Home
last modified time | relevance | path

Searched refs:encoded (Results 1 – 25 of 134) sorted by relevance

123456

/openssl/test/
H A Dbio_base64_test.c22 char *encoded; member
102 if (encoded != NULL) { in encode()
103 int elen = strlen(encoded); in encode()
191 char *encoded = NULL; in test_bio_base64_run() local
201 if (t->encoded != NULL) in test_bio_base64_run()
224 OPENSSL_free(encoded); in test_bio_base64_run()
305 OPENSSL_free(encoded); in test_bio_base64_run()
331 if (t->encoded) in generic_case()
349 if (t->encoded) in generic_case()
388 t.encoded = NULL; in test_bio_base64_generated()
[all …]
H A Dpemtest.c19 const char *encoded; member
41 const char *encoded = b64_pem_data[idx].encoded; in test_b64() local
45 || !TEST_true(BIO_printf(b, "%s\n", encoded)) in test_b64()
69 const char *encoded = b64_pem_data[0].encoded; in test_invalid() local
73 || !TEST_true(BIO_printf(b, "%c%s\n", '\t', encoded)) in test_invalid()
H A Dendecode_test.c135 void **encoded, long *encoded_len,
162 void *encoded = NULL; in test_encode_decode() local
227 if (encoded != NULL && encoded_len != 0) in test_encode_decode()
228 dump_cb("|pkey| encoded", encoded, encoded_len); in test_encode_decode()
233 OPENSSL_free(encoded); in test_encode_decode()
243 void **encoded, long *encoded_len, in encode_EVP_PKEY_prov() argument
269 || !TEST_FL_ptr(*encoded = mem_buf->data) in encode_EVP_PKEY_prov()
384 || !TEST_FL_ptr(*encoded = mem_buf->data) in encode_EVP_PKEY_legacy_PEM()
423 || !TEST_FL_ptr(*encoded = mem_buf->data) in encode_EVP_PKEY_MSBLOB()
444 void **encoded, long *encoded_len, in encode_EVP_PKEY_PVK() argument
[all …]
H A Dpunycode_test.c21 const char *encoded; member
160 if (!TEST_true(ossl_punycode_decode(tc->encoded, strlen(tc->encoded), in test_punycode()
/openssl/doc/man3/
H A DEVP_PKEY_set1_encoded_public_key.pod37 The format for the encoded public key will depend on the algorithm in use. For
38 DH it should be encoded as a positive integer in big-endian form. For EC is
40 Curve Cryptography") standard. For X25519 and X448 it should be encoded in a
43 The key to be updated is supplied in B<pkey>. The buffer containing the encoded
47 the encoded public key is returned to the application. The key containing the
48 public key data is supplied in B<pkey>. A buffer containing the encoded key will
49 be allocated and stored in B<*ppub>. The length of the encoded public key is
67 EVP_PKEY_get1_encoded_public_key() returns the length of the encoded key or 0 for failure.
96 =head2 Get an encoded public key to send to a peer
110 * Send the encoded public key stored in the buffer at "pubkey" and of
H A Dd2i_RSAPrivateKey.pod130 B<d2i_I<TYPE>PrivateKey>() and derivates thereof decode DER encoded
133 B<d2i_I<TYPE>PublicKey>() and derivates thereof decode DER encoded
143 B<I<TYPE>> data into a type specific DER encoded structure.
146 B<I<TYPE>> data into a type specific DER encoded structure.
149 parameters data into a type specific DER encoded structure.
152 B<I<TYPE>> data into a DER encoded B<SubjectPublicKeyInfo> structure.
181 A caveat is that L<i2d_PrivateKey(3)> may output a DER encoded PKCS#8
196 function names. The sample code to get DER encoded output in a type
260 The encoded data is in binary form and may contain embedded zeros.
263 of the encoded structure.
[all …]
H A DEC_KEY_get_enc_flags.pod22 When reading a private key encoded without an associated public key (e.g. if
24 the missing public key automatically. Private keys encoded without parameters
33 the curve are not encoded along with the private key. If EC_PKEY_NO_PUBKEY is
34 set then the public key is not encoded along with the private key.
H A Di2d_re_X509_tbs.pod29 i2d_X509_AUX() is similar to L<i2d_X509(3)>, but the encoded output
55 i2d_X509_AUX() returns the length of encoded data or -1 on error.
58 length of encoded data or <=0 on error.
H A DASN1_item_d2i_bio.pod8 - decode and encode DER-encoded ASN.1 structures
40 I<len> which must be a DER-encoded ASN.1 structure, using the ASN.1 template
54 which must be a DER-encoded ASN.1 structure, using the ASN.1 template I<it>
84 ASN1_item_unpack() uses ASN1_item_d2i() to decode the DER-encoded B<ASN1_STRING>
H A DBIO_f_base64.pod51 used to signal that no more data is to be encoded: this is used
61 Because of the format of base64 encoding the end of the encoded
84 Read base64 encoded data from standard input and write the decoded
104 character when it occurs at the start of a base64 group of 4 encoded
H A DPEM_bytes_read_bio.pod5 PEM_bytes_read_bio, PEM_bytes_read_bio_secmem - read a PEM-encoded data structure from a BIO
23 etc.). If multiple PEM-encoded data structures are present in the same
38 The returned data is the DER-encoded form of the requested type, in
H A DOSSL_ENCODER_to_bio.pod38 after the encoded bytes, and I<*pdata_len> will be assigned the number of
78 /* pkey was successfully encoded into the bio */
108 * pkey was successfully encoded into a newly allocated
H A DOSSL_DECODER_CTX_new_for_pkey.pod50 decoder implementations that may be able to process the encoded input into
75 use when decrypting the encoded private key. Alternatively, a pass phrase
107 C<type-specific>. This is the structure used for keys encoded
109 encoded according to PKCS#1.
H A DPKCS12_item_decrypt_d2i.pod35 string containing an ASN.1 encoded object using the algorithm I<algor> and
41 I<passlen>, returning an encoded object in I<obj>. If I<zbuf> is nonzero then
H A Dd2i_X509.pod445 If I<ppout> is not NULL, it writes the DER encoded data to the buffer
448 returns the length of the encoded data.
450 If I<*ppout> is NULL memory will be allocated for a buffer and the encoded
477 The encoded data is in binary form and may contain embedded zeros.
480 of the encoded structure.
486 usage of ASN1 functions: after one structure is encoded or decoded
536 B<i2d_I<TYPE>>() returns the number of bytes successfully encoded or a negative
643 then the encoded structure may contain invalid data or omit the
/openssl/doc/man7/
H A Dpassphrase-encoding.pod22 This means that for an object that was encrypted using a pass phrase encoded in
23 ISO-8859-1, that object needs to be decrypted using a pass phrase encoded in
30 The standard stipulates that the pass phrase shall be encoded as an ASN.1
32 encoded in big endian (UCS-2 BE).
40 Treats the received pass phrase as UTF-8 encoded and tries to re-encode it to
47 Assumes that the pass phrase is encoded in ASCII or ISO-8859-1 and
64 A pass phrase encoded in ISO-8859-2 could very well have a sequence such as
83 This API stipulates that pass phrases should be UTF-8 encoded, and that any
115 encoded using UTF-8.
153 This also takes care of the case when a UTF-8 encoded string was used with
[all …]
H A Dprovider-encoder.pod38 /* Functions to import and free a temporary object to be encoded */
51 L<provider-object(7)>) into an encoded form, and write the result to
52 the given OSSL_CORE_BIO. If the caller wants to get the encoded
171 This property is used to specify the structure that is used for the encoded
188 be encoded, with a set of bits I<selection> that are passed in an B<int>.
198 match the original object that was encoded.
243 the object in encoded form to the B<OSSL_CORE_BIO>. The I<selection> bits,
/openssl/crypto/rsa/
H A Drsa_sign.c293 const unsigned char *encoded = NULL; in RSA_sign() local
312 encoded = m; in RSA_sign()
316 encoded = tmps; in RSA_sign()
323 encrypt_len = RSA_private_encrypt((int)encoded_len, encoded, sigret, rsa, in RSA_sign()
351 unsigned char *decrypt_buf = NULL, *encoded = NULL; in ossl_rsa_verify() local
437 if (!encode_pkcs1(&encoded, &encoded_len, type, m, m_len)) in ossl_rsa_verify()
441 || memcmp(encoded, decrypt_buf, encoded_len) != 0) { in ossl_rsa_verify()
456 OPENSSL_clear_free(encoded, encoded_len); in ossl_rsa_verify()
/openssl/ssl/quic/
H A Dquic_cfq.c18 unsigned char *encoded; member
38 return ex->encoded; in ossl_quic_cfq_item_get_encoded()
182 item->free_cb(item->encoded, item->encoded_len, item->free_cb_arg); in clear_item()
185 item->encoded = NULL; in clear_item()
235 const unsigned char *encoded, in ossl_quic_cfq_add_frame() argument
248 item->encoded = (unsigned char *)encoded; in ossl_quic_cfq_add_frame()
/openssl/doc/man1/
H A Dopenssl-kdf.pod.in150 Use TLS1-PRF to create a hex-encoded derived key from a secret key and seed:
155 Use HKDF to create a hex-encoded derived key from a secret key, salt and info:
160 Use SSKDF with KMAC to create a hex-encoded derived key from a secret key, salt and info:
166 Use SSKDF with HMAC to create a hex-encoded derived key from a secret key, salt and info:
172 Use SSKDF with Hash to create a hex-encoded derived key from a secret key, salt and info:
178 Use SSHKDF to create a hex-encoded derived key from a secret key, hash and session_id:
186 Use PBKDF2 to create a hex-encoded derived key from a password and salt:
191 Use scrypt to create a hex-encoded derived key from a password and salt:
H A Dopenssl-pkey.pod.in104 This specifies the output file to save the encoded and/or text output of key
121 Encrypt the PEM encoded private key with the supplied cipher. Any algorithm
148 Do not output the key in encoded form.
153 (possibly in addition to the PEM encoded form).
154 This cannot be combined with encoded output in DER format.
159 This cannot be combined with encoded output in DER format.
177 This specifies how the elliptic curve parameters are encoded.
H A Dopenssl-mac.pod.in125 To create a hex-encoded HMAC-SHA1 MAC of a file and write to stdout:
136 To create a hex-encoded CMAC-AES-128-CBC MAC from a file:
142 To create a hex-encoded KMAC128 MAC from a file with a Customisation String
148 To create a hex-encoded GMAC-AES-128-GCM with a IV from a file:
H A Dopenssl-pkeyparam.pod.in51 Prints out the parameters in plain text in addition to the encoded version.
55 Do not output the encoded version of the parameters.
/openssl/doc/internal/man3/
H A Dossl_DER_w_precompiled.pod22 structure being DER encoded, use ossl_DER_w_precompiled().
24 ossl_DER_w_precompiled() will simply take the DER encoded blob given as
/openssl/doc/designs/quic-design/
H A Dquic-fifm.md55 the encoded frame can simply be sent again. This retransmission system does
57 with each queue entry being an octet string representing an encoded frame.
82 - Need for a generic control queue which can store encoded control frames.
115 The CFQ (`QUIC_CFQ`) stores encoded frames which can be blindly retransmitted in
127 This can be determined from the encoded frame buffer, but this saves the
176 /* Returns a pointer to the encoded buffer of a CFQ item. */
179 /* Returns the length of the encoded buffer in bytes. */
203 * Enqueue a frame to the CFQ. encoded points to the opaque encoded frame.
219 * is also encoded into the buffer. This allows the caller to determine the
228 const unsigned char *encoded,

Completed in 303 milliseconds

123456