/openssl/test/ |
H A D | bio_base64_test.c | 22 char *encoded; member 102 if (encoded != NULL) { in encode() 103 int elen = strlen(encoded); in encode() 191 char *encoded = NULL; in test_bio_base64_run() local 201 if (t->encoded != NULL) in test_bio_base64_run() 224 OPENSSL_free(encoded); in test_bio_base64_run() 305 OPENSSL_free(encoded); in test_bio_base64_run() 331 if (t->encoded) in generic_case() 349 if (t->encoded) in generic_case() 388 t.encoded = NULL; in test_bio_base64_generated() [all …]
|
H A D | pemtest.c | 19 const char *encoded; member 41 const char *encoded = b64_pem_data[idx].encoded; in test_b64() local 45 || !TEST_true(BIO_printf(b, "%s\n", encoded)) in test_b64() 69 const char *encoded = b64_pem_data[0].encoded; in test_invalid() local 73 || !TEST_true(BIO_printf(b, "%c%s\n", '\t', encoded)) in test_invalid()
|
H A D | endecode_test.c | 141 void **encoded, long *encoded_len, 168 void *encoded = NULL; in test_encode_decode() local 233 if (encoded != NULL && encoded_len != 0) in test_encode_decode() 234 dump_cb("|pkey| encoded", encoded, encoded_len); in test_encode_decode() 239 OPENSSL_free(encoded); in test_encode_decode() 249 void **encoded, long *encoded_len, in encode_EVP_PKEY_prov() argument 275 || !TEST_FL_ptr(*encoded = mem_buf->data) in encode_EVP_PKEY_prov() 390 || !TEST_FL_ptr(*encoded = mem_buf->data) in encode_EVP_PKEY_legacy_PEM() 429 || !TEST_FL_ptr(*encoded = mem_buf->data) in encode_EVP_PKEY_MSBLOB() 450 void **encoded, long *encoded_len, in encode_EVP_PKEY_PVK() argument [all …]
|
H A D | punycode_test.c | 21 const char *encoded; member 160 if (!TEST_true(ossl_punycode_decode(tc->encoded, strlen(tc->encoded), in test_punycode()
|
/openssl/doc/man3/ |
H A D | EVP_PKEY_set1_encoded_public_key.pod | 40 The format for the encoded public key will depend on the algorithm in use. For 41 DH it should be encoded as a positive integer in big-endian form. For EC is 43 Curve Cryptography") standard. For B<X25519> and B<X448> it should be encoded 46 format defined in B<FIPS 203> (the 12-bit per-coefficient encoded public I<t> 49 The key to be updated is supplied in B<pkey>. The buffer containing the encoded 53 the encoded public key is returned to the application. The key containing the 54 public key data is supplied in B<pkey>. A buffer containing the encoded key will 55 be allocated and stored in B<*ppub>. The length of the encoded public key is 73 EVP_PKEY_get1_encoded_public_key() returns the length of the encoded key or 0 for failure. 102 =head2 Get an encoded public key to send to a peer [all …]
|
H A D | d2i_RSAPrivateKey.pod | 130 B<d2i_I<TYPE>PrivateKey>() and derivates thereof decode DER encoded 133 B<d2i_I<TYPE>PublicKey>() and derivates thereof decode DER encoded 143 B<I<TYPE>> data into a type specific DER encoded structure. 146 B<I<TYPE>> data into a type specific DER encoded structure. 149 parameters data into a type specific DER encoded structure. 152 B<I<TYPE>> data into a DER encoded B<SubjectPublicKeyInfo> structure. 181 A caveat is that L<i2d_PrivateKey(3)> may output a DER encoded PKCS#8 196 function names. The sample code to get DER encoded output in a type 260 The encoded data is in binary form and may contain embedded zeros. 263 of the encoded structure. [all …]
|
H A D | EC_KEY_get_enc_flags.pod | 22 When reading a private key encoded without an associated public key (e.g. if 24 the missing public key automatically. Private keys encoded without parameters 33 the curve are not encoded along with the private key. If EC_PKEY_NO_PUBKEY is 34 set then the public key is not encoded along with the private key.
|
H A D | i2d_re_X509_tbs.pod | 29 i2d_X509_AUX() is similar to L<i2d_X509(3)>, but the encoded output 55 i2d_X509_AUX() returns the length of encoded data or -1 on error. 58 length of encoded data or <=0 on error.
|
H A D | ASN1_item_d2i_bio.pod | 8 - decode and encode DER-encoded ASN.1 structures 40 I<len> which must be a DER-encoded ASN.1 structure, using the ASN.1 template 54 which must be a DER-encoded ASN.1 structure, using the ASN.1 template I<it> 84 ASN1_item_unpack() uses ASN1_item_d2i() to decode the DER-encoded B<ASN1_STRING>
|
H A D | BIO_f_base64.pod | 51 used to signal that no more data is to be encoded: this is used 61 Because of the format of base64 encoding the end of the encoded 84 Read base64 encoded data from standard input and write the decoded 104 character when it occurs at the start of a base64 group of 4 encoded
|
H A D | PEM_bytes_read_bio.pod | 5 PEM_bytes_read_bio, PEM_bytes_read_bio_secmem - read a PEM-encoded data structure from a BIO 23 etc.). If multiple PEM-encoded data structures are present in the same 38 The returned data is the DER-encoded form of the requested type, in
|
H A D | OSSL_ENCODER_to_bio.pod | 38 after the encoded bytes, and I<*pdata_len> will be assigned the number of 78 /* pkey was successfully encoded into the bio */ 108 * pkey was successfully encoded into a newly allocated
|
H A D | OSSL_DECODER_CTX_new_for_pkey.pod | 50 decoder implementations that may be able to process the encoded input into 75 use when decrypting the encoded private key. Alternatively, a pass phrase 107 C<type-specific>. This is the structure used for keys encoded 109 encoded according to PKCS#1.
|
H A D | PKCS12_item_decrypt_d2i.pod | 35 string containing an ASN.1 encoded object using the algorithm I<algor> and 41 I<passlen>, returning an encoded object in I<obj>. If I<zbuf> is nonzero then
|
/openssl/crypto/slh_dsa/ |
H A D | slh_dsa.c | 235 uint8_t *encoded = NULL; in msg_encode() local 250 encoded = tmp; in msg_encode() 252 encoded = OPENSSL_zalloc(encoded_len); in msg_encode() 253 if (encoded == NULL) in msg_encode() 256 encoded[0] = 0; in msg_encode() 257 encoded[1] = (uint8_t)ctx_len; in msg_encode() 258 memcpy(&encoded[2], ctx, ctx_len); in msg_encode() 259 memcpy(&encoded[2 + ctx_len], msg, msg_len); in msg_encode() 260 return encoded; in msg_encode()
|
/openssl/doc/man7/ |
H A D | passphrase-encoding.pod | 22 This means that for an object that was encrypted using a pass phrase encoded in 23 ISO-8859-1, that object needs to be decrypted using a pass phrase encoded in 30 The standard stipulates that the pass phrase shall be encoded as an ASN.1 32 encoded in big endian (UCS-2 BE). 40 Treats the received pass phrase as UTF-8 encoded and tries to re-encode it to 47 Assumes that the pass phrase is encoded in ASCII or ISO-8859-1 and 64 A pass phrase encoded in ISO-8859-2 could very well have a sequence such as 83 This API stipulates that pass phrases should be UTF-8 encoded, and that any 115 encoded using UTF-8. 153 This also takes care of the case when a UTF-8 encoded string was used with [all …]
|
H A D | provider-encoder.pod | 38 /* Functions to import and free a temporary object to be encoded */ 51 L<provider-object(7)>) into an encoded form, and write the result to 52 the given OSSL_CORE_BIO. If the caller wants to get the encoded 171 This property is used to specify the structure that is used for the encoded 188 be encoded, with a set of bits I<selection> that are passed in an B<int>. 198 match the original object that was encoded. 243 the object in encoded form to the B<OSSL_CORE_BIO>. The I<selection> bits,
|
/openssl/crypto/rsa/ |
H A D | rsa_sign.c | 293 const unsigned char *encoded = NULL; in RSA_sign() local 312 encoded = m; in RSA_sign() 316 encoded = tmps; in RSA_sign() 323 encrypt_len = RSA_private_encrypt((int)encoded_len, encoded, sigret, rsa, in RSA_sign() 351 unsigned char *decrypt_buf = NULL, *encoded = NULL; in ossl_rsa_verify() local 437 if (!encode_pkcs1(&encoded, &encoded_len, type, m, m_len)) in ossl_rsa_verify() 441 || memcmp(encoded, decrypt_buf, encoded_len) != 0) { in ossl_rsa_verify() 456 OPENSSL_clear_free(encoded, encoded_len); in ossl_rsa_verify()
|
/openssl/ssl/quic/ |
H A D | quic_cfq.c | 18 unsigned char *encoded; member 38 return ex->encoded; in ossl_quic_cfq_item_get_encoded() 182 item->free_cb(item->encoded, item->encoded_len, item->free_cb_arg); in clear_item() 185 item->encoded = NULL; in clear_item() 235 const unsigned char *encoded, in ossl_quic_cfq_add_frame() argument 248 item->encoded = (unsigned char *)encoded; in ossl_quic_cfq_add_frame()
|
/openssl/crypto/ml_dsa/ |
H A D | ml_dsa_sign.c | 334 uint8_t *encoded = NULL; in msg_encode() local 349 encoded = tmp; in msg_encode() 351 encoded = OPENSSL_malloc(encoded_len); in msg_encode() 352 if (encoded == NULL) in msg_encode() 355 encoded[0] = 0; in msg_encode() 356 encoded[1] = (uint8_t)ctx_len; in msg_encode() 357 memcpy(&encoded[2], ctx, ctx_len); in msg_encode() 358 memcpy(&encoded[2 + ctx_len], msg, msg_len); in msg_encode() 359 return encoded; in msg_encode()
|
/openssl/doc/man1/ |
H A D | openssl-kdf.pod.in | 150 Use TLS1-PRF to create a hex-encoded derived key from a secret key and seed: 155 Use HKDF to create a hex-encoded derived key from a secret key, salt and info: 160 Use SSKDF with KMAC to create a hex-encoded derived key from a secret key, salt and info: 166 Use SSKDF with HMAC to create a hex-encoded derived key from a secret key, salt and info: 172 Use SSKDF with Hash to create a hex-encoded derived key from a secret key, salt and info: 178 Use SSHKDF to create a hex-encoded derived key from a secret key, hash and session_id: 186 Use PBKDF2 to create a hex-encoded derived key from a password and salt: 191 Use scrypt to create a hex-encoded derived key from a password and salt:
|
H A D | openssl-pkey.pod.in | 104 This specifies the output file to save the encoded and/or text output of key 121 Encrypt the PEM encoded private key with the supplied cipher. Any algorithm 148 Do not output the key in encoded form. 153 (possibly in addition to the PEM encoded form). 154 This cannot be combined with encoded output in DER format. 159 This cannot be combined with encoded output in DER format. 177 This specifies how the elliptic curve parameters are encoded.
|
H A D | openssl-mac.pod.in | 125 To create a hex-encoded HMAC-SHA1 MAC of a file and write to stdout: 136 To create a hex-encoded CMAC-AES-128-CBC MAC from a file: 142 To create a hex-encoded KMAC128 MAC from a file with a Customisation String 148 To create a hex-encoded GMAC-AES-128-GCM with a IV from a file:
|
/openssl/doc/internal/man3/ |
H A D | ossl_DER_w_precompiled.pod | 22 structure being DER encoded, use ossl_DER_w_precompiled(). 24 ossl_DER_w_precompiled() will simply take the DER encoded blob given as
|
/openssl/doc/designs/quic-design/ |
H A D | quic-fifm.md | 55 the encoded frame can simply be sent again. This retransmission system does 57 with each queue entry being an octet string representing an encoded frame. 82 - Need for a generic control queue which can store encoded control frames. 115 The CFQ (`QUIC_CFQ`) stores encoded frames which can be blindly retransmitted in 127 This can be determined from the encoded frame buffer, but this saves the 176 /* Returns a pointer to the encoded buffer of a CFQ item. */ 179 /* Returns the length of the encoded buffer in bytes. */ 203 * Enqueue a frame to the CFQ. encoded points to the opaque encoded frame. 219 * is also encoded into the buffer. This allows the caller to determine the 228 const unsigned char *encoded,
|