/openssl/doc/man3/ |
H A D | SSL_new.pod | 17 SSL_new() creates a new B<SSL> structure which is needed to hold the 18 data for a TLS/SSL connection. The new structure inherits the settings 29 The function SSL_dup() creates and returns a new B<SSL> structure from the same 31 the settings in I<s> into the new B<SSL> object. 110 The creation of a new SSL structure failed. Check the error stack to
|
H A D | RSA_meth_new.pod | 86 /* called at new */ 137 RSA_meth_new() creates a new B<RSA_METHOD> structure. It should be 142 new B<RSA> object based on this B<RSA_METHOD>. Any new B<RSA> object 146 passed as a parameter. This might be useful for creating a new 193 used for creating a new RSA instance respectively. This function will 197 the new RSA object, and a pointer to this newly allocated structure 210 function used for generating a new RSA key pair respectively. This 216 and set the function used for generating a new multi-prime RSA key pair
|
H A D | OSSL_CMP_ATAV_set0.pod | 46 OSSL_CMP_ATAV_create() creates a new B<OSSL_CMP_ATAV> structure and fills it in. 61 OSSL_CMP_ATAV_new_algId() creates a new B<OSSL_CMP_ATAV> structure of type 68 OSSL_CMP_ATAV_new_rsaKeyLen() creates a new B<OSSL_CMP_ATAV> structure of type 77 pointed to by I<*sk_p>. It creates a new stack if I<*sk_p> points to NULL.
|
H A D | X509_ATTRIBUTE.pod | 122 If I<*x> is NULL then a new list is created, otherwise it uses the 126 X509at_add1_attr_by_OBJ() creates a new B<X509_ATTRIBUTE> using 127 X509_ATTRIBUTE_set1_object() and X509_ATTRIBUTE_set1_data() to assign a new 130 will occur. If I<*x> is NULL then a new attribute list is created. If I<obj> 146 X509_ATTRIBUTE_set1_data() pushes a new B<ASN1_TYPE> object onto the I<attr> 147 attributes list. The new object is assigned a copy of the data in I<data> of 157 X509_ATTRIBUTE_create() creates a new B<X509_ATTRIBUTE> using the I<nid> 162 X509_ATTRIBUTE_set1_data() to assign a new I<obj> with type I<atrtype> and 164 NULL then a new B<X509_ATTRIBUTE> will be returned, otherwise the passed in
|
H A D | SSL_CTX_add_session.pod | 27 When adding a new session to the internal session cache, it is examined 31 removed and replaced by the new session. If the session is actually 36 flag then the internal cache will not be populated automatically by new
|
H A D | SSL_CTX_set_num_tickets.pod | 37 L<SSL_verify_client_post_handshake(3)>. These new tickets will be associated 46 SSL_new_session_ticket() is used by a server application to request that a new 50 delayed until the server is starting a new write operation, so that it is 61 ticket itself is sent, a new-session callback can be registered with
|
H A D | BIO_push.pod | 31 by I<next>. The new chain may include some of the same BIOs from the old chain 61 is made then the new chain will be I<b64-f>. After making the calls 66 the new chain is I<md1-md2-b64-f>. Data written to I<md1> will be digested 77 will return I<b64> and the new chain will be I<md1-b64-f>.
|
H A D | OSSL_CMP_ITAV_set0.pod | 36 OSSL_CMP_ITAV_create() creates a new B<OSSL_CMP_ITAV> structure and fills it in. 50 by I<*itav_sk_p>. It creates a new stack if I<*itav_sk_p> points to NULL. 52 OSSL_CMP_ITAV_new0_certProfile() creates a new B<OSSL_CMP_ITAV> structure 54 On success, ownership of the list is with the new B<OSSL_CMP_ITAV> structure.
|
H A D | ASN1_item_new.pod | 6 - create new ASN.1 values 18 ASN1_item_new_ex() creates a new B<ASN1_VALUE> structure based on the
|
H A D | DSA_meth_new.pod | 101 DSA_meth_new() creates a new B<DSA_METHOD> structure. It should be given a 105 during the construction of a new B<DSA> object based on this B<DSA_METHOD>. Any 106 new B<DSA> object will have those flags set by default. 109 parameter. This might be useful for creating a new B<DSA_METHOD> based on an 163 for creating a new DSA instance respectively. This function will be 166 functions will allocate the memory for the new DSA object, and a pointer to this 184 used for generating a new DSA key pair respectively. This function will be
|
H A D | OSSL_LIB_CTX.pod | 40 OSSL_LIB_CTX_new() creates a new OpenSSL library context. 42 OSSL_LIB_CTX_new_from_dispatch() creates a new OpenSSL library context 52 new library context to the application library context. The new library context 77 library context then the new properties will override anything from the parent 84 B<OSSL_provider_init> function returns then the new provider is available in the
|
H A D | OSSL_CRMF_pbmp_new.pod | 35 OSSL_CRMF_pbmp_new() initializes and returns a new B<PBMParameter> structure 36 with a new random salt of given length I<saltlen>, 59 OSSL_CRMF_pbmp_new() returns a new and initialized OSSL_CRMF_PBMPARAMETER
|
H A D | SSL_SESSION_free.pod | 21 SSL_SESSION_new() creates a new SSL_SESSION structure and returns a pointer to 24 SSL_SESSION_dup() creates a new SSL_SESSION structure that is a copy of B<src>. 65 SSL_SESSION_dup returns a pointer to the new copy or NULL on error.
|
H A D | SSL_CTX_set_session_ticket_cb.pod | 82 Empty ticket present. No ticket data will be used and a new ticket should be 88 The ticket couldn't be decrypted. No ticket data will be used and a new ticket 94 be available. A new ticket should not be sent to the client. 98 Same as B<SSL_TICKET_SUCCESS>, but a new ticket should be sent to the client. 156 By default, in TLSv1.2 and below, a new session ticket is not issued on a 158 default behaviour is to always issue a new ticket on resumption. In both cases
|
H A D | OBJ_nid2obj.pod | 89 OBJ_create() adds a new object to the internal table. I<oid> is the 91 long name. A new NID is returned for the created object in case of 100 OBJ_add_sigid() creates a new composite "Signature Algorithm" that associates a 108 OBJ_cleanup() releases any resources allocated by creating new objects. 177 Create a new NID and initialize an object from it: 182 Create a new object directly:
|
H A D | X509V3_get_d2i.pod | 58 X509V3_add1_i2d() adds extension I<value> to STACK I<*x> (allocating a new 97 B<X509V3_ADD_DEFAULT> appends a new extension only if the extension does 100 B<X509V3_ADD_APPEND> appends a new extension, ignoring whether the extension 104 not exist, appends a new extension. 109 B<X509V3_ADD_KEEP_EXISTING> appends a new extension only if the extension does 113 does not exist, returns an error. No new extension is added.
|
/openssl/crypto/x509/ |
H A D | x509_set.c | 75 ASN1_TIME *new; in ossl_x509_set1_time() local 79 new = ASN1_STRING_dup(tm); in ossl_x509_set1_time() 80 if (tm != NULL && new == NULL) in ossl_x509_set1_time() 83 *ptm = new; in ossl_x509_set1_time()
|
/openssl/doc/designs/quic-design/ |
H A D | quic-fault-injector.md | 25 integration points will use new callbacks added to libssl. The final integration 47 To support this integration point two new callbacks will be introduced to libssl 52 The new libssl callbacks will be as follows: 76 in a newly allocated buffer. A pointer to the new buffer will be passed back 78 can choose to not mutate by simply creating a new buffer with a copy of the data 98 The above functionality will be supported by the following two new callbacks 121 `numin` iovecs. The `mutatecb` callback is expected to allocate a new header 122 structure and return it in `*hdrout` and a new set of iovecs to be stored in 186 It is expected that the Fault Injector API will expand over time as new 329 * is the new length of the specific message excluding the handshake message [all …]
|
/openssl/doc/internal/man3/ |
H A D | ossl_cmp_certreq_new.pod | 48 The allocate a new message, fill it with the relevant data derived from 140 ossl_cmp_genm_new() creates a new General Message with an empty ITAV stack. 142 ossl_cmp_genp_new() creates a new General Response with an empty ITAV stack. 144 ossl_cmp_error_new() creates a new Error Message with the given contents 157 All of the functions return a new OSSL_CMP_MSG structure containing
|
/openssl/ |
H A D | HACKING.md | 6 If you are adding new public functions to the custom library build, you need to 8 or provide a new header file and edit
|
/openssl/test/ |
H A D | threadstest.c | 122 int *old, *new; in rwwriter_fn() local 127 new = CRYPTO_zalloc(sizeof (int), NULL, 0); in rwwriter_fn() 133 *new = *rwwriter_ptr + 1; in rwwriter_fn() 135 *new = 0; in rwwriter_fn() 138 rwwriter_ptr = new; in rwwriter_fn() 319 uint64_t *old, *new; in writer_fn() local 324 new = CRYPTO_zalloc(sizeof(uint64_t), NULL, 0); in writer_fn() 330 *new = global_ctr++; in writer_fn() 331 ossl_rcu_assign_ptr(&writer_ptr, &new); in writer_fn()
|
/openssl/doc/man1/ |
H A D | openssl-req.pod.in | 23 [B<-new>] 94 (B<-new> or B<-newkey> or B<-precert>) are not specified. 157 =item B<-new> 159 This option generates a new certificate request. It will prompt 174 This option implies the B<-new> flag to create a new certificate request 175 or a new certificate in case B<-x509> is used. 269 Sets subject name for new request or supersedes the subject name 293 This option implies the B<-new> flag if B<-in> is not given. 409 This implies the B<-new> flag. 658 openssl req -new -key key.pem -out req.pem [all …]
|
/openssl/crypto/evp/ |
H A D | keymgmt_meth.c | 78 if (keymgmt->new == NULL) in keymgmt_from_algorithm() 79 keymgmt->new = OSSL_FUNC_keymgmt_new(fns); in keymgmt_from_algorithm() 236 || (keymgmt->new == NULL in keymgmt_from_algorithm() 372 if (keymgmt->new == NULL) in evp_keymgmt_newdata() 374 return keymgmt->new(provctx); in evp_keymgmt_newdata()
|
/openssl/test/ocsp-tests/ |
H A D | mk-ocsp-cert-chain.sh | 41 -new \ 69 -new \
|
/openssl/crypto/crmf/ |
H A D | crmf_lib.c | 92 int new = 0; in OSSL_CRMF_MSG_push0_regCtrl() local 103 new = 1; in OSSL_CRMF_MSG_push0_regCtrl() 110 if (new != 0) { in OSSL_CRMF_MSG_push0_regCtrl() 337 int new = 0; in OSSL_CRMF_MSG_push0_extension() local 348 new = 1; in OSSL_CRMF_MSG_push0_extension() 355 if (new != 0) { in OSSL_CRMF_MSG_push0_extension()
|