Searched refs:null (Results 1 – 25 of 35) sorted by relevance
12
/openssl-master/doc/man3/ |
A D | BIO_s_null.pod | 5 BIO_s_null - null data sink 15 BIO_s_null() returns the null sink BIO method. Data written to 16 the null sink is discarded, reads return EOF. 20 A null sink BIO behaves in a similar manner to the Unix /dev/null 23 A null bio can be placed on the end of a chain to discard any data 26 A null sink is useful if, for example, an application wishes to digest some 29 by adding a null sink BIO to the end of the chain 33 BIO_s_null() returns the null sink BIO method.
|
A D | BIO_f_null.pod | 5 BIO_f_null - null filter 15 BIO_f_null() returns the null filter BIO method. This is a filter BIO 18 All requests to a null filter BIO are passed through to the next BIO in 19 the chain: this means that a BIO chain containing a null filter BIO 24 As may be apparent a null filter BIO is not particularly useful. 28 BIO_f_null() returns the null filter BIO method.
|
A D | X509_NAME_get_index_by_NID.pod | 47 will be written and the text written to B<buf> will be null 49 excluding the terminating null. If B<buf> is <NULL> then the amount 50 of space needed in B<buf> (excluding the final null) is returned.
|
A D | SSL_SESSION_get_protocol_version.pod | 33 does B<not> perform a null check on the provided session B<s> pointer.
|
A D | SSL_CTX_set_ct_validation_callback.pod | 96 enabled via either SSL_enable_ct() or a non-null custom callback, and 0 123 SSL_CTX_ct_is_enabled() and SSL_ct_is_enabled() return a 1 if a non-null CT
|
A D | ASN1_STRING_length.pod | 72 is null terminated or does not contain embedded nulls. The actual format
|
A D | X509_get0_signature.pod | 97 error (e.g. null ALGO pointer). X509_REQ_set0_signature does
|
A D | SSL_CTX_set1_sigalgs.pod | 33 must be a null terminated string consisting of a colon separated list of
|
A D | RSA_meth_new.pod | 70 /* Can be null */ 77 /* Can be null */
|
A D | BN_bn2bin.pod | 79 of numbers with the MSB set is prefixed with null byte).
|
A D | SSL_CTX_set_client_hello_cb.pod | 47 the null compression method, since the SSLv2 format does not include a
|
A D | OBJ_nid2obj.pod | 74 The representation is written as a null terminated string to I<buf>
|
/openssl-master/doc/man7/ |
A D | OSSL_PROVIDER-null.pod | 5 OSSL_PROVIDER-null - OpenSSL null provider 9 The OpenSSL null provider supplies no algorithms. 16 The null provider defines no properties. 20 The OpenSSL null provider supports no operations and algorithms.
|
A D | crypto.pod | 352 The null provider is built in as part of the F<libcrypto> library. It contains 355 prevent that from happening you can explicitly load the null provider. 357 See L<OSSL_PROVIDER-null(7)>. 495 L<OSSL_PROVIDER-FIPS(7)>, L<OSSL_PROVIDER-legacy(7)>, L<OSSL_PROVIDER-null(7)>,
|
A D | fips_module.pod | 323 defctxnull = OSSL_PROVIDER_load(NULL, "null"); 367 Note that we have made use of the special "null" provider here which we load 375 particular operation. To be sure this doesn't happen you can load the "null"
|
A D | provider.pod | 201 fips, legacy and null providers. See L<crypto(7)> for an overview of these
|
A D | openssl-glossary.pod | 131 L<OSSL_PROVIDER-null(7)>
|
/openssl-master/test/ |
A D | lhash_test.c | 84 int null; in test_int_lhash() member 167 if (!TEST_int_eq(b ^ dels[i].null, 0)) { in test_int_lhash()
|
/openssl-master/crypto/err/ |
A D | openssl.txt | 45 ASN1_R_ILLEGAL_NULL:125:illegal null 46 ASN1_R_ILLEGAL_NULL_VALUE:182:illegal null value 89 ASN1_R_NULL_IS_WRONG_LENGTH:144:null is wrong length 244 CMP_R_NULL_ARGUMENT:103:null argument 381 CONF_R_LIST_CANNOT_BE_NULL:115:list cannot be null 416 CRMF_R_NULL_ARGUMENT:109:null argument 715 EVP_R_NULL_MAC_PKEY_CTX:208:null mac pkey ctx 858 PEM_R_CIPHER_IS_NULL:127:cipher is null 1310 SSL_R_DANE_TLSA_NULL_DATA:203:dane tlsa null data 1417 SSL_R_NULL_SSL_CTX:195:null ssl ctx [all …]
|
/openssl-master/ |
A D | README-PROVIDERS.md | 9 - [The Null Provider](#the-null-provider) 77 The null provider is "built-in" to libcrypto and contains no algorithm 79 automatically loaded, the null provider can be loaded instead.
|
/openssl-master/util/ |
A D | shlib_wrap.sh.in | 36 SYSNAME=`(uname -s) 2>/dev/null`;
|
/openssl-master/util/perl/OpenSSL/ |
A D | Test.pm | 1279 my $null = devnull(); 1280 my $fileornull = sub { $_[0] ? $_[0] : $null; }; 1293 $stderr=" 2> ".$null
|
/openssl-master/include/openssl/ |
A D | ct.h.in | 350 * If "pp" is not NULL and "*pp" is null, function will allocate a new pointer 377 * If "pp" is not NULL and "*pp" is null, function will allocate a new pointer 402 * If |out| is null, no SCT will be output but the length will still be returned. 403 * If |out| points to a null pointer, a string will be allocated to hold the 413 * If |psct| is not null, it will end up pointing to the parsed SCT. If it 414 * already points to a non-null pointer, the pointer will be free'd.
|
/openssl-master/crypto/ |
A D | README-sparse_array.md | 48 index 0 results in the allocation of a top level node full of null pointers
|
/openssl-master/providers/ |
A D | build.info | 161 # Because the null provider is built in, it means that libcrypto must
|
Completed in 28 milliseconds
12