Home
last modified time | relevance | path

Searched refs:msg (Results 1 – 25 of 31) sorted by relevance

12

/doc/man3/
A DOSSL_CRMF_MSG_set1_regCtrl_regToken.pod26 *OSSL_CRMF_MSG_get0_regCtrl_regToken(const OSSL_CRMF_MSG *msg);
27 int OSSL_CRMF_MSG_set1_regCtrl_regToken(OSSL_CRMF_MSG *msg,
30 *OSSL_CRMF_MSG_get0_regCtrl_authenticator(const OSSL_CRMF_MSG *msg);
31 int OSSL_CRMF_MSG_set1_regCtrl_authenticator(OSSL_CRMF_MSG *msg,
42 int OSSL_CRMF_MSG_set1_regCtrl_pkiPublicationInfo(OSSL_CRMF_MSG *msg,
45 *OSSL_CRMF_MSG_get0_regCtrl_protocolEncrKey(const OSSL_CRMF_MSG *msg);
46 int OSSL_CRMF_MSG_set1_regCtrl_protocolEncrKey(OSSL_CRMF_MSG *msg,
49 *OSSL_CRMF_MSG_get0_regCtrl_oldCertID(const OSSL_CRMF_MSG *msg);
50 int OSSL_CRMF_MSG_set1_regCtrl_oldCertID(OSSL_CRMF_MSG *msg,
58 returns the respective control X in the given I<msg>, if present.
[all …]
A DOSSL_CRMF_MSG_set1_regInfo_certReq.pod16 *OSSL_CRMF_MSG_get0_regInfo_utf8Pairs(const OSSL_CRMF_MSG *msg);
17 int OSSL_CRMF_MSG_set1_regInfo_utf8Pairs(OSSL_CRMF_MSG *msg,
20 *OSSL_CRMF_MSG_get0_regInfo_certReq(const OSSL_CRMF_MSG *msg);
21 int OSSL_CRMF_MSG_set1_regInfo_certReq(OSSL_CRMF_MSG *msg,
27 in the given I<msg>, if present.
30 value as utf8Pairs regInfo to the given I<msg>. See RFC 4211 section 7.1.
33 in the given I<msg>, if present.
36 as certReq regInfo to the given I<msg>. See RFC 4211 section 7.2.
48 control to the regInfo structure of the given I<msg>. While RFC 4211 expects
A DOSSL_CMP_MSG_get0_header.pod21 OSSL_CMP_PKIHEADER *OSSL_CMP_MSG_get0_header(const OSSL_CMP_MSG *msg);
22 int OSSL_CMP_MSG_get_bodytype(const OSSL_CMP_MSG *msg);
23 X509_PUBKEY *OSSL_CMP_MSG_get0_certreq_publickey(const OSSL_CMP_MSG *msg);
24 int OSSL_CMP_MSG_update_transactionID(OSSL_CMP_CTX *ctx, OSSL_CMP_MSG *msg);
25 int OSSL_CMP_MSG_update_recipNonce(OSSL_CMP_CTX *ctx, OSSL_CMP_MSG *msg);
28 int OSSL_CMP_MSG_write(const char *file, const OSSL_CMP_MSG *msg);
29 OSSL_CMP_MSG *d2i_OSSL_CMP_MSG_bio(BIO *bio, OSSL_CMP_MSG **msg);
30 int i2d_OSSL_CMP_MSG_bio(BIO *bio, const OSSL_CMP_MSG *msg);
38 OSSL_CMP_MSG_get0_certreq_publickey() expects that I<msg> is a certificate request
110 It assigns a pointer to the new structure to I<*msg> if I<msg> is not NULL.
[all …]
A DOSSL_CMP_validate_msg.pod12 int OSSL_CMP_validate_msg(OSSL_CMP_CTX *ctx, OSSL_CMP_MSG *msg);
22 OSSL_CMP_validate_msg() validates the protection of the given I<msg>,
31 taken from the list of certificates received in the I<msg> extraCerts, then any
37 the I<msg> sender DN (as far as present), and its subject key identifier
45 any self-issued certificate from the I<msg> extraCerts field may be used
A DOSSL_CRMF_pbmp_new.pod15 const unsigned char *msg, size_t msglen,
26 parameters I<pbmp>, message I<msg>, and secret I<sec>, along with the respective
65 unsigned char *msg = "Hello";
72 if (!OSSL_CRMF_pbm_new(pbm, msg, 5, sec, 6, &mac, &maclen))
A DOSSL_CMP_log_open.pod44 OSSL_CMP_severity level, const char *msg);
46 int line, OSSL_CMP_severity level, const char *msg);
64 OSSL_CMP_severity level, const char *msg);
A DASYNC_start_job.pod227 unsigned char *msg;
240 msg = (unsigned char *)arg;
241 printf("Passed in message is: %s\n", msg);
296 unsigned char msg[13] = "Hello world!";
307 switch (ASYNC_start_job(&job, ctx, &ret, jobfunc, msg, sizeof(msg))) {
A DBIO_set_callback.pod39 BIO_MSG *msg;
228 =item B<BIO_sendmmsg(BIO *b, BIO_MSG *msg, size_t stride, size_t num_msg, uint64_t flags, size_t *m…
251 =item B<BIO_recvmmsg(BIO *b, BIO_MSG *msg, size_t stride, size_t num_msg, uint64_t flags, size_t *m…
A DBIO_sendmmsg.pod20 int BIO_sendmmsg(BIO *b, BIO_MSG *msg,
23 int BIO_recvmmsg(BIO *b, BIO_MSG *msg,
99 which is also the length of the array pointed to by I<msg>.
/doc/internal/man3/
A Dossl_cmp_msg_protect.pod15 const OSSL_CMP_MSG *msg);
16 int ossl_cmp_msg_protect(OSSL_CMP_CTX *ctx, OSSL_CMP_MSG *msg);
17 int ossl_cmp_msg_add_extraCerts(OSSL_CMP_CTX *ctx, OSSL_CMP_MSG *msg);
21 ossl_cmp_calc_protection() calculates the protection for the given I<msg>
24 Unless I<msg->header->protectionAlg> is B<PasswordBasedMAC>,
28 ossl_cmp_msg_protect() (re-)protects the given message I<msg> using an algorithm
34 ossl_cmp_msg_add_extraCerts() adds elements to the extraCerts field in I<msg>.
A Dossl_cmp_msg_create.pod73 int ossl_cmp_msg_get_bodytype(const OSSL_CMP_MSG *msg);
74 int ossl_cmp_msg_set_bodytype( OSSL_CMP_MSG *msg, int type);
76 int ossl_cmp_msg_gen_ITAV_push0(OSSL_CMP_MSG *msg, OSSL_CMP_ITAV *itav);
77 int ossl_cmp_msg_gen_ITAVs_push1(OSSL_CMP_MSG *msg,
100 PKIMessage B<msg> of GenMsg or GenRep type. Consumes the B<itavs> pointer.
104 of the PKIMessage B<msg> of GenMsg or GenRep type.
A Dossl_cmp_print_log.pod28 #define ossl_cmp_alert(ctx, msg)
29 #define ossl_cmp_err(ctx, msg)
30 #define ossl_cmp_warn(ctx, msg)
31 #define ossl_cmp_info(ctx, msg)
32 #define ossl_cmp_debug(ctx, (msg)
33 #define ossl_cmp_log(level, ctx, msg)
A Dossl_cmp_msg_check_update.pod14 const OSSL_CMP_MSG *msg,
17 int ossl_cmp_msg_check_update(OSSL_CMP_CTX *ctx, const OSSL_CMP_MSG *msg,
22 ossl_cmp_msg_check_update() does all generic checks on the given message B<msg>,
26 The B<msg> is checked for the following:
49 The callback is passed also the arguments B<ctx>, B<msg>, and <cb_arg>
54 ossl_cmp_msg_check_update() adds all extraCerts contained in the <msg> to
A DOSSL_DEPRECATED.pod12 #define OSSL_DEPRECATED_FOR(since, msg)
23 second argument I<msg>, which is an additional text messages to be displayed
/doc/designs/ddd/
A Dddd-01-conn-blocking.c140 static char msg[384], host_port[300]; in main() local
152 mlen = snprintf(msg, sizeof(msg), in main()
167 l = tx(b, msg, mlen); in main()
A Dddd-03-fd-blocking.c140 static char msg[300]; in main() local
151 mlen = snprintf(msg, sizeof(msg), in main()
193 l = tx(ssl, msg, mlen); in main()
/doc/man1/
A Dopenssl-mac.pod.in129 -in msg.bin HMAC
134 -in msg.bin -out out.bin -binary SipHash
140 -in msg.bin CMAC
146 -macopt size:16 -in msg.bin KMAC128
151 -macopt hexkey:77A77FAF290C1FA30C683DF16BA7A77B -in msg.bin GMAC
A Dopenssl-smime.pod.in369 openssl smime -sign -in message.txt -text -out mail.msg \
374 openssl smime -sign -in message.txt -text -out mail.msg -nodetach \
380 openssl smime -sign -in in.txt -text -out mail.msg \
385 openssl smime -sign -in message.txt -text -out mail.msg \
396 openssl smime -verify -in mail.msg -signer user.pem -out signedtext.txt
400 openssl smime -encrypt -in in.txt -out mail.msg -from steve@openssl.org \
407 | openssl smime -encrypt -out mail.msg \
416 openssl smime -decrypt -in mail.msg -recip mycert.pem -inkey key.pem
436 openssl smime -encrypt -in plain.txt -camellia128 -out mail.msg cert.pem
440 openssl smime -resign -in mail.msg -signer newsign.pem -out mail2.msg
A Dopenssl-cms.pod.in817 openssl cms -sign -in message.txt -text -out mail.msg \
822 openssl cms -sign -in message.txt -text -out mail.msg -nodetach \
828 openssl cms -sign -in in.txt -text -out mail.msg \
833 openssl cms -sign -in message.txt -text -out mail.msg \
850 -des3 user.pem -out mail.msg
855 | openssl cms -encrypt -out mail.msg \
864 openssl cms -decrypt -in mail.msg -recip mycert.pem -inkey key.pem
888 openssl cms -resign -in mail.msg -signer newsign.pem -out mail2.msg
892 openssl cms -sign -in message.txt -text -out mail.msg \
897 openssl cms -encrypt -in plain.txt -out mail.msg \
[all …]
/doc/man7/
A DEVP_SIGNATURE-SLH-DSA.pod94 void do_sign(EVP_PKEY *key, unsigned char *msg, size_t msg_len)
107 EVP_PKEY_sign(sctx, NULL, &sig_len, msg, msg_len);
109 EVP_PKEY_sign(sctx, sig, &sig_len, msg, msg_len);
A DEVP_SIGNATURE-ML-DSA.pod98 void do_sign(EVP_PKEY *key, unsigned char *msg, size_t msg_len)
111 EVP_PKEY_sign(sctx, NULL, &sig_len, msg, msg_len);
113 EVP_PKEY_sign(sctx, sig, &sig_len, msg, msg_len);
A DEVP_SIGNATURE-ED25519.pod141 void do_sign(EVP_PKEY *ed_key, unsigned char *msg, size_t msg_len)
157 EVP_DigestSign(md_ctx, NULL, &sig_len, msg, msg_len);
160 EVP_DigestSign(md_ctx, sig, &sig_len, msg, msg_len);
A DEVP_SIGNATURE-LMS.pod45 ret = EVP_PKEY_verify(ctx, sigdata, sigdata_len, msg, msglen);
A DEVP_PKEY-SM2.pod77 EVP_DigestVerifyUpdate(mctx, msg, msg_len);
/doc/designs/quic-design/
A Dquic-fault-injector.md285 unsigned char *msg,
433 char *msg = "Hello World!";
434 size_t msglen = strlen(msg);
458 if (!TEST_true(ossl_quic_tserver_write(qtserv, (unsigned char *)msg, msglen,

Completed in 74 milliseconds

12