Home
last modified time | relevance | path

Searched refs:I (Results 1 – 25 of 596) sorted by relevance

12345678910>>...24

/openssl/doc/man3/
H A DBN_add.pod50 BN_add() adds I<a> and I<b> and places the result in I<r> (C<r=a+b>).
51 I<r> may be the same B<BIGNUM> as I<a> or I<b>.
53 BN_sub() subtracts I<b> from I<a> and places the result in I<r> (C<r=a-b>).
54 I<r> may be the same B<BIGNUM> as I<a> or I<b>.
57 I<r> may be the same B<BIGNUM> as I<a> or I<b>.
64 BN_div() divides I<a> by I<d> and places the result in I<dv> and the
65 remainder in I<rem> (C<dv=a/d, rem=a%d>). Either of I<dv> and I<rem> may
76 BN_mod_add() adds I<a> to I<b> modulo I<m> and places the nonnegative
79 BN_mod_sub() subtracts I<b> from I<a> modulo I<m> and places the
102 BN_mod_exp() computes I<a> to the I<p>-th power modulo I<m> (C<r=a^p %
[all …]
H A DOCSP_resp_find_status.pod61 I<*revtime>, I<*thisupd> and I<*nextupd>. The I<*status> value will be one of
75 to index I<idx>, where I<idx> runs from 0 to OCSP_resp_count(bs) - 1.
80 OCSP_single_get0_status() extracts the fields of I<single> in I<*reason>,
81 I<*revtime>, I<*thisupd> and I<*nextupd>.
106 but leaves ownership of I<*pid> and I<*pname> with the caller,
120 in I<bs> unless I<flags> contains B<OCSP_NOINTERN>.
125 was found in I<certs> and I<flags> contains B<OCSP_TRUSTOTHER>.
153 OCSP_resp_find() returns the index of I<id> in I<bs> (which may be 0)
175 values and the current time + I<sec> is not before I<thisupd> and,
176 if I<maxsec> >= 0, the current time - I<maxsec> is not past I<nextupd>.
[all …]
H A DOSSL_PARAM_allocate_from_text.pod30 I<paramdefs>. If an item was found, it converts I<value> to something
32 I<< to->data >> as well as its size in I<< to->data_size >>.
41 If I<found> is not NULL, I<*found> is set to 1 if I<key> could be
44 =head2 The use of I<key> and I<value> in detail
51 When an item in I<paramdefs> has been found, I<value> is converted
58 If I<key> didn't start with "hex", I<value> is assumed to contain
62 If I<value> starts with "0x", it is assumed to contain I<value_n>
65 If I<key> started with "hex", I<value> is assumed to contain
84 If I<key> started with "hex", I<value> is assumed to contain
91 If I<key> didn't start with "hex", I<value_n> bytes from I<value> are
[all …]
H A DOSSL_CRMF_MSG_set0_validity.pod43 OSSL_CRMF_MSG_set0_validity() sets the I<notBefore> and I<notAfter> fields
45 Any of the I<notBefore> and I<notAfter> parameters may be NULL,
47 On success ownership of I<notBefore> and I<notAfter> is transferred to I<crm>.
49 OSSL_CRMF_MSG_set_certReqId() sets I<rid> as the certReqId of I<crm>.
52 for which non-NULL values are provided: I<pubkey>, I<subject>, I<issuer>,
53 and/or I<serial>.
56 while the I<subject>, I<issuer>, and I<serial> structures (if given) are copied.
62 extensions in the certTemplate of I<crm>. Consumes I<ext>.
65 according to the method I<meth> in I<crm>.
66 The library context I<libctx> and property query string I<propq>,
[all …]
H A DOSSL_PARAM_int.pod179 I<key>, I<type>, I<addr> and I<sz> arguments correspond to the I<key>,
180 I<data_type>, I<data> and I<data_size> fields of the L<OSSL_PARAM(3)> structure as
190 A parameter with name I<key>, storage I<buf>, size I<bsize> and return
195 A parameter with name I<key>, storage I<buf> and size I<bsize> is created.
201 A parameter with name I<key>, storage I<buf> and size I<bsize> is created.
205 A parameter with name I<key>, storage pointer I<*buf> and size I<bsize>
210 A parameter with name I<key>, storage pointer I<*buf> and size I<bsize>
223 I<p>.
251 by I<p> to the value referenced by I<val>.
280 referenced by I<p> to the values I<val>.
[all …]
H A DPKCS12_PBE_keyivgen.pod34 length I<passlen>, parameters I<param> and a message digest function I<md_type>
36 then used to initialise the cipher context I<ctx> with a cipher I<cipher> for
37 encryption (I<en_de>=1) or decryption (I<en_de>=0).
40 I<libctx> and property query I<propq> to select appropriate algorithm
44 based on the algorithm in I<algor> and password I<pass> of length I<passlen>.
46 returned in I<*data> of length I<datalen>. The operation is determined by I<en_de>,
47 encryption (I<en_de>=1) or decryption (I<en_de>=0).
50 I<libctx> and property query I<propq> to select appropriate algorithm
53 I<pass> is the password used in the derivation of length I<passlen>. I<pass>
57 I<salt> is the salt used in the derivation of length I<saltlen>. If the
[all …]
H A DASN1_TIME_set.pod75 by the time I<offset_day> and I<offset_sec> after the time_t value I<t>.
93 on I<str> only.
116 The I<tm_sec>, I<tm_min>, I<tm_hour>, I<tm_mday>, I<tm_wday>, I<tm_yday>,
117 I<tm_mon> and I<tm_year> fields of I<tm> structure are set to proper values,
121 converting I<s> to I<tm> structure.
124 I<from> and I<to>. If I<to> represents a time later than I<from> then
127 one or both of I<*pday> and I<*psec> will be negative. If I<to> and I<from>
137 time structures I<a> and I<b>.
221 before I<t>, 0 if I<s> equals I<t>, or 1 if I<s> is after I<t>. -2 is returned
224 ASN1_TIME_compare() returns -1 if I<a> is before I<b>, 0 if I<a> equals I<b>,
[all …]
H A DX509_ATTRIBUTE.pod113 list of attributes I<x>. I<loc> should be in the range from 0 to
120 to the list I<x>.
121 Both I<x> and I<attr> must be non NULL or an error will occur.
128 I<obj> with type I<type> and data I<bytes> of length I<len> and then pushes it
129 to the attribute list I<x>. Both I<x> and I<attr> must be non NULL or an error
148 size I<len>.
163 data I<data> of length I<len>. If the passed in attribute I<attr> OR I<*attr> is
181 the attribute list I<attr>. I<idx> should be in the
185 index I<idx> in the attribute I<attr>. I<data> is unused and can be set to NULL.
198 objects in the list I<x> that match I<obj>.
[all …]
H A DOCSP_response_status.pod39 I<OCSP_RESPONSE_STATUS_INTERNALERROR>, I<OCSP_RESPONSE_STATUS_TRYLATER>
40 I<OCSP_RESPONSE_STATUS_SIGREQUIRED>, or I<OCSP_RESPONSE_STATUS_UNAUTHORIZED>.
43 contained in I<resp>.
46 I<status> and optionally including basic response I<bs>.
57 the library ctx I<libctx> and the property query string I<propq> (see
76 OCSP_basic_sign() signs OCSP response I<brsp> using certificate I<signer>, private key
77 I<key>, digest I<dgst> and additional certificates I<certs>. If the I<flags> option
79 I<flags> option I<OCSP_RESPID_KEY> is set then the responder is identified by key ID
88 I<NULL> if an error occurred.
90 OCSP_response_create() returns an I<OCSP_RESPONSE> structure pointer or I<NULL>
[all …]
H A DASN1_EXTERN_FUNCS.pod64 =item I<app_data>
68 =item I<asn1_ex_new>
71 newly constructed value should be stored in I<*pval>. The I<it> parameter is a
77 =item I<asn1_ex_free>
84 =item I<asn1_ex_clear>
91 =item I<asn1_ex_d2i>
94 class I<class> into an B<ASN1_VALUE>. If I<*pval> is non-NULL then the
105 The I<asn1_ex_d2i> entry may be NULL if I<asn1_ex_d2i_ex> has been specified
110 =item I<asn1_ex_i2d>
125 The I<asn1_ex_i2d> entry may be NULL if I<asn1_ex_i2d_ex> has been specified
[all …]
H A DBIO_push.pod17 BIO_push() pushes I<b> on I<next>.
18 If I<b> is NULL the function does nothing and returns I<next>.
20 to I<next> (unless I<next> is NULL).
21 It then makes a control call on I<b> and returns I<b>.
47 which usually is I<b>, or I<next> if I<b> is NULL.
54 For these examples suppose I<md1> and I<md2> are digest BIOs,
55 I<b64> is a base64 BIO and I<f> is a file BIO.
66 the new chain is I<md1-md2-b64-f>. Data written to I<md1> will be digested
67 by I<md1> and I<md2>, base64 encoded, and finally written to I<f>.
71 and digested by I<md2> and then I<md1>.
[all …]
H A DOPENSSL_gmtime.pod20 OPENSSL_gmtime() returns the UTC time specified by I<timer> into the provided
21 I<result> argument.
23 OPENSSL_gmtime_adj() adds the offsets in I<offset_day> and I<offset_sec> to I<tm>.
25 OPENSSL_gmtime_diff() calculates the difference between I<from> and I<to>.
29 It is an error to call OPENSSL_gmtime() with I<result> equal to NULL. The
30 contents of the time_t given by I<timer> are stored into the I<result>. Calling
31 with I<timer> equal to NULL means use the current time.
34 offsets, then converts back into a I<struct tm> specified by I<tm>. Leap seconds
38 structures I<from> and I<to>. The difference in days is placed into I<*pday>,
39 the remaining seconds are placed to I<*psec>. The value in I<*psec> will be less
[all …]
H A DOSSL_CMP_ITAV_new_caCerts.pod69 It assigns NULL to I<*out> if there are no CA certificates in I<itav>, otherwise
76 It assigns NULL to I<*out> if no certificate is included in I<itav>, otherwise
81 with the optional I<newWithNew>, I<newWithOld>, and I<oldWithNew> certificates.
90 If I<newWithOld> is not NULL, it assigns to I<*newWithOld> the internal pointer
92 If I<oldWithNew> is not NULL, it assigns to I<*oldWithNew> the internal pointer
107 Data from I<cert>, if present, is preferred over data from I<crl>.
113 If I<certTemplate> is NULL then also I<keySpec> must be NULL,
135 extension of I<cert>,
151 and assigns them to I<*dpn>, I<*issuer>, and I<*thisUpdate>.
152 I<*thisUpdate> is assigned only if the I<thisUpdate> argument is not NULL.
[all …]
H A DASN1_TYPE_get.pod27 ASN1_TYPE_get() returns the type of I<a> or 0 if it fails.
29 ASN1_TYPE_set() sets the value of I<a> to I<type> and I<value>. This
33 ASN1_TYPE_set1() sets the value of I<a> to I<type> a copy of I<value>.
35 ASN1_TYPE_cmp() compares ASN.1 types I<a> and I<b> and returns 0 if
39 I<t> using the ASN.1 structure I<it>. If successful it returns a pointer
45 B<ASN1_TYPE> is returned. If I<t> and I<*t> are not NULL the encoded type
46 is written to I<t> overwriting any existing data. If I<t> is not NULL
47 but I<*t> is NULL the returned B<ASN1_TYPE> is written to I<*t>.
52 ASN1_TYPE_set1() is determined by the I<type> parameter.
53 If I<type> is B<V_ASN1_NULL> I<value> is ignored. If I<type> is
[all …]
H A DEVP_PKEY_gettable_params.pod35 the contents of I<params>.
49 EVP_PKEY_get_int_param() retrieves a key I<pkey> integer value I<*out>
53 EVP_PKEY_get_size_t_param() retrieves a key I<pkey> size_t value I<*out>
57 EVP_PKEY_get_bn_param() retrieves a key I<pkey> BIGNUM value I<**bn>
58 associated with a name of I<key_name>. If I<*bn> is NULL then the BIGNUM
62 buffer I<str> of maximum size I<max_buf_sz> associated with a name of
65 If I<out_len> is not NULL, I<*out_len> is set to the length of the string
68 function with I<str> set to NULL.
71 buffer I<buf> of maximum size I<max_buf_sz> associated with a name of I<key_name>.
72 If I<out_len> is not NULL, I<*out_len> is set to the length of the contents.
[all …]
H A DOSSL_HTTP_transfer.pod56 NULL, else by connecting to a given I<server> optionally via a I<proxy>.
65 If I<bio> is given and I<rbio> is NULL then this I<bio> is used instead.
66 If both I<bio> and I<rbio> are given (which may be memory BIOs for instance)
68 I<bio> is used for writing requests and I<rbio> for reading responses.
72 If I<bio> is given, it is an error to provide I<proxy> or I<no_proxy> arguments,
74 If I<bio> is NULL the optional I<proxy> parameter can be used to set an
94 The parameter I<bio_update_fn>, which is optional if I<use_ssl> is 0,
96 but cannot be used when both I<bio> and I<rbio> are given.
154 optionally using proxy client credentials I<proxyuser> and I<proxypass>,
155 to connect with TLS protection ultimately to I<server> and I<port>.
[all …]
H A DECDSA_SIG_new.pod31 Note: before OpenSSL 1.1.0, the I<r> and I<s> components were initialised.
36 ECDSA_SIG_get0() returns internal pointers the I<r> and I<s> values contained
37 in I<sig> and stores them in I<*pr> and I<*ps>, respectively.
38 The pointer I<pr> or I<ps> can be NULL, in which case the corresponding value
41 The values I<r>, I<s> can also be retrieved separately by the corresponding
44 Non-NULL I<r> and I<s> values can be set on the I<sig> by calling
63 Extract signature I<r> and I<s> values from a ECDSA I<signature>
64 of size I<signaturelen>:
82 * Do not try to access I<r> or I<s> after calling ECDSA_SIG_free(),
87 Convert I<r> and I<s> byte arrays into an ECDSA_SIG I<signature> of
[all …]
H A DPKCS12_create.pod30 I<pass> is the passphrase to use. I<name> is the B<friendlyName> to use for
32 the structure and I<cert> its corresponding certificates. I<ca>, if not B<NULL>
35 I<nid_key> and I<nid_cert> are the encryption algorithms that should be used
39 I<keytype> is the type of key.
42 I<ctx> and property query I<propq> to be used to select algorithm implementations.
54 The parameters I<nid_key>, I<nid_cert>, I<iter>, I<mac_iter> and I<keytype>
75 If I<name> is B<NULL> and I<cert> contains an I<alias> then this will be
77 Similarly, if I<pkey> is NULL and I<cert> contains a I<keyid> then this will be
81 For all certificates in I<ca> then if a certificate contains an I<alias> or
85 Either I<pkey>, I<cert> or both can be B<NULL> to indicate that no key or
[all …]
H A DDH_get0_pqg.pod45 A DH object contains the parameters I<p>, I<q> and I<g>. Note that the I<q>
49 The I<p>, I<q> and I<g> parameters can be obtained by calling DH_get0_pqg().
50 If the parameters have not yet been set then I<*p>, I<*q> and I<*g> will be set
54 Any of the out parameters I<p>, I<q>, and I<g> can be NULL, in which case no
57 The I<p>, I<q> and I<g> values can be set by calling DH_set0_pqg() and passing
58 the new values for I<p>, I<q> and I<g> as parameters to the function. Calling
62 DH_set0_pqg() also checks if the parameters associated with I<p> and I<g> and
64 prime group then the value of I<q> will be set to q = (p - 1) / 2 if I<q> is
65 NULL. The optional length parameter will be set to BN_num_bits(I<q>) if I<q>
74 Any of the out parameters I<pub_key> and I<priv_key> can be NULL, in which case
[all …]
H A DOSSL_HPKE_CTX_new.pod220 I<labellen> parameters, and for the length of the string I<pskid> for HPKE
257 I<pub> of size I<publen>, and an optional I<info> parameter of size I<infolen>,
270 I<aad> of size I<aadlen>, and returns the ciphertext I<ct> of size I<ctlen>.
299 for the private value I<priv> and a encoded public key I<pub> of size I<publen>.
307 parameter of size I<ikmlen>. If either I<ikm> is NULL or I<ikmlen> is zero,
320 size I<ctlen> using the I<ctx> and additional authenticated data I<aad> of
321 size I<aadlen>, to produce the plaintext I<pt> of size I<ptlen>.
339 supplied label I<label> of size I<labellen>, to produce a secret I<secret>
363 encoded pub key I<pub> of size I<publen> into the B<OSSL_HPKE_CTX> I<ctx> before
373 I<psk> of size I<psklen> into the I<ctx>. If required this must be called
[all …]
H A DX509_REQ_get_attr.pod36 in the I<req> attribute list. The search starts at the position after I<lastpos>.
39 the remaining attributes. I<lastpos> can be set to any negative value on the
43 it passes the numerical identifier (NID) I<nid> associated with the object.
47 I<req> attribute list. I<loc> should be in the range from 0 to
51 the I<req> objects list of attributes. An error occurs if I<req> is NULL.
54 to the I<req> object's attribute list. An error will occur if either the
59 I<obj> with type I<type> and data I<bytes> of length I<len> and then pushes it
60 to the I<req> object's attribute list. I<req> must be non NULL or an error
68 that it passes a name I<attrname> associated with the object.
80 I<obj> in the attribute list.
[all …]
/openssl/doc/internal/man3/
H A DOSSL_METHOD_STORE.pod72 the provider I<prov> to the I<store> as an instance of an algorithm indicated by
73 I<nid> and the property definition I<properties>, unless the I<store> already
74 has a method from the same provider with the same I<nid> and I<properties>.
79 the I<store>.
81 ossl_method_store_remove() removes the I<method> identified by I<nid> from the
82 I<store>.
84 ossl_method_store_fetch() queries I<store> for a method identified by I<nid>
88 The result, if any, is returned in I<*method>, and its provider in I<*prov>.
98 I<prop_query>.
104 provider I<prov>, with the property query I<prop_query> in the I<store>.
[all …]
H A DOSSL_SAFE_MATH_SIGNED.pod38 suffix B<I<NAME>>.
41 suffix B<I<NAME>>.
43 safe_add_TYPE() adds the two arguments I<a> and I<b> together.
45 safe_sub_TYPE() subtracts I<b> from I<a>.
47 safe_mul_TYPE() multiplies the two arguments I<a> and I<b> together.
49 safe_div_TYPE() divides I<a> by I<b>.
51 safe_mod_TYPE() calculates the remainder when I<a> is divided by I<b>.
53 safe_div_round_up_TYPE() calculates I<a> / I<b> + (I<a> % I<b> != 0).
54 I.e. it computes the quotient of I<a> and I<b> rounding any remainder towards
57 safe_muldiv_TYPE() multiplies I<a> and I<b> together and divides the
[all …]
H A Dossl_cmp_certreq_new.pod72 with the given I<certReqId> and I<si> values and optionally with I<cert>,
73 I<chain>, and I<caPubs>. The I<cert>, I<chain>, and I<caPubs> arguments
75 The I<encryption_recip> is currently unsupported.
77 is B<rejected> and I<unprotectedErrors> is nonzero.
91 The list of all CMP PKIMessage I<bodytype>s is:
122 ossl_cmp_rp_new() creates a Revocation Response message with I<si> and I<cid>.
124 and I<unprotectedErrors> is nonzero.
127 received certificate with the given I<certReqId>.
135 I<crid>.
138 I<crid> and pollAfter to I<poll_after>.
[all …]
/openssl/doc/man1/
H A Dopenssl-speed.pod.in12 [B<-config> I<filename>]
14 [B<-evp> I<algo>]
15 [B<-hmac> I<algo>]
16 [B<-cmac> I<algo>]
21 [B<-multi> I<num>]
22 [B<-async_jobs> I<num>]
23 [B<-misalign> I<num>]
25 [B<-primes> I<num>]
26 [B<-seconds> I<num>]
27 [B<-bytes> I<num>]
[all …]

Completed in 77 milliseconds

12345678910>>...24