Home
last modified time | relevance | path

Searched refs:base64 (Results 1 – 25 of 35) sorted by relevance

12

/openssl/doc/man3/
H A DBIO_f_base64.pod5 BIO_f_base64 - base64 BIO filter
18 BIO_f_base64() returns the base64 BIO method. This is a filter
19 BIO that base64 encodes any data written through it and decodes
39 Decoding stops when base64 padding is encountered, a soft end-of-input
42 (e.g. due to input characters other than valid base64 or whitespace).
50 BIO_flush() on a base64 BIO that is being written through is
61 Because of the format of base64 encoding the end of the encoded
66 BIO_f_base64() returns the base64 BIO method.
84 Read base64 encoded data from standard input and write the decoded
104 character when it occurs at the start of a base64 group of 4 encoded
[all …]
H A DEVP_EncodeInit.pod8 EVP_DecodeBlock - EVP base64 encode/decode routines
32 The EVP encode routines provide a high-level interface to base64 encoding and
36 bytes of binary data provided 4 bytes of base64 encoded data will be produced
49 For each 48 byte input block encoded 64 bytes of base64 data
105 to 80 base64 characters at a time.
115 0 to indicate that the end of the base64 input has been detected.
122 If any invalid base64 characters are encountered or if the base64 padding
127 ended with base64 padding (B<=>), or that the next 4 byte group starts with the
141 EVP_DecodeBlock() will decode the block of B<n> characters of base64 data
146 After trimming the data in B<f> MUST consist entirely of valid base64
[all …]
H A DPEM_read_bio_ex.pod22 the possibly encrypted data, and the binary data payload (after base64 decoding).
34 If PEM_FLAG_ONLY_B64 is set, all characters are required to be valid base64
35 characters (or newlines); non-base64 characters are treated as end of input.
H A DBIO_push.pod55 I<b64> is a base64 BIO and I<f> is a file BIO.
67 by I<md1> and I<md2>, base64 encoded, and finally written to I<f>.
70 direction, that is data is read from I<f>, base64 decoded,
H A DSRP_VBASE_new.pod50 flag base64(verifier) base64(salt) username gNid userinfo(optional)
52 Note that the base64 encoding used here is non-standard so it is recommended
H A DCTLOG_STORE_new.pod47 key = <base64-encoded DER SubjectPublicKeyInfo here>
51 key = <base64-encoded DER SubjectPublicKeyInfo here>
H A DSCT_new.pod143 The LogID (see RFC 6962, Section 3.2), base64 encoded.
157 The SCT extensions, base64 encoded.
161 The SCT signature, base64 encoded.
H A DCTLOG_new.pod41 public key in base64-encoded DER form and sets the ct_log pointer to point to
42 the new CTLOG. The base64 will be decoded and the public key parsed. The CTLOG
H A DPEM_read.pod34 RFC 1421. The content is a series of base64-encoded lines, surrounded
59 are returned in B<header> and the base64-decoded content and its length are
H A DSMIME_write_CMS.pod47 SMIME_write_CMS() always base64 encodes CMS structures, there should be an
H A DSMIME_write_PKCS7.pod48 SMIME_write_PKCS7() always base64 encodes PKCS#7 structures, there
H A DSMIME_read_PKCS7.pod55 The parser assumes that the PKCS7 structure is always base64
H A DSMIME_read_CMS.pod57 The parser assumes that the CMS_ContentInfo structure is always base64 encoded
H A DSRP_create_verifier.pod58 all numeric parameters are in a non-standard base64 encoding originally designed
H A DSSL_CTX_load_verify_locations.pod70 ... (CA certificate in base64 encoding) ...
H A DPEM_read_bio_PrivateKey.pod209 this sense PEM format is simply base64 encoded data surrounded
421 ...base64 encoded data...
429 the base64-encoded encrypted data.
/openssl/crypto/evp/
H A Dbio_b64.c41 EVP_ENCODE_CTX *base64; member
75 ctx->base64 = EVP_ENCODE_CTX_new(); in b64_new()
76 if (ctx->base64 == NULL) { in b64_new()
98 EVP_ENCODE_CTX_free(ctx->base64); in b64_free()
136 EVP_DecodeInit(ctx->base64); in b64_read()
182 EVP_DecodeInit(ctx->base64); in b64_read()
222 EVP_DecodeInit(ctx->base64); in b64_read()
279 i = EVP_DecodeUpdate(ctx->base64, ctx->buf, &ctx->buf_len, in b64_read()
337 EVP_EncodeInit(ctx->base64); in b64_write()
463 && EVP_ENCODE_CTX_num(ctx->base64) != 0) in b64_ctrl()
[all …]
/openssl/apps/
H A Denc.c134 int base64 = 0, informat = FORMAT_BINARY, outformat = FORMAT_BINARY; in enc_main() local
156 base64 = 1; in enc_main()
237 base64 = 1; in enc_main()
350 if (base64 && bsize < 80) in enc_main()
357 base64 = 0; in enc_main()
360 base64 = 0; in enc_main()
362 base64 = 0; in enc_main()
364 if (base64) { in enc_main()
482 if (base64) { in enc_main()
/openssl/doc/man1/
H A Dopenssl-rand.pod.in13 [B<-base64>]
50 =item B<-base64>
52 Perform base64 encoding on the output.
H A Dopenssl-enc.pod.in21 [B<-base64>]
98 the data is base64 encoded after encryption. If decryption is set then
99 the input data is base64 decoded before being decrypted.
105 =item B<-base64>
111 If the B<-a> option is set then base64 encoding produces output without any
112 newline character, and base64 decoding does not require any newlines.
326 base64 Base 64
435 Just base64 encode a binary file:
437 openssl base64 -in file.bin -out file.b64
441 openssl base64 -d -in file.b64 -out file.bin
[all …]
/openssl/.github/workflows/
H A Dstatic-analysis-on-prem.yml24 run: echo ${{ secrets.COVERITY_LICENSE }} | base64 -d > /opt/coverity-analysis/bin/license.dat
27 echo ${{ secrets.COVERITY_AUTH_KEY }} | base64 -d > /auth_key_file.txt
/openssl/test/recipes/80-test_cms_data/
H A Dciphertext_from_1_1_1.cms4 Content-Transfer-Encoding: base64
/openssl/test/smime-eml/
H A DSignedInvalidMappingFromanyPolicyTest7.eml16 Content-Transfer-Encoding: base64
/openssl/util/
H A Dcheck-format-test-negatives.c93 EVP_EncodeFinal(ctx->base64, in f()
/openssl/doc/man7/
H A Devp.pod66 L<B<EVP_Decode>I<XXX>|EVP_EncodeInit(3)> functions implement base64 encoding

Completed in 40 milliseconds

12