/openssl/doc/man3/ |
H A D | BIO_f_base64.pod | 5 BIO_f_base64 - base64 BIO filter 18 BIO_f_base64() returns the base64 BIO method. This is a filter 19 BIO that base64 encodes any data written through it and decodes 39 Decoding stops when base64 padding is encountered, a soft end-of-input 42 (e.g. due to input characters other than valid base64 or whitespace). 50 BIO_flush() on a base64 BIO that is being written through is 61 Because of the format of base64 encoding the end of the encoded 66 BIO_f_base64() returns the base64 BIO method. 84 Read base64 encoded data from standard input and write the decoded 104 character when it occurs at the start of a base64 group of 4 encoded [all …]
|
H A D | EVP_EncodeInit.pod | 8 EVP_DecodeBlock - EVP base64 encode/decode routines 32 The EVP encode routines provide a high-level interface to base64 encoding and 36 bytes of binary data provided 4 bytes of base64 encoded data will be produced 49 For each 48 byte input block encoded 64 bytes of base64 data 105 to 80 base64 characters at a time. 115 0 to indicate that the end of the base64 input has been detected. 122 If any invalid base64 characters are encountered or if the base64 padding 127 ended with base64 padding (B<=>), or that the next 4 byte group starts with the 141 EVP_DecodeBlock() will decode the block of B<n> characters of base64 data 146 After trimming the data in B<f> MUST consist entirely of valid base64 [all …]
|
H A D | PEM_read_bio_ex.pod | 22 the possibly encrypted data, and the binary data payload (after base64 decoding). 34 If PEM_FLAG_ONLY_B64 is set, all characters are required to be valid base64 35 characters (or newlines); non-base64 characters are treated as end of input.
|
H A D | BIO_push.pod | 55 I<b64> is a base64 BIO and I<f> is a file BIO. 67 by I<md1> and I<md2>, base64 encoded, and finally written to I<f>. 70 direction, that is data is read from I<f>, base64 decoded,
|
H A D | SRP_VBASE_new.pod | 50 flag base64(verifier) base64(salt) username gNid userinfo(optional) 52 Note that the base64 encoding used here is non-standard so it is recommended
|
H A D | CTLOG_STORE_new.pod | 47 key = <base64-encoded DER SubjectPublicKeyInfo here> 51 key = <base64-encoded DER SubjectPublicKeyInfo here>
|
H A D | SCT_new.pod | 143 The LogID (see RFC 6962, Section 3.2), base64 encoded. 157 The SCT extensions, base64 encoded. 161 The SCT signature, base64 encoded.
|
H A D | CTLOG_new.pod | 41 public key in base64-encoded DER form and sets the ct_log pointer to point to 42 the new CTLOG. The base64 will be decoded and the public key parsed. The CTLOG
|
H A D | PEM_read.pod | 34 RFC 1421. The content is a series of base64-encoded lines, surrounded 59 are returned in B<header> and the base64-decoded content and its length are
|
H A D | SMIME_write_CMS.pod | 47 SMIME_write_CMS() always base64 encodes CMS structures, there should be an
|
H A D | SMIME_write_PKCS7.pod | 48 SMIME_write_PKCS7() always base64 encodes PKCS#7 structures, there
|
H A D | SMIME_read_PKCS7.pod | 55 The parser assumes that the PKCS7 structure is always base64
|
H A D | SMIME_read_CMS.pod | 57 The parser assumes that the CMS_ContentInfo structure is always base64 encoded
|
H A D | SRP_create_verifier.pod | 58 all numeric parameters are in a non-standard base64 encoding originally designed
|
H A D | SSL_CTX_load_verify_locations.pod | 70 ... (CA certificate in base64 encoding) ...
|
H A D | PEM_read_bio_PrivateKey.pod | 209 this sense PEM format is simply base64 encoded data surrounded 421 ...base64 encoded data... 429 the base64-encoded encrypted data.
|
/openssl/crypto/evp/ |
H A D | bio_b64.c | 41 EVP_ENCODE_CTX *base64; member 75 ctx->base64 = EVP_ENCODE_CTX_new(); in b64_new() 76 if (ctx->base64 == NULL) { in b64_new() 98 EVP_ENCODE_CTX_free(ctx->base64); in b64_free() 136 EVP_DecodeInit(ctx->base64); in b64_read() 182 EVP_DecodeInit(ctx->base64); in b64_read() 222 EVP_DecodeInit(ctx->base64); in b64_read() 279 i = EVP_DecodeUpdate(ctx->base64, ctx->buf, &ctx->buf_len, in b64_read() 337 EVP_EncodeInit(ctx->base64); in b64_write() 463 && EVP_ENCODE_CTX_num(ctx->base64) != 0) in b64_ctrl() [all …]
|
/openssl/apps/ |
H A D | enc.c | 134 int base64 = 0, informat = FORMAT_BINARY, outformat = FORMAT_BINARY; in enc_main() local 156 base64 = 1; in enc_main() 237 base64 = 1; in enc_main() 350 if (base64 && bsize < 80) in enc_main() 357 base64 = 0; in enc_main() 360 base64 = 0; in enc_main() 362 base64 = 0; in enc_main() 364 if (base64) { in enc_main() 482 if (base64) { in enc_main()
|
/openssl/doc/man1/ |
H A D | openssl-rand.pod.in | 13 [B<-base64>] 50 =item B<-base64> 52 Perform base64 encoding on the output.
|
H A D | openssl-enc.pod.in | 21 [B<-base64>] 98 the data is base64 encoded after encryption. If decryption is set then 99 the input data is base64 decoded before being decrypted. 105 =item B<-base64> 111 If the B<-a> option is set then base64 encoding produces output without any 112 newline character, and base64 decoding does not require any newlines. 326 base64 Base 64 435 Just base64 encode a binary file: 437 openssl base64 -in file.bin -out file.b64 441 openssl base64 -d -in file.b64 -out file.bin [all …]
|
/openssl/.github/workflows/ |
H A D | static-analysis-on-prem.yml | 24 run: echo ${{ secrets.COVERITY_LICENSE }} | base64 -d > /opt/coverity-analysis/bin/license.dat 27 echo ${{ secrets.COVERITY_AUTH_KEY }} | base64 -d > /auth_key_file.txt
|
/openssl/test/recipes/80-test_cms_data/ |
H A D | ciphertext_from_1_1_1.cms | 4 Content-Transfer-Encoding: base64
|
/openssl/test/smime-eml/ |
H A D | SignedInvalidMappingFromanyPolicyTest7.eml | 16 Content-Transfer-Encoding: base64
|
/openssl/util/ |
H A D | check-format-test-negatives.c | 93 EVP_EncodeFinal(ctx->base64, in f()
|
/openssl/doc/man7/ |
H A D | evp.pod | 66 L<B<EVP_Decode>I<XXX>|EVP_EncodeInit(3)> functions implement base64 encoding
|