/openssl/doc/man3/ |
H A D | RSA_public_encrypt.pod | 15 int RSA_public_encrypt(int flen, const unsigned char *from, 18 int RSA_private_decrypt(int flen, const unsigned char *from, 28 RSA_public_encrypt() encrypts the B<flen> bytes at B<from> (usually a 64 B<to> and B<from> may overlap. 66 RSA_private_decrypt() decrypts the B<flen> bytes at B<from> using the 76 B<to> and B<from> may overlap.
|
H A D | SSL_read.pod | 6 - read bytes from a TLS/SSL connection 20 SSL_read_ex() and SSL_read() try to read B<num> bytes from the specified B<ssl> 25 respectively except no bytes are actually removed from the underlying BIO during 57 packets from the transport layer before the record is complete and the read call 94 receiving new data from the underlying socket. 107 Success means that 1 or more application data bytes have been read from the SSL 109 Failure means that no bytes could be read from the SSL connection. 122 The return value is the number of bytes actually read from the TLS/SSL
|
H A D | OSSL_DECODER_CTX.pod | 89 the output from one can become the input for another. This allows having 108 that the caller knows how to handle from the current decoding result. 113 There are some functions to extract data from this type, described further 178 The B<OSSL_DECODER_INSTANCE> for the decoder from which the constructor gets 199 implementation from a decoder instance I<decoder_inst>. 202 implementation's provider context from a decoder instance I<decoder_inst>. 205 implementation's input type from a decoder instance I<decoder_inst>. 208 structure for the decoder implementation from a decoder instance
|
H A D | CMS_uncompress.pod | 15 CMS_uncompress() extracts and uncompresses the content from a CMS 33 from the content. If the content is not of type B<text/plain> then an error is 39 be obtained from ERR_get_error(3)
|
H A D | X509_ACERT_add1_attr.pod | 32 type I<type> constructed using I<len> bytes from I<bytes>. 35 ASN1 type I<type> constructed using I<len> bytes from I<bytes>. 37 X509_ACERT_delete_attr() will delete the I<loc>th attribute from I<x> and
|
H A D | SSL_get_SSL_CTX.pod | 5 SSL_get_SSL_CTX - get the SSL_CTX from which an SSL is created 15 SSL_get_SSL_CTX() returns a pointer to the SSL_CTX object, from which
|
H A D | X509_STORE_add_cert.pod | 99 B<X509_STORE> from a given file. The library context I<libctx> and property 100 query I<propq> are used when fetching algorithms from providers. 106 B<X509_STORE> from a given directory path. 111 B<X509_STORE> from a store at a given URI. The library context I<libctx> and 112 property query I<propq> are used when fetching algorithms from providers. 128 it loads certificates into the B<X509_STORE> from the hardcoded default 130 fetching algorithms from providers.
|
H A D | OPENSSL_gmtime.pod | 16 const struct tm *from, const struct tm *to); 25 OPENSSL_gmtime_diff() calculates the difference between I<from> and I<to>. 38 structures I<from> and I<to>. The difference in days is placed into I<*pday>,
|
H A D | PKCS7_get_octet_string.pod | 5 PKCS7_get_octet_string - return octet string from a PKCS#7 envelopedData structure 15 PKCS7_get_octet_string() returns a pointer to an ASN1 octet string from a
|
H A D | BIO_s_mem.pod | 43 remaining data from the datagram will be discarded. 49 true). A datagram mem BIO will never return true from L<BIO_eof(3)>. 51 Any data written to a memory BIO can be recalled by reading from it. 52 Unless the memory BIO is read only any data read from it is deleted from 98 made available from a static area of memory in the form of a BIO. The 99 supplied data is read directly from the supplied buffer: it is B<not> copied 122 Switching a memory BIO from read write to read only is not supported and 177 Extract the BUF_MEM structure from a memory BIO and then free up the BIO:
|
H A D | SSL_CTX_use_certificate.pod | 59 created from B<ctx> with L<SSL_new(3)> by copying, so that 73 SSL_CTX_use_certificate_ASN1() loads the ASN1 encoded certificate from 79 from the known types SSL_FILETYPE_PEM, SSL_FILETYPE_ASN1. 80 SSL_use_certificate_file() loads the certificate from B<file> into B<ssl>. 84 SSL_CTX_use_certificate_chain_file() loads a certificate chain from 125 from the known types SSL_FILETYPE_PEM, SSL_FILETYPE_ASN1. 145 When reading certificates and private keys from file, files of type 167 The private keys loaded from file can be encrypted. In order to successfully 171 (Certificate files might be encrypted as well from the technical point
|
H A D | EVP_PKEY_ASN1_METHOD.pod | 42 int EVP_PKEY_asn1_add_alias(int to, int from); 74 const EVP_PKEY *from), 166 encode B<X509_PUBKEY> ASN.1 parameters to / from B<pk>. 186 encode B<PKCS8_PRIV_KEY_INFO> form private key to / from B<pk>. 209 int (*param_copy) (EVP_PKEY *to, const EVP_PKEY *from); 215 encode DER formatted parameters to / from B<pk>. 224 The param_copy() method copies key parameters from B<from> to B<to>. 269 they private key B<pkey> from / to a DER formatted array. 369 The export_to() method exports the key material from the given key to 390 EVP_PKEY_asn1_copy() copies an B<EVP_PKEY_ASN1_METHOD> object from [all …]
|
H A D | OSSL_ERR_STATE_save.pod | 20 These functions save and restore the error state from the thread 32 to I<es> and removed from the thread error state. However, the most recent 42 OSSL_ERR_STATE_restore() adds all the error entries from the 62 over any allocated data from the thread error state.
|
H A D | PKCS12_get_friendlyname.pod | 5 PKCS12_get_friendlyname - Retrieve the friendlyname attribute from a PKCS#12 safeBag 18 I<bag> is the B<PKCS12_SAFEBAG> to retrieve the attribute from.
|
H A D | SSL_CTX_set0_CA_list.pod | 45 For TLS versions 1.2 and earlier the list of CA names is only sent from the 47 names set is never sent from client to server and the list of CA names retrieved 81 SSL_get_client_CA_list returns the list of client CAs sent from the server, if 84 SSL_CTX_add_client_CA() adds the CA name extracted from B<cacert> to the 88 SSL_add_client_CA() adds the CA name extracted from B<cacert> to the 118 B<s> or if none are set the list from the parent B<SSL_CTX> is retrieved. The 121 SSL_CTX_add1_to_CA_list() appends the CA subject name extracted from B<x> to the 124 SSL_add1_to_CA_list() appends the CA subject name extracted from B<x> to the
|
H A D | PEM_read_bio_ex.pod | 20 PEM_read_bio_ex() reads in PEM formatted data from an input BIO, outputting 28 input are allocated from the secure heap. 31 and control characters from the end of each line, so as to be compatible with
|
/openssl/Configurations/ |
H A D | README.md | 26 have config targets that shadow config targets from other files. 30 inherit_from => Other targets to inherit values from. 254 data from. These are resolved recursively. 360 differs from the source tree. 387 they are built from: 512 a source file from some input. 528 expected to be the file to generate from. 619 executable file from object files. 635 script file from some input. 644 resulting script from. [all …]
|
/openssl/doc/man7/ |
H A D | ossl-guide-tls-introduction.pod | 18 the information exchanged is protected (i.e. it prevents eavesdroppers from 20 the information exchanged to prevent an attacker from changing it. Finally it 25 Layer). OpenSSL dates from a time when the SSL name was still in common use and 88 client can verify the signature using the public key from the certificate. If 124 but the server will request a certificate from the client. The client sends the 159 If you have built your version of OpenSSL from source, or obtained it from some 210 "read" data from it to receive data from the server. 214 object and then create multiple connections (i.e. B<SSL> objects) from it. 216 all the B<SSL> object created from it inherit the same configuration options. 225 is used for sending or receiving data from the underlying transport layer. For [all …]
|
H A D | ossl-guide-tls-client-non-block.pod | 28 until data is available to read if you attempt to read from it when there is no 51 exact details on how to do this can differ from one platform to another. 133 =head2 Handling errors from OpenSSL I/O functions 139 from the underlying socket but the data has not yet arrived from the peer). 149 from the socket but was unable to. Note that a call to L<SSL_read_ex(3)> or 169 In our demo application we will write a function to handle these errors from 195 * information about it from SSL_get_verify_result(). 208 connection, as well as the return code from the I/O function that failed. In 282 Reading a response back from the server is similar: 316 response when trying to read data from the server. This will occur when the [all …]
|
H A D | x509.pod | 17 found in the X.509 document from ITU-T, or in RFC3280 from PKIX. 21 A related structure is a certificate request, defined in PKCS#10 from
|
/openssl/.github/workflows/ |
H A D | prov-compat-label.yml | 82 - name: show module versions from release 161 - name: show module versions from branch 237 - name: set up cross validation of FIPS from A with tree from B 244 - name: show module versions from cross validation 262 - name: run cross validation tests of FIPS from A with tree from B
|
/openssl/doc/man1/ |
H A D | openssl-verify.pod.in | 42 This option can be specified more than once to include CRLs from multiple 52 successful). Certificates in the chain that came from the untrusted list will be 64 This option can be specified more than once to load certificates from multiple 70 This option can be specified more than once to load certificates from multiple 102 given, this command will attempt to read a single certificate from standard
|
/openssl/demos/ |
H A D | README.txt | 23 EVP_MD_demo.c Compute a digest from multiple buffers 24 EVP_MD_stdin.c Compute a digest with data read from stdin 34 guide: Sample code from the OpenSSL Guide tutorials. See 75 rsa_pss_direct.c Compute and verify an RSA-PSS signature from a hash
|
/openssl/providers/common/der/ |
H A D | wrap.asn1 | 9 -- Taken from RFC 3370, Section 4.3.1 Triple-DES Key Wrap 17 -- Taken from RFC 3394, Section 3. Object Identifiers
|
/openssl/ |
H A D | NOTES-DJGPP.md | 15 All of these can be obtained from the usual DJGPP mirror sites or 20 OpenSSL. This can be obtained from <http://www.watt-32.net/>. 46 obtained from <http://www.rahul.net/dkaufman/index.html>.
|