Searched refs:after (Results 1 – 25 of 237) sorted by relevance
12345678910
/openssl/util/ |
H A D | fix-deprecation | 67 my $after = $'; 87 $after = $'; # Different from the previous! 111 $headertext = $after;
|
/openssl/Configurations/ |
H A D | gentemplate.pm | 114 my @after = ( @_ ); 115 print STDERR "DEBUG[expanddepends]> ", join(' ', @after), "\n" 118 while (@after) { 119 my $item = shift @after; 131 !grep { $extlessx eq extensionlesslib($_) } @after) { 144 print STDERR "DEBUG[expanddepends]/ ", join(' ', @after), "\n"
|
/openssl/doc/man3/ |
H A D | X509_get_pubkey.pod | 29 after use. X509_get0_pubkey() is similar except it does B<not> increment 31 after use. 35 must not be freed up after use. 38 B<pkey>. The key B<pkey> should be freed up after use.
|
H A D | X509_get0_notBefore.pod | 33 returned is an internal pointer which must not be freed up after 44 be freed up after the call. 48 returned is an internal pointer which must not be freed up after 54 B<tm> is not transferred by these functions so it must be freed up after the
|
H A D | X509_CRL_get0_by_serial.pod | 36 after the call. 52 freed after use. 56 freed after use. 59 pointer I<rev> is used internally so it B<MUST NOT> be freed after the call:
|
H A D | BIO_set_callback.pod | 73 the callback is called twice, once before and once after the actual 141 after. 160 after. 179 after. 197 after. 215 after. 232 BIO_debug_callback() returns 1 or B<ret> if it's called after specific BIO
|
H A D | ASN1_aux_cb.pod | 125 after an B<ASN1_VALUE> object has been allocated. The allocated object is in 139 immediately after B<ASN1_VALUE> sub-structures are freed. 149 immediately after a "d2i" operation for the B<ASN1_VALUE>. 159 immediately after a "i2d" operation for the B<ASN1_VALUE>. 170 after printing the B<ASN1_VALUE>. The I<exarg> argument will be a pointer to an 181 Invoked immediately after streaming the B<ASN1_VALUE> data using indefinite 193 Invoked immediately after processing the B<ASN1_VALUE> data as a "detached" 204 Invoked immediate after to an ASN1_VALUE has been duplicated via a call to
|
H A D | X509_cmp_time.pod | 33 I<offset_day> and I<offset_sec> after I<in_tm>. 36 I<offset_sec> after I<in_tm>. This method can only handle second 50 I<offset_sec> after the current time. It is equivalent to calling
|
H A D | X509_get_serialNumber.pod | 22 returned is an internal pointer which B<MUST NOT> be freed up after the call. 29 be freed up after use.
|
H A D | X509_new.pod | 47 certificates after calling X509_free() on all its elements. 52 used by several different operations each of which will free it up after 57 but it serves a similar purpose: the returned chain persists after the
|
H A D | SSL_CTX_sess_set_get_cb.pod | 69 Note that in TLSv1.3, sessions are established after the main 71 information and this may occur some time after the end of the handshake (or not 73 function to be invoked during the handshake (for <= TLSv1.2) or after the 80 L<SSL_CTX_remove_session(3)> after a session has been used.
|
H A D | EVP_VerifyInit.pod | 68 be cleaned up after use by calling EVP_MD_CTX_free() or a memory leak 74 EVP_VerifyUpdate() could not be made after calling EVP_VerifyFinal(). 78 combination) will not be indicated until after potentially large amounts of
|
H A D | SSL_CTX_set_tlsext_servername_callback.pod | 88 =item On the client, during or after the handshake and a TLSv1.2 (or below) 97 =item On the client, during or after the handshake and a TLSv1.2 (or below) 107 =item On the server, after the servername extension has been processed and a 113 =item On the server, after the servername extension has been processed and a 122 client is processed. The servername, certificate and ALPN callbacks occur after
|
H A D | OSSL_PARAM_BLD.pod | 61 OSSL_PARAM_BLD_free() can safely be called any time after this function is. 89 must exist until after OSSL_PARAM_BLD_to_param() has been called. 101 must exist until after OSSL_PARAM_BLD_to_param() has been called. 108 scope until after OSSL_PARAM_BLD_to_param() has been called. 113 scope until after OSSL_PARAM_BLD_to_param() has been called.
|
H A D | PKCS12_item_decrypt_d2i.pod | 37 buffer will zeroed after the decrypt. 42 the buffer containing the input encoding will be zeroed after the encrypt.
|
H A D | SSL_CTX_set_num_tickets.pod | 26 the client after a full handshake. Set the desired value (which could be 0) in 45 To issue tickets after other events (such as application-layer changes), 48 sent in this manner after the initial handshake has completed, and only for
|
H A D | SSL_get_certificate.pod | 41 will depend on whether that callback is made before or after certificate 45 L<SSL_CTX_set_tlsext_status_cb(3)>. This callback occurs after certificate
|
H A D | X509_PUBKEY_new.pod | 71 value is an internal pointer which B<MUST NOT> be freed after use. 75 EVP_PKEY_free() after use. 104 so they must not be freed after the call. 111 retrieved pointers are internal and must not be freed after the
|
H A D | EVP_SignInit.pod | 73 be cleaned up after use by calling EVP_MD_CTX_free() or a memory leak 79 EVP_SignUpdate() could not be made after calling EVP_SignFinal(). 83 combination) will not be indicated until after potentially large amounts of
|
H A D | BN_BLINDING_new.pod | 50 the B<A> and B<Ai> or, after specific number of uses and if the 78 automatic update of the B<BN_BLINDING> parameters after each use 80 of the B<BN_BLINDING> parameters after a fixed number of uses (currently
|
/openssl/util/perl/OpenSSL/ |
H A D | ParseC.pm | 668 my $after = $5; 670 if ($before ne "" || $after ne ";") { 671 if ($after =~ m|^\w|) { $after = " ".$after; } 672 return ("$before$word $name$after;",
|
/openssl/doc/man7/ |
H A D | EVP_MD-SHA1.pod | 32 It is only set after all handshake messages have already been digested via 37 The next call after setting this parameter should be OP_digest_final().
|
H A D | EVP_MD-MD5-SHA1.pod | 34 It is only set after all handshake messages have already been digested via 39 The next call after setting this parameter should be OP_digest_final().
|
H A D | EVP_KDF-HKDF.pod | 56 The derived key returned will be the result after the expand operation. The 67 up by calling EVP_KDF_CTX_get_kdf_size() after setting the mode and digest. 97 after setting the mode and digest on the B<EVP_KDF_CTX>.
|
/openssl/doc/ |
H A D | openssl-c-indent.el | 42 (substatement-open before after) ; From "gnu" style
|
Completed in 46 milliseconds
12345678910