/openssl/demos/http3/ |
H A D | ossl-nghttp3-demo.c | 14 static void make_nv(nghttp3_nv *nv, const char *name, const char *value) in make_nv() argument 17 nv->value = (uint8_t *)value; in make_nv() 19 nv->valuelen = strlen(value); in make_nv() 25 nghttp3_rcbuf *name, nghttp3_rcbuf *value, in on_recv_header() argument 34 vvalue = nghttp3_rcbuf_get_buf(value); in on_recv_header()
|
/openssl/doc/man3/ |
H A D | EVP_PKEY_CTX_set_tls1_prf_md.pod | 29 EVP_PKEY_CTX_set_tls1_prf_secret() sets the secret value of the TLS PRF 30 to B<seclen> bytes of the buffer B<sec>. Any existing secret value is replaced 34 If a seed is already set it is appended to the existing value. 40 The B<type> parameter "md" uses the supplied B<value> as the name of the digest 42 The B<type> parameters "secret" and "seed" use the supplied B<value> parameter 43 as a secret or seed value. 53 The digest, secret value and seed must be set before a key is derived or an 67 All these functions return 1 for success and 0 or a negative value for failure. 68 In particular a return value of -2 indicates the operation is not supported by 74 and seed value "seed":
|
H A D | OSSL_LIB_CTX_set_conf_diagnostics.pod | 12 void OSSL_LIB_CTX_set_conf_diagnostics(OSSL_LIB_CTX *ctx, int value); 17 OSSL_LIB_CTX_set_conf_diagnostics() sets the value of the configuration 18 diagnostics flag. If I<value> is nonzero subsequent parsing and application 24 sets a B<config_diagnostics> value as described in L<config(5)>, it will 25 override the value set by OSSL_LIB_CTX_set_conf_diagnostics() before 28 OSSL_LIB_CTX_get_conf_diagnostics() returns the current value of the
|
H A D | OCSP_request_add1_nonce.pod | 18 OCSP_request_add1_nonce() adds a nonce of value B<val> and length B<len> to 25 OCSP_check_nonce() compares the nonce value in B<req> and B<resp>. 27 OCSP_copy_nonce() copies any nonce value present in B<req> to B<resp>. 38 and B<resp>. The return value indicates the result of the comparison. If 46 For most purposes the nonce value in a request is set to a random value so 50 by checking the same nonce value appears in the response. 59 positive return value effectively indicates success: nonces are both present 62 this will happen if the responder doesn't support nonces. A zero return value
|
H A D | SSL_SESSION_get0_hostname.pod | 26 SSL_SESSION_get0_hostname() retrieves the SNI value that was sent by the 32 The value returned is a pointer to memory maintained within B<s> and 35 SSL_SESSION_set1_hostname() sets the SNI value for the hostname to a copy of 39 session and its associated length in bytes. The returned value of B<*alpn> is a 43 value in B<alpn> which should be of length B<len> bytes. A copy of the input 44 value is made, and the caller retains ownership of the memory pointed to by 50 is the SNI value sent by client.
|
H A D | SSL_get_default_timeout.pod | 5 SSL_get_default_timeout - get default session timeout value 15 SSL_get_default_timeout() returns the default timeout value assigned to 20 Whenever a new session is negotiated, it is assigned a timeout value, 22 value was not explicitly set using 26 SSL_get_default_timeout() return this hardcoded value, which is 300 seconds
|
H A D | EVP_PKEY_CTX_set_hkdf_md.pod | 54 operation. The value returned will be the intermediate fixed-length pseudorandom 74 buffer B<salt>. Any existing value is replaced. 77 B<key>. Any existing value is replaced. 79 EVP_PKEY_CTX_add1_hkdf_info() sets the info value to B<infolen> bytes of the 80 buffer B<info>. If a value is already set, it is appended to the existing 81 value. 87 The B<type> parameter "md" uses the supplied B<value> as the name of the digest 91 The B<type> parameters "salt", "key" and "info" use the supplied B<value> 92 parameter as a B<seed>, B<key> or B<info> value. 119 In particular a return value of -2 indicates the operation is not supported by [all …]
|
H A D | DH_generate_key.pod | 13 hidden entirely by defining B<OPENSSL_API_COMPAT> with a suitable version value, 31 the other party's public value to compute the shared key. 34 B<dh-E<gt>p> and B<dh-E<gt>g>. It generates a random private DH value 36 corresponding public value B<dh-E<gt>pub_key>, which can then be 39 DH_compute_key() computes the shared secret from the private DH value 40 in B<dh> and the other party's public value in B<pub_key> and stores 44 The return value should be considered public. 49 The return value should be considered public.
|
H A D | BN_zero.pod | 28 BN_value_one() returns a B<BIGNUM> constant of value 1. This constant 35 BN_get_word() returns the value B<a>, or all-bits-set if B<a> cannot 40 BN_zero() never fails and returns no value. 44 If a B<BIGNUM> is equal to the value of all-bits-set, it will collide 46 as an error value. 56 In OpenSSL 0.9.8, BN_zero() was changed to not return a value; previous
|
H A D | EVP_PKEY_gettable_params.pod | 44 obtain an integer value that does not fit into a native C B<int> type will cause 46 value that is negative or does not fit into a native C B<size_t> type using 49 EVP_PKEY_get_int_param() retrieves a key I<pkey> integer value I<*out> 53 EVP_PKEY_get_size_t_param() retrieves a key I<pkey> size_t value I<*out> 57 EVP_PKEY_get_bn_param() retrieves a key I<pkey> BIGNUM value I<**bn> 61 EVP_PKEY_get_utf8_string_param() get a key I<pkey> UTF8 string value into a 64 value including a terminating NUL byte, or this function will fail. 70 EVP_PKEY_get_octet_string_param() get a key I<pkey>'s octet string value into a 84 All other methods return 1 if a value associated with the key's I<key_name> was 88 value. If I<out_len> is not NULL, I<*out_len> will be assigned the required [all …]
|
/openssl/crypto/ocsp/ |
H A D | ocsp_srv.c | 122 if ((cs->value.revoked = ri = OCSP_REVOKEDINFO_new()) == NULL) in OCSP_basic_add1_status() 135 if ((cs->value.good = ASN1_NULL_new()) == NULL) in OCSP_basic_add1_status() 140 if ((cs->value.unknown = ASN1_NULL_new()) == NULL) in OCSP_basic_add1_status() 238 if (!X509_NAME_set(&respid->value.byName, X509_get_subject_name(cert))) in OCSP_RESPID_set_by_name() 271 respid->value.byKey = byKey; in OCSP_RESPID_set_by_key_ex() 299 if (respid->value.byKey == NULL) in OCSP_RESPID_match_ex() 306 ret = (ASN1_STRING_length(respid->value.byKey) == SHA_DIGEST_LENGTH) in OCSP_RESPID_match_ex() 307 && (memcmp(ASN1_STRING_get0_data(respid->value.byKey), md, in OCSP_RESPID_match_ex() 310 if (respid->value.byName == NULL) in OCSP_RESPID_match_ex() 313 return X509_NAME_cmp(respid->value.byName, in OCSP_RESPID_match_ex()
|
/openssl/crypto/ |
H A D | der_writer.c | 81 int ossl_DER_w_octet_string_uint32(WPACKET *pkt, int tag, uint32_t value) in ossl_DER_w_octet_string_uint32() argument 86 while (value > 0) { in ossl_DER_w_octet_string_uint32() 87 *pbuf-- = (value & 0xFF); in ossl_DER_w_octet_string_uint32() 88 value >>= 8; in ossl_DER_w_octet_string_uint32() 112 const uint32_t *value = v; in int_put_bytes_uint32() local 113 uint32_t tmp = *value; in int_put_bytes_uint32() 124 return WPACKET_put_bytes__(pkt, *value, n); in int_put_bytes_uint32()
|
/openssl/doc/man7/ |
H A D | EVP_PKEY-FFC.pod | 30 The B<DHX> key type uses X9.42 format which saves the value of 'q' and this 43 The public key value. 47 The private key value. 57 A DSA or Diffie-Hellman prime "p" value. 61 A DSA or Diffie-Hellman generator "g" value. 71 A DSA or Diffie-Hellman prime "q" value. 83 Set this to a positive value from 0..FF to use this mode. This I<gindex> can 84 then be reused during key validation to verify the value of I<g>. If this value 96 generation of I<g>. Its value is the first integer larger than one that 115 This boolean value is used during key validation checks [all …]
|
/openssl/doc/internal/man7/ |
H A D | VERSION.pod | 20 assignments. When given an empty value, they are seen as unassigned. 34 a dash. For a value C<foo>, the C macro B<OPENSSL_VERSION_PRE_RELEASE> gets 41 value C<bar>, the C macro B<OPENSSL_VERSION_BUILD_METADATA> gets the string 46 Defined in releases. When not set, it gets the value C<xx XXX xxxx>. 70 If B<PRERELEASE> is assigned a value, $config{prerelease} gets that same value, 75 If B<BUILD_METADATA> is assigned a value, $config{build_metadata} gets that same 76 value, prefixed by a plus sign, otherwise the empty string. 80 If B<RELEASE_DATE> is assigned a value, $config{release_date} gets that same 81 value, otherwise the string C<xx XXX yyyy>.
|
/openssl/crypto/ts/ |
H A D | ts_conf.c | 326 const char *extval = val->value ? val->value : val->name; in TS_CONF_set_policies() 365 const char *extval = val->value ? val->value : val->name; in TS_CONF_set_digests() 397 if (val->value) in TS_CONF_set_accuracy() 398 secs = atoi(val->value); in TS_CONF_set_accuracy() 400 if (val->value) in TS_CONF_set_accuracy() 401 millis = atoi(val->value); in TS_CONF_set_accuracy() 403 if (val->value) in TS_CONF_set_accuracy() 404 micros = atoi(val->value); in TS_CONF_set_accuracy() 447 if (value) { in ts_CONF_add_flag() 448 if (strcmp(value, ENV_VALUE_YES) == 0) in ts_CONF_add_flag() [all …]
|
/openssl/crypto/cmp/ |
H A D | cmp_msg.c | 181 if ((msg->body->value.ir = OSSL_CRMF_MSGS_new()) == NULL) in ossl_cmp_msg_create() 211 if ((msg->body->value.certConf = in ossl_cmp_msg_create() 216 if ((msg->body->value.pkiconf = ASN1_TYPE_new()) == NULL) in ossl_cmp_msg_create() 218 ASN1_TYPE_set(msg->body->value.pkiconf, V_ASN1_NULL, NULL); in ossl_cmp_msg_create() 427 if (!sk_OSSL_CRMF_MSG_push(msg->body->value.ir, local_crm)) in ossl_cmp_certreq_new() 564 if (!sk_OSSL_CMP_REVDETAILS_push(msg->body->value.rr, rd)) in ossl_cmp_rr_new() 594 rep = msg->body->value.rp; in ossl_cmp_rp_new() 741 OSSL_CMP_PKISI_free(msg->body->value.error->pKIStatusInfo); in ossl_cmp_error_new() 757 msg->body->value.error->errorDetails = ft; in ossl_cmp_error_new() 917 if (!sk_OSSL_CMP_POLLREP_push(msg->body->value.pollRep, prep)) in ossl_cmp_pollRep_new() [all …]
|
/openssl/crypto/rsa/ |
H A D | rsa_pmeth.c | 658 if (value == NULL) { in pkey_rsa_ctrl_str() 665 if (strcmp(value, "pkcs1") == 0) { in pkey_rsa_ctrl_str() 675 } else if (strcmp(value, "pss") == 0) { in pkey_rsa_ctrl_str() 687 if (!strcmp(value, "digest")) in pkey_rsa_ctrl_str() 689 else if (!strcmp(value, "max")) in pkey_rsa_ctrl_str() 691 else if (!strcmp(value, "auto")) in pkey_rsa_ctrl_str() 694 saltlen = atoi(value); in pkey_rsa_ctrl_str() 699 int nbits = atoi(value); in pkey_rsa_ctrl_str() 708 if (!BN_asc2bn(&pubexp, value)) in pkey_rsa_ctrl_str() 716 int nprimes = atoi(value); in pkey_rsa_ctrl_str() [all …]
|
/openssl/crypto/engine/ |
H A D | eng_cnf.c | 43 static int int_engine_configure(const char *name, const char *value, const CONF *cnf) in int_engine_configure() argument 57 ecmds = NCONF_get_section(cnf, value); in int_engine_configure() 67 ctrlvalue = ecmd->value; in int_engine_configure() 112 if (!NCONF_get_number_e(cnf, value, "init", &do_init)) in int_engine_configure() 141 ecmd->section, ecmd->name, ecmd->value); in int_engine_configure() 164 if (!int_engine_configure(cval->name, cval->value, cnf)) in int_engine_module_init()
|
/openssl/test/ |
H A D | params_conversion_test.c | 66 pc->param = OSSL_PARAM_locate(params, type = pp->value); in param_conversion_load_stanza() 76 if (OPENSSL_strcasecmp(pp->value, "invalid") != 0) { in param_conversion_load_stanza() 78 pc->i32 = (int32_t)strtoimax(pp->value, &p, 10); in param_conversion_load_stanza() 85 if (OPENSSL_strcasecmp(pp->value, "invalid") != 0) { in param_conversion_load_stanza() 87 pc->i64 = (int64_t)strtoimax(pp->value, &p, 10); in param_conversion_load_stanza() 94 if (OPENSSL_strcasecmp(pp->value, "invalid") != 0) { in param_conversion_load_stanza() 96 pc->u32 = (uint32_t)strtoumax(pp->value, &p, 10); in param_conversion_load_stanza() 103 if (OPENSSL_strcasecmp(pp->value, "invalid") != 0) { in param_conversion_load_stanza() 105 pc->u64 = (uint64_t)strtoumax(pp->value, &p, 10); in param_conversion_load_stanza() 112 if (OPENSSL_strcasecmp(pp->value, "invalid") != 0) { in param_conversion_load_stanza() [all …]
|
H A D | d2i_test.c | 47 ASN1_VALUE *value = NULL; in test_bad_asn1() local 74 value = ASN1_item_d2i(NULL, &buf_ptr, len, item_type); in test_bad_asn1() 75 if (value == NULL) { in test_bad_asn1() 81 derlen = ASN1_item_i2d(value, &der, item_type); in test_bad_asn1() 105 ASN1_item_free(value, item_type); in test_bad_asn1()
|
/openssl/crypto/asn1/ |
H A D | asn_mime.c | 420 || hdr->value == NULL) { in SMIME_read_ASN1_ex() 456 || hdr->value == NULL) { in SMIME_read_ASN1_ex() 494 "type: %s", hdr->value); in SMIME_read_ASN1_ex() 586 || hdr->value == NULL) { in SMIME_text() 591 if (strcmp(hdr->value, "text/plain")) { in SMIME_text() 868 if (value) { in mime_hdr_new() 878 mhdr->value = tmpval; in mime_hdr_new() 902 if (value) { in mime_hdr_addparam() 903 tmpval = OPENSSL_strdup(value); in mime_hdr_addparam() 948 htmp.value = NULL; in mime_hdr_find() [all …]
|
/openssl/test/helpers/ |
H A D | pkcs12.c | 353 TEST_info("Adding attribute %s = %s", p_attr->oid, p_attr->value); in add_attributes() 361 strlen(p_attr->value)))) in add_attributes() 476 char *value = NULL; in check_asn1_string() local 483 value = OPENSSL_uni2asc(av->value.bmpstring->data, in check_asn1_string() 484 av->value.bmpstring->length); in check_asn1_string() 485 if (!TEST_str_eq(txt, (char *)value)) in check_asn1_string() 491 av->value.utf8string->length)) in check_asn1_string() 497 (char *)av->value.octet_string->data, in check_asn1_string() 498 av->value.octet_string->length)) in check_asn1_string() 508 OPENSSL_free(value); in check_asn1_string() [all …]
|
/openssl/include/internal/ |
H A D | json_enc.h | 197 void ossl_json_bool(OSSL_JSON_ENC *json, int value); 200 void ossl_json_u64(OSSL_JSON_ENC *json, uint64_t value); 203 void ossl_json_i64(OSSL_JSON_ENC *json, int64_t value); 206 void ossl_json_f64(OSSL_JSON_ENC *json, double value);
|
/openssl/crypto/crmf/ |
H A D | crmf_local.h | 91 } value; member 157 ASN1_BIT_STRING *value; member 193 } value; member 236 } value; member 277 } value; member
|
/openssl/crypto/x509/ |
H A D | x509_ext.c | 55 int X509_CRL_add1_ext_i2d(X509_CRL *x, int nid, void *value, int crit, in X509_CRL_add1_ext_i2d() argument 58 return X509V3_add1_i2d(&x->crl.extensions, nid, value, crit, flags); in X509_CRL_add1_ext_i2d() 107 int X509_add1_ext_i2d(X509 *x, int nid, void *value, int crit, in X509_add1_ext_i2d() argument 110 return X509V3_add1_i2d(&x->cert_info.extensions, nid, value, crit, in X509_add1_ext_i2d() 155 int X509_REVOKED_add1_ext_i2d(X509_REVOKED *x, int nid, void *value, int crit, in X509_REVOKED_add1_ext_i2d() argument 158 return X509V3_add1_i2d(&x->extensions, nid, value, crit, flags); in X509_REVOKED_add1_ext_i2d()
|