/openssl-master/doc/man3/ |
A D | CMS_get0_type.pod | 5 …1_eContentType, CMS_get0_eContentType, CMS_get0_content - get and set CMS content types and content 18 CMS_get0_type() returns the content type of a CMS_ContentInfo structure as 22 CMS_set1_eContentType() sets the embedded content type of a CMS_ContentInfo 30 content type. 33 containing the embedded content. 43 using OBJ_obj2nid(). For the currently supported content types the following 54 content pointer. That means that for example: 58 B<*pconf> could be NULL if there is no embedded content. Applications can 59 access, modify or create the embedded content in a B<CMS_ContentInfo> structure 61 embedded content as it is normally set by higher level functions.
|
A D | SSL_CTX_set_msg_callback.pod | 57 This is set to 0 for the SSL3_RT_HEADER pseudo content type (see NOTES below). 61 This is one of the content type values defined in the protocol specification 64 messages). Alternatively it may be a "pseudo" content type. These pseudo 65 content types are used to signal some other event in the processing of data (see 71 case of pseudo content types), which consists of I<len> bytes. The buffer is no 101 Pseudo content type values may be sent at various points during the processing 102 of data. The following pseudo content types are currently defined: 114 records the content type in the record header is always 115 SSL3_RT_APPLICATION_DATA. The real content type for the record is contained in 116 an "inner" content type. B<buf> contains the encoded "inner" content type byte. [all …]
|
A D | PKCS7_type_is_other.pod | 5 PKCS7_type_is_other - determine content type of PKCS#7 envelopedData structure 15 PKCS7_type_is_other() returns the whether the content type of a PKCS#7 envelopedData 16 structure is one of the following content types: 27 PKCS7_type_is_other() returns either 0 if the content type is matched or 1 otherwise.
|
A D | CMS_verify.pod | 21 chain verification. B<indata> is the detached content if the content is not 22 present in B<cms>. The content is written to B<out> if it is not NULL. 36 the content is detached B<indata> cannot be B<NULL>. 49 Finally the signed content is read (and written to B<out> if it is not NULL) 65 from the content. If the content is not of type B<text/plain> then an error is 78 If B<CMS_NO_CONTENT_VERIFY> is set then the content digest is not checked. 95 setting B<CMS_NO_CONTENT_VERIFY> will totally disable all content verification 96 and any modified content will be considered valid. This combination is however 97 useful if one merely wishes to write the content to B<out> and its validity 120 The lack of single pass processing means that the signed content must all
|
A D | SMIME_write_ASN1.pod | 28 content must be supplied via I<data>. 29 I<flags> is an optional set of flags. I<ctype_nid> is the NID of the content 30 type, I<econt_nid> is the NID of the embedded content type and I<mdalgs> is a 48 the content, this only makes sense if B<CMS_DETACHED> is also set. 58 If streaming is performed the content is output in BER format using indefinite 60 content where the content is absent and DER format is used.
|
A D | CMS_decrypt.pod | 6 content from a CMS envelopedData structure 20 CMS_decrypt() extracts and decrypts the content from a CMS EnvelopedData 22 B<cert> is the recipient's certificate, B<out> is a BIO to write the content to 25 The B<dcont> parameter is used in the rare case where the encrypted content 45 the content: this will typically output garbage and may (but is not guaranteed 51 content encryption key. Applications should use this flag with 67 from the content. If the content is not of type B<text/plain> then an error is
|
A D | PKCS7_decrypt.pod | 5 PKCS7_decrypt - decrypt content from a PKCS#7 envelopedData structure 15 PKCS7_decrypt() extracts and decrypts the content from a PKCS#7 envelopedData 17 recipients certificate, B<data> is a BIO to write the content to and 28 from the content. If the content is not of type B<text/plain> then an error is
|
A D | CMS_uncompress.pod | 15 CMS_uncompress() extracts and uncompresses the content from a CMS 16 CompressedData structure B<cms>. B<data> is a BIO to write the content to and 19 The B<dcont> parameter is used in the rare case where the compressed content 33 from the content. If the content is not of type B<text/plain> then an error is
|
A D | CMS_EncryptedData_decrypt.pod | 19 symmetric I<key> of size I<keylen> bytes. I<out> is a BIO to write the content 21 I<dcont> is used in the rare case where the encrypted content is detached. It 27 from the content. If the content is not of type B<text/plain> then an error is
|
A D | SMIME_write_CMS.pod | 19 B<CMS_ContentInfo> structure. If streaming is enabled then the content must be 31 the content, this only makes sense if B<CMS_DETACHED> is also set. 41 If streaming is performed the content is output in BER format using indefinite 43 content where the content is absent and DER format is used.
|
A D | SMIME_write_PKCS7.pod | 19 structure. If streaming is enabled then the content must be supplied in the 31 are added to the content, this only makes sense if B<PKCS7_DETACHED> 42 If streaming is performed the content is output in BER format using indefinite 44 content where the content is absent and DER format is used.
|
A D | PKCS7_verify.pod | 21 chain verification). B<indata> is the signed data if the content is not 22 present in B<p7> (that is it is detached). The content is written to B<out> 38 the content is detached B<indata> cannot be B<NULL>. If the content is 40 embedded and external content. To treat this as an error, use the flag 54 Finally the signed content is read (and written to B<out> is it is not NULL) and 68 from the content. If the content is not of type B<text/plain> then an error is 90 useful if one merely wishes to write the content to B<out> and its validity
|
A D | BIO_new_CMS.pod | 24 After all content has been written through the chain BIO_flush() must be called 35 Any content written through the filter is used verbatim: no canonical 40 responsibility to set the inner content type of any outer CMS_ContentInfo
|
A D | CMS_final.pod | 17 appropriate fields. The parameter B<data> contains the content to be 18 processed. The B<dcont> parameter contains a BIO to write content to after
|
A D | ASN1_STRING_length.pod | 31 ASN1_STRING_length() returns the length of the content of I<x>. 44 are identical. The string types and content are compared. 82 ASN1_STRING_length() returns the length of the content of I<x>.
|
A D | CMS_get0_RecipientInfos.pod | 97 first and the content encryption key must be available: for example by a 113 with a NULL key to decrypt the enveloped content. 117 an appropriate CMS_RecipientInfo structure to make the content encrypt key 119 CMS_add1_recipient_cert() and finally encrypt the content encryption key
|
/openssl-master/test/ |
A D | cmsapitest.c | 29 CMS_ContentInfo* content = NULL; in test_encrypt_decrypt() local 38 content = CMS_encrypt(certstack, msgbio, cipher, CMS_TEXT); in test_encrypt_decrypt() 39 if (!TEST_ptr(content)) in test_encrypt_decrypt() 42 if (!TEST_true(CMS_decrypt(content, privkey, cert, NULL, outmsgbio, in test_encrypt_decrypt() 56 CMS_ContentInfo_free(content); in test_encrypt_decrypt()
|
A D | generate_ssl_tests.pl | 145 my $content = <INPUT>; 147 eval $content;
|
A D | smcont.txt | 1 Somewhat longer test content for OpenSSL CMS utility to handle, and a bit longer...
|
/openssl-master/doc/man7/ |
A D | ossl_store-file.pod | 24 Since files come in all kinds of formats and content types, the 'file' 34 If the file isn't determined to be formatted as PEM, the content is 38 Each file handler is expected to handle PEM and non-PEM content as 39 appropriate. Some may refuse non-PEM content for the sake of
|
/openssl-master/engines/ |
A D | e_loader_attic.txt | 9 ATTIC_R_AMBIGUOUS_CONTENT_TYPE:100:ambiguous content type 19 ATTIC_R_UNSUPPORTED_CONTENT_TYPE:108:unsupported content type
|
/openssl-master/external/perl/Text-Template-1.56/lib/Text/ |
A D | Template.pm | 208 my @content; 219 push @content, [ $state, $cur_item, $lineno ] if $cur_item ne ''; 236 push @content, [ $state, $cur_item, $prog_start ] if $cur_item ne ''; 264 push @content, [ $state, $cur_item, $lineno ] if $cur_item ne ''; 271 $self->{SOURCE} = \@content;
|
/openssl-master/doc/man1/ |
A D | openssl-cms.pod.in | 93 [B<-content> I<filename>] 216 Verify a CMS B<DigestedData> type and output the content. 232 B<EncryptedData> type and output the content. 237 B<EncryptedData> type and output the content. 245 B<Data> type and output the content. 309 content format is detected. 508 =item B<-content> I<filename> 518 Do not verify signed content signatures. 658 B<-sign> operation if the content is not detached. 828 openssl cms -verify -inform PEM -in signature.pem -content content.txt [all …]
|
A D | openssl-smime.pod.in | 39 [B<-content> I<file>] 146 =item B<-content> I<filename> 148 This specifies a file containing the detached content, this is only 150 structure is using the detached signature form where the content is 151 not included. This option will override any content if the input format 152 is S/MIME and it uses the multipart/signed MIME content type. 332 B<-sign> operation if the content is not detached. 335 since the content is no longer part of the PKCS#7 structure the encoding 433 openssl smime -verify -inform PEM -in signature.pem -content content.txt 437 openssl smime -verify -inform DER -in signature.der -content content.txt
|
/openssl-master/crypto/err/ |
A D | openssl.txt | 53 ASN1_R_ILLEGAL_ZERO_CONTENT:222:illegal zero content 71 ASN1_R_MIME_NO_CONTENT_TYPE:206:mime no content type 84 ASN1_R_NO_CONTENT_TYPE:209:no content type 88 ASN1_R_NO_SIG_CONTENT_TYPE:212:no sig content type 290 CMS_R_CONTENT_NOT_FOUND:105:content not found 328 CMS_R_NO_CONTENT:127:no content 329 CMS_R_NO_CONTENT_TYPE:173:no content type 917 PKCS7_R_NO_CONTENT:122:no content 1538 TS_R_DETACHED_CONTENT:134:detached content 1547 TS_R_NO_CONTENT:106:no content [all …]
|