Home
last modified time | relevance | path

Searched refs:from (Results 76 – 100 of 784) sorted by relevance

12345678910>>...32

/openssl/doc/man3/
H A DRSA_public_encrypt.pod15 int RSA_public_encrypt(int flen, const unsigned char *from,
18 int RSA_private_decrypt(int flen, const unsigned char *from,
28 RSA_public_encrypt() encrypts the B<flen> bytes at B<from> (usually a
64 B<to> and B<from> may overlap.
66 RSA_private_decrypt() decrypts the B<flen> bytes at B<from> using the
76 B<to> and B<from> may overlap.
H A DSSL_read.pod6 - read bytes from a TLS/SSL connection
20 SSL_read_ex() and SSL_read() try to read B<num> bytes from the specified B<ssl>
25 respectively except no bytes are actually removed from the underlying BIO during
57 packets from the transport layer before the record is complete and the read call
94 receiving new data from the underlying socket.
107 Success means that 1 or more application data bytes have been read from the SSL
109 Failure means that no bytes could be read from the SSL connection.
122 The return value is the number of bytes actually read from the TLS/SSL
H A DOSSL_DECODER_CTX.pod89 the output from one can become the input for another. This allows having
108 that the caller knows how to handle from the current decoding result.
113 There are some functions to extract data from this type, described further
178 The B<OSSL_DECODER_INSTANCE> for the decoder from which the constructor gets
199 implementation from a decoder instance I<decoder_inst>.
202 implementation's provider context from a decoder instance I<decoder_inst>.
205 implementation's input type from a decoder instance I<decoder_inst>.
208 structure for the decoder implementation from a decoder instance
H A DCMS_uncompress.pod15 CMS_uncompress() extracts and uncompresses the content from a CMS
33 from the content. If the content is not of type B<text/plain> then an error is
39 be obtained from ERR_get_error(3)
H A DX509_ACERT_add1_attr.pod32 type I<type> constructed using I<len> bytes from I<bytes>.
35 ASN1 type I<type> constructed using I<len> bytes from I<bytes>.
37 X509_ACERT_delete_attr() will delete the I<loc>th attribute from I<x> and
H A DSSL_get_SSL_CTX.pod5 SSL_get_SSL_CTX - get the SSL_CTX from which an SSL is created
15 SSL_get_SSL_CTX() returns a pointer to the SSL_CTX object, from which
H A DX509_STORE_add_cert.pod99 B<X509_STORE> from a given file. The library context I<libctx> and property
100 query I<propq> are used when fetching algorithms from providers.
106 B<X509_STORE> from a given directory path.
111 B<X509_STORE> from a store at a given URI. The library context I<libctx> and
112 property query I<propq> are used when fetching algorithms from providers.
128 it loads certificates into the B<X509_STORE> from the hardcoded default
130 fetching algorithms from providers.
H A DOPENSSL_gmtime.pod16 const struct tm *from, const struct tm *to);
25 OPENSSL_gmtime_diff() calculates the difference between I<from> and I<to>.
38 structures I<from> and I<to>. The difference in days is placed into I<*pday>,
H A DPKCS7_get_octet_string.pod5 PKCS7_get_octet_string - return octet string from a PKCS#7 envelopedData structure
15 PKCS7_get_octet_string() returns a pointer to an ASN1 octet string from a
H A DBIO_s_mem.pod43 remaining data from the datagram will be discarded.
49 true). A datagram mem BIO will never return true from L<BIO_eof(3)>.
51 Any data written to a memory BIO can be recalled by reading from it.
52 Unless the memory BIO is read only any data read from it is deleted from
98 made available from a static area of memory in the form of a BIO. The
99 supplied data is read directly from the supplied buffer: it is B<not> copied
122 Switching a memory BIO from read write to read only is not supported and
177 Extract the BUF_MEM structure from a memory BIO and then free up the BIO:
H A DSSL_CTX_use_certificate.pod59 created from B<ctx> with L<SSL_new(3)> by copying, so that
73 SSL_CTX_use_certificate_ASN1() loads the ASN1 encoded certificate from
79 from the known types SSL_FILETYPE_PEM, SSL_FILETYPE_ASN1.
80 SSL_use_certificate_file() loads the certificate from B<file> into B<ssl>.
84 SSL_CTX_use_certificate_chain_file() loads a certificate chain from
125 from the known types SSL_FILETYPE_PEM, SSL_FILETYPE_ASN1.
145 When reading certificates and private keys from file, files of type
167 The private keys loaded from file can be encrypted. In order to successfully
171 (Certificate files might be encrypted as well from the technical point
H A DEVP_PKEY_ASN1_METHOD.pod42 int EVP_PKEY_asn1_add_alias(int to, int from);
74 const EVP_PKEY *from),
166 encode B<X509_PUBKEY> ASN.1 parameters to / from B<pk>.
186 encode B<PKCS8_PRIV_KEY_INFO> form private key to / from B<pk>.
209 int (*param_copy) (EVP_PKEY *to, const EVP_PKEY *from);
215 encode DER formatted parameters to / from B<pk>.
224 The param_copy() method copies key parameters from B<from> to B<to>.
269 they private key B<pkey> from / to a DER formatted array.
369 The export_to() method exports the key material from the given key to
390 EVP_PKEY_asn1_copy() copies an B<EVP_PKEY_ASN1_METHOD> object from
[all …]
H A DOSSL_ERR_STATE_save.pod20 These functions save and restore the error state from the thread
32 to I<es> and removed from the thread error state. However, the most recent
42 OSSL_ERR_STATE_restore() adds all the error entries from the
62 over any allocated data from the thread error state.
H A DPKCS12_get_friendlyname.pod5 PKCS12_get_friendlyname - Retrieve the friendlyname attribute from a PKCS#12 safeBag
18 I<bag> is the B<PKCS12_SAFEBAG> to retrieve the attribute from.
H A DSSL_CTX_set0_CA_list.pod45 For TLS versions 1.2 and earlier the list of CA names is only sent from the
47 names set is never sent from client to server and the list of CA names retrieved
81 SSL_get_client_CA_list returns the list of client CAs sent from the server, if
84 SSL_CTX_add_client_CA() adds the CA name extracted from B<cacert> to the
88 SSL_add_client_CA() adds the CA name extracted from B<cacert> to the
118 B<s> or if none are set the list from the parent B<SSL_CTX> is retrieved. The
121 SSL_CTX_add1_to_CA_list() appends the CA subject name extracted from B<x> to the
124 SSL_add1_to_CA_list() appends the CA subject name extracted from B<x> to the
H A DPEM_read_bio_ex.pod20 PEM_read_bio_ex() reads in PEM formatted data from an input BIO, outputting
28 input are allocated from the secure heap.
31 and control characters from the end of each line, so as to be compatible with
/openssl/Configurations/
H A DREADME.md26 have config targets that shadow config targets from other files.
30 inherit_from => Other targets to inherit values from.
254 data from. These are resolved recursively.
360 differs from the source tree.
387 they are built from:
512 a source file from some input.
528 expected to be the file to generate from.
619 executable file from object files.
635 script file from some input.
644 resulting script from.
[all …]
/openssl/doc/man7/
H A Dossl-guide-tls-introduction.pod18 the information exchanged is protected (i.e. it prevents eavesdroppers from
20 the information exchanged to prevent an attacker from changing it. Finally it
25 Layer). OpenSSL dates from a time when the SSL name was still in common use and
88 client can verify the signature using the public key from the certificate. If
124 but the server will request a certificate from the client. The client sends the
159 If you have built your version of OpenSSL from source, or obtained it from some
210 "read" data from it to receive data from the server.
214 object and then create multiple connections (i.e. B<SSL> objects) from it.
216 all the B<SSL> object created from it inherit the same configuration options.
225 is used for sending or receiving data from the underlying transport layer. For
[all …]
H A Dossl-guide-tls-client-non-block.pod28 until data is available to read if you attempt to read from it when there is no
51 exact details on how to do this can differ from one platform to another.
133 =head2 Handling errors from OpenSSL I/O functions
139 from the underlying socket but the data has not yet arrived from the peer).
149 from the socket but was unable to. Note that a call to L<SSL_read_ex(3)> or
169 In our demo application we will write a function to handle these errors from
195 * information about it from SSL_get_verify_result().
208 connection, as well as the return code from the I/O function that failed. In
282 Reading a response back from the server is similar:
316 response when trying to read data from the server. This will occur when the
[all …]
H A Dx509.pod17 found in the X.509 document from ITU-T, or in RFC3280 from PKIX.
21 A related structure is a certificate request, defined in PKCS#10 from
/openssl/.github/workflows/
H A Dprov-compat-label.yml82 - name: show module versions from release
161 - name: show module versions from branch
237 - name: set up cross validation of FIPS from A with tree from B
244 - name: show module versions from cross validation
262 - name: run cross validation tests of FIPS from A with tree from B
/openssl/doc/man1/
H A Dopenssl-verify.pod.in42 This option can be specified more than once to include CRLs from multiple
52 successful). Certificates in the chain that came from the untrusted list will be
64 This option can be specified more than once to load certificates from multiple
70 This option can be specified more than once to load certificates from multiple
102 given, this command will attempt to read a single certificate from standard
/openssl/demos/
H A DREADME.txt23 EVP_MD_demo.c Compute a digest from multiple buffers
24 EVP_MD_stdin.c Compute a digest with data read from stdin
34 guide: Sample code from the OpenSSL Guide tutorials. See
75 rsa_pss_direct.c Compute and verify an RSA-PSS signature from a hash
/openssl/providers/common/der/
H A Dwrap.asn19 -- Taken from RFC 3370, Section 4.3.1 Triple-DES Key Wrap
17 -- Taken from RFC 3394, Section 3. Object Identifiers
/openssl/
H A DNOTES-DJGPP.md15 All of these can be obtained from the usual DJGPP mirror sites or
20 OpenSSL. This can be obtained from <http://www.watt-32.net/>.
46 obtained from <http://www.rahul.net/dkaufman/index.html>.

Completed in 41 milliseconds

12345678910>>...32