/openssl/doc/man3/ |
H A D | CMS_sign_receipt.pod | 17 CMS_sign_receipt() creates and returns a CMS signed receipt structure. B<si> is 18 the B<CMS_SignerInfo> structure containing the signed receipt request. 21 in the CMS structure (for example any intermediate CAs in the chain). 34 CMS_sign_receipt() returns either a valid CMS_ContentInfo structure or NULL if
|
H A D | PKCS12_create.pod | 5 PKCS12_create, PKCS12_create_ex, PKCS12_create_cb, PKCS12_create_ex2 - create a PKCS#12 structure 28 PKCS12_create() creates a PKCS#12 structure. 32 the structure and I<cert> its corresponding certificates. I<ca>, if not B<NULL> 33 is an optional set of certificates to also include in the structure. 49 PKCS12 structure and allows for optional application processing on the associated 61 for the outer PKCS#12 structure is PKCS12KDF. 76 used for the corresponding B<friendlyName> in the PKCS12 structure instead. 78 used for the corresponding B<localKeyID> in the PKCS12 structure instead of the 83 B<localKeyID> in the PKCS12 structure. 105 PKCS12_create() returns a valid B<PKCS12> structure or NULL if an error occurred.
|
H A D | ASN1_generate_nconf.pod | 17 in an B<ASN1_TYPE> structure. 22 file whereas I<cnf> is obtained from an B<X509V3_CTX> structure, 81 Encodes an ASN1 B<UTCTime> structure, the value should be in 86 Encodes an ASN1 B<GeneralizedTime> structure, the value should be in 92 of this structure, the format strings B<ASCII> and B<HEX> can be 111 contents of this structure. The format can be B<ASCII> or B<UTF8>. 125 Modifiers affect the following structure, they can be used to 134 Add an explicit tag to the following structure. This string 169 data as an B<ASN1_TYPE> structure or NULL if an error occurred. 202 This example produces an RSAPrivateKey structure, this is the [all …]
|
H A D | OSSL_CMP_ITAV_new_caCerts.pod | 64 OSSL_CMP_ITAV_new_caCerts() creates an B<OSSL_CMP_ITAV> structure of type 72 OSSL_CMP_ITAV_new_rootCaCert() creates a new B<OSSL_CMP_ITAV> structure 79 OSSL_CMP_ITAV_new_rootCaKeyUpdate() creates a new B<OSSL_CMP_ITAV> structure 80 of type B<rootCaKeyUpdate> that includes an RootCaKeyUpdateContent structure 82 An RootCaKeyUpdateContent structure is included only if I<newWithNew> 97 OSSL_CMP_CRLSTATUS_new1() allocates a new B<OSSL_CMP_CRLSTATUS> structure 111 OSSL_CMP_ITAV_new0_certReqTemplate() creates an B<OSSL_CMP_ITAV> structure 117 Otherwise the resulting ITAV includes a CertReqTemplateValue structure 128 if the structure is not present in I<itav> or the keySpec field is absent. 165 OSSL_CMP_ITAV_new_crls() creates a new B<OSSL_CMP_ITAV> structure [all …]
|
H A D | OSSL_DECODER_from_bio.pod | 55 const char *structure = NULL; /* any structure */ 59 dctx = OSSL_DECODER_CTX_new_for_pkey(&pkey, format, structure, 80 const char *structure = NULL; /* any structure */ 86 dctx = OSSL_DECODER_CTX_new_for_pkey(&pkey, format, structure,
|
H A D | CMS_EnvelopedData_create.pod | 25 CMS_EnvelopedData_create_ex() creates a B<CMS_ContentInfo> structure 31 structure with a type B<NID_id_smime_ct_authEnvelopedData>. B<cipher> is the 42 The B<CMS_ContentInfo> structure needs to be finalized using L<CMS_final(3)> 54 a new B<CMS_ContentInfo> structure, they are not usually used in applications. 63 allocated structure.
|
H A D | ASN1_INTEGER_new.pod | 18 ASN1_INTEGER_new() returns an allocated B<ASN1_INTEGER> structure. 22 B<ASN1_INTEGER> structure representing the ASN.1 INTEGER type 26 ASN1_INTEGER_new() return a valid B<ASN1_INTEGER> structure or NULL
|
H A D | PKCS7_get_octet_string.pod | 5 PKCS7_get_octet_string - return octet string from a PKCS#7 envelopedData structure 16 PKCS#7 envelopedData structure or B<NULL> if the structure cannot be parsed.
|
H A D | EVP_MD_meth_new.pod | 66 The B<EVP_MD> type is a structure for digest method implementation. 70 EVP_MD_meth_new() creates a new B<EVP_MD> structure. 75 EVP_MD_meth_free() decrements the reference count for the B<EVP_MD> structure. 76 If the reference count drops to 0 then the structure is freed. 143 computations after the method's private data structure has been copied 147 data structure is then available with EVP_MD_CTX_get0_md_data(). 152 cleanup before the method's private data structure is cleaned out and 155 private data structure is then available with EVP_MD_CTX_get0_md_data(). 189 The B<EVP_MD> structure was openly available in OpenSSL before version 192 The B<EVP_MD> structure created with these functions became reference
|
H A D | OSSL_ENCODER_to_bio.pod | 64 const char *structure = "PrivateKeyInfo"; /* PKCS#8 structure */ 70 format, structure, 89 const char *structure = "PrivateKeyInfo"; /* PKCS#8 structure */ 97 format, structure,
|
H A D | X509_new.pod | 25 X509 structure, which represents an X509 certificate. 27 X509_new_ex() allocates and initializes a X509 structure with a 38 X509_free() decrements the reference count of B<X509> structure B<a> and 51 The function X509_up_ref() if useful if a certificate structure is being 53 use: this avoids the need to duplicate the entire certificate structure. 64 Otherwise it returns a pointer to the newly allocated structure.
|
H A D | BN_BLINDING_new.pod | 43 BN_BLINDING_new() allocates a new B<BN_BLINDING> structure and copies 46 BN_BLINDING_free() frees the B<BN_BLINDING> structure. 65 structure is owned by the current thread. This is to help users 69 owner of the B<BN_BLINDING> structure. 71 BN_BLINDING_lock() locks the B<BN_BLINDING> structure. 73 BN_BLINDING_unlock() unlocks the B<BN_BLINDING> structure. 91 BN_BLINDING_new() returns the newly allocated B<BN_BLINDING> structure
|
H A D | X509_NAME_ENTRY_get_object.pod | 34 and B<ASN1_OBJECT> structure. 37 and B<ASN1_STRING> structure. 46 B<X509_NAME_ENTRY> structure. 69 X509_NAME_ENTRY_get_object() returns a valid B<ASN1_OBJECT> structure if it is 72 X509_NAME_ENTRY_get_data() returns a valid B<ASN1_STRING> structure if it is set
|
H A D | ASN1_STRING_new.pod | 18 ASN1_STRING_new() returns an allocated B<ASN1_STRING> structure. Its type 21 ASN1_STRING_type_new() returns an allocated B<ASN1_STRING> structure of 35 B<ASN1_STRING> structure or NULL if an error occurred.
|
H A D | CMS_final.pod | 5 CMS_final, CMS_final_digest - finalise a CMS_ContentInfo structure 17 CMS_final() finalises the structure B<cms>. Its purpose is to perform any 24 CMS_final_digest() finalises the structure B<cms> using a pre-computed digest, 34 with the B<data> parameter set to NULL before the CMS structure is finalised
|
H A D | BN_CTX_new.pod | 22 A B<BN_CTX> is a structure that holds B<BIGNUM> temporary variables used by 25 calls, the B<BN_CTX> structure is used. 27 BN_CTX_new_ex() allocates and initializes a B<BN_CTX> structure for the given 32 BN_CTX_secure_new_ex() allocates and initializes a B<BN_CTX> structure 39 BN_CTX_free() frees the components of the B<BN_CTX> and the structure itself.
|
H A D | PKCS12_parse.pod | 5 PKCS12_parse - parse a PKCS#12 structure 16 PKCS12_parse() parses a PKCS12 structure. 18 B<p12> is the B<PKCS12> structure to parse. B<pass> is the passphrase to use. 35 B<X509> structure. 61 Attributes currently cannot be stored in the private key B<EVP_PKEY> structure.
|
H A D | SSL_SESSION_free.pod | 21 SSL_SESSION_new() creates a new SSL_SESSION structure and returns a pointer to 24 SSL_SESSION_dup() creates a new SSL_SESSION structure that is a copy of B<src>. 28 structure. 31 the B<SSL_SESSION> structure pointed to by B<session> and frees up the allocated 62 SSL_SESSION_new returns a pointer to the newly allocated SSL_SESSION structure
|
H A D | PKCS12_newpass.pod | 5 PKCS12_newpass - change the password of a PKCS12 structure 15 PKCS12_newpass() changes the password of a PKCS12 structure. 17 B<p12> is a pointer to a PKCS12 structure. B<oldpass> is the existing password 30 If the PKCS#12 structure does not have a password, then you must use the empty 35 with a MAC verification error. In rare cases the PKCS12 structure does not
|
H A D | X509_cmp_time.pod | 32 X509_time_adj_ex() sets the ASN1_TIME structure I<asn1_time> to the time 35 X509_time_adj() sets the ASN1_TIME structure I<asn1_time> to the time 40 In both methods, if I<asn1_time> is NULL, a new ASN1_TIME structure 49 X509_gmtime_adj() sets the ASN1_TIME structure I<asn1_time> to the time 73 the updated ASN1_TIME structure, and NULL on error.
|
H A D | PKCS8_pkey_add1_attr.pod | 22 the passed const PKCS8_PRIV_KEY_INFO structure B<p8>. 25 existing PKCS8_PRIV_KEY_INFO structure B<p8>. 29 PKCS8_PRIV_KEY_INFO structure B<p8>.
|
H A D | DSA_dup_DH.pod | 5 DSA_dup_DH - create a DH structure out of DSA structure 29 DSA_dup_DH() returns the new B<DH> structure, and NULL on error. The
|
H A D | RSA_new.pod | 21 RSA_new() allocates and initializes an B<RSA> structure. It is equivalent to 24 RSA_free() frees the B<RSA> structure and its components. The key is 32 a pointer to the newly allocated structure.
|
H A D | DH_new.pod | 21 DH_new() allocates and initializes a B<DH> structure. 23 DH_free() frees the B<DH> structure and its components. The values are 31 a pointer to the newly allocated structure.
|
H A D | OSSL_IETF_ATTR_SYNTAX.pod | 32 B<OSSL_IETF_ATTR_SYNTAX> is an opaque structure that represents the 37 get and set the policyAuthority field of the structure. Both routines act on 38 internal pointers of the structure and must not be freed by the application. 71 B<GENERAL_NAMES> structure or B<NULL> if the policy authority has not been
|