/openssl/doc/man3/ |
H A D | CMS_get0_type.pod | 5 …1_eContentType, CMS_get0_eContentType, CMS_get0_content - get and set CMS content types and content 18 CMS_get0_type() returns the content type of a CMS_ContentInfo structure as 22 CMS_set1_eContentType() sets the embedded content type of a CMS_ContentInfo 30 content type. 33 containing the embedded content. 43 using OBJ_obj2nid(). For the currently supported content types the following 54 content pointer. That means that for example: 58 B<*pconf> could be NULL if there is no embedded content. Applications can 59 access, modify or create the embedded content in a B<CMS_ContentInfo> structure 61 embedded content as it is normally set by higher level functions.
|
H A D | SSL_CTX_set_msg_callback.pod | 62 content type (see NOTES below) this value will be the decoded 67 This is one of the content type values defined in the protocol specification 70 messages). Alternatively it may be a "pseudo" content type. These pseudo 77 case of pseudo content types), which consists of I<len> bytes. The buffer is no 115 of data. The following pseudo content types are currently defined: 127 records the content type in the record header is always 129 an "inner" content type. B<buf> contains the encoded "inner" content type byte. 154 callback will supply all the padding frames in one go via this pseudo content 172 The pseudo content types B<SSL3_RT_QUIC_DATAGRAM>, B<SSL3_RT_QUIC_PACKET>, 177 the pseudo content type B<SSL3_RT_HEADER> for TLS records. [all …]
|
H A D | PKCS7_type_is_other.pod | 5 PKCS7_type_is_other - determine content type of PKCS#7 envelopedData structure 15 PKCS7_type_is_other() returns the whether the content type of a PKCS#7 envelopedData 16 structure is one of the following content types: 27 PKCS7_type_is_other() returns either 0 if the content type is matched or 1 otherwise.
|
H A D | SMIME_write_ASN1.pod | 28 content must be supplied via I<data>. 29 I<flags> is an optional set of flags. I<ctype_nid> is the NID of the content 30 type, I<econt_nid> is the NID of the embedded content type and I<mdalgs> is a 48 the content, this only makes sense if B<CMS_DETACHED> is also set. 58 If streaming is performed the content is output in BER format using indefinite 60 content where the content is absent and DER format is used.
|
H A D | CMS_decrypt.pod | 7 - decrypt content from a CMS envelopedData structure 23 CMS_decrypt() extracts the decrypted content from a CMS EnvelopedData 25 It uses CMS_decrypt_set1_pkey() to decrypt the content 29 I<out> is a BIO to write the content to and 33 provides the content unless I<cert>, I<dcont>, and I<out> are NULL as well. 34 The I<dcont> parameter is used in the rare case where the encrypted content 63 the content: this will typically output garbage and may (but is not guaranteed 69 content encryption key. Applications should use this flag with 86 from the content. If the content is not of type C<text/plain> then an error is
|
H A D | CMS_uncompress.pod | 15 CMS_uncompress() extracts and uncompresses the content from a CMS 16 CompressedData structure B<cms>. B<data> is a BIO to write the content to and 19 The B<dcont> parameter is used in the rare case where the compressed content 33 from the content. If the content is not of type B<text/plain> then an error is
|
H A D | PKCS7_decrypt.pod | 5 PKCS7_decrypt - decrypt content from a PKCS#7 envelopedData structure 15 PKCS7_decrypt() extracts and decrypts the content from a PKCS#7 envelopedData 17 recipients certificate, B<data> is a BIO to write the content to and 28 from the content. If the content is not of type B<text/plain> then an error is
|
H A D | CMS_verify.pod | 35 I<detached_data> refers to the signed data if the content is detached from I<cms>. 37 The content is written to the BIO I<out> unless it is NULL. 43 and on success it returns the verified content as a memory BIO. 61 the content is detached I<detached_data> cannot be NULL. 77 Finally the signed content is read (and written to I<out> unless it is NULL) 93 from the content. If the content is not of type C<text/plain> then an error is 106 If B<CMS_NO_CONTENT_VERIFY> is set then the content digest is not checked. 123 setting B<CMS_NO_CONTENT_VERIFY> will totally disable all content verification 125 useful if one merely wishes to write the content to I<out> and its validity 137 CMS_SignedData_verify() returns a memory BIO containing the verified content, [all …]
|
H A D | CMS_EncryptedData_decrypt.pod | 24 symmetric I<key> of size I<keylen> bytes. I<out> is a BIO to write the content 26 I<dcont> is used in the rare case where the encrypted content is detached. It 32 from the content. If the content is not of type C<text/plain> then an error is 49 otherwise a BIO containing the decypted content.
|
H A D | SMIME_write_CMS.pod | 19 B<CMS_ContentInfo> structure. If streaming is enabled then the content must be 31 the content, this only makes sense if B<CMS_DETACHED> is also set. 41 If streaming is performed the content is output in BER format using indefinite 43 content where the content is absent and DER format is used.
|
H A D | SMIME_write_PKCS7.pod | 19 structure. If streaming is enabled then the content must be supplied in the 31 are added to the content, this only makes sense if B<PKCS7_DETACHED> 42 If streaming is performed the content is output in BER format using indefinite 44 content where the content is absent and DER format is used.
|
H A D | PKCS7_verify.pod | 28 I<indata> refers to the signed data if the content is detached from I<p7>. 30 The content is written to the BIO I<out> unless it is NULL. 43 the content is detached I<indata> cannot be NULL. If the content is 45 embedded and external content. To treat this as an error, use the flag 65 Finally the signed content is read (and written to I<out> unless it is NULL) 82 from the content. If the content is not of type C<text/plain> then an error is 104 useful if one merely wishes to write the content to I<out> and its validity 126 The lack of single pass processing means that the signed content must all
|
H A D | BIO_new_CMS.pod | 24 After all content has been written through the chain BIO_flush() must be called 35 Any content written through the filter is used verbatim: no canonical 40 responsibility to set the inner content type of any outer CMS_ContentInfo
|
H A D | CMS_final.pod | 19 appropriate fields. The parameter B<data> contains the content to be 20 processed. The B<dcont> parameter contains a BIO to write content to after
|
H A D | CMS_get0_RecipientInfos.pod | 97 first and the content encryption key must be available: for example by a 113 with a NULL key to decrypt the enveloped content. 117 an appropriate CMS_RecipientInfo structure to make the content encrypt key 119 CMS_add1_recipient_cert() and finally encrypt the content encryption key
|
/openssl/test/ |
H A D | cmsapitest.c | 31 CMS_ContentInfo* content = NULL; in test_encrypt_decrypt() local 41 content = CMS_encrypt(certstack, msgbio, cipher, CMS_TEXT); in test_encrypt_decrypt() 42 if (!TEST_ptr(content)) in test_encrypt_decrypt() 45 if (!TEST_true(CMS_decrypt(content, privkey, cert, NULL, outmsgbio, in test_encrypt_decrypt() 50 CMS_EnvelopedData_decrypt(content->d.envelopedData, in test_encrypt_decrypt() 66 CMS_ContentInfo_free(content); in test_encrypt_decrypt() 106 BIO *bio, *content = NULL; in test_d2i_CMS_bio_NULL() local 309 && TEST_ptr(content = in test_d2i_CMS_bio_NULL() 312 BIO_free(content); in test_d2i_CMS_bio_NULL()
|
H A D | generate_ssl_tests.pl | 145 my $content = <INPUT>; 147 eval $content;
|
H A D | smcont.txt | 1 Somewhat longer test content for OpenSSL CMS utility to handle, and a bit longer...
|
/openssl/doc/man7/ |
H A D | ossl_store-file.pod | 24 Since files come in all kinds of formats and content types, the 'file' 34 If the file isn't determined to be formatted as PEM, the content is 38 Each file handler is expected to handle PEM and non-PEM content as 39 appropriate. Some may refuse non-PEM content for the sake of
|
/openssl/engines/ |
H A D | e_loader_attic.txt | 9 ATTIC_R_AMBIGUOUS_CONTENT_TYPE:100:ambiguous content type 19 ATTIC_R_UNSUPPORTED_CONTENT_TYPE:108:unsupported content type
|
/openssl/doc/man1/ |
H A D | openssl-cms.pod.in | 94 [B<-content> I<filename>] 227 Verify a CMS B<DigestedData> type and output the content. 243 B<EncryptedData> type and output the content. 248 B<EncryptedData> type and output the content. 256 B<Data> type and output the content. 320 content format is detected. 520 =item B<-content> I<filename> 530 Do not verify signed content signatures. 670 B<-sign> operation if the content is not detached. 840 openssl cms -verify -inform PEM -in signature.pem -content content.txt [all …]
|
H A D | openssl-smime.pod.in | 39 [B<-content> I<file>] 148 =item B<-content> I<filename> 150 This specifies a file containing the detached content, this is only 152 structure is using the detached signature form where the content is 153 not included. This option will override any content if the input format 154 is S/MIME and it uses the multipart/signed MIME content type. 327 B<-sign> operation if the content is not detached. 330 since the content is no longer part of the PKCS#7 structure the encoding 428 openssl smime -verify -inform PEM -in signature.pem -content content.txt 432 openssl smime -verify -inform DER -in signature.der -content content.txt
|
/openssl/external/perl/Text-Template-1.56/lib/Text/ |
H A D | Template.pm | 208 my @content; 219 push @content, [ $state, $cur_item, $lineno ] if $cur_item ne ''; 236 push @content, [ $state, $cur_item, $prog_start ] if $cur_item ne ''; 264 push @content, [ $state, $cur_item, $lineno ] if $cur_item ne ''; 271 $self->{SOURCE} = \@content;
|
/openssl/crypto/x509/ |
H A D | v3_attrdesc.c | 26 ASN1_SIMPLE(OSSL_INFO_SYNTAX, choice.content, DIRECTORYSTRING), 100 if (BIO_printf(out, "%.*s", info->choice.content->length, info->choice.content->data) <= 0) in i2r_OSSL_INFO_SYNTAX()
|
/openssl/crypto/err/ |
H A D | openssl.txt | 54 ASN1_R_ILLEGAL_ZERO_CONTENT:222:illegal zero content 85 ASN1_R_NO_CONTENT_TYPE:209:no content type 89 ASN1_R_NO_SIG_CONTENT_TYPE:212:no sig content type 319 CMS_R_CONTENT_NOT_FOUND:105:content not found 357 CMS_R_NO_CONTENT:127:no content 358 CMS_R_NO_CONTENT_TYPE:173:no content type 394 unsupported content encryption algorithm 992 PKCS7_R_NO_CONTENT:122:no content 1702 TS_R_DETACHED_CONTENT:134:detached content 1711 TS_R_NO_CONTENT:106:no content [all …]
|