/openssl/test/ |
H A D | pemtest.c | 18 const char *raw; member 40 const char *raw = b64_pem_data[idx].raw; in test_b64() local 51 || !TEST_int_eq(len, strlen(raw)) in test_b64() 52 || !TEST_int_eq(memcmp(data, raw, strlen(raw)), 0)) in test_b64()
|
H A D | punycode_test.c | 20 unsigned int raw[50]; member 163 for (i = 0; i < OSSL_NELEM(tc->raw); i++) in test_punycode() 164 if (tc->raw[i] == 0) in test_punycode() 167 tc->raw, i * sizeof(*tc->raw))) in test_punycode()
|
H A D | bio_base64_test.c | 188 unsigned char *raw; in test_bio_base64_run() local 202 raw = OPENSSL_zalloc(t->bytes); in test_bio_base64_run() 204 raw = genbytes(t->bytes); in test_bio_base64_run() 206 if (raw == NULL && t->bytes > 0) { in test_bio_base64_run() 214 OPENSSL_free(raw); in test_bio_base64_run() 219 elen = genb64(t->prefix, t->suffix, raw, t->bytes, t->trunc, t->encoded, in test_bio_base64_run() 222 OPENSSL_free(raw); in test_bio_base64_run() 297 || (n > 0 && memcmp(raw, out, n) != 0)) { in test_bio_base64_run() 304 OPENSSL_free(raw); in test_bio_base64_run()
|
/openssl/doc/man3/ |
H A D | SSL_get0_peer_rpk.pod | 9 SSL_SESSION_get0_peer_rpk - raw public key (RFC7250) support 32 SSL_get0_peer_rpk() returns the peer's raw public key from SSL B<s>. 34 SSL_SESSION_get0_peer_rpk() returns the peer's raw public key from 46 When raw public keys are used, the certificate verify callback is called, and 52 The raw public key is typically taken from the certificate assigned to the 67 SSL_get0_peer_rpk() and SSL_SESSION_get0_peer_rpk() return the peer's raw 68 public key as an EVP_PKEY or NULL when the raw public key is not available.
|
H A D | EVP_PKEY_new.pod | 18 - public/private key allocation and raw key handling functions 88 a raw key, otherwise the duplication will fail. 97 string for a public key algorithm that supports raw private keys, i.e one of 98 "X25519", "ED25519", "X448" or "ED448". I<key> points to the raw private key 109 algorithm that supports raw private keys, i.e. one of B<EVP_PKEY_X25519>, 119 EVP_PKEY_new_raw_private_key_ex() except that I<key> points to the raw 121 private key information. Algorithm types that support raw public keys are 127 information. Algorithm types that support raw public keys are 133 EVP_PKEY_get_raw_private_key() fills the buffer provided by I<priv> with raw 143 EVP_PKEY_get_raw_public_key() fills the buffer provided by I<pub> with raw [all …]
|
H A D | SSL_set1_server_cert_type.pod | 79 Which corresponds to a raw public key. 105 To use raw public keys on the server, set up the SSL_CTX and SSL as follows: 121 /* A certificate does not need to be specified when using raw public keys */ 162 /* The server's raw public key matched the TLSA record */ 165 * The server's raw public key, or public key in certificate, did not 171 * server's raw public key. This would not happen in this example, 178 To validate client raw public keys, code from the client example may need to be
|
H A D | BIO_ADDR.pod | 70 BIO_ADDR_rawaddress() will write the raw address of the given 72 and will set B<*l> to be the amount of bytes the raw address 75 with B<p> set to B<NULL>. The raw address will be in network byte 82 BIO_ADDR_rawport() returns the raw port of the given B<BIO_ADDR>. 83 The raw port will be in network byte order.
|
H A D | X509_verify_cert.pod | 62 When the verification target is a raw public key, rather than a certificate, 63 both functions validate the target raw public key. 65 The raw public key can be authenticated only via DANE TLSA records, either
|
H A D | X509_ACERT_print_ex.pod | 35 to the specification, only the raw value is printed. 67 attributes are printed as raw string data. ASN1 encoded values are
|
H A D | SSL_get_shared_sigalgs.pod | 25 sign and hash NID to B<*psignhash>. The raw signature and hash values 64 The raw values correspond to the on the wire form as defined by RFC5246 et al.
|
H A D | X509_STORE_CTX_new.pod | 109 operation for the I<target> raw public key. 111 The I<target> raw public key can also be supplied separately, via 126 X509_STORE_CTX_set0_rpk() sets the target raw public key to be verified in I<ctx> 127 to I<target>, a non-NULL raw public key preempts any target certificate, which 140 I<ctx> that contains the raw public key.
|
H A D | DSA_do_sign.pod | 5 DSA_do_sign, DSA_do_verify - raw DSA signature operations
|
H A D | EVP_PKEY_fromdata.pod | 106 =head2 Creating an RSA keypair using raw key data 139 =head2 Creating an ECC keypair using raw key data
|
H A D | X509_STORE_CTX_get_error.pod | 71 certificate being verified by the I<ctx>. It may be NULL if a raw public 465 =item B<X509_V_ERR_RPK_UNTRUSTED: raw public key untrusted, no trusted keys configured> 467 No TLS records were configured to validate the raw public key, or DANE was not
|
/openssl/crypto/pem/ |
H A D | pem_info.c | 65 unsigned int i, raw, ptype; in STACK_OF() local 79 raw = 0; in STACK_OF() 147 raw = 1; in STACK_OF() 154 if (!raw) { in STACK_OF()
|
/openssl/doc/man1/ |
H A D | openssl-rsautl.pod.in | 27 [B<-raw>] 104 =item B<-pkcs>, B<-oaep>, B<-x931>, B<-raw> 108 For signatures, only B<-pkcs> and B<-raw> can be used. 112 Use B<-raw> and inspect the returned value manually to check if the 150 Examine the raw signed data: 152 openssl rsautl -verify -in sig -inkey key.pem -raw -hexdump
|
/openssl/doc/man7/ |
H A D | ossl_store-file.pod | 35 loaded in raw form in its entirety and passed to the available file 41 represented as an ASN.1 OCTET STRING. In raw form, it's not easily
|
H A D | EVP_PKEY-HMAC.pod | 58 a new provider side key object is created with the supplied raw key value. This
|
/openssl/test/recipes/75-test_quicapi_data/ |
H A D | ssltraceref-zlib.txt | 98 Ack delay (raw) 0 274 Ack delay (raw) 0 279 Ack delay (raw) 0
|
H A D | ssltraceref.txt | 96 Ack delay (raw) 0 272 Ack delay (raw) 0 277 Ack delay (raw) 0
|
/openssl/doc/HOWTO/ |
H A D | certificates.txt | 88 was kind enough, your certificate is a raw DER thing in PEM format. 100 In the case of a raw DER thing in PEM format, and assuming that's all
|
/openssl/ssl/statem/ |
H A D | extensions_srvr.c | 730 PACKET cookie, raw, chhash, appcookie; in tls_parse_ctos_cookie() local 750 raw = cookie; in tls_parse_ctos_cookie() 751 data = PACKET_data(&raw); in tls_parse_ctos_cookie() 752 rawlen = PACKET_remaining(&raw); in tls_parse_ctos_cookie() 754 || !PACKET_forward(&raw, rawlen - SHA256_DIGEST_LENGTH)) { in tls_parse_ctos_cookie() 758 mdin = PACKET_data(&raw); in tls_parse_ctos_cookie()
|
/openssl/doc/man5/ |
H A D | x509v3_config.pod | 35 raw 95 The syntax of raw extensions is defined by the source code that parses 97 See L</Certificate Policies> for an example of a raw extension. 427 This is a I<raw> extension that supports all of the defined fields of the 579 It is also possible to use the word DER to include the raw encoded data in any
|
/openssl/test/recipes/04-test_pem_reading_data/ |
H A D | dsa-threecolumn.pem | 114 raw
|
/openssl/demos/ |
H A D | README.txt | 69 EVP_PKEY_DSA_paramfromdata.c Load a DSA param key using raw data.
|