/openssl-master/crypto/x509/ |
A D | x_req.c | 67 X509_REQ *old = exarg; in req_cb() local 69 if (!ossl_x509_req_set0_libctx(ret, old->libctx, old->propq)) in req_cb() 71 if (old->req_info.pubkey != NULL) { in req_cb() 72 EVP_PKEY *pkey = X509_PUBKEY_get0(old->req_info.pubkey); in req_cb()
|
A D | x_x509.c | 103 X509 *old = exarg; in x509_cb() local 105 if (!ossl_x509_set0_libctx(ret, old->libctx, old->propq)) in x509_cb()
|
A D | x_crl.c | 271 X509_CRL *old = exarg; in crl_cb() local 273 if (!ossl_x509_crl_set0_libctx(crl, old->libctx, old->propq)) in crl_cb()
|
/openssl-master/crypto/property/ |
A D | defn_cache.c | 91 PROPERTY_DEFN_ELEM elem, *old, *p = NULL; in ossl_prop_defn_set() local 118 old = lh_PROPERTY_DEFN_ELEM_insert(property_defns, p); in ossl_prop_defn_set() 119 if (old != NULL) { in ossl_prop_defn_set() 120 property_defn_free(old); in ossl_prop_defn_set()
|
A D | property.c | 627 QUERY elem, *old, *p = NULL; in ossl_method_store_cache_set() local 651 if ((old = lh_QUERY_delete(alg->cache, &elem)) != NULL) { in ossl_method_store_cache_set() 652 impl_cache_free(old); in ossl_method_store_cache_set() 667 if ((old = lh_QUERY_insert(alg->cache, p)) != NULL) { in ossl_method_store_cache_set() 668 impl_cache_free(old); in ossl_method_store_cache_set()
|
/openssl-master/doc/man1/ |
A D | openssl-rehash.pod.in | 18 [B<-old>] 28 [B<-old>] 100 =item B<-old> 102 Use old-style hashing (MD5, as opposed to SHA-1) for generating 104 Note that current versions will not use the old style. 109 This is needed when keeping new and old-style links in the same directory. 113 Generate links for both old-style (MD5) and new-style (SHA1) hashing. 119 Print messages about old links removed and new links created.
|
A D | openssl-nseq.pod.in | 24 A Netscape certificate sequence is an old Netscape-specific format that
|
/openssl-master/doc/man3/ |
A D | EVP_CIPHER_CTX_get_cipher_data.pod | 26 returned from this function. If the old data is no longer required then it 34 The EVP_CIPHER_CTX_set_cipher_data() function returns a pointer to the old
|
A D | SSL_CTX_add_session.pod | 19 the same session id already exists, the old session is removed by calling 30 stored in a different SSL_SESSION object, The old session is
|
A D | BN_generate_prime.pod | 148 BN_is_prime_fasttest_ex() and BN_is_prime_ex() respectively, but with the old 163 B<BN_GENCB> structure that are supported: "new" style and "old" style. New 164 programs should prefer the "new" style, whilst the "old" style is provided 179 style callbacks or B<callback(a, b, cb_arg)> for old style. 185 BN_generate_prime_ex() but expects an old-style callback function
|
A D | RSA_generate_key.pod | 62 expects an old-style callback function; see 63 L<BN_generate_prime(3)> for information on the old-style callback.
|
A D | BIO_set_callback.pod | 45 BIO_set_callback() and BIO_get_callback() set and retrieve the old format BIO 57 deprecated version of the same callback for use with the old callback 61 is the type of the old format callback function. The meaning of each argument
|
A D | DSA_generate_parameters.pod | 55 expects an old-style callback function; see 56 L<BN_generate_prime(3)> for information on the old-style callback.
|
A D | SSL_set_bio.pod | 72 same as the previously set value and the old B<rbio> and B<wbio> values 80 previously set value and the old B<rbio> and B<wbio> values were different
|
A D | PKCS12_create.pod | 48 old software which did not interpret MAC iteration counts. If such compatibility 54 it can be used for signing and encryption. This option was useful for old
|
A D | DH_generate_parameters.pod | 60 expects an old-style callback function; see 61 L<BN_generate_prime(3)> for information on the old-style callback.
|
A D | SSL_CTX_sess_set_cache_size.pod | 36 in the session cache, old session will be removed at the next time a
|
A D | SSL_CTX_new.pod | 134 Currently, the old function calls are renamed to the corresponding new 136 old function names still compiles. However, using the old function names
|
A D | SSL_set_session.pod | 24 a connection), SSL_SESSION_free() will be called for that session. If that old
|
A D | X509_check_purpose.pod | 60 =item E<32>2 Only possible in old versions of openSSL when basicConstraints are absent.
|
/openssl-master/crypto/rsa/ |
A D | rsa_lib.c | 482 STACK_OF(RSA_PRIME_INFO) *prime_infos, *old = NULL; in RSA_set0_multi_prime_params() 494 old = r->prime_infos; in RSA_set0_multi_prime_params() 520 r->prime_infos = old; in RSA_set0_multi_prime_params() 524 if (old != NULL) { in RSA_set0_multi_prime_params() 531 sk_RSA_PRIME_INFO_pop_free(old, ossl_rsa_multip_info_free); in RSA_set0_multi_prime_params()
|
/openssl-master/crypto/cmp/ |
A D | cmp_asn.c | 223 OSSL_CMP_MSG *old = exarg; in ossl_cmp_msg_cb() local 225 if (!ossl_cmp_msg_set0_libctx(msg, old->libctx, old->propq)) in ossl_cmp_msg_cb()
|
/openssl-master/external/perl/Text-Template-1.56/lib/Text/ |
A D | Template.pm | 45 my $old = $GLOBAL_PREPEND{$pack}; 49 $old;
|
/openssl-master/crypto/stack/ |
A D | stack.c | 38 OPENSSL_sk_compfunc old = sk->comp; in OPENSSL_sk_set_cmp_func() local 44 return old; in OPENSSL_sk_set_cmp_func()
|
/openssl-master/include/openssl/ |
A D | crypto.h.in | 255 * The old locking functions have been removed completely without compatibility 256 * macros. This is because the old functions either could not properly report 271 * These defines where used in combination with the old locking callbacks, 272 * they are not called anymore, but old code that's not called might still
|