/openssl/test/ |
H A D | exdatatest.c | 66 char *hello; member 105 ex_data->hello = (*update_ex_data)->hello; in exdup2() 162 ex_data->hello = cp; in MYOBJ_sethello2() 172 return ex_data->hello; in MYOBJ_gethello2() 186 ex_data->hello = cp; in MYOBJ_allochello3() 196 return ex_data->hello; in MYOBJ_gethello3()
|
/openssl/test/recipes/30-test_evp_data/ |
H A D | evpencod.txt | 25 Input = "hello" 29 Input = "hello world!" 45 Input = "hello" 50 Input = "hello" 62 Input = "hello" 66 Input = "hello"
|
/openssl/ssl/ |
H A D | ssl_sess.c | 584 int ssl_get_prev_session(SSL_CONNECTION *s, CLIENTHELLO_MSG *hello) in ssl_get_prev_session() argument 600 SSL_EXT_CLIENT_HELLO, hello->pre_proc_exts, in ssl_get_prev_session() 603 hello->pre_proc_exts, NULL, 0)) in ssl_get_prev_session() 609 r = tls_get_ticket_from_client(s, hello, &ret); in ssl_get_prev_session() 618 if (hello->session_id_len > 0) { in ssl_get_prev_session() 620 ret = lookup_sess_in_cache(s, hello->session_id, in ssl_get_prev_session() 621 hello->session_id_len); in ssl_get_prev_session()
|
H A D | ssl_local.h | 2503 __owur int ssl_get_prev_session(SSL_CONNECTION *s, CLIENTHELLO_MSG *hello); 2666 __owur int ssl_choose_server_version(SSL_CONNECTION *s, CLIENTHELLO_MSG *hello, 2815 CLIENTHELLO_MSG *hello,
|
H A D | t1_lib.c | 2317 CLIENTHELLO_MSG *hello, in tls_get_ticket_from_client() argument 2334 ticketext = &hello->pre_proc_exts[TLSEXT_IDX_session_ticket]; in tls_get_ticket_from_client() 2341 hello->session_id, hello->session_id_len, ret); in tls_get_ticket_from_client()
|
/openssl/doc/man1/ |
H A D | openssl-spkac.pod.in | 120 Create an SPKAC using the challenge string "hello": 122 openssl spkac -key key.pem -challenge hello -out spkac.cnf
|
H A D | openssl-rsautl.pod.in | 161 0070 - ff ff ff ff 00 68 65 6c-6c 6f 20 77 6f 72 6c 64 .....hello world
|
H A D | openssl-genpkey.pod.in | 417 Encrypt output private key using 128 bit AES and the passphrase "hello": 419 openssl genpkey -algorithm RSA -out key.pem -aes-128-cbc -pass pass:hello
|
/openssl/doc/man3/ |
H A D | SSL_alert_type_string.pod | 205 Sent by the client in response to a hello request or by the 206 server in response to a client hello after initial handshaking.
|
H A D | SSL_check_chain.pod | 56 SSL_check_chain() must be called in servers after a client hello message or in
|
H A D | SSL_get_shared_sigalgs.pod | 53 signature algorithms: after a client hello (for servers) or a certificate
|
H A D | SSL_CTX_set1_sigalgs.pod | 57 signature algorithm in the client hello message.
|
H A D | BIO_s_file.pod | 103 File BIO "hello world":
|
H A D | SSL_CTX_set_options.pod | 68 Add server-hello extension from the early version of cryptopro draft 358 about acceptable SSL/TLS protocol levels as during the first hello. Some 360 the client sends an SSLv2 hello and accepts up to SSLv3.1=TLSv1, the server
|
H A D | PEM_read_bio_PrivateKey.pod | 525 DES encryption, using the pass phrase "hello": 528 NULL, 0, 0, "hello")) 546 char *tmp = "hello";
|
H A D | SSL_CTX_set_tlsext_ticket_key_cb.pod | 36 session when session ticket extension is presented in the TLS hello
|
/openssl/fuzz/ |
H A D | README.md | 171 the same client hello with the same random number in it, and so the server, as 172 emulated by the file, can be generated for that client hello.
|
/openssl/crypto/perlasm/ |
H A D | README.md | 49 &comment("hello there") Put in a comment.
|
/openssl/ssl/statem/ |
H A D | statem_lib.c | 2140 int ssl_choose_server_version(SSL_CONNECTION *s, CLIENTHELLO_MSG *hello, in ssl_choose_server_version() argument 2154 int client_version = hello->legacy_version; in ssl_choose_server_version() 2190 suppversions = &hello->pre_proc_exts[TLSEXT_IDX_supported_versions]; in ssl_choose_server_version()
|
H A D | statem_srvr.c | 1418 const CLIENTHELLO_MSG *hello) in ssl_check_for_safari() argument 1448 tmppkt = hello->extensions; in ssl_check_for_safari()
|
/openssl/crypto/err/ |
H A D | openssl.txt | 1343 SSL_R_BAD_HELLO_REQUEST:105:bad hello request 1434 SSL_R_FRAGMENTED_CLIENT_HELLO:401:fragmented client hello
|
/openssl/include/openssl/ |
H A D | ssl.h.in | 391 * TLSv1.0 (version 3.1) was announced in the client hello. Normally 410 * Make server add server-hello extension from early version of
|
/openssl/ |
H A D | CHANGES.md | 5899 compatible client hello. 7724 hello and checking the requested ciphersuite. 9037 * Don't use TLS 1.0 record version number in initial client hello 9104 * Workarounds for some broken servers that "hang" if a client hello 9108 hello: some (but not all) hanging servers will now work. 9110 the number of ciphers sent in the client hello. This should be 10022 client hello before rejecting multiple SGC restarts. Thanks to 11252 a resumption has occurred immediately after receiving server hello 16415 hello' messages. (Note that the attack is impractical against 18224 reset the MAC if we do get this second client hello. [all …]
|
H A D | NEWS.md | 1772 * TLS/SSL protocol bugfixes: Accept TLS 'client hello' in SSL 3.0
|