Home
last modified time | relevance | path

Searched refs:null (Results 1 – 25 of 43) sorted by relevance

12

/openssl/doc/man3/
H A DBIO_s_null.pod5 BIO_s_null - null data sink
15 BIO_s_null() returns the null sink BIO method. Data written to
16 the null sink is discarded, reads return EOF.
20 A null sink BIO behaves in a similar manner to the Unix /dev/null
23 A null bio can be placed on the end of a chain to discard any data
26 A null sink is useful if, for example, an application wishes to digest some
29 by adding a null sink BIO to the end of the chain
33 BIO_s_null() returns the null sink BIO method.
H A DBIO_f_null.pod5 BIO_f_null - null filter
15 BIO_f_null() returns the null filter BIO method. This is a filter BIO
18 All requests to a null filter BIO are passed through to the next BIO in
19 the chain: this means that a BIO chain containing a null filter BIO
24 As may be apparent a null filter BIO is not particularly useful.
28 BIO_f_null() returns the null filter BIO method.
H A DX509_NAME_get_index_by_NID.pod47 will be written and the text written to B<buf> will be null
49 excluding the terminating null. If B<buf> is <NULL> then the amount
50 of space needed in B<buf> (excluding the final null) is returned.
H A DSSL_SESSION_get_protocol_version.pod33 does B<not> perform a null check on the provided session B<s> pointer.
H A DSSL_CTX_set_ct_validation_callback.pod96 enabled via either SSL_enable_ct() or a non-null custom callback, and 0
123 SSL_CTX_ct_is_enabled() and SSL_ct_is_enabled() return a 1 if a non-null CT
H A DRSA_meth_new.pod70 /* Can be null */
77 /* Can be null */
H A DSSL_CTX_set1_sigalgs.pod33 must be a null terminated string consisting of a colon separated list of
H A DX509_get0_signature.pod111 error (e.g. null ALGO pointer). X509_REQ_set0_signature does
/openssl/doc/man7/
H A DOSSL_PROVIDER-null.pod5 OSSL_PROVIDER-null - OpenSSL null provider
9 The OpenSSL null provider supplies no algorithms.
16 The null provider defines no properties.
20 The OpenSSL null provider supports no operations and algorithms.
H A Dossl-guide-libraries-introduction.pod243 The null provider is built in as part of the F<libcrypto> library. It contains
246 prevent that from happening you can explicitly load the null provider.
250 accidentally using the default library context. Load the null provider into the
254 See L<OSSL_PROVIDER-null(7)>.
319 L<OSSL_PROVIDER-FIPS(7)>, L<OSSL_PROVIDER-legacy(7)>, L<OSSL_PROVIDER-null(7)>,
/openssl/util/
H A Dctags.sh23 if ! type "${CTAGS}" > /dev/null; then
42 if ! type "${READTAGS}" > /dev/null 2>&1; then
H A Dshlib_wrap.sh.in36 SYSNAME=`(uname -s) 2>/dev/null`;
/openssl/test/recipes/95-test_external_oqsprovider_data/
H A Doqsprovider-externalinterop.sh42 …om:443 -groups x25519_kyber768 -servername cloudflare.com -ign_eof 2>/dev/null | grep kex=X25519Ky…
48 …om:443 -groups x25519_kyber512 -servername cloudflare.com -ign_eof 2>/dev/null | grep kex=X25519Ky…
/openssl/test/
H A Dnull.cnf10 null = null_sect
H A Djson_test.c161 BEGIN_SCRIPT(null, "serialize a single null", 0)
163 END_SCRIPT_EXPECTING_Q(null)
491 SCRIPT(null)
H A Dlhash_test.c87 int null; in test_int_lhash() member
170 if (!TEST_int_eq(b ^ dels[i].null, 0)) { in test_int_lhash()
/openssl/test/recipes/90-test_includes_data/
H A Dincludes-prov-dir.cnf11 null = null_sect
/openssl/test/recipes/95-test_external_tlsfuzzer_data/
H A Dtlsfuzzer.sh62 test -L tlslite || ln -s ../tlslite-ng/tlslite tlslite 2>/dev/null
/openssl/crypto/err/
H A Dopenssl.txt46 ASN1_R_ILLEGAL_NULL:125:illegal null
47 ASN1_R_ILLEGAL_NULL_VALUE:182:illegal null value
90 ASN1_R_NULL_IS_WRONG_LENGTH:144:null is wrong length
266 CMP_R_NULL_ARGUMENT:103:null argument
423 CONF_R_LIST_CANNOT_BE_NULL:115:list cannot be null
459 CRMF_R_NULL_ARGUMENT:109:null argument
780 EVP_R_NULL_MAC_PKEY_CTX:208:null mac pkey ctx
932 PEM_R_CIPHER_IS_NULL:127:cipher is null
1405 SSL_R_DANE_TLSA_NULL_DATA:203:dane tlsa null data
1526 SSL_R_NULL_SSL_CTX:195:null ssl ctx
[all …]
/openssl/
H A DREADME-PROVIDERS.md9 - [The Null Provider](#the-null-provider)
77 The null provider is "built-in" to libcrypto and contains no algorithm
79 automatically loaded, the null provider can be loaded instead.
/openssl/util/perl/OpenSSL/
H A DTest.pm1279 my $null = devnull();
1280 my $fileornull = sub { $_[0] ? $_[0] : $null; };
1293 $stderr=" 2> ".$null
/openssl/include/openssl/
H A Dct.h.in350 * If "pp" is not NULL and "*pp" is null, function will allocate a new pointer
377 * If "pp" is not NULL and "*pp" is null, function will allocate a new pointer
402 * If |out| is null, no SCT will be output but the length will still be returned.
403 * If |out| points to a null pointer, a string will be allocated to hold the
413 * If |psct| is not null, it will end up pointing to the parsed SCT. If it
414 * already points to a non-null pointer, the pointer will be free'd.
/openssl/test/recipes/30-test_evp_data/
H A Devppkey_rsa_common.txt626 # positive test case with null padded ciphertext
631 # positive test case with null truncated ciphertext
636 # positive test case with double null padded ciphertext
641 # positive test case with double null truncated ciphertext
751 # a positive test case with null padded ciphertext
756 # a positive test case with null truncated ciphertext
761 # a positive test case with double null padded ciphertext
766 # a positive test case with double null truncated ciphertext
824 # an otherwise valid plaintext, but with null separator missing
/openssl/crypto/
H A DREADME-sparse_array.md48 index 0 results in the allocation of a top level node full of null pointers
/openssl/.github/workflows/
H A Dcompiler-zoo.yml105 sudo tee /usr/share/keyrings/llvm-snapshot.gpg.key > /dev/null

Completed in 46 milliseconds

12