/openssl/doc/man3/ |
H A D | SSL_get_client_random.pod | 24 SSL_get_client_random() extracts the random value sent from the client 26 bytes as it can of this value into the buffer provided in B<out>, 30 total size of the client_random value. 32 SSL_get_server_random() behaves the same, but extracts the random value 39 SSL_SESSION_set1_master_key() sets the master key value associated with the 63 If you need to calculate another secret value that depends on the master
|
H A D | SSL_set_bio.pod | 24 the same value as previously). 55 the same as the previously set value then one reference is consumed. 60 same as the previously set value, then no additional references are consumed. 66 previously set value then one reference is consumed for the B<wbio> and no 72 same as the previously set value and the old B<rbio> and B<wbio> values 80 previously set value and the old B<rbio> and B<wbio> values were different
|
H A D | OSSL_HTTP_parse_url.pod | 27 hidden entirely by defining B<OPENSSL_API_COMPAT> with a suitable version value, 38 If I<proxy> is NULL, take any default value from the C<http_proxy> 41 take any further default value from the C<HTTP_PROXY> 43 If I<no_proxy> is NULL, take any default exclusion value from the C<no_proxy> 55 the integer value of the port number is assigned to I<*pport_num> on success. 83 which is either the proxy name handed in or an environment variable value.
|
H A D | EVP_PKEY_CTX_set_scrypt_N.pod | 35 value. 61 the value from the string controls "pass" and "hexpass". 66 All these functions return 1 for success and 0 or a negative value for 68 In particular a return value of -2 indicates the operation is not
|
H A D | ASN1_aux_cb.pod | 15 int ref_offset; /* Offset of reference value */ 70 sequence length value may not be correct. This should generally not be used. 77 If the B<ASN1_AFLG_REFCOUNT> flag is set then this value is assumed to be an 83 If the B<ASN1_AFLG_REFCOUNT> flag is set then this value is assumed to be an 107 indicated via the I<operation> parameter. The value of I<*in> will be the 111 value on success or zero on error, unless otherwise noted below. 188 value (as used in CMS and PKCS7). The I<exarg> argument will be a pointer to a 194 value (as used in CMS and PKCS7). The I<exarg> argument will be a pointer to a 211 a value exists. 217 I<*exarg> if such a value exists. [all …]
|
H A D | PKCS12_add1_attr_by_NID.pod | 21 PKCS12_add1_attr_by_NID() adds an attribute of type B<nid> with a value of ASN1 24 PKCS12_add1_attr_by_txt() adds an attribute of type B<attrname> with a value of 37 A return value of 1 indicates success, 0 indicates failure.
|
H A D | OSSL_CRMF_MSG_set1_regInfo_certReq.pod | 30 value as utf8Pairs regInfo to the given I<msg>. See RFC 4211 section 7.1. 35 OSSL_CRMF_MSG_set1_regInfo_certReq() adds a copy of the given I<cr> value 40 All get0_*() functions return the respective pointer value, NULL if not present.
|
H A D | EVP_PKEY_meth_get_count.pod | 12 hidden entirely by defining B<OPENSSL_API_COMPAT> with a suitable version value, 29 EVP_PKEY_meth_get0() returns the public key method B<idx>. The value of B<idx> 42 EVP_PKEY_meth_get0_info() does not return a value.
|
H A D | PKCS12_SAFEBAG_create_cert.pod | 17 const unsigned char* value, 46 I<type> with an ASN1 value of type I<vtype> constructed using the bytes in 47 I<value> of length I<len>. 59 value of 2048 is used. If I<salt> is NULL then a salt is generated randomly.
|
/openssl/crypto/asn1/ |
H A D | t_bitst.c | 33 int ASN1_BIT_STRING_set_asc(ASN1_BIT_STRING *bs, const char *name, int value, in ASN1_BIT_STRING_set_asc() argument 41 if (!ASN1_BIT_STRING_set_bit(bs, bitnum, value)) in ASN1_BIT_STRING_set_asc()
|
/openssl/crypto/ocsp/ |
H A D | ocsp_cl.c | 190 *pname = rid->value.byName; in OCSP_resp_get0_id() 193 *pid = rid->value.byKey; in OCSP_resp_get0_id() 208 *pname = X509_NAME_dup(rid->value.byName); in OCSP_resp_get1_id() 211 *pid = ASN1_OCTET_STRING_dup(rid->value.byKey); in OCSP_resp_get1_id() 261 OCSP_REVOKEDINFO *rev = cst->value.revoked; in OCSP_single_get0_status()
|
/openssl/test/ |
H A D | v3ext.c | 230 const char *value; member 283 BIO *extbio = BIO_new_mem_buf(extvalues[i].value, in test_ext_syntax() 284 strlen(extvalues[i].value)); in test_ext_syntax() 305 TEST_info("Value: %s", extvalues[i].value); in test_ext_syntax() 313 TEST_info("Value: %s", extvalues[i].value); in test_ext_syntax()
|
H A D | bioprinttest.c | 111 size_t value; member 136 BIO_snprintf(bio_buf, sizeof(bio_buf) - 1, data->format, data->value); in test_zu() 143 uint64_t value; member 164 BIO_snprintf(bio_buf, sizeof(bio_buf) - 1, data->format, data->value); in test_j()
|
/openssl/doc/internal/man3/ |
H A D | ossl_init_thread_deregister.pod | 30 Typically, when a new thread is being used, code will add a new value to some 33 clean up the value stored in the thread local variable. 36 The I<index> parameter should be a unique value that can be used to identify a 46 registered for) which the same I<index> value.
|
/openssl/doc/man7/ |
H A D | EVP_SIGNATURE-RSA.pod | 29 The type of padding to be used. Its value can be one of the following: 50 NULL is used if this optional value is not set. 54 The "pss" mode minimum salt length. The value can either be an integer, 55 a string value representing a number or one of the following string values:
|
H A D | EVP_MD-common.pod | 21 This value can also be retrieved with L<EVP_MD_get_block_size(3)>. 28 This value can also be retrieved with L<EVP_MD_get_size(3)>. 45 This value can also be retrieved with L<EVP_MD_get_flags(3)>.
|
H A D | EVP_KDF-TLS1_PRF.pod | 38 This parameter sets the secret value of the TLS PRF. 39 Any existing secret value is replaced. 56 The digest, secret value and seed must be set before a key is derived otherwise 65 and seed value "seed":
|
H A D | openssl_user_macros.pod.in | 15 compilation command (C<cc -DMACRO=value>) or by defining the macro in 27 The value is a version number, given in one of the following two forms: 77 If B<OPENSSL_API_COMPAT> is undefined, this default value is used in its 88 (or the default value given above, when B<OPENSSL_API_COMPAT> isn't defined)
|
/openssl/crypto/evp/ |
H A D | evp_cnf.c | 56 oval->value, 0, 0)) { in alg_module_init() 62 "name=%s, value=%s", oval->name, oval->value); in alg_module_init()
|
/openssl/doc/designs/quic-design/ |
H A D | quic-statm.md | 49 - `ack_delay`. This is the ACK Delay value; see RFC 9000. 52 `OSSL_TIME_ZERO`, the existing Latest RTT value is used when updating the 58 to retrieve the value and enforce the maximum ACK delay if appropriate.
|
/openssl/doc/internal/man7/ |
H A D | build.info.pod | 35 B<DEFINE[>I<items>B<]=> I<name>[B<=>I<value>] ... 39 B<$>I<VARIABLE>B<=>I<value> 123 =item B<I<KEYWORD>> B<=> I<value> ... 125 =item B<I<KEYWORD>[>I<items>B<]> B<=> I<value> ... 176 B<=> I<value> ... 179 [,...]B<}> B<=> I<value> ... 247 condition value in B<IF> and B<ELSIF> can really be any literal value 262 =item B<$>I<NAME> B<=> I<value> 445 filename used as a value anywhere. 518 =item B<DEFINE[>I<items>B<]> B<=> I<name>[B<=>I<value>] ... [all …]
|
/openssl/crypto/crmf/ |
H A D | crmf_lib.c | 59 return atav->value.atyp; \ 74 if ((atav->value.atyp = valt##_dup(in)) == NULL) \ 420 if ((pp->value.raVerified = ASN1_NULL_new()) == NULL) in OSSL_CRMF_MSG_create_popo() 435 pp->value.signature = ps; in OSSL_CRMF_MSG_create_popo() 440 if ((pp->value.keyEncipherment = OSSL_CRMF_POPOPRIVKEY_new()) == NULL) in OSSL_CRMF_MSG_create_popo() 443 pp->value.keyEncipherment->type = in OSSL_CRMF_MSG_create_popo() 445 pp->value.keyEncipherment->value.subsequentMessage = tag; in OSSL_CRMF_MSG_create_popo() 500 sig = req->popo->value.signature; in OSSL_CRMF_MSGS_verify_popo()
|
/openssl/crypto/ |
H A D | packet.c | 210 static int put_value(unsigned char *data, uint64_t value, size_t len) in put_value() argument 216 *data = (unsigned char)(value & 0xff); in put_value() 218 value >>= 8; in put_value() 222 if (value > 0) in put_value() 228 static int put_quic_value(unsigned char *data, size_t value, size_t len) in put_quic_value() argument 234 if (ossl_quic_vlint_encode_len(value) > len) in put_quic_value() 237 ossl_quic_vlint_encode_n(data, value, len); in put_quic_value()
|
/openssl/crypto/dsa/ |
H A D | dsa_pmeth.c | 187 const char *type, const char *value) in pkey_dsa_ctrl_str() argument 191 nbits = atoi(value); in pkey_dsa_ctrl_str() 195 int qbits = atoi(value); in pkey_dsa_ctrl_str() 199 const EVP_MD *md = EVP_get_digestbyname(value); in pkey_dsa_ctrl_str()
|
/openssl/crypto/x509/ |
H A D | x509name.c | 322 return ASN1_STRING_set_by_NID(&ne->value, bytes, in X509_NAME_ENTRY_set_data() 327 i = ASN1_STRING_set(ne->value, bytes, len); in X509_NAME_ENTRY_set_data() 332 ne->value->type = ASN1_PRINTABLE_type(bytes, len); in X509_NAME_ENTRY_set_data() 334 ne->value->type = type; in X509_NAME_ENTRY_set_data() 350 return ne->value; in X509_NAME_ENTRY_get_data()
|