Searched refs:structure (Results 51 – 75 of 382) sorted by relevance
12345678910>>...16
/openssl/doc/man3/ |
H A D | DH_new.pod | 21 DH_new() allocates and initializes a B<DH> structure. 23 DH_free() frees the B<DH> structure and its components. The values are 31 a pointer to the newly allocated structure.
|
H A D | OSSL_IETF_ATTR_SYNTAX.pod | 32 B<OSSL_IETF_ATTR_SYNTAX> is an opaque structure that represents the 37 get and set the policyAuthority field of the structure. Both routines act on 38 internal pointers of the structure and must not be freed by the application. 71 B<GENERAL_NAMES> structure or B<NULL> if the policy authority has not been
|
H A D | CMS_data_create.pod | 18 CMS_data_create_ex() creates a B<CMS_ContentInfo> structure 25 The B<CMS_ContentInfo> structure can be freed using L<CMS_ContentInfo_free(3)>. 35 Otherwise they return a pointer to the newly allocated structure.
|
H A D | DSA_new.pod | 24 DSA_new() allocates and initializes a B<DSA> structure. It is equivalent to 27 DSA_free() frees the B<DSA> structure and its components. The values are 36 to the newly allocated structure.
|
H A D | ASN1_INTEGER_get_int64.pod | 63 is NULL a new B<ASN1_INTEGER> structure is returned. If I<ai> is not NULL then 64 the existing structure will be used instead. 67 NULL a new B<BIGNUM> structure is returned. If I<bn> is not NULL then the 68 existing structure will be used instead. 107 B<ASN1_ENUMERATED> structure respectively or NULL if an error occurs. They will 110 ASN1_INTEGER_to_BN() and ASN1_ENUMERATED_to_BN() return a B<BIGNUM> structure
|
H A D | BIO_new_CMS.pod | 17 automatically translated to a BER format CMS structure of the appropriate type. 25 to finalise the structure. 39 signed, enveloped, signed structure. In this case it is the applications 50 a CMS structure on the fly.
|
H A D | SMIME_read_PKCS7.pod | 24 The parsed PKCS#7 structure is returned or B<NULL> if an 38 Otherwise the type of the returned structure can be determined 55 The parser assumes that the PKCS7 structure is always base64 65 SMIME_read_PKCS7_ex() and SMIME_read_PKCS7() return a valid B<PKCS7> structure
|
H A D | CMS_digest_create.pod | 21 CMS_digest_create_ex() creates a B<CMS_ContentInfo> structure 28 The B<CMS_ContentInfo> structure can be freed using L<CMS_ContentInfo_free(3)>. 39 Otherwise they return a pointer to the newly allocated structure.
|
H A D | OSSL_CMP_ITAV_set0.pod | 36 OSSL_CMP_ITAV_create() creates a new B<OSSL_CMP_ITAV> structure and fills it in. 52 OSSL_CMP_ITAV_new0_certProfile() creates a new B<OSSL_CMP_ITAV> structure 54 On success, ownership of the list is with the new B<OSSL_CMP_ITAV> structure. 74 return a pointer to an ITAV structure on success, or NULL on error. 86 The following code creates and sets a structure representing a generic
|
H A D | BN_generate_prime.pod | 154 freeing the structure in a loop), or B<NULL>. 163 BN_GENCB_call() calls the callback function held in the B<BN_GENCB> structure 165 B<BN_GENCB> structure that are supported: "new" style and "old" style. New 169 A B<BN_GENCB> structure should be created through a call to BN_GENCB_new(), 173 For "new" style callbacks a BN_GENCB structure should be initialised with a 184 It is possible to obtain the argument associated with a BN_GENCB structure 205 BN_GENCB_new returns a pointer to a BN_GENCB structure on success, or B<NULL> 209 structure. 217 As of OpenSSL 1.1.0 it is no longer possible to create a BN_GENCB structure 222 Instead applications should create a BN_GENCB structure using BN_GENCB_new:
|
H A D | BIO_should_retry.pod | 77 If the underlying I/O structure is in a blocking mode almost all current 84 retry even if the underlying I/O structure is blocking, if a handshake 87 on the underlying SSL structure. 93 this is done depends on the underlying I/O structure. 104 structure cannot process or return any data. This depends on the behaviour of 114 the entire structure can be read or written. 125 BIO_get_retry_BIO() returns a valid B<BIO> structure.
|
H A D | CMS_get0_SignerInfos.pod | 25 associated with a CMS signedData structure. 28 associated with a specific CMS_SignerInfo structure B<si>. Either the 33 B<si> in a pointer to an ASN1_OCTET_STRING structure. This pointer returned 60 error which can occur is if the B<cms> structure is not of type signedData
|
H A D | CMS_decrypt.pod | 7 - decrypt content from a CMS envelopedData structure 24 or AuthEnvelopedData structure. 37 CMS_decrypt_set1_pkey_and_peer() decrypts the CMS_ContentInfo structure I<cms> 47 CMS_decrypt_set1_password() decrypts the CMS_ContentInfo structure I<cms> 57 structure. 74 example looking them up in a database) and setting them in the CMS structure
|
H A D | CMS_uncompress.pod | 5 CMS_uncompress - uncompress a CMS CompressedData structure 16 CompressedData structure B<cms>. B<data> is a BIO to write the content to and 24 The only currently supported compression algorithm is zlib: if the structure
|
H A D | PKCS7_decrypt.pod | 5 PKCS7_decrypt - decrypt content from a PKCS#7 envelopedData structure 16 structure. B<pkey> is the private key of the recipient, B<cert> is the 23 to locate the appropriate (of possible several) recipients in the PKCS#7 structure.
|
H A D | DSA_SIG_new.pod | 19 DSA_SIG_new() allocates an empty B<DSA_SIG> structure. 21 DSA_SIG_free() frees the B<DSA_SIG> structure and its components. The 39 to the newly allocated structure.
|
H A D | SMIME_write_ASN1.pod | 6 - convert structure to S/MIME format 24 structure to produce an S/MIME message. 27 structure (either CMS_ContentInfo or PKCS7). If streaming is enabled then the 32 ASN.1 structure I<it> are ASN1_ITEM_rptr(PKCS7) or ASN1_ITEM_rptr(CMS_ContentInfo).
|
H A D | SMIME_read_CMS.pod | 24 The parsed CMS_ContentInfo structure is returned or NULL if an 41 Otherwise the type of the returned structure can be determined 57 The parser assumes that the CMS_ContentInfo structure is always base64 encoded 68 structure or B<NULL> if an error occurred. The error can be obtained from
|
H A D | CMS_get1_ReceiptRequest.pod | 30 structure. The B<signedContentIdentifier> field is set using I<id> and I<idlen>, 43 to SignerInfo structure B<si>. 59 corresponding CMS_ContentInfo structure can be successfully verified using 65 a signed receipt request structure or NULL if an error occurred.
|
H A D | CMS_EncryptedData_encrypt.pod | 26 CMS_EncryptedData_encrypt_ex() creates a B<CMS_ContentInfo> structure 39 The B<CMS_ContentInfo> structure can be freed using L<CMS_ContentInfo_free(3)>. 50 allocated structure.
|
H A D | PKCS7_type_is_other.pod | 5 PKCS7_type_is_other - determine content type of PKCS#7 envelopedData structure 16 structure is one of the following content types:
|
H A D | EVP_PKEY_new.pod | 62 B<EVP_PKEY> is a generic structure to hold diverse types of asymmetric keys 81 The EVP_PKEY_new() function allocates an empty B<EVP_PKEY> structure which is 107 B<EVP_PKEY> structure is associated with the engine I<e>. The I<type> argument 120 public key data. The B<EVP_PKEY> structure will be initialised without any 126 data. The B<EVP_PKEY> structure will be initialised without any private key 165 The B<EVP_PKEY> structure is used by various OpenSSL functions which require a 168 The structure returned by EVP_PKEY_new() is empty. To add a private or public 169 key to this empty structure use the appropriate functions described in 177 allocated B<EVP_PKEY> structure or NULL if an error occurred.
|
H A D | X509_NAME_get0_der.pod | 18 encoding of an B<X509_NAME> structure in B<*pder> and consisting of 20 the encoding of an B<X509_NAME> structure without copying it.
|
/openssl/crypto/asn1/ |
H A D | d2i_pr.c | 39 const char *structure; in d2i_PrivateKey_decoder() local 58 structure = "PrivateKeyInfo"; in d2i_PrivateKey_decoder() 61 structure = "type-specific"; in d2i_PrivateKey_decoder() 67 dctx = OSSL_DECODER_CTX_new_for_pkey(ppkey, "DER", structure, key_name, in d2i_PrivateKey_decoder()
|
/openssl/include/openssl/ |
H A D | asn1t.h.in | 42 * ASN1_ITEM structure and determine how it is interpreted. 53 * structure size. 71 * structure. In this case the 'utype' field 145 * for a structure called stname. 147 * If you want the same structure but a different 155 * a structure called stname. 289 * for a structure called chname. The structure 456 /* Macros for the ASN1_ADB structure */ 487 * structure, various flags such as OPTIONAL and the field name. 713 /* For print related callbacks exarg points to this structure */ [all …]
|
Completed in 29 milliseconds
12345678910>>...16