Home
last modified time | relevance | path

Searched refs:content (Results 1 – 25 of 75) sorted by relevance

123

/openssl-master/doc/man3/
A DCMS_get0_type.pod5 …1_eContentType, CMS_get0_eContentType, CMS_get0_content - get and set CMS content types and content
18 CMS_get0_type() returns the content type of a CMS_ContentInfo structure as
22 CMS_set1_eContentType() sets the embedded content type of a CMS_ContentInfo
30 content type.
33 containing the embedded content.
43 using OBJ_obj2nid(). For the currently supported content types the following
54 content pointer. That means that for example:
58 B<*pconf> could be NULL if there is no embedded content. Applications can
59 access, modify or create the embedded content in a B<CMS_ContentInfo> structure
61 embedded content as it is normally set by higher level functions.
A DSSL_CTX_set_msg_callback.pod57 This is set to 0 for the SSL3_RT_HEADER pseudo content type (see NOTES below).
61 This is one of the content type values defined in the protocol specification
64 messages). Alternatively it may be a "pseudo" content type. These pseudo
65 content types are used to signal some other event in the processing of data (see
71 case of pseudo content types), which consists of I<len> bytes. The buffer is no
101 Pseudo content type values may be sent at various points during the processing
102 of data. The following pseudo content types are currently defined:
114 records the content type in the record header is always
115 SSL3_RT_APPLICATION_DATA. The real content type for the record is contained in
116 an "inner" content type. B<buf> contains the encoded "inner" content type byte.
[all …]
A DPKCS7_type_is_other.pod5 PKCS7_type_is_other - determine content type of PKCS#7 envelopedData structure
15 PKCS7_type_is_other() returns the whether the content type of a PKCS#7 envelopedData
16 structure is one of the following content types:
27 PKCS7_type_is_other() returns either 0 if the content type is matched or 1 otherwise.
A DCMS_verify.pod21 chain verification. B<indata> is the detached content if the content is not
22 present in B<cms>. The content is written to B<out> if it is not NULL.
36 the content is detached B<indata> cannot be B<NULL>.
49 Finally the signed content is read (and written to B<out> if it is not NULL)
65 from the content. If the content is not of type B<text/plain> then an error is
78 If B<CMS_NO_CONTENT_VERIFY> is set then the content digest is not checked.
95 setting B<CMS_NO_CONTENT_VERIFY> will totally disable all content verification
96 and any modified content will be considered valid. This combination is however
97 useful if one merely wishes to write the content to B<out> and its validity
120 The lack of single pass processing means that the signed content must all
A DSMIME_write_ASN1.pod28 content must be supplied via I<data>.
29 I<flags> is an optional set of flags. I<ctype_nid> is the NID of the content
30 type, I<econt_nid> is the NID of the embedded content type and I<mdalgs> is a
48 the content, this only makes sense if B<CMS_DETACHED> is also set.
58 If streaming is performed the content is output in BER format using indefinite
60 content where the content is absent and DER format is used.
A DCMS_decrypt.pod6 content from a CMS envelopedData structure
20 CMS_decrypt() extracts and decrypts the content from a CMS EnvelopedData
22 B<cert> is the recipient's certificate, B<out> is a BIO to write the content to
25 The B<dcont> parameter is used in the rare case where the encrypted content
45 the content: this will typically output garbage and may (but is not guaranteed
51 content encryption key. Applications should use this flag with
67 from the content. If the content is not of type B<text/plain> then an error is
A DPKCS7_decrypt.pod5 PKCS7_decrypt - decrypt content from a PKCS#7 envelopedData structure
15 PKCS7_decrypt() extracts and decrypts the content from a PKCS#7 envelopedData
17 recipients certificate, B<data> is a BIO to write the content to and
28 from the content. If the content is not of type B<text/plain> then an error is
A DCMS_uncompress.pod15 CMS_uncompress() extracts and uncompresses the content from a CMS
16 CompressedData structure B<cms>. B<data> is a BIO to write the content to and
19 The B<dcont> parameter is used in the rare case where the compressed content
33 from the content. If the content is not of type B<text/plain> then an error is
A DCMS_EncryptedData_decrypt.pod19 symmetric I<key> of size I<keylen> bytes. I<out> is a BIO to write the content
21 I<dcont> is used in the rare case where the encrypted content is detached. It
27 from the content. If the content is not of type B<text/plain> then an error is
A DSMIME_write_CMS.pod19 B<CMS_ContentInfo> structure. If streaming is enabled then the content must be
31 the content, this only makes sense if B<CMS_DETACHED> is also set.
41 If streaming is performed the content is output in BER format using indefinite
43 content where the content is absent and DER format is used.
A DSMIME_write_PKCS7.pod19 structure. If streaming is enabled then the content must be supplied in the
31 are added to the content, this only makes sense if B<PKCS7_DETACHED>
42 If streaming is performed the content is output in BER format using indefinite
44 content where the content is absent and DER format is used.
A DPKCS7_verify.pod21 chain verification). B<indata> is the signed data if the content is not
22 present in B<p7> (that is it is detached). The content is written to B<out>
38 the content is detached B<indata> cannot be B<NULL>. If the content is
40 embedded and external content. To treat this as an error, use the flag
54 Finally the signed content is read (and written to B<out> is it is not NULL) and
68 from the content. If the content is not of type B<text/plain> then an error is
90 useful if one merely wishes to write the content to B<out> and its validity
A DBIO_new_CMS.pod24 After all content has been written through the chain BIO_flush() must be called
35 Any content written through the filter is used verbatim: no canonical
40 responsibility to set the inner content type of any outer CMS_ContentInfo
A DCMS_final.pod17 appropriate fields. The parameter B<data> contains the content to be
18 processed. The B<dcont> parameter contains a BIO to write content to after
A DASN1_STRING_length.pod31 ASN1_STRING_length() returns the length of the content of I<x>.
44 are identical. The string types and content are compared.
82 ASN1_STRING_length() returns the length of the content of I<x>.
A DCMS_get0_RecipientInfos.pod97 first and the content encryption key must be available: for example by a
113 with a NULL key to decrypt the enveloped content.
117 an appropriate CMS_RecipientInfo structure to make the content encrypt key
119 CMS_add1_recipient_cert() and finally encrypt the content encryption key
/openssl-master/test/
A Dcmsapitest.c29 CMS_ContentInfo* content = NULL; in test_encrypt_decrypt() local
38 content = CMS_encrypt(certstack, msgbio, cipher, CMS_TEXT); in test_encrypt_decrypt()
39 if (!TEST_ptr(content)) in test_encrypt_decrypt()
42 if (!TEST_true(CMS_decrypt(content, privkey, cert, NULL, outmsgbio, in test_encrypt_decrypt()
56 CMS_ContentInfo_free(content); in test_encrypt_decrypt()
A Dgenerate_ssl_tests.pl145 my $content = <INPUT>;
147 eval $content;
A Dsmcont.txt1 Somewhat longer test content for OpenSSL CMS utility to handle, and a bit longer...
/openssl-master/doc/man7/
A Dossl_store-file.pod24 Since files come in all kinds of formats and content types, the 'file'
34 If the file isn't determined to be formatted as PEM, the content is
38 Each file handler is expected to handle PEM and non-PEM content as
39 appropriate. Some may refuse non-PEM content for the sake of
/openssl-master/engines/
A De_loader_attic.txt9 ATTIC_R_AMBIGUOUS_CONTENT_TYPE:100:ambiguous content type
19 ATTIC_R_UNSUPPORTED_CONTENT_TYPE:108:unsupported content type
/openssl-master/external/perl/Text-Template-1.56/lib/Text/
A DTemplate.pm208 my @content;
219 push @content, [ $state, $cur_item, $lineno ] if $cur_item ne '';
236 push @content, [ $state, $cur_item, $prog_start ] if $cur_item ne '';
264 push @content, [ $state, $cur_item, $lineno ] if $cur_item ne '';
271 $self->{SOURCE} = \@content;
/openssl-master/doc/man1/
A Dopenssl-cms.pod.in93 [B<-content> I<filename>]
216 Verify a CMS B<DigestedData> type and output the content.
232 B<EncryptedData> type and output the content.
237 B<EncryptedData> type and output the content.
245 B<Data> type and output the content.
309 content format is detected.
508 =item B<-content> I<filename>
518 Do not verify signed content signatures.
658 B<-sign> operation if the content is not detached.
828 openssl cms -verify -inform PEM -in signature.pem -content content.txt
[all …]
A Dopenssl-smime.pod.in39 [B<-content> I<file>]
146 =item B<-content> I<filename>
148 This specifies a file containing the detached content, this is only
150 structure is using the detached signature form where the content is
151 not included. This option will override any content if the input format
152 is S/MIME and it uses the multipart/signed MIME content type.
332 B<-sign> operation if the content is not detached.
335 since the content is no longer part of the PKCS#7 structure the encoding
433 openssl smime -verify -inform PEM -in signature.pem -content content.txt
437 openssl smime -verify -inform DER -in signature.der -content content.txt
/openssl-master/crypto/err/
A Dopenssl.txt53 ASN1_R_ILLEGAL_ZERO_CONTENT:222:illegal zero content
71 ASN1_R_MIME_NO_CONTENT_TYPE:206:mime no content type
84 ASN1_R_NO_CONTENT_TYPE:209:no content type
88 ASN1_R_NO_SIG_CONTENT_TYPE:212:no sig content type
290 CMS_R_CONTENT_NOT_FOUND:105:content not found
328 CMS_R_NO_CONTENT:127:no content
329 CMS_R_NO_CONTENT_TYPE:173:no content type
917 PKCS7_R_NO_CONTENT:122:no content
1538 TS_R_DETACHED_CONTENT:134:detached content
1547 TS_R_NO_CONTENT:106:no content
[all …]

Completed in 22 milliseconds

123