gets a connection, the address and 68 Try to reuse the address and port combination for a recently closed 83 the peer address before starting the TLS handshake.
|
H A D | BIO_s_datagram.pod | 69 any successful call to BIO_read() results in the peer address used for any 70 subsequent call to BIO_write() being set to the source address of the datagram 110 similar). The I<peer> argument should specify the peer address to which the socket 129 The peer address last passed to BIO_dgram_set_peer(), BIO_ctrl_dgram_connect() 134 The peer address of the datagram last received by a call to BIO_read(). 140 Sets the peer address to be used for subsequent writes to this BIO. 151 This is similar to BIO_dgram_get_peer() except that if the peer address has not 153 to try and autodetect the peer address to which the underlying socket is 155 sensing a peer address, without necessarily also implementing 249 the number of bytes for the outputted address representation (a positive value)
|
H A D | BIO_s_connect.pod | 66 The hostname can be an IP address; if the address is an IPv6 one, it 75 BIO_set_conn_address() sets the address and port information using 87 BIO_get_conn_address() returns the address information as a BIO_ADDR. 166 BIO_get_conn_address() returns the address information or NULL if none 172 BIO_get_conn_ip_family() returns the address family or -1 if none was set.
|
H A D | OSSL_PARAM_int.pod | 51 #define OSSL_PARAM_TYPE(key, address) 52 #define OSSL_PARAM_BN(key, address, size) 53 #define OSSL_PARAM_utf8_string(key, address, size) 54 #define OSSL_PARAM_octet_string(key, address, size) 55 #define OSSL_PARAM_utf8_ptr(key, address, size) 56 #define OSSL_PARAM_octet_ptr(key, address, size) 166 provided I<key> and parameter variable I<address>. 172 The storage for this parameter is at I<address> and is of I<size> bytes. 224 The value is copied to the address I<val>.
|
H A D | BIO_parse_hostserv.pod | 38 The host part can be a name or an IP address. If it's a IPv6 39 address, it MUST be enclosed in brackets, such as '[::1]'.
|
H A D | BIO_ADDRINFO.pod | 39 The B<BIO_ADDRINFO> type is a wrapper for address information 46 uses B<lookup_type> to determine what the default address should 97 address is required then the B<protocol> parameter to BIO_lookup_ex() should be
|
H A D | DTLSv1_listen.pod | 30 address. An attacker could forge its source IP address and then send handshake 40 address. In this case a TLSv1.3 application would be susceptible to this attack. 48 that address. All of this can be done by the server without allocating any 69 L<BIO_s_datagram(3)> is used, the peer address is updated when receiving a
|
H A D | BIO_s_dgram_pair.pod | 170 If a caller attempts to specify a destination address (for example, using 175 If a caller attempts to specify a source address when writing, or requests a 176 destination address when receiving, and local address support has not been 179 If a caller attempts to enable local address support using
|
H A D | X509_VERIFY_PARAM_set_flags.pod | 192 X509_VERIFY_PARAM_get0_email() returns the expected RFC822 email address. 194 X509_VERIFY_PARAM_set1_email() sets the expected RFC822 email address to 196 B<emaillen> must be set to the length of B<email>. When an email address 200 X509_VERIFY_PARAM_get1_ip_asc() returns the expected IP address as a string. 203 X509_VERIFY_PARAM_set1_ip() sets the expected IP address to B<ip>. 206 address is specified, certificate verification automatically invokes 209 X509_VERIFY_PARAM_set1_ip_asc() sets the expected IP address to
|
H A D | OSSL_LIB_CTX.pod | 116 OSSL_LIB_CTX_get_data() returns a memory address whose interpretation depends 121 OSSL_LIB_CTX_get_data() returns a memory address whose interpretation 134 OSSL_LIB_CTX_get_data() returns a memory address whose interpretation
|
H A D | OSSL_HTTP_parse_url.pod | 55 The host (or server) component may be a DNS name or an IP address 63 Any IPv6 address in I<*phost> is enclosed in C<[> and C<]>.
|
H A D | X509_STORE_CTX_get_error.pod | 368 address format of a form not mentioned in RFC3280. This could be caused by 388 =item B<X509_V_ERR_EMAIL_MISMATCH: email address mismatch> 390 Email address mismatch. 392 =item B<X509_V_ERR_IP_ADDRESS_MISMATCH: IP address mismatch> 394 IP address mismatch.
|
H A D | OSSL_CRMF_pbmp_new.pod | 31 On success writes the address of the newly
|
/openssl/crypto/des/asm/ |
H A D | des_enc.m4 | 106 ! The macro also loads address sbox 1 to 5 to global 1 to 5, address 121 ! parameter 5 key address 292 ! local6 is address sbox 6 751 ! parameter 1 address 800 ! parameter 1 address 806 ! adds 8 to address 854 ! parameter 1 address 925 ! parameter 1 address 976 ! parameter 1 address 1091 ! key address in3 [all …]
|
/openssl/doc/man7/ |
H A D | ossl-guide-quic-client-block.pod | 95 * Lookup IP address info for the server. 117 /* Connect the socket to the server's address */ 142 /* Free the address information resources we allocated earlier */ 154 Secondly, we take note of the IP address of the peer that we are connecting to. 221 =head2 Setting the peer address 223 An OpenSSL QUIC application must specify the target address of the server that 225 address away for future use. Now we need to use it via the 228 /* Set the IP address of the remote peer */ 230 printf("Failed to set the initial peer address\n");
|
/openssl/crypto/dso/ |
H A D | dso_dlfcn.c | 307 static int dladdr(void *address, Dl_info *dl) in dladdr() argument 310 v = _rld_new_interface(_RLD_DLADDR, address, dl); in dladdr()
|
/openssl/doc/internal/man3/ |
H A D | ossl_rand_get_entropy.pod | 41 bytes. The buffer address is stored in I<*pout> and the buffer length is 62 most I<max_len> bytes. The buffer address is stored in I<*pout> and the
|
/openssl/doc/man1/ |
H A D | openssl-s_client.pod.in | 171 If the host string is an IPv6 address, it must be enclosed in C<[> and C<]>. 183 This specifies the host address and or port to bind as the source for the 185 used as the source socket address. 186 If the host string is an IPv6 address, it must be enclosed in C<[> and C<]>. 193 If the host string is an IPv6 address, it must be enclosed in C<[> and C<]>. 236 Even though SNI should normally be a DNS name and not an IP address, if 1012 connections to come from some particular address and or port. 1023 openssl s_client -connect <server address>:443 -tls1_3 1036 -connect <server address>:25 </dev/null 1047 printf 'QUIT\r\n' | openssl s_client -connect <server address>:25 [all …]
|
/openssl/doc/designs/quic-design/ |
H A D | dgram-api.md | 84 - Sometimes, an application may wish to learn the local interface address 85 associated with a receive operation or specify the local interface address to 149 are NULL, the given addressing information is not requested. Local address 157 Local address support is enabled as follows: 165 `BIO_dgram_get_local_addr_cap()` returns 1 if local address support is 277 use `writev`/`readv` because we need peer address information.) Logically 433 address fields), BIO_dgram can go ahead and start using the `recvmmsg` code
|
/openssl/apps/ |
H A D | openssl-vms.cnf | 219 # Import the email address. 257 # Include email address in subject alt name: another PKIX recommendation 292 # Import the email address.
|
H A D | openssl.cnf | 219 # Import the email address. 257 # Include email address in subject alt name: another PKIX recommendation 292 # Import the email address.
|