Searched refs:structure (Results 176 – 200 of 382) sorted by relevance
12345678910>>...16
/openssl/doc/man3/ |
H A D | X509_STORE_CTX_new.pod | 66 These functions initialise an B<X509_STORE_CTX> structure for subsequent use 70 structure associated with the specified library context I<libctx> and property 78 X509_STORE_CTX_cleanup() internally cleans up an B<X509_STORE_CTX> structure. 144 enabled in the associated B<X509_VERIFY_PARAM> structure. This might be 146 for example in a PKCS#7 structure. 285 structure or NULL if an error occurred. 287 X509_STORE_CTX_get0_rpk() returns a pointer to an B<EVP_PKEY> structure if
|
H A D | OPENSSL_LH_COMPFUNC.pod | 97 B<lh_I<TYPE>_new>() creates a new B<LHASH_OF>(B<I<TYPE>>) structure to store 144 B<lh_I<TYPE>_free>() frees the B<LHASH_OF>(B<I<TYPE>>) structure 149 B<lh_I<TYPE>_flush>() empties the B<LHASH_OF>(B<I<TYPE>>) structure I<table>. New 154 B<lh_I<TYPE>_insert>() inserts the structure pointed to by I<data> into 162 is a structure with the key field(s) set; the function will return a 163 pointer to a fully populated structure. 250 pointer to the new B<LHASH> structure.
|
H A D | OSSL_CRMF_pbmp_new.pod | 35 OSSL_CRMF_pbmp_new() initializes and returns a new B<PBMParameter> structure 60 structure, or NULL on error.
|
H A D | OSSL_DECODER_CTX_new_for_pkey.pod | 55 I<input_struct> which specifies a starting input type and input structure. 106 OpenSSL decoder implementations also support the input structure 107 C<type-specific>. This is the structure used for keys encoded
|
H A D | OBJ_nid2obj.pod | 58 an ASN1_OBJECT structure, its long name and its short name respectively, 68 OBJ_txt2obj() converts the text string I<s> into an ASN1_OBJECT structure. 128 is only a single constant structure for each table object. 150 OBJ_nid2obj() returns an B<ASN1_OBJECT> structure or B<NULL> is an
|
H A D | BIO_meth_new.pod | 81 The B<BIO_METHOD> type is a structure used for the implementation of new BIO 85 BIO_meth_new() creates a new B<BIO_METHOD> structure that contains a type 102 BIO_meth_free() destroys a B<BIO_METHOD> structure and frees up any memory 144 memory for the new BIO, and a pointer to this newly allocated structure will
|
H A D | X509_EXTENSION_set_object.pod | 42 should either be B<NULL> or a valid B<X509_EXTENSION> structure it must 66 B<ASN1_OCTET_STRING> structure.
|
H A D | X509_CRL_get0_by_serial.pod | 79 X509_REVOKED_get0_serialNumber() returns an B<ASN1_INTEGER> structure. 81 X509_REVOKED_get0_revocationDate() returns an B<ASN1_TIME> structure.
|
H A D | CMS_add0_cert.pod | 48 The CMS_ContentInfo structure I<cms> must be of type signed data or enveloped 52 I<crls> fields of SignedData structure.
|
H A D | SSL_CTX_set_cert_store.pod | 63 The X509_STORE structure used by an SSL_CTX is used for verifying peer 65 every child SSL structure. Applications wanting finer control can use
|
H A D | OSSL_CMP_SRV_CTX_new.pod | 112 OSSL_CMP_SRV_CTX_new() creates and initializes an B<OSSL_CMP_SRV_CTX> structure 167 OSSL_CMP_SRV_CTX_new() returns a B<OSSL_CMP_SRV_CTX> structure on success, 172 OSSL_CMP_SRV_CTX_get0_cmp_ctx() returns a B<OSSL_CMP_CTX> structure on success,
|
H A D | ASN1_ITEM_lookup.pod | 23 ASN1_ITEM_lookup() and ASN1_ITEM_get() return a valid B<ASN1_ITEM> structure
|
H A D | OSSL_CRMF_MSG_set1_regCtrl_regToken.pod | 95 OSSL_CRMF_CERTID_gen produces an OSSL_CRMF_CERTID_gen structure copying the 105 OSSL_CRMF_CERTID_gen() returns a pointer to the resulting structure
|
H A D | SSL_free.pod | 5 SSL_free - free an allocated SSL structure 16 structure pointed to by B<ssl> and frees up the allocated memory if the
|
H A D | X509_ACERT_get0_holder_baseCertId.pod | 70 respectively copy these values into the B<OSSL_ISSUER_SERIAL> structure. 101 All I<get0> functions return a pointer to the object's inner structure. These
|
H A D | DSA_set_method.pod | 62 DSA_new_method() allocates and initializes a DSA structure so that B<engine> 80 fails. Otherwise it returns a pointer to the newly allocated structure.
|
H A D | DH_set_method.pod | 59 DH_new_method() allocates and initializes a DH structure so that B<engine> will 80 returns a pointer to the newly allocated structure.
|
H A D | SSL_CTX_set1_verify_cert_store.pod | 41 except they apply to SSL structure B<ssl>. 56 The stores pointers associated with an SSL_CTX structure are copied to any SSL
|
H A D | MD5.pod | 64 MD2_Init() initializes a B<MD2_CTX> structure. 73 MD5_Final() are analogous using an B<MD4_CTX> and B<MD5_CTX> structure. The parameter B<MUST NOT> b…
|
H A D | EVP_DigestInit.pod | 144 The B<EVP_MD> type is a structure for digest method implementation. 169 Increments the reference count for an B<EVP_MD> structure. 173 Decrements the reference count for the fetched B<EVP_MD> structure. 174 If the reference count drops to 0 then the structure is freed. 402 B<EVP_MD_CTX> structure. 408 when passed an B<EVP_MD> structure. For example, C<EVP_MD_get_type(EVP_sha1())> 420 the B<EVP_MD> structure corresponding to the passed B<EVP_MD_CTX>. This 460 Returns an B<EVP_MD> structure when passed a digest name, a digest B<NID> or an 461 B<ASN1_OBJECT> structure respectively. 678 Returns a pointer to the B<EVP_MD> structure of the "null" message digest. [all …]
|
H A D | X509_NAME_get_index_by_NID.pod | 27 These functions allow an B<X509_NAME> structure to be examined. The 28 B<X509_NAME> structure is the same as the B<Name> type defined in
|
H A D | X509_get0_notBefore.pod | 80 return a pointer to an B<ASN1_TIME> structure. 82 X509_CRL_get0_lastUpdate() return a pointer to an B<ASN1_TIME> structure
|
/openssl/providers/ |
H A D | decoders.inc | 35 ",structure=" DECODER_STRUCTURE_##_structure, \ 93 * A decoder that recognises PKCS#8 EncryptedPrivateKeyInfo structure
|
H A D | encoders.inc | 43 ",structure=" ENCODER_STRUCTURE_##_structure, \ 72 * Entries for key type specific output formats. The structure name on these 229 * name as structure name instead of "type-specific", in the call on 253 * Additional entries with structure names being the standard name.
|
/openssl/doc/man1/ |
H A D | openssl-smime.pod.in | 104 Takes an input message and writes out a PEM encoded PKCS#7 structure. 118 The input format of the PKCS#7 (S/MIME) structure (if one is being read); 124 The output format of the PKCS#7 (S/MIME) structure (if one is being written); 152 structure is using the detached signature form where the content is 330 since the content is no longer part of the PKCS#7 structure the encoding 418 The output from Netscape form signing is a PKCS#7 structure with the 420 signature by line wrapping the base64 encoded structure and surrounding
|
Completed in 36 milliseconds
12345678910>>...16