Home
last modified time | relevance | path

Searched refs:sequence (Results 1 – 25 of 91) sorted by relevance

1234

/openssl/doc/man1/
H A Dopenssl-nseq.pod.in6 openssl-nseq - create or examine a Netscape certificate sequence
20 sequence and prints out the certificates contained in it or takes a
22 sequence.
24 A Netscape certificate sequence is an old Netscape-specific format that
48 Normally a Netscape certificate sequence will be input and the output
50 situation is reversed: a Netscape certificate sequence is created from
59 Output the certificates in a Netscape certificate sequence
63 Create a Netscape certificate sequence
H A Dopenssl-speed.pod.in63 TLS-like sequence. And if I<algo> is a multi-buffer capable cipher, e.g.
101 Benchmark EVP-named AEAD cipher in TLS-like sequence.
/openssl/doc/man3/
H A DOSSL_IETF_ATTR_SYNTAX.pod40 An B<OSSL_IETF_ATTR_SYNTAX> object also holds a sequence of values.
42 sequence. OSSL_IETF_ATTR_SYNTAX_add1_value(), adds a copy of I<data> of a specified
43 I<type> to the sequence. The caller should free the I<data> after use.
46 in the sequence or NULL on error. If I<type> is not NULL, the type of the
49 The I<type> of the values stored in the B<OSSL_IETF_ATTR_SYNTAX> value sequence is
75 sequence or -1 on error.
H A DX509_LOOKUP_hash_dir.pod95 The .I<N> or .B<r>I<N> suffix is a sequence number that starts at zero, and is
98 Gaps in the sequence numbers are not supported, it is assumed that there are no
100 sequence.
110 sequence number greater than that of the already cached CRL.
/openssl/doc/designs/quic-design/
H A Dconnection-id-cache.md14 * select a connection ID by sequence number and retire that and all older IDs.
17 QUIC_CONNECTION object. The queue will be sorted by sequence number
37 * select a connection ID by sequence number and retire that and all older IDs
39 * select a connection ID by sequence number and drop that and all older IDs.
66 connection and the common sequence number. We need to be able to:
159 * sequence number.
166 * sequence number.
207 * sequence number.
214 * sequence number.
269 * Retire by sequence number up to and including the one specified.
[all …]
/openssl/ssl/record/methods/
H A Dtls_multib.c122 memcpy(aad, rl->sequence, 8); in tls_write_records_multiblock_int()
152 rl->sequence[7] += mb_param.interleave; in tls_write_records_multiblock_int()
153 if (rl->sequence[7] < mb_param.interleave) { in tls_write_records_multiblock_int()
155 while (j >= 0 && (++rl->sequence[j--]) == 0) ; in tls_write_records_multiblock_int()
H A Ddtls_meth.c44 const unsigned char *seq = rl->sequence; in dtls_record_replay_check()
66 const unsigned char *seq = rl->sequence; in dtls_record_bitmap_update()
345 memcpy(&(rl->sequence[2]), &(rdata->packet[5]), 6); in dtls_copy_rlayer_record()
439 memcpy(&(rl->sequence[2]), p, 6); in dtls_get_more_records()
709 || !WPACKET_memcpy(thispkt, &(rl->sequence[2]), 6) in dtls_prepare_record_header()
H A Dtls1_meth.c255 seq = rl->sequence; in tls1_cipher()
350 rl->sequence) <= 0) { in tls1_cipher()
467 unsigned char *seq = rl->sequence; in tls1_mac()
/openssl/crypto/x509/
H A Dx_attrib.c170 value = av->value.sequence->data; in ossl_print_attribute_value()
173 av->value.sequence->length); in ossl_print_attribute_value()
186 return ASN1_parse_dump(out, av->value.sequence->data, in ossl_print_attribute_value()
187 av->value.sequence->length, indent, 1) > 0; in ossl_print_attribute_value()
H A Dt_acert.c65 ASN1_parse_dump(bp, at->value.sequence->data, in print_attribute()
66 at->value.sequence->length, i, 1); in print_attribute()
H A Dx509_req.c136 p = ext->value.sequence->data; in STACK_OF()
138 ASN1_item_d2i(NULL, &p, ext->value.sequence->length, in STACK_OF()
H A Dx509cset.c68 r->sequence = i; in X509_CRL_sort()
/openssl/doc/man7/
H A Dpassphrase-encoding.pod64 A pass phrase encoded in ISO-8859-2 could very well have a sequence such as
70 A pass phrase that contains this kind of byte sequence will give a different
95 encoding was ISO-8859-1 (i.e. "naïve" resulting in the byte sequence 0x6E 0x61
97 is UTF-8 (i.e. "naïve" resulting in the byte sequence 0x6E 0x61 0xC3 0xAF 0x76
107 For other objects, it's as legitimate to use any byte sequence (such as a
108 sequence of bytes from F</dev/urandom> that's been saved away), which makes any
110 byte sequence as it is.
138 It's possible that its byte sequence is exactly right.
H A DEVP_KDF-PVKKDF.pod44 byte sequence.
H A DEVP_KDF-PBKDF1.pod54 byte sequence.
/openssl/crypto/asn1/
H A Da_type.c135 if (t == NULL || t->type != V_ASN1_SEQUENCE || t->value.sequence == NULL) in ASN1_TYPE_unpack_sequence()
137 return ASN1_item_unpack(t->value.sequence, it); in ASN1_TYPE_unpack_sequence()
H A Devp_asn1.c115 if ((a->type != V_ASN1_SEQUENCE) || (a->value.sequence == NULL)) { in ASN1_TYPE_get_int_octetstring()
171 if ((a->type != V_ASN1_SEQUENCE) || (a->value.sequence == NULL)) in ossl_asn1_type_get_octetstring_int()
/openssl/crypto/pkcs7/
H A Dpk7_attr.c51 p = cap->value.sequence->data; in STACK_OF()
53 ASN1_item_d2i(NULL, &p, cap->value.sequence->length, in STACK_OF()
/openssl/crypto/ts/
H A Dts_rsp_verify.c214 p = attr->value.sequence->data; in ossl_ess_get_signing_cert()
215 return d2i_ESS_SIGNING_CERT(NULL, &p, attr->value.sequence->length); in ossl_ess_get_signing_cert()
227 p = attr->value.sequence->data; in ossl_ess_get_signing_cert_v2()
228 return d2i_ESS_SIGNING_CERT_V2(NULL, &p, attr->value.sequence->length); in ossl_ess_get_signing_cert_v2()
/openssl/test/
H A Dtls13encryptiontest.c344 memcpy(wrl->sequence, seqbuf, sizeof(seqbuf)); in test_tls13_encryption()
367 memcpy(rrl->sequence, seqbuf, sizeof(seqbuf)); in test_tls13_encryption()
/openssl/crypto/cms/
H A Dcms_dh.c113 p = alg->parameter->value.sequence->data; in dh_cms_set_shared_info()
114 plen = alg->parameter->value.sequence->length; in dh_cms_set_shared_info()
H A Dcms_ec.c182 p = alg->parameter->value.sequence->data; in ecdh_cms_set_shared_info()
183 plen = alg->parameter->value.sequence->length; in ecdh_cms_set_shared_info()
/openssl/test/recipes/30-test_evp_data/
H A Devpciph_camellia.txt16 # For all ECB encrypts and decrypts, the transformed sequence is
119 # For all CBC encrypts and decrypts, the transformed sequence is
212 # For all CFB128 encrypts and decrypts, the transformed sequence is
418 # For all OFB encrypts and decrypts, the transformed sequence is
/openssl/crypto/evp/
H A Dp5_crpt.c46 param->value.sequence == NULL) { in PKCS5_PBE_keyivgen_ex()
/openssl/crypto/err/
H A DREADME.md36 The `BEGIN ERROR CODES` sequence is used by the error code

Completed in 28 milliseconds

1234