/openssl/providers/common/der/ |
H A D | oids_to_c.pm | 72 my $input = File::Spec->catfile($opts{dir}, $file); 73 open my $fh, $input or die "Reading $input: $!\n";
|
/openssl/ssl/record/methods/ |
H A D | ssl3_meth.c | 140 memset(&rec->input[rec->length], 0, i); in ssl3_cipher() 142 rec->input[l - 1] = (unsigned char)(i - 1); in ssl3_cipher() 156 if (!EVP_CipherUpdate(ds, rec->data, &outlen, rec->input, in ssl3_cipher() 180 if (EVP_Cipher(ds, rec->data, rec->input, (unsigned int)l) < 1) { in ssl3_cipher() 272 header, rec->input, in ssl3_mac() 294 || EVP_DigestUpdate(md_ctx, rec->input, rec->length) <= 0 in ssl3_mac()
|
/openssl/doc/man1/ |
H A D | openssl-pkeyutl.pod.in | 61 This specifies the input filename to read data from or standard input 66 This indicates that the input data is raw data, which is not hashed by any 96 The input key, by default it should be a private key. 119 By default a private key is read from the key input. 125 The input is a certificate containing a public key. 129 Reverse the order of the input buffer. This is useful for some libraries 139 Verify the input data (which must be a hash) against the signature file and 144 Verify the input data (which must be a hash) and output the recovered data. 148 Encrypt the input data using a public key. 152 Decrypt the input data using a private key. [all …]
|
H A D | openssl-rsautl.pod.in | 51 This specifies the input filename to read data from or standard input 61 Reverse the order of the input. 70 The input key, by default it should be an RSA private key. 79 By default a private key is read from the key input. 81 If the input contains no public key but a private key, its public part is used. 85 The input is a certificate containing an RSA public key. 89 Sign the input data and output the signed result. This requires 94 Verify the input data and output the recovered data. 98 Encrypt the input data using an RSA public key. 102 Decrypt the input data using an RSA private key.
|
H A D | openssl-dsaparam.pod.in | 43 The DSA parameters input format; unspecified by default. 56 This specifies the input filename to read parameters from or standard input if 64 as the input filename. 96 size I<numbits>. If this argument is included then the input file (if any) is 103 this argument is included then the input file (if any) is ignored.
|
H A D | openssl-dsa.pod.in | 61 The key input format; unspecified by default. 77 This specifies the input filename to read a key from or standard input if this 85 prompted for. The output filename should B<not> be the same as the input 90 The password source for the input and output file. 118 By default, a private key is read from the input. 120 If the input contains no public key but a private key, its public part is used. 125 key will be output instead. This option is automatically set if the input is
|
H A D | openssl-pkey.pod.in | 72 This specifies the input to read a key from 73 or standard input if this option is not specified. 74 If the key input is encrypted and B<-passin> is not given 79 The key input format; unspecified by default. 84 The password source for the key input. 91 By default a private key is read from the input. 93 If the input contains no public key but a private key, its public part is used. 107 The output filename should B<not> be the same as the input filename. 137 This option is automatically set if the input is a public key.
|
H A D | openssl-rsa.pod.in | 63 The key input format; unspecified by default. 78 This specifies the input to read a key from or standard input if this 84 The password source for the input and output file. 92 will be prompted for. The output filename should B<not> be the same as the input 124 By default a private key is read from the input. 126 If the input contains no public key but a private key, its public part is used. 132 the input is a public key.
|
H A D | openssl-dhparam.pod.in | 47 The input format and output format; the default is B<PEM>. 53 This specifies the input filename to read parameters from or standard input if 60 as the input filename. 81 input file is ignored and parameters are generated instead. If not 89 the input file is ignored and parameters are generated instead. If
|
H A D | openssl-passphrase-options.pod | 17 and B<-passout> for input and output passwords respectively. These allow 54 arguments, the first line will be used for the input password, and the next 67 Reads the password from standard input. The same line handling as described for 68 B<file:> applies to passwords read from standard input.
|
H A D | openssl-ec.pod.in | 54 The key input format; unspecified by default. 67 This specifies the input to read a key from or standard input if this 75 prompted for. The output filename should B<not> be the same as the input 80 The password source for the input and output file. 109 By default a private key is read from the input. 111 If the input contains no public key but a private key, its public part is used. 116 key will be output instead. This option is automatically set if the input is
|
H A D | openssl-crl2pkcs7.pod.in | 36 The input format of the CRL; the default is B<PEM>. 46 This specifies the input filename to read a CRL from or standard input if this 64 included in the output file and a CRL is not read from the input file.
|
H A D | openssl-nseq.pod.in | 39 This specifies the input filename to read or standard input if this 48 Normally a Netscape certificate sequence will be input and the output
|
H A D | openssl-pkcs12.pod.in | 25 PKCS#12 input (parsing) options: 89 PKCS#12 input are relevant only when the B<-export> option is not given. 137 and so the input is just verified. 162 =head2 PKCS#12 input (parsing) options 168 This specifies the input filename or URI. 169 Standard input is used by default. 246 This specifies the input filename or URI. 247 Standard input is used by default. 256 The private key input for PKCS12 output. 270 The password source for certificate input such as B<-certfile> [all …]
|
H A D | openssl-pkcs7.pod.in | 43 The input and formats; the default is B<PEM>. 50 This specifies the input filename to read from or standard input if this
|
H A D | openssl-enc.pod.in | 76 The input filename, standard input by default. 89 Encrypt the input data: this is the default. 93 Decrypt the input data. 99 the input data is base64 decoded before being decrypted. 103 on decoding a newline is expected among the first 1024 bytes of input. 218 Use NULL cipher (no encryption or decryption of input). 318 Consequently, the input data size must be less than 320 The '*-wrap' ciphers require the input to be a multiple of 8 bytes long, 322 The '*-wrap-pad' ciphers allow any input length. 473 if the first 1024 bytes of input do not include a newline character [all …]
|
/openssl/test/ |
H A D | poly1305_internal_test.c | 25 SIZED_DATA input; member 1510 const unsigned char *in = test.input.data; in test_poly1305() 1511 size_t inlen = test.input.size; in test_poly1305()
|
/openssl/doc/man7/ |
H A D | provider-decoder.pod | 111 from PEM input should be named "DER". 117 =item input 119 This property is used to specify what format of input the implementation 124 OpenSSL providers recognize the following input types: 130 An implementation with that input type decodes PEM formatted data. 134 An implementation with that input type decodes DER formatted data. 138 An implementation with that input type decodes MSBLOB formatted data. 142 An implementation with that input type decodes PVK formatted data. 174 very well specify input types and structures that libcrypto doesn't know 230 if relevant, should determine what the input data should contain. [all …]
|
/openssl/doc/man3/ |
H A D | EVP_PKEY_sign.pod | 55 This function enables using algorithms that can process input of arbitrary 61 limit on the total size of the input. See L</NOTES> below for a deeper 95 Some signature implementations only accumulate the input data and do no 104 digest as input, while ED25519 can be expected to process the input with a hash, 118 signature algorithm with a hash algorithm to process the input. In other 151 Sign data using RSA with PKCS#1 padding and a SHA256 digest as input: 196 input digest is assumed to have been computed using SHA256. 246 /* in is the input in this example. */ 248 /* inlen is the length of the input in this example. */ 291 /* in is the input in this example. */ [all …]
|
H A D | PEM_read_bio_ex.pod | 20 PEM_read_bio_ex() reads in PEM formatted data from an input BIO, outputting 28 input are allocated from the secure heap. 35 characters (or newlines); non-base64 characters are treated as end of input.
|
/openssl/crypto/des/ |
H A D | ecb3_enc.c | 18 void DES_ecb3_encrypt(const_DES_cblock *input, DES_cblock *output, in DES_ecb3_encrypt() argument 24 const unsigned char *in = &(*input)[0]; in DES_ecb3_encrypt()
|
H A D | ecb_enc.c | 36 void DES_ecb_encrypt(const_DES_cblock *input, DES_cblock *output, in DES_ecb_encrypt() argument 41 const unsigned char *in = &(*input)[0]; in DES_ecb_encrypt()
|
H A D | qud_cksm.c | 34 DES_LONG DES_quad_cksum(const unsigned char *input, DES_cblock output[], in DES_quad_cksum() argument 53 cp = input; in DES_quad_cksum()
|
H A D | pcbc_enc.c | 18 void DES_pcbc_encrypt(const unsigned char *input, unsigned char *output, in DES_pcbc_encrypt() argument 27 in = input; in DES_pcbc_encrypt()
|
/openssl/test/recipes/ |
H A D | 80-test_cms.t | 1008 my $input = srctop_file("test", "smcont.bin"); 1015 "-binary", "-in", $input, "-out", $signed])), 1020 is(compare($input, $verified), 0, "binary input retained with -binary"); 1023 "-in", $input, "-out", $signed.".nobin"])), 1028 is(compare($input, $verified.".nobin"), 1, "binary input not retained without -binary"); 1035 "-binary", "-in", $input, "-out", $signed.".crlf"])), 1040 is(compare($input, $verified.".crlf"), 0,
|