/openssl/doc/man3/ |
H A D | OPENSSL_hexchar2int.pod | 29 resulting string of bytes in the given I<buf>. 30 The character I<sep> is the separator between the bytes, setting this to '\0' 32 I<buf_n> gives the size of the buffer. 33 If I<buflen> is not NULL, it is filled in with the result length. 35 for I<buf>. 45 OPENSSL_buf2hexstr_ex() encodes the contents of the given I<buf> with 46 length I<buflen> and places the resulting hexadecimal character string 47 in the given I<str>. 50 I<str_n> gives the size of the of the string buffer. 51 If I<strlength> is not NULL, it is filled in with the result length. [all …]
|
H A D | OSSL_STORE_open.pod | 66 OSSL_STORE_open_ex() takes a uri or path I<uri>, password UI method 67 I<ui_method> with associated data I<ui_data>, and post processing 68 callback I<post_process> with associated data I<post_process_data>, 69 a library context I<libctx> with an associated property query I<propq>, 72 The given I<ui_method> and I<ui_data> will be reused by all 77 The given I<post_process> and I<post_process_data> will be reused by 79 The I<post_process> function drops values by returning NULL, which 85 the I<params>, the library context I<libctx> and property query I<propq>. 110 OSSL_STORE_delete() deletes the object identified by I<uri>. 123 If I<ctx> is NULL it does nothing. [all …]
|
H A D | OSSL_CMP_exec_certreq.pod | 63 from the I<ctx>. See L<OSSL_CMP_CTX_new(3)> etc. for details. 81 by the I<req_type> parameter, which may be IR, CR, P10CR, or KUR. 84 Typically I<crm> is NULL, then the template ingredients are taken from I<ctx> 95 constructed as stated above using the I<req_type> and optional I<crm> parameter. 98 unless the I<req_type> argument is < 0, which aborts the request. 156 When the I<newWithOld> and I<oldWithNew> output parameters are not NULL, 169 with infoType crls. It uses I<last_crl> and I<crlcert> to create 171 On success it assigns to I<*crl> the CRL received. 177 CMP server referenced by I<ctx>. On success it assigns to I<*certTemplate> 216 and the output parameter I<checkAfter> has been used to [all …]
|
H A D | PEM_bytes_read_bio.pod | 22 I<bp> for the data type given in I<name> (RSA PRIVATE KEY, CERTIFICATE, 30 if needed. The password callback I<cb> and rock I<u> are used to obtain 35 The actual type indicated by the file is returned in I<*pnm> if I<pnm> is 36 non-NULL. The caller must free the storage pointed to by I<*pnm>. 39 I<*pdata> with length I<*plen>. The caller must free the storage pointed 40 to by I<*pdata>. 44 returned in I<*pdata> and I<*pnm>. Accordingly, the caller must use 54 care is needed in generating the BIO passed as I<bp>. In particular, the
|
H A D | OSSL_ENCODER_to_bio.pod | 30 OSSL_ENCODER_to_data() runs the encoding process for the context I<ctx>, 31 with the output going to the I<*pdata> and I<*pdata_len>. 32 If I<*pdata> is NULL when OSSL_ENCODER_to_data() is called, a buffer will be 33 allocated using L<OPENSSL_zalloc(3)>, and I<*pdata> will be set to point at 34 the start of that buffer, and I<*pdata_len> will be assigned its length when 36 If I<*pdata> is non-NULL when OSSL_ENCODER_to_data() is called, I<*pdata_len> 37 is assumed to have its size. In this case, I<*pdata> will be set to point 38 after the encoded bytes, and I<*pdata_len> will be assigned the number of 41 OSSL_ENCODER_to_bio() runs the encoding process for the context I<ctx>, with 42 the output going to the B<BIO> I<out>. [all …]
|
H A D | PKCS12_pack_p7encdata.pod | 23 type from the set of safeBags I<bags>. The algorithm ID in I<pbe_nid> can be 27 The password I<pass> of length I<passlen>, salt I<salt> of length I<saltlen> 28 and iteration count I<iter> are inputs into the encryption operation. 31 library context I<ctx> and property query I<propq> to be used to select the
|
H A D | X509_REQ_get_extensions.pod | 21 found in the attributes of I<req>. 22 The returned list is empty if there are no such extensions in I<req>. 25 X509_REQ_add_extensions() adds to I<req> a list of X.509 extensions I<exts>, 27 This function must not be called more than once on the same I<req>. 30 except that I<nid> is used to identify the extensions attribute. 31 This function must not be called more than once with the same I<req> and I<nid>.
|
H A D | PEM_X509_INFO_read_bio_ex.pod | 28 PEM_X509_INFO_read_ex() loads the B<X509_INFO> objects from a file I<fp>. 31 but uses the default (NULL) library context I<libctx> 32 and empty property query I<propq>. 34 PEM_X509_INFO_read_bio_ex() loads the B<X509_INFO> objects using a bio I<bp>. 37 but uses the default (NULL) library context I<libctx> 38 and empty property query I<propq>. 47 If the input stack I<sk> is NULL a new stack is allocated, 50 The optional I<cb> and I<u> parameters can be used for providing a pass phrase 54 The library context I<libctx> and property query I<propq> are used for fetching
|
H A D | SSL_load_client_CA_file.pod | 29 SSL_load_client_CA_file_ex() reads certificates from I<file> and returns 30 a STACK_OF(X509_NAME) with the subject names found. The library context I<libctx> 31 and property query I<propq> are used when fetching algorithms from providers. 34 but uses NULL for the library context I<libctx> and property query I<propq>. 36 SSL_add_file_cert_subjects_to_stack() reads certificates from I<file>, 37 and adds their subject name to the already existing I<stack>. 40 file in the directory I<dir>, and adds their subject name to the 41 already existing I<stack>. 44 I<store> URI, and adds their subject name to the already existing 45 I<stack>.
|
H A D | SSL_poll.pod | 90 =item I<desc> 102 =item I<events> 109 =item I<revents> 112 actually applicable to the resource described by I<desc>. As for I<events>, 115 I<revents> need not be a subset of the events specified in I<events>, as some 134 The following flags are currently defined for the I<flags> argument: 166 given event will never be reported in I<revents>. 178 of whether they were requested in I<events>. 198 specifying this event type in I<events> does nothing. 359 If SSL_poll() returns 0 and I<result_count> is nonzero, inspect the I<items> [all …]
|
H A D | OCSP_sendreq_new.pod | 43 with the B<BIO> I<io> to be used for requests and response, the URL path I<path>, 44 optionally the OCSP request I<req>, and a response header maximum line length 45 of I<buf_size>. If I<buf_size> is zero a default value of 4KiB is used. 46 The I<req> may be set to NULL and provided later using OCSP_REQ_CTX_set1_req() 48 The I<io> and I<path> arguments to OCSP_sendreq_new() correspond to the 51 I<io> should haven been connected to host C<example.com> on port 80 and I<path> 54 OCSP_sendreq_nbio() attempts to send the request prepared in I<rctx> 55 and to gather the response via HTTP, using the BIO I<io> and I<path> 58 a pointer to a B<OCSP_RESPONSE> structure, in I<*presp>.
|
H A D | SSL_CTX_set_cert_verify_callback.pod | 18 I<ctx>. SSL objects that are created from I<ctx> inherit the setting valid at 27 If a verification callback I<callback> is specified via 30 The argument I<arg> is specified by the application when setting I<callback>. 31 By setting I<callback> to NULL, the default behaviour is restored. 33 I<callback> should return 1 to indicate verification success 42 In client mode I<callback> may also call the L<SSL_set_retry_verify(3)> 43 function on the B<SSL> object set in the I<x509_store_ctx> ex data (see 54 in the B<error> member of I<x509_store_ctx>, 57 the I<callback> allows the connection to continue (by returning 1). 66 Within I<x509_store_ctx>, I<callback> has access to the I<verify_callback>
|
H A D | EVP_ASYM_CIPHER_free.pod | 53 EVP_ASYM_CIPHER_is_a() returns 1 if I<cipher> is an implementation of an 54 algorithm that's identifiable with I<name>, otherwise 0. 56 EVP_ASYM_CIPHER_get0_provider() returns the provider that I<cipher> was 61 the implementations, calls the given function I<fn> with the implementation 62 method and the given I<arg> as argument. 65 implementation for the given I<cipher>. Note that the I<cipher> may have 68 by the I<cipher> object and should not be freed by the caller. 70 EVP_ASYM_CIPHER_names_do_all() traverses all names for I<cipher>, and calls 71 I<fn> with each name and I<data>. 73 EVP_ASYM_CIPHER_get0_description() returns a description of the I<cipher>, [all …]
|
H A D | EVP_KEM_free.pod | 48 EVP_KEM_is_a() returns 1 if I<kem> is an implementation of an 49 algorithm that's identifiable with I<name>, otherwise 0. 51 EVP_KEM_get0_provider() returns the provider that I<kem> was fetched from. 54 providers in the given library context I<libctx>, and for each of the 56 and the given I<arg> as argument. 59 implementation for the given I<kem>. Note that the I<kem> may have 62 by the I<kem> object and should not be freed by the caller. 64 EVP_KEM_names_do_all() traverses all names for I<kem>, and calls I<fn> with 65 each name and I<data>. 67 EVP_KEM_get0_description() returns a description of the I<kem>, meant for [all …]
|
H A D | EVP_SIGNATURE.pod | 57 EVP_SIGNATURE_is_a() returns 1 if I<signature> is an implementation of an 58 algorithm that's identifiable with I<name>, otherwise 0. 60 EVP_SIGNATURE_get0_provider() returns the provider that I<signature> was 65 implementations, calls the given function I<fn> with the implementation method 66 and the given I<arg> as argument. 69 implementation for the given I<signature>. Note that the I<signature> may have 72 by the I<signature> object and should not be freed by the caller. 74 EVP_SIGNATURE_names_do_all() traverses all names for I<signature>, and calls 75 I<fn> with each name and I<data>. 77 EVP_SIGNATURE_get0_description() returns a description of the I<signature>, [all …]
|
H A D | BIO_sendmmsg.pod | 42 by the value stored in I<*msgs_processed>, which expresses the number of 52 The I<flags> field of a B<BIO_MSG> provides input per-message flags to the 73 of received datagrams to be determined. Unlike I<peer>, support for I<local> 78 I<peer> and I<local> should be set to NULL if they are not required. Support for 80 functions always fail if I<local> is non-NULL. 94 The I<stride> argument must be set to C<sizeof(BIO_MSG)>. This argument 99 which is also the length of the array pointed to by I<msg>. 139 I<msgs_processed>. Where a positive value n is written to I<msgs_processed>, all 141 I<data_len> and I<flags> fields updated with the results of the operation on 142 that message. If the call was to BIO_recvmmsg() and the I<peer> or I<local> [all …]
|
H A D | EVP_PKEY_decapsulate.pod | 22 context I<ctx> for a decapsulation operation and then sets the I<params> 24 Note that I<ctx> usually is produced using L<EVP_PKEY_CTX_new_from_pkey(3)>, 28 EVP_PKEY_decapsulate_init() but also passes an I<authpub> authentication public 32 operation using I<ctx>. The data to be decapsulated is specified using the 33 I<wrapped> and I<wrappedlen> parameters. 34 If I<unwrapped> is NULL then the maximum size of the output secret buffer 35 is written to I<*unwrappedlen>. If I<unwrapped> is not NULL and the 36 call is successful then the decapsulated secret data is written to I<unwrapped> 37 and the amount of data written to I<*unwrappedlen>.
|
/openssl/doc/internal/man3/ |
H A D | OSSL_TIME.pod | 102 B<ossl_time_to_timeval> converts a time to a I<struct timeval>. 106 B<ossl_time_to_time_t> converts a time to a I<time_t>. 108 B<ossl_time_from_time_t> converts a I<time_t> to a time. 110 B<ossl_time_compare> compares I<a> with I<b> and returns -1 if I<a> 111 is smaller than I<b>, 0 if they are equal and +1 if I<a> is 112 larger than I<b>. 119 returning I<a> + I<b>. 123 returning I<a> - I<b>. 127 given integer multiplier returning I<a> × I<b>. 130 divisor returning ⌊I<a> ÷ I<b>⌋. [all …]
|
H A D | evp_keymgmt_util_export_to_provider.pod | 38 I<keymgmt> and I<keydata> from I<pk>. This is used as a 42 (provider side key material) from the given key I<pk> to a provider 44 It maintains a cache of provider key references in I<pk> to keep track 51 I<keymgmt> in I<pk>'s cache of provided keys for operations. 52 It should only be called while holding I<pk>'s lock (read or write). 62 information from the provvider "origin" and save it in I<pk>'s 66 given key I<target> via a B<EVP_KEYMGMT> interface. This is used as a 69 In all functions that take a I<selection> argument, the selection is used to 81 operation cache slot. If I<keymgmt> is NULL, or if there is no slot 82 with a match for I<keymgmt>, NULL is returned.
|
H A D | ossl_namemap_new.pod | 55 If the given I<number> is zero, a new number will be allocated to 56 identify this I<name>. 57 If the given I<number> is nonzero, the I<name> is added to the set of 61 I<name>. 64 ossl_namemap_name2num(), but takes a string length I<name_len> as well, 68 I<number> in the given I<namemap> and calls the function I<fn> for 70 I<fn> is also passed the I<data> argument, which allows any caller to 73 ossl_namemap_add_names() divides up a set of names given in I<names>, 74 separated by I<separator>, and adds each to the I<namemap>, all with 75 the same number. If some of them already exist in the I<namemap>,
|
/openssl/doc/man1/ |
H A D | tsget.pod | 10 B<-h> I<server_url> 11 [B<-e> I<extension>] 12 [B<-o> I<output>] 15 [B<-k> I<private_key.pem>] 16 [B<-p> I<key_password>] 17 [B<-c> I<client_cert.pem>] 18 [B<-C> I<CA_certs.pem>] 19 [B<-P> I<CA_path>] 20 [B<-r> I<files>] 21 [B<-g> I<EGD_socket>] [all …]
|
H A D | openssl-srp.pod.in | 17 [B<-name> I<section>] 18 [B<-srpvfile> I<file>] 19 [B<-gn> I<identifier>] 20 [B<-userinfo> I<text>] 21 [B<-passin> I<arg>] 22 [B<-passout> I<arg>] 26 [I<user> ...] 35 For B<-list>, if no I<user> is given then all users are displayed. 72 =item B<-srpvfile> I<file> 87 =item B<-passin> I<arg>, B<-passout> I<arg>
|
H A D | openssl-pkeyutl.pod.in | 12 [B<-in> I<file>] 15 [B<-out> I<file>] 16 [B<-sigfile> I<file>] 17 [B<-inkey> I<filename>|I<uri>] 19 [B<-passin> I<arg>] 20 [B<-peerkey> I<file>] 33 [B<-pkeyopt> I<opt>:I<value>] 34 [B<-pkeyopt_passin> I<opt>[:I<passarg>]] 86 =item B<-inkey> I<filename>|I<uri> 163 =item B<-pkeyopt> I<opt>:I<value> [all …]
|
/openssl/doc/man7/ |
H A D | provider-mac.pod | 101 the I<mctx> parameter. 107 I<mctx> parameter and return the duplicate copy. 112 side mac context in the I<mctx> parameter. The I<params> are set before setting 113 the MAC I<key> of I<keylen> bytes. 125 to I<*outl>, which should not exceed I<outsize> bytes. 135 provider algorithm and stores them in I<params>. 138 provider side mac context I<mctx> to I<params>. 140 Passing NULL for I<params> should return true. 144 in I<params>. 145 Passing NULL for I<params> should return true. [all …]
|
/openssl/test/ |
H A D | smcont.bin | 9 �����蒻����\ߐ��"�]��I�zqɔxE�^���K�t49��$���q�7+<��/~�J��浃7YM�}�v�W�����Q���~ 13 ��-Ǎ�_'�{��Ο܅ʂ�=��.Ӭ�M���Q!���d0&Ny?�_�@��NG��2�S���#⣦I"�s[�����[�0�ߣ�8���(T 19 …I������16X�S�E�u5O�}*]���^�$g�,�,xHb�������͢)O���Dt�2������ܞ+c�#6�*L�2}�N�^���i{�5�t�… 22 ��_�ƵYKnl �$��s������s����9w�a �#L._�R�����C 6���̸��W����m���D�����gL��J��DGs����I��c… 23 …3��B@�B4��B�Zb�Tu>�rƶ����ץ�58B�\�@��L= ���b��Lj���I^W �����W���g{�t9��&�N�.�q!I�r�5… 24 �7A=٫�jf�$�^�%�F�膋���5Ր�����-I�U�}؇'��9�=����C�����u0U�/`�p1 25 Vzh.�E��»t�6�.XX��RDnH���O��~��F�����wI _��u�qw��º���3���/��g)XBe����O�F��Iݙ����E{P)Z 26 …���4w�'��ːY���)��W��<��d��;i���=#��}���"��dR�E��>������D�*���*ذx@I�$�+h�>�-��¤�=H宮i… 32 …*���c$�Oӿ� gm�Mo���q�������yߍ��?U��������]��I��;� U"G�;WZ(\g��]Oע@ʸ4����`���qVdģC�D7�V�… 35 Iqޕ�b�M��7��vb��[�
|