/openssl-master/test/recipes/80-test_cmp_http_data/ |
A D | test_enrollment.csv | 4 1,newkey, -section,, -cmd,ir, -newkey,new.key,, -newkeypass,pass:,,,BLANK,,BLANK,,BLANK,,BLANK,,BLA… 25 1,issuer, -section,, -cmd,ir, -newkey,new.key,, -newkeypass,pass:,,, -issuer,_CA_DN,BLANK,,BLANK,,B… 28 1,days 1, -section,, -cmd,ir, -newkey,new.key,, -newkeypass,pass:,,,BLANK,, -days,1,BLANK,,BLANK,,B… 29 1,days 0, -section,, -cmd,ir, -newkey,new.key,, -newkeypass,pass:,,,BLANK,, -days,0,BLANK,,BLANK,,B… 57 0,popo NONE, -section,, -cmd,ir, -newkey,new.key,, -newkeypass,pass:,,,BLANK,,BLANK,,BLANK,,BLANK,,… 66 0,no certout, -section,, -cmd,ir, -newkey,new.key,, -newkeypass,pass:,,,BLANK,,BLANK,,BLANK,,BLANK,… 67 0,certout missing arg, -section,, -cmd,ir, -newkey,new.key,, -newkeypass,pass:,,,BLANK,,BLANK,,BLAN… 68 0,certout too many parameters, -section,, -cmd,ir, -newkey,new.key,, -newkeypass,pass:,,,BLANK,,BLA… 70 1,no out_trusted, -section,, -cmd,ir, -newkey,new.key,, -newkeypass,pass:,,,BLANK,,BLANK,,BLANK,,BL… 99 1,cr, -section,, -cmd,cr, -newkey,new.key,, -newkeypass,pass:,,,BLANK,,BLANK,,BLANK,,BLANK,,BLANK,,… [all …]
|
/openssl-master/crypto/cmp/ |
A D | cmp_util.c | 246 ASN1_OCTET_STRING *new; in ossl_cmp_asn1_octet_string_set1() local 255 if ((new = ASN1_OCTET_STRING_dup(src)) == NULL) in ossl_cmp_asn1_octet_string_set1() 258 new = NULL; in ossl_cmp_asn1_octet_string_set1() 262 *tgt = new; in ossl_cmp_asn1_octet_string_set1() 269 ASN1_OCTET_STRING *new = NULL; in ossl_cmp_asn1_octet_string_set1_bytes() local 276 if ((new = ASN1_OCTET_STRING_new()) == NULL in ossl_cmp_asn1_octet_string_set1_bytes() 277 || !(ASN1_OCTET_STRING_set(new, bytes, len))) { in ossl_cmp_asn1_octet_string_set1_bytes() 278 ASN1_OCTET_STRING_free(new); in ossl_cmp_asn1_octet_string_set1_bytes() 284 *tgt = new; in ossl_cmp_asn1_octet_string_set1_bytes()
|
/openssl-master/demos/certs/apps/ |
A D | mkacerts.sh | 9 -keyout root.pem -out root.pem -key rootkey.pem -new -days 3650 12 -key intkey.pem -out intreq.pem -new 18 -key ckey.pem -out creq.pem -new 25 -key skey.pem -out sreq.pem -new 32 -key skey2.pem -out sreq2.pem -new
|
A D | mkxcerts.sh | 8 -keyout tsha1.pem -out tsha1.pem -new -days 3650 -sha1 11 -keyout tsha256.pem -out tsha256.pem -new -days 3650 -sha256 14 -keyout tsha512.pem -out tsha512.pem -new -days 3650 -sha512
|
/openssl-master/doc/man3/ |
A D | PKCS12_SAFEBAG_create_cert.pod | 38 PKCS12_SAFEBAG_create_cert() creates a new B<PKCS12_SAFEBAG> of type B<NID_certBag> 41 PKCS12_SAFEBAG_create_crl() creates a new B<PKCS12_SAFEBAG> of type B<NID_crlBag> 44 PKCS12_SAFEBAG_create_secret() creates a new B<PKCS12_SAFEBAG> of type 49 PKCS12_SAFEBAG_create0_p8inf() creates a new B<PKCS12_SAFEBAG> of type B<NID_keyBag> 52 PKCS12_SAFEBAG_create0_pkcs8() creates a new B<PKCS12_SAFEBAG> of type 55 PKCS12_SAFEBAG_create_pkcs8_encrypt() creates a new B<PKCS12_SAFEBAG> of type
|
A D | X509_NAME_add_entry_by_txt.pod | 36 standard ASN1 type (such as B<V_ASN1_IA5STRING>). The new entry is 40 to B<name>. The new entry is added to a position determined by B<loc> 61 The B<loc> and B<set> parameters determine where a new entry should 63 to 0. This adds a new entry to the end of B<name> as a single valued 66 B<loc> actually determines the index where the new entry is inserted: 69 B<set> determines how the new type is added. 70 If it is zero a new RDN is created. 72 If B<set> is -1 or 1 it is added as a new set member
|
A D | SSL_CTX_set_ssl_version.pod | 6 - choose a new TLS/SSL method 18 SSL_CTX_set_ssl_version() sets a new default TLS/SSL B<method> for SSL objects 25 SSL_set_ssl_method() sets a new TLS/SSL B<method> for a particular B<ssl> 41 it would usually be preferable to create a new SSL_CTX object than to 54 The new choice failed, check the error stack to find out the reason.
|
A D | SSL_key_update.pod | 50 When called from the client side, SSL_renegotiate() schedules a completely new 55 attempt to resume any session associated with the connection in the new 60 session associated with the current connection in the new handshake. 64 for a new handshake to be sent to the client. The next time an IO operation is 66 appropriate, the request is sent. The client may or may not respond with a new 68 a new handshake is started then this will be handled transparently by calling 74 new handshake. For historical reasons, DTLS clients will not attempt to resume 75 the session in the new handshake.
|
A D | DH_meth_new.pod | 72 DH_meth_new() creates a new B<DH_METHOD> structure. It should be given a 76 during the construction of a new B<DH> object based on this B<DH_METHOD>. Any 77 new B<DH> object will have those flags set by default. 80 parameter. This might be useful for creating a new B<DH_METHOD> based on an 101 function used for generating a new DH key pair respectively. This function will 106 function used for computing a new DH shared secret respectively. This function 121 for creating a new DH instance respectively. This function will be 124 functions will allocate the memory for the new DH object, and a pointer to this
|
A D | SSL_new.pod | 17 SSL_new() creates a new B<SSL> structure which is needed to hold the 18 data for a TLS/SSL connection. The new structure inherits the settings 29 The function SSL_dup() creates and returns a new B<SSL> structure from the same 31 the settings in I<s> into the new B<SSL> object. 107 The creation of a new SSL structure failed. Check the error stack to
|
A D | BIO_push.pod | 26 by B<next>. The new chain may include some of the same BIOs from the old chain 55 is made then the new chain will be B<b64-f>. After making the calls 60 the new chain is B<md1-md2-b64-f>. Data written to B<md1> will be digested 69 The call will return B<b64> and the new chain will be B<md1-b64-f> data can
|
A D | RSA_meth_new.pod | 86 /* called at new */ 137 RSA_meth_new() creates a new B<RSA_METHOD> structure. It should be 142 new B<RSA> object based on this B<RSA_METHOD>. Any new B<RSA> object 146 passed as a parameter. This might be useful for creating a new 193 used for creating a new RSA instance respectively. This function will 197 the new RSA object, and a pointer to this newly allocated structure 210 function used for generating a new RSA key pair respectively. This 216 and set the function used for generating a new multi-prime RSA key pair
|
A D | OSSL_LIB_CTX.pod | 38 OSSL_LIB_CTX_new() creates a new OpenSSL library context. 40 OSSL_LIB_CTX_new_from_dispatch() creates a new OpenSSL library context 50 new library context to the application library context. The new library context 75 library context then the new properties will override anything from the parent 82 B<OSSL_provider_init> function returns then the new provider is available in the
|
A D | SSL_CTX_add_session.pod | 27 When adding a new session to the internal session cache, it is examined 31 removed and replaced by the new session. If the session is actually 36 flag then the internal cache will not be populated automatically by new
|
A D | SSL_CTX_set_num_tickets.pod | 37 L<SSL_verify_client_post_handshake(3)>. These new tickets will be associated 46 SSL_new_session_ticket() is used by a server application to request that a new 50 delayed until the server is starting a new write operation, so that it is 61 ticket itself is sent, a new-session callback can be registered with
|
A D | ASN1_item_new.pod | 6 - create new ASN.1 values 18 ASN1_item_new_ex() creates a new B<ASN1_VALUE> structure based on the
|
/openssl-master/Configurations/ |
A D | unix-Makefile.tmpl | 592 $(RM) providers/fips*.new 712 cp $$l $(DESTDIR)$(libdir)/$$fn.new; \ 715 mv -f $(DESTDIR)$(libdir)/$$fn.new \ 744 cp -f $$a $$a.new; \ 749 $(AR) r $$a.new $$so; \ 752 $(AR) r $$a.new $$s1; \ 753 mv -f $$a.new $$a; \ 889 mv -f $(DESTDIR)$(libdir)/$$fn.new \ 1143 > crypto/objects/obj_mac.new && \ 1339 providers/fips.checksum.new: providers/fips.module.sources.new [all …]
|
/openssl-master/util/ |
A D | find-unused-errs | 49 grep -v -w $F <$FILE >$FILE.new 50 mv $FILE.new $FILE
|
/openssl-master/doc/internal/man3/ |
A D | ossl_init_thread_deregister.pod | 29 Thread aware code registers a "stop handler" for each new thread that it uses. 30 Typically, when a new thread is being used, code will add a new value to some 35 A new stop handler is registered using the function ossl_init_thread_start().
|
A D | ossl_cmp_certreq_new.pod | 48 The allocate a new message, fill it with the relevant data derived from 139 ossl_cmp_genm_new() creates a new General Message with an empty ITAV stack. 141 ossl_cmp_genp_new() creates a new General Response with an empty ITAV stack. 143 ossl_cmp_error_new() creates a new Error Message with the given contents 156 All of the functions return a new OSSL_CMP_MSG structure containing
|
/openssl-master/crypto/err/ |
A D | README.md | 1 Adding new libraries 4 When adding a new sub-library to OpenSSL, assign it a library number 37 generation script as the point to place new error codes, any text
|
/openssl-master/doc/man7/ |
A D | evp.pod | 29 asymmetric algorithms. To create a new EVP_PKEY see 33 new keys can be generated using L<EVP_PKEY_keygen(3)>. 62 implementation. However, new applications should not typically use this (preferring, for example, 78 versions of new algorithms cannot be accessed using the low-level functions. 79 Also makes code harder to adapt to new algorithms and some options are not
|
/openssl-master/doc/man1/ |
A D | openssl-req.pod.in | 23 [B<-new>] 85 (B<-new> or B<-newkey> or B<-precert>) are not specified. 146 =item B<-new> 148 This option generates a new certificate request. It will prompt 163 This option implies the B<-new> flag to create a new certificate request 164 or a new certificate in case B<-x509> is used. 258 Sets subject name for new request or supersedes the subject name 282 This option implies the B<-new> flag if B<-in> is not given. 359 This implies the B<-new> flag. 589 openssl req -new -key key.pem -out req.pem [all …]
|
/openssl-master/crypto/evp/ |
A D | keymgmt_meth.c | 59 if (keymgmt->new == NULL) in keymgmt_from_algorithm() 60 keymgmt->new = OSSL_FUNC_keymgmt_new(fns); in keymgmt_from_algorithm() 183 || (keymgmt->new == NULL in keymgmt_from_algorithm() 318 if (keymgmt->new == NULL) in evp_keymgmt_newdata() 320 return keymgmt->new(provctx); in evp_keymgmt_newdata()
|
/openssl-master/ |
A D | HACKING.md | 6 If you are adding new public functions to the custom library build, you need to 8 or provide a new header file and edit
|