/openssl/doc/man3/ |
H A D | SSL_new.pod | 19 of the underlying context B<ctx>: connection method,
|
H A D | SSL_CONF_cmd.pod | 253 Attempts to use B<file> as the certificate for the appropriate context. It 261 Attempts to use B<file> as the private key for the appropriate context. This 269 the appropriate context. This option is only supported if certificate 323 context. It currently uses SSL_CTX_use_certificate_chain_file() if an B<SSL_CTX> 331 context. This option is only supported if certificate operations 357 the appropriate context. This option is only supported if certificate
|
H A D | ASYNC_WAIT_CTX_new.pod | 127 descriptor is too costly in terms of CPU cycles or in some context where a file 133 and nonblocking as it will be run in the context of a polling mechanism or an
|
H A D | PKCS12_key_gen_utf8_ex.pod | 97 Functions ending in _ex() allow for a library context I<ctx> and property query
|
H A D | OPENSSL_ia32cap.pod | 64 For example, in 32-bit application context clearing bit #26 at run-time
|
H A D | SSL_CTX_set_info_callback.pod | 52 The B<where> argument specifies information about where (in which context)
|
H A D | OSSL_ENCODER.pod | 85 implementations by all activated providers in the library context
|
H A D | UI_new.pod | 76 All the functions work through a context of the type UI. This context
|
H A D | OSSL_CMP_exec_certreq.pod | 102 OSSL_CMP_try_certreq() remembers in the CMP context that it should be retried 230 See OSSL_CMP_CTX for examples on how to prepare the context for these
|
H A D | SSL_CTX_set1_cert_comp_preference.pod | 96 compressed on-demand as unique context data from the server is compressed along
|
H A D | SSL_CTX_use_psk_identity_hint.pod | 60 to set the given B<NUL>-terminated PSK identity hint B<hint> for SSL context
|
H A D | EVP_PKEY_CTX_set_hkdf_md.pod | 98 A context for HKDF can be obtained by calling:
|
H A D | OSSL_CMP_MSG_get0_header.pod | 51 from various information provided in the CMP context argument I<ctx>
|
H A D | SSL_CTX_set_generate_session_id.pod | 31 of the parent context of B<ssl>.
|
H A D | X509_LOOKUP_meth_new.pod | 147 the X509_LOOKUP context, the type of the X509_OBJECT being requested, parameters
|
H A D | d2i_X509.pod | 423 context on the decoded structure this way (see the B<EXAMPLES> section). 571 Setting up a library context and property query:
|
H A D | PKCS12_create.pod | 41 PKCS12_create_ex() is identical to PKCS12_create() but allows for a library context
|
/openssl/crypto/err/ |
H A D | openssl.txt | 20 ASN1_R_CONTEXT_NOT_INITIALISED:217:context not initialised 128 ASYNC_R_FAILED_TO_SWAP_CONTEXT:102:failed to swap context 388 CMS_R_UNABLE_TO_FINALIZE_CONTEXT:147:unable to finalize context 797 EVP_R_UNABLE_TO_LOCK_CONTEXT:211:unable to lock context 1307 attempt to reuse session in different context 1371 SSL_R_CONTEXT_NOT_DANE_ENABLED:167:context not dane enabled 1435 SSL_R_INVALID_CONTEXT:282:invalid context 1549 SSL_R_SESSION_ID_CONTEXT_UNINITIALIZED:277:session id context uninitialized 1586 SSL_R_SSL_SESSION_ID_CONTEXT_TOO_LONG:273:ssl session id context too long
|
/openssl/ssl/statem/ |
H A D | statem_clnt.c | 1464 unsigned int context; in tls_process_server_hello() local 1577 context = SSL_CONNECTION_IS_TLS13(s) ? SSL_EXT_TLS1_3_SERVER_HELLO in tls_process_server_hello() 1579 if (!tls_validate_all_contexts(s, context, extensions)) { in tls_process_server_hello() 1745 if (!tls_parse_all_extensions(s, context, extensions, NULL, 0, 1)) { in tls_process_server_hello() 1970 unsigned int context = 0; in tls_process_server_certificate() local 1986 if ((SSL_CONNECTION_IS_TLS13(s) && !PACKET_get_1(pkt, &context)) in tls_process_server_certificate() 1987 || context != 0 in tls_process_server_certificate()
|
/openssl/doc/man7/ |
H A D | EVP_KDF-SCRYPT.pod | 73 A context for scrypt can be obtained by calling:
|
/openssl/test/ |
H A D | hpke_test.c | 62 const unsigned char *context; member 222 export[i].context, -1))) in do_testhpke() 226 export[i].context, in do_testhpke()
|
H A D | evp_kdf_test.c | 1451 static unsigned char context[] = { in test_kdf_kbkdf_kmac() local 1573 context, sizeof(context)); in test_kdf_kbkdf_kmac()
|
/openssl/doc/internal/man3/ |
H A D | evp_generic_fetch.pod | 217 void *provctx; /* corresponding provider context */
|
H A D | ossl_rcu_lock_new.pod | 69 parameter references the library context in which the lock is allocated.
|
/openssl/crypto/ec/ |
H A D | curve25519.c | 5441 const uint8_t *context, in hash_init_with_dom() argument 5466 || !EVP_DigestUpdate(hash_ctx, context, context_len)) { in hash_init_with_dom() 5477 const uint8_t *context, size_t context_len, in ossl_ed25519_sign() argument 5489 if (context == NULL) in ossl_ed25519_sign() 5512 if (!hash_init_with_dom(hash_ctx, sha512, dom2flag, phflag, context, context_len) in ossl_ed25519_sign() 5522 if (!hash_init_with_dom(hash_ctx, sha512, dom2flag, phflag, context, context_len) in ossl_ed25519_sign() 5547 const uint8_t *context, size_t context_len, in ossl_ed25519_verify() argument 5566 if (context == NULL) in ossl_ed25519_verify() 5621 if (!hash_init_with_dom(hash_ctx, sha512, dom2flag, phflag, context, context_len) in ossl_ed25519_verify()
|