/openssl/doc/man1/ |
H A D | openssl-engine.pod.in | 19 [B<-pre> I<command>] ... 20 [B<-post> I<command>] ... 21 [I<engine> ...] 28 of the specified I<engine>s. 59 =item B<-pre> I<command> 61 =item B<-post> I<command> 66 The I<command> is of the form I<cmd>:I<val> where I<cmd> is the command, 67 and I<val> is the value for the command.
|
H A D | openssl-dsaparam.pod.in | 14 [B<-in> I<filename>] 15 [B<-out> I<filename>] 23 [I<numbits>] 24 [I<numqbits>] 54 =item B<-in> I<filename> 57 this option is not specified. If the I<numbits> parameter is included then 60 =item B<-out> I<filename> 93 =item I<numbits> 96 size I<numbits>. If this argument is included then the input file (if any) is 99 =item I<numqbits> [all …]
|
H A D | openssl-cmds.pod.in | 66 B<openssl> I<cmd> B<-help> | [I<-option> | I<-option> I<arg>] ... [I<arg>] ... 70 Every I<cmd> listed above is a (sub-)command of the L<openssl(1)> application. 71 It has its own detailed manual page at B<openssl-I<cmd>>(1). For example, to 144 Initially, the manual page entry for the C<openssl I<cmd>> command used 145 to be available at I<cmd>(1). Later, the alias B<openssl-I<cmd>>(1) was
|
H A D | openssl-pkcs8.pod.in | 15 [B<-in> I<filename>] 16 [B<-passin> I<arg>] 18 [B<-passout> I<arg>] 19 [B<-iter> I<count>] 23 [B<-v2> I<alg>] 24 [B<-v2prf> I<alg>] 25 [B<-v1> I<alg>] 27 [B<-scrypt_N> I<N>] 86 =item B<-passin> I<arg>, B<-passout> I<arg> 148 =item B<-scrypt_N> I<N>, B<-scrypt_r> I<r>, B<-scrypt_p> I<p> [all …]
|
H A D | openssl-fipsinstall.pod.in | 12 [B<-in> I<configfilename>] 13 [B<-out> I<configfilename>] 14 [B<-module> I<modulefilename>] 18 [B<-mac_name> I<macname>] 19 [B<-macopt> I<nm>:I<v>] 31 [B<-config> I<parent_config>] 113 =item B<-mac_name> I<name> 121 =item B<-macopt> I<nm>:I<v> 130 =item B<key>:I<string> 139 =item B<hexkey>:I<string> [all …]
|
H A D | openssl-cms.pod.in | 15 [B<-in> I<filename>] 16 [B<-out> I<filename>] 56 [B<-inkey> I<filename>|I<uri>] 57 [B<-passin> I<arg>] 58 [B<-keyopt> I<name>:I<parameter>] 66 [B<-recip> I<file>] 68 [B<-I<cipher>>] 78 [B<-md> I<digest>] 110 [B<-to> I<addr>] 348 =item B<-inkey> I<filename>|I<uri> [all …]
|
/openssl/doc/man3/ |
H A D | EVP_PKEY_decrypt.pod | 21 context using key I<pkey> for a decryption operation. 24 context using key I<pkey> for a decryption operation and sets the 25 algorithm specific I<params>. 28 using I<ctx>. The data to be decrypted is specified using the I<in> and 29 I<inlen> parameters. If I<out> is NULL then the minimum required size of 30 the output buffer is written to the I<*outlen> parameter. 32 If I<out> is not NULL then before the call the I<*outlen> parameter must 33 contain the length of the I<out> buffer. If the call is successful the 34 decrypted data is written to I<out> and the amount of the decrypted data 35 written to I<*outlen>, otherwise an error is returned.
|
H A D | X509_verify_cert.pod | 21 X509_build_chain() builds a certificate chain starting from I<target> 22 using the optional list of intermediate CA certificates I<certs>. 23 If I<store> is NULL it builds the chain as far down as possible, ignoring errors. 24 Else the chain must reach a trust anchor contained in I<store>. 26 context I<libctx> and property query string I<propq>, both of which may be NULL. 31 A self-signed trust anchor is included only if I<target> is the trust anchor 32 of I<with_self_signed> is 1. 36 certificate chain based on parameters in I<ctx>. 52 incorrectly, such as with no certificate set in I<ctx>, or when it is called 53 twice in succession without reinitialising I<ctx> for the second call. [all …]
|
H A D | EVP_PKEY_digestsign_supports_digest.pod | 16 digest I<name> is supported for public key signature operations associated with 17 key I<pkey>. The query is done within an optional library context I<libctx> and 18 with an optional property query I<propq>. 23 digest algorithm identified by I<name> can be used for public key signature 24 operations associated with key I<pkey> and 0 if it cannot be used. It returns
|
H A D | EVP_PKEY2PKCS8.pod | 19 EVP_PKEY2PKCS8() converts a private key I<pkey> into a returned PKCS8 object. 21 EVP_PKCS82PKEY_ex() converts a PKCS8 object I<p8> into a returned private key. 22 It uses I<libctx> and I<propq> when fetching algorithms. 25 NULL for the I<libctx> and I<propq>.
|
H A D | OSSL_CMP_SRV_CTX_new.pod | 99 I<req>. It does the typical generic checks on I<req>, calls 103 I<OSSL_CMP_CTX_get_status(OSSL_CMP_SRV_CTX_get0_cmp_ctx(srv_ctx))> yields -1 110 The B<OSSL_CMP_SRV_CTX> must be set as I<transfer_cb_arg> of I<client_ctx>. 113 associated with the library context I<libctx> and property query string 114 I<propq>, both of which may be NULL to select the defaults. 116 OSSL_CMP_SRV_CTX_free() deletes the given I<srv_ctx>. 119 OSSL_CMP_SRV_CTX_init() sets in the given I<srv_ctx> a custom server context 123 All arguments except I<srv_ctx> may be NULL. 127 OSSL_CMP_SRV_CTX_init_trans() sets in I<srv_ctx> the optional callback 134 Otherwise I<clean> takes a custom server context and a transaction ID pointer [all …]
|
H A D | CMS_digest_create.pod | 22 with a type B<NID_pkcs7_digest>. The data supplied via the I<in> BIO is digested 23 using I<md>. The library context I<libctx> and the property query I<propq> are 25 The I<flags> field supports the B<CMS_DETACHED> and B<CMS_STREAM> flags, 31 but uses default values of NULL for the library context I<libctx> and the 32 property query I<propq>.
|
H A D | OSSL_CRMF_MSG_set1_regInfo_certReq.pod | 27 in the given I<msg>, if present. 29 OSSL_CRMF_MSG_set1_regInfo_utf8Pairs() adds a copy of the given I<utf8pairs> 30 value as utf8Pairs regInfo to the given I<msg>. See RFC 4211 section 7.1. 33 in the given I<msg>, if present. 35 OSSL_CRMF_MSG_set1_regInfo_certReq() adds a copy of the given I<cr> value 36 as certReq regInfo to the given I<msg>. See RFC 4211 section 7.2. 48 control to the regInfo structure of the given I<msg>. While RFC 4211 expects
|
H A D | X509_ACERT_get_attr.pod | 23 X509_ACERT_get0_attr() retrieves the I<loc>th B<X509_ATTRIBUTE> from an 24 B<X509_ACERT> I<x>. X509_ACERT_get_attr_count() returns the total number 28 attribute location matching I<nid> or I<obj> after I<lastpos>. I<lastpos> 30 If there are no more entries -1 is returned. If I<nid> is invalid
|
H A D | EVP_KDF.pod | 75 a library context I<libctx> and a set of I<properties>. 94 EVP_KDF_CTX_free() frees up the context I<ctx>. If I<ctx> is NULL, nothing 98 I<ctx>. 106 I<keylen> bytes of key material and places it in the I<key> buffer. 112 I<kdf>. 119 context I<ctx> and its underlying context. 126 context, given a context I<ctx>. 163 of the given I<kdf>. 168 and the given I<arg> as argument. 175 I<fn> with each name and I<data>. [all …]
|
H A D | OSSL_CMP_CTX_new.pod | 185 the library context I<libctx> and property query string I<propq>, 363 OSSL_CMP_CTX_set_log_cb() sets in I<ctx> the callback function I<cb> 493 also called I<protection certificate>, 508 certificate previously set in the I<ctx>. It adds the optional I<candidates>, 519 with the I<candidates> and I<own_trusted> arguments being NULL. 528 OSSL_CMP_CTX_set1_secretValue() sets in I<ctx> the byte string I<sec> of length 529 I<len> to use as pre-shared secret, or clears it if the I<sec> argument is NULL. 536 length I<len> in the given I<ctx> or clears it if the I<ref> argument is NULL. 558 OSSL_CMP_CTX_push0_geninfo_ITAV() adds I<itav> to the stack in the I<ctx> to be 638 OSSL_CMP_CTX_push0_genm_ITAV() adds I<itav> to the stack in the I<ctx> which [all …]
|
H A D | SMIME_write_ASN1.pod | 26 I<out> is the BIO to write the data to. I<value> is the appropriate ASN1_VALUE 28 content must be supplied via I<data>. 29 I<flags> is an optional set of flags. I<ctype_nid> is the NID of the content 30 type, I<econt_nid> is the NID of the embedded content type and I<mdalgs> is a 32 ASN.1 structure I<it> are ASN1_ITEM_rptr(PKCS7) or ASN1_ITEM_rptr(CMS_ContentInfo). 33 The library context I<libctx> and the property query I<propq> are used when
|
H A D | OSSL_DECODER_from_bio.pod | 30 OSSL_DECODER_from_data() runs the decoding process for the context I<ctx>, 31 with input coming from I<*pdata>, I<*pdata_len> bytes long. Both I<*pdata> 32 and I<*pdata_len> must be non-NULL. When OSSL_DECODER_from_data() returns, 33 I<*pdata> is updated to point at the location after what has been decoded, 34 and I<*pdata_len> to have the number of remaining bytes. 36 OSSL_DECODER_from_bio() runs the decoding process for the context I<ctx>, 37 with the input coming from the B<BIO> I<in>. Should it make a difference, 41 except that the input is coming from the B<FILE> I<fp>.
|
H A D | PEM_read_bio_PrivateKey.pod | 329 a I<B<TYPE> *> pointer. Where I<B<TYPE>> is whatever structure the function 330 uses. If I<x> is NULL then the parameter is ignored. If I<x> is not 332 to I<*x>. If neither I<x> nor I<*x> is NULL then an attempt is made 348 I<klen> bytes at I<kstr> are used as the passphrase and I<cb> is 351 If the I<cb> parameters is set to NULL and the I<u> parameter is not 353 to use as the passphrase. If both I<cb> and I<u> are NULL then the 363 I<buf> is the buffer to write the passphrase to. I<size> is the maximum 367 for it twice) if I<rwflag> is 1. The I<u> parameter has the same 368 value as the I<u> parameter passed to the PEM routine. It allows 376 operation. If this is the case and I<libctx> and I<propq> parameters have been [all …]
|
H A D | X509_check_purpose.pod | 15 This function checks if certificate I<x> was created with the purpose 16 represented by I<id>. If I<ca> is nonzero, then certificate I<x> is 18 possibly returned. The certificate I<x> must be a complete certificate 45 =item E<32>1 if the certificate was created to perform the purpose represented by I<id> 47 =item E<32>0 if the certificate was not created to perform the purpose represented by I<id> 57 =item E<32>0 not a CA or does not have the purpose represented by I<id>
|
H A D | ASN1_STRING_TABLE_add.pod | 29 local ASN1 string table based on the I<nid> along with other parameters. 32 updated (depending on the values of those parameters, e.g., I<minsize> 33 and I<maxsize> >= 0, I<mask> and I<flags> != 0). If the I<nid> is standard, 38 on I<nid>. It will search the local table first, then the standard one.
|
H A D | d2i_RSAPrivateKey.pod | 121 The function parameters I<ppin> and I<ppout> are generally either both named 122 I<pp> in the headers, or I<in> and I<out>. 131 B<I<TYPE>> private key data organized in a type specific structure. 134 B<I<TYPE>> public key data organized in a type specific structure. 143 B<I<TYPE>> data into a type specific DER encoded structure. 146 B<I<TYPE>> data into a type specific DER encoded structure. 152 B<I<TYPE>> data into a DER encoded B<SubjectPublicKeyInfo> structure. 189 variable I<pkey>. 200 I<selection> and I<structure> as follows: 265 The ways that I<*ppin> and I<*ppout> are incremented after the operation [all …]
|
/openssl/doc/internal/man3/ |
H A D | evp_generic_fetch.pod | 36 I<libctx>, I<operation_id>, I<name>, and I<properties> and uses 38 I<new_method>, I<up_ref_method>, and I<free_method>. 41 but limits the search of methods to the provider given with I<prov>. 45 The three functions I<new_method>, I<up_ref_method>, and 46 I<free_method> are supposed to: 53 dispatch table I<fns>, with name identity I<name_id>. 54 The provider I<prov> and I<method_data> are also passed to be used as
|
H A D | ossl_global_properties_no_mirrored.pod | 22 ossl_property_list_to_string() takes a given OSSL_PROPERTY_LIST in I<list> and 23 converts it to a string. If I<buf> is non NULL then the string will be stored 24 in I<buf>. The size of the buffer is provided in I<bufsize>. If I<bufsize> is 25 too short then the string will be truncated. If I<buf> is NULL then the length 27 properties in it then the empty string will be stored in I<buf>.
|
/openssl/doc/man7/ |
H A D | provider-base.pod | 255 line I<line> and the function name I<func> where the error occurred. 268 I<file> and I<line> may also be passed to indicate exactly where the 276 I<sn> and long name I<ln> for the given I<handle>. It is similar to the OpenSSL 279 short name I<sn> or long name I<ln> provided as arguments differ from those 284 (I<sign_name>) consisting of an underlying signature algorithm (I<pkey_name>) 285 and digest algorithm (I<digest_name>) for the given I<handle>. It assumes that 315 output will have at least I<min_len> and at most I<max_len> bytes. 336 most I<max_len> bytes. The buffer address is stored in I<*pout> and the 353 I<handle> is this provider's handle and I<cbdata> is this provider's data 380 I<handle>. [all …]
|