Home
last modified time | relevance | path

Searched refs:value (Results 51 – 75 of 861) sorted by relevance

12345678910>>...35

/openssl/demos/http3/
H A Dossl-nghttp3-demo.c14 static void make_nv(nghttp3_nv *nv, const char *name, const char *value) in make_nv() argument
17 nv->value = (uint8_t *)value; in make_nv()
19 nv->valuelen = strlen(value); in make_nv()
25 nghttp3_rcbuf *name, nghttp3_rcbuf *value, in on_recv_header() argument
34 vvalue = nghttp3_rcbuf_get_buf(value); in on_recv_header()
/openssl/doc/man3/
H A DEVP_PKEY_CTX_set_tls1_prf_md.pod29 EVP_PKEY_CTX_set_tls1_prf_secret() sets the secret value of the TLS PRF
30 to B<seclen> bytes of the buffer B<sec>. Any existing secret value is replaced
34 If a seed is already set it is appended to the existing value.
40 The B<type> parameter "md" uses the supplied B<value> as the name of the digest
42 The B<type> parameters "secret" and "seed" use the supplied B<value> parameter
43 as a secret or seed value.
53 The digest, secret value and seed must be set before a key is derived or an
67 All these functions return 1 for success and 0 or a negative value for failure.
68 In particular a return value of -2 indicates the operation is not supported by
74 and seed value "seed":
H A DOSSL_LIB_CTX_set_conf_diagnostics.pod12 void OSSL_LIB_CTX_set_conf_diagnostics(OSSL_LIB_CTX *ctx, int value);
17 OSSL_LIB_CTX_set_conf_diagnostics() sets the value of the configuration
18 diagnostics flag. If I<value> is nonzero subsequent parsing and application
24 sets a B<config_diagnostics> value as described in L<config(5)>, it will
25 override the value set by OSSL_LIB_CTX_set_conf_diagnostics() before
28 OSSL_LIB_CTX_get_conf_diagnostics() returns the current value of the
H A DOCSP_request_add1_nonce.pod18 OCSP_request_add1_nonce() adds a nonce of value B<val> and length B<len> to
25 OCSP_check_nonce() compares the nonce value in B<req> and B<resp>.
27 OCSP_copy_nonce() copies any nonce value present in B<req> to B<resp>.
38 and B<resp>. The return value indicates the result of the comparison. If
46 For most purposes the nonce value in a request is set to a random value so
50 by checking the same nonce value appears in the response.
59 positive return value effectively indicates success: nonces are both present
62 this will happen if the responder doesn't support nonces. A zero return value
H A DSSL_SESSION_get0_hostname.pod26 SSL_SESSION_get0_hostname() retrieves the SNI value that was sent by the
32 The value returned is a pointer to memory maintained within B<s> and
35 SSL_SESSION_set1_hostname() sets the SNI value for the hostname to a copy of
39 session and its associated length in bytes. The returned value of B<*alpn> is a
43 value in B<alpn> which should be of length B<len> bytes. A copy of the input
44 value is made, and the caller retains ownership of the memory pointed to by
50 is the SNI value sent by client.
H A DSSL_get_default_timeout.pod5 SSL_get_default_timeout - get default session timeout value
15 SSL_get_default_timeout() returns the default timeout value assigned to
20 Whenever a new session is negotiated, it is assigned a timeout value,
22 value was not explicitly set using
26 SSL_get_default_timeout() return this hardcoded value, which is 300 seconds
H A DEVP_PKEY_CTX_set_hkdf_md.pod54 operation. The value returned will be the intermediate fixed-length pseudorandom
74 buffer B<salt>. Any existing value is replaced.
77 B<key>. Any existing value is replaced.
79 EVP_PKEY_CTX_add1_hkdf_info() sets the info value to B<infolen> bytes of the
80 buffer B<info>. If a value is already set, it is appended to the existing
81 value.
87 The B<type> parameter "md" uses the supplied B<value> as the name of the digest
91 The B<type> parameters "salt", "key" and "info" use the supplied B<value>
92 parameter as a B<seed>, B<key> or B<info> value.
119 In particular a return value of -2 indicates the operation is not supported by
[all …]
H A DDH_generate_key.pod13 hidden entirely by defining B<OPENSSL_API_COMPAT> with a suitable version value,
31 the other party's public value to compute the shared key.
34 B<dh-E<gt>p> and B<dh-E<gt>g>. It generates a random private DH value
36 corresponding public value B<dh-E<gt>pub_key>, which can then be
39 DH_compute_key() computes the shared secret from the private DH value
40 in B<dh> and the other party's public value in B<pub_key> and stores
44 The return value should be considered public.
49 The return value should be considered public.
H A DBN_zero.pod28 BN_value_one() returns a B<BIGNUM> constant of value 1. This constant
35 BN_get_word() returns the value B<a>, or all-bits-set if B<a> cannot
40 BN_zero() never fails and returns no value.
44 If a B<BIGNUM> is equal to the value of all-bits-set, it will collide
46 as an error value.
56 In OpenSSL 0.9.8, BN_zero() was changed to not return a value; previous
H A DEVP_PKEY_gettable_params.pod44 obtain an integer value that does not fit into a native C B<int> type will cause
46 value that is negative or does not fit into a native C B<size_t> type using
49 EVP_PKEY_get_int_param() retrieves a key I<pkey> integer value I<*out>
53 EVP_PKEY_get_size_t_param() retrieves a key I<pkey> size_t value I<*out>
57 EVP_PKEY_get_bn_param() retrieves a key I<pkey> BIGNUM value I<**bn>
61 EVP_PKEY_get_utf8_string_param() get a key I<pkey> UTF8 string value into a
64 value including a terminating NUL byte, or this function will fail.
70 EVP_PKEY_get_octet_string_param() get a key I<pkey>'s octet string value into a
84 All other methods return 1 if a value associated with the key's I<key_name> was
88 value. If I<out_len> is not NULL, I<*out_len> will be assigned the required
[all …]
/openssl/crypto/ocsp/
H A Docsp_srv.c122 if ((cs->value.revoked = ri = OCSP_REVOKEDINFO_new()) == NULL) in OCSP_basic_add1_status()
135 if ((cs->value.good = ASN1_NULL_new()) == NULL) in OCSP_basic_add1_status()
140 if ((cs->value.unknown = ASN1_NULL_new()) == NULL) in OCSP_basic_add1_status()
238 if (!X509_NAME_set(&respid->value.byName, X509_get_subject_name(cert))) in OCSP_RESPID_set_by_name()
271 respid->value.byKey = byKey; in OCSP_RESPID_set_by_key_ex()
299 if (respid->value.byKey == NULL) in OCSP_RESPID_match_ex()
306 ret = (ASN1_STRING_length(respid->value.byKey) == SHA_DIGEST_LENGTH) in OCSP_RESPID_match_ex()
307 && (memcmp(ASN1_STRING_get0_data(respid->value.byKey), md, in OCSP_RESPID_match_ex()
310 if (respid->value.byName == NULL) in OCSP_RESPID_match_ex()
313 return X509_NAME_cmp(respid->value.byName, in OCSP_RESPID_match_ex()
/openssl/crypto/
H A Dder_writer.c81 int ossl_DER_w_octet_string_uint32(WPACKET *pkt, int tag, uint32_t value) in ossl_DER_w_octet_string_uint32() argument
86 while (value > 0) { in ossl_DER_w_octet_string_uint32()
87 *pbuf-- = (value & 0xFF); in ossl_DER_w_octet_string_uint32()
88 value >>= 8; in ossl_DER_w_octet_string_uint32()
112 const uint32_t *value = v; in int_put_bytes_uint32() local
113 uint32_t tmp = *value; in int_put_bytes_uint32()
124 return WPACKET_put_bytes__(pkt, *value, n); in int_put_bytes_uint32()
/openssl/doc/man7/
H A DEVP_PKEY-FFC.pod30 The B<DHX> key type uses X9.42 format which saves the value of 'q' and this
43 The public key value.
47 The private key value.
57 A DSA or Diffie-Hellman prime "p" value.
61 A DSA or Diffie-Hellman generator "g" value.
71 A DSA or Diffie-Hellman prime "q" value.
83 Set this to a positive value from 0..FF to use this mode. This I<gindex> can
84 then be reused during key validation to verify the value of I<g>. If this value
96 generation of I<g>. Its value is the first integer larger than one that
115 This boolean value is used during key validation checks
[all …]
/openssl/doc/internal/man7/
H A DVERSION.pod20 assignments. When given an empty value, they are seen as unassigned.
34 a dash. For a value C<foo>, the C macro B<OPENSSL_VERSION_PRE_RELEASE> gets
41 value C<bar>, the C macro B<OPENSSL_VERSION_BUILD_METADATA> gets the string
46 Defined in releases. When not set, it gets the value C<xx XXX xxxx>.
70 If B<PRERELEASE> is assigned a value, $config{prerelease} gets that same value,
75 If B<BUILD_METADATA> is assigned a value, $config{build_metadata} gets that same
76 value, prefixed by a plus sign, otherwise the empty string.
80 If B<RELEASE_DATE> is assigned a value, $config{release_date} gets that same
81 value, otherwise the string C<xx XXX yyyy>.
/openssl/crypto/ts/
H A Dts_conf.c326 const char *extval = val->value ? val->value : val->name; in TS_CONF_set_policies()
365 const char *extval = val->value ? val->value : val->name; in TS_CONF_set_digests()
397 if (val->value) in TS_CONF_set_accuracy()
398 secs = atoi(val->value); in TS_CONF_set_accuracy()
400 if (val->value) in TS_CONF_set_accuracy()
401 millis = atoi(val->value); in TS_CONF_set_accuracy()
403 if (val->value) in TS_CONF_set_accuracy()
404 micros = atoi(val->value); in TS_CONF_set_accuracy()
447 if (value) { in ts_CONF_add_flag()
448 if (strcmp(value, ENV_VALUE_YES) == 0) in ts_CONF_add_flag()
[all …]
/openssl/crypto/cmp/
H A Dcmp_msg.c181 if ((msg->body->value.ir = OSSL_CRMF_MSGS_new()) == NULL) in ossl_cmp_msg_create()
211 if ((msg->body->value.certConf = in ossl_cmp_msg_create()
216 if ((msg->body->value.pkiconf = ASN1_TYPE_new()) == NULL) in ossl_cmp_msg_create()
218 ASN1_TYPE_set(msg->body->value.pkiconf, V_ASN1_NULL, NULL); in ossl_cmp_msg_create()
427 if (!sk_OSSL_CRMF_MSG_push(msg->body->value.ir, local_crm)) in ossl_cmp_certreq_new()
564 if (!sk_OSSL_CMP_REVDETAILS_push(msg->body->value.rr, rd)) in ossl_cmp_rr_new()
594 rep = msg->body->value.rp; in ossl_cmp_rp_new()
741 OSSL_CMP_PKISI_free(msg->body->value.error->pKIStatusInfo); in ossl_cmp_error_new()
757 msg->body->value.error->errorDetails = ft; in ossl_cmp_error_new()
917 if (!sk_OSSL_CMP_POLLREP_push(msg->body->value.pollRep, prep)) in ossl_cmp_pollRep_new()
[all …]
/openssl/crypto/rsa/
H A Drsa_pmeth.c658 if (value == NULL) { in pkey_rsa_ctrl_str()
665 if (strcmp(value, "pkcs1") == 0) { in pkey_rsa_ctrl_str()
675 } else if (strcmp(value, "pss") == 0) { in pkey_rsa_ctrl_str()
687 if (!strcmp(value, "digest")) in pkey_rsa_ctrl_str()
689 else if (!strcmp(value, "max")) in pkey_rsa_ctrl_str()
691 else if (!strcmp(value, "auto")) in pkey_rsa_ctrl_str()
694 saltlen = atoi(value); in pkey_rsa_ctrl_str()
699 int nbits = atoi(value); in pkey_rsa_ctrl_str()
708 if (!BN_asc2bn(&pubexp, value)) in pkey_rsa_ctrl_str()
716 int nprimes = atoi(value); in pkey_rsa_ctrl_str()
[all …]
/openssl/crypto/engine/
H A Deng_cnf.c43 static int int_engine_configure(const char *name, const char *value, const CONF *cnf) in int_engine_configure() argument
57 ecmds = NCONF_get_section(cnf, value); in int_engine_configure()
67 ctrlvalue = ecmd->value; in int_engine_configure()
112 if (!NCONF_get_number_e(cnf, value, "init", &do_init)) in int_engine_configure()
141 ecmd->section, ecmd->name, ecmd->value); in int_engine_configure()
164 if (!int_engine_configure(cval->name, cval->value, cnf)) in int_engine_module_init()
/openssl/test/
H A Dparams_conversion_test.c66 pc->param = OSSL_PARAM_locate(params, type = pp->value); in param_conversion_load_stanza()
76 if (OPENSSL_strcasecmp(pp->value, "invalid") != 0) { in param_conversion_load_stanza()
78 pc->i32 = (int32_t)strtoimax(pp->value, &p, 10); in param_conversion_load_stanza()
85 if (OPENSSL_strcasecmp(pp->value, "invalid") != 0) { in param_conversion_load_stanza()
87 pc->i64 = (int64_t)strtoimax(pp->value, &p, 10); in param_conversion_load_stanza()
94 if (OPENSSL_strcasecmp(pp->value, "invalid") != 0) { in param_conversion_load_stanza()
96 pc->u32 = (uint32_t)strtoumax(pp->value, &p, 10); in param_conversion_load_stanza()
103 if (OPENSSL_strcasecmp(pp->value, "invalid") != 0) { in param_conversion_load_stanza()
105 pc->u64 = (uint64_t)strtoumax(pp->value, &p, 10); in param_conversion_load_stanza()
112 if (OPENSSL_strcasecmp(pp->value, "invalid") != 0) { in param_conversion_load_stanza()
[all …]
H A Dd2i_test.c47 ASN1_VALUE *value = NULL; in test_bad_asn1() local
74 value = ASN1_item_d2i(NULL, &buf_ptr, len, item_type); in test_bad_asn1()
75 if (value == NULL) { in test_bad_asn1()
81 derlen = ASN1_item_i2d(value, &der, item_type); in test_bad_asn1()
105 ASN1_item_free(value, item_type); in test_bad_asn1()
/openssl/crypto/asn1/
H A Dasn_mime.c420 || hdr->value == NULL) { in SMIME_read_ASN1_ex()
456 || hdr->value == NULL) { in SMIME_read_ASN1_ex()
494 "type: %s", hdr->value); in SMIME_read_ASN1_ex()
586 || hdr->value == NULL) { in SMIME_text()
591 if (strcmp(hdr->value, "text/plain")) { in SMIME_text()
868 if (value) { in mime_hdr_new()
878 mhdr->value = tmpval; in mime_hdr_new()
902 if (value) { in mime_hdr_addparam()
903 tmpval = OPENSSL_strdup(value); in mime_hdr_addparam()
948 htmp.value = NULL; in mime_hdr_find()
[all …]
/openssl/test/helpers/
H A Dpkcs12.c353 TEST_info("Adding attribute %s = %s", p_attr->oid, p_attr->value); in add_attributes()
361 strlen(p_attr->value)))) in add_attributes()
476 char *value = NULL; in check_asn1_string() local
483 value = OPENSSL_uni2asc(av->value.bmpstring->data, in check_asn1_string()
484 av->value.bmpstring->length); in check_asn1_string()
485 if (!TEST_str_eq(txt, (char *)value)) in check_asn1_string()
491 av->value.utf8string->length)) in check_asn1_string()
497 (char *)av->value.octet_string->data, in check_asn1_string()
498 av->value.octet_string->length)) in check_asn1_string()
508 OPENSSL_free(value); in check_asn1_string()
[all …]
/openssl/include/internal/
H A Djson_enc.h197 void ossl_json_bool(OSSL_JSON_ENC *json, int value);
200 void ossl_json_u64(OSSL_JSON_ENC *json, uint64_t value);
203 void ossl_json_i64(OSSL_JSON_ENC *json, int64_t value);
206 void ossl_json_f64(OSSL_JSON_ENC *json, double value);
/openssl/crypto/crmf/
H A Dcrmf_local.h91 } value; member
157 ASN1_BIT_STRING *value; member
193 } value; member
236 } value; member
277 } value; member
/openssl/crypto/x509/
H A Dx509_ext.c55 int X509_CRL_add1_ext_i2d(X509_CRL *x, int nid, void *value, int crit, in X509_CRL_add1_ext_i2d() argument
58 return X509V3_add1_i2d(&x->crl.extensions, nid, value, crit, flags); in X509_CRL_add1_ext_i2d()
107 int X509_add1_ext_i2d(X509 *x, int nid, void *value, int crit, in X509_add1_ext_i2d() argument
110 return X509V3_add1_i2d(&x->cert_info.extensions, nid, value, crit, in X509_add1_ext_i2d()
155 int X509_REVOKED_add1_ext_i2d(X509_REVOKED *x, int nid, void *value, int crit, in X509_REVOKED_add1_ext_i2d() argument
158 return X509V3_add1_i2d(&x->extensions, nid, value, crit, flags); in X509_REVOKED_add1_ext_i2d()

Completed in 61 milliseconds

12345678910>>...35