/openssl/external/perl/Text-Template-1.56/t/ |
H A D | safe3.t | 48 my $text = $template->fill_in() 54 is $text, $textOUT;
|
/openssl/crypto/cmp/ |
H A D | cmp_client.c | 223 char *text = ossl_sk_ASN1_UTF8STRING2text(emc->errorDetails, ", ", in send_receive_check() local 226 if (text != NULL && *text != '\0') in send_receive_check() 227 ERR_add_error_data(2, "; errorDetails: ", text); in send_receive_check() 228 OPENSSL_free(text); in send_receive_check() 304 char *text = ossl_sk_ASN1_UTF8STRING2text(pollRep->reason, ", ", in poll_for_response() local 307 if (text == NULL in poll_for_response() 309 "%s'", text) < 0) in poll_for_response() 311 OPENSSL_free(text); in poll_for_response() 487 const char **text) in OSSL_CMP_certConf_cb() argument 491 (void)text; /* make (artificial) use of var to prevent compiler warning */ in OSSL_CMP_certConf_cb()
|
H A D | cmp_util.c | 223 const char *text, int len) in ossl_cmp_sk_ASN1_UTF8STRING_push_str() argument 227 if (!ossl_assert(sk != NULL && text != NULL)) in ossl_cmp_sk_ASN1_UTF8STRING_push_str() 231 if (!ASN1_STRING_set(utf8string, text, len)) in ossl_cmp_sk_ASN1_UTF8STRING_push_str()
|
/openssl/doc/man1/ |
H A D | openssl-crl.pod.in | 17 [B<-text>] 90 =item B<-text> 92 Print out the CRL in text form. 146 Output the text form of a DER encoded certificate: 148 openssl crl -in crl.der -text -noout
|
H A D | openssl-smime.pod.in | 43 [B<-text>] 77 key has been compromised, others may be able to decrypt the text. 154 =item B<-text> 156 This option adds plain text (text/plain) MIME headers to the supplied 159 type text/plain then an error occurs. 310 add plain text headers. 374 openssl smime -sign -in message.txt -text -out mail.msg \ 385 openssl smime -sign -in in.txt -text -out mail.msg \ 390 openssl smime -sign -in message.txt -text -out mail.msg \ 395 openssl smime -sign -in in.txt -text -signer mycert.pem \ [all …]
|
H A D | openssl-sess_id.pod.in | 16 [B<-text>] 58 =item B<-text> 61 plain text in addition to the encoded version. 66 if the B<-text> option is also present then it will be printed out in text form.
|
H A D | openssl-pkey.pod.in | 30 [B<-text>] 102 This specifies the output filename to save the encoded and/or text output of key 138 When combined with B<-text>, this is equivalent to B<-text_pub>. 144 =item B<-text> 146 Output the various key components in plain text 152 Output in text form only the public key components (also for private keys). 197 openssl pkey -in key.pem -text -noout
|
H A D | openssl-storeutl.pod.in | 19 [B<-text> I<arg>] 60 =item B<-text> 62 Prints out the objects in text form, similarly to the B<-text> output from
|
/openssl/apps/ |
H A D | dsa.c | 86 int informat = FORMAT_UNDEF, outformat = FORMAT_PEM, text = 0, noout = 0; in dsa_main() local 143 text = 1; in dsa_main() 171 if (text && !pubin) in dsa_main() 199 if (text) { in dsa_main()
|
H A D | ec.c | 76 int informat = FORMAT_UNDEF, outformat = FORMAT_PEM, text = 0, noout = 0; in ec_main() local 114 text = 1; in ec_main() 167 if (text && !pubin) in ec_main() 218 if (text) { in ec_main()
|
H A D | pkcs7.c | 63 int i, print_certs = 0, text = 0, noout = 0, p7_print = 0, quiet = 0, ret = 1; in pkcs7_main() local 97 text = 1; in pkcs7_main() 177 if (text) in pkcs7_main()
|
H A D | dsaparam.c | 72 int ret = 1, i, text = 0, private = 0; in dsaparam_main() local 106 text = 1; in dsaparam_main() 190 if (text) { in dsaparam_main()
|
H A D | rsa.c | 132 int informat = FORMAT_UNDEF, outformat = FORMAT_PEM, text = 0, check = 0; in rsa_main() local 199 text = 1; in rsa_main() 226 private = (text && !pubin) || (!pubout && !noout) ? 1 : 0; in rsa_main() 267 if (text) { in rsa_main()
|
H A D | ts.c | 41 int cert, const char *in, const char *out, int text); 53 const char *out, int token_out, int text); 173 int ret = 1, no_nonce = 0, cert = 0, text = 0; in ts_main() local 250 text = 1; in ts_main() 324 in, out, text); in ts_main() 336 in, token_in, out, token_out, text); in ts_main() 400 int cert, const char *in, const char *out, int text) in query_command() argument 422 if (text) { in query_command() 592 const char *out, int token_out, int text) in reply_command() argument 622 if (text) { in reply_command()
|
H A D | req.c | 59 static int add_attribute_object(X509_REQ *req, char *text, const char *def, 62 static int add_DN_object(X509_NAME *n, char *text, const char *def, 65 static int build_data(char *text, const char *def, char *value, 259 int modulus = 0, multirdn = 1, verify = 0, noout = 0, text = 0; in req_main() local 400 text = 1; in req_main() 934 if (noout && !text && !modulus && !subject && !pubkey) { in req_main() 956 if (text) { in req_main() 1350 static int add_DN_object(X509_NAME *n, char *text, const char *def, in add_DN_object() argument 1357 ret = build_data(text, def, value, n_min, n_max, buf, sizeof(buf), in add_DN_object() 1392 static int build_data(char *text, const char *def, char *value, in build_data() argument [all …]
|
/openssl/crypto/ui/ |
H A D | ui_lib.c | 313 int UI_add_info_string(UI *ui, const char *text) in UI_add_info_string() argument 315 return general_allocate_string(ui, text, 0, UIT_INFO, 0, NULL, 0, 0, in UI_add_info_string() 319 int UI_dup_info_string(UI *ui, const char *text) in UI_dup_info_string() argument 323 if (text != NULL) { in UI_dup_info_string() 324 text_copy = OPENSSL_strdup(text); in UI_dup_info_string() 335 int UI_add_error_string(UI *ui, const char *text) in UI_add_error_string() argument 337 return general_allocate_string(ui, text, 0, UIT_ERROR, 0, NULL, 0, 0, in UI_add_error_string() 341 int UI_dup_error_string(UI *ui, const char *text) in UI_dup_error_string() argument 345 if (text != NULL) { in UI_dup_error_string() 346 text_copy = OPENSSL_strdup(text); in UI_dup_error_string()
|
/openssl/crypto/ts/ |
H A D | ts_rsp_verify.c | 27 static char *ts_get_status_text(STACK_OF(ASN1_UTF8STRING) *text); 63 const char *text; member 368 if (sk_ASN1_UTF8STRING_num(info->text) > 0 in ts_check_status_info() 369 && (embedded_status_text = ts_get_status_text(info->text)) == NULL) in ts_check_status_info() 383 strcat(failure_text, ts_failure_info[i].text); in ts_check_status_info() 400 static char *ts_get_status_text(STACK_OF(ASN1_UTF8STRING) *text) in ts_get_status_text() argument 402 return ossl_sk_ASN1_UTF8STRING2text(text, "/", TS_MAX_STATUS_LENGTH); in ts_get_status_text()
|
H A D | ts_rsp_sign.c | 297 int status, const char *text) in TS_RESP_CTX_set_status_info() argument 307 if (text) { in TS_RESP_CTX_set_status_info() 309 || !ASN1_STRING_set(utf8_text, text, strlen(text))) in TS_RESP_CTX_set_status_info() 311 if (si->text == NULL in TS_RESP_CTX_set_status_info() 312 && (si->text = sk_ASN1_UTF8STRING_new_null()) == NULL) in TS_RESP_CTX_set_status_info() 314 if (!sk_ASN1_UTF8STRING_push(si->text, utf8_text)) in TS_RESP_CTX_set_status_info() 330 int status, const char *text) in TS_RESP_CTX_set_status_info_cond() argument 336 ret = TS_RESP_CTX_set_status_info(ctx, status, text); in TS_RESP_CTX_set_status_info_cond()
|
/openssl/doc/man3/ |
H A D | BIO_f_prefix.pod | 20 text output, where each line gets automatically prefixed and indented 31 text, using I<prefix>. I<prefix> may be NULL, signifying that there 36 text, using I<indent>. Negative values are not allowed.
|
/openssl/crypto/asn1/ |
H A D | asn1_lib.c | 438 char *ossl_sk_ASN1_UTF8STRING2text(STACK_OF(ASN1_UTF8STRING) *text, in ossl_sk_ASN1_UTF8STRING2text() argument 451 for (i = 0; i < sk_ASN1_UTF8STRING_num(text); i++) { in ossl_sk_ASN1_UTF8STRING2text() 452 current = sk_ASN1_UTF8STRING_value(text, i); in ossl_sk_ASN1_UTF8STRING2text() 463 for (i = 0; i < sk_ASN1_UTF8STRING_num(text); i++) { in ossl_sk_ASN1_UTF8STRING2text() 464 current = sk_ASN1_UTF8STRING_value(text, i); in ossl_sk_ASN1_UTF8STRING2text()
|
/openssl/test/ |
H A D | generate_ssl_tests.pl | 126 my $text = $template->fill_in( 130 print "$text\n";
|
H A D | proxy.cnf | 28 proxyCertInfo = critical,language:id-ppl-anyLanguage,pathlen:1,policy:text:AB 60 policy = text:BC
|
/openssl/demos/smime/ |
H A D | sign.txt | 1 Content-type: text/plain
|
/openssl/demos/cms/ |
H A D | sign.txt | 1 Content-type: text/plain
|
H A D | encr.txt | 1 Content-type: text/plain
|