Searched refs:decoded (Results 1 – 25 of 34) sorted by relevance
12
/openssl/doc/man7/ |
H A D | provider-decoder.pod | 36 /* Functions to export a decoded object */ 49 object reference or intermediate decoded data from an encoded form 51 data from memory, it should provide a L<BIO_s_mem(3)> B<BIO>. The decoded 148 This property is used to specify the structure that the decoded data is 181 be decoded, with a set of bits I<selection> that are passed in an B<int>. 184 to be decoded. For example, those bits are assumed to be the same as those 187 if the object to be decoded is supposed to contain private key components. 226 the B<OSSL_CORE_BIO> I<in> to produce decoded data or an object to be 228 metadata that was decoded from the input. This L<OSSL_PARAM(3)> array is 252 could be decoded into some sort of object that this function understands,
|
H A D | ossl_store-file.pod | 30 possible PEM headers, together with the decoded PEM body. Since PEM
|
H A D | EVP_PKEY-EC.pod | 71 =item "decoded-from-explicit" (B<OSSL_PKEY_PARAM_EC_DECODED_FROM_EXPLICIT_PARAMS>) <integer> 73 Gets a flag indicating whether the key or parameters were decoded from explicit
|
H A D | EVP_PKEY-DH.pod | 236 To validate B<FIPS186-4> B<DHX> domain parameters decoded from B<PEM> or 244 EVP_PKEY *received_domp = ...; /* parameters received and decoded */
|
/openssl/doc/man3/ |
H A D | OSSL_DECODER_from_bio.pod | 33 I<*pdata> is updated to point at the location after what has been decoded, 69 /* pkey is created with the decoded data from the bio */ 97 /* pkey is created with the decoded data from the buffer */
|
H A D | OSSL_PARAM_allocate_from_text.pod | 59 I<value_n> decimal characters, which are decoded, and the resulting 68 If I<value> contains characters that couldn't be decoded as 85 I<value_n> hexadecimal characters, which are decoded, and the 87 If I<value> contains characters that couldn't be decoded as
|
H A D | BIO_f_base64.pod | 41 complete group of 4 valid base64 characters is decoded, or when an error occurs 45 returns no decoded data will typically return a negative result, rather 84 Read base64 encoded data from standard input and write the decoded
|
H A D | CMS_get1_ReceiptRequest.pod | 46 any is found it is decoded and written to B<prr>. 70 decoded. It returns 0 if a signed receipt request is not present and -1 if
|
H A D | EVP_EncodeInit.pod | 85 be encoded or decoded that are pending in the B<ctx> object. 109 If the final chunk length is a multiple of 4, it is decoded immediately and 150 Padding bytes (B<=>) (even if internal) are decoded to 6 zero bits, the caller 153 EVP_DecodeBlock() will return the length of the data decoded or -1 on error. 173 EVP_DecodeBlock() returns the length of the data decoded or -1 on error.
|
H A D | PEM_read.pod | 50 The final B<data> buffer is typically an ASN.1 object which can be decoded with 59 are returned in B<header> and the base64-decoded content and its length are
|
H A D | X509_get_pubkey.pod | 45 The first time a public key is decoded the B<EVP_PKEY> structure is
|
H A D | OPENSSL_hexchar2int.pod | 63 OPENSSL_hexchar2int returns the value of a decoded hex character,
|
H A D | ASN1_EXTERN_FUNCS.pod | 97 decoded and I<len> is the length of that data. After decoding I<*in> should be 98 updated to point at the next byte after the decoded data. If the B<ASN1_VALUE>
|
H A D | X509V3_get_d2i.pod | 64 if the extension could not be decoded (invalid syntax or not supported). 120 found, occurs multiple times or cannot be decoded. It is possible to
|
H A D | CTLOG_new.pod | 42 the new CTLOG. The base64 will be decoded and the public key parsed. The CTLOG
|
H A D | BIO_push.pod | 70 direction, that is data is read from I<f>, base64 decoded,
|
H A D | SRP_VBASE_new.pod | 80 for invalid decoded parameter values.
|
H A D | ASN1_item_d2i_bio.pod | 48 decoded structure.
|
H A D | d2i_PrivateKey.pod | 55 B<EVP_PKEY_RSA>. An error occurs if the decoded key does not match I<type>. Some
|
H A D | d2i_X509.pod | 443 context on the decoded structure this way (see the B<EXAMPLES> section). 496 usage of ASN1 functions: after one structure is encoded or decoded
|
H A D | SSL_CTX_set_msg_callback.pod | 62 content type (see NOTES below) this value will be the decoded
|
/openssl/crypto/rsa/ |
H A D | rsa_gen.c | 684 unsigned char *decoded = NULL; in rsa_keygen_pairwise_test() local 706 decoded = ciphertxt + plaintxt_len; in rsa_keygen_pairwise_test() 718 decoded_len = RSA_private_decrypt(ciphertxt_len, ciphertxt, decoded, rsa, in rsa_keygen_pairwise_test() 721 || memcmp(decoded, plaintxt, decoded_len) != 0) in rsa_keygen_pairwise_test()
|
/openssl/doc/internal/man3/ |
H A D | ossl_punycode_decode.pod | 35 *pout_length contains the number of codepoints decoded.
|
/openssl/doc/internal/man7/ |
H A D | DERlib.pod | 31 variable that's being encoded or decoded.
|
/openssl/crypto/ec/ |
H A D | ec_lib.c | 1562 int decoded = 0; in EC_GROUP_new_from_params() local 1573 if (ptmp != NULL && !OSSL_PARAM_get_int(ptmp, &decoded)) { in EC_GROUP_new_from_params() 1578 group->decoded_from_explicit_params = decoded > 0; in EC_GROUP_new_from_params()
|
Completed in 36 milliseconds
12