Searched refs:null (Results 1 – 25 of 43) sorted by relevance
12
/openssl/doc/man3/ |
H A D | BIO_s_null.pod | 5 BIO_s_null - null data sink 15 BIO_s_null() returns the null sink BIO method. Data written to 16 the null sink is discarded, reads return EOF. 20 A null sink BIO behaves in a similar manner to the Unix /dev/null 23 A null bio can be placed on the end of a chain to discard any data 26 A null sink is useful if, for example, an application wishes to digest some 29 by adding a null sink BIO to the end of the chain 33 BIO_s_null() returns the null sink BIO method.
|
H A D | BIO_f_null.pod | 5 BIO_f_null - null filter 15 BIO_f_null() returns the null filter BIO method. This is a filter BIO 18 All requests to a null filter BIO are passed through to the next BIO in 19 the chain: this means that a BIO chain containing a null filter BIO 24 As may be apparent a null filter BIO is not particularly useful. 28 BIO_f_null() returns the null filter BIO method.
|
H A D | OSSL_PARAM_print_to_bio.pod | 20 I<p> must be a non-null array of OSSL_PARAM values, terminated 21 with a value containing a null I<key> member.
|
H A D | X509_NAME_get_index_by_NID.pod | 47 will be written and the text written to B<buf> will be null 49 excluding the terminating null. If B<buf> is <NULL> then the amount 50 of space needed in B<buf> (excluding the final null) is returned.
|
H A D | SSL_SESSION_get_protocol_version.pod | 33 does B<not> perform a null check on the provided session B<s> pointer.
|
H A D | SSL_CTX_set_ct_validation_callback.pod | 96 enabled via either SSL_enable_ct() or a non-null custom callback, and 0 123 SSL_CTX_ct_is_enabled() and SSL_ct_is_enabled() return a 1 if a non-null CT
|
H A D | RSA_meth_new.pod | 70 /* Can be null */ 77 /* Can be null */
|
H A D | SSL_CTX_set1_sigalgs.pod | 33 must be a null terminated string consisting of a colon separated list of
|
H A D | X509_get0_signature.pod | 111 error (e.g. null ALGO pointer). X509_REQ_set0_signature does
|
/openssl/doc/man7/ |
H A D | OSSL_PROVIDER-null.pod | 5 OSSL_PROVIDER-null - OpenSSL null provider 9 The OpenSSL null provider supplies no algorithms. 16 The null provider defines no properties. 20 The OpenSSL null provider supports no operations and algorithms.
|
H A D | ossl-guide-libraries-introduction.pod | 243 The null provider is built in as part of the F<libcrypto> library. It contains 246 prevent that from happening you can explicitly load the null provider. 250 accidentally using the default library context. Load the null provider into the 254 See L<OSSL_PROVIDER-null(7)>. 319 L<OSSL_PROVIDER-FIPS(7)>, L<OSSL_PROVIDER-legacy(7)>, L<OSSL_PROVIDER-null(7)>,
|
/openssl/util/ |
H A D | ctags.sh | 23 if ! type "${CTAGS}" > /dev/null; then 42 if ! type "${READTAGS}" > /dev/null 2>&1; then
|
H A D | shlib_wrap.sh.in | 36 SYSNAME=`(uname -s) 2>/dev/null`;
|
/openssl/test/ |
H A D | null.cnf | 10 null = null_sect
|
H A D | json_test.c | 161 BEGIN_SCRIPT(null, "serialize a single null", 0) 163 END_SCRIPT_EXPECTING_Q(null) 491 SCRIPT(null)
|
H A D | lhash_test.c | 87 int null; in test_int_lhash() member 170 if (!TEST_int_eq(b ^ dels[i].null, 0)) { in test_int_lhash()
|
/openssl/test/recipes/90-test_includes_data/ |
H A D | includes-prov-dir.cnf | 11 null = null_sect
|
/openssl/test/recipes/95-test_external_tlsfuzzer_data/ |
H A D | tlsfuzzer.sh | 62 test -L tlslite || ln -s ../tlslite-ng/tlslite tlslite 2>/dev/null
|
/openssl/crypto/err/ |
H A D | openssl.txt | 46 ASN1_R_ILLEGAL_NULL:125:illegal null 47 ASN1_R_ILLEGAL_NULL_VALUE:182:illegal null value 90 ASN1_R_NULL_IS_WRONG_LENGTH:144:null is wrong length 266 CMP_R_NULL_ARGUMENT:103:null argument 423 CONF_R_LIST_CANNOT_BE_NULL:115:list cannot be null 459 CRMF_R_NULL_ARGUMENT:109:null argument 780 EVP_R_NULL_MAC_PKEY_CTX:208:null mac pkey ctx 932 PEM_R_CIPHER_IS_NULL:127:cipher is null 1405 SSL_R_DANE_TLSA_NULL_DATA:203:dane tlsa null data 1526 SSL_R_NULL_SSL_CTX:195:null ssl ctx [all …]
|
/openssl/ |
H A D | README-PROVIDERS.md | 9 - [The Null Provider](#the-null-provider) 77 The null provider is "built-in" to libcrypto and contains no algorithm 79 automatically loaded, the null provider can be loaded instead.
|
/openssl/util/perl/OpenSSL/ |
H A D | Test.pm | 1279 my $null = devnull(); 1280 my $fileornull = sub { $_[0] ? $_[0] : $null; }; 1293 $stderr=" 2> ".$null
|
/openssl/include/openssl/ |
H A D | ct.h.in | 350 * If "pp" is not NULL and "*pp" is null, function will allocate a new pointer 377 * If "pp" is not NULL and "*pp" is null, function will allocate a new pointer 402 * If |out| is null, no SCT will be output but the length will still be returned. 403 * If |out| points to a null pointer, a string will be allocated to hold the 413 * If |psct| is not null, it will end up pointing to the parsed SCT. If it 414 * already points to a non-null pointer, the pointer will be free'd.
|
/openssl/test/recipes/30-test_evp_data/ |
H A D | evppkey_rsa_common.txt | 626 # positive test case with null padded ciphertext 631 # positive test case with null truncated ciphertext 636 # positive test case with double null padded ciphertext 641 # positive test case with double null truncated ciphertext 751 # a positive test case with null padded ciphertext 756 # a positive test case with null truncated ciphertext 761 # a positive test case with double null padded ciphertext 766 # a positive test case with double null truncated ciphertext 824 # an otherwise valid plaintext, but with null separator missing
|
/openssl/crypto/ |
H A D | README-sparse_array.md | 48 index 0 results in the allocation of a top level node full of null pointers
|
/openssl/.github/workflows/ |
H A D | compiler-zoo.yml | 105 sudo tee /usr/share/keyrings/llvm-snapshot.gpg.key > /dev/null
|
Completed in 38 milliseconds
12