Searched refs:not (Results 251 – 275 of 1282) sorted by relevance
1...<<11121314151617181920>>...52
/openssl/doc/man3/ |
H A D | PKCS12_newpass.pod | 21 the UTF-8 encoding. If it is not valid UTF-8, it is assumed to be ISO8859-1 30 If the PKCS#12 structure does not have a password, then you must use the empty 35 with a MAC verification error. In rare cases the PKCS12 structure does not 108 Licensed under the Apache License 2.0 (the "License"). You may not use
|
H A D | X509_EXTENSION_set_object.pod | 43 B<not> be an uninitialised pointer. 50 not be freed up. 56 pointer is an internal value which must not be freed up. 91 Licensed under the Apache License 2.0 (the "License"). You may not use
|
H A D | OCSP_request_add1_nonce.pod | 52 Some responders may include a nonce in all responses even if one is not 55 Some responders cache OCSP responses and do not sign each response for 56 performance reasons. As a result they do not support nonces. 79 Licensed under the Apache License 2.0 (the "License"). You may not use
|
H A D | SSL_CTX_set_cert_cb.pod | 57 by the callback. So if an EC chain is set for a curve the client does not 58 support it will B<not> be used. 62 SSL_CTX_set_cert_cb() and SSL_set_cert_cb() do not return values. 75 Licensed under the Apache License 2.0 (the "License"). You may not use
|
H A D | SMIME_read_ASN1.pod | 23 in binary format and is not translated to canonical form. 47 To support future functionality if I<bcont> is not NULL I<*bcont> should be 53 handle most S/MIME messages more complex compound formats may not work. 81 Licensed under the Apache License 2.0 (the "License"). You may not use
|
H A D | SSL_get_version.pod | 35 SSL_is_dtls() returns 1 if the connection is using DTLS or 0 if not. 37 SSL_is_tls() returns 1 if the connection is using SSL/TLS or 0 if not. 39 SSL_is_quic() returns 1 if the connection is using QUIC or 0 if not. 147 Licensed under the Apache License 2.0 (the "License"). You may not use
|
H A D | OPENSSL_instrument_bus.pod | 37 Return value of 0 indicates that CPU is not capable of performing the 39 not available on current platform. For reference, on x86 'flush cache 48 Licensed under the Apache License 2.0 (the "License"). You may not use
|
H A D | OPENSSL_gmtime.pod | 35 are not considered. 40 than the number of seconds per day (3600). Leap seconds are not considered. 57 Licensed under the Apache License 2.0 (the "License"). You may not use
|
H A D | DEFINE_STACK_OF.pod | 118 or B<sk_I<TYPE>_unshift>() will not fail or cause memory to be allocated 125 B<sk_I<TYPE>_unshift>() will not fail or cause memory to be allocated or 135 B<sk_I<TYPE>_free>() frees up the I<sk> structure. It does I<not> free up any 229 It is not an error to call B<sk_I<TYPE>_num>(), B<sk_I<TYPE>_value>(), 234 an invalid index. An error is not raised in these conditions. 236 The underlying utility B<OPENSSL_sk_> API should not be used directly. 265 B<sk_I<TYPE>_sort>() do not return values. 281 not. 289 and was not a public API. 295 and B<sk_I<TYPE>_find_all>() calls are read-only and do not sort the [all …]
|
H A D | EVP_EncodeInit.pod | 37 plus some occasional newlines (see below). If the input data length is not a 52 bytes of input. If the data length is not divisible by 3 then a full 4 bytes is 89 output data will be produced. If B<n> is not divisible by 3 then the block is 107 if its length is not a multiple of 4 (including any padding), to be processed 110 not buffered. 114 end-of-input, subsequent bytes are not buffered, and the return value will be 118 The soft end-of-input condition is not remembered in B<ctx>, it is up to the 138 length is not a multiple of 4, i.e. it was not properly padded, -1 is 183 Licensed under the Apache License 2.0 (the "License"). You may not use
|
H A D | EVP_EncryptInit.pod | 286 not remain in memory. If the argument is NULL, nothing is done. 364 are not appropriate. 544 the tag length has not been set. 622 Do not use. 644 is not supported. 741 Otherwise gets 0 or the parameter might not be present at all. 1312 not been initialized via a call to B<EVP_CipherInit_ex2>. 1336 does not use a tag. 1349 does not support the call or on any other error. 1412 not called a default IV length is used. [all …]
|
H A D | OSSL_CMP_MSG_get0_header.pod | 43 If I<ctx> does not contain a transaction ID, a fresh one is created before. 68 or the I<ctx> does not include a Subject Alternative Name. 92 Names (SANs) and B<OSSL_CMP_OPT_SUBJECTALTNAME_NODEFAULT> is not set, 110 It assigns a pointer to the new structure to I<*msg> if I<msg> is not NULL. 122 or NULL if the respective entry does not exist and on error. 162 Licensed under the Apache License 2.0 (the "License"). You may not use
|
H A D | X509_SIG_get0.pod | 20 except the pointers returned are not constant and can be modified: 35 Licensed under the Apache License 2.0 (the "License"). You may not use
|
H A D | PKCS7_get_octet_string.pod | 21 should not be freed by the caller. 35 Licensed under the Apache License 2.0 (the "License"). You may not use
|
H A D | OSSL_CORE_MAKE_FUNC.pod | 21 reserved for internal use. They should not be used by applications or assumed 38 Licensed under the Apache License 2.0 (the "License"). You may not use
|
H A D | PKCS12_get_friendlyname.pod | 22 A UTF-8 string, or NULL if the attribute was either not present or an error occurred. 34 Licensed under the Apache License 2.0 (the "License"). You may not use
|
H A D | SSL_SESSION_get0_peer.pod | 17 B<s> or NULL if no peer certificate is available. The caller should not free the 33 Licensed under the Apache License 2.0 (the "License"). You may not use
|
/openssl/doc/man7/ |
H A D | provider-signature.pod | 173 A signature algorithm implementation may not implement all of these functions. 236 The I<params>, if not NULL, should be set on the context in a manner similar to 248 to by the I<sig> parameter and it should not exceed I<sigsize> bytes in length. 279 if I<sig> is not NULL, the signature should be written to the location pointed 280 to by I<sig>, and it should not exceed I<sigsize> bytes in length. 347 pointed to by I<rout> which should not exceed I<routsize> bytes in length. 447 NULL is used if this optional value is not set. 452 like RSA-SHA256, the "digest" and "properties" parameters should not be used. 496 otherwise the sign operation is only tried once and returns whether or not it 526 The default value of 1 causes an error during the init if the key is not FIPS [all …]
|
H A D | OSSL_PROVIDER-null.pod | 12 provider will not be accidentally accessed. 34 Licensed under the Apache License 2.0 (the "License"). You may not use
|
H A D | provider-keyexch.pod | 82 A key exchange algorithm implementation may not implement all of these functions. 112 The I<params>, if not NULL, should be set on the context in a manner similar to 130 The derived secret should be written to the location I<secret> which should not 160 Notice that not all settable parameters are also gettable, and vice versa. 192 The length of the "kdf-outlen" parameter should not exceed that of a B<size_t>. 203 usually do not need to support this gettable parameter as its sole purpose 222 The default value of 1 causes an error during the init if the key is not FIPS 232 not FIPS approved. Setting this to 0 will ignore the error and set the 266 Licensed under the Apache License 2.0 (the "License"). You may not use
|
H A D | ossl-guide-libraries-introduction.pod | 17 supplies various additional supporting APIs that are not directly cryptography 31 Applications may be written that only use C<libcrypto> capabilities and do not 69 If an application does not explicitly create a library context then the 117 time. However most OpenSSL I<data structures> are not thread-safe. For example 119 would not be thread safe to call BIO_write() from one thread while calling 135 function has been successful or not. It is considered best practice to always 146 small number of functions that do not conform to the above conventions (e.g. 204 Some encoding and decoding algorithm implementations are not FIPS algorithm 225 provider does not support the encoding or decoding of keys. 249 all API calls have correctly passed the created library context and are not [all …]
|
/openssl/ |
H A D | NOTES-NONSTOP.md | 12 This is recommended but not required. `egd` is supported at 3.0 but cannot 14 * The TNS/E platform does not support hardware randomization, so 21 may work, it has not been broadly tested. c99 is the only compiler 41 not currently available but is planned for post-2024. 138 Do not forget to include any OpenSSL cross-compiling prefix and certificate 141 The OpenSSL test suite will not run on your workstation. In order to verify the 144 is not equivalent. 147 be aware that signatures may not match between builds done under OSS and under 148 cross-compiles as the compilers do not necessarily generate identical objects. 159 **Note:** Cross-compile builds for TNS/E have not been attempted, but should
|
/openssl/doc/man1/ |
H A D | openssl-ciphers.pod.in | 54 It also does not change the default list of supported signature algorithms. 84 Note that not all protocols and flags may be available, depending on how 152 will not moved to the end of the list. 164 For example, B<DEFAULT+DES> is not valid. 177 The ciphers included in B<ALL>, but not enabled by default. Currently 179 not cover B<eNULL>, which is not included by B<ALL> (use B<COMPLEMENTOFALL> if 191 The cipher suites not enabled by B<ALL>, currently B<eNULL>. 329 Cipher suites using DES (not triple DES). 397 128 bit (not permitting 192 bit by peer) or 192 bit level of security 623 Note: the CBC modes mentioned in this RFC are not supported. [all …]
|
/openssl/test/recipes/30-test_evp_data/ |
H A D | evppkey_dsa.txt | 4 # Licensed under the Apache License 2.0 (the "License"). You may not use 271 # Test sign with a 2048 bit key with N == 160 is not allowed in fips mode 329 # Test sign with a 1024 bit key is not allowed in fips mode 337 # Test sign with SHA1 is not allowed in fips mode 345 # Test sign with a 3072 bit key with N == 224 is not allowed in fips mode 353 # Test sign with a 4096 bit key is not allowed in fips mode 361 # Test sign is not allowed in fips mode 462 # Test FIPS DSA keygen is not allowed 472 # Test DSA keygen is not approved
|
H A D | evpkdf_tls12_prf.txt | 4 # Licensed under the Apache License 2.0 (the "License"). You may not use 52 # Test that "master secret" is not not used in FIPS mode 98 Reason = digest not allowed
|
Completed in 43 milliseconds
1...<<11121314151617181920>>...52