/openssl/crypto/objects/ |
H A D | objects.pl | 52 $module = $1."-"; 53 $module =~ s/\./_/g; 54 $module =~ s/-/_/g; 57 { $module = ""; } 62 $Cname = $module.$1; 92 if ($Cname ne "" && defined($ln{$module.$Cname})) 93 ….txt:$o:There's already an object with long name ",$ln{$module.$Cname}," on line ",$order{$module.… 99 if ($Cname ne "" && defined($sn{$module.$Cname})) 100 …txt:$o:There's already an object with short name ",$sn{$module.$Cname}," on line ",$order{$module.… 109 ….txt:$o:There's already an object with long name ",$ln{$module.$Cname}," on line ",$order{$module.… [all …]
|
H A D | README.md | 33 !module foo 37 The !module command was meant to define a kind of modularity. 38 What it does is to make sure the module name is prepended
|
/openssl/doc/man1/ |
H A D | openssl-fipsinstall.pod.in | 14 [B<-module> I<modulefilename>] 60 This command is used to generate a FIPS module configuration file. 62 in order to pass data to the FIPS module self tests. The FIPS module always 70 =item - A MAC of the FIPS module file. 87 the operation if the module error state is not entered. 109 =item B<-module> I<filename> 111 Filename of the FIPS module to perform an integrity check on. 189 Configure the module so that it is strictly FIPS compliant rather 215 Configure the module to not allow short MAC outputs. 281 Configure the module to not allow Triple-DES encryption. [all …]
|
/openssl/Configurations/ |
H A D | gentemplate.pm | 453 my $module = shift; 454 return "" if $cache{$module}; 456 my @objs = @{$self->{info}->{sources}->{$module}}; 457 my @deps = ( grep { $_ ne $module } 458 $self->resolvedepends($module) ); 459 print STDERR "DEBUG[domodule] \%attrs for $module :", 462 print STDERR "DEBUG[domodule] \@objs for $module : ", 465 print STDERR "DEBUG[domodule] \@deps for $module : ", 469 module => $module, 473 foreach (@{$self->{info}->{sources}->{$module}}) { [all …]
|
H A D | platform.pm | 10 my $module = $target{perl_platform} || 'Unix'; 11 (my $module_path = $module) =~ s|::|/|g; 14 @ISA = ("platform::$module");
|
/openssl/ |
H A D | NOTES-PERL.md | 9 - [Notes on installing a Perl module](#notes-on-installing-a-perl-module]) 43 for which you may need to explicitly select the Perl module Win32/Console.pm 74 To avoid unnecessary initial hurdles, we include a copy of this module 75 in the source. It will work as a fallback if the module isn't already 82 This module is required for testing only! If you don't plan on running 85 Notes on installing a Perl module 88 There are a number of ways to install a perl module. In all 93 for the module name and to install the package that comes up. 99 libtext-template-perl - perl module to process text templates 103 the name of the module in question, with "lib" prepended and [all …]
|
H A D | README-FIPS.md | 4 This release of OpenSSL includes a cryptographic module that can be 5 FIPS validated. The module is implemented as an OpenSSL provider. 6 A provider is essentially a dynamically loadable module which implements 10 A cryptographic module is only FIPS validated after it has gone through the complex 13 If you need a FIPS validated module then you must ONLY generate a FIPS provider 72 - Runs the FIPS module self tests 73 - Generates the so-called FIPS module configuration file containing information 74 about the module such as the module checksum (and for OpenSSL 3.0 the 77 The FIPS module must have the self tests run, and the FIPS module config file 165 Documentation about using the FIPS module is available on the [fips_module(7)] [all …]
|
/openssl/doc/designs/quic-design/ |
H A D | quic-overview.md | 56 A module that uses the Record Layer API to implement the inner TLS-1.3 62 This module creates frames from the application data obtained from 78 This module is consulted by the TX Packetizer and RX Frame Handler for flow 84 This module maintains statistics about a connection, most notably the estimated 111 The module is called by the TX Packetizer and the ACK Handling And 117 A module that tracks packets sent to the peer and received ACK frames. 123 The module also handles the receiving side - it schedules when ACK frames should 129 On server side this module is shared between multiple SSL connection objects 130 which makes it a special kind of module. It dispatches the received packets 133 _For client side and MVP this module just checks that the received packet has
|
H A D | stream-receive-buffers.md | 4 This is a QUIC specific module that retains the received stream data 76 The Receive Buffers module obtains the stream data via the ssl_queue_data() 79 The module uses ossl_qrx_pkt_wrap_up_ref() and ossl_qrx_pkt_wrap_release() 84 The Receive Buffers module provides an appropriate value for the Flow 85 Control module to send MAX_DATA and MAX_STREAM_DATA frames. Details 90 The Receive Buffers module needs to know whether it should stop holding
|
/openssl/doc/man5/ |
H A D | fips_config.pod | 10 is used to hold information about the FIPS module. This includes a digest 12 This data is used automatically by the module itself for two 20 run each time the module is used. 22 =item - Verify the module's checksum. 24 This is done each time the module is used. 29 used internally by the FIPS module during its initialization. 39 If present, the module is activated. The value assigned to this name is not 55 =item B<module-mac> 66 This should only be written after the module has 68 If this field is not present, then the self tests will run when the module [all …]
|
/openssl/doc/man7/ |
H A D | fips_module.pod | 5 fips_module - OpenSSL fips module guide 17 For information related to installing the FIPS module see 48 =head2 Making all applications use the FIPS module by default 51 use the FIPS module for cryptographic algorithms by default. 56 FIPS module without the need for any further code changes. 99 FIPS module config file that you installed earlier. 122 You may not want all applications to use the FIPS module. 125 FIPS module. 144 Usage of certain deprecated APIs avoids the use of the FIPS module. 399 =head2 Using Encoders and Decoders with the FIPS module [all …]
|
/openssl/doc/internal/man3/ |
H A D | ossl_provider_new.pod | 53 * If the Provider is a module, the module will be loaded 107 module. 161 ossl_provider_set_module_path() sets the module path to load the 162 provider module given the provider object I<prov>. 211 be located in that module, and called. 255 ossl_provider_module_name() returns the filename of the module, for 307 Locating a provider module happens as follows: 314 module path. 315 Otherwise, use the provider object's name as module path, with 323 with the module path. [all …]
|
H A D | ossl_provider_add_conf_module.pod | 5 ossl_provider_add_conf_module - internal standard configuration module 16 ossl_provider_add_conf_module() adds the standard configuration module
|
H A D | ossl_random_add_conf_module.pod | 5 ossl_random_add_conf_module - internal random configuration module 16 ossl_random_add_conf_module() adds the random configuration module
|
/openssl/demos/bio/ |
H A D | cmod.cnf | 1 # Example config module configuration 13 # SSL configuration module
|
/openssl/providers/ |
H A D | build.info | 19 # This is how a provider module should be linked: 96 # necessary information even if we don't build the module. This will allow 105 # This is the trigger to actually build the FIPS module. Without these 120 -module $(FIPSMODULE) -section_name fips_sect -key $(FIPSKEY) 136 IF[{- $disabled{module} -}] 147 # Become a module
|
/openssl/doc/man3/ |
H A D | OPENSSL_Applink.pod | 17 expected to implement it, but to compile provided module with 19 The referred module is available as F<applink.c>, located alongside
|
H A D | OPENSSL_load_builtin_modules.pod | 21 ASN1_add_oid_module() adds just the ASN1 OBJECT module. 23 ENGINE_add_conf_module() adds just the ENGINE configuration module.
|
H A D | CONF_modules_load_file.pod | 50 configuration modules are ignored. If not set the first module error is 64 If B<CONF_MFLAGS_NO_DSO> is set configuration module loading from DSOs is 91 failure. If module errors are not ignored the return code will reflect the 92 return value of the failing module (this will always be zero or negative).
|
/openssl/crypto/sm4/ |
H A D | build.info | 27 # separate module and it's dynamically linked with libcrypto. Otherwise, it 30 IF[{- !$disabled{module} && !$disabled{shared} -}]
|
/openssl/crypto/ |
H A D | provider_core.c | 156 DSO *module; member 744 DSO_free(prov->module); in ossl_provider_free() 894 if (prov->module == NULL) { in provider_init() 902 if ((prov->module = DSO_new()) == NULL) { in provider_init() 927 DSO_ctrl(prov->module, DSO_CTRL_SET_FLAGS, in provider_init() 939 DSO_free(prov->module); in provider_init() 940 prov->module = NULL; in provider_init() 948 if (prov->module == NULL) { in provider_init() 1578 return prov->module; in ossl_provider_dso() 1586 return DSO_get_filename(prov->module); in ossl_provider_module_name() [all …]
|
/openssl/test/recipes/30-test_defltfips/ |
H A D | fipsmodule.cnf | 7 module-mac = 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00…
|
/openssl/test/ |
H A D | provider_internal_test.cnf.in | 14 module = {- platform->dso('p_test') -}
|
H A D | pathed.cnf | 15 module = ../test/p_test.so
|
H A D | fips-alt.cnf | 10 # Ensure FIPS non-approved algorithms in the FIPS module are suppressed (e.g.
|