Home
last modified time | relevance | path

Searched refs:auth (Results 1 – 25 of 25) sorted by relevance

/openssl/test/ssl-tests/
H A D04-client_auth.cnf5 test-0 = 0-server-auth-flex
6 test-1 = 1-client-auth-flex-request
13 test-8 = 8-server-auth-TLSv1
47 [0-server-auth-flex]
50 [0-server-auth-flex-ssl]
54 [0-server-auth-flex-server]
59 [0-server-auth-flex-client]
267 [8-server-auth-TLSv1]
270 [8-server-auth-TLSv1-ssl]
450 [14-server-auth-TLSv1.1]
[all …]
H A D26-tls13_client_auth.cnf5 test-0 = 0-server-auth-TLSv1.3
6 test-1 = 1-client-auth-TLSv1.3-request
8 test-3 = 3-client-auth-TLSv1.3-require
10 test-5 = 5-client-auth-TLSv1.3-noroot
21 [0-server-auth-TLSv1.3]
24 [0-server-auth-TLSv1.3-ssl]
28 [0-server-auth-TLSv1.3-server]
35 [0-server-auth-TLSv1.3-client]
48 [1-client-auth-TLSv1.3-request]
106 [3-client-auth-TLSv1.3-require]
[all …]
H A D23-srp.cnf7 test-2 = 2-srp-auth
8 test-3 = 3-srp-auth-bad-password
81 [2-srp-auth]
82 ssl_conf = 2-srp-auth-ssl
84 [2-srp-auth-ssl]
85 server = 2-srp-auth-server
88 [2-srp-auth-server]
94 [2-srp-auth-client]
105 [2-srp-auth-server-extra]
109 [2-srp-auth-client-extra]
[all …]
H A D26-tls13_client_auth.cnf.in22 name => "server-auth-TLSv1.3",
36 name => "client-auth-TLSv1.3-request",
51 name => "client-auth-TLSv1.3-require-fail",
68 name => "client-auth-TLSv1.3-require",
91 name => "client-auth-TLSv1.3-require-non-empty-names",
115 name => "client-auth-TLSv1.3-noroot",
133 name => "client-auth-TLSv1.3-request-post-handshake",
149 name => "client-auth-TLSv1.3-require-fail-post-handshake",
166 name => "client-auth-TLSv1.3-require-post-handshake",
221 name => "client-auth-TLSv1.3-noroot-post-handshake",
[all …]
H A D18-dtls-renegotiate.cnf8 test-3 = 3-renegotiate-client-auth-require
9 test-4 = 4-renegotiate-client-auth-once
101 [3-renegotiate-client-auth-require]
104 [3-renegotiate-client-auth-require-ssl]
108 [3-renegotiate-client-auth-require-server]
116 [3-renegotiate-client-auth-require-client]
133 [4-renegotiate-client-auth-once]
134 ssl_conf = 4-renegotiate-client-auth-once-ssl
136 [4-renegotiate-client-auth-once-ssl]
140 [4-renegotiate-client-auth-once-server]
[all …]
H A D17-renegotiate.cnf9 test-4 = 4-renegotiate-client-auth-require
10 test-5 = 5-renegotiate-client-auth-once
135 [4-renegotiate-client-auth-require]
138 [4-renegotiate-client-auth-require-ssl]
142 [4-renegotiate-client-auth-require-server]
151 [4-renegotiate-client-auth-require-client]
167 [5-renegotiate-client-auth-once]
168 ssl_conf = 5-renegotiate-client-auth-once-ssl
170 [5-renegotiate-client-auth-once-ssl]
174 [5-renegotiate-client-auth-once-server]
[all …]
H A D04-client_auth.cnf.in59 name => "server-auth-${protocol_name}"
80 name => "client-auth-${protocol_name}-request"
102 name => "client-auth-${protocol_name}-require-fail"
130 name => "client-auth-${protocol_name}-require"
160 name => "client-auth-${protocol_name}-rsa-pss"
188 name => "client-auth-${protocol_name}-rsa-pss-bad"
219 name => "client-auth-${protocol_name}-require-non-empty-names"
250 name => "client-auth-${protocol_name}-noroot"
H A D23-srp.cnf.in63 name => "srp-auth",
85 name => "srp-auth-bad-password",
H A D01-simple.cnf.in24 # Should have no effect as we aren't doing client auth
H A D17-renegotiate.cnf.in74 name => "renegotiate-client-auth-require",
93 name => "renegotiate-client-auth-once",
H A D18-dtls-renegotiate.cnf.in91 name => "renegotiate-client-auth-require".$suffix,
112 name => "renegotiate-client-auth-once".$suffix,
/openssl/test/
H A Devp_pkey_dhkem_test.c249 EVP_PKEY *auth = NULL; in test_ec_auth_key_curve_mismatch() local
255 EVP_PKEY_free(auth); in test_ec_auth_key_curve_mismatch()
431 EVP_PKEY *auth = NULL; in test_noauthpublic() local
458 EVP_PKEY_free(auth); in test_noauthpublic()
509 int ret = 0, auth = 0; in test_ec_noikme() local
524 auth = 1; in test_ec_noikme()
533 || (auth in test_ec_noikme()
539 || (auth in test_ec_noikme()
649 EVP_PKEY *auth = NULL; in test_ec_badauth() local
682 EVP_PKEY_free(auth); in test_ec_badauth()
[all …]
H A DREADME.ssltest.md106 * ExpectedClientCANames - for client auth list of CA names the server must
/openssl/providers/implementations/kem/
H A Decx_kem.c197 ECX_KEY *auth = vauth; in ecxkem_init() local
208 if (auth != NULL) { in ecxkem_init()
209 if (!ecx_match_params(auth, ctx->recipient_key) in ecxkem_init()
210 || !ecx_key_check(auth, operation == EVP_PKEY_OP_ENCAPSULATE) in ecxkem_init()
211 || !sender_authkey_set(ctx, auth)) in ecxkem_init()
484 int auth = ctx->sender_authkey != NULL; in derive_secret() local
492 if (auth) { in derive_secret()
510 if (auth) in derive_secret()
H A Dec_kem.c240 EC_KEY *auth = vauth; in eckem_init() local
251 if (auth != NULL) { in eckem_init()
252 if (!ossl_ec_match_params(ec, auth) in eckem_init()
253 || !eckey_check(auth, operation == EVP_PKEY_OP_ENCAPSULATE) in eckem_init()
254 || !sender_authkey_set(ctx, auth)) in eckem_init()
576 int auth = ctx->sender_authkey != NULL; in derive_secret() local
584 if (auth) { in derive_secret()
607 if (auth) in derive_secret()
/openssl/.github/workflows/
H A Dstatic-analysis-on-prem.yml25 - name: Put auth key file
39 …s --url https://coverity.openssl.org:443 --stream OpenSSL --dir cov-int --auth-key-file /auth_key_…
H A Drun-checker-daily.yml169 - name: Check SCTP and enable auth
H A Dci.yml412 - name: Enable auth in sctp
/openssl/doc/man3/
H A DOSSL_CRMF_MSG_set1_regCtrl_regToken.pod32 const ASN1_UTF8STRING *auth);
64 the given I<msg> copying the given I<auth> as value. See RFC 4211, section 6.2.
/openssl/crypto/objects/
H A Dobjects.txt544 !Cname server-auth
546 !Cname client-auth
1325 set-msgExt 3 : setext-miAuth : merchant initiated auth
1802 : AuthRSA : auth-rsa
1803 : AuthECDSA : auth-ecdsa
1804 : AuthPSK : auth-psk
1805 : AuthDSS : auth-dss
1806 : AuthGOST01 : auth-gost01
1808 : AuthSRP : auth-srp
1809 : AuthNULL : auth-null
[all …]
/openssl/include/openssl/
H A Dcrmf.h.in102 const ASN1_UTF8STRING *auth);
/openssl/crypto/bio/
H A Dbss_dgram.c1770 struct sctp_authchunk auth; in BIO_new_dgram_sctp() local
1787 auth.sauth_chunk = OPENSSL_SCTP_DATA_CHUNK_TYPE; in BIO_new_dgram_sctp()
1789 setsockopt(fd, IPPROTO_SCTP, SCTP_AUTH_CHUNK, &auth, in BIO_new_dgram_sctp()
1797 auth.sauth_chunk = OPENSSL_SCTP_FORWARD_CUM_TSN_CHUNK_TYPE; in BIO_new_dgram_sctp()
1799 setsockopt(fd, IPPROTO_SCTP, SCTP_AUTH_CHUNK, &auth, in BIO_new_dgram_sctp()
/openssl/crypto/err/
H A Dopenssl.txt1541 SSL_R_POST_HANDSHAKE_AUTH_ENCODING_ERR:278:post handshake auth encoding err
/openssl/
H A DNEWS.md968 * Empty CKE with client auth and DHE fix ([CVE-2015-1787])
H A DCHANGES.md7440 * Empty CKE with client auth and DHE fix
7442 If client auth is used then a server can seg fault in the event of a DHE

Completed in 120 milliseconds