/openssl-master/doc/man3/ |
A D | BIO_s_bio.pod | 8 BIO_ctrl_get_read_request, BIO_ctrl_reset_read_request - BIO pair BIO 33 BIO_s_bio() returns the method for a BIO pair. A BIO pair is a pair of source/sink 57 BIO_make_bio_pair() joins two separate BIOs into a connected pair. 60 up any half of the pair will automatically destroy the association. 64 half of the pair will return any pending data or EOF when all pending data has 74 BIO_set_write_buf_size() to create a connected pair of BIOs B<bio1>, B<bio2> 88 last read attempt at the other half of the BIO pair failed due to an 138 The BIO pair can be used to have full control over the network access of an 155 | BIO-pair (internal_bio) 156 | BIO-pair (network_bio) [all …]
|
A D | RSA_generate_key.pod | 7 RSA_generate_multi_prime_key - generate RSA key pair 29 EVP_RSA_gen() generates a new RSA key pair with modulus size I<bits>. 35 RSA_generate_key_ex() generates a 2-prime RSA key pair and stores it in the 38 RSA_generate_multi_prime_key() generates a multi-prime RSA key pair and stores
|
A D | DSA_generate_key.pod | 5 DSA_generate_key - generate DSA key pair 24 a new key pair and stores it in B<a-E<gt>pub_key> and B<a-E<gt>priv_key>.
|
A D | X509_check_private_key.pod | 38 of a key pair. So if you pass a public key to these functions in B<k>, it will
|
A D | OSSL_CMP_MSG_http_perform.pod | 6 - client-side HTTP(S) transfer of a CMP request-response pair
|
A D | SSL_CTX_use_certificate.pod | 97 key pair the new certificate needs to be set with SSL_use_certificate() 132 key/certificate pair (RSA/DSA) is installed, the last item installed will 134 key/certificate pair will be checked. SSL_check_private_key() performs
|
A D | SSL_do_handshake.pod | 36 condition. When using a buffering BIO, like a BIO pair, data must be written
|
A D | OSSL_CMP_ITAV_set0.pod | 30 e.g., in the generalInfo PKIHeader field, to hold a key-value pair.
|
A D | SSL_accept.pod | 35 condition. When using a buffering BIO, like a BIO pair, data must be written
|
A D | EVP_PKEY_keygen.pod | 95 providing a 'quick' but limited way of generating a new asymmetric key pair. 136 equivalent to what some libraries call a "key pair". A private key can be used
|
A D | SSL_connect.pod | 35 condition. When using a buffering BIO, like a BIO pair, data must be written
|
A D | RSA_meth_new.pod | 210 function used for generating a new RSA key pair respectively. This 216 and set the function used for generating a new multi-prime RSA key pair
|
A D | OPENSSL_ia32cap.pod | 15 by processor in EDX:ECX register pair after executing CPUID instruction
|
A D | OSSL_STORE_SEARCH.pod | 71 and serial number pair, a key fingerprint, and an alias (for example a friendly
|
A D | SSL_CTX_set_mode.pod | 111 used for computing the endpoint-pair shared secret. The bug was that the
|
/openssl-master/crypto/sha/asm/ |
A D | sha512-sparcv9.pl | 188 sllx @pair[1],$tmp31,$tmp2 ! Xload($i) 190 sllx @pair[0],$tmp0,$tmp1 191 `"ld [$inp+".eval(32+0+$i*8)."],@pair[0]" if ($i<12)` 192 srlx @pair[2],$tmp32,@pair[1] 194 or @pair[1],$tmp2,$tmp2 195 `"ld [$inp+".eval(32+4+$i*8)."],@pair[1]" if ($i<12)` 205 sllx @pair[1],$tmp31,$tmp2 ! Xload($i) 208 sllx @pair[0],$tmp0,$tmp1 210 srlx @pair[2],$tmp32,@pair[1] 213 or @pair[1],$tmp2,$tmp2 [all …]
|
/openssl-master/util/ |
A D | cavs-to-evptest.pl | 45 foreach my $pair (@pairs) { 46 $pair =~ /(\w+)\s*=\s*(\d+)/;
|
/openssl-master/crypto/ |
A D | provider_core.c | 243 static void infopair_free(INFOPAIR *pair) in infopair_free() argument 245 OPENSSL_free(pair->name); in infopair_free() 246 OPENSSL_free(pair->value); in infopair_free() 247 OPENSSL_free(pair); in infopair_free() 741 INFOPAIR *pair = NULL; in infopair_add() local 743 if ((pair = OPENSSL_zalloc(sizeof(*pair))) != NULL in infopair_add() 748 && sk_INFOPAIR_push(*infopairsk, pair) > 0) in infopair_add() 751 if (pair != NULL) { in infopair_add() 752 OPENSSL_free(pair->name); in infopair_add() 753 OPENSSL_free(pair->value); in infopair_add() [all …]
|
/openssl-master/doc/man7/ |
A D | EVP_KEYEXCH-DH.pod | 41 To convert the peer's generated key pair to a public key in DER format in order 90 using the host's public key and the peer's generated key pair.
|
/openssl-master/util/perl/OpenSSL/ |
A D | config.pm | 304 foreach my $pair (_pairs @cc_version) { 307 my ( $k, $v ) = @$pair;
|
/openssl-master/doc/man1/ |
A D | openssl-pkey.pod.in | 56 This option checks the consistency of a key pair for both public and private 62 or the public component of a key pair.
|
/openssl-master/doc/internal/man7/ |
A D | EVP_PKEY.pod | 22 The private/public key pair that an B<EVP_PKEY> contains is refered to 112 that every provider that implements a key pair based operation must
|
/openssl-master/doc/man5/ |
A D | fips_config.pod | 51 Continuous tests are a subset of the self tests (e.g., a key pair test during key
|
/openssl-master/include/openssl/ |
A D | srp.h.in | 92 * Internal structure storing N and g pair
|
/openssl-master/test/ |
A D | evp_test.c | 2806 static int keypair_test_init(EVP_TEST *t, const char *pair) in keypair_test_init() argument 2814 if (!TEST_ptr(priv = OPENSSL_strdup(pair)) in keypair_test_init() 2869 const KEYPAIR_TEST_DATA *pair = t->data; in keypair_test_run() local 2871 if (pair->privk == NULL || pair->pubk == NULL) { in keypair_test_run() 2882 if ((rv = EVP_PKEY_eq(pair->privk, pair->pubk)) != 1) { in keypair_test_run()
|