/openssl-master/test/ |
A D | endecoder_legacy_test.c | 74 const char *structure[2]; member 305 const char *structure) in test_protected_PEM() argument 438 const char *structure) in test_DER() argument 533 const char *structure = test_stanza->structure[i]; in test_key() local 553 const char *structure = test_stanza->structure[i]; in test_key() local 571 const char *structure = test_stanza->structure[i]; in test_key() local 593 test_stanza->keytype, structure); in test_key() 608 const char *structure = test_stanza->structure[i]; in test_key() local 628 const char *structure = test_stanza->structure[i]; in test_key() local 646 const char *structure = test_stanza->structure[i]; in test_key() local [all …]
|
/openssl-master/doc/man3/ |
A D | CMS_get0_RecipientInfos.pod | 46 structures associated with a CMS EnvelopedData structure. 58 CMS_RecipientInfo structure B<ri>, which must be of type CMS_RECIPINFO_TRANS. 62 the CMS_RecipientInfo structure B<ri>, which must be of type 83 parameters against the B<keyIdentifier> CMS_RecipientInfo structure B<ri>, 88 B<keylen> with the CMS_RecipientInfo structure B<ri>, which must be of type 91 CMS_RecipientInfo_decrypt() attempts to decrypt CMS_RecipientInfo structure 92 B<ri> in structure B<cms>. A key must have been associated with the structure 95 CMS_RecipientInfo_encrypt() attempts to encrypt CMS_RecipientInfo structure 96 B<ri> in structure B<cms>. A key must have been associated with the structure 111 any appropriate means it can then associated with the structure and [all …]
|
A D | CMS_add1_signer.pod | 21 structure B<cms>. 23 The CMS_ContentInfo structure should be obtained from an initial call to 25 valid CMS_ContentInfo SignedData structure. 31 structure is not complete and must be finalized either by streaming (if 35 structure, its main use is when B<CMS_REUSE_DIGEST> and B<CMS_PARTIAL> flags 44 CMS_SignerInfo structure and the CMS attribute utility functions or the 53 The returned CMS_ContentInfo structure will be valid and finalized when this 57 CMS_SignerInfo structure will not be finalized so additional attributes 67 The SignedData structure includes several CMS signedAttributes including the 85 structure just added, this can be used to set additional attributes [all …]
|
A D | PKCS7_sign_add_signer.pod | 5 PKCS7_sign_add_signer - add a signer PKCS7 signed data structure 18 key B<pkey> using message digest B<md> to a PKCS7 signed data structure 21 The PKCS7 structure should be obtained from an initial call to PKCS7_sign() 23 signed data structure. 28 Unless the B<PKCS7_REUSE_DIGEST> flag is set the returned PKCS7 structure 36 signed data structure where the simpler PKCS7_sign() function defaults are 44 digest value from the PKCS7 structure: to add a signer to an existing structure. 54 PKCS7 structure, the signer's certificate must still be supplied in the 59 The signedData structure includes several PKCS#7 authenticatedAttributes 71 structure just added, this can be used to set additional attributes [all …]
|
A D | d2i_RSAPrivateKey.pod | 139 key parameters organized in a type specific structure. 145 B<I<TYPE>> data into a type specific DER encoded structure. 157 structure defined by PKCS#1. 184 outermost structure instead of the type specific structure, and that 202 I<selection> and I<structure> as follows: 209 const char *structure = "type-specific"; 214 const char *structure = "type-specific"; 219 const char *structure = "type-specific"; 224 const char *structure = "SubjectPublicKeyInfo"; 260 empty structure such as that returned by TYPE_new(). [all …]
|
A D | ASN1_aux_cb.pod | 18 int enc_offset; /* Offset of ASN1_ENCODING structure */ 45 additional information about the ASN.1 structure. An B<ASN1_AUX> structure is 52 An B<ASN1_AUX> structure contains the following information. 78 offset into the B<ASN1_VALUE> structure where a B<CRYPTO_REF_COUNT> may be 84 offset into the B<ASN1_VALUE> structure where a B<CRYPTO_RWLOCK> may be 165 B<ASN1_PRINT_ARG> structure (see below). 171 B<ASN1_PRINT_ARG> structure (see below). 177 structure (see below). 183 structure (see below). 189 B<ASN1_STREAM_ARG> structure (see below). [all …]
|
A D | CMS_add1_recipient_cert.pod | 5 … CMS_add1_recipient_cert, CMS_add0_recipient_key - add recipients to a CMS enveloped data structure 33 data structure B<cms> as a KeyTransRecipientInfo structure. 38 data structure B<cms> as a KEKRecipientInfo structure. 40 The CMS_ContentInfo structure should be obtained from an initial call to 46 enveloped data structure where the simpler CMS_encrypt() function defaults are 49 CMS_RecipientInfo structure and the CMS attribute utility functions. 64 pointer to the CMS_RecipientInfo structure just added or NULL if an error
|
A D | PKCS7_sign.pod | 6 - create a PKCS#7 signedData structure 20 PKCS7_sign_ex() creates and returns a PKCS#7 signedData structure. 23 in the PKCS#7 structure (for example any intermediate CAs in the chain). The 39 PKCS7 structure, the signer's certificate must still be supplied in the 44 The data being signed is included in the PKCS7 structure, unless 54 The signedData structure includes several PKCS#7 authenticatedAttributes 64 If the flags B<PKCS7_STREAM> is set then the returned B<PKCS7> structure is 75 finalize the B<PKCS7> structure will give unpredictable results. 88 called to finalize the structure if streaming is not enabled. Alternative 92 PKCS#7 structure is output. [all …]
|
A D | CMS_encrypt.pod | 5 CMS_encrypt_ex, CMS_encrypt - create a CMS envelopedData structure 20 AuthEnvelopedData structure. I<certs> is a list of recipient certificates. 33 its parameters. If the cipher mode is GCM, then an AuthEnvelopedData structure 34 containing MAC is used. Otherwise an EnvelopedData structure is used. Currently 58 If the B<CMS_STREAM> flag is set a partial B<CMS_ContentInfo> structure is 61 If the B<CMS_PARTIAL> flag is set a partial B<CMS_ContentInfo> structure is 65 The data being encrypted is included in the CMS_ContentInfo structure, unless 69 If the flag B<CMS_STREAM> is set the returned B<CMS_ContentInfo> structure is 71 properly finalize the B<CMS_ContentInfo> structure will give unpredictable 80 structure. KEKRecipientInfo is also supported using the flag B<CMS_PARTIAL> [all …]
|
A D | CMS_compress.pod | 5 CMS_compress - create a CMS CompressedData structure 15 CMS_compress() creates and returns a CMS CompressedData structure. B<comp_nid> 35 If the B<CMS_STREAM> flag is set a partial B<CMS_ContentInfo> structure is 38 The compressed data is included in the CMS_ContentInfo structure, unless 42 If the flag B<CMS_STREAM> is set the returned B<CMS_ContentInfo> structure is 44 properly finalize the B<CMS_ContentInfo> structure will give unpredictable 48 PEM_write_bio_CMS_stream() finalize the structure. Alternatively finalization 57 CMS_compress() returns either a CMS_ContentInfo structure or NULL if an error
|
A D | SSL_new.pod | 5 SSL_dup, SSL_new, SSL_up_ref - create an SSL structure for a connection 17 SSL_new() creates a new B<SSL> structure which is needed to hold the 18 data for a TLS/SSL connection. The new structure inherits the settings 20 options, verification settings, timeout settings. An B<SSL> structure is 21 reference counted. Creating an B<SSL> structure for the first time increments 24 structure are freed. 27 existing B<SSL> structure. 29 The function SSL_dup() creates and returns a new B<SSL> structure from the same 107 The creation of a new SSL structure failed. Check the error stack to 110 =item Pointer to an SSL structure [all …]
|
A D | ASN1_TIME_set.pod | 74 functions set the time structure I<s> to the time represented 78 seconds in a day. If I<s> is NULL a new structure is allocated 101 functions check the syntax of the time structure I<s>. 121 converting I<s> to I<tm> structure. 149 The B<ASN1_TIME> structure corresponds to the ASN.1 structure B<Time> 174 of the return structure. 199 a pointer to a time structure or NULL if an error occurred. 208 if the structure is syntactically correct and 0 otherwise. 218 passed-in time structure has invalid syntax, for example. 228 structure on success or NULL if an error occurred. [all …]
|
A D | PKCS12_init.pod | 5 PKCS12_init, PKCS12_init_ex - Create a new empty PKCS#12 structure 16 PKCS12_init() creates an empty PKCS#12 structure. Any PKCS#7 authSafes added 17 to this structure are enclosed first within a single PKCS#7 contentInfo 20 PKCS12_init_ex() creates an empty PKCS#12 structure and assigns the supplied 26 PKCS12_init() and PKCS12_init_ex() return a valid B<PKCS12> structure or NULL
|
A D | CMS_sign.pod | 5 CMS_sign, CMS_sign_ex - create a CMS SignedData structure 20 CMS_sign_ex() creates and returns a CMS SignedData structure. 23 in the CMS structure (for example any intermediate CAs in the chain). The 45 CMS_ContentInfo structure, the signer's certificate must still be supplied in 50 The data being signed is included in the CMS_ContentInfo structure, unless 60 The SignedData structure includes several CMS signedAttributes including the 79 structure is just initialized ready to perform the signing operation. The 84 If the B<CMS_PARTIAL> flag is set a partial B<CMS_ContentInfo> structure is 90 properly finalize the B<CMS_ContentInfo> structure will give unpredictable 110 structure if streaming is not enabled. [all …]
|
A D | ASN1_OBJECT_new.pod | 17 B<ASN1_OBJECT> structure, which represents an ASN1 OBJECT IDENTIFIER. 19 ASN1_OBJECT_new() allocates and initializes an B<ASN1_OBJECT> structure. 21 ASN1_OBJECT_free() frees up the B<ASN1_OBJECT> structure I<a>. 26 Although ASN1_OBJECT_new() allocates a new B<ASN1_OBJECT> structure it 34 Otherwise it returns a pointer to the newly allocated structure.
|
A D | d2i_X509.pod | 409 the encoding of the structure I<a> to BIO I<bp> and it 413 the encoding of the structure I<a> to FILE pointer I<fp> and it 429 empty structure such as that returned by TYPE_new(). 434 of the encoded structure. 440 usage of ASN1 functions: after one structure is encoded or decoded 453 Represents a PKCS#3 DH parameters structure. 457 Represents an ANSI X9.42 DH parameters structure. 498 Allocate and encode the DER encoding of an X509 structure: 581 then the encoded structure may contain invalid data or omit the 586 Any function which encodes a structure (B<i2d_I<TYPE>>(), [all …]
|
A D | OCSP_REQUEST_new.pod | 29 OCSP_REQUEST_new() allocates and returns an empty B<OCSP_REQUEST> structure. 31 OCSP_REQUEST_free() frees up the request structure B<req>. 34 the B<OCSP_ONEREQ> structure added so an application can add additional 55 OCSP_REQUEST_new() returns an empty B<OCSP_REQUEST> structure or B<NULL> if 58 OCSP_request_add0_id() returns the B<OCSP_ONEREQ> structure containing B<cid> 67 OCSP_request_onereq_get0() returns a pointer to an B<OCSP_ONEREQ> structure 72 An OCSP request structure contains one or more B<OCSP_ONEREQ> structures 80 Create an B<OCSP_REQUEST> structure for certificate B<cert> with issuer
|
A D | ASN1_TYPE_get.pod | 23 These functions allow an B<ASN1_TYPE> structure to be manipulated. The 24 B<ASN1_TYPE> structure can contain any ASN.1 type or constructed type 39 I<t> using the ASN.1 structure I<it>. If successful it returns a pointer 40 to the ASN.1 structure corresponding to I<it> which must be freed by the 43 ASN1_TYPE_pack_sequence() attempts to encode the ASN.1 structure I<s> 56 B<V_ASN1_OBJECT> then value is an B<ASN1_OBJECT> structure. Otherwise I<type> 57 is and B<ASN1_STRING> structure. If I<type> corresponds to a primitive type 86 ASN1_TYPE_unpack_sequence() returns a pointer to an ASN.1 structure or 89 ASN1_TYPE_pack_sequence() return an B<ASN1_TYPE> structure if it succeeds or
|
A D | X509_PUBKEY_new.pod | 45 The B<X509_PUBKEY> structure represents the ASN.1 B<SubjectPublicKeyInfo> 46 structure defined in RFC5280 and used in certificates and certificate requests. 48 X509_PUBKEY_new_ex() allocates and initializes an B<X509_PUBKEY> structure 60 X509_PUBKEY_free() frees up B<X509_PUBKEY> structure I<a>. If I<a> is NULL 64 in the B<EVP_PKEY> structure I<pkey>. If I<*x> is not NULL any existing 65 public key structure will be freed. 74 d2i_PUBKEY_ex() decodes an B<EVP_PKEY> structure using B<SubjectPublicKeyInfo> 81 i2d_PUBKEY() encodes an B<EVP_PKEY> structure using B<SubjectPublicKeyInfo> 90 algorithm parameters is set to I<type> using the structure I<pval>. 118 Otherwise they return a pointer to the newly allocated structure. [all …]
|
A D | CMS_get0_type.pod | 18 CMS_get0_type() returns the content type of a CMS_ContentInfo structure as 20 CMS_ContentInfo structure based on this value. 23 structure. It should be called with CMS functions (such as L<CMS_sign(3)>, 26 flag and B<before> the structure is finalised, otherwise the results are 59 access, modify or create the embedded content in a B<CMS_ContentInfo> structure 65 CMS_get0_type() and CMS_get0_eContentType() return an ASN1_OBJECT structure.
|
A D | s2i_ASN1_IA5STRING.pod | 47 "internal" (that is, an internal C structure) and string respectively. 60 B<ASN1_IA5STRING> structure or NULL if an error occurs. 66 structure or NULL if an error occurs. 72 B<ASN1_OCTET_STRING> structure or NULL if an error occurs. 78 structure or NULL if an error occurs. 81 B<ASN1_UTF8STRING> structure or NULL if an error occurs.
|
A D | PEM_read_bio_PrivateKey.pod | 229 structure is used instead. 239 structure. 248 structure. 251 an RSA structure. However, the public key is encoded using a 261 a DSA structure. The public key is encoded using a 272 structure. The parameters are encoded using a Dss-Parms structure 277 structure. 284 an X509 structure. 294 structure. 297 structure. [all …]
|
A D | PKCS7_encrypt.pod | 6 - create a PKCS#7 envelopedData structure 20 PKCS7_encrypt_ex() creates and returns a PKCS#7 envelopedData structure. 56 If the B<PKCS7_STREAM> flag is set a partial B<PKCS7> structure is output 59 If the flag B<PKCS7_STREAM> is set the returned B<PKCS7> structure is B<not> 61 properly finalize the B<PKCS7> structure will give unpredictable 65 PEM_write_bio_PKCS7_stream() finalize the structure. Alternatively finalization 74 PKCS7_encrypt_ex() and PKCS7_encrypt() return either a PKCS7 structure
|
A D | CMS_EnvelopedData_create.pod | 25 CMS_EnvelopedData_create_ex() creates a B<CMS_ContentInfo> structure 31 structure with a type B<NID_id_smime_ct_authEnvelopedData>. B<cipher> is the 42 The B<CMS_ContentInfo> structure needs to be finalized using L<CMS_final(3)> 53 a new B<CMS_ContentInfo> structure, they are not usually used in applications. 61 allocated structure.
|
/openssl-master/doc/man1/ |
A D | openssl-crl2pkcs7.pod.in | 6 openssl-crl2pkcs7 - Create a PKCS#7 structure from a CRL and certificates 24 only" structure. 51 Specifies the output filename to write the PKCS#7 structure to or standard 57 All certificates in the file will be added to the PKCS#7 structure. This 72 Create a PKCS#7 structure from a certificate and CRL: 76 Creates a PKCS#7 structure in DER format with no CRL from several 84 The output file is a PKCS#7 signed data structure containing no signers and
|