/openssl/doc/man3/ |
H A D | UI_STRING.pod | 62 For all other B<UI_STRING> types, NULL is returned. 68 For all other B<UI_STRING> types, UI_get0_result_string() returns NULL 74 For all other B<UI_STRING> types, NULL is returned. 79 For all other B<UI_STRING> types, -1 is returned. 109 string for B<UIT_BOOLEAN> type UI strings, NULL for any other type. 112 B<UIT_PROMPT> and B<UIT_VERIFY> type UI strings, NULL for any other 117 -1 for any other type. 120 string for B<UIT_VERIFY> type UI strings, NULL for any other type. 124 -1 for any other type. 128 -1 for any other type. [all …]
|
H A D | X509_check_ca.pod | 16 to sign other certificates). The certificate must be a complete certificate 31 used to sign other certificates.
|
H A D | BIO_read.pod | 39 return the digest and other BIOs may not support BIO_gets() at all. 65 or -1 on other errors. 70 or -1 on other errors. 77 All other functions return either the amount of data successfully read or 100 determine the cause of a retry and other I/O issues.
|
H A D | EVP_KEYMGMT.pod | 55 public interface, this object is simply passed into other functions 105 EVP_KEYMGMT_fetch() may be called implicitly by other fetching 107 Any other API that uses keys will typically do this. 144 All other functions described here were added in OpenSSL 3.0.
|
H A D | X509_get_default_cert_file.pod | 24 from a file and no other path is specified. If the file exists, CA certificates 30 asked to load trusted CA certificates from a directory and no other path is 58 use of the environment variable mechanism and using other methods to construct
|
H A D | ASN1_STRING_TABLE_add.pod | 29 local ASN1 string table based on the I<nid> along with other parameters. 35 other parameters.
|
H A D | BIO_s_bio.pod | 35 the other half. Both halves must usually by handled by the same application thread 63 writes on BIO B<b> are allowed (they will return an error). Reads on the other 77 B<bio1> or B<bio2> do point to some other BIO, the values are overwritten, 88 last read attempt at the other half of the BIO pair failed due to an 104 freed due to a BIO_free_all() or SSL_free() call the other half needs to be freed. 108 on the other half of the pair and, if any data is pending, reading it and sending
|
H A D | SSL_CTX_set_security_level.pod | 20 void *other, void *ex)); 24 void *other, void *ex)); 27 int bits, int nid, void *other, 30 int bits, int nid, void *other, 132 signature algorithms. This limit applies no matter what other custom
|
H A D | EVP_PKEY_get_default_digest_nid.pod | 40 both return 1 if the message digest is advisory (that is other digests 41 can be used) and 2 if it is mandatory (other digests can not be used).
|
H A D | SSL_get_handshake_rtt.pod | 27 ServerHelloDone in TLS 1.2. The other timestamp is taken when the server is 32 writing the ClientHello and early data (if any). The other is taken when
|
/openssl/test/recipes/ |
H A D | 20-test_mac.t | 153 my @other = ('-in', $tmpfile, $type); 154 push @$cmdarray, @other; 202 my @other = ("-binary", "-in", $tmpfile, "-out", $outfile, $type); 203 push @$cmdarray, @other;
|
/openssl/crypto/pkcs12/ |
H A D | p12_local.h | 29 ASN1_TYPE *other; member 41 ASN1_TYPE *other; /* Secret or other bag */ member
|
H A D | p12_sbag.c | 82 return bag->value.bag->value.other; in PKCS12_SAFEBAG_get0_bag_obj() 179 bag->value.other = ASN1_TYPE_new(); in PKCS12_SAFEBAG_create_secret() 180 if (bag->value.other == NULL) { in PKCS12_SAFEBAG_create_secret() 185 ASN1_TYPE_set(bag->value.other, vtype, strtmp); in PKCS12_SAFEBAG_create_secret()
|
H A D | p12_asn.c | 49 ASN1_ADB_TEMPLATE(bag_default) = ASN1_EXP(PKCS12_BAGS, value.other, ASN1_ANY, 0); 64 ASN1_ADB_TEMPLATE(safebag_default) = ASN1_EXP(PKCS12_SAFEBAG, value.other, ASN1_ANY, 0);
|
/openssl/apps/ |
H A D | smime.c | 168 STACK_OF(X509) *encerts = NULL, *other = NULL; in smime_main() 492 if (!load_certs(certfile, 0, &other, NULL, "certificates")) { in smime_main() 591 p7 = PKCS7_sign_ex(NULL, NULL, other, in, flags, libctx, app_get0_propq()); in smime_main() 595 for (i = 0; i < sk_X509_num(other); i++) { in smime_main() 596 X509 *x = sk_X509_value(other, i); in smime_main() 640 if (PKCS7_verify(p7, other, store, indata, out, flags)) in smime_main() 646 signers = PKCS7_get0_signers(p7, other, flags); in smime_main() 686 OSSL_STACK_OF_X509_free(other); in smime_main()
|
/openssl/crypto/cms/ |
H A D | cms_kari.c | 116 CMS_OtherKeyAttribute **other, in CMS_RecipientEncryptedKey_get0_id() argument 130 if (other) in CMS_RecipientEncryptedKey_get0_id() 131 *other = NULL; in CMS_RecipientEncryptedKey_get0_id() 137 if (other) in CMS_RecipientEncryptedKey_get0_id() 138 *other = rid->d.rKeyId->other; in CMS_RecipientEncryptedKey_get0_id()
|
H A D | cms_local.h | 63 ASN1_TYPE *other; member 213 CMS_OtherKeyAttribute *other; member 230 CMS_OtherKeyAttribute *other; member 295 CMS_OtherRevocationInfoFormat *other; member 314 CMS_OtherCertificateFormat *other; member
|
H A D | cms_env.c | 74 if (cms->d.other == NULL) { in cms_enveloped_data_init() 93 if (cms->d.other == NULL) { in cms_auth_enveloped_data_init() 754 kekri->kekid->other = M_ASN1_new_of(CMS_OtherKeyAttribute); in CMS_add0_recipient_key() 755 if (kekri->kekid->other == NULL) { in CMS_add0_recipient_key() 777 if (kekri->kekid->other) { in CMS_add0_recipient_key() 778 kekri->kekid->other->keyAttrId = otherTypeId; in CMS_add0_recipient_key() 779 kekri->kekid->other->keyAttr = otherType; in CMS_add0_recipient_key() 812 if (rkid->other) in CMS_RecipientInfo_kekri_get0_id() 813 *potherid = rkid->other->keyAttrId; in CMS_RecipientInfo_kekri_get0_id() 818 if (rkid->other) in CMS_RecipientInfo_kekri_get0_id() [all …]
|
H A D | cms_asn1.c | 32 ASN1_IMP(CMS_CertificateChoices, d.other, CMS_OtherCertificateFormat, 3) 76 ASN1_IMP(CMS_RevocationInfoChoice, d.other, CMS_OtherRevocationInfoFormat, 1) 125 ASN1_OPT(CMS_RecipientKeyIdentifier, other, CMS_OtherKeyAttribute) 187 ASN1_OPT(CMS_KEKIdentifier, other, CMS_OtherKeyAttribute) 291 ASN1_ADB_TEMPLATE(cms_default) = ASN1_EXP(CMS_ContentInfo, d.other, ASN1_ANY, 0);
|
/openssl/doc/man7/ |
H A D | passphrase-encoding.pod | 42 to U+FFFF, but becomes an expansion for any other character), or failing that, 53 for other character sets, such as any ISO-8859-X encoding other than 84 other pass phrase encoding may give undefined results. 107 For other objects, it's as legitimate to use any byte sequence (such as a 116 This is default on most modern Unixes, but may involve an effort on other 151 U+0000 to U+00FF, which other non-UTF-8 character sets do not.
|
H A D | OSSL_PROVIDER-legacy.pod | 28 L<EVP_MD_fetch(3)> or L<EVP_CIPHER_fetch(3)>, as well as with other 33 make sure to get implementations of this provider and none other. 98 When algorithms for other operations start appearing, the
|
/openssl/ |
H A D | LICENSE.txt | 17 other entities that control, are controlled by, or are under common 34 and conversions to other media types. 43 editorial revisions, annotations, elaborations, or other modifications 95 (a) You must give any other recipients of the Work or 163 other commercial damages or losses), even if such Contributor 169 or other liability obligations and/or rights consistent with this 172 of any other Contributor, and only if You agree to indemnify,
|
/openssl/doc/designs/quic-design/ |
H A D | quic-requirements.md | 11 The OMC have specified an initial set of requirements for QUIC as well as other 42 non-goal of the initial release). Our expectation is that other libraries will 65 * Testing against other implementations is not a release requirement for the MVP. 104 * We will end up with interfaces that allow other QUIC implementations 145 The following section summarises requirements obtained from other sources and 161 other major implementations and measured by a) handshakes per second 198 * Testing against other implementations is not a release requirement for the MVP.
|
/openssl/crypto/perlasm/ |
H A D | README.md | 62 j+=other(data[i]); 73 &external_label("other"); 92 &call( "other");
|
/openssl/include/internal/ |
H A D | crmf.h | 45 ASN1_TYPE *other; member
|