Searched refs:structure (Results 151 – 175 of 380) sorted by relevance
12345678910>>...16
/openssl/doc/man3/ |
H A D | RSA_generate_key.pod | 38 B<RSA> structure provided in I<rsa>. 41 it in the B<RSA> structure provided in I<rsa>. The number of primes is given by 97 RSA_generate_key() returns a pointer to the RSA structure or
|
H A D | BIO_get_rpoll_descriptor.pod | 5 BIO_get_rpoll_descriptor, BIO_get_wpoll_descriptor - obtain a structure which 27 I<*desc> with a poll descriptor. A poll descriptor is a tagged union structure 80 Because poll descriptors are a tagged union structure, they can represent
|
H A D | X509_LOOKUP_meth_new.pod | 102 The B<X509_LOOKUP_METHOD> type is a structure used for the implementation of new 106 B<X509_LOOKUP> structure. 108 X509_LOOKUP_meth_new() creates a new B<X509_LOOKUP_METHOD> structure. It should 112 X509_LOOKUP_meth_free() destroys a B<X509_LOOKUP_METHOD> structure.
|
H A D | ASN1_EXTERN_FUNCS.pod | 55 defined structure. The name of the structure should be supplied in the I<sname> 56 parameter. The tag for the structure (e.g. typically B<V_ASN1_SEQUENCE>) should 58 B<ASN1_EXTERN_FUNCS> structure should be supplied in the I<fptrs> parameter. 60 The B<ASN1_EXTERN_FUNCS> structure has the following entries.
|
H A D | ASN1_item_sign.pod | 43 I<data>, the ASN.1 structure I<it>, private key I<pkey> and message digest I<md>. 45 converting it to der format using the ASN.1 structure I<it>. 46 The I<data> that will be signed, and a structure containing the signature may 52 Examples of valid values that can be used by the ASN.1 structure I<it> are 71 converting it to der format using the ASN.1 structure I<it>.
|
H A D | CMS_verify.pod | 6 CMS_get0_signers - verify a CMS SignedData structure 25 B<CMS SignedData> structure contained in a structure of type B<CMS_ContentInfo>. 26 I<cms> points to the B<CMS_ContentInfo> structure to verify. 63 certificates contained in the I<cms> structure unless B<CMS_NOINTERN> is set.
|
H A D | SSL_CTX_get0_param.pod | 43 Typically parameters are retrieved from an B<SSL_CTX> or B<SSL> structure 50 B<X509_VERIFY_PARAM> structure.
|
H A D | X509_STORE_CTX_set_verify_cb.pod | 71 The B<ctx> parameter to the callback is the B<X509_STORE_CTX> structure that 73 structure and receive additional information about the error, for example 117 The verification callback can be set and inherited from the parent structure 119 B<X509_STORE_CTX> structure is created and destroyed internally and the
|
H A D | EVP_PKEY_CTX_new.pod | 48 used when no B<EVP_PKEY> structure is associated with the operations, 64 The B<EVP_PKEY_CTX> structure is an opaque public key algorithm context used 105 the newly allocated B<EVP_PKEY_CTX> structure or B<NULL> if an error occurred.
|
H A D | ECDSA_SIG_new.pod | 22 B<ECDSA_SIG> is an opaque structure consisting of two BIGNUMs for the 30 ECDSA_SIG_new() allocates an empty B<ECDSA_SIG> structure. 33 ECDSA_SIG_free() frees the B<ECDSA_SIG> structure I<sig>.
|
H A D | SRP_user_pwd_new.pod | 32 The SRP_user_pwd_new() function allocates a structure to store a user verifier 35 The SRP_user_pwd_free() function frees up the B<user_pwd> structure.
|
H A D | DSA_meth_new.pod | 97 The B<DSA_METHOD> type is a structure used for the provision of custom DSA 101 DSA_meth_new() creates a new B<DSA_METHOD> structure. It should be given a 112 DSA_meth_free() destroys a B<DSA_METHOD> structure and frees up any memory 118 string is duplicated and the copy is stored in the DSA_METHOD structure, so the 167 newly allocated structure will be passed as a parameter to the function. This
|
H A D | SSL_CTX_add1_chain_cert.pod | 72 selected on the corresponding B<ctx> structure. 81 are similar except they apply to SSL structure B<ssl>. 87 used to iterate over all certificates in an B<SSL_CTX> structure. 105 The chains associate with an SSL_CTX structure are copied to any SSL
|
H A D | PKCS7_verify.pod | 5 PKCS7_verify, PKCS7_get0_signers - verify a PKCS#7 signedData structure 19 It verifies a PKCS#7 signedData structure given in I<p7>. 42 not detached and I<indata> is not NULL then the structure has both 50 certificates contained in the I<p7> structure unless B<PKCS7_NOINTERN> is set.
|
H A D | OSSL_HTTP_REQ_CTX.pod | 59 B<OSSL_HTTP_REQ_CTX> is a context structure for an HTTP request and response, 66 OSSL_HTTP_REQ_CTX_new() allocates a new HTTP request context structure, 73 The allocated context structure includes an internal memory B<BIO>, 98 Due to the structure of an HTTP request, if the I<keep_alive> argument is 111 If the I<asn1> parameter is nonzero a structure in ASN.1 encoding will be 153 in addition parses the response, which must be a DER-encoded ASN.1 structure, 183 the content is an ASN.1 encoded structure with a length exceeding this value
|
H A D | PKCS12_add_cert.pod | 50 PKCS12 structure. 58 A valid B<PKCS12_SAFEBAG> structure or NULL if an error occurred.
|
H A D | OPENSSL_LH_stats.pod | 28 The B<LHASH> structure records statistics about most aspects of 61 when using the LHASH data structure.
|
H A D | RSA_meth_new.pod | 133 The B<RSA_METHOD> type is a structure used for the provision of custom 137 RSA_meth_new() creates a new B<RSA_METHOD> structure. It should be 149 RSA_meth_free() destroys an B<RSA_METHOD> structure and frees up any 156 stored in the RSA_METHOD structure, so the caller remains responsible 197 the new RSA object, and a pointer to this newly allocated structure
|
H A D | OSSL_CMP_CTX_new.pod | 71 - functions for managing the CMP client context data structure 184 OSSL_CMP_CTX_new() allocates an B<OSSL_CMP_CTX> structure associated with 192 OSSL_CMP_CTX_free() deallocates an OSSL_CMP_CTX structure. 208 (e.g., OSSL_CMP_OPT_IMPLICIT_CONFIRM) in the given OSSL_CMP_CTX structure. 414 a structure containing arguments such as an B<SSL_CTX> structure, 420 structure containing arguments, previously set by 442 to a structure containing arguments, previously set by 572 structure as the private or public key to be certified in the CMP context. 576 dependent on fields of the CMP context structure: 679 to a structure containing arguments, previously set by [all …]
|
H A D | OSSL_CRMF_pbmp_new.pod | 35 OSSL_CRMF_pbmp_new() initializes and returns a new B<PBMParameter> structure 60 structure, or NULL on error.
|
/openssl/doc/man1/ |
H A D | openssl-pkcs7.pod.in | 46 The data is a PKCS#7 Version 1.5 structure. 79 Don't output the encoded version of the PKCS#7 structure (or certificates
|
/openssl/doc/designs/quic-design/ |
H A D | rx-depacketizer.md | 24 Represented by the `OSSL_QRX_PKT` structure, defined in 71 (the `OSSL_QRX_PKT` structure / sub-structure needs to be extended to take 77 This collects appropriate data into a `QUIC_ACKM_RX_PKT` structure: 145 [^1]: This creates and populates an `QUIC_ACKM_ACK` structure, then calls
|
H A D | quic-ackm.md | 122 The caller is responsible for the allocation of the structure and the structure 124 freed. It is expected this structure will usually be freed (or returned to a 127 Only exactly one of the callbacks in the structure will be called over the 144 * If the packet being described by this structure contains an ACK frame, 354 This returns a pointer to a `OSSL_ACKM_ACK` structure representing the 364 The structure pointed to by the returned pointer, and the referenced ACK range 440 The user calls `ossl_ackm_get_probe_request`. The structure pointed
|
/openssl/crypto/property/ |
H A D | README.md | 39 strings. Moreover, such a data structure need not be garbage collected. 40 By converting strings to integers using a structure such as this, string 49 would share their definition structure. Again, reducing space use.
|
/openssl/doc/internal/man3/ |
H A D | DEFINE_PRIORITY_QUEUE_OF.pod | 43 of the specified B<I<TYPE>>. This is an opaque pointer to a structure 60 B<ossl_pqueue_I<TYPE>_free>() frees up the I<pq> structure. It does I<not> 68 structure such that the next I<n> calls to B<ossl_pqueue_I<TYPE>_push>()
|
Completed in 86 milliseconds
12345678910>>...16