/openssl/apps/ |
H A D | rehash.c | 31 # pragma names save 32 # pragma names as_is,shortened 38 # pragma names restore
|
H A D | cmp.c | 872 static int set_gennames(OSSL_CMP_CTX *ctx, char *names, const char *desc) in set_gennames() argument 876 for (; names != NULL; names = next) { in set_gennames() 879 next = next_item(names); in set_gennames() 880 if (strcmp(names, "critical") == 0) { in set_gennames() 889 n = a2i_GENERAL_NAME(NULL, NULL, NULL, GEN_IPADD, names, 0); in set_gennames() 892 strchr(names, '@') != NULL ? GEN_EMAIL : in set_gennames() 893 strchr(names, ':') != NULL ? GEN_URI : GEN_DNS, in set_gennames() 894 names, 0); in set_gennames() 898 CMP_err2("bad syntax of %s '%s'", desc, names); in set_gennames()
|
/openssl/doc/man3/ |
H A D | EVP_KDF.pod | 174 with multiple names, only one of them is returned; it's 177 EVP_KDF_names_do_all() traverses all names for I<kdf>, and calls 186 The standard parameter names are: 277 EVP_KDF_names_do_all() returns 1 if the callback was called for all names. A 278 return value of 0 means that the callback was not called for any names.
|
H A D | SSL_CTX_set_cipher_list.pod | 39 ciphersuite names in order of preference. Valid TLSv1.3 ciphersuite names are:
|
H A D | SSL_set1_host.pod | 33 that can match the peer's certificate. Any previous names set via 35 if B<name> is NULL or empty. When multiple names are configured,
|
H A D | EVP_PKEY_CTX_new.pod | 39 further about the possible names in L</NOTES> below. 93 These are names like "RSA", "DSA", and what's available depends on what
|
H A D | OBJ_nid2obj.pod | 54 code should treat all returned values -- OIDs, NIDs, or names -- as 69 If I<no_name> is 0 then long names and short names will be interpreted
|
H A D | SSL_CONF_CTX_set1_prefix.pod | 21 calls. For example for files, if the prefix "SSL" is set then command names
|
H A D | SSL_CTX_set_tlsext_use_srtp.pod | 37 SRTP protection profile names. 39 The currently supported protection profile names are:
|
H A D | ASN1_generate_nconf.pod | 46 Case is not significant in the type names. 117 field names in the section are ignored and the values are in the 204 (note: the field names such as 'coeff' are ignored and are present just
|
H A D | X509_NAME_print_ex.pod | 80 separating field names and values. 85 If B<XN_FLAG_FN_ALIGN> is set then field names are padded to 20 characters: this
|
H A D | X509_VERIFY_PARAM_set_flags.pod | 138 To obtain all names start with B<n> = 0 and increment B<n> as long as no NULL 159 alternative names are present in the certificate, any DNS name constraints in 165 alternative names are present in the certificate, DNS name constraints in 174 identifier that can match the peer's certificate. Any previous names 177 multiple names are configured, the peer is considered verified when
|
/openssl/test/helpers/ |
H A D | handshake.c | 1426 const STACK_OF(X509_NAME) *names; in do_handshake_internal() 1706 names = SSL_get0_peer_CA_list(client.ssl); in do_handshake_internal() 1707 if (names == NULL) in do_handshake_internal() 1710 ret->client_ca_names = SSL_dup_CA_list(names); in do_handshake_internal() 1712 names = SSL_get0_peer_CA_list(server.ssl); in do_handshake_internal() 1713 if (names == NULL) in do_handshake_internal() 1716 ret->server_ca_names = SSL_dup_CA_list(names); in do_handshake_internal()
|
/openssl/test/ssl-tests/ |
H A D | 26-tls13_client_auth.cnf.in | 91 name => "client-auth-TLSv1.3-require-non-empty-names", 193 name => "client-auth-TLSv1.3-require-non-empty-names-post-handshake",
|
H A D | 04-client_auth.cnf.in | 217 # Successful handshake with client authentication non-empty names 219 name => "client-auth-${protocol_name}-require-non-empty-names"
|
/openssl/crypto/rsa/ |
H A D | rsa_backend.c | 39 const OSSL_PARAM params[], const char *names[]) in DEFINE_STACK_OF() 47 for (i = 0; names[i] != NULL; i++) { in DEFINE_STACK_OF() 48 p = OSSL_PARAM_locate_const(params, names[i]); in DEFINE_STACK_OF()
|
/openssl/demos/bio/ |
H A D | descrip.mms | 1 # This build description trusts that the following logical names are defined:
|
/openssl/doc/man7/ |
H A D | EVP_MD-SHA1.pod | 14 default provider, and is identified with the names "SHA1" and "SHA-1".
|
H A D | openssl-core.h.pod | 60 The algorithm names and property definitions are defined by the 63 The OpenSSL libraries use the first of the algorithm names as the main
|
/openssl/doc/internal/man3/ |
H A D | ossl_DER_w_begin_sequence.pod | 19 in pairs, as noted by the function names containing the words C<begin>
|
/openssl/crypto/evp/ |
H A D | build.info | 10 e_rc4.c e_aes.c names.c e_aria.c e_sm4.c \
|
/openssl/doc/man1/ |
H A D | openssl-kdf.pod.in | 71 Common parameter names used by EVP_KDF_CTX_set_params() are: 118 The supported algorithms names include TLS1-PRF, HKDF, SSKDF, PBKDF2,
|
H A D | openssl-genpkey.pod.in | 79 Valid built-in algorithm names for private key generation are RSA, RSA-PSS, EC, 82 Valid built-in algorithm names for parameter generation (see the B<-genparam> 181 The EC curve to use. OpenSSL supports NIST curve names such as "P-256". 280 RFC5114 names "dh_1024_160", "dh_2048_224", "dh_2048_256". 493 The ability to use NIST curve names, and to generate an EC key directly,
|
/openssl/providers/fips/ |
H A D | fipsprov.c | 525 # pragma names save 526 # pragma names uppercase,truncated 530 # pragma names restore
|
/openssl/ |
H A D | NOTES-DJGPP.md | 8 with illegal or duplicate names.
|