Searched refs:names (Results 76 – 100 of 236) sorted by relevance
12345678910
/openssl/doc/man3/ |
H A D | EVP_MAC.pod | 230 with multiple names, only one of them is returned; it's 233 EVP_MAC_names_do_all() traverses all names for I<mac>, and calls 244 OpenSSL has a set of macros for parameter names it expects to see in 249 The standard parameter names are: 258 must be set first, see parameter names "algorithm" below. 347 The usage of the parameter names "custom", "iv" and "salt" correspond to 348 the names used in the standard where the algorithm was defined. 364 EVP_MAC_names_do_all() returns 1 if the callback was called for all names. A 365 return value of 0 means that the callback was not called for any names.
|
H A D | OSSL_DECODER.pod | 81 OSSL_DECODER_names_do_all() traverses all names for the given 124 names. A return value of 0 means that the callback was not called for any names.
|
H A D | X509_cmp.pod | 46 issuer names and subject names of the X<509> objects, or issuers of B<X509_CRL>
|
H A D | EVP_KDF.pod | 171 with multiple names, only one of them is returned; it's 174 EVP_KDF_names_do_all() traverses all names for I<kdf>, and calls 183 The standard parameter names are: 283 EVP_KDF_names_do_all() returns 1 if the callback was called for all names. A 284 return value of 0 means that the callback was not called for any names.
|
H A D | EVP_PKEY_get_size.pod | 83 were renamed to include C<get> in their names in OpenSSL 3.0, respectively. 84 The old names are kept as non-deprecated alias macros.
|
H A D | OSSL_CMP_ITAV_set0.pod | 53 of type B<certProfile> that includes the optionally given list of profile names. 58 list of certificate profile names contained in the infoValue field of I<itav>.
|
H A D | X509_get_subject_name.pod | 11 get X509_NAME hashes or get and set issuer or subject names 74 or issuer names of certificate requests of CRLs respectively.
|
H A D | SSL_set1_host.pod | 33 that can match the peer's certificate. Any previous names set via 35 if B<name> is NULL or empty. When multiple names are configured,
|
H A D | EVP_PKEY_CTX_new.pod | 39 further about the possible names in L</NOTES> below. 93 These are names like "RSA", "DSA", and what's available depends on what
|
H A D | SSL_CTX_set_cipher_list.pod | 39 ciphersuite names in order of preference. Valid TLSv1.3 ciphersuite names are:
|
H A D | OBJ_nid2obj.pod | 54 code should treat all returned values -- OIDs, NIDs, or names -- as 69 If I<no_name> is 0 then long names and short names will be interpreted
|
/openssl/ |
H A D | NOTES-POSIX.md | 10 the function names are prefixed with an underscore, and where some POSIX
|
/openssl/test/ |
H A D | README.ssltest.md | 21 First, give your test a name. The names do not have to be unique. 106 * ExpectedClientCANames - for client auth list of CA names the server must 108 is a file of certificates whose subject names form the list. 110 * ExpectedServerCANames - list of CA names the client must send, TLS 1.3 only. 112 of certificates whose subject names form the list.
|
/openssl/doc/man7/ |
H A D | EVP_SIGNATURE-DSA.pod | 20 In this list, names are grouped together to signify that they are the same 21 algorithm having multiple names. This also includes the OID in canonical
|
H A D | EVP_MD-RIPEMD160.pod | 14 identified with any of the names "RIPEMD-160", "RIPEMD160", "RIPEMD" and
|
H A D | provider.pod | 102 Operations are referred to with numbers, via macros with names 210 Algorithm names are case insensitive. Any particular algorithm can have multiple 228 use alternative names or names that OpenSSL has used historically.
|
H A D | EVP_MD-SHA1.pod | 14 default provider, and is identified with the names "SHA1" and "SHA-1".
|
/openssl/doc/man5/ |
H A D | x509v3_config.pod | 44 is a comma-separated list of names and values: 131 Key usage is a multi-valued extension consisting of a list of names of 147 The following text names, and their intended meaning, are known: 297 alternative names from the issuer certificate, if possible. 388 points extension. The following names have meaning: 411 The value for each of these names is a boolean. 481 This is a multi-valued extension which consisting of the names 529 The supported names are: B<status_request> and B<status_request_v2>.
|
/openssl/apps/ |
H A D | rehash.c | 32 # pragma names save 33 # pragma names as_is,shortened 39 # pragma names restore
|
/openssl/test/helpers/ |
H A D | handshake.c | 1440 const STACK_OF(X509_NAME) *names; in do_handshake_internal() 1720 names = SSL_get0_peer_CA_list(client.ssl); in do_handshake_internal() 1721 if (names == NULL) in do_handshake_internal() 1724 ret->client_ca_names = SSL_dup_CA_list(names); in do_handshake_internal() 1726 names = SSL_get0_peer_CA_list(server.ssl); in do_handshake_internal() 1727 if (names == NULL) in do_handshake_internal() 1730 ret->server_ca_names = SSL_dup_CA_list(names); in do_handshake_internal()
|
/openssl/test/ssl-tests/ |
H A D | 26-tls13_client_auth.cnf.in | 91 name => "client-auth-TLSv1.3-require-non-empty-names", 193 name => "client-auth-TLSv1.3-require-non-empty-names-post-handshake",
|
H A D | 04-client_auth.cnf.in | 217 # Successful handshake with client authentication non-empty names 219 name => "client-auth-${protocol_name}-require-non-empty-names"
|
/openssl/demos/bio/ |
H A D | descrip.mms | 1 # This build description trusts that the following logical names are defined:
|
/openssl/crypto/rsa/ |
H A D | rsa_backend.c | 39 const OSSL_PARAM params[], const char *names[]) in DEFINE_STACK_OF() 47 for (i = 0; names[i] != NULL; i++) { in DEFINE_STACK_OF() 48 p = OSSL_PARAM_locate_const(params, names[i]); in DEFINE_STACK_OF()
|
/openssl/doc/internal/man3/ |
H A D | ossl_DER_w_begin_sequence.pod | 19 in pairs, as noted by the function names containing the words C<begin>
|
Completed in 59 milliseconds
12345678910