/openssl/demos/bio/ |
H A D | server-conf.c | 65 rv = SSL_CONF_cmd(cctx, cnf->name, cnf->value); in main() 70 cnf->name, cnf->value); in main() 75 port = cnf->value; in main()
|
H A D | client-conf.c | 54 rv = SSL_CONF_cmd(cctx, cnf->name, cnf->value); in main() 59 cnf->name, cnf->value); in main() 64 connect_str = cnf->value; in main()
|
/openssl/crypto/x509/ |
H A D | v3_int.c | 32 const char *value) in s2i_asn1_int() argument 34 return s2i_ASN1_INTEGER(meth, value); in s2i_asn1_int()
|
H A D | x509_obj.c | 72 type = ne->value->type; in X509_NAME_oneline() 73 num = ne->value->length; in X509_NAME_oneline() 78 q = ne->value->data; in X509_NAME_oneline() 138 q = ne->value->data; in X509_NAME_oneline()
|
/openssl/doc/man3/ |
H A D | EVP_PKEY_get_default_digest_nid.pod | 22 must (for return value 2) or may (for return value 1) be left unspecified. 42 They return 0 or a negative value for failure. In particular a return 43 value of -2 indicates the operation is not supported by the public key
|
H A D | SSL_CTX_set_stateless_cookie_generate_cb.pod | 47 return value can be used to abort the handshake. 52 length B<cookie_len>. A nonzero return value from verify_stateless_cookie_cb() 62 cookie cannot be generated, a zero return value can be used to abort the 67 pointed to by B<cookie> and is of length B<cookie_len>. A nonzero return value 74 Neither function returns a value.
|
H A D | SSL_CTX_set_max_cert_list.pod | 28 until a new value is set. 41 The default value for the maximum certificate chain size is 100kB (30kB 53 Under normal conditions it should never be necessary to set a value smaller 63 set value. 66 set value.
|
H A D | BIO_get_rpoll_descriptor.pod | 18 } value; 53 For this type, no field within the I<value> field of the B<BIO_POLL_DESCRIPTOR> 58 The poll descriptor represents an OS socket resource. The field I<value.fd> 62 sockets, which may vary by OS. For example, on Windows, the value is a B<SOCKET> 74 Type values beginning with this value (inclusive) are reserved for application 76 field I<value> can be used by the application arbitrarily as opaque values.
|
H A D | OSSL_SELF_TEST_new.pod | 46 The value is the string "Start" 63 The value is the string "Corrupt" 77 The value of the string is "Pass" if I<ret> is non zero, otherwise it has the 78 value "Fail". 83 OSSL_SELF_TEST_onbegin() for I<type> and I<desc> are set to the value "None". 93 The value is setup by the I<type> passed to OSSL_SELF_TEST_onbegin(). 98 The value is setup by the I<type> passed to OSSL_SELF_TEST_onbegin().
|
H A D | OSSL_HTTP_parse_url.pod | 27 hidden entirely by defining B<OPENSSL_API_COMPAT> with a suitable version value, 38 If I<proxy> is NULL, take any default value from the C<http_proxy> 41 take any further default value from the C<HTTP_PROXY> 43 If I<no_proxy> is NULL, take any default exclusion value from the C<no_proxy> 45 Return the determined proxy host unless the exclusion value, 59 the integer value of the port number is assigned to I<*pport_num> on success. 88 which is either the proxy name handed in or an environment variable value.
|
H A D | ERR_remove_state.pod | 10 hidden entirely by defining B<OPENSSL_API_COMPAT> with a suitable version value, 16 hidden entirely by defining B<OPENSSL_API_COMPAT> with a suitable version value, 30 ERR_remove_state() and ERR_remove_thread_state() return no value.
|
H A D | SSL_alert_type_string.pod | 11 const char *SSL_alert_type_string(int value); 12 const char *SSL_alert_type_string_long(int value); 14 const char *SSL_alert_desc_string(int value); 15 const char *SSL_alert_desc_string_long(int value); 20 type of the alert specified by B<value>. 23 specified by B<value>. 26 describing the reason of the alert specified by B<value>. 29 of the alert specified by B<value>. 63 Probably B<value> does not contain a correct alert message. 225 Probably B<value> does not contain a correct alert message.
|
H A D | SSL_CTX_set_split_send_fragment.pod | 49 value restricts the amount of plaintext bytes that will be sent in any one 50 SSL/TLS record. By default its value is SSL3_RT_MAX_PLAIN_LENGTH (16384). These 51 functions will only accept a value in the range 512 - SSL3_RT_MAX_PLAIN_LENGTH. 54 of pipelines that will be used at any one time. This value applies to both 57 in the range 1 - SSL_MAX_PIPELINES (32). Setting this to a value > 1 will also 92 above when setting B<max_pipelines> to a value greater than one, B<read_ahead> 106 parameter sets the size of the buffer. The value will only be used if it is 108 value depends on a number of factors but it will be at least 112 length negotiation mode via value B<mode> to B<ctx>. 117 negotiation mode via value B<mode> to B<ssl>.
|
H A D | EVP_PKEY_CTX_ctrl.pod | 82 int cmd, uint64_t value); 84 const char *value); 210 uint64 value as I<p2> to EVP_PKEY_CTX_ctrl(). 251 The I<pad> parameter can take the value B<RSA_PKCS1_PADDING> for PKCS#1 284 sets the salt length to the maximum permissible value. 373 I<label>. The return value is the label length. The padding mode 428 G. The default value is -1 which uses unverifiable g, otherwise a positive value 441 default value for the FIPS provider is "fips186_4". 487 The default value is -1 which uses unverifiable g, otherwise a positive value 592 B<OPENSSL_EC_NAMED_CURVE> value was added in OpenSSL 1.1.0; previous [all …]
|
H A D | RSA_print.pod | 14 hidden entirely by defining B<OPENSSL_API_COMPAT> with a suitable version value, 23 hidden entirely by defining B<OPENSSL_API_COMPAT> with a suitable version value, 34 hidden entirely by defining B<OPENSSL_API_COMPAT> with a suitable version value, 54 return 1 for success and 0 or a negative value for failure.
|
H A D | X509_load_http.pod | 19 hidden entirely by defining B<OPENSSL_API_COMPAT> with a suitable version value, 38 A value of 0 enables waiting indefinitely, 39 while a value < 0 immediately leads to a timeout condition. 47 On success the function yield the loaded value, else NULL.
|
H A D | X509_get_extension_flags.pod | 89 Failed to compute the internal SHA1 hash value of the certificate or CRL. 102 The certificate contains a key usage extension. The value can be retrieved 107 The certificate contains an extended key usage extension. The value can be 112 X509_get_key_usage() returns the value of the key usage extension. If key 120 X509_get_extended_key_usage() returns the value of the extended key usage 159 The value of the flags correspond to extension values which are cached 167 extension is absent. Applications can additionally check the return value of 177 X509_get_pathlen() returns the path length value, or -1 if the extension 188 X509_get_proxy_pathlen() returns the path length value if the given
|
H A D | OpenSSL_version.pod | 58 The value must be a string. 63 The value must be a string. 113 The value of B<OPENSSL_VERSION_TEXT> 117 The value of B<OPENSSL_VERSION_STR> 121 The value of B<OPENSSL_FULL_VERSION_STR> 161 The value has the same syntax as the environment variable. 202 value of the environment variable C<$PATH> on Unix (where the 211 The value has the same syntax as the environment variable. 218 OpenSSL_version_num() returns the value of B<OPENSSL_VERSION_NUMBER>.
|
H A D | SSL_get_client_random.pod | 24 SSL_get_client_random() extracts the random value sent from the client 26 bytes as it can of this value into the buffer provided in B<out>, 30 total size of the client_random value. 32 SSL_get_server_random() behaves the same, but extracts the random value 39 SSL_SESSION_set1_master_key() sets the master key value associated with the 63 If you need to calculate another secret value that depends on the master
|
/openssl/doc/internal/man3/ |
H A D | ossl_print_attribute_value.pod | 6 - Print an X.500 directory attribute value 16 ossl_print_attribute_value() prints an X.500 directory value, which is an 17 ASN.1 value and an associated attribute type that informs its interpretation, 29 argument is the NID of the attribute type object identifier. The ASN.1 value
|
/openssl/apps/ |
H A D | asn1parse.c | 263 tmpbuf = at->value.asn1_string->data; in asn1parse_main() 264 tmplen = at->value.asn1_string->length; in asn1parse_main() 290 ASN1_VALUE *value = ASN1_item_d2i(NULL, &p, length, it); in asn1parse_main() local 291 if (value == NULL) { in asn1parse_main() 296 ASN1_item_print(bio_out, value, 0, it, NULL); in asn1parse_main() 297 ASN1_item_free(value, it); in asn1parse_main()
|
/openssl/crypto/pkcs12/ |
H A D | p12_local.h | 30 } value; member 42 } value; member
|
/openssl/crypto/ |
H A D | cpuid.c | 40 static WCHAR value[48]; in ossl_getenv() local 41 DWORD len = GetEnvironmentVariableW(L"OPENSSL_ia32cap", value, 48); in ossl_getenv() 43 return (len > 0 && len < 48) ? value : NULL; in ossl_getenv()
|
/openssl/doc/man7/ |
H A D | provider-object.pod | 30 I<By value> 53 Objects I<by value> can be used by anything that handles DER encoded 99 The object data I<passed by value>. 114 The object data may only be I<passed by value>, and should be a UTF8 123 object data may be I<passed by value> or I<passed by reference>. 128 object type can only be I<passed by value>, and should be an octet string. 137 only be I<passed by value>, and should be an octet string. 153 is either missing or has the value OSSL_OBJECT_UNKNOWN), libcrypto 168 data in at least one form (object data I<passed by value>, i.e. the "data"
|
/openssl/crypto/pkcs7/ |
H A D | pk7_attr.c | 51 p = cap->value.sequence->data; in STACK_OF() 53 ASN1_item_d2i(NULL, &p, cap->value.sequence->length, in STACK_OF() 82 alg->parameter->value.integer = nbit; in PKCS7_simple_smimecap()
|