Home
last modified time | relevance | path

Searched refs:B (Results 101 – 125 of 911) sorted by relevance

12345678910>>...37

/openssl/doc/man3/
H A DPEM_read.pod30 type B<name>, any additional B<header> information, and the raw
31 B<data> of length B<len>.
46 the BIO B<bp>. The B<name> is the name to use in the marker, the
47 B<header> is the header value or NULL, and B<data> and B<len> specify
51 the B<d2i> function appropriate to the type B<name>; see L<d2i_X509(3)>
55 from the BIO B<bp>.
60 returned via B<data> and B<len> respectively.
61 The B<name>, B<header> and B<data> pointers are allocated via OPENSSL_malloc()
68 B<cinfo> argument and the B<header> returned via PEM_read() or PEM_read_bio().
79 The B<data> and B<len> arguments are those returned by the previous call to
[all …]
H A DRSA_public_encrypt.pod28 RSA_public_encrypt() encrypts the B<flen> bytes at B<from> (usually a
30 B<to>. B<to> must point to RSA_size(B<rsa>) bytes of memory.
32 B<padding> denotes one of the following modes:
55 B<flen> must not be more than RSA_size(B<rsa>) - 11 for the PKCS #1 v1.5
56 based padding modes, not more than RSA_size(B<rsa>) - 42 for
63 RSA_size(B<rsa>) bytes.
64 B<to> and B<from> may overlap.
66 RSA_private_decrypt() decrypts the B<flen> bytes at B<from> using the
67 private key B<rsa> and stores the plaintext in B<to>. B<flen> should
74 RSA_size(B<rsa>) - 42 for RSA_PKCS1_OAEP_PADDING).
[all …]
H A DEVP_PKEY_asn1_get_count.pod32 EVP_PKEY_asn1_get0() returns the public key ASN.1 method B<idx>.
36 EVP_PKEY_asn1_find() looks up the B<EVP_PKEY_ASN1_METHOD> with NID
37 B<type>.
38 If B<pe> isn't B<NULL>, then it will look up an engine implementing a
39 B<EVP_PKEY_ASN1_METHOD> for the NID B<type> and return that instead,
40 and also set B<*pe> to point at the engine that implements it.
43 type string B<str>.
44 Just like EVP_PKEY_asn1_find(), if B<pe> isn't B<NULL>, then it will
46 B<type> and return that instead, and also set B<*pe> to point at the
51 associated with the public key ASN.1 method B<*ameth>.
[all …]
H A DSSL_extension_supported.pod77 callbacks B<add_cb>, B<free_cb> and B<parse_cb> (see the
83 with extension type B<ext_type> and callbacks B<add_cb>, B<free_cb> and
86 B<context> value to:
92 with extension type B<ext_type> and callbacks B<add_cb>, B<free_cb> and
97 The B<ext_type> parameter corresponds to the B<extension_type> field of
114 set B<*out> to the extension data, set B<*outlen> to the length of the
143 If an extension is added (that is B<add_cb> returns 1) B<free_cb> is called
145 used to free up any dynamic extension data set by B<add_cb>. Since B<out> is
153 The extension data consists of B<inlen> bytes in the buffer B<in> for the
154 extension B<ext_type>.
[all …]
H A DBIO_ADDRINFO.pod39 The B<BIO_ADDRINFO> type is a wrapper for address information
42 B<BIO_ADDRINFO> normally forms a chain of several that can be
45 BIO_lookup_ex() looks up a specified B<host> and B<service>, and
47 be if B<host> is B<NULL>. B<family>, B<socktype> and B<protocol> are used to
53 used. B<res> points at a pointer to hold the start of a B<BIO_ADDRINFO>
56 For the family B<AF_UNIX>, BIO_lookup_ex() will ignore the B<service>
63 B<BIO_ADDRINFO>. The result will be one of the constants
67 B<BIO_ADDRINFO>. The result will be one of the constants
71 B<BIO_ADDRINFO>. The result will be one of the constants
74 BIO_ADDRINFO_address() returns the underlying B<BIO_ADDR>
[all …]
H A DX509_NAME_ENTRY_get_object.pod33 X509_NAME_ENTRY_get_object() retrieves the field name of B<ne> in
34 and B<ASN1_OBJECT> structure.
36 X509_NAME_ENTRY_get_data() retrieves the field value of B<ne> in
37 and B<ASN1_STRING> structure.
39 X509_NAME_ENTRY_set_object() sets the field name of B<ne> to B<obj>.
42 B<type> and value determined by B<bytes> and B<len>.
46 B<X509_NAME_ENTRY> structure.
51 used to examine an B<X509_NAME_ENTRY> function as returned by
57 are almost always part of B<X509_NAME> structures and the
58 corresponding B<X509_NAME> functions are typically used to
[all …]
H A DSSL_CONF_CTX_set_ssl_ctx.pod16 SSL_CONF_CTX_set_ssl_ctx() sets the context associated with B<cctx> to the
17 B<SSL_CTX> structure B<ctx>. Any previous B<SSL> or B<SSL_CTX> associated with
18 B<cctx> is cleared. Subsequent calls to SSL_CONF_cmd() will be sent to
19 B<ctx>.
21 SSL_CONF_CTX_set_ssl() sets the context associated with B<cctx> to the
22 B<SSL> structure B<ssl>. Any previous B<SSL> or B<SSL_CTX> associated with
23 B<cctx> is cleared. Subsequent calls to SSL_CONF_cmd() will be sent to
24 B<ssl>.
28 The context need not be set or it can be set to B<NULL> in which case only
H A DX509_get0_notBefore.pod31 X509_get0_notBefore() and X509_get0_notAfter() return the B<notBefore>
32 and B<notAfter> fields of certificate B<x> respectively. The value
41 X509_set1_notBefore() and X509_set1_notAfter() set the B<notBefore>
42 and B<notAfter> fields of B<x> to B<tm>. Ownership of the passed
43 parameter B<tm> is not transferred by these functions so it must
47 B<lastUpdate> and B<nextUpdate> fields of B<crl>. The value
49 the call. If the B<nextUpdate> field is absent from B<crl> then
50 B<NULL> is returned.
53 and B<nextUpdate> fields of B<crl> to B<tm>. Ownership of the passed parameter
60 return a pointer to an B<ASN1_TIME> structure.
[all …]
H A DCMS_add1_recipient_cert.pod28 B<originatorPrivKey> and originator certificate B<originator> to CMS_ContentInfo.
33 data structure B<cms> as a KeyTransRecipientInfo structure.
35 CMS_add0_recipient_key() adds symmetric key B<key> of length B<keylen> using
36 wrapping algorithm B<nid>, identifier B<id> of length B<idlen> and optional
37 values B<date>, B<otherTypeId> and B<otherType> to CMS_ContentInfo enveloped
38 data structure B<cms> as a KEKRecipientInfo structure.
41 CMS_encrypt() with the flag B<CMS_PARTIAL> set.
52 and serial number. If B<CMS_USE_KEYID> is set it will use the subject key
58 If B<nid> is set to B<NID_undef> then an AES wrap algorithm will be used
59 consistent with B<keylen>.
[all …]
H A DSSL_get_shared_sigalgs.pod22 algorithms supported by peer B<s>. The parameter B<idx> indicates the index
24 algorithm NID is written to B<*psign>, the hash NID to B<*phash> and the
25 sign and hash NID to B<*psignhash>. The raw signature and hash values
26 are written to B<*rsig> and B<*rhash>.
35 signature algorithms or B<0> if the B<idx> parameter is out of range.
45 signature algorithm it can just set B<idx> to zero.
47 Any or all of the parameters B<psign>, B<phash>, B<psignhash>, B<rsig> or
48 B<rhash> can be set to B<NULL> if the value is not required. By setting
49 them all to B<NULL> and setting B<idx> to zero the total number of
66 rsa(1) then B<*rhash> would be 4, B<*rsign> 1, B<*phash> NID_sha256, B<*psig>
[all …]
H A DCRYPTO_get_ex_new_index.pod71 and retrieved as a B<void *> type.
75 B<CRYPTO_EX_INDEX_APP> objects.
82 B<CRYPTO_EX_INDEX_xxx> values. The B<argl> and B<argp> parameters are saved
88 are called in increasing order of their B<index> value.
98 B<idx> parameter should be an already-created index value.
107 The B<class_index> identifies the structure type, the B<obj> is
139 for B<SSL>, B<SSL_SESSION>, B<EC_KEY> objects and B<BIO> chains via
140 BIO_dup_chain(). The B<to> and B<from> parameters
145 by the dup_func(), then both B<to> and B<from> will point to the same data.
146 The B<idx>, B<argl> and B<argp> parameters are as described for the other
[all …]
H A DX509_STORE_CTX_get_error.pod100 =item B<X509_V_OK: ok>
185 =item B<X509_V_ERR_OUT_OF_MEM: out of memory>
194 =item B<X509_V_ERR_SELF_SIGNED_CERT_IN_CHAIN:
247 =item B<X509_V_ERR_AKID_SKID_MISMATCH:
261 =item B<X509_V_ERR_KEYUSAGE_NO_CERTSIGN:
267 =item B<X509_V_ERR_INVALID_EXTENSION:
273 =item B<X509_V_ERR_INVALID_POLICY_EXTENSION:
301 =item B<X509_V_ERR_SUBTREE_MINMAX:
372 =item B<X509_V_ERR_PATH_LOOP: path loop>
449 in the B<X509_VERIFY_CTX> structure.
[all …]
H A DX509_VERIFY_PARAM_set_flags.pod88 X509_VERIFY_PARAM_clear_flags() clears the flags B<flags> in B<param>.
95 B<trust>.
105 policy set is cleared. The B<policies> parameter can be B<NULL> to clear
120 B<auth_level>.
145 is NUL-terminated, B<namelen> may be zero, otherwise B<namelen>
193 B<email>. If B<email> is NUL-terminated, B<emaillen> may be zero, otherwise
194 B<emaillen> must be set to the length of B<email>. When an email address
208 B<ipasc>. The B<ipasc> argument is a NUL-terminal ASCII string:
268 B<X509_V_FLAG_EXPLICIT_POLICY>, B<X509_V_FLAG_INHIBIT_ANY> and
269 B<X509_V_FLAG_INHIBIT_MAP> set the B<require explicit policy>, B<inhibit any
[all …]
H A Dd2i_RSAPrivateKey.pod118 instead of the B<d2i> functions and L<OSSL_ENCODER(3)> instead of the B<i2d>
138 B<d2i_I<TYPE>params>() and derivates thereof decode DER encoded B<I<TYPE>>
141 B<d2i_I<TYPE>_PUBKEY>() and derivates thereof decode DER encoded B<I<TYPE>>
150 B<i2d_I<TYPE>params>() and derivates thereof encode the B<I<TYPE>> key
154 B<I<TYPE>> data into a DER encoded B<SubjectPublicKeyInfo> structure.
195 =head3 Migrating B<i2d> functions to B<OSSL_ENCODER>
252 The letters B<i> and B<d> in B<i2d_I<TYPE>>() stand for
259 populated B<I<TYPE>> structure -- it B<cannot> simply be fed with an
278 =item B<DSA_PUBKEY>
282 =item B<DSAPublicKey>, B<DSAPrivateKey>
[all …]
/openssl/doc/man1/
H A Dopenssl-prime.pod.in10 B<openssl prime>
11 [B<-help>]
12 [B<-hex>]
13 [B<-generate>]
14 [B<-bits> I<num>]
15 [B<-safe>]
17 [B<-checks> I<num>]
32 =item B<-help>
36 =item B<-hex>
40 =item B<-generate>
[all …]
H A Dopenssl-engine.pod.in11 [B<-help>]
12 [B<-v>]
13 [B<-vv>]
14 [B<-vvv>]
15 [B<-vvvv>]
16 [B<-c>]
17 [B<-t>]
18 [B<-tt>]
40 =item B<-v> B<-vv> B<-vvv> B<-vvvv>
47 =item B<-c>
[all …]
H A Dopenssl-fipsinstall.pod.in10 B<openssl fipsinstall>
11 [B<-help>]
17 [B<-verify>]
19 [B<-macopt> I<nm>:I<v>]
20 [B<-noout>]
21 [B<-quiet>]
24 [B<-self_test_onload>]
76 =item B<-help>
95 =item B<-verify>
154 =item B<-noout>
[all …]
H A Dopenssl-pkeyparam.pod.in14 B<openssl> B<pkeyparam>
15 [B<-help>]
16 [B<-in> I<filename>]
17 [B<-out> I<filename>]
18 [B<-text>]
19 [B<-noout>]
20 [B<-check>]
32 =item B<-help>
46 =item B<-text>
50 =item B<-noout>
[all …]
H A Dopenssl-rehash.pod.in14 B<openssl>
15 B<rehash>
16 [B<-h>]
17 [B<-help>]
18 [B<-old>]
20 [B<-n>]
21 [B<-v>]
26 [B<-h>]
29 [B<-n>]
30 [B<-v>]
[all …]
/openssl/test/recipes/04-test_pem_reading_data/
H A Dcert-onecolumn.pem30 B
41 B
56 B
58 B
62 B
72 B
80 B
88 B
92 B
108 B
[all …]
/openssl/doc/internal/man3/
H A DOSSL_TIME.pod59 B<ossl_time_zero> returns the smallest representable B<OSSL_TIME>.
63 B<ossl_time_infinite> returns the largest representable B<OSSL_TIME>.
85 If the difference would be negative, B<0> is returned.
96 B<ossl_time_min> returns the lesser of two time values.
98 B<ossl_time_max> returns the greater of two time values.
108 B<ossl_time_zero> returns the time of the Epoch.
110 B<ossl_time_infinite> returns the last representable time.
112 B<ossl_ticks2time> return the duration specified.
114 B<ossl_time2ticks> returns the ticks since Epoch.
118 B<ossl_time_add> returns the summation of the two times or
[all …]
/openssl/doc/internal/man7/
H A DVERSION.pod25 =item B<MAJOR>, B<MINOR>, B<PATCH>
29 B<OPENSSL_VERSION_MINOR>, B<OPENSSL_VERSION_PACTH>.
31 =item B<PRE_RELEASE_TAG>
34 a dash. For a value C<foo>, the C macro B<OPENSSL_VERSION_PRE_RELEASE> gets
37 =item B<BUILD_METADATA>
44 =item B<RELEASE_DATE>
48 =item B<SHLIB_VERSION>
54 It is a configuration error if B<MAJOR>, B<MINOR>, B<PATCH> and B<SHLIB_VERSION>
65 These items get their values from B<MAJOR>, B<MINOR>, B<PATCH>, and
66 B<SHLIB_VERSION>, respectively.
[all …]
/openssl/doc/man7/
H A DEVP_RAND-HMAC-DRBG.pod10 B<EVP_RAND> API.
23 =item "state" (B<OSSL_RAND_PARAM_STATE>) <integer>
25 =item "strength" (B<OSSL_RAND_PARAM_STRENGTH>) <unsigned integer>
27 =item "max_request" (B<OSSL_RAND_PARAM_MAX_REQUEST>) <unsigned integer>
37 =item "min_noncelen" (B<OSSL_DRBG_PARAM_MIN_NONCELEN>) <unsigned integer>
41 =item "max_perslen" (B<OSSL_DRBG_PARAM_MAX_PERSLEN>) <unsigned integer>
43 =item "max_adinlen" (B<OSSL_DRBG_PARAM_MAX_ADINLEN>) <unsigned integer>
47 =item "properties" (B<OSSL_DRBG_PARAM_PROPERTIES>) <UTF8 string>
49 =item "mac" (B<OSSL_DRBG_PARAM_MAC>) <UTF8 string>
51 =item "digest" (B<OSSL_DRBG_PARAM_DIGEST>) <UTF8 string>
[all …]
/openssl/doc/man5/
H A Dx509v3_config.pod111 B<FALSE>. If B<CA> is B<TRUE> then an optional B<pathlen> name followed by a
177 If the value is the word B<hash>, or by default for the B<x509>, B<req>, and
193 Otherwise it may have the value B<keyid> or B<issuer>
198 By default the B<x509>, B<req>, and B<ca> apps behave as if B<none> was given
436 This section can include B<explicitText>, B<organization>, and B<noticeNumbers>
460 value with B<UTF8>, B<BMP>, or B<VISIBLE> followed by colon. For example:
486 begin with the word B<permitted> or B<excluded> followed by a B<;>. The rest of
488 B<email:copy>
531 B<nsRevocationUrl>, B<nsCaRevocationUrl>, B<nsRenewalUrl>, B<nsCaPolicyUrl>
541 Acceptable values for nsCertType are: B<client>, B<server>, B<email>,
[all …]
/openssl/fuzz/corpora/conf/
H A D101927e91da6659fe411c2ab987618972ccbd6e5102 !B=$
126 !B=$
130 !B=
146 !B=$
185 1B::=`
422 !B::=
864 !B=
869 !B=
968 !B=!
999 !B=$
[all …]

Completed in 107 milliseconds

12345678910>>...37