/openssl/doc/man3/ |
H A D | BN_add.pod | 50 BN_add() adds I<a> and I<b> and places the result in I<r> (C<r=a+b>). 51 I<r> may be the same B<BIGNUM> as I<a> or I<b>. 53 BN_sub() subtracts I<b> from I<a> and places the result in I<r> (C<r=a-b>). 54 I<r> may be the same B<BIGNUM> as I<a> or I<b>. 57 I<r> may be the same B<BIGNUM> as I<a> or I<b>. 64 BN_div() divides I<a> by I<d> and places the result in I<dv> and the 65 remainder in I<rem> (C<dv=a/d, rem=a%d>). Either of I<dv> and I<rem> may 76 BN_mod_add() adds I<a> to I<b> modulo I<m> and places the nonnegative 79 BN_mod_sub() subtracts I<b> from I<a> modulo I<m> and places the 102 BN_mod_exp() computes I<a> to the I<p>-th power modulo I<m> (C<r=a^p % [all …]
|
H A D | OCSP_resp_find_status.pod | 61 I<*revtime>, I<*thisupd> and I<*nextupd>. The I<*status> value will be one of 75 to index I<idx>, where I<idx> runs from 0 to OCSP_resp_count(bs) - 1. 80 OCSP_single_get0_status() extracts the fields of I<single> in I<*reason>, 81 I<*revtime>, I<*thisupd> and I<*nextupd>. 106 but leaves ownership of I<*pid> and I<*pname> with the caller, 120 in I<bs> unless I<flags> contains B<OCSP_NOINTERN>. 125 was found in I<certs> and I<flags> contains B<OCSP_TRUSTOTHER>. 153 OCSP_resp_find() returns the index of I<id> in I<bs> (which may be 0) 175 values and the current time + I<sec> is not before I<thisupd> and, 176 if I<maxsec> >= 0, the current time - I<maxsec> is not past I<nextupd>. [all …]
|
H A D | OSSL_PARAM_allocate_from_text.pod | 30 I<paramdefs>. If an item was found, it converts I<value> to something 32 I<< to->data >> as well as its size in I<< to->data_size >>. 41 If I<found> is not NULL, I<*found> is set to 1 if I<key> could be 44 =head2 The use of I<key> and I<value> in detail 51 When an item in I<paramdefs> has been found, I<value> is converted 58 If I<key> didn't start with "hex", I<value> is assumed to contain 62 If I<value> starts with "0x", it is assumed to contain I<value_n> 65 If I<key> started with "hex", I<value> is assumed to contain 84 If I<key> started with "hex", I<value> is assumed to contain 91 If I<key> didn't start with "hex", I<value_n> bytes from I<value> are [all …]
|
H A D | OSSL_CRMF_MSG_set0_validity.pod | 43 OSSL_CRMF_MSG_set0_validity() sets the I<notBefore> and I<notAfter> fields 45 Any of the I<notBefore> and I<notAfter> parameters may be NULL, 47 On success ownership of I<notBefore> and I<notAfter> is transferred to I<crm>. 49 OSSL_CRMF_MSG_set_certReqId() sets I<rid> as the certReqId of I<crm>. 52 for which non-NULL values are provided: I<pubkey>, I<subject>, I<issuer>, 53 and/or I<serial>. 56 while the I<subject>, I<issuer>, and I<serial> structures (if given) are copied. 62 extensions in the certTemplate of I<crm>. Consumes I<ext>. 65 according to the method I<meth> in I<crm>. 66 The library context I<libctx> and property query string I<propq>, [all …]
|
H A D | OSSL_PARAM_int.pod | 179 I<key>, I<type>, I<addr> and I<sz> arguments correspond to the I<key>, 180 I<data_type>, I<data> and I<data_size> fields of the L<OSSL_PARAM(3)> structure as 190 A parameter with name I<key>, storage I<buf>, size I<bsize> and return 195 A parameter with name I<key>, storage I<buf> and size I<bsize> is created. 201 A parameter with name I<key>, storage I<buf> and size I<bsize> is created. 205 A parameter with name I<key>, storage pointer I<*buf> and size I<bsize> 210 A parameter with name I<key>, storage pointer I<*buf> and size I<bsize> 223 I<p>. 251 by I<p> to the value referenced by I<val>. 280 referenced by I<p> to the values I<val>. [all …]
|
H A D | ASN1_TIME_set.pod | 75 by the time I<offset_day> and I<offset_sec> after the time_t value I<t>. 93 on I<str> only. 116 The I<tm_sec>, I<tm_min>, I<tm_hour>, I<tm_mday>, I<tm_wday>, I<tm_yday>, 117 I<tm_mon> and I<tm_year> fields of I<tm> structure are set to proper values, 121 converting I<s> to I<tm> structure. 124 I<from> and I<to>. If I<to> represents a time later than I<from> then 127 one or both of I<*pday> and I<*psec> will be negative. If I<to> and I<from> 137 time structures I<a> and I<b>. 221 before I<t>, 0 if I<s> equals I<t>, or 1 if I<s> is after I<t>. -2 is returned 224 ASN1_TIME_compare() returns -1 if I<a> is before I<b>, 0 if I<a> equals I<b>, [all …]
|
H A D | PKCS12_PBE_keyivgen.pod | 34 length I<passlen>, parameters I<param> and a message digest function I<md_type> 36 then used to initialise the cipher context I<ctx> with a cipher I<cipher> for 37 encryption (I<en_de>=1) or decryption (I<en_de>=0). 40 I<libctx> and property query I<propq> to select appropriate algorithm 44 based on the algorithm in I<algor> and password I<pass> of length I<passlen>. 46 returned in I<*data> of length I<datalen>. The operation is determined by I<en_de>, 47 encryption (I<en_de>=1) or decryption (I<en_de>=0). 50 I<libctx> and property query I<propq> to select appropriate algorithm 53 I<pass> is the password used in the derivation of length I<passlen>. I<pass> 57 I<salt> is the salt used in the derivation of length I<saltlen>. If the [all …]
|
H A D | X509_ATTRIBUTE.pod | 113 list of attributes I<x>. I<loc> should be in the range from 0 to 120 to the list I<x>. 121 Both I<x> and I<attr> must be non NULL or an error will occur. 128 I<obj> with type I<type> and data I<bytes> of length I<len> and then pushes it 129 to the attribute list I<x>. Both I<x> and I<attr> must be non NULL or an error 148 size I<len>. 163 data I<data> of length I<len>. If the passed in attribute I<attr> OR I<*attr> is 181 the attribute list I<attr>. I<idx> should be in the 185 index I<idx> in the attribute I<attr>. I<data> is unused and can be set to NULL. 198 objects in the list I<x> that match I<obj>. [all …]
|
H A D | OCSP_response_status.pod | 39 I<OCSP_RESPONSE_STATUS_INTERNALERROR>, I<OCSP_RESPONSE_STATUS_TRYLATER> 40 I<OCSP_RESPONSE_STATUS_SIGREQUIRED>, or I<OCSP_RESPONSE_STATUS_UNAUTHORIZED>. 43 contained in I<resp>. 46 I<status> and optionally including basic response I<bs>. 57 the library ctx I<libctx> and the property query string I<propq> (see 76 OCSP_basic_sign() signs OCSP response I<brsp> using certificate I<signer>, private key 77 I<key>, digest I<dgst> and additional certificates I<certs>. If the I<flags> option 79 I<flags> option I<OCSP_RESPID_KEY> is set then the responder is identified by key ID 88 I<NULL> if an error occurred. 90 OCSP_response_create() returns an I<OCSP_RESPONSE> structure pointer or I<NULL> [all …]
|
H A D | ASN1_EXTERN_FUNCS.pod | 64 =item I<app_data> 68 =item I<asn1_ex_new> 71 newly constructed value should be stored in I<*pval>. The I<it> parameter is a 77 =item I<asn1_ex_free> 84 =item I<asn1_ex_clear> 91 =item I<asn1_ex_d2i> 94 class I<class> into an B<ASN1_VALUE>. If I<*pval> is non-NULL then the 105 The I<asn1_ex_d2i> entry may be NULL if I<asn1_ex_d2i_ex> has been specified 110 =item I<asn1_ex_i2d> 125 The I<asn1_ex_i2d> entry may be NULL if I<asn1_ex_i2d_ex> has been specified [all …]
|
H A D | BIO_push.pod | 17 BIO_push() pushes I<b> on I<next>. 18 If I<b> is NULL the function does nothing and returns I<next>. 20 to I<next> (unless I<next> is NULL). 21 It then makes a control call on I<b> and returns I<b>. 47 which usually is I<b>, or I<next> if I<b> is NULL. 54 For these examples suppose I<md1> and I<md2> are digest BIOs, 55 I<b64> is a base64 BIO and I<f> is a file BIO. 66 the new chain is I<md1-md2-b64-f>. Data written to I<md1> will be digested 67 by I<md1> and I<md2>, base64 encoded, and finally written to I<f>. 71 and digested by I<md2> and then I<md1>. [all …]
|
H A D | OPENSSL_gmtime.pod | 20 OPENSSL_gmtime() returns the UTC time specified by I<timer> into the provided 21 I<result> argument. 23 OPENSSL_gmtime_adj() adds the offsets in I<offset_day> and I<offset_sec> to I<tm>. 25 OPENSSL_gmtime_diff() calculates the difference between I<from> and I<to>. 29 It is an error to call OPENSSL_gmtime() with I<result> equal to NULL. The 30 contents of the time_t given by I<timer> are stored into the I<result>. Calling 31 with I<timer> equal to NULL means use the current time. 34 offsets, then converts back into a I<struct tm> specified by I<tm>. Leap seconds 38 structures I<from> and I<to>. The difference in days is placed into I<*pday>, 39 the remaining seconds are placed to I<*psec>. The value in I<*psec> will be less [all …]
|
H A D | OSSL_CMP_ITAV_new_caCerts.pod | 69 It assigns NULL to I<*out> if there are no CA certificates in I<itav>, otherwise 76 It assigns NULL to I<*out> if no certificate is included in I<itav>, otherwise 81 with the optional I<newWithNew>, I<newWithOld>, and I<oldWithNew> certificates. 90 If I<newWithOld> is not NULL, it assigns to I<*newWithOld> the internal pointer 92 If I<oldWithNew> is not NULL, it assigns to I<*oldWithNew> the internal pointer 107 Data from I<cert>, if present, is preferred over data from I<crl>. 113 If I<certTemplate> is NULL then also I<keySpec> must be NULL, 135 extension of I<cert>, 151 and assigns them to I<*dpn>, I<*issuer>, and I<*thisUpdate>. 152 I<*thisUpdate> is assigned only if the I<thisUpdate> argument is not NULL. [all …]
|
H A D | ASN1_TYPE_get.pod | 27 ASN1_TYPE_get() returns the type of I<a> or 0 if it fails. 29 ASN1_TYPE_set() sets the value of I<a> to I<type> and I<value>. This 33 ASN1_TYPE_set1() sets the value of I<a> to I<type> a copy of I<value>. 35 ASN1_TYPE_cmp() compares ASN.1 types I<a> and I<b> and returns 0 if 39 I<t> using the ASN.1 structure I<it>. If successful it returns a pointer 45 B<ASN1_TYPE> is returned. If I<t> and I<*t> are not NULL the encoded type 46 is written to I<t> overwriting any existing data. If I<t> is not NULL 47 but I<*t> is NULL the returned B<ASN1_TYPE> is written to I<*t>. 52 ASN1_TYPE_set1() is determined by the I<type> parameter. 53 If I<type> is B<V_ASN1_NULL> I<value> is ignored. If I<type> is [all …]
|
H A D | EVP_PKEY_gettable_params.pod | 35 the contents of I<params>. 49 EVP_PKEY_get_int_param() retrieves a key I<pkey> integer value I<*out> 53 EVP_PKEY_get_size_t_param() retrieves a key I<pkey> size_t value I<*out> 57 EVP_PKEY_get_bn_param() retrieves a key I<pkey> BIGNUM value I<**bn> 58 associated with a name of I<key_name>. If I<*bn> is NULL then the BIGNUM 62 buffer I<str> of maximum size I<max_buf_sz> associated with a name of 65 If I<out_len> is not NULL, I<*out_len> is set to the length of the string 68 function with I<str> set to NULL. 71 buffer I<buf> of maximum size I<max_buf_sz> associated with a name of I<key_name>. 72 If I<out_len> is not NULL, I<*out_len> is set to the length of the contents. [all …]
|
H A D | OSSL_HTTP_transfer.pod | 56 NULL, else by connecting to a given I<server> optionally via a I<proxy>. 65 If I<bio> is given and I<rbio> is NULL then this I<bio> is used instead. 66 If both I<bio> and I<rbio> are given (which may be memory BIOs for instance) 68 I<bio> is used for writing requests and I<rbio> for reading responses. 72 If I<bio> is given, it is an error to provide I<proxy> or I<no_proxy> arguments, 74 If I<bio> is NULL the optional I<proxy> parameter can be used to set an 96 The parameter I<bio_update_fn>, which is optional if I<use_ssl> is 0, 98 but cannot be used when both I<bio> and I<rbio> are given. 156 optionally using proxy client credentials I<proxyuser> and I<proxypass>, 157 to connect with TLS protection ultimately to I<server> and I<port>. [all …]
|
H A D | ECDSA_SIG_new.pod | 31 Note: before OpenSSL 1.1.0, the I<r> and I<s> components were initialised. 36 ECDSA_SIG_get0() returns internal pointers the I<r> and I<s> values contained 37 in I<sig> and stores them in I<*pr> and I<*ps>, respectively. 38 The pointer I<pr> or I<ps> can be NULL, in which case the corresponding value 41 The values I<r>, I<s> can also be retrieved separately by the corresponding 44 Non-NULL I<r> and I<s> values can be set on the I<sig> by calling 63 Extract signature I<r> and I<s> values from a ECDSA I<signature> 64 of size I<signaturelen>: 82 * Do not try to access I<r> or I<s> after calling ECDSA_SIG_free(), 87 Convert I<r> and I<s> byte arrays into an ECDSA_SIG I<signature> of [all …]
|
H A D | PKCS12_create.pod | 30 I<pass> is the passphrase to use. I<name> is the B<friendlyName> to use for 32 the structure and I<cert> its corresponding certificates. I<ca>, if not B<NULL> 35 I<nid_key> and I<nid_cert> are the encryption algorithms that should be used 39 I<keytype> is the type of key. 42 I<ctx> and property query I<propq> to be used to select algorithm implementations. 54 The parameters I<nid_key>, I<nid_cert>, I<iter>, I<mac_iter> and I<keytype> 75 If I<name> is B<NULL> and I<cert> contains an I<alias> then this will be 77 Similarly, if I<pkey> is NULL and I<cert> contains a I<keyid> then this will be 81 For all certificates in I<ca> then if a certificate contains an I<alias> or 85 Either I<pkey>, I<cert> or both can be B<NULL> to indicate that no key or [all …]
|
H A D | DH_get0_pqg.pod | 45 A DH object contains the parameters I<p>, I<q> and I<g>. Note that the I<q> 49 The I<p>, I<q> and I<g> parameters can be obtained by calling DH_get0_pqg(). 50 If the parameters have not yet been set then I<*p>, I<*q> and I<*g> will be set 54 Any of the out parameters I<p>, I<q>, and I<g> can be NULL, in which case no 57 The I<p>, I<q> and I<g> values can be set by calling DH_set0_pqg() and passing 58 the new values for I<p>, I<q> and I<g> as parameters to the function. Calling 62 DH_set0_pqg() also checks if the parameters associated with I<p> and I<g> and 64 prime group then the value of I<q> will be set to q = (p - 1) / 2 if I<q> is 65 NULL. The optional length parameter will be set to BN_num_bits(I<q>) if I<q> 74 Any of the out parameters I<pub_key> and I<priv_key> can be NULL, in which case [all …]
|
H A D | OSSL_HPKE_CTX_new.pod | 220 I<labellen> parameters, and for the length of the string I<pskid> for HPKE 257 I<pub> of size I<publen>, and an optional I<info> parameter of size I<infolen>, 270 I<aad> of size I<aadlen>, and returns the ciphertext I<ct> of size I<ctlen>. 299 for the private value I<priv> and a encoded public key I<pub> of size I<publen>. 307 parameter of size I<ikmlen>. If either I<ikm> is NULL or I<ikmlen> is zero, 320 size I<ctlen> using the I<ctx> and additional authenticated data I<aad> of 321 size I<aadlen>, to produce the plaintext I<pt> of size I<ptlen>. 339 supplied label I<label> of size I<labellen>, to produce a secret I<secret> 363 encoded pub key I<pub> of size I<publen> into the B<OSSL_HPKE_CTX> I<ctx> before 373 I<psk> of size I<psklen> into the I<ctx>. If required this must be called [all …]
|
H A D | X509_REQ_get_attr.pod | 36 in the I<req> attribute list. The search starts at the position after I<lastpos>. 39 the remaining attributes. I<lastpos> can be set to any negative value on the 43 it passes the numerical identifier (NID) I<nid> associated with the object. 47 I<req> attribute list. I<loc> should be in the range from 0 to 51 the I<req> objects list of attributes. An error occurs if I<req> is NULL. 54 to the I<req> object's attribute list. An error will occur if either the 59 I<obj> with type I<type> and data I<bytes> of length I<len> and then pushes it 60 to the I<req> object's attribute list. I<req> must be non NULL or an error 68 that it passes a name I<attrname> associated with the object. 80 I<obj> in the attribute list. [all …]
|
H A D | EVP_PKEY_settable_params.pod | 30 EVP_PKEY_set_params() sets one or more I<params> into a I<pkey>. 33 EVP_PKEY_settable_params() returns a constant list of I<params> indicating 37 EVP_PKEY_set_int_param() sets an integer value I<in> into a key I<pkey> for the 38 associated field I<key_name>. 40 EVP_PKEY_set_size_t_param() sets an size_t value I<in> into a key I<pkey> for 41 the associated field I<key_name>. 43 EVP_PKEY_set_bn_param() sets the BIGNUM value I<bn> into a key I<pkey> for the 44 associated field I<key_name>. 46 EVP_PKEY_set_utf8_string_param() sets the UTF8 string I<str> into a key I<pkey> 47 for the associated field I<key_name>. [all …]
|
/openssl/doc/internal/man3/ |
H A D | OSSL_METHOD_STORE.pod | 72 the provider I<prov> to the I<store> as an instance of an algorithm indicated by 73 I<nid> and the property definition I<properties>, unless the I<store> already 74 has a method from the same provider with the same I<nid> and I<properties>. 79 the I<store>. 81 ossl_method_store_remove() removes the I<method> identified by I<nid> from the 82 I<store>. 84 ossl_method_store_fetch() queries I<store> for a method identified by I<nid> 88 The result, if any, is returned in I<*method>, and its provider in I<*prov>. 98 I<prop_query>. 104 provider I<prov>, with the property query I<prop_query> in the I<store>. [all …]
|
H A D | OSSL_SAFE_MATH_SIGNED.pod | 38 suffix B<I<NAME>>. 41 suffix B<I<NAME>>. 43 safe_add_TYPE() adds the two arguments I<a> and I<b> together. 45 safe_sub_TYPE() subtracts I<b> from I<a>. 47 safe_mul_TYPE() multiplies the two arguments I<a> and I<b> together. 49 safe_div_TYPE() divides I<a> by I<b>. 51 safe_mod_TYPE() calculates the remainder when I<a> is divided by I<b>. 53 safe_div_round_up_TYPE() calculates I<a> / I<b> + (I<a> % I<b> != 0). 54 I.e. it computes the quotient of I<a> and I<b> rounding any remainder towards 57 safe_muldiv_TYPE() multiplies I<a> and I<b> together and divides the [all …]
|
H A D | ossl_cmp_certreq_new.pod | 72 with the given I<certReqId> and I<si> values and optionally with I<cert>, 73 I<chain>, and I<caPubs>. The I<cert>, I<chain>, and I<caPubs> arguments 75 The I<encryption_recip> is currently unsupported. 77 is B<rejected> and I<unprotectedErrors> is nonzero. 91 The list of all CMP PKIMessage I<bodytype>s is: 122 ossl_cmp_rp_new() creates a Revocation Response message with I<si> and I<cid>. 124 and I<unprotectedErrors> is nonzero. 127 received certificate with the given I<certReqId>. 135 I<crid>. 138 I<crid> and pollAfter to I<poll_after>. [all …]
|