/openssl/doc/man3/ |
H A D | BIO_find_type.pod | 29 BIO_next() returns the next BIO in a chain. It can be used to traverse all BIOs 30 in a chain or used in conjunction with BIO_find_type() to find all BIOs of a
|
H A D | X509_STORE_get0_param.pod | 27 X509_STORE_get1_objects() returns a snapshot of all objects in the store's X509 37 X509_STORE_get1_all_certs() returns a list of all certificates in the store.
|
H A D | ASN1_STRING_print_ex.pod | 21 represent all the ASN1 string types. 67 all: everything is assumed to be one byte per character. This is primarily for 87 B<ASN1_STRFLGS_RFC2253> includes all the flags required by RFC2253. It is
|
H A D | BN_mod_exp_mont.pod | 44 to speedup two exponentiations. In all other cases the function reduces to two 49 For all functions 1 is returned for success, 0 on error.
|
H A D | EVP_PKEY_print_private.pod | 45 If the key does not include all the components indicated by the function then 51 These functions all return 1 for success and 0 or a negative value for failure.
|
H A D | SSL_CTX_new.pod | 191 and be able to negotiate with all possible clients, but to only 201 disable either all previous or all subsequent protocol versions. 202 In clients, when a protocol version is disabled without disabling I<all> 203 previous protocol versions, the effect is to also disable all subsequent
|
H A D | SSL_shutdown.pod | 30 zero-initialised B<SSL_SHUTDOWN_EX_ARGS> structure. Currently, all extended 93 return B<SSL_ERROR_ZERO_RETURN>), after all application data sent by the peer 131 it is called when the application has not read all pending application data 181 application protocol in use enables the peer to ensure that all data has been 199 when all data has been received. 203 which indicates unambiguously when all data has been sent. 264 to ensure that all transmitted data was received by the peer. This is unlike a 282 When using QUIC, SSL_shutdown() or SSL_shutdown_ex() ordinarily waits until all 284 other words, the shutdown process waits until all data written by the 285 application has been sent to the peer, and until the receipt of all such data is [all …]
|
H A D | UI_create_method.pod | 70 Note that this gets fed all strings associated with a UI, one after 85 Note that this gets fed all strings associated with a UI, one after 111 In contrast, a method that builds up a dialog box would add all prompt 112 text in the writer, have all input read in the flusher and store the
|
H A D | OSSL_STORE_open.pod | 59 B<OSSL_STORE_CTX> is a context variable that holds all the internal 71 B<OSSL_STORE_CTX> with all necessary internal information. 72 The given I<ui_method> and I<ui_data> will be reused by all 121 by OSSL_STORE_open() and frees all other information that was stored in the
|
H A D | OSSL_ENCODER_CTX_new_for_pkey.pod | 41 B<OSSL_ENCODER_CTX>, finds all applicable encoder implementations and sets 42 them up, so almost all the caller has to do next is call functions like 126 and OSSL_ENCODER_CTX_set_passphrase_cb() all return 1 on success, or 0 on
|
H A D | BIO_f_base64.pod | 55 For writing, it causes all data to be written on one line without 57 For reading, it removes all expectations on newlines in the input data. 117 an error has been detected, more tests are needed to cover all the potential
|
H A D | BIO_new_CMS.pod | 23 all held in memory at once: so it is possible to encode very large structures. 24 After all content has been written through the chain BIO_flush() must be called
|
H A D | RAND_load_file.pod | 39 On all systems, if the environment variable B<RANDFILE> is set, its 53 =item On all other systems
|
H A D | EC_GFp_simple_method.pod | 34 implementation method must be provided. The functions described here all return a const pointer to … 48 implementations are not available on all platforms.
|
H A D | CTLOG_STORE_new.pod | 54 CTLOG_STORE_free(). This will delete all of the CTLOGs stored within, along 66 all CT logs in the file are successfully parsed and loaded, 0 otherwise.
|
/openssl/doc/life-cycles/ |
H A D | Makefile | 4 all: png txt target
|
/openssl/doc/internal/man3/ |
H A D | ossl_provider_new.pod | 65 /* Iterate over all loaded providers */ 104 I<OSSL_PROVIDER> is a type that holds all the necessary information 244 ossl_provider_doall_activated() iterates over all the currently 246 If no providers have been "activated" yet, it tries to activate all 266 It should return an array of I<OSSL_PARAM> to describe all the 287 that all relevant information has been copied. 343 ossl_provider_doall_activated() returns 1 if the callback was called for all 383 The functions described here were all added in OpenSSL 3.0.
|
H A D | ossl_init_thread_deregister.pod | 45 This will deregister all stop handlers (no matter which thread they were 55 The functions described here were all added in OpenSSL 3.0.
|
H A D | evp_keymgmt_newdata.pod | 37 function. They all have in common that they take a B<EVP_KEYMGMT> as 77 The functions described here were all added in OpenSSL 3.0.
|
/openssl/Configurations/ |
H A D | gentemplate.pm | 189 my @all = 192 join(',', map { "\n $_" } @all), "\n" 194 @all;
|
/openssl/doc/man7/ |
H A D | provider-rand.pod | 143 OSSL_FUNC_rand_enable_locking() allows locking to be turned on for a DRBG and all of 171 and OSSL_FUNC_rand_settable_ctx_params() all return constant L<OSSL_PARAM(3)> 181 Parameters currently recognised by built-in rands are as follows. Not all 182 parameters are relevant to, or are understood by all rands: 198 by all EVP_RAND sources. 203 additional parameters are recognised. Not all 204 parameters are relevant to, or are understood by all DRBG rands:
|
/openssl/doc/man1/ |
H A D | openssl-verification-options.pod | 53 all self-signed "root" CA certificates that are placed in the I<trust store>, 75 As of OpenSSL 1.1.0, the last of these blocks all uses when rejected or 76 enables all uses when trusted. 80 if and only if all the following conditions hold: 118 if all of the following conditions hold: 168 with no trust attributes is considered to be valid for all uses. 182 If all operations complete successfully then certificate is considered 322 The subjectKeyIdentifier must be given for all X.509v3 CA certs. 343 Checks the validity of B<all> certificates in the chain by attempting 368 chain to validate, the public keys of all the certificates must meet the [all …]
|
/openssl/crypto/hmac/ |
H A D | build.info | 11 # Now that we have defined all the arch specific variables, use the
|
/openssl/doc/designs/ddd/ |
H A D | Makefile | 28 all: $(TESTS) target
|
/openssl/crypto/property/ |
H A D | README.md | 10 unloaded relatively infrequently, if at all. 15 all of their implemented algorithms. E.g. the FIPS property would be set 38 values) of all properties and to reference these instead of duplicating
|