/openssl/crypto/x509/ |
H A D | v3_lib.c | 25 int X509V3_EXT_add(X509V3_EXT_METHOD *ext) in X509V3_EXT_add() argument 88 const X509V3_EXT_METHOD *ext; in X509V3_EXT_add_alias() local 99 *tmpext = *ext; in X509V3_EXT_add_alias() 113 if (ext->ext_flags & X509V3_EXT_DYNAMIC) in ext_list_free() 114 OPENSSL_free(ext); in ext_list_free() 129 void *X509V3_EXT_d2i(X509_EXTENSION *ext) in X509V3_EXT_d2i() argument 138 extvalue = X509_EXTENSION_get_data(ext); in X509V3_EXT_d2i() 222 X509_EXTENSION *ext = NULL, *extmp; in X509V3_add1_i2d() local 269 if (!ext) { in X509V3_add1_i2d() 287 if (!sk_X509_EXTENSION_push(ret, ext)) in X509V3_add1_i2d() [all …]
|
H A D | v3_prn.c | 19 static int unknown_ext_print(BIO *out, const unsigned char *ext, int extlen, 70 int X509V3_EXT_print(BIO *out, X509_EXTENSION *ext, unsigned long flag, in X509V3_EXT_print() argument 82 extoct = X509_EXTENSION_get_data(ext); in X509V3_EXT_print() 86 if ((method = X509V3_EXT_get(ext)) == NULL) in X509V3_EXT_print() 179 static int unknown_ext_print(BIO *out, const unsigned char *ext, int extlen, in unknown_ext_print() argument 195 return ASN1_parse_dump(out, ext, extlen, indent, -1); in unknown_ext_print() 197 return BIO_dump_indent(out, (const char *)ext, extlen, indent); in unknown_ext_print() 205 int X509V3_EXT_print_fp(FILE *fp, X509_EXTENSION *ext, int flag, int indent) in X509V3_EXT_print_fp() argument 212 ret = X509V3_EXT_print(bio_tmp, ext, flag, indent); in X509V3_EXT_print_fp()
|
H A D | x509_req.c | 122 ASN1_TYPE *ext = NULL; in STACK_OF() local 133 ext = X509_ATTRIBUTE_get0_type(attr, 0); in STACK_OF() 136 if (ext == NULL) /* no extensions is not an error */ in STACK_OF() 138 if (ext->type != V_ASN1_SEQUENCE) { in STACK_OF() 142 p = ext->value.sequence->data; in STACK_OF() 144 ASN1_item_d2i(NULL, &p, ext->value.sequence->length, in STACK_OF() 157 unsigned char *ext = NULL; in X509_REQ_add_extensions_nid() local 160 extlen = ASN1_item_i2d((const ASN1_VALUE *)exts, &ext, in X509_REQ_add_extensions_nid() 164 rv = X509_REQ_add1_attr_by_NID(req, nid, V_ASN1_SEQUENCE, ext, extlen); in X509_REQ_add_extensions_nid() 165 OPENSSL_free(ext); in X509_REQ_add_extensions_nid()
|
H A D | v3_conf.c | 83 X509_EXTENSION *ext; in do_ext_nconf() local 134 return ext; in do_ext_nconf() 144 X509_EXTENSION *ext; in do_ext_i2d() local 171 if (!ext) in do_ext_i2d() 175 return ext; in do_ext_i2d() 241 if ((obj = OBJ_txt2obj(ext, 0)) == NULL) { in v3_generic_extension() 243 "name=%s", ext); in v3_generic_extension() 309 X509_EXTENSION *ext; in X509V3_EXT_add_nconf_sk() local 337 delete_ext(*sk, ext); in X509V3_EXT_add_nconf_sk() 339 X509_EXTENSION_free(ext); in X509V3_EXT_add_nconf_sk() [all …]
|
H A D | v3_asid.c | 113 ASIdentifiers *asid = ext; in i2r_ASIdentifiers() 758 if (ext != NULL) { in asid_validate_path_internal() 764 if ((ext = x->rfc3779_asid) == NULL) in asid_validate_path_internal() 767 if (!X509v3_asid_is_canonical(ext)) in asid_validate_path_internal() 769 if (ext->asnum != NULL) { in asid_validate_path_internal() 770 switch (ext->asnum->type) { in asid_validate_path_internal() 775 child_as = ext->asnum->u.asIdsOrRanges; in asid_validate_path_internal() 779 if (ext->rdi != NULL) { in asid_validate_path_internal() 780 switch (ext->rdi->type) { in asid_validate_path_internal() 785 child_rdi = ext->rdi->u.asIdsOrRanges; in asid_validate_path_internal() [all …]
|
H A D | x_crl.c | 96 X509_EXTENSION *ext; variable 138 ext = sk_X509_EXTENSION_value(exts, j); 139 if (X509_EXTENSION_get_critical(ext)) { 140 if (OBJ_obj2nid(X509_EXTENSION_get_object(ext)) 163 X509_EXTENSION *ext; in crl_cb() local 237 ext = sk_X509_EXTENSION_value(exts, idx); in crl_cb() 238 nid = OBJ_obj2nid(X509_EXTENSION_get_object(ext)); in crl_cb() 241 if (X509_EXTENSION_get_critical(ext)) { in crl_cb()
|
/openssl/ssl/statem/ |
H A D | extensions_clnt.c | 39 if (s->ext.hostname == NULL) in tls_construct_ctos_server_name() 379 if (s->ext.ocsp.exts) { in tls_construct_ctos_status_request() 439 || !WPACKET_sub_memcpy_u16(pkt, s->ext.alpn, s->ext.alpn_len) in tls_construct_ctos_alpn() 861 && strcmp(s->ext.hostname, edsess->ext.hostname) != 0)) { in tls_construct_ctos_early_data() 868 if ((s->ext.alpn == NULL && edsess->ext.alpn_selected != NULL)) { in tls_construct_ctos_early_data() 881 if (!PACKET_buf_init(&prots, s->ext.alpn, s->ext.alpn_len)) { in tls_construct_ctos_early_data() 911 s->ext.early_data_ok = 1; in tls_construct_ctos_early_data() 1344 s->session->ext.hostname = OPENSSL_strdup(s->ext.hostname); in tls_parse_stoc_server_name() 1483 s->ext.scts = NULL; in tls_parse_stoc_sct() 1588 s->ext.npn_len = 0; in tls_parse_stoc_npn() [all …]
|
H A D | extensions.c | 643 if (s->ext.debug_cb) in tls_collect_extensions() 927 s->ext.hostname = NULL; in init_server_name() 965 s->session->ext.hostname = OPENSSL_strdup(s->ext.hostname); in final_server_name() 966 if (s->session->ext.hostname == NULL && s->ext.hostname != NULL) { in final_server_name() 991 s->ext.ticket_expected = 0; in final_server_name() 997 ss->ext.tick = NULL; in final_server_name() 998 ss->ext.ticklen = 0; in final_server_name() 1075 s->ext.ticket_expected = 0; in init_session_ticket() 1091 s->ext.ocsp.resp = NULL; in init_status_request() 1092 s->ext.ocsp.resp_len = 0; in init_status_request() [all …]
|
H A D | extensions_srvr.c | 146 s->ext.hostname = NULL; in tls_parse_ctos_server_name() 349 s->ext.ocsp.ids = NULL; in tls_parse_ctos_status_request() 397 s->ext.ocsp.exts = in tls_parse_ctos_status_request() 537 s->ext.use_etm = 1; in tls_parse_ctos_etm() 893 s->ext.cookieok = 1; in tls_parse_ctos_cookie() 967 s->ext.ticket_expected = 1; in tls_get_stateful_ticket() 1005 if ((s->ext.psk_kex_mode in tls_parse_ctos_psk() 1100 ext = 1; in tls_parse_ctos_psk() 1217 s->ext.tick_identity = id; in tls_parse_ctos_psk() 1536 if (!s->ext.use_etm) in tls_construct_stoc_etm() [all …]
|
H A D | statem_srvr.c | 507 } else if (!s->ext.ticket_expected) { in ossl_statem_server13_write_transition() 603 if (s->ext.ticket_expected) in ossl_statem_server_write_transition() 624 if (s->ext.status_expected) { in ossl_statem_server_write_transition() 655 } else if (s->ext.ticket_expected) { in ossl_statem_server_write_transition() 2077 s->ext.status_expected = 0; in tls_handle_status_request() 2101 s->ext.status_expected = 0; in tls_handle_status_request() 2105 if (s->ext.ocsp.resp) in tls_handle_status_request() 2157 s->ext.early_data_ok = 0; in tls_handle_alpn() 2196 s->ext.early_data_ok = 0; in tls_handle_alpn() 3777 if (tctx->ext.ticket_key_evp_cb != NULL || tctx->ext.ticket_key_cb != NULL) in construct_stateless_ticket() [all …]
|
/openssl/ssl/ |
H A D | ssl_sess.c | 166 dest->ext.hostname = NULL; in ssl_session_dup() 167 dest->ext.tick = NULL; in ssl_session_dup() 221 if (src->ext.hostname) { in ssl_session_dup() 222 dest->ext.hostname = OPENSSL_strdup(src->ext.hostname); in ssl_session_dup() 229 dest->ext.tick = in ssl_session_dup() 230 OPENSSL_memdup(src->ext.tick, src->ext.ticklen); in ssl_session_dup() 235 dest->ext.ticklen = 0; in ssl_session_dup() 239 dest->ext.alpn_selected = OPENSSL_memdup(src->ext.alpn_selected, in ssl_session_dup() 965 return s->ext.hostname; in SSL_SESSION_get0_hostname() 993 *len = s->ext.ticklen; in SSL_SESSION_get0_ticket() [all …]
|
H A D | ssl_asn1.c | 173 in->ext.hostname); in i2d_SSL_SESSION() 174 if (in->ext.tick) { in i2d_SSL_SESSION() 176 in->ext.tick, in->ext.ticklen); in i2d_SSL_SESSION() 178 if (in->ext.tick_lifetime_hint > 0) in i2d_SSL_SESSION() 193 if (in->ext.alpn_selected == NULL) in i2d_SSL_SESSION() 197 in->ext.alpn_selected, in->ext.alpn_selected_len); in i2d_SSL_SESSION() 338 OPENSSL_free(ret->ext.tick); in d2i_SSL_SESSION() 344 ret->ext.tick = NULL; in d2i_SSL_SESSION() 366 OPENSSL_free(ret->ext.alpn_selected); in d2i_SSL_SESSION() 372 ret->ext.alpn_selected = NULL; in d2i_SSL_SESSION() [all …]
|
H A D | t1_trce.c | 738 xlen = (ext[0] << 8) | ext[1]; in ssl_print_extension() 745 xlen = (ext[0] << 8) | ext[1]; in ssl_print_extension() 748 ext += 2; in ssl_print_extension() 766 xlen = (ext[0] << 8) | ext[1]; in ssl_print_extension() 774 sigalg = (ext[0] << 8) | ext[1]; in ssl_print_extension() 788 ext++; in ssl_print_extension() 816 group_id = (ext[0] << 8) | ext[1]; in ssl_print_extension() 827 xlen = (ext[0] << 8) | ext[1]; in ssl_print_extension() 837 group_id = (ext[0] << 8) | ext[1]; in ssl_print_extension() 838 share_len = (ext[2] << 8) | ext[3]; in ssl_print_extension() [all …]
|
H A D | ssl_lib.c | 807 s->ext.max_fragment_len_mode = ctx->ext.max_fragment_len_mode; in ossl_ssl_connection_new() 813 s->ext.debug_cb = 0; in ossl_ssl_connection_new() 816 s->ext.status_type = ctx->ext.status_type; in ossl_ssl_connection_new() 844 s->ext.supportedgroups_len = ctx->ext.supportedgroups_len; in ossl_ssl_connection_new() 848 s->ext.npn = NULL; in ossl_ssl_connection_new() 852 s->ext.alpn = OPENSSL_malloc(ctx->ext.alpn_len); in ossl_ssl_connection_new() 857 memcpy(s->ext.alpn, ctx->ext.alpn, ctx->ext.alpn_len); in ossl_ssl_connection_new() 858 s->ext.alpn_len = ctx->ext.alpn_len; in ossl_ssl_connection_new() 5798 if (s->ext.ocsp.resp == NULL || s->ext.ocsp.resp_len == 0) in ct_extract_ocsp_response_scts() 6240 present[ext->received_order] = ext->type; in SSL_client_hello_get1_extensions_present() [all …]
|
H A D | ssl_txt.c | 101 if (x->ext.tick_lifetime_hint) { in SSL_SESSION_print() 104 x->ext.tick_lifetime_hint) <= 0) in SSL_SESSION_print() 107 if (x->ext.tick) { in SSL_SESSION_print() 111 (bp, (const char *)x->ext.tick, (int)x->ext.ticklen, 4) in SSL_SESSION_print() 154 x->ext.max_early_data) <= 0) in SSL_SESSION_print()
|
H A D | s3_lib.c | 3413 OPENSSL_free(sc->ext.npn); in ssl3_clear() 3414 sc->ext.npn = NULL; in ssl3_clear() 3415 sc->ext.npn_len = 0; in ssl3_clear() 3513 sc->ext.hostname = NULL; in ssl3_ctrl() 3533 sc->ext.debug_arg = parg; in ssl3_ctrl() 3538 ret = sc->ext.status_type; in ssl3_ctrl() 3542 sc->ext.status_type = larg; in ssl3_ctrl() 3552 sc->ext.ocsp.exts = parg; in ssl3_ctrl() 3562 sc->ext.ocsp.ids = parg; in ssl3_ctrl() 3575 sc->ext.ocsp.resp = parg; in ssl3_ctrl() [all …]
|
/openssl/test/recipes/ |
H A D | 70-test_key_share.t | 305 my $ext; 316 $ext = pack "C2", 319 $ext = pack "C12", 326 $ext = pack "C11H64", 347 $ext = pack "C8", 372 $ext = pack "C7", 396 my $ext; 411 $ext = pack "C4H64", 417 $ext = pack "C1", 420 $ext = pack "C6", [all …]
|
H A D | 70-test_tls13cookie.t | 78 my $ext = pack "C8", 89 $message->set_extension(TLSProxy::Message::EXT_COOKIE, $ext); 94 my $ext = pack "C7", 102 TLSProxy::Message::EXT_KEY_SHARE, $ext); 113 return if ($cookie cmp $ext) != 0;
|
H A D | 70-test_sslversions.t | 146 my $ext; 148 $ext = pack "C5", 153 $ext = pack "C5", 158 $ext = pack "C5", 163 $ext = pack "C5", 173 TLSProxy::Message::EXT_SUPPORTED_VERSIONS, $ext);
|
H A D | 70-test_tls13downgrade.t | 105 my $ext; 113 $ext = pack "C3", 117 $ext = pack "C3", 122 $message->set_extension(TLSProxy::Message::EXT_SUPPORTED_VERSIONS, $ext);
|
H A D | 70-test_sslsigalgs.t | 368 my $ext; 374 $ext = $message->extension_data->{TLSProxy::Message::EXT_SIG_ALGS}; 375 @algs = unpack('S>*', $ext); 391 $ext = $message->extension_data->{TLSProxy::Message::EXT_SIG_ALGS}; 392 @algs = unpack('S>*', $ext); 487 my $ext = pack "C8", 493 $message->set_extension($type, $ext);
|
H A D | 70-test_tls13kexmodes.t | 335 my $ext; 338 $ext = pack "C", 341 $ext = pack "C2", 345 $ext = pack "C2", 349 $ext = pack "C3", 355 $ext = pack "C3", 366 TLSProxy::Message::EXT_PSK_KEX_MODES, $ext);
|
/openssl/crypto/bn/ |
H A D | bn_mpi.c | 18 int ext = 0; in BN_bn2mpi() local 24 ext = ((bits & 0x07) == 0); in BN_bn2mpi() 27 return (num + 4 + ext); in BN_bn2mpi() 29 l = num + ext; in BN_bn2mpi() 34 if (ext) in BN_bn2mpi() 36 num = BN_bn2bin(a, &(d[4 + ext])); in BN_bn2mpi() 39 return (num + 4 + ext); in BN_bn2mpi()
|
/openssl/crypto/ct/ |
H A D | ct_sct.c | 42 OPENSSL_free(sct->ext); in SCT_free() 143 void SCT_set0_extensions(SCT *sct, unsigned char *ext, size_t ext_len) in SCT_set0_extensions() argument 145 OPENSSL_free(sct->ext); in SCT_set0_extensions() 146 sct->ext = ext; in SCT_set0_extensions() 153 OPENSSL_free(sct->ext); in SCT_set1_extensions() 154 sct->ext = NULL; in SCT_set1_extensions() 158 if (ext != NULL && ext_len > 0) { in SCT_set1_extensions() 159 sct->ext = OPENSSL_memdup(ext, ext_len); in SCT_set1_extensions() 160 if (sct->ext == NULL) { in SCT_set1_extensions() 233 size_t SCT_get0_extensions(const SCT *sct, unsigned char **ext) in SCT_get0_extensions() argument [all …]
|
/openssl/test/ |
H A D | ocspapitest.c | 196 X509_EXTENSION * ext = NULL; in test_ocsp_url_svcloc_new() local 205 ext = OCSP_url_svcloc_new(X509_get_issuer_name(issuer), urls); in test_ocsp_url_svcloc_new() 206 if (!TEST_ptr(ext)) in test_ocsp_url_svcloc_new() 209 X509_EXTENSION_free(ext); in test_ocsp_url_svcloc_new()
|