Home
last modified time | relevance | path

Searched refs:value (Results 176 – 200 of 861) sorted by relevance

12345678910>>...35

/openssl/doc/man3/
H A DSSL_extension_supported.pod78 L</EXTENSION CALLBACKS> section below). The B<context> value determines
86 B<context> value to:
95 the B<context> value to the same as for SSL_CTX_add_client_custom_ext() above.
108 extension type which will be added and B<add_arg> to the value set when the
120 alert value specified in B<*al>.
144 (if it is set) with the value of B<out> set by the add callback. It can be
161 value of 0.
164 1. If it returns 0 or a negative value a fatal handshake error occurs
165 using the TLS alert value specified in B<*al>.
194 Extensions are not typically defined for SSLv3. Setting this value will allow
[all …]
H A DASN1_TIME_set.pod71 value I<t>. If I<s> is NULL a new time structure is allocated and returned.
75 by the time I<offset_day> and I<offset_sec> after the time_t value I<t>.
77 time before I<t>. The I<offset_sec> value can also exceed the number of
96 B<ASN1_UTCTIME> into a time value that can be used in a certificate. It
107 If the time structure has invalid format it prints out "Bad time value" and
130 sign. The value of I<*psec> will always be less than the number of seconds
164 Some applications add offset times directly to a time_t value and pass the
166 time_t value can overflow on some systems resulting in unexpected results.
169 manipulating a time_t value.
192 Use the ASN1_TIME_normalize() function to normalize the time value before
[all …]
H A DBN_new.pod25 L<OPENSSL_secure_malloc(3)> is used to store the value.
29 to the value 0.
40 return a pointer to the B<BIGNUM> initialised to the value 0.
H A DECDSA_sign.pod15 hidden entirely by defining B<OPENSSL_API_COMPAT> with a suitable version value,
53 ECDSA_sign() computes a digital signature of the I<dgstlen> bytes hash value
66 valid ECDSA signature of the hash value I<dgst> of size I<dgstlen> using the
82 ECDSA_sign_ex() computes a digital signature of the I<dgstlen> bytes hash value
107 Creating an ECDSA signature of a given SHA-256 hash value using the
124 Second step: compute the ECDSA signature of a SHA-256 hash value
150 and finally evaluate the return value:
H A DDTLSv1_listen.pod100 SSL_stateless() will fail (with a 0 return value) if some TLS version less than
111 For SSL_stateless() a return value of 1 indicates success and the B<ssl> object
112 will be set up ready to continue the handshake. A return value of 0 or -1
113 indicates failure. If the value is 0 then a HelloRetryRequest was sent. A value
116 For DTLSv1_listen() a return value of >= 1 indicates success. The B<ssl> object
117 will be set up ready to continue the handshake. the B<peer> value will also be
120 A return value of 0 indicates a non-fatal error. This could (for
126 A return value of <0 indicates a fatal error. This could (for example) be
H A DSSL_CTX_set_alpn_select_cb.pod60 is NULL, ALPN is not used. The B<arg> value is a pointer which is passed to
64 vector in protocol-list format. The value of the B<out>, B<outlen> vector
65 should be set to the value of a single protocol selected from the B<in>,
76 in B<out>, B<outlen>. The B<out> value will point into either B<server> or
84 the NPN callback. In the ALPN case, the value returned in B<out> and B<outlen>
97 fatal to the connection if this callback returns a value other than
119 the client can request any protocol it chooses. The value returned from
153 non-0 on failure. WARNING: these functions reverse the return value convention.
192 B<SSL_TLSEXT_ERR_OK> if successful. Any other value is fatal to the connection.
H A DSSL_accept.pod28 to continue the handshake, indicating the problem by the return value -1.
30 return value of SSL_accept() will yield B<SSL_ERROR_WANT_READ> or
48 return value B<ret> to find out the reason.
60 for nonblocking BIOs. Call SSL_get_error() with the return value B<ret>
H A DX509V3_set_ctx.pod24 hash value of its public key, the public key is taken from I<subject> or I<req>.
29 I<issuer> may be the same pointer value as I<subject> (which usually is an
32 extension will be taken from any value provided using X509V3_set_issuer_pkey().
43 X509V3_set_ctx() have the same pointer value
H A DDH_generate_parameters.pod16 hidden entirely by defining B<OPENSSL_API_COMPAT> with a suitable version value,
29 hidden entirely by defining B<OPENSSL_API_COMPAT> with a suitable version value,
67 The value of B<*codes> is updated with any problems found.
96 value of B<*codes> is updated with any problems found. If B<*codes> is zero then
107 The parameter B<p> is not a safe prime and no B<q> value is present.
131 If 0 is returned or B<*codes> is set to a nonzero value the supplied
H A DEC_POINT_add.pod22 hidden entirely by defining B<OPENSSL_API_COMPAT> with a suitable version value,
47 coordinate system. In the case of EC_POINTs_make_affine the value B<num> provides the number of poi…
51 EC_POINT_mul calculates the value generator * B<n> + B<q> * B<m> and stores the result in B<r>.
52 The value B<n> may be NULL in which case the result is just B<q> * B<m> (variable point multiplicat…
56 …NTs_mul calculates the value generator * B<n> + B<q[0]> * B<m[0]> + ... + B<q[num-1]> * B<m[num-1]…
H A DX509V3_get_d2i.pod19 int X509V3_add1_i2d(STACK_OF(X509_EXTENSION) **x, int nid, void *value,
26 int X509_add1_ext_i2d(X509 *x, int nid, void *value, int crit,
30 int X509_ACERT_add1_ext_i2d(X509_ACERT *x, int nid, void *value, int crit,
34 int X509_CRL_add1_ext_i2d(X509_CRL *crl, int nid, void *value, int crit,
38 int X509_REVOKED_add1_ext_i2d(X509_REVOKED *r, int nid, void *value, int crit,
52 If I<crit> is not NULL then I<*crit> is set to a status value: -2 if the
58 X509V3_add1_i2d() adds extension I<value> to STACK I<*x> (allocating a new
121 determine the precise reason by checking the value of I<*crit>.
H A DEVP_KDF.pod81 The returned value must eventually be freed with
197 The default value, if any, is implementation dependent.
205 The default value, if any, is implementation dependent.
218 The value is always the name of the intended algorithm,
237 be concatenated to form the final value.
245 The default value, if any, is implementation dependent.
258 The default value is implementation dependent.
276 EVP_KDF_CTX_free() and EVP_KDF_CTX_reset() do not return a value.
284 return value of 0 means that the callback was not called for any names.
286 The remaining functions return 1 for success and 0 or a negative value for
[all …]
H A DOPENSSL_instrument_bus.pod30 probes with the same value, i.e. in a way it records duration of
33 with B<max> value of 0 meaning "as many as it takes."
37 Return value of 0 indicates that CPU is not capable of performing the
/openssl/doc/internal/man7/
H A Dbuild.info.pod35 B<DEFINE[>I<items>B<]=> I<name>[B<=>I<value>] ...
39 B<$>I<VARIABLE>B<=>I<value>
123 =item B<I<KEYWORD>> B<=> I<value> ...
125 =item B<I<KEYWORD>[>I<items>B<]> B<=> I<value> ...
176 B<=> I<value> ...
179 [,...]B<}> B<=> I<value> ...
247 condition value in B<IF> and B<ELSIF> can really be any literal value
262 =item B<$>I<NAME> B<=> I<value>
445 filename used as a value anywhere.
551 =item B<DEFINE[>I<items>B<]> B<=> I<name>[B<=>I<value>] ...
[all …]
/openssl/test/
H A Dstack_test.c59 int value; in test_int_stack() member
72 int value; in test_int_stack() member
141 if (!TEST_int_eq(sk_sint_find(s, &finds[i].value), finds[i].sorted)) { in test_int_stack()
148 if (!TEST_int_eq(sk_sint_find_ex(s, &finds[i].value), finds[i].ex)) { in test_int_stack()
153 if (!TEST_int_eq(sk_sint_find_ex(s, &exfinds[i].value), exfinds[i].ex)) { in test_int_stack()
/openssl/crypto/x509/
H A Dx509name.c325 return ASN1_STRING_set_by_NID(&ne->value, bytes, in X509_NAME_ENTRY_set_data()
330 i = ASN1_STRING_set(ne->value, bytes, len); in X509_NAME_ENTRY_set_data()
335 ne->value->type = ASN1_PRINTABLE_type(bytes, len); in X509_NAME_ENTRY_set_data()
337 ne->value->type = type; in X509_NAME_ENTRY_set_data()
353 return ne->value; in X509_NAME_ENTRY_get_data()
H A Dv3_asid.c548 if (val->value == NULL) { in v2i_ASIdentifiers()
556 if (strcmp(val->value, "inherit") == 0) { in v2i_ASIdentifiers()
567 i1 = strspn(val->value, "0123456789"); in v2i_ASIdentifiers()
568 if (val->value[i1] == '\0') { in v2i_ASIdentifiers()
572 i2 = i1 + strspn(val->value + i1, " \t"); in v2i_ASIdentifiers()
573 if (val->value[i2] != '-') { in v2i_ASIdentifiers()
579 i2 = i2 + strspn(val->value + i2, " \t"); in v2i_ASIdentifiers()
580 i3 = i2 + strspn(val->value + i2, "0123456789"); in v2i_ASIdentifiers()
581 if (val->value[i3] != '\0') { in v2i_ASIdentifiers()
597 char *s = OPENSSL_strdup(val->value); in v2i_ASIdentifiers()
/openssl/doc/man1/
H A Dopenssl-pkeyutl.pod.in37 [B<-pkeyopt> I<opt>:I<value>]
164 secret value generated in the encapsulation process.
196 =item B<-pkeyopt> I<opt>:I<value>
204 stdin. Alternatively, I<passarg> can be specified which can be any value
240 The value I<alg> should represent a digest name as used in the
281 value has correct PKCS#1 v1.5 padding.
335 default value.
340 value less than the minimum restriction.
382 be passed in. The following B<-pkeyopt> value is supported:
397 should be a valid hexadecimal value.
[all …]
/openssl/crypto/dsa/
H A Ddsa_pmeth.c197 const char *type, const char *value) in pkey_dsa_ctrl_str() argument
201 nbits = atoi(value); in pkey_dsa_ctrl_str()
205 int qbits = atoi(value); in pkey_dsa_ctrl_str()
209 const EVP_MD *md = EVP_get_digestbyname(value); in pkey_dsa_ctrl_str()
/openssl/doc/man7/
H A DEVP_KDF-KB.pod32 The value is either CMAC, HMAC, KMAC128 or KMAC256.
53 The default value of B<1> will be used if unspecified.
59 The default value of B<1> will be used if unspecified.
63 Set the fixed value 'r', indicating the length of the counter in bits.
66 The default value of B<32> will be used if unspecified.
82 The default value of 1 causes an error during EVP_KDF_CTX_set_params() if the
/openssl/crypto/conf/
H A Dconf_ssl.c88 STACK_OF(CONF_VALUE) *cmds = NCONF_get_section(cnf, sect->value); in ssl_module_init()
97 "name=%s, value=%s", sect->name, sect->value); in ssl_module_init()
120 cmd->arg = OPENSSL_strdup(cmd_conf->value); in ssl_module_init()
/openssl/providers/common/der/
H A Doids_to_c.pm87 my $value = $2;
92 register_oid($name, $value);
/openssl/test/testutil/
H A Ddriver.c190 int value; in process_shared_options() local
220 if (!opt_int(opt_arg(), &value)) in process_shared_options()
222 level = 4 * value; in process_shared_options()
226 if (!opt_int(opt_arg(), &value)) in process_shared_options()
228 set_seed(value); in process_shared_options()
/openssl/crypto/asn1/
H A Da_bitstr.c143 int ASN1_BIT_STRING_set_bit(ASN1_BIT_STRING *a, int n, int value) in ASN1_BIT_STRING_set_bit() argument
154 if (!value) in ASN1_BIT_STRING_set_bit()
163 if (!value) in ASN1_BIT_STRING_set_bit()
/openssl/doc/internal/man3/
H A DOPTIONS.pod41 int opt_int(const char *value, int *result);
43 int opt_long(const char *value, long *result);
44 int opt_ulong(const char *value, unsigned long *result);
45 int opt_intmax(const char *value, intmax_t *result);
46 int opt_uintmax(const char *value, uintmax_t *result);
114 \0 No value
115 '-' No value
213 The opt_getprog() function returns the value set by opt_appname().
263 C<result> pointer with the value, or 0 on error. Note that opt_next()
271 The opt_format() function takes a string value,
[all …]

Completed in 50 milliseconds

12345678910>>...35