/openssl/test/ |
H A D | pemtest.c | 18 const char *raw; member 40 const char *raw = b64_pem_data[idx].raw; in test_b64() local 51 || !TEST_int_eq(len, strlen(raw)) in test_b64() 52 || !TEST_int_eq(memcmp(data, raw, strlen(raw)), 0)) in test_b64()
|
/openssl/doc/man3/ |
H A D | EVP_PKEY_new.pod | 18 - public/private key allocation and raw key handling functions 88 a raw key, otherwise the duplication will fail. 97 string for a public key algorithm that supports raw private keys, i.e one of 98 "X25519", "ED25519", "X448" or "ED448". I<key> points to the raw private key 109 algorithm that supports raw private keys, i.e. one of B<EVP_PKEY_X25519>, 119 EVP_PKEY_new_raw_private_key_ex() except that I<key> points to the raw 121 private key information. Algorithm types that support raw public keys are 127 information. Algorithm types that support raw public keys are 133 EVP_PKEY_get_raw_private_key() fills the buffer provided by I<priv> with raw 143 EVP_PKEY_get_raw_public_key() fills the buffer provided by I<pub> with raw [all …]
|
H A D | BIO_ADDR.pod | 66 BIO_ADDR_rawaddress() will write the raw address of the given 68 and will set B<*l> to be the amount of bytes the raw address 71 with B<p> set to B<NULL>. The raw address will be in network byte 78 BIO_ADDR_rawport() returns the raw port of the given B<BIO_ADDR>. 79 The raw port will be in network byte order.
|
H A D | SSL_get_shared_sigalgs.pod | 25 sign and hash NID to B<*psignhash>. The raw signature and hash values 64 The raw values correspond to the on the wire form as defined by RFC5246 et al.
|
H A D | DSA_do_sign.pod | 5 DSA_do_sign, DSA_do_verify - raw DSA signature operations
|
H A D | EVP_PKEY_fromdata.pod | 107 =head2 Creating an RSA keypair using raw key data 140 =head2 Creating an ECC keypair using raw key data
|
H A D | SCT_new.pod | 120 SCT_set0_signature() or SCT_set1_signature() to set the raw signature value.
|
H A D | RSA_padding_add_PKCS1_type_1.pod | 134 Do not remove the zero-padding from the decrypted raw RSA data
|
H A D | PEM_read.pod | 30 type B<name>, any additional B<header> information, and the raw
|
H A D | OPENSSL_LH_COMPFUNC.pod | 258 the raw callbacks themselves) or use the macros to declare/implement
|
H A D | EVP_PKEY_ASN1_METHOD.pod | 358 The set_priv_key() and set_pub_key() methods are used to set the raw private and
|
/openssl/crypto/pem/ |
H A D | pem_info.c | 65 unsigned int i, raw, ptype; in STACK_OF() local 79 raw = 0; in STACK_OF() 147 raw = 1; in STACK_OF() 154 if (!raw) { in STACK_OF()
|
/openssl/doc/man1/ |
H A D | openssl-rsautl.pod.in | 27 [B<-raw>] 102 =item B<-pkcs>, B<-oaep>, B<-x931> B<-raw> 106 For signatures, only B<-pkcs> and B<-raw> can be used. 143 Examine the raw signed data: 145 openssl rsautl -verify -in sig -inkey key.pem -raw -hexdump
|
H A D | openssl-sess_id.pod.in | 105 The cipher used this is the actual raw SSL or TLS cipher code, see the SSL
|
H A D | openssl-pkeyutl.pod.in | 62 This indicates that the input data is raw data, which is not hashed by any 319 "pure" variants of these algorithms so raw data can be passed directly to them
|
/openssl/doc/man7/ |
H A D | ossl_store-file.pod | 35 loaded in raw form in its entirety and passed to the available file 41 represented as an ASN.1 OCTET STRING. In raw form, it's not easily
|
H A D | EVP_PKEY-HMAC.pod | 58 a new provider side key object is created with the supplied raw key value. This
|
H A D | provider-cipher.pod | 167 This should call the raw underlying cipher function without any padding.
|
/openssl/doc/HOWTO/ |
H A D | certificates.txt | 88 was kind enough, your certificate is a raw DER thing in PEM format. 100 In the case of a raw DER thing in PEM format, and assuming that's all
|
/openssl/ssl/statem/ |
H A D | extensions_srvr.c | 696 PACKET cookie, raw, chhash, appcookie; in tls_parse_ctos_cookie() local 716 raw = cookie; in tls_parse_ctos_cookie() 717 data = PACKET_data(&raw); in tls_parse_ctos_cookie() 718 rawlen = PACKET_remaining(&raw); in tls_parse_ctos_cookie() 720 || !PACKET_forward(&raw, rawlen - SHA256_DIGEST_LENGTH)) { in tls_parse_ctos_cookie() 724 mdin = PACKET_data(&raw); in tls_parse_ctos_cookie()
|
/openssl/doc/man5/ |
H A D | x509v3_config.pod | 35 raw 95 The syntax of raw extensions is defined by the source code that parses 97 See L</Certificate Policies> for an example of a raw extension. 413 This is a I<raw> extension that supports all of the defined fields of the 565 It is also possible to use the word DER to include the raw encoded data in any
|
/openssl/test/recipes/04-test_pem_reading_data/ |
H A D | dsa-threecolumn.pem | 114 raw
|
/openssl/ssl/ |
H A D | ssl_lib.c | 6464 unsigned char *raw; in ssl_cache_cipherlist() local 6473 raw = OPENSSL_malloc(numciphers * TLS_CIPHER_LEN); in ssl_cache_cipherlist() 6474 s->s3.tmp.ciphers_raw = raw; in ssl_cache_cipherlist() 6475 if (raw == NULL) { in ssl_cache_cipherlist() 6481 raw += TLS_CIPHER_LEN) { in ssl_cache_cipherlist() 6484 && !PACKET_copy_bytes(&sslv2ciphers, raw, in ssl_cache_cipherlist()
|
/openssl/include/openssl/ |
H A D | x509v3.h.in | 80 /* The following are used for raw extensions */
|
/openssl/Configurations/ |
H A D | unix-Makefile.tmpl | 1234 | sort | uniq > deps.raw \ 1235 && cat deps.raw \ 1240 && cat deps.raw | sed -f deps.sed > deps \
|