/openssl/test/ |
H A D | endecoder_legacy_test.c | 74 const char *structure[2]; member 305 const char *structure) in test_protected_PEM() argument 438 const char *structure) in test_DER() argument 533 const char *structure = test_stanza->structure[i]; in test_key() local 553 const char *structure = test_stanza->structure[i]; in test_key() local 571 const char *structure = test_stanza->structure[i]; in test_key() local 593 test_stanza->keytype, structure); in test_key() 608 const char *structure = test_stanza->structure[i]; in test_key() local 628 const char *structure = test_stanza->structure[i]; in test_key() local 646 const char *structure = test_stanza->structure[i]; in test_key() local [all …]
|
/openssl/doc/man3/ |
H A D | PKCS7_sign_add_signer.pod | 6 PKCS7_add_certificate, PKCS7_add_crl - add information to PKCS7 structure 20 key I<pkey> using message digest I<md> to a PKCS7 signed data structure I<p7>. 22 The B<PKCS7> structure should be obtained from an initial call to PKCS7_sign() 24 signed data structure. 29 Unless the B<PKCS7_REUSE_DIGEST> flag is set the returned B<PKCS7> structure 37 signed data structure where the simpler PKCS7_sign() function defaults are 45 digest value from the B<PKCS7> structure: to add a signer to an existing structure. 60 The signedData structure includes several PKCS#7 authenticatedAttributes 71 structure just added, which can be used to set additional attributes 81 PKCS7_add_crl() adds the CRL I<crl> to the B<PKCS7> structure I<p7>. [all …]
|
H A D | CMS_get0_RecipientInfos.pod | 46 structures associated with a CMS EnvelopedData structure. 58 CMS_RecipientInfo structure B<ri>, which must be of type CMS_RECIPINFO_TRANS. 62 the CMS_RecipientInfo structure B<ri>, which must be of type 83 parameters against the B<keyIdentifier> CMS_RecipientInfo structure B<ri>, 88 B<keylen> with the CMS_RecipientInfo structure B<ri>, which must be of type 91 CMS_RecipientInfo_decrypt() attempts to decrypt CMS_RecipientInfo structure 92 B<ri> in structure B<cms>. A key must have been associated with the structure 95 CMS_RecipientInfo_encrypt() attempts to encrypt CMS_RecipientInfo structure 96 B<ri> in structure B<cms>. A key must have been associated with the structure 111 any appropriate means it can then associated with the structure and [all …]
|
H A D | CMS_add1_signer.pod | 21 structure B<cms>. 23 The CMS_ContentInfo structure should be obtained from an initial call to 25 valid CMS_ContentInfo SignedData structure. 31 structure is not complete and must be finalized either by streaming (if 44 CMS_SignerInfo structure and the CMS attribute utility functions or the 53 The returned CMS_ContentInfo structure will be valid and finalized when this 57 CMS_SignerInfo structure will not be finalized so additional attributes 62 CMS_ContentInfo structure, the signer's certificate must still be supplied in 67 The SignedData structure includes several CMS signedAttributes including the 85 structure just added, this can be used to set additional attributes [all …]
|
H A D | d2i_RSAPrivateKey.pod | 137 key parameters organized in a type specific structure. 143 B<I<TYPE>> data into a type specific DER encoded structure. 155 structure defined by PKCS#1. 182 outermost structure instead of the type specific structure, and that 200 I<selection> and I<structure> as follows: 207 const char *structure = "type-specific"; 212 const char *structure = "type-specific"; 217 const char *structure = "type-specific"; 222 const char *structure = "SubjectPublicKeyInfo"; 258 empty structure such as that returned by TYPE_new(). [all …]
|
H A D | ASN1_aux_cb.pod | 18 int enc_offset; /* Offset of ASN1_ENCODING structure */ 45 additional information about the ASN.1 structure. An B<ASN1_AUX> structure is 52 An B<ASN1_AUX> structure contains the following information. 78 offset into the B<ASN1_VALUE> structure where a B<CRYPTO_REF_COUNT> may be 84 offset into the B<ASN1_VALUE> structure where a B<CRYPTO_RWLOCK> may be 165 B<ASN1_PRINT_ARG> structure (see below). 171 B<ASN1_PRINT_ARG> structure (see below). 177 structure (see below). 183 structure (see below). 189 B<ASN1_STREAM_ARG> structure (see below). [all …]
|
H A D | CMS_add1_recipient_cert.pod | 5 … CMS_add1_recipient_cert, CMS_add0_recipient_key - add recipients to a CMS enveloped data structure 33 data structure B<cms> as a KeyTransRecipientInfo structure. 38 data structure B<cms> as a KEKRecipientInfo structure. 40 The CMS_ContentInfo structure should be obtained from an initial call to 46 enveloped data structure where the simpler CMS_encrypt() function defaults are 49 CMS_RecipientInfo structure and the CMS attribute utility functions. 64 pointer to the CMS_RecipientInfo structure just added or NULL if an error
|
H A D | PKCS7_sign.pod | 6 - create a PKCS#7 signedData structure 20 PKCS7_sign_ex() creates and returns a PKCS#7 signedData structure. 23 in the PKCS#7 structure (for example any intermediate CAs in the chain). 39 will not be included in the PKCS7 structure. 44 The data being signed is included in the PKCS7 structure, unless 54 The signedData structure includes several PKCS#7 authenticatedAttributes 64 If the flags B<PKCS7_STREAM> is set then the returned B<PKCS7> structure is 75 finalize the B<PKCS7> structure will give unpredictable results. 88 called to finalize the structure if streaming is not enabled. Alternative 92 PKCS#7 structure is output. [all …]
|
H A D | CMS_encrypt.pod | 5 CMS_encrypt_ex, CMS_encrypt - create a CMS envelopedData structure 20 AuthEnvelopedData structure. I<certs> is a list of recipient certificates. 33 its parameters. If the cipher mode is GCM, then an AuthEnvelopedData structure 34 containing MAC is used. Otherwise an EnvelopedData structure is used. Currently 58 If the B<CMS_STREAM> flag is set a partial B<CMS_ContentInfo> structure is 61 If the B<CMS_PARTIAL> flag is set a partial B<CMS_ContentInfo> structure is 65 The data being encrypted is included in the CMS_ContentInfo structure, unless 69 If the flag B<CMS_STREAM> is set the returned B<CMS_ContentInfo> structure is 71 properly finalize the B<CMS_ContentInfo> structure will give unpredictable 80 structure. KEKRecipientInfo is also supported using the flag B<CMS_PARTIAL> [all …]
|
H A D | CMS_compress.pod | 5 CMS_compress - create a CMS CompressedData structure 15 CMS_compress() creates and returns a CMS CompressedData structure. B<comp_nid> 35 If the B<CMS_STREAM> flag is set a partial B<CMS_ContentInfo> structure is 38 The compressed data is included in the CMS_ContentInfo structure, unless 42 If the flag B<CMS_STREAM> is set the returned B<CMS_ContentInfo> structure is 44 properly finalize the B<CMS_ContentInfo> structure will give unpredictable 48 PEM_write_bio_CMS_stream() finalize the structure. Alternatively finalization 57 CMS_compress() returns either a CMS_ContentInfo structure or NULL if an error
|
H A D | SSL_new.pod | 5 SSL_dup, SSL_new, SSL_up_ref - create an SSL structure for a connection 17 SSL_new() creates a new B<SSL> structure which is needed to hold the 18 data for a TLS/SSL connection. The new structure inherits the settings 20 options, verification settings, timeout settings. An B<SSL> structure is 21 reference counted. Creating an B<SSL> structure for the first time increments 24 structure are freed. 27 existing B<SSL> structure. 29 The function SSL_dup() creates and returns a new B<SSL> structure from the same 110 The creation of a new SSL structure failed. Check the error stack to 113 =item Pointer to an SSL structure [all …]
|
H A D | ASN1_TIME_set.pod | 74 functions set the time structure I<s> to the time represented 78 seconds in a day. If I<s> is NULL a new structure is allocated 101 functions check the syntax of the time structure I<s>. 121 converting I<s> to I<tm> structure. 149 The B<ASN1_TIME> structure corresponds to the ASN.1 structure B<Time> 174 of the return structure. 199 a pointer to a time structure or NULL if an error occurred. 208 if the structure is syntactically correct and 0 otherwise. 218 passed-in time structure has invalid syntax, for example. 228 structure on success or NULL if an error occurred. [all …]
|
H A D | CMAC_CTX.pod | 54 The B<CMAC_CTX> type is a structure used for the provision of CMAC 57 CMAC_CTX_new() creates a new B<CMAC_CTX> structure and returns a pointer to it. 59 CMAC_CTX_cleanup() resets the B<CMAC_CTX> structure, clearing any internal data 60 but not freeing the structure itself. 62 CMAC_CTX_free() frees the B<CMAC_CTX> structure and any associated resources. 66 structure within the B<CMAC_CTX>. 68 CMAC_CTX_copy() copies the state from one B<CMAC_CTX> structure to another. 70 CMAC_Init() initializes the B<CMAC_CTX> structure for a new CMAC calculation 90 CMAC_CTX_new() returns a pointer to a new B<CMAC_CTX> structure or NULL if 94 B<EVP_CIPHER_CTX> structure, or NULL if an error occurs.
|
H A D | PKCS12_init.pod | 5 PKCS12_init, PKCS12_init_ex - Create a new empty PKCS#12 structure 16 PKCS12_init() creates an empty PKCS#12 structure. Any PKCS#7 authSafes added 17 to this structure are enclosed first within a single PKCS#7 contentInfo 20 PKCS12_init_ex() creates an empty PKCS#12 structure and assigns the supplied 26 PKCS12_init() and PKCS12_init_ex() return a valid B<PKCS12> structure or NULL
|
H A D | ASN1_OBJECT_new.pod | 17 B<ASN1_OBJECT> structure, which represents an ASN1 OBJECT IDENTIFIER. 19 ASN1_OBJECT_new() allocates and initializes an B<ASN1_OBJECT> structure. 21 ASN1_OBJECT_free() frees up the B<ASN1_OBJECT> structure I<a>. 26 Although ASN1_OBJECT_new() allocates a new B<ASN1_OBJECT> structure it 34 Otherwise it returns a pointer to the newly allocated structure.
|
H A D | CMS_sign.pod | 5 CMS_sign, CMS_sign_ex - create a CMS SignedData structure 20 CMS_sign_ex() creates and returns a CMS SignedData structure. 23 in the CMS structure (for example any intermediate CAs in the chain). The 45 CMS_ContentInfo structure, the signer's certificate must still be supplied in 50 The data being signed is included in the CMS_ContentInfo structure, unless 60 The SignedData structure includes several CMS signedAttributes including the 79 structure is just initialized ready to perform the signing operation. The 84 If the B<CMS_PARTIAL> flag is set a partial B<CMS_ContentInfo> structure is 90 properly finalize the B<CMS_ContentInfo> structure will give unpredictable 110 structure if streaming is not enabled. [all …]
|
H A D | OCSP_REQUEST_new.pod | 29 OCSP_REQUEST_new() allocates and returns an empty B<OCSP_REQUEST> structure. 31 OCSP_REQUEST_free() frees up the request structure B<req>. 35 the B<OCSP_ONEREQ> structure added so an application can add additional 56 OCSP_REQUEST_new() returns an empty B<OCSP_REQUEST> structure or B<NULL> if 59 OCSP_request_add0_id() returns the B<OCSP_ONEREQ> structure containing B<cid> 68 OCSP_request_onereq_get0() returns a pointer to an B<OCSP_ONEREQ> structure 73 An OCSP request structure contains one or more B<OCSP_ONEREQ> structures 81 Create an B<OCSP_REQUEST> structure for certificate B<cert> with issuer
|
H A D | d2i_X509.pod | 465 the encoding of the structure I<a> to BIO I<bp> and it 469 the encoding of the structure I<a> to FILE pointer I<fp> and it 485 empty structure such as that returned by TYPE_new(). 490 of the encoded structure. 496 usage of ASN1 functions: after one structure is encoded or decoded 509 Represents a PKCS#3 DH parameters structure. 513 Represents an ANSI X9.42 DH parameters structure. 554 Allocate and encode the DER encoding of an X509 structure: 653 then the encoded structure may contain invalid data or omit the 658 Any function which encodes a structure (B<i2d_I<TYPE>>(), [all …]
|
H A D | PBMAC1_get1_pbkdf2_param.pod | 6 MAC structure 16 PBMAC1_get1_pbkdf2_param() retrieves a B<PBKDF2PARAM> structure from an 17 I<X509_ALGOR> structure. 23 B<PBKDF2PARAM> structure otherwise.
|
H A D | ASN1_TYPE_get.pod | 23 These functions allow an B<ASN1_TYPE> structure to be manipulated. The 24 B<ASN1_TYPE> structure can contain any ASN.1 type or constructed type 39 I<t> using the ASN.1 structure I<it>. If successful it returns a pointer 40 to the ASN.1 structure corresponding to I<it> which must be freed by the 43 ASN1_TYPE_pack_sequence() attempts to encode the ASN.1 structure I<s> 56 B<V_ASN1_OBJECT> then value is an B<ASN1_OBJECT> structure. Otherwise I<type> 57 is and B<ASN1_STRING> structure. If I<type> corresponds to a primitive type 86 ASN1_TYPE_unpack_sequence() returns a pointer to an ASN.1 structure or 89 ASN1_TYPE_pack_sequence() return an B<ASN1_TYPE> structure if it succeeds or
|
H A D | CMS_get0_type.pod | 18 CMS_get0_type() returns the content type of a CMS_ContentInfo structure as 20 CMS_ContentInfo structure based on this value. 23 structure. It should be called with CMS functions (such as L<CMS_sign(3)>, 26 flag and B<before> the structure is finalised, otherwise the results are 59 access, modify or create the embedded content in a B<CMS_ContentInfo> structure 65 CMS_get0_type() and CMS_get0_eContentType() return an ASN1_OBJECT structure.
|
H A D | s2i_ASN1_IA5STRING.pod | 47 "internal" (that is, an internal C structure) and string respectively. 60 B<ASN1_IA5STRING> structure or NULL if an error occurs. 66 structure or NULL if an error occurs. 72 B<ASN1_OCTET_STRING> structure or NULL if an error occurs. 78 structure or NULL if an error occurs. 81 B<ASN1_UTF8STRING> structure or NULL if an error occurs.
|
H A D | PKCS7_encrypt.pod | 6 - create a PKCS#7 envelopedData structure 20 PKCS7_encrypt_ex() creates and returns a PKCS#7 envelopedData structure. 56 If the B<PKCS7_STREAM> flag is set a partial B<PKCS7> structure is output 59 If the flag B<PKCS7_STREAM> is set the returned B<PKCS7> structure is B<not> 61 properly finalize the B<PKCS7> structure will give unpredictable 65 PEM_write_bio_PKCS7_stream() finalize the structure. Alternatively finalization 74 PKCS7_encrypt_ex() and PKCS7_encrypt() return either a PKCS7 structure
|
H A D | X509_PUBKEY_new.pod | 53 The B<X509_PUBKEY> structure represents the ASN.1 B<SubjectPublicKeyInfo> 54 structure defined in RFC5280 and used in certificates and certificate requests. 56 X509_PUBKEY_new_ex() allocates and initializes an B<X509_PUBKEY> structure 68 X509_PUBKEY_free() frees up B<X509_PUBKEY> structure I<a>. If I<a> is NULL 72 in the B<EVP_PKEY> structure I<pkey>. If I<*x> is not NULL any existing 73 public key structure will be freed. 82 d2i_PUBKEY_ex() decodes an B<EVP_PKEY> structure using B<SubjectPublicKeyInfo> 89 i2d_PUBKEY() encodes an B<EVP_PKEY> structure using B<SubjectPublicKeyInfo> 107 algorithm parameters is set to I<type> using the structure I<pval>. 136 Otherwise they return a pointer to the newly allocated structure. [all …]
|
/openssl/doc/man1/ |
H A D | openssl-crl2pkcs7.pod.in | 6 openssl-crl2pkcs7 - Create a PKCS#7 structure from a CRL and certificates 24 only" structure. 51 Specifies the output filename to write the PKCS#7 structure to or standard 57 All certificates in the file will be added to the PKCS#7 structure. This 72 Create a PKCS#7 structure from a certificate and CRL: 76 Creates a PKCS#7 structure in DER format with no CRL from several 84 The output file is a PKCS#7 signed data structure containing no signers and
|