/openssl/doc/man1/ |
H A D | openssl-nseq.pod.in | 6 openssl-nseq - create or examine a Netscape certificate sequence 20 sequence and prints out the certificates contained in it or takes a 22 sequence. 24 A Netscape certificate sequence is an old Netscape-specific format that 48 Normally a Netscape certificate sequence will be input and the output 50 situation is reversed: a Netscape certificate sequence is created from 59 Output the certificates in a Netscape certificate sequence 63 Create a Netscape certificate sequence
|
H A D | openssl-speed.pod.in | 63 TLS-like sequence. And if I<algo> is a multi-buffer capable cipher, e.g. 101 Benchmark EVP-named AEAD cipher in TLS-like sequence.
|
/openssl/doc/man3/ |
H A D | OSSL_IETF_ATTR_SYNTAX.pod | 40 An B<OSSL_IETF_ATTR_SYNTAX> object also holds a sequence of values. 42 sequence. OSSL_IETF_ATTR_SYNTAX_add1_value(), adds a copy of I<data> of a specified 43 I<type> to the sequence. The caller should free the I<data> after use. 46 in the sequence or NULL on error. If I<type> is not NULL, the type of the 49 The I<type> of the values stored in the B<OSSL_IETF_ATTR_SYNTAX> value sequence is 75 sequence or -1 on error.
|
H A D | X509_LOOKUP_hash_dir.pod | 95 The .I<N> or .B<r>I<N> suffix is a sequence number that starts at zero, and is 98 Gaps in the sequence numbers are not supported, it is assumed that there are no 100 sequence. 110 sequence number greater than that of the already cached CRL.
|
/openssl/doc/designs/quic-design/ |
H A D | connection-id-cache.md | 14 * select a connection ID by sequence number and retire that and all older IDs. 17 QUIC_CONNECTION object. The queue will be sorted by sequence number 37 * select a connection ID by sequence number and retire that and all older IDs 39 * select a connection ID by sequence number and drop that and all older IDs. 66 connection and the common sequence number. We need to be able to: 159 * sequence number. 166 * sequence number. 207 * sequence number. 214 * sequence number. 269 * Retire by sequence number up to and including the one specified. [all …]
|
/openssl/ssl/record/methods/ |
H A D | tls_multib.c | 122 memcpy(aad, rl->sequence, 8); in tls_write_records_multiblock_int() 152 rl->sequence[7] += mb_param.interleave; in tls_write_records_multiblock_int() 153 if (rl->sequence[7] < mb_param.interleave) { in tls_write_records_multiblock_int() 155 while (j >= 0 && (++rl->sequence[j--]) == 0) ; in tls_write_records_multiblock_int()
|
H A D | dtls_meth.c | 44 const unsigned char *seq = rl->sequence; in dtls_record_replay_check() 66 const unsigned char *seq = rl->sequence; in dtls_record_bitmap_update() 345 memcpy(&(rl->sequence[2]), &(rdata->packet[5]), 6); in dtls_copy_rlayer_record() 439 memcpy(&(rl->sequence[2]), p, 6); in dtls_get_more_records() 709 || !WPACKET_memcpy(thispkt, &(rl->sequence[2]), 6) in dtls_prepare_record_header()
|
H A D | tls1_meth.c | 255 seq = rl->sequence; in tls1_cipher() 350 rl->sequence) <= 0) { in tls1_cipher() 467 unsigned char *seq = rl->sequence; in tls1_mac()
|
/openssl/crypto/x509/ |
H A D | x_attrib.c | 170 value = av->value.sequence->data; in ossl_print_attribute_value() 173 av->value.sequence->length); in ossl_print_attribute_value() 186 return ASN1_parse_dump(out, av->value.sequence->data, in ossl_print_attribute_value() 187 av->value.sequence->length, indent, 1) > 0; in ossl_print_attribute_value()
|
H A D | t_acert.c | 65 ASN1_parse_dump(bp, at->value.sequence->data, in print_attribute() 66 at->value.sequence->length, i, 1); in print_attribute()
|
H A D | x509_req.c | 136 p = ext->value.sequence->data; in STACK_OF() 138 ASN1_item_d2i(NULL, &p, ext->value.sequence->length, in STACK_OF()
|
H A D | x509cset.c | 68 r->sequence = i; in X509_CRL_sort()
|
/openssl/doc/man7/ |
H A D | passphrase-encoding.pod | 64 A pass phrase encoded in ISO-8859-2 could very well have a sequence such as 70 A pass phrase that contains this kind of byte sequence will give a different 95 encoding was ISO-8859-1 (i.e. "naïve" resulting in the byte sequence 0x6E 0x61 97 is UTF-8 (i.e. "naïve" resulting in the byte sequence 0x6E 0x61 0xC3 0xAF 0x76 107 For other objects, it's as legitimate to use any byte sequence (such as a 108 sequence of bytes from F</dev/urandom> that's been saved away), which makes any 110 byte sequence as it is. 138 It's possible that its byte sequence is exactly right.
|
H A D | EVP_KDF-PVKKDF.pod | 44 byte sequence.
|
H A D | EVP_KDF-PBKDF1.pod | 54 byte sequence.
|
/openssl/crypto/asn1/ |
H A D | a_type.c | 135 if (t == NULL || t->type != V_ASN1_SEQUENCE || t->value.sequence == NULL) in ASN1_TYPE_unpack_sequence() 137 return ASN1_item_unpack(t->value.sequence, it); in ASN1_TYPE_unpack_sequence()
|
H A D | evp_asn1.c | 115 if ((a->type != V_ASN1_SEQUENCE) || (a->value.sequence == NULL)) { in ASN1_TYPE_get_int_octetstring() 171 if ((a->type != V_ASN1_SEQUENCE) || (a->value.sequence == NULL)) in ossl_asn1_type_get_octetstring_int()
|
/openssl/crypto/pkcs7/ |
H A D | pk7_attr.c | 51 p = cap->value.sequence->data; in STACK_OF() 53 ASN1_item_d2i(NULL, &p, cap->value.sequence->length, in STACK_OF()
|
/openssl/crypto/ts/ |
H A D | ts_rsp_verify.c | 214 p = attr->value.sequence->data; in ossl_ess_get_signing_cert() 215 return d2i_ESS_SIGNING_CERT(NULL, &p, attr->value.sequence->length); in ossl_ess_get_signing_cert() 227 p = attr->value.sequence->data; in ossl_ess_get_signing_cert_v2() 228 return d2i_ESS_SIGNING_CERT_V2(NULL, &p, attr->value.sequence->length); in ossl_ess_get_signing_cert_v2()
|
/openssl/test/ |
H A D | tls13encryptiontest.c | 344 memcpy(wrl->sequence, seqbuf, sizeof(seqbuf)); in test_tls13_encryption() 367 memcpy(rrl->sequence, seqbuf, sizeof(seqbuf)); in test_tls13_encryption()
|
/openssl/crypto/cms/ |
H A D | cms_dh.c | 113 p = alg->parameter->value.sequence->data; in dh_cms_set_shared_info() 114 plen = alg->parameter->value.sequence->length; in dh_cms_set_shared_info()
|
H A D | cms_ec.c | 182 p = alg->parameter->value.sequence->data; in ecdh_cms_set_shared_info() 183 plen = alg->parameter->value.sequence->length; in ecdh_cms_set_shared_info()
|
/openssl/test/recipes/30-test_evp_data/ |
H A D | evpciph_camellia.txt | 16 # For all ECB encrypts and decrypts, the transformed sequence is 119 # For all CBC encrypts and decrypts, the transformed sequence is 212 # For all CFB128 encrypts and decrypts, the transformed sequence is 418 # For all OFB encrypts and decrypts, the transformed sequence is
|
/openssl/crypto/evp/ |
H A D | p5_crpt.c | 46 param->value.sequence == NULL) { in PKCS5_PBE_keyivgen_ex()
|
/openssl/crypto/err/ |
H A D | README.md | 36 The `BEGIN ERROR CODES` sequence is used by the error code
|