Searched refs:public (Results 51 – 75 of 240) sorted by relevance
12345678910
/openssl/doc/man3/ |
H A D | SSL_CTX_set1_sigalgs.pod | 28 must consist of pairs of NIDs corresponding to digest and public key 34 elements, where each element is either a combination of a public key 76 NID_sha512 digest NIDs are supported and the public key algorithm NIDs 81 the public key algorithm strings "RSA", "RSA-PSS", "DSA" or "ECDSA".
|
H A D | DH_get0_pqg.pod | 46 parameter is optional. It also contains a public key (I<pub_key>) and 68 To get the public and private key values use the DH_get0_key() function. A 69 pointer to the public key will be stored in I<*pub_key>, and a pointer to the 71 been set yet, although if the private key has been set then the public key must 72 be. The values point to the internal representation of the public key and 77 The public and private key values can be set using DH_set0_key(). Either
|
H A D | ECPKParameters_print.pod | 24 The ECPKParameters represent the public parameters for an 28 a human-readable output of the public parameters of the EC_GROUP to B<bp>
|
H A D | EC_KEY_new.pod | 77 An EC_KEY represents a public key and, optionally, the associated private 120 EC_KEY_generate_key() generates a new public and private key for the supplied 123 < order, where I<order> is the order of the EC_GROUP object). The public key is 130 EC_KEY_set_public_key_affine_coordinates() sets the public key for I<key> based 132 the supplied I<x> and I<y> values and sets the public key to be this 139 and the EC_POINT public key for the B<key> respectively. The function 169 EC_POINT_oct2point() and EC_POINT_point2buf() except they use the public key
|
H A D | X509_verify_cert.pod | 62 When the verification target is a raw public key, rather than a certificate, 63 both functions validate the target raw public key. 65 The raw public key can be authenticated only via DANE TLSA records, either 67 Raw public key DANE TLSA records may be added via L<SSL_add_expected_rpk(3)> or
|
H A D | SSL_get_peer_signature_nid.pod | 25 is the NID of the public key type used for signing except for PSS signing 28 the type of public key in the peer's certificate.
|
H A D | d2i_PrivateKey.pod | 54 The I<type> parameter should be a public key algorithm constant such as 57 example to automatically derive the public key if it is not explicitly 65 d2i_PublicKey() does the same for public keys. 80 i2d_PublicKey() does the same for public keys.
|
H A D | EVP_PKEY_check.pod | 34 EVP_PKEY_public_check() validates the public component of the key given by B<ctx>. 36 EVP_PKEY_public_check_quick() validates the public component of the key 44 EVP_PKEY_pairwise_check() validates that the public and private components have
|
H A D | EVP_PKEY_fromdata.pod | 30 EVP_PKEY_fromdata_init() initializes a public key algorithm context 70 Only public key components will be selected. This includes optional key 76 public key and key parameters. 91 operation is not supported by the public key algorithm. 146 * Fixed data to represent the private and public key.
|
H A D | EVP_PKEY_keygen.pod | 54 EVP_PKEY_keygen_init() initializes a public key algorithm context I<ctx> 111 the public key algorithm. 135 public key components and parameters (if any). An OpenSSL private key is 137 in functions which require the use of a public key or parameters. 181 Example of generation callback for OpenSSL public key implementations:
|
H A D | X509_STORE_CTX_get_error.pod | 70 certificate being verified by the I<ctx>. It may be NULL if a raw public 137 unable to decode issuer public key> 139 The public key in the certificate C<SubjectPublicKeyInfo> field could 225 issuer certificate doesn't have a public key> 227 The issuer certificate does not have a public key. 448 subject signature algorithm and issuer public key algorithm mismatch> 450 The issuer's public key is not of the type required by the signature in 464 =item B<X509_V_ERR_RPK_UNTRUSTED: raw public key untrusted, no trusted keys configured> 466 No TLS records were configured to validate the raw public key, or DANE was not
|
/openssl/doc/man1/ |
H A D | openssl-rsautl.pod.in | 80 With this option a public key is read instead. 81 If the input contains no public key but a private key, its public part is used. 85 The input is a certificate containing an RSA public key. 98 Encrypt the input data using an RSA public key. 198 The certificate public key can be extracted with:
|
H A D | openssl-pkeyparam.pod.in | 10 openssl-pkeyparam - public key algorithm parameter processing command 25 This command processes public key algorithm parameters.
|
H A D | openssl-spkac.pod.in | 32 This command processes Netscape signed public key and challenge 97 Output the public key of an SPKAC (not used if an SPKAC is 145 corresponding to the public key being certified. This is important in
|
H A D | openssl-genpkey.pod.in | 52 Output the public key to the specified file. If this argument is not 53 specified then the public key is not output. 98 Set the public key algorithm option I<opt> to I<value>. The precise set of 99 options supported depends on the public key algorithm used and its 113 Some public key algorithms generate a private key based on a set of parameters. 114 They can be supplied using this option. If this option is used the public key 121 Print an (unencrypted) text representation of private and public keys and 155 The RSA public exponent value. This can be a large decimal or 421 Generate a 2048 bit RSA key using 3 as the public exponent:
|
/openssl/crypto/objects/ |
H A D | obj_xref.txt | 2 # Links signatures OIDs to their corresponding public key algorithms 21 # AlgorithmIdentifier. The digest "undef" indicates the public key
|
/openssl/doc/man7/ |
H A D | EVP_PKEY-X25519.pod | 13 support the associated key, containing the public key I<pub> and the 49 The public key value. 57 Used for getting and setting the encoding of a public key for the B<X25519> and
|
H A D | EVP_RAND.pod | 78 the <primary>, <public>, and <private> DRBG. 79 While the <primary> DRBG is a single global instance, the <public> and <private> 83 the thread-local <public> and <private> DRBG instance, respectively. 92 =head2 The <public> DRBG instance 107 The <public> and <private> DRBG are thread-local, i.e. there is an 138 <public> <private> <- | per-thread DRBG instances | 152 EVP_RAND_generate(<public>, ...) and 208 The <public> and <private> DRBG will detect this on their next generate
|
H A D | evp.pod | 17 functions provide public key encryption and decryption to implement digital "envelopes". 53 these functions perform encryption and decryption only. As public key 70 (public key algorithms) can be replaced by ENGINE modules providing alternative
|
H A D | EVP_KDF-X942-ASN1.pod | 47 An optional octet string containing public info contributed by the initiator. 56 An optional octet string containing public info contributed by the responder. 60 An optional octet string containing some additional, mutually-known public
|
/openssl/util/ |
H A D | other-internal.syms | 4 #Functions exported by libcrypto that don't exist in our public headers
|
H A D | find-doc-nits | 174 if $tags{manual} && ($tags{public} // !$tags{internal}); 176 if $tags{manual} && ($tags{internal} // !$tags{public}); 178 if $tags{header} && ($tags{public} // !$tags{internal}); 181 delete $tags{public};
|
/openssl/crypto/err/ |
H A D | openssl.txt | 125 ASN1_R_WRONG_PUBLIC_KEY_TYPE:200:wrong public key type 255 CMP_R_MISSING_PUBLIC_KEY:183:missing public key 369 CMS_R_NO_PUBLIC_KEY:134:no public key 539 DH_R_INVALID_PUBKEY:102:invalid public key 790 EVP_R_PUBLIC_KEY_NOT_RSA:106:public key not rsa 903 OSSL_STORE_R_NOT_A_PUBLIC_KEY:122:not a public key 1109 PROV_R_NOT_A_PUBLIC_KEY:220:not a public key 1256 RSA_R_NO_PUBLIC_EXPONENT:140:no public exponent 1401 SSL_R_EMPTY_RAW_PUBLIC_KEY:349:empty raw public key 1627 unable to find public key parameters [all …]
|
/openssl/providers/common/der/ |
H A D | der_dsa_gen.c.in | 13 * DSA low level APIs are deprecated for public use, but still ok for
|
/openssl/providers/implementations/encode_decode/ |
H A D | build.info | 15 # currently only define a "blob" output type for EC public keys. This may
|
Completed in 58 milliseconds
12345678910