Home
last modified time | relevance | path

Searched refs:raw (Results 1 – 25 of 51) sorted by relevance

123

/openssl/test/
H A Dpemtest.c18 const char *raw; member
40 const char *raw = b64_pem_data[idx].raw; in test_b64() local
51 || !TEST_int_eq(len, strlen(raw)) in test_b64()
52 || !TEST_int_eq(memcmp(data, raw, strlen(raw)), 0)) in test_b64()
H A Dpunycode_test.c20 unsigned int raw[50]; member
163 for (i = 0; i < OSSL_NELEM(tc->raw); i++) in test_punycode()
164 if (tc->raw[i] == 0) in test_punycode()
167 tc->raw, i * sizeof(*tc->raw))) in test_punycode()
H A Dbio_base64_test.c188 unsigned char *raw; in test_bio_base64_run() local
202 raw = OPENSSL_zalloc(t->bytes); in test_bio_base64_run()
204 raw = genbytes(t->bytes); in test_bio_base64_run()
206 if (raw == NULL && t->bytes > 0) { in test_bio_base64_run()
214 OPENSSL_free(raw); in test_bio_base64_run()
219 elen = genb64(t->prefix, t->suffix, raw, t->bytes, t->trunc, t->encoded, in test_bio_base64_run()
222 OPENSSL_free(raw); in test_bio_base64_run()
297 || (n > 0 && memcmp(raw, out, n) != 0)) { in test_bio_base64_run()
304 OPENSSL_free(raw); in test_bio_base64_run()
/openssl/doc/man3/
H A DSSL_get0_peer_rpk.pod9 SSL_SESSION_get0_peer_rpk - raw public key (RFC7250) support
32 SSL_get0_peer_rpk() returns the peer's raw public key from SSL B<s>.
34 SSL_SESSION_get0_peer_rpk() returns the peer's raw public key from
46 When raw public keys are used, the certificate verify callback is called, and
52 The raw public key is typically taken from the certificate assigned to the
67 SSL_get0_peer_rpk() and SSL_SESSION_get0_peer_rpk() return the peer's raw
68 public key as an EVP_PKEY or NULL when the raw public key is not available.
H A DEVP_PKEY_new.pod18 - public/private key allocation and raw key handling functions
88 a raw key, otherwise the duplication will fail.
97 string for a public key algorithm that supports raw private keys, i.e one of
98 "X25519", "ED25519", "X448" or "ED448". I<key> points to the raw private key
109 algorithm that supports raw private keys, i.e. one of B<EVP_PKEY_X25519>,
119 EVP_PKEY_new_raw_private_key_ex() except that I<key> points to the raw
121 private key information. Algorithm types that support raw public keys are
127 information. Algorithm types that support raw public keys are
133 EVP_PKEY_get_raw_private_key() fills the buffer provided by I<priv> with raw
143 EVP_PKEY_get_raw_public_key() fills the buffer provided by I<pub> with raw
[all …]
H A DSSL_set1_server_cert_type.pod79 Which corresponds to a raw public key.
105 To use raw public keys on the server, set up the SSL_CTX and SSL as follows:
121 /* A certificate does not need to be specified when using raw public keys */
162 /* The server's raw public key matched the TLSA record */
165 * The server's raw public key, or public key in certificate, did not
171 * server's raw public key. This would not happen in this example,
178 To validate client raw public keys, code from the client example may need to be
H A DBIO_ADDR.pod70 BIO_ADDR_rawaddress() will write the raw address of the given
72 and will set B<*l> to be the amount of bytes the raw address
75 with B<p> set to B<NULL>. The raw address will be in network byte
82 BIO_ADDR_rawport() returns the raw port of the given B<BIO_ADDR>.
83 The raw port will be in network byte order.
H A DX509_verify_cert.pod62 When the verification target is a raw public key, rather than a certificate,
63 both functions validate the target raw public key.
65 The raw public key can be authenticated only via DANE TLSA records, either
H A DX509_ACERT_print_ex.pod35 to the specification, only the raw value is printed.
67 attributes are printed as raw string data. ASN1 encoded values are
H A DSSL_get_shared_sigalgs.pod25 sign and hash NID to B<*psignhash>. The raw signature and hash values
64 The raw values correspond to the on the wire form as defined by RFC5246 et al.
H A DX509_STORE_CTX_new.pod109 operation for the I<target> raw public key.
111 The I<target> raw public key can also be supplied separately, via
126 X509_STORE_CTX_set0_rpk() sets the target raw public key to be verified in I<ctx>
127 to I<target>, a non-NULL raw public key preempts any target certificate, which
140 I<ctx> that contains the raw public key.
H A DDSA_do_sign.pod5 DSA_do_sign, DSA_do_verify - raw DSA signature operations
H A DEVP_PKEY_fromdata.pod106 =head2 Creating an RSA keypair using raw key data
139 =head2 Creating an ECC keypair using raw key data
H A DX509_STORE_CTX_get_error.pod71 certificate being verified by the I<ctx>. It may be NULL if a raw public
465 =item B<X509_V_ERR_RPK_UNTRUSTED: raw public key untrusted, no trusted keys configured>
467 No TLS records were configured to validate the raw public key, or DANE was not
/openssl/crypto/pem/
H A Dpem_info.c65 unsigned int i, raw, ptype; in STACK_OF() local
79 raw = 0; in STACK_OF()
147 raw = 1; in STACK_OF()
154 if (!raw) { in STACK_OF()
/openssl/doc/man1/
H A Dopenssl-rsautl.pod.in27 [B<-raw>]
104 =item B<-pkcs>, B<-oaep>, B<-x931>, B<-raw>
108 For signatures, only B<-pkcs> and B<-raw> can be used.
112 Use B<-raw> and inspect the returned value manually to check if the
150 Examine the raw signed data:
152 openssl rsautl -verify -in sig -inkey key.pem -raw -hexdump
/openssl/doc/man7/
H A Dossl_store-file.pod35 loaded in raw form in its entirety and passed to the available file
41 represented as an ASN.1 OCTET STRING. In raw form, it's not easily
H A DEVP_PKEY-HMAC.pod58 a new provider side key object is created with the supplied raw key value. This
/openssl/test/recipes/75-test_quicapi_data/
H A Dssltraceref-zlib.txt98 Ack delay (raw) 0
274 Ack delay (raw) 0
279 Ack delay (raw) 0
H A Dssltraceref.txt96 Ack delay (raw) 0
272 Ack delay (raw) 0
277 Ack delay (raw) 0
/openssl/doc/HOWTO/
H A Dcertificates.txt88 was kind enough, your certificate is a raw DER thing in PEM format.
100 In the case of a raw DER thing in PEM format, and assuming that's all
/openssl/ssl/statem/
H A Dextensions_srvr.c730 PACKET cookie, raw, chhash, appcookie; in tls_parse_ctos_cookie() local
750 raw = cookie; in tls_parse_ctos_cookie()
751 data = PACKET_data(&raw); in tls_parse_ctos_cookie()
752 rawlen = PACKET_remaining(&raw); in tls_parse_ctos_cookie()
754 || !PACKET_forward(&raw, rawlen - SHA256_DIGEST_LENGTH)) { in tls_parse_ctos_cookie()
758 mdin = PACKET_data(&raw); in tls_parse_ctos_cookie()
/openssl/doc/man5/
H A Dx509v3_config.pod35 raw
95 The syntax of raw extensions is defined by the source code that parses
97 See L</Certificate Policies> for an example of a raw extension.
427 This is a I<raw> extension that supports all of the defined fields of the
579 It is also possible to use the word DER to include the raw encoded data in any
/openssl/test/recipes/04-test_pem_reading_data/
H A Ddsa-threecolumn.pem114 raw
/openssl/demos/
H A DREADME.txt69 EVP_PKEY_DSA_paramfromdata.c Load a DSA param key using raw data.

Completed in 59 milliseconds

123