Home
last modified time | relevance | path

Searched refs:not (Results 251 – 275 of 1282) sorted by relevance

1...<<11121314151617181920>>...52

/openssl/doc/man3/
H A DPKCS12_newpass.pod21 the UTF-8 encoding. If it is not valid UTF-8, it is assumed to be ISO8859-1
30 If the PKCS#12 structure does not have a password, then you must use the empty
35 with a MAC verification error. In rare cases the PKCS12 structure does not
108 Licensed under the Apache License 2.0 (the "License"). You may not use
H A DX509_EXTENSION_set_object.pod43 B<not> be an uninitialised pointer.
50 not be freed up.
56 pointer is an internal value which must not be freed up.
91 Licensed under the Apache License 2.0 (the "License"). You may not use
H A DOCSP_request_add1_nonce.pod52 Some responders may include a nonce in all responses even if one is not
55 Some responders cache OCSP responses and do not sign each response for
56 performance reasons. As a result they do not support nonces.
79 Licensed under the Apache License 2.0 (the "License"). You may not use
H A DSSL_CTX_set_cert_cb.pod57 by the callback. So if an EC chain is set for a curve the client does not
58 support it will B<not> be used.
62 SSL_CTX_set_cert_cb() and SSL_set_cert_cb() do not return values.
75 Licensed under the Apache License 2.0 (the "License"). You may not use
H A DSMIME_read_ASN1.pod23 in binary format and is not translated to canonical form.
47 To support future functionality if I<bcont> is not NULL I<*bcont> should be
53 handle most S/MIME messages more complex compound formats may not work.
81 Licensed under the Apache License 2.0 (the "License"). You may not use
H A DSSL_get_version.pod35 SSL_is_dtls() returns 1 if the connection is using DTLS or 0 if not.
37 SSL_is_tls() returns 1 if the connection is using SSL/TLS or 0 if not.
39 SSL_is_quic() returns 1 if the connection is using QUIC or 0 if not.
147 Licensed under the Apache License 2.0 (the "License"). You may not use
H A DOPENSSL_instrument_bus.pod37 Return value of 0 indicates that CPU is not capable of performing the
39 not available on current platform. For reference, on x86 'flush cache
48 Licensed under the Apache License 2.0 (the "License"). You may not use
H A DOPENSSL_gmtime.pod35 are not considered.
40 than the number of seconds per day (3600). Leap seconds are not considered.
57 Licensed under the Apache License 2.0 (the "License"). You may not use
H A DDEFINE_STACK_OF.pod118 or B<sk_I<TYPE>_unshift>() will not fail or cause memory to be allocated
125 B<sk_I<TYPE>_unshift>() will not fail or cause memory to be allocated or
135 B<sk_I<TYPE>_free>() frees up the I<sk> structure. It does I<not> free up any
229 It is not an error to call B<sk_I<TYPE>_num>(), B<sk_I<TYPE>_value>(),
234 an invalid index. An error is not raised in these conditions.
236 The underlying utility B<OPENSSL_sk_> API should not be used directly.
265 B<sk_I<TYPE>_sort>() do not return values.
281 not.
289 and was not a public API.
295 and B<sk_I<TYPE>_find_all>() calls are read-only and do not sort the
[all …]
H A DEVP_EncodeInit.pod37 plus some occasional newlines (see below). If the input data length is not a
52 bytes of input. If the data length is not divisible by 3 then a full 4 bytes is
89 output data will be produced. If B<n> is not divisible by 3 then the block is
107 if its length is not a multiple of 4 (including any padding), to be processed
110 not buffered.
114 end-of-input, subsequent bytes are not buffered, and the return value will be
118 The soft end-of-input condition is not remembered in B<ctx>, it is up to the
138 length is not a multiple of 4, i.e. it was not properly padded, -1 is
183 Licensed under the Apache License 2.0 (the "License"). You may not use
H A DEVP_EncryptInit.pod286 not remain in memory. If the argument is NULL, nothing is done.
364 are not appropriate.
544 the tag length has not been set.
622 Do not use.
644 is not supported.
741 Otherwise gets 0 or the parameter might not be present at all.
1312 not been initialized via a call to B<EVP_CipherInit_ex2>.
1336 does not use a tag.
1349 does not support the call or on any other error.
1412 not called a default IV length is used.
[all …]
H A DOSSL_CMP_MSG_get0_header.pod43 If I<ctx> does not contain a transaction ID, a fresh one is created before.
68 or the I<ctx> does not include a Subject Alternative Name.
92 Names (SANs) and B<OSSL_CMP_OPT_SUBJECTALTNAME_NODEFAULT> is not set,
110 It assigns a pointer to the new structure to I<*msg> if I<msg> is not NULL.
122 or NULL if the respective entry does not exist and on error.
162 Licensed under the Apache License 2.0 (the "License"). You may not use
H A DX509_SIG_get0.pod20 except the pointers returned are not constant and can be modified:
35 Licensed under the Apache License 2.0 (the "License"). You may not use
H A DPKCS7_get_octet_string.pod21 should not be freed by the caller.
35 Licensed under the Apache License 2.0 (the "License"). You may not use
H A DOSSL_CORE_MAKE_FUNC.pod21 reserved for internal use. They should not be used by applications or assumed
38 Licensed under the Apache License 2.0 (the "License"). You may not use
H A DPKCS12_get_friendlyname.pod22 A UTF-8 string, or NULL if the attribute was either not present or an error occurred.
34 Licensed under the Apache License 2.0 (the "License"). You may not use
H A DSSL_SESSION_get0_peer.pod17 B<s> or NULL if no peer certificate is available. The caller should not free the
33 Licensed under the Apache License 2.0 (the "License"). You may not use
/openssl/doc/man7/
H A Dprovider-signature.pod173 A signature algorithm implementation may not implement all of these functions.
236 The I<params>, if not NULL, should be set on the context in a manner similar to
248 to by the I<sig> parameter and it should not exceed I<sigsize> bytes in length.
279 if I<sig> is not NULL, the signature should be written to the location pointed
280 to by I<sig>, and it should not exceed I<sigsize> bytes in length.
347 pointed to by I<rout> which should not exceed I<routsize> bytes in length.
447 NULL is used if this optional value is not set.
452 like RSA-SHA256, the "digest" and "properties" parameters should not be used.
496 otherwise the sign operation is only tried once and returns whether or not it
526 The default value of 1 causes an error during the init if the key is not FIPS
[all …]
H A DOSSL_PROVIDER-null.pod12 provider will not be accidentally accessed.
34 Licensed under the Apache License 2.0 (the "License"). You may not use
H A Dprovider-keyexch.pod82 A key exchange algorithm implementation may not implement all of these functions.
112 The I<params>, if not NULL, should be set on the context in a manner similar to
130 The derived secret should be written to the location I<secret> which should not
160 Notice that not all settable parameters are also gettable, and vice versa.
192 The length of the "kdf-outlen" parameter should not exceed that of a B<size_t>.
203 usually do not need to support this gettable parameter as its sole purpose
222 The default value of 1 causes an error during the init if the key is not FIPS
232 not FIPS approved. Setting this to 0 will ignore the error and set the
266 Licensed under the Apache License 2.0 (the "License"). You may not use
H A Dossl-guide-libraries-introduction.pod17 supplies various additional supporting APIs that are not directly cryptography
31 Applications may be written that only use C<libcrypto> capabilities and do not
69 If an application does not explicitly create a library context then the
117 time. However most OpenSSL I<data structures> are not thread-safe. For example
119 would not be thread safe to call BIO_write() from one thread while calling
135 function has been successful or not. It is considered best practice to always
146 small number of functions that do not conform to the above conventions (e.g.
204 Some encoding and decoding algorithm implementations are not FIPS algorithm
225 provider does not support the encoding or decoding of keys.
249 all API calls have correctly passed the created library context and are not
[all …]
/openssl/
H A DNOTES-NONSTOP.md12 This is recommended but not required. `egd` is supported at 3.0 but cannot
14 * The TNS/E platform does not support hardware randomization, so
21 may work, it has not been broadly tested. c99 is the only compiler
41 not currently available but is planned for post-2024.
138 Do not forget to include any OpenSSL cross-compiling prefix and certificate
141 The OpenSSL test suite will not run on your workstation. In order to verify the
144 is not equivalent.
147 be aware that signatures may not match between builds done under OSS and under
148 cross-compiles as the compilers do not necessarily generate identical objects.
159 **Note:** Cross-compile builds for TNS/E have not been attempted, but should
/openssl/doc/man1/
H A Dopenssl-ciphers.pod.in54 It also does not change the default list of supported signature algorithms.
84 Note that not all protocols and flags may be available, depending on how
152 will not moved to the end of the list.
164 For example, B<DEFAULT+DES> is not valid.
177 The ciphers included in B<ALL>, but not enabled by default. Currently
179 not cover B<eNULL>, which is not included by B<ALL> (use B<COMPLEMENTOFALL> if
191 The cipher suites not enabled by B<ALL>, currently B<eNULL>.
329 Cipher suites using DES (not triple DES).
397 128 bit (not permitting 192 bit by peer) or 192 bit level of security
623 Note: the CBC modes mentioned in this RFC are not supported.
[all …]
/openssl/test/recipes/30-test_evp_data/
H A Devppkey_dsa.txt4 # Licensed under the Apache License 2.0 (the "License"). You may not use
271 # Test sign with a 2048 bit key with N == 160 is not allowed in fips mode
329 # Test sign with a 1024 bit key is not allowed in fips mode
337 # Test sign with SHA1 is not allowed in fips mode
345 # Test sign with a 3072 bit key with N == 224 is not allowed in fips mode
353 # Test sign with a 4096 bit key is not allowed in fips mode
361 # Test sign is not allowed in fips mode
462 # Test FIPS DSA keygen is not allowed
472 # Test DSA keygen is not approved
H A Devpkdf_tls12_prf.txt4 # Licensed under the Apache License 2.0 (the "License"). You may not use
52 # Test that "master secret" is not not used in FIPS mode
98 Reason = digest not allowed

Completed in 36 milliseconds

1...<<11121314151617181920>>...52