Home
last modified time | relevance | path

Searched refs:content (Results 1 – 25 of 81) sorted by relevance

1234

/openssl/doc/man3/
H A DCMS_get0_type.pod5 …1_eContentType, CMS_get0_eContentType, CMS_get0_content - get and set CMS content types and content
18 CMS_get0_type() returns the content type of a CMS_ContentInfo structure as
22 CMS_set1_eContentType() sets the embedded content type of a CMS_ContentInfo
30 content type.
33 containing the embedded content.
43 using OBJ_obj2nid(). For the currently supported content types the following
54 content pointer. That means that for example:
58 B<*pconf> could be NULL if there is no embedded content. Applications can
59 access, modify or create the embedded content in a B<CMS_ContentInfo> structure
61 embedded content as it is normally set by higher level functions.
H A DSSL_CTX_set_msg_callback.pod62 content type (see NOTES below) this value will be the decoded
67 This is one of the content type values defined in the protocol specification
70 messages). Alternatively it may be a "pseudo" content type. These pseudo
77 case of pseudo content types), which consists of I<len> bytes. The buffer is no
115 of data. The following pseudo content types are currently defined:
127 records the content type in the record header is always
129 an "inner" content type. B<buf> contains the encoded "inner" content type byte.
154 callback will supply all the padding frames in one go via this pseudo content
172 The pseudo content types B<SSL3_RT_QUIC_DATAGRAM>, B<SSL3_RT_QUIC_PACKET>,
177 the pseudo content type B<SSL3_RT_HEADER> for TLS records.
[all …]
H A DPKCS7_type_is_other.pod5 PKCS7_type_is_other - determine content type of PKCS#7 envelopedData structure
15 PKCS7_type_is_other() returns the whether the content type of a PKCS#7 envelopedData
16 structure is one of the following content types:
27 PKCS7_type_is_other() returns either 0 if the content type is matched or 1 otherwise.
H A DSMIME_write_ASN1.pod28 content must be supplied via I<data>.
29 I<flags> is an optional set of flags. I<ctype_nid> is the NID of the content
30 type, I<econt_nid> is the NID of the embedded content type and I<mdalgs> is a
48 the content, this only makes sense if B<CMS_DETACHED> is also set.
58 If streaming is performed the content is output in BER format using indefinite
60 content where the content is absent and DER format is used.
H A DCMS_decrypt.pod7 - decrypt content from a CMS envelopedData structure
23 CMS_decrypt() extracts the decrypted content from a CMS EnvelopedData
25 It uses CMS_decrypt_set1_pkey() to decrypt the content
29 I<out> is a BIO to write the content to and
33 provides the content unless I<cert>, I<dcont>, and I<out> are NULL as well.
34 The I<dcont> parameter is used in the rare case where the encrypted content
63 the content: this will typically output garbage and may (but is not guaranteed
69 content encryption key. Applications should use this flag with
86 from the content. If the content is not of type C<text/plain> then an error is
H A DCMS_uncompress.pod15 CMS_uncompress() extracts and uncompresses the content from a CMS
16 CompressedData structure B<cms>. B<data> is a BIO to write the content to and
19 The B<dcont> parameter is used in the rare case where the compressed content
33 from the content. If the content is not of type B<text/plain> then an error is
H A DPKCS7_decrypt.pod5 PKCS7_decrypt - decrypt content from a PKCS#7 envelopedData structure
15 PKCS7_decrypt() extracts and decrypts the content from a PKCS#7 envelopedData
17 recipients certificate, B<data> is a BIO to write the content to and
28 from the content. If the content is not of type B<text/plain> then an error is
H A DCMS_verify.pod35 I<detached_data> refers to the signed data if the content is detached from I<cms>.
37 The content is written to the BIO I<out> unless it is NULL.
43 and on success it returns the verified content as a memory BIO.
61 the content is detached I<detached_data> cannot be NULL.
77 Finally the signed content is read (and written to I<out> unless it is NULL)
93 from the content. If the content is not of type C<text/plain> then an error is
106 If B<CMS_NO_CONTENT_VERIFY> is set then the content digest is not checked.
123 setting B<CMS_NO_CONTENT_VERIFY> will totally disable all content verification
125 useful if one merely wishes to write the content to I<out> and its validity
137 CMS_SignedData_verify() returns a memory BIO containing the verified content,
[all …]
H A DCMS_EncryptedData_decrypt.pod24 symmetric I<key> of size I<keylen> bytes. I<out> is a BIO to write the content
26 I<dcont> is used in the rare case where the encrypted content is detached. It
32 from the content. If the content is not of type C<text/plain> then an error is
49 otherwise a BIO containing the decypted content.
H A DSMIME_write_CMS.pod19 B<CMS_ContentInfo> structure. If streaming is enabled then the content must be
31 the content, this only makes sense if B<CMS_DETACHED> is also set.
41 If streaming is performed the content is output in BER format using indefinite
43 content where the content is absent and DER format is used.
H A DSMIME_write_PKCS7.pod19 structure. If streaming is enabled then the content must be supplied in the
31 are added to the content, this only makes sense if B<PKCS7_DETACHED>
42 If streaming is performed the content is output in BER format using indefinite
44 content where the content is absent and DER format is used.
H A DPKCS7_verify.pod28 I<indata> refers to the signed data if the content is detached from I<p7>.
30 The content is written to the BIO I<out> unless it is NULL.
43 the content is detached I<indata> cannot be NULL. If the content is
45 embedded and external content. To treat this as an error, use the flag
65 Finally the signed content is read (and written to I<out> unless it is NULL)
82 from the content. If the content is not of type C<text/plain> then an error is
104 useful if one merely wishes to write the content to I<out> and its validity
126 The lack of single pass processing means that the signed content must all
H A DBIO_new_CMS.pod24 After all content has been written through the chain BIO_flush() must be called
35 Any content written through the filter is used verbatim: no canonical
40 responsibility to set the inner content type of any outer CMS_ContentInfo
H A DCMS_final.pod19 appropriate fields. The parameter B<data> contains the content to be
20 processed. The B<dcont> parameter contains a BIO to write content to after
H A DCMS_get0_RecipientInfos.pod97 first and the content encryption key must be available: for example by a
113 with a NULL key to decrypt the enveloped content.
117 an appropriate CMS_RecipientInfo structure to make the content encrypt key
119 CMS_add1_recipient_cert() and finally encrypt the content encryption key
/openssl/test/
H A Dcmsapitest.c31 CMS_ContentInfo* content = NULL; in test_encrypt_decrypt() local
41 content = CMS_encrypt(certstack, msgbio, cipher, CMS_TEXT); in test_encrypt_decrypt()
42 if (!TEST_ptr(content)) in test_encrypt_decrypt()
45 if (!TEST_true(CMS_decrypt(content, privkey, cert, NULL, outmsgbio, in test_encrypt_decrypt()
50 CMS_EnvelopedData_decrypt(content->d.envelopedData, in test_encrypt_decrypt()
66 CMS_ContentInfo_free(content); in test_encrypt_decrypt()
106 BIO *bio, *content = NULL; in test_d2i_CMS_bio_NULL() local
309 && TEST_ptr(content = in test_d2i_CMS_bio_NULL()
312 BIO_free(content); in test_d2i_CMS_bio_NULL()
H A Dgenerate_ssl_tests.pl145 my $content = <INPUT>;
147 eval $content;
H A Dsmcont.txt1 Somewhat longer test content for OpenSSL CMS utility to handle, and a bit longer...
/openssl/doc/man7/
H A Dossl_store-file.pod24 Since files come in all kinds of formats and content types, the 'file'
34 If the file isn't determined to be formatted as PEM, the content is
38 Each file handler is expected to handle PEM and non-PEM content as
39 appropriate. Some may refuse non-PEM content for the sake of
/openssl/engines/
H A De_loader_attic.txt9 ATTIC_R_AMBIGUOUS_CONTENT_TYPE:100:ambiguous content type
19 ATTIC_R_UNSUPPORTED_CONTENT_TYPE:108:unsupported content type
/openssl/doc/man1/
H A Dopenssl-cms.pod.in94 [B<-content> I<filename>]
227 Verify a CMS B<DigestedData> type and output the content.
243 B<EncryptedData> type and output the content.
248 B<EncryptedData> type and output the content.
256 B<Data> type and output the content.
320 content format is detected.
520 =item B<-content> I<filename>
530 Do not verify signed content signatures.
670 B<-sign> operation if the content is not detached.
840 openssl cms -verify -inform PEM -in signature.pem -content content.txt
[all …]
H A Dopenssl-smime.pod.in39 [B<-content> I<file>]
148 =item B<-content> I<filename>
150 This specifies a file containing the detached content, this is only
152 structure is using the detached signature form where the content is
153 not included. This option will override any content if the input format
154 is S/MIME and it uses the multipart/signed MIME content type.
327 B<-sign> operation if the content is not detached.
330 since the content is no longer part of the PKCS#7 structure the encoding
428 openssl smime -verify -inform PEM -in signature.pem -content content.txt
432 openssl smime -verify -inform DER -in signature.der -content content.txt
/openssl/external/perl/Text-Template-1.56/lib/Text/
H A DTemplate.pm208 my @content;
219 push @content, [ $state, $cur_item, $lineno ] if $cur_item ne '';
236 push @content, [ $state, $cur_item, $prog_start ] if $cur_item ne '';
264 push @content, [ $state, $cur_item, $lineno ] if $cur_item ne '';
271 $self->{SOURCE} = \@content;
/openssl/crypto/x509/
H A Dv3_attrdesc.c26 ASN1_SIMPLE(OSSL_INFO_SYNTAX, choice.content, DIRECTORYSTRING),
100 if (BIO_printf(out, "%.*s", info->choice.content->length, info->choice.content->data) <= 0) in i2r_OSSL_INFO_SYNTAX()
/openssl/crypto/err/
H A Dopenssl.txt54 ASN1_R_ILLEGAL_ZERO_CONTENT:222:illegal zero content
85 ASN1_R_NO_CONTENT_TYPE:209:no content type
89 ASN1_R_NO_SIG_CONTENT_TYPE:212:no sig content type
319 CMS_R_CONTENT_NOT_FOUND:105:content not found
357 CMS_R_NO_CONTENT:127:no content
358 CMS_R_NO_CONTENT_TYPE:173:no content type
394 unsupported content encryption algorithm
992 PKCS7_R_NO_CONTENT:122:no content
1702 TS_R_DETACHED_CONTENT:134:detached content
1711 TS_R_NO_CONTENT:106:no content
[all …]

Completed in 30 milliseconds

1234