Home
last modified time | relevance | path

Searched refs:used (Results 1 – 25 of 813) sorted by relevance

12345678910>>...33

/openssl/crypto/bn/
H A Dbn_ctx.c35 unsigned used, size; member
69 unsigned int used; member
90 while (bnidx < ctx->used) { in ctxdbg()
203 if (fp < ctx->used) in BN_CTX_end()
205 ctx->used = fp; in BN_CTX_end()
232 ctx->used++; in BN_CTX_get()
293 p->used = p->size = 0; in BN_POOL_init()
318 if (p->used == p->size) { in BN_POOL_get()
339 p->used++; in BN_POOL_get()
344 if (!p->used) in BN_POOL_get()
[all …]
/openssl/test/testutil/
H A Doptions.c16 static int used[100] = { 0 }; variable
43 OPENSSL_assert(n < sizeof(used)); in test_get_argument()
46 used[n] = 1; in test_get_argument()
56 if (arg_count > (int)OSSL_NELEM(used)) in opt_check_usage()
57 n = (int)OSSL_NELEM(used); in opt_check_usage()
61 if (used[i] == 0) in opt_check_usage()
/openssl/doc/man3/
H A DSSL_get_psk_identity.pod16 SSL_get_psk_identity_hint() is used to retrieve the PSK identity hint
17 used during the connection setup related to SSL object
18 B<ssl>. Similarly, SSL_get_psk_identity() is used to retrieve the PSK
19 identity used during the connection setup.
27 no PSK identity hint was used during the connection setup.
H A DBN_CTX_new.pod22 A B<BN_CTX> is a structure that holds B<BIGNUM> temporary variables used by
24 is rather expensive when used in conjunction with repeated subroutine
25 calls, the B<BN_CTX> structure is used.
29 library context will be used. BN_CTX_new() is the same as BN_CTX_new_ex() except
30 that the default library context is always used.
35 which case the default library context will be used. BN_CTX_secure_new() is the
37 used.
44 A given B<BN_CTX> must only be used by a single thread of execution. No
H A DSSL_set_session.pod5 SSL_set_session - set a TLS/SSL session to be used during TLS/SSL connect
15 SSL_set_session() sets B<session> to be used when the TLS/SSL connection
23 SSL_set_session() before or because the same B<ssl> was already used for
27 session cache (if used). A session is considered open, if L<SSL_shutdown(3)> was
28 not called for the connection (or at least L<SSL_set_shutdown(3)> was used to
36 only be used with one SSL_CTX object (and the SSL objects created
H A DSSL_set1_initial_peer_addr.pod15 SSL_set1_initial_peer_addr() sets the initial destination peer address to be used
17 can be used only on a QUIC connection SSL object, and can be used only before a
29 The destination address used by QUIC may change over time in response to
31 SSL_set1_initial_peer_addr() configures the destination address used for initial
33 destination address being used for communication at any later time in the
H A DBIO_get_rpoll_descriptor.pod6 can be used to determine when a BIO object can next be read or written
28 which represents some kind of OS or non-OS resource which can be used to
31 BIO_get_rpoll_descriptor() outputs a descriptor which can be used to determine
33 outputs a descriptor which can be used to determine when the BIO can
41 descriptor which can be used with APIs such as select().
49 Represents the absence of a valid poll descriptor. It may be used by
61 The resource is whatever kind of handle is used by a given OS to represent
76 field I<value> can be used by the application arbitrarily as opaque values.
H A DSSL_CONF_cmd.pod68 Only used by servers.
94 Only used by servers. Requires B<-serverpref>.
105 Equivalent to B<SSL_OP_PREFER_NO_DHE_KEX>. Only used by servers.
148 value set for B<-sigalgs> will be used instead.
174 This sets the temporary curve used for ephemeral ECDH modes. Only used
409 For servers the value is used in the
518 B<SSL_OP_DH_SINGLE>. Only used by servers.
521 B<SSL_OP_ECDH_SINGLE>. Only used by servers.
526 B<SSL_OP_CIPHER_SERVER_PREFERENCE>. Only used by servers.
531 Only used by servers.
[all …]
H A DBIO_meth_new.pod81 The B<BIO_METHOD> type is a structure used for the implementation of new BIO
82 types. It provides a set of functions used by OpenSSL for the implementation
90 Note that BIO_get_new_index() can only be used 127 times before it returns an
106 used for writing arbitrary length data to the BIO respectively. This function
114 BIO_meth_get_read_ex() and BIO_meth_set_read_ex() get and set the function used
123 BIO_meth_get_puts() and BIO_meth_set_puts() get and set the function used for
134 BIO_meth_get_ctrl() and BIO_meth_set_ctrl() get and set the function used for
140 BIO_meth_get_create() and BIO_meth_set_create() get and set the function used
150 BIO_meth_get_destroy() and BIO_meth_set_destroy() get and set the function used
153 to be destroyed is passed as a parameter. The destroy function should be used
[all …]
H A DPKCS12_create.pod35 I<nid_key> and I<nid_cert> are the encryption algorithms that should be used
42 I<ctx> and property query I<propq> to be used to select algorithm implementations.
55 can all be set to zero and sensible defaults will be used.
60 MAC algorithm HMAC with SHA2-256. The MAC key derivation algorithm used
69 if set to B<KEY_SIG> the key can be used for signing only, if set to B<KEY_EX>
70 it can be used for signing and encryption. This option was useful for old
72 had restrictions on the permissible sizes of keys which could be used for
76 used for the corresponding B<friendlyName> in the PKCS12 structure instead.
78 used for the corresponding B<localKeyID> in the PKCS12 structure instead of the
82 I<keyid> then this will be used for the corresponding B<friendlyName> or
[all …]
H A DOSSL_ENCODER_CTX.pod89 encoder that is going to be used, and that may be useful for the
108 I<ctx> with a encoder, to be used to encode an input object.
111 from already added encoders, and adds them as well. This is used to build
118 This may be used to determines what encoder implementations may be used.
151 provider-native object that can be used as first input of an encoding chain,
154 These utility functions may be used by a constructor:
156 OSSL_ENCODER_INSTANCE_get_encoder() can be used to get the encoder
159 OSSL_ENCODER_INSTANCE_get_encoder_ctx() can be used to get the encoder
162 OSSL_ENCODER_INSTANCE_get_output_type() can be used to get the output type
166 OSSL_ENCODER_INSTANCE_get_output_structure() can be used to get the output
H A DRAND_set_DRBG_type.pod21 used within the library context I<ctx>. A generator of name I<drbg>
24 This specifies the type that will be used for the primary, public and
27 RAND_set_seed_source_type() specifies the seed source that will be used
29 with properties I<propq> will be fetched and used to seed the primary
46 "SEED-SRC" is used.
H A DEVP_PKEY_CTX_ctrl.pod225 EVP_PKEY_CTX_get_signature_md()gets the message digest type used
311 If not specified 65537 is used.
318 RSA key generation to I<primes>. If not specified 2 is used.
455 parameter generation. If not specified 2 is used.
465 used to select a ffdhe safe prime group of the correct size.
537 algorithm to be used with the Content Encryption Key.
550 I<ctx> used for DH key derivation.
556 for I<ctx> used for DH key derivation.
615 I<ctx> used for ECDH key derivation. Possible values are
623 for I<ctx> used for ECDH key derivation.
[all …]
H A DEVP_DigestInit.pod194 is the mechanism that should be used to set and get parameters that are used by
228 that can be used with EVP_MD_get_params().
284 there is one, and if not, the default implementation is used.
425 should not be used after the EVP_MD_CTX is freed.
517 It may be used by SHAKE-128 and SHAKE-256 to set the
524 It may be used by BLAKE2B-512 to set the output length used by
536 It is used by the MDC2 algorithm.
548 It may be used by external engines or providers.
572 Currently used by SHAKE algorithms.
701 transparent to the digest used and much more flexible.
[all …]
H A DOSSL_HPKE_CTX_new.pod86 is likely required before using these APIs. HPKE is used by various
102 used for KEM, KDF and AEAD operations.
111 The identifiers used by B<OSSL_HPKE_SUITE> are:
167 Authentication is not used.
190 HPKE contexts have a role - either sender or receiver. This is used
201 An I<OSSL_HPKE_CTX> with this role can be used with
298 on the HPKE I<suite> to be used. It returns a L<EVP_PKEY(3)> pointer
329 presented in the same order as used by the OSSL_HPKE_seal().
355 KEM as used for the overall exchange. OSSL_HPKE_keygen() can be used to
402 nonce increment to be used for the next call.
[all …]
/openssl/doc/internal/man3/
H A Devp_keymgmt_util_export_to_provider.pod38 I<keymgmt> and I<keydata> from I<pk>. This is used as a
54 evp_keymgmt_util_clear_operation_cache() can be used to explicitly
58 evp_keymgmt_util_cache_keydata() can be used to add a provider key
61 evp_keymgmt_util_cache_keyinfo() can be used to get all kinds of
65 evp_keymgmt_util_fromdata() can be used to add key object data to a
66 given key I<target> via a B<EVP_KEYMGMT> interface. This is used as a
69 In all functions that take a I<selection> argument, the selection is used to
70 constraint the information requested on export. It is also used in the cache
89 "Legacy key" is the term used for any key that has been assigned to an
/openssl/doc/designs/
H A Dhandling-some-max-defines.md21 This is a deprecated define which is useless. It is not used anywhere.
35 It is widely used throughout the codebase and by 3rd party applications.
53 used in places where XOF might be used with arbitrary output length.
62 This is used throughout the code and depended on in a subtle way. It can
65 than 512 bits will be used any time soon.
88 where fixed size arrays of EVP_MAX_IV_LENGTH are used.
112 This is used in a few places in the code. It is possible that this is
113 used by 3rd party applications to allocate some fixed buffers for single
115 longer than 256 bits will be used any time soon.
131 This macro is used in a single place in hpke to allocate a fixed buffer.
/openssl/doc/man1/
H A Dopenssl-genpkey.pod.in48 specified then standard output is used.
99 options supported depends on the public key algorithm used and its
115 algorithm used is determined by the parameters. If used this option must
234 specified 224 is used.
347 Can be used with the option B<pbits> to select one of
355 If B<algorithm> is B<"DH"> then B<"generator"> is used.
356 If B<algorithm> is B<"DHX"> then B<"fips186_2"> is used.
374 This is only used by "fips186_4" and "fips186_2" key generation.
379 This is only used by "fips186_4" and "fips186_2" key generation.
388 This is only used by "fips186_4" and "fips186_2" key generation.
[all …]
H A Dopenssl-pkcs12.pod.in78 PFX files) to be created and parsed. PKCS#12 files are used by several
169 Standard input is used by default.
182 used and iteration counts.
247 Standard input is used by default.
259 If no engine is used, the argument is taken as a file.
281 The standard CA trust store is used for chain building,
286 An input file of untrusted certificates that may be used
330 These options allow the algorithm used to encrypt the private key and
343 the '-legacy' option is used. If '-descert' is used with the '-legacy'
410 used. For PKCS#12 file parsing only B<-in> and B<-out> need to be used
[all …]
H A Dopenssl-pkeyutl.pod.in48 This command can be used to perform low-level public key
68 the B<-digest> option. This option can only be used with B<-sign> and
69 B<-verify> and must be used with the Ed25519 and Ed448 algorithms.
110 The peer key file, used by key derivation (agreement) operations.
221 When used with the B<-engine> option, it specifies to also use
240 The value I<alg> should represent a digest name as used in the
275 digest is set, then the B<DigestInfo> structure is used and its length
286 otherwise the first byte is used to specify the X9.31 digest ID. Sign,
303 explicitly set in PSS mode then the signing digest is used.
308 SHA1 is used.
[all …]
/openssl/Configurations/
H A DREADME.md4 This directory contains a few sets of files that are used for
48 used (for example on Unix, where the C
49 compiler is used instead).
67 also used to link object files and
151 thread_scheme => The type of threads is used on the
259 Note 1: any configuration table can be used as a template.
261 cannot be used as build targets.
448 be used in that case:
538 used for.
560 to be used for.
[all …]
/openssl/doc/man7/
H A Dossl-guide-libssl-introduction.pod25 An B<SSL> object is used to represent a connection to a remote peer. Once a
31 to arrive at all. In this case the B<SSL> object used for the connection is also
32 used for exchanging data with the peer.
39 bi-directional. In this case the B<SSL> object used for the connection also
46 a separate B<SSL> object is used for each one. See
49 An B<SSL_CTX> object is used to create the B<SSL> object for the underlying
50 connection. A single B<SSL_CTX> object can be used to create many connections
68 This structure is used to indicate the kind of connection you want to make, e.g.
77 set of data used for such a future connection establishment attempt is collected
86 of cryptographic algorithms that are to be used together is known as a
[all …]
H A Dprovider-rand.pod82 The parameter I<parent> specifies another rand instance to be used for
84 operating system will be used for seeding.
139 When DRBGs are used by multiple threads, there must be locking employed to
144 its parent DRBGs. From this call onwards, the DRBG can be used in a thread
150 OSSL_FUNC_rand_unlock() is used to unlock a DRBG.
197 This option is used by the OpenSSL FIPS provider and is not supported
228 can be used to seed the DRBG.
242 that can be used with the DRBG.
254 Sets the name of the underlying cipher, digest or MAC to be used.
255 It must name a suitable algorithm for the DRBG that's being used.
[all …]
H A DEVP_KDF-TLS1_PRF.pod11 The EVP_KDF-TLS1_PRF algorithm implements the PRF used by TLS versions up to
17 can be used with the EVP_KDF_fetch() function.
31 The B<OSSL_KDF_PARAM_DIGEST> parameter is used to set the message digest
34 PRF algorithm using both B<MD5> and B<SHA1> as used in TLS 1.0 and 1.1.
56 This may be used after calling EVP_KDF_derive. It returns 0 if any "***-check"
62 "master secret" is used instead of "extended master secret" Setting this to zero
70 used digest is not approved.
82 length of used key-derivation key (B<OSSL_KDF_PARAM_SECRET>) is shorter than 112
/openssl/providers/common/der/
H A DRSA.asn125 -- When rsaEncryption is used in an AlgorithmIdentifier,
31 -- When id-RSAES-OAEP is used in an AlgorithmIdentifier, the
37 -- When id-pSpecified is used in an AlgorithmIdentifier, the
43 -- When id-RSASSA-PSS is used in an AlgorithmIdentifier, the
49 -- When the following OIDs are used in an AlgorithmIdentifier,
63 -- When id-mgf1 is used in an AlgorithmIdentifier, the parameters

Completed in 65 milliseconds

12345678910>>...33