/openssl/doc/man7/ |
H A D | passphrase-encoding.pod | 3 =encoding utf8 7 passphrase-encoding 8 - How diverse parts of OpenSSL treat pass phrases character encoding 25 Using the wrong encoding is expected to cause a decryption failure. 29 PKCS#12 is a bit different regarding pass phrase encoding. 49 encoding of the characters, which it stores as a BMPString. 53 for other character sets, such as any ISO-8859-X encoding other than 84 other pass phrase encoding may give undefined results. 102 to convert your pass phrase from your default encoding to the target encoding. 126 encoding again. [all …]
|
H A D | provider-encoder.pod | 63 that encodes DER to PEM (that one would receive the DER encoding via 68 Having the DER encoding passed via I<obj_abstract> may seem 76 The encoding using the L<OSSL_PARAM(3)> array form allows a 81 The encoding using a provider side object can only be safely used 174 PKCS#8 structure as part of the encoding. 245 The encoding functions also take an L<OSSL_PASSPHRASE_CALLBACK(3)> function 259 encoding. This is used when encoding private keys, as well as 262 If this name is invalid for the encoding implementation, the 263 implementation should refuse to perform the encoding, i.e. 274 The encoding implementation isn't obligated to use this value.
|
H A D | ossl_store-file.pod | 53 standard compliant with regards to pass phrase encoding. 56 See L<passphrase-encoding(7)> for more information. 60 L<ossl_store(7)>, L<passphrase-encoding(7)>
|
H A D | OSSL_PROVIDER-base.pod | 9 The OpenSSL base provider supplies the encoding for OpenSSL's 53 the encoding output format. Either the DER, PEM and plaintext are 101 In addition to this provider, all of these encoding algorithms are also
|
H A D | ossl_store.pod | 39 encoding on the pass phrase that the B<UI_METHOD> provides. However, 41 other encoding is undefined.
|
H A D | EVP_PKEY-EC.pod | 64 operations. The encoding conforms with Sec. 2.3.3 of the SECG SEC 1 ("Elliptic Curve 86 =item "encoding" (B<OSSL_PKEY_PARAM_EC_ENCODING>) <UTF8 string> 109 encoding the private key. The default value of 1 will include the public key. 119 encoding the exported value via EVP_PKEY_todata() depends on the underlying 122 opted for an encoding in compressed format, unconditionally. 133 Used for getting and setting the encoding of an EC public key. The public key
|
/openssl/doc/man3/ |
H A D | X509_NAME_get0_der.pod | 5 X509_NAME_get0_der - get X509_NAME DER encoding 18 encoding of an B<X509_NAME> structure in B<*pder> and consisting of 20 the encoding of an B<X509_NAME> structure without copying it.
|
H A D | EC_KEY_get_enc_flags.pod | 6 - Get and set flags for encoding EC_KEY structures 29 value of the encoding flags for the B<key>. There are two encoding flags 38 EC_KEY_get_enc_flags() returns the value of the current encoding flags for the
|
H A D | i2d_re_X509_tbs.pod | 38 and ensures that a fresh encoding is generated in case the object has been 41 The encoding of the TBSCertificate portion of a certificate is cached 42 in the B<X509> structure internally to improve encoding performance 47 the encoding is automatically renewed. Otherwise, the encoding of the
|
H A D | OSSL_ENCODER_to_bio.pod | 8 - Routines to perform an encoding 30 OSSL_ENCODER_to_data() runs the encoding process for the context I<ctx>, 41 OSSL_ENCODER_to_bio() runs the encoding process for the context I<ctx>, with 80 /* encoding failure */ 112 /* encoding failure */
|
H A D | X509_sign.pod | 48 For efficiency reasons and to work around ASN.1 encoding issues the encoding 50 internally. If the signed portion of the structure is modified the encoding 53 signature and signing will always update the encoding.
|
H A D | RSA_padding_add_PKCS1_type_1.pod | 68 with B<RSA_NO_PADDING> in order to implement OAEP with an encoding 73 does not meet the size requirements of the encoding method. 75 The following encoding methods are implemented: 103 a valid encoding for a B<rsa_len> byte RSA key in the respective 104 encoding method and stores the recovered data of at most B<tlen> bytes 108 For RSA_padding_xxx_OAEP(), B<p> points to the encoding parameter
|
H A D | PEM_read_CMS.pod | 43 - PEM object encoding routines 97 the PEM encoding. For more information on the templates, see 108 B<PEM_write_I<TYPE>>() writes the PEM encoding of the object I<a> to the file 130 L<passphrase-encoding(7)>
|
H A D | PKCS12_gen_mac.pod | 63 PKCS12_set_pbmac1_pbkdf2() make assumptions regarding the encoding of the 64 given passphrase. See L<passphrase-encoding(7)> for more information. 80 L<passphrase-encoding(7)>
|
H A D | OSSL_ENCODER_CTX_new_for_pkey.pod | 44 encoding, and I<selection> can be used to select what parts of the I<pkey> 52 the encoding named by I<output_type>, with the outermost structure named by 71 encoding. 101 The output is the DER encoding of the I<selection> of the I<pkey>.
|
H A D | X509_PUBKEY_new.pod | 99 X509_PUBKEY_set0_public_key() sets the public-key encoding of I<pub> 101 Any earlier public-key encoding in I<pub> is freed. 108 If I<penc> is not NULL the encoding of the public key itself is set 110 any earlier public-key encoding in I<pub> is freed. 115 I<*ppkalg> is set to the associated OID and the encoding consists of
|
H A D | X509_cmp.pod | 29 values of two B<X509> objects and the canonical (DER) encoding values. 34 canonical (DER) encoding values of the two objects using L<i2d_X509_NAME(3)>. 65 the comparison job. Data to be compared varies from DER encoding data, hash
|
H A D | d2i_X509.pod | 428 encoding. Unlike the C structures which can have pointers to sub-objects 429 within, the DER is a serialized encoding, suitable for sending over the 465 the encoding of the structure I<a> to BIO I<bp> and it 469 the encoding of the structure I<a> to FILE pointer I<fp> and it 554 Allocate and encode the DER encoding of an X509 structure: 659 B<i2d_I<TYPE>_bio>() or B<i2d_I<TYPE>_fp>()) may return a stale encoding if the 661 serialization. This is because some objects cache the encoding for
|
H A D | PKCS12_add_cert.pod | 52 PKCS12_add_key() makes assumptions regarding the encoding of the given pass 54 See L<passphrase-encoding(7)> for more information.
|
H A D | PKCS12_add_safe.pod | 56 PKCS12_add_safe() makes assumptions regarding the encoding of the given pass 58 See L<passphrase-encoding(7)> for more information.
|
H A D | PKCS12_SAFEBAG_create_cert.pod | 67 PKCS12_SAFEBAG_create_pkcs8_encrypt() makes assumptions regarding the encoding of the given pass 69 See L<passphrase-encoding(7)> for more information.
|
H A D | PEM_X509_INFO_read_bio_ex.pod | 52 See L<PEM_read_bio_PrivateKey(3)> and L<passphrase-encoding(7)> for details. 67 L<passphrase-encoding(7)>
|
/openssl/test/ |
H A D | asn1_encode_test.c | 595 unsigned char **encoding, int explicit_default) in make_custom_der() argument 634 *encoding = p = OPENSSL_malloc(seqbytes); in make_custom_der() 635 if (*encoding == NULL) in make_custom_der() 663 OPENSSL_assert(seqbytes == (size_t)(p - *encoding)); in make_custom_der() 673 unsigned char *encoding = NULL; in do_decode_custom() local 678 size_t encoding_length = make_custom_der(custom_data, &encoding, 1); in do_decode_custom() 684 ret = do_decode(encoding, encoding_length, expected, expected_size, in do_decode_custom() 686 OPENSSL_free(encoding); in do_decode_custom()
|
/openssl/providers/implementations/keymgmt/ |
H A D | ec_kmgmt.c | 984 char *encoding; member 1120 COPY_UTF8_PARAM(params, OSSL_PKEY_PARAM_EC_ENCODING, gctx->encoding); in ec_gen_set_params() 1154 if (gctx->encoding != NULL in ec_gen_set_group_from_params() 1156 gctx->encoding, 0)) in ec_gen_set_group_from_params() 1293 if (gctx->encoding != NULL) { in ec_gen() 1294 int flags = ossl_ec_encoding_name2id(gctx->encoding); in ec_gen() 1366 if (gctx->encoding) { in sm2_gen() 1367 int flags = ossl_ec_encoding_name2id(gctx->encoding); in sm2_gen() 1416 OPENSSL_free(gctx->encoding); in ec_gen_cleanup()
|
/openssl/doc/man1/ |
H A D | openssl-passphrase-options.pod | 24 Note that character encoding may be relevant, please see 25 L<passphrase-encoding(7)>.
|