Home
last modified time | relevance | path

Searched refs:other (Results 1 – 25 of 439) sorted by relevance

12345678910>>...18

/openssl/doc/man3/
H A DUI_STRING.pod62 For all other B<UI_STRING> types, NULL is returned.
68 For all other B<UI_STRING> types, UI_get0_result_string() returns NULL
74 For all other B<UI_STRING> types, NULL is returned.
79 For all other B<UI_STRING> types, -1 is returned.
109 string for B<UIT_BOOLEAN> type UI strings, NULL for any other type.
112 B<UIT_PROMPT> and B<UIT_VERIFY> type UI strings, NULL for any other
117 -1 for any other type.
120 string for B<UIT_VERIFY> type UI strings, NULL for any other type.
124 -1 for any other type.
128 -1 for any other type.
[all …]
H A DX509_check_ca.pod16 to sign other certificates). The certificate must be a complete certificate
31 used to sign other certificates.
H A DBIO_read.pod39 return the digest and other BIOs may not support BIO_gets() at all.
65 or -1 on other errors.
70 or -1 on other errors.
77 All other functions return either the amount of data successfully read or
100 determine the cause of a retry and other I/O issues.
H A DEVP_KEYMGMT.pod55 public interface, this object is simply passed into other functions
105 EVP_KEYMGMT_fetch() may be called implicitly by other fetching
107 Any other API that uses keys will typically do this.
144 All other functions described here were added in OpenSSL 3.0.
H A DX509_get_default_cert_file.pod24 from a file and no other path is specified. If the file exists, CA certificates
30 asked to load trusted CA certificates from a directory and no other path is
58 use of the environment variable mechanism and using other methods to construct
H A DASN1_STRING_TABLE_add.pod29 local ASN1 string table based on the I<nid> along with other parameters.
35 other parameters.
H A DBIO_s_bio.pod35 the other half. Both halves must usually by handled by the same application thread
63 writes on BIO B<b> are allowed (they will return an error). Reads on the other
77 B<bio1> or B<bio2> do point to some other BIO, the values are overwritten,
88 last read attempt at the other half of the BIO pair failed due to an
104 freed due to a BIO_free_all() or SSL_free() call the other half needs to be freed.
108 on the other half of the pair and, if any data is pending, reading it and sending
H A DSSL_CTX_set_security_level.pod20 void *other, void *ex));
24 void *other, void *ex));
27 int bits, int nid, void *other,
30 int bits, int nid, void *other,
132 signature algorithms. This limit applies no matter what other custom
H A DEVP_PKEY_get_default_digest_nid.pod40 both return 1 if the message digest is advisory (that is other digests
41 can be used) and 2 if it is mandatory (other digests can not be used).
H A DSSL_get_handshake_rtt.pod27 ServerHelloDone in TLS 1.2. The other timestamp is taken when the server is
32 writing the ClientHello and early data (if any). The other is taken when
/openssl/test/recipes/
H A D20-test_mac.t153 my @other = ('-in', $tmpfile, $type);
154 push @$cmdarray, @other;
202 my @other = ("-binary", "-in", $tmpfile, "-out", $outfile, $type);
203 push @$cmdarray, @other;
/openssl/crypto/pkcs12/
H A Dp12_local.h29 ASN1_TYPE *other; member
41 ASN1_TYPE *other; /* Secret or other bag */ member
H A Dp12_sbag.c82 return bag->value.bag->value.other; in PKCS12_SAFEBAG_get0_bag_obj()
179 bag->value.other = ASN1_TYPE_new(); in PKCS12_SAFEBAG_create_secret()
180 if (bag->value.other == NULL) { in PKCS12_SAFEBAG_create_secret()
185 ASN1_TYPE_set(bag->value.other, vtype, strtmp); in PKCS12_SAFEBAG_create_secret()
H A Dp12_asn.c49 ASN1_ADB_TEMPLATE(bag_default) = ASN1_EXP(PKCS12_BAGS, value.other, ASN1_ANY, 0);
64 ASN1_ADB_TEMPLATE(safebag_default) = ASN1_EXP(PKCS12_SAFEBAG, value.other, ASN1_ANY, 0);
/openssl/apps/
H A Dsmime.c168 STACK_OF(X509) *encerts = NULL, *other = NULL; in smime_main()
498 if (!load_certs(certfile, 0, &other, NULL, "certificates")) { in smime_main()
597 p7 = PKCS7_sign_ex(NULL, NULL, other, in, flags, libctx, app_get0_propq()); in smime_main()
601 for (i = 0; i < sk_X509_num(other); i++) { in smime_main()
602 X509 *x = sk_X509_value(other, i); in smime_main()
646 if (PKCS7_verify(p7, other, store, indata, out, flags)) in smime_main()
652 signers = PKCS7_get0_signers(p7, other, flags); in smime_main()
692 OSSL_STACK_OF_X509_free(other); in smime_main()
/openssl/crypto/cms/
H A Dcms_kari.c116 CMS_OtherKeyAttribute **other, in CMS_RecipientEncryptedKey_get0_id() argument
130 if (other) in CMS_RecipientEncryptedKey_get0_id()
131 *other = NULL; in CMS_RecipientEncryptedKey_get0_id()
137 if (other) in CMS_RecipientEncryptedKey_get0_id()
138 *other = rid->d.rKeyId->other; in CMS_RecipientEncryptedKey_get0_id()
H A Dcms_local.h63 ASN1_TYPE *other; member
213 CMS_OtherKeyAttribute *other; member
230 CMS_OtherKeyAttribute *other; member
295 CMS_OtherRevocationInfoFormat *other; member
314 CMS_OtherCertificateFormat *other; member
H A Dcms_env.c74 if (cms->d.other == NULL) { in cms_enveloped_data_init()
93 if (cms->d.other == NULL) { in cms_auth_enveloped_data_init()
754 kekri->kekid->other = M_ASN1_new_of(CMS_OtherKeyAttribute); in CMS_add0_recipient_key()
755 if (kekri->kekid->other == NULL) { in CMS_add0_recipient_key()
777 if (kekri->kekid->other) { in CMS_add0_recipient_key()
778 kekri->kekid->other->keyAttrId = otherTypeId; in CMS_add0_recipient_key()
779 kekri->kekid->other->keyAttr = otherType; in CMS_add0_recipient_key()
812 if (rkid->other) in CMS_RecipientInfo_kekri_get0_id()
813 *potherid = rkid->other->keyAttrId; in CMS_RecipientInfo_kekri_get0_id()
818 if (rkid->other) in CMS_RecipientInfo_kekri_get0_id()
[all …]
H A Dcms_asn1.c32 ASN1_IMP(CMS_CertificateChoices, d.other, CMS_OtherCertificateFormat, 3)
76 ASN1_IMP(CMS_RevocationInfoChoice, d.other, CMS_OtherRevocationInfoFormat, 1)
125 ASN1_OPT(CMS_RecipientKeyIdentifier, other, CMS_OtherKeyAttribute)
187 ASN1_OPT(CMS_KEKIdentifier, other, CMS_OtherKeyAttribute)
291 ASN1_ADB_TEMPLATE(cms_default) = ASN1_EXP(CMS_ContentInfo, d.other, ASN1_ANY, 0);
/openssl/doc/man7/
H A Dpassphrase-encoding.pod42 to U+FFFF, but becomes an expansion for any other character), or failing that,
53 for other character sets, such as any ISO-8859-X encoding other than
84 other pass phrase encoding may give undefined results.
107 For other objects, it's as legitimate to use any byte sequence (such as a
116 This is default on most modern Unixes, but may involve an effort on other
151 U+0000 to U+00FF, which other non-UTF-8 character sets do not.
H A DOSSL_PROVIDER-legacy.pod28 L<EVP_MD_fetch(3)> or L<EVP_CIPHER_fetch(3)>, as well as with other
33 make sure to get implementations of this provider and none other.
98 When algorithms for other operations start appearing, the
/openssl/
H A DLICENSE.txt17 other entities that control, are controlled by, or are under common
34 and conversions to other media types.
43 editorial revisions, annotations, elaborations, or other modifications
95 (a) You must give any other recipients of the Work or
163 other commercial damages or losses), even if such Contributor
169 or other liability obligations and/or rights consistent with this
172 of any other Contributor, and only if You agree to indemnify,
/openssl/doc/designs/quic-design/
H A Dquic-requirements.md11 The OMC have specified an initial set of requirements for QUIC as well as other
42 non-goal of the initial release). Our expectation is that other libraries will
65 * Testing against other implementations is not a release requirement for the MVP.
104 * We will end up with interfaces that allow other QUIC implementations
145 The following section summarises requirements obtained from other sources and
161 other major implementations and measured by a) handshakes per second
198 * Testing against other implementations is not a release requirement for the MVP.
/openssl/crypto/perlasm/
H A DREADME.md62 j+=other(data[i]);
73 &external_label("other");
92 &call( "other");
/openssl/include/internal/
H A Dcrmf.h45 ASN1_TYPE *other; member

Completed in 69 milliseconds

12345678910>>...18