Home
last modified time | relevance | path

Searched refs:base64 (Results 1 – 25 of 33) sorted by relevance

12

/openssl/crypto/evp/
H A Dbio_b64.c41 EVP_ENCODE_CTX *base64; member
75 ctx->base64 = EVP_ENCODE_CTX_new(); in b64_new()
76 if (ctx->base64 == NULL) { in b64_new()
98 EVP_ENCODE_CTX_free(ctx->base64); in b64_free()
128 EVP_DecodeInit(ctx->base64); in b64_read()
208 EVP_DecodeInit(ctx->base64); in b64_read()
215 EVP_DecodeInit(ctx->base64); in b64_read()
337 EVP_EncodeInit(ctx->base64); in b64_write()
463 && EVP_ENCODE_CTX_num(ctx->base64) != 0) in b64_ctrl()
491 && EVP_ENCODE_CTX_num(ctx->base64) != 0) { in b64_ctrl()
[all …]
/openssl/doc/man3/
H A DBIO_f_base64.pod5 BIO_f_base64 - base64 BIO filter
18 BIO_f_base64() returns the base64 BIO method. This is a filter
19 BIO that base64 encodes any data written through it and decodes
34 BIO_flush() on a base64 BIO that is being written through is
46 Because of the format of base64 encoding the end of the encoded
51 BIO_f_base64() returns the base64 BIO method.
88 The ambiguity of EOF in base64 encoded data can cause additional
89 data following the base64 encoded block to be misinterpreted.
H A DPEM_read_bio_ex.pod22 the possibly encrypted data, and the binary data payload (after base64 decoding).
34 If PEM_FLAG_ONLY_B64 is set, all characters are required to be valid base64
35 characters (or newlines); non-base64 characters are treated as end of input.
H A DBIO_push.pod55 I<b64> is a base64 BIO and I<f> is a file BIO.
67 by I<md1> and I<md2>, base64 encoded, and finally written to I<f>.
70 direction, that is data is read from I<f>, base64 decoded,
H A DSRP_VBASE_new.pod50 flag base64(verifier) base64(salt) username gNid userinfo(optional)
52 Note that the base64 encoding used here is non-standard so it is recommended
H A DCTLOG_STORE_new.pod47 key = <base64-encoded DER SubjectPublicKeyInfo here>
51 key = <base64-encoded DER SubjectPublicKeyInfo here>
H A DSCT_new.pod143 The LogID (see RFC 6962, Section 3.2), base64 encoded.
157 The SCT extensions, base64 encoded.
161 The SCT signature, base64 encoded.
H A DCTLOG_new.pod41 public key in base64-encoded DER form and sets the ct_log pointer to point to
42 the new CTLOG. The base64 will be decoded and the public key parsed. The CTLOG
H A DPEM_read.pod34 RFC 1421. The content is a series of base64-encoded lines, surrounded
59 are returned in B<header> and the base64-decoded content and its length are
H A DSMIME_write_CMS.pod47 SMIME_write_CMS() always base64 encodes CMS structures, there should be an
H A DSMIME_write_PKCS7.pod48 SMIME_write_PKCS7() always base64 encodes PKCS#7 structures, there
H A DSMIME_read_PKCS7.pod55 The parser assumes that the PKCS7 structure is always base64
H A DSMIME_read_CMS.pod57 The parser assumes that the CMS_ContentInfo structure is always base64 encoded
H A DSRP_create_verifier.pod58 all numeric parameters are in a non-standard base64 encoding originally designed
H A DSSL_CTX_load_verify_locations.pod69 ... (CA certificate in base64 encoding) ...
H A DPEM_read_bio_PrivateKey.pod209 this sense PEM format is simply base64 encoded data surrounded
421 ...base64 encoded data...
429 the base64-encoded encrypted data.
/openssl/apps/
H A Denc.c134 int base64 = 0, informat = FORMAT_BINARY, outformat = FORMAT_BINARY; in enc_main() local
156 base64 = 1; in enc_main()
237 base64 = 1; in enc_main()
350 if (base64 && bsize < 80) in enc_main()
357 base64 = 0; in enc_main()
360 base64 = 0; in enc_main()
362 base64 = 0; in enc_main()
364 if (base64) { in enc_main()
482 if (base64) { in enc_main()
/openssl/doc/man1/
H A Dopenssl-rand.pod.in13 [B<-base64>]
50 =item B<-base64>
52 Perform base64 encoding on the output.
H A Dopenssl-enc.pod.in21 [B<-base64>]
98 the data is base64 encoded after encryption. If decryption is set then
99 the input data is base64 decoded before being decrypted.
101 =item B<-base64>
107 If the B<-a> option is set then base64 process the data on one line.
320 base64 Base 64
429 Just base64 encode a binary file:
431 openssl base64 -in file.bin -out file.b64
435 openssl base64 -d -in file.b64 -out file.bin
447 Encrypt a file then base64 encode it (so it can be sent via mail for example)
H A Dopenssl-asn1parse.pod.in102 data in a PEM format input file will be treated as being base64 encoded and
/openssl/.github/workflows/
H A Dstatic-analysis-on-prem.yml24 run: echo ${{ secrets.COVERITY_LICENSE }} | base64 -d > /opt/coverity-analysis/bin/license.dat
27 echo ${{ secrets.COVERITY_AUTH_KEY }} | base64 -d > /auth_key_file.txt
/openssl/test/recipes/80-test_cms_data/
H A Dciphertext_from_1_1_1.cms4 Content-Transfer-Encoding: base64
/openssl/test/smime-eml/
H A DSignedInvalidMappingFromanyPolicyTest7.eml16 Content-Transfer-Encoding: base64
/openssl/util/
H A Dcheck-format-test-negatives.c93 EVP_EncodeFinal(ctx->base64, in f()
/openssl/include/openssl/
H A Dct.h.in151 * Creates a new SCT from some base64-encoded strings.
446 * Creates a new CTLOG instance with the base64-encoded SubjectPublicKeyInfo DER

Completed in 51 milliseconds

12