/openssl-master/test/ |
A D | drbgtest.c | 174 EVP_RAND_CTX *public, in test_drbg_reseed() argument 228 || !TEST_int_eq(state(public), expected_state) in test_drbg_reseed() 521 EVP_RAND_CTX *primary, *public, *private; in test_rand_fork_safety() local 525 || !TEST_ptr(public = RAND_get0_public(NULL)) in test_rand_fork_safety() 548 EVP_RAND_CTX *primary, *public, *private; in test_rand_reseed() local 569 if (!TEST_ptr_ne(public, private) in test_rand_reseed() 570 || !TEST_ptr_ne(public, primary) in test_rand_reseed() 583 EVP_RAND_uninstantiate(public); in test_rand_reseed() 633 inc_reseed_counter(public); in test_rand_reseed() 701 EVP_RAND_CTX *public = NULL, *private = NULL; in run_multi_thread_test() local [all …]
|
/openssl-master/doc/man3/ |
A D | EVP_PKEY_meth_get_count.pod | 5 EVP_PKEY_meth_get_count, EVP_PKEY_meth_get0, EVP_PKEY_meth_get0_info - enumerate public key methods 25 EVP_PKEY_meth_count() returns a count of the number of public key methods 29 EVP_PKEY_meth_get0() returns the public key method B<idx>. The value of B<idx> 32 EVP_PKEY_meth_get0_info() returns the public key ID (a NID) and any flags 33 associated with the public key method B<*meth>. 37 EVP_PKEY_meth_count() returns the number of available public key methods. 39 EVP_PKEY_meth_get0() return a public key method or B<NULL> if B<idx> is
|
A D | EVP_PKEY_asn1_get_count.pod | 10 - enumerate public key ASN.1 methods 28 EVP_PKEY_asn1_count() returns a count of the number of public key 32 EVP_PKEY_asn1_get0() returns the public key ASN.1 method B<idx>. 49 EVP_PKEY_asn1_get0_info() returns the public key ID, base public key 51 associated with the public key ASN.1 method B<*ameth>. 60 EVP_PKEY_asn1_count() returns the number of available public key methods. 62 EVP_PKEY_asn1_get0() return a public key method or B<NULL> if B<idx> is
|
A D | EVP_SealInit.pod | 22 "envelope" it by using public key encryption. Data can then be 28 using one or more public keys, this allows the same encrypted data to be 30 buffers where the public key encrypted secret key will be written, each buffer 34 an array of B<npubk> public keys. 62 The public key must be RSA because it is the only OpenSSL public key 65 Envelope encryption is the usual method of using public key encryption 66 on large amounts of data, this is because public key encryption is slow 69 using public key encryption.
|
A D | EVP_PKEY_new.pod | 18 - public/private key allocation and raw key handling functions 68 Conceptually, an B<EVP_PKEY> internal key may hold a private key, a public 72 and verifying normally requires the presence of a public key. 74 =for comment ED signature require both the private and public key... 77 producing signatures, although not being public key algorithms; "POLY1305", 97 string for a public key algorithm that supports raw private keys, i.e one of 100 should be appropriate for the type of the key. The public key data will be 120 public key data. The B<EVP_PKEY> structure will be initialised without any 121 private key information. Algorithm types that support raw public keys are 127 information. Algorithm types that support raw public keys are [all …]
|
A D | EVP_PKEY_copy_parameters.pod | 7 EVP_PKEY_cmp - public key parameter and comparison functions 28 The function EVP_PKEY_missing_parameters() returns 1 if the public key 40 The function EVP_PKEY_eq() checks the public key components and parameters 46 EVP_PKEY_copy_parameters() is to handle public keys in certificates where the 47 parameters are sometimes omitted from a public key if they are inherited from 50 Since OpenSSL private keys contain public key components too the function 52 a public key. 60 The function EVP_PKEY_missing_parameters() returns 1 if the public key
|
A D | X509_PUBKEY_new.pod | 9 X509_PUBKEY_eq - SubjectPublicKeyInfo public key functions 63 X509_PUBKEY_set() sets the public key in I<*x> to the public key contained 65 public key structure will be freed. 67 X509_PUBKEY_get0() returns the public key contained in I<key>. The returned 75 format. Some public key decoding implementations may use cryptographic 88 X509_PUBKEY_set0_param() sets the public key parameters of I<pub>. The 91 The encoding of the public key itself is set to the I<penclen> 96 X509_PUBKEY_get0_param() retrieves the public key parameters from I<pub>, 99 AlgorithmIdentifier for the public key. If the value of any of these 108 The B<X509_PUBKEY> functions can be used to encode and decode public keys
|
A D | X509_get_pubkey.pod | 8 public key 26 X509_get_pubkey() attempts to decode the public key for certificate B<x>. If 27 successful it returns the public key as an B<EVP_PKEY> pointer with its 37 X509_set_pubkey() attempts to set the public key for certificate B<x> to 45 The first time a public key is decoded the B<EVP_PKEY> structure is 53 X509_REQ_get_pubkey() and X509_REQ_get_X509_PUBKEY() return a public key or
|
A D | EVP_PKEY_print_private.pod | 7 EVP_PKEY_print_params_fp - public key algorithm printing routines 29 EVP_PKEY_print_params() print out the public, private or parameter components 43 Currently no public key algorithms include any options in the I<pctx> parameter. 46 only those contained in the key will be printed. For example passing a public 47 key to EVP_PKEY_print_private() will only print the public components. 53 the public key algorithm.
|
A D | EVP_PKEY_set1_encoded_public_key.pod | 7 - functions to set and get public key data within an EVP_PKEY 29 EVP_PKEY_set1_encoded_public_key() can be used to set the public key value 37 The format for the encoded public key will depend on the algorithm in use. For 47 the encoded public key is returned to the application. The key containing the 48 public key data is supplied in B<pkey>. A buffer containing the encoded key will 49 be allocated and stored in B<*ppub>. The length of the encoded public key is 96 =head2 Get an encoded public key to send to a peer 110 * Send the encoded public key stored in the buffer at "pubkey" and of
|
A D | EVP_PKEY_encrypt.pod | 6 EVP_PKEY_encrypt_init, EVP_PKEY_encrypt - encrypt using a public key algorithm 20 The EVP_PKEY_encrypt_init() function initializes a public key algorithm 23 The EVP_PKEY_encrypt_init_ex() function initializes a public key algorithm 27 The EVP_PKEY_encrypt() function performs a public key encryption operation 49 return value of -2 indicates the operation is not supported by the public key 55 L<d2i_X509(3)> for means to load a public key. You may also simply 70 * and that key is an RSA public key
|
A D | DH_generate_key.pod | 29 exchange by generating private and public DH values. By calling 31 the other party's public value to compute the shared key. 36 corresponding public value B<dh-E<gt>pub_key>, which can then be 40 in B<dh> and the other party's public value in B<pub_key> and stores 44 The return value should be considered public. 49 The return value should be considered public.
|
A D | EC_KEY_get_enc_flags.pod | 17 The format of the external representation of the public key written by 22 When reading a private key encoded without an associated public key (e.g. if 24 the missing public key automatically. Private keys encoded without parameters 32 i2d_ECPrivateKey(). If EC_PKEY_NO_PARAMETERS is set then the public parameters for 34 set then the public key is not encoded along with the private key.
|
A D | X509_check_private_key.pod | 6 of a private key with the public key in an X509 certificate or certificate 20 key B<k> with the public key in B<x>. 36 a private key or not. It merely compares the public materials (e.g. exponent 38 of a key pair. So if you pass a public key to these functions in B<k>, it will
|
A D | EVP_PKEY_CTX_new.pod | 8 - public key algorithm context functions 28 The EVP_PKEY_CTX_new() function allocates public key algorithm context using 31 The EVP_PKEY_CTX_new_id() function allocates public key algorithm context 34 The EVP_PKEY_CTX_new_from_name() function allocates a public key algorithm 41 The EVP_PKEY_CTX_new_from_pkey() function allocates a public key algorithm 64 The B<EVP_PKEY_CTX> structure is an opaque public key algorithm context used 65 by the OpenSSL high-level public key API. Contexts B<MUST NOT> be shared between
|
A D | EVP_PKEY_get_default_digest_nid.pod | 19 name for the public key signature operations associated with key 25 digest NID for the public key signature operations associated with key 35 For all current standard OpenSSL public key algorithms SHA256 is returned. 43 value of -2 indicates the operation is not supported by the public key
|
A D | EVP_PKEY_encapsulate.pod | 6 - Key encapsulation using a public key algorithm 19 The EVP_PKEY_encapsulate_init() function initializes a public key algorithm 23 The EVP_PKEY_encapsulate() function performs a public key encapsulation 41 indicates the operation is not supported by the public key algorithm. 50 * NB: assumes rsa_pub_key is an public key of another party.
|
A D | CTLOG_new.pod | 32 Transparency (CT) log with the given public key and associates it with the 35 public key is transferred. 41 public key in base64-encoded DER form and sets the ct_log pointer to point to 42 the new CTLOG. The base64 will be decoded and the public key parsed. The CTLOG 63 CTLOG_get0_public_key() returns the public key of the CT log. Ownership of the
|
/openssl-master/demos/signature/ |
A D | EVP_Signature_demo.c | 44 static EVP_PKEY *get_key(OSSL_LIB_CTX *libctx, const char *propq, int public) in get_key() argument 52 if (public) { in get_key() 66 fprintf(stderr, "Failed to load %s key.\n", public ? "public" : "private"); in get_key() 73 int result = 0, public = 0; in demo_sign() local 81 priv_key = get_key(libctx, propq, public); in demo_sign() 153 int result = 0, public = 1; in demo_verify() local 168 pub_key = get_key(libctx, propq, public); in demo_verify()
|
/openssl-master/doc/man1/ |
A D | openssl-pkey.pod.in | 10 openssl-pkey - public or private key processing command 37 This command processes public or private keys. They can be 56 This option checks the consistency of a key pair for both public and private 61 This option checks the correctness of either a public key 62 or the public component of a key pair. 92 With this option only the public components are read. 134 By default the private and public key is output; 135 this option restricts the output to the public components. 136 This option is automatically set if the input is a public key. 199 To print out the public components of a private key to standard output: [all …]
|
A D | openssl-dsa.pod.in | 70 B<q>, B<g>, and the public and private key components. Public keys 106 Prints out the public, private key components and parameters. 114 This option prints out the value of the public key component of the key. 119 public key is read instead. 123 By default, a private key is output. With this option a public 125 a public key. 146 this command can, as well as supporting other public key types. 169 To just output the public part of a private key:
|
/openssl-master/engines/ |
A D | e_capi.txt | 29 invalid dsa public key blob magic number 31 CAPI_R_INVALID_PUBLIC_KEY_BLOB:121:invalid public key blob 33 invalid rsa public key blob magic number 39 CAPI_R_UNSUPPORTED_PUBLIC_KEY_ALGORITHM:128:unsupported public key algorithm
|
/openssl-master/doc/internal/man7/ |
A D | deprecation.pod | 18 functions in our public header files, F<< <openssl/*.h> >>). 21 explicitly removes the symbol from public view. 24 symbols from public view (with the configuration option C<no-deprecated>, or 58 The symbol is planned to be removed from public view, but will otherwise 69 from public view, it should be moved to an internal header file, with the 79 In public header files (F<< <openssl/*.h> >>), this is what a deprecation is 105 its declaration in the public header file is: 122 * RSA low level APIs are deprecated for public use, but are kept for
|
/openssl-master/doc/man7/ |
A D | X25519.pod | 12 key derivation using B<X25519> and B<X448>. It has associated private and public 17 The peer public key must be set using EVP_PKEY_derive_set_peer() when 34 the associated public key. 36 X25519 or X448 public keys can be set directly using
|
A D | EVP_KEYEXCH-DH.pod | 39 Both the host and peer transfer their public key to each other. 41 To convert the peer's generated key pair to a public key in DER format in order 52 To convert the received peer's public key from DER format on the host: 59 To derive a shared secret on the host using the host's key and the peer's public 90 using the host's public key and the peer's generated key pair.
|