/openssl/doc/man3/ |
H A D | PEM_read.pod | 30 type B<name>, any additional B<header> information, and the raw 31 B<data> of length B<len>. 46 the BIO B<bp>. The B<name> is the name to use in the marker, the 47 B<header> is the header value or NULL, and B<data> and B<len> specify 51 the B<d2i> function appropriate to the type B<name>; see L<d2i_X509(3)> 55 from the BIO B<bp>. 60 returned via B<data> and B<len> respectively. 61 The B<name>, B<header> and B<data> pointers are allocated via OPENSSL_malloc() 68 B<cinfo> argument and the B<header> returned via PEM_read() or PEM_read_bio(). 79 The B<data> and B<len> arguments are those returned by the previous call to [all …]
|
H A D | RSA_public_encrypt.pod | 28 RSA_public_encrypt() encrypts the B<flen> bytes at B<from> (usually a 30 B<to>. B<to> must point to RSA_size(B<rsa>) bytes of memory. 32 B<padding> denotes one of the following modes: 55 B<flen> must not be more than RSA_size(B<rsa>) - 11 for the PKCS #1 v1.5 56 based padding modes, not more than RSA_size(B<rsa>) - 42 for 63 RSA_size(B<rsa>) bytes. 64 B<to> and B<from> may overlap. 66 RSA_private_decrypt() decrypts the B<flen> bytes at B<from> using the 67 private key B<rsa> and stores the plaintext in B<to>. B<flen> should 74 RSA_size(B<rsa>) - 42 for RSA_PKCS1_OAEP_PADDING). [all …]
|
H A D | EVP_PKEY_asn1_get_count.pod | 32 EVP_PKEY_asn1_get0() returns the public key ASN.1 method B<idx>. 36 EVP_PKEY_asn1_find() looks up the B<EVP_PKEY_ASN1_METHOD> with NID 37 B<type>. 38 If B<pe> isn't B<NULL>, then it will look up an engine implementing a 39 B<EVP_PKEY_ASN1_METHOD> for the NID B<type> and return that instead, 40 and also set B<*pe> to point at the engine that implements it. 43 type string B<str>. 44 Just like EVP_PKEY_asn1_find(), if B<pe> isn't B<NULL>, then it will 46 B<type> and return that instead, and also set B<*pe> to point at the 51 associated with the public key ASN.1 method B<*ameth>. [all …]
|
H A D | SSL_extension_supported.pod | 77 callbacks B<add_cb>, B<free_cb> and B<parse_cb> (see the 83 with extension type B<ext_type> and callbacks B<add_cb>, B<free_cb> and 86 B<context> value to: 92 with extension type B<ext_type> and callbacks B<add_cb>, B<free_cb> and 97 The B<ext_type> parameter corresponds to the B<extension_type> field of 114 set B<*out> to the extension data, set B<*outlen> to the length of the 143 If an extension is added (that is B<add_cb> returns 1) B<free_cb> is called 145 used to free up any dynamic extension data set by B<add_cb>. Since B<out> is 153 The extension data consists of B<inlen> bytes in the buffer B<in> for the 154 extension B<ext_type>. [all …]
|
H A D | BIO_ADDRINFO.pod | 39 The B<BIO_ADDRINFO> type is a wrapper for address information 42 B<BIO_ADDRINFO> normally forms a chain of several that can be 45 BIO_lookup_ex() looks up a specified B<host> and B<service>, and 47 be if B<host> is B<NULL>. B<family>, B<socktype> and B<protocol> are used to 53 used. B<res> points at a pointer to hold the start of a B<BIO_ADDRINFO> 56 For the family B<AF_UNIX>, BIO_lookup_ex() will ignore the B<service> 63 B<BIO_ADDRINFO>. The result will be one of the constants 67 B<BIO_ADDRINFO>. The result will be one of the constants 71 B<BIO_ADDRINFO>. The result will be one of the constants 74 BIO_ADDRINFO_address() returns the underlying B<BIO_ADDR> [all …]
|
H A D | X509_NAME_ENTRY_get_object.pod | 33 X509_NAME_ENTRY_get_object() retrieves the field name of B<ne> in 34 and B<ASN1_OBJECT> structure. 36 X509_NAME_ENTRY_get_data() retrieves the field value of B<ne> in 37 and B<ASN1_STRING> structure. 39 X509_NAME_ENTRY_set_object() sets the field name of B<ne> to B<obj>. 42 B<type> and value determined by B<bytes> and B<len>. 46 B<X509_NAME_ENTRY> structure. 51 used to examine an B<X509_NAME_ENTRY> function as returned by 57 are almost always part of B<X509_NAME> structures and the 58 corresponding B<X509_NAME> functions are typically used to [all …]
|
H A D | SSL_CONF_CTX_set_ssl_ctx.pod | 16 SSL_CONF_CTX_set_ssl_ctx() sets the context associated with B<cctx> to the 17 B<SSL_CTX> structure B<ctx>. Any previous B<SSL> or B<SSL_CTX> associated with 18 B<cctx> is cleared. Subsequent calls to SSL_CONF_cmd() will be sent to 19 B<ctx>. 21 SSL_CONF_CTX_set_ssl() sets the context associated with B<cctx> to the 22 B<SSL> structure B<ssl>. Any previous B<SSL> or B<SSL_CTX> associated with 23 B<cctx> is cleared. Subsequent calls to SSL_CONF_cmd() will be sent to 24 B<ssl>. 28 The context need not be set or it can be set to B<NULL> in which case only
|
H A D | X509_get0_notBefore.pod | 31 X509_get0_notBefore() and X509_get0_notAfter() return the B<notBefore> 32 and B<notAfter> fields of certificate B<x> respectively. The value 41 X509_set1_notBefore() and X509_set1_notAfter() set the B<notBefore> 42 and B<notAfter> fields of B<x> to B<tm>. Ownership of the passed 43 parameter B<tm> is not transferred by these functions so it must 47 B<lastUpdate> and B<nextUpdate> fields of B<crl>. The value 49 the call. If the B<nextUpdate> field is absent from B<crl> then 50 B<NULL> is returned. 53 and B<nextUpdate> fields of B<crl> to B<tm>. Ownership of the passed parameter 60 return a pointer to an B<ASN1_TIME> structure. [all …]
|
H A D | CMS_add1_recipient_cert.pod | 28 B<originatorPrivKey> and originator certificate B<originator> to CMS_ContentInfo. 33 data structure B<cms> as a KeyTransRecipientInfo structure. 35 CMS_add0_recipient_key() adds symmetric key B<key> of length B<keylen> using 36 wrapping algorithm B<nid>, identifier B<id> of length B<idlen> and optional 37 values B<date>, B<otherTypeId> and B<otherType> to CMS_ContentInfo enveloped 38 data structure B<cms> as a KEKRecipientInfo structure. 41 CMS_encrypt() with the flag B<CMS_PARTIAL> set. 52 and serial number. If B<CMS_USE_KEYID> is set it will use the subject key 58 If B<nid> is set to B<NID_undef> then an AES wrap algorithm will be used 59 consistent with B<keylen>. [all …]
|
H A D | SSL_get_shared_sigalgs.pod | 22 algorithms supported by peer B<s>. The parameter B<idx> indicates the index 24 algorithm NID is written to B<*psign>, the hash NID to B<*phash> and the 25 sign and hash NID to B<*psignhash>. The raw signature and hash values 26 are written to B<*rsig> and B<*rhash>. 35 signature algorithms or B<0> if the B<idx> parameter is out of range. 45 signature algorithm it can just set B<idx> to zero. 47 Any or all of the parameters B<psign>, B<phash>, B<psignhash>, B<rsig> or 48 B<rhash> can be set to B<NULL> if the value is not required. By setting 49 them all to B<NULL> and setting B<idx> to zero the total number of 66 rsa(1) then B<*rhash> would be 4, B<*rsign> 1, B<*phash> NID_sha256, B<*psig> [all …]
|
H A D | CRYPTO_get_ex_new_index.pod | 71 and retrieved as a B<void *> type. 75 B<CRYPTO_EX_INDEX_APP> objects. 82 B<CRYPTO_EX_INDEX_xxx> values. The B<argl> and B<argp> parameters are saved 88 are called in increasing order of their B<index> value. 98 B<idx> parameter should be an already-created index value. 107 The B<class_index> identifies the structure type, the B<obj> is 139 for B<SSL>, B<SSL_SESSION>, B<EC_KEY> objects and B<BIO> chains via 140 BIO_dup_chain(). The B<to> and B<from> parameters 145 by the dup_func(), then both B<to> and B<from> will point to the same data. 146 The B<idx>, B<argl> and B<argp> parameters are as described for the other [all …]
|
H A D | X509_STORE_CTX_get_error.pod | 100 =item B<X509_V_OK: ok> 185 =item B<X509_V_ERR_OUT_OF_MEM: out of memory> 194 =item B<X509_V_ERR_SELF_SIGNED_CERT_IN_CHAIN: 247 =item B<X509_V_ERR_AKID_SKID_MISMATCH: 261 =item B<X509_V_ERR_KEYUSAGE_NO_CERTSIGN: 267 =item B<X509_V_ERR_INVALID_EXTENSION: 273 =item B<X509_V_ERR_INVALID_POLICY_EXTENSION: 301 =item B<X509_V_ERR_SUBTREE_MINMAX: 372 =item B<X509_V_ERR_PATH_LOOP: path loop> 449 in the B<X509_VERIFY_CTX> structure. [all …]
|
H A D | X509_VERIFY_PARAM_set_flags.pod | 88 X509_VERIFY_PARAM_clear_flags() clears the flags B<flags> in B<param>. 95 B<trust>. 105 policy set is cleared. The B<policies> parameter can be B<NULL> to clear 120 B<auth_level>. 145 is NUL-terminated, B<namelen> may be zero, otherwise B<namelen> 193 B<email>. If B<email> is NUL-terminated, B<emaillen> may be zero, otherwise 194 B<emaillen> must be set to the length of B<email>. When an email address 208 B<ipasc>. The B<ipasc> argument is a NUL-terminal ASCII string: 268 B<X509_V_FLAG_EXPLICIT_POLICY>, B<X509_V_FLAG_INHIBIT_ANY> and 269 B<X509_V_FLAG_INHIBIT_MAP> set the B<require explicit policy>, B<inhibit any [all …]
|
H A D | d2i_RSAPrivateKey.pod | 118 instead of the B<d2i> functions and L<OSSL_ENCODER(3)> instead of the B<i2d> 138 B<d2i_I<TYPE>params>() and derivates thereof decode DER encoded B<I<TYPE>> 141 B<d2i_I<TYPE>_PUBKEY>() and derivates thereof decode DER encoded B<I<TYPE>> 150 B<i2d_I<TYPE>params>() and derivates thereof encode the B<I<TYPE>> key 154 B<I<TYPE>> data into a DER encoded B<SubjectPublicKeyInfo> structure. 195 =head3 Migrating B<i2d> functions to B<OSSL_ENCODER> 252 The letters B<i> and B<d> in B<i2d_I<TYPE>>() stand for 259 populated B<I<TYPE>> structure -- it B<cannot> simply be fed with an 278 =item B<DSA_PUBKEY> 282 =item B<DSAPublicKey>, B<DSAPrivateKey> [all …]
|
/openssl/doc/man1/ |
H A D | openssl-prime.pod.in | 10 B<openssl prime> 11 [B<-help>] 12 [B<-hex>] 13 [B<-generate>] 14 [B<-bits> I<num>] 15 [B<-safe>] 17 [B<-checks> I<num>] 32 =item B<-help> 36 =item B<-hex> 40 =item B<-generate> [all …]
|
H A D | openssl-engine.pod.in | 11 [B<-help>] 12 [B<-v>] 13 [B<-vv>] 14 [B<-vvv>] 15 [B<-vvvv>] 16 [B<-c>] 17 [B<-t>] 18 [B<-tt>] 40 =item B<-v> B<-vv> B<-vvv> B<-vvvv> 47 =item B<-c> [all …]
|
H A D | openssl-fipsinstall.pod.in | 10 B<openssl fipsinstall> 11 [B<-help>] 17 [B<-verify>] 19 [B<-macopt> I<nm>:I<v>] 20 [B<-noout>] 21 [B<-quiet>] 24 [B<-self_test_onload>] 76 =item B<-help> 95 =item B<-verify> 154 =item B<-noout> [all …]
|
H A D | openssl-pkeyparam.pod.in | 14 B<openssl> B<pkeyparam> 15 [B<-help>] 16 [B<-in> I<filename>] 17 [B<-out> I<filename>] 18 [B<-text>] 19 [B<-noout>] 20 [B<-check>] 32 =item B<-help> 46 =item B<-text> 50 =item B<-noout> [all …]
|
H A D | openssl-rehash.pod.in | 14 B<openssl> 15 B<rehash> 16 [B<-h>] 17 [B<-help>] 18 [B<-old>] 20 [B<-n>] 21 [B<-v>] 26 [B<-h>] 29 [B<-n>] 30 [B<-v>] [all …]
|
/openssl/test/recipes/04-test_pem_reading_data/ |
H A D | cert-onecolumn.pem | 30 B 41 B 56 B 58 B 62 B 72 B 80 B 88 B 92 B 108 B [all …]
|
/openssl/doc/internal/man3/ |
H A D | OSSL_TIME.pod | 59 B<ossl_time_zero> returns the smallest representable B<OSSL_TIME>. 63 B<ossl_time_infinite> returns the largest representable B<OSSL_TIME>. 85 If the difference would be negative, B<0> is returned. 96 B<ossl_time_min> returns the lesser of two time values. 98 B<ossl_time_max> returns the greater of two time values. 108 B<ossl_time_zero> returns the time of the Epoch. 110 B<ossl_time_infinite> returns the last representable time. 112 B<ossl_ticks2time> return the duration specified. 114 B<ossl_time2ticks> returns the ticks since Epoch. 118 B<ossl_time_add> returns the summation of the two times or [all …]
|
/openssl/doc/internal/man7/ |
H A D | VERSION.pod | 25 =item B<MAJOR>, B<MINOR>, B<PATCH> 29 B<OPENSSL_VERSION_MINOR>, B<OPENSSL_VERSION_PACTH>. 31 =item B<PRE_RELEASE_TAG> 34 a dash. For a value C<foo>, the C macro B<OPENSSL_VERSION_PRE_RELEASE> gets 37 =item B<BUILD_METADATA> 44 =item B<RELEASE_DATE> 48 =item B<SHLIB_VERSION> 54 It is a configuration error if B<MAJOR>, B<MINOR>, B<PATCH> and B<SHLIB_VERSION> 65 These items get their values from B<MAJOR>, B<MINOR>, B<PATCH>, and 66 B<SHLIB_VERSION>, respectively. [all …]
|
/openssl/doc/man7/ |
H A D | EVP_RAND-HMAC-DRBG.pod | 10 B<EVP_RAND> API. 23 =item "state" (B<OSSL_RAND_PARAM_STATE>) <integer> 25 =item "strength" (B<OSSL_RAND_PARAM_STRENGTH>) <unsigned integer> 27 =item "max_request" (B<OSSL_RAND_PARAM_MAX_REQUEST>) <unsigned integer> 37 =item "min_noncelen" (B<OSSL_DRBG_PARAM_MIN_NONCELEN>) <unsigned integer> 41 =item "max_perslen" (B<OSSL_DRBG_PARAM_MAX_PERSLEN>) <unsigned integer> 43 =item "max_adinlen" (B<OSSL_DRBG_PARAM_MAX_ADINLEN>) <unsigned integer> 47 =item "properties" (B<OSSL_DRBG_PARAM_PROPERTIES>) <UTF8 string> 49 =item "mac" (B<OSSL_DRBG_PARAM_MAC>) <UTF8 string> 51 =item "digest" (B<OSSL_DRBG_PARAM_DIGEST>) <UTF8 string> [all …]
|
/openssl/doc/man5/ |
H A D | x509v3_config.pod | 111 B<FALSE>. If B<CA> is B<TRUE> then an optional B<pathlen> name followed by a 177 If the value is the word B<hash>, or by default for the B<x509>, B<req>, and 193 Otherwise it may have the value B<keyid> or B<issuer> 198 By default the B<x509>, B<req>, and B<ca> apps behave as if B<none> was given 436 This section can include B<explicitText>, B<organization>, and B<noticeNumbers> 460 value with B<UTF8>, B<BMP>, or B<VISIBLE> followed by colon. For example: 486 begin with the word B<permitted> or B<excluded> followed by a B<;>. The rest of 488 B<email:copy> 531 B<nsRevocationUrl>, B<nsCaRevocationUrl>, B<nsRenewalUrl>, B<nsCaPolicyUrl> 541 Acceptable values for nsCertType are: B<client>, B<server>, B<email>, [all …]
|
/openssl/fuzz/corpora/conf/ |
H A D | 101927e91da6659fe411c2ab987618972ccbd6e5 | 102 !B=$ 126 !B=$ 130 !B= 146 !B=$ 185 1B::=` 422 !B::= 864 !B= 869 !B= 968 !B=! 999 !B=$ [all …]
|