| /doc/man3/ |
| A D | OSSL_CRMF_MSG_set1_regCtrl_regToken.pod | 26 *OSSL_CRMF_MSG_get0_regCtrl_regToken(const OSSL_CRMF_MSG *msg); 27 int OSSL_CRMF_MSG_set1_regCtrl_regToken(OSSL_CRMF_MSG *msg, 30 *OSSL_CRMF_MSG_get0_regCtrl_authenticator(const OSSL_CRMF_MSG *msg); 31 int OSSL_CRMF_MSG_set1_regCtrl_authenticator(OSSL_CRMF_MSG *msg, 42 int OSSL_CRMF_MSG_set1_regCtrl_pkiPublicationInfo(OSSL_CRMF_MSG *msg, 45 *OSSL_CRMF_MSG_get0_regCtrl_protocolEncrKey(const OSSL_CRMF_MSG *msg); 46 int OSSL_CRMF_MSG_set1_regCtrl_protocolEncrKey(OSSL_CRMF_MSG *msg, 49 *OSSL_CRMF_MSG_get0_regCtrl_oldCertID(const OSSL_CRMF_MSG *msg); 50 int OSSL_CRMF_MSG_set1_regCtrl_oldCertID(OSSL_CRMF_MSG *msg, 58 returns the respective control X in the given I<msg>, if present. [all …]
|
| A D | OSSL_CRMF_MSG_set1_regInfo_certReq.pod | 16 *OSSL_CRMF_MSG_get0_regInfo_utf8Pairs(const OSSL_CRMF_MSG *msg); 17 int OSSL_CRMF_MSG_set1_regInfo_utf8Pairs(OSSL_CRMF_MSG *msg, 20 *OSSL_CRMF_MSG_get0_regInfo_certReq(const OSSL_CRMF_MSG *msg); 21 int OSSL_CRMF_MSG_set1_regInfo_certReq(OSSL_CRMF_MSG *msg, 27 in the given I<msg>, if present. 30 value as utf8Pairs regInfo to the given I<msg>. See RFC 4211 section 7.1. 33 in the given I<msg>, if present. 36 as certReq regInfo to the given I<msg>. See RFC 4211 section 7.2. 48 control to the regInfo structure of the given I<msg>. While RFC 4211 expects
|
| A D | OSSL_CMP_MSG_get0_header.pod | 21 OSSL_CMP_PKIHEADER *OSSL_CMP_MSG_get0_header(const OSSL_CMP_MSG *msg); 22 int OSSL_CMP_MSG_get_bodytype(const OSSL_CMP_MSG *msg); 23 X509_PUBKEY *OSSL_CMP_MSG_get0_certreq_publickey(const OSSL_CMP_MSG *msg); 24 int OSSL_CMP_MSG_update_transactionID(OSSL_CMP_CTX *ctx, OSSL_CMP_MSG *msg); 25 int OSSL_CMP_MSG_update_recipNonce(OSSL_CMP_CTX *ctx, OSSL_CMP_MSG *msg); 28 int OSSL_CMP_MSG_write(const char *file, const OSSL_CMP_MSG *msg); 29 OSSL_CMP_MSG *d2i_OSSL_CMP_MSG_bio(BIO *bio, OSSL_CMP_MSG **msg); 30 int i2d_OSSL_CMP_MSG_bio(BIO *bio, const OSSL_CMP_MSG *msg); 38 OSSL_CMP_MSG_get0_certreq_publickey() expects that I<msg> is a certificate request 110 It assigns a pointer to the new structure to I<*msg> if I<msg> is not NULL. [all …]
|
| A D | OSSL_CMP_validate_msg.pod | 12 int OSSL_CMP_validate_msg(OSSL_CMP_CTX *ctx, OSSL_CMP_MSG *msg); 22 OSSL_CMP_validate_msg() validates the protection of the given I<msg>, 31 taken from the list of certificates received in the I<msg> extraCerts, then any 37 the I<msg> sender DN (as far as present), and its subject key identifier 45 any self-issued certificate from the I<msg> extraCerts field may be used
|
| A D | OSSL_CRMF_pbmp_new.pod | 15 const unsigned char *msg, size_t msglen, 26 parameters I<pbmp>, message I<msg>, and secret I<sec>, along with the respective 65 unsigned char *msg = "Hello"; 72 if (!OSSL_CRMF_pbm_new(pbm, msg, 5, sec, 6, &mac, &maclen))
|
| A D | OSSL_CMP_log_open.pod | 44 OSSL_CMP_severity level, const char *msg); 46 int line, OSSL_CMP_severity level, const char *msg); 64 OSSL_CMP_severity level, const char *msg);
|
| A D | ASYNC_start_job.pod | 227 unsigned char *msg; 240 msg = (unsigned char *)arg; 241 printf("Passed in message is: %s\n", msg); 296 unsigned char msg[13] = "Hello world!"; 307 switch (ASYNC_start_job(&job, ctx, &ret, jobfunc, msg, sizeof(msg))) {
|
| A D | BIO_set_callback.pod | 39 BIO_MSG *msg; 228 =item B<BIO_sendmmsg(BIO *b, BIO_MSG *msg, size_t stride, size_t num_msg, uint64_t flags, size_t *m… 251 =item B<BIO_recvmmsg(BIO *b, BIO_MSG *msg, size_t stride, size_t num_msg, uint64_t flags, size_t *m…
|
| A D | BIO_sendmmsg.pod | 20 int BIO_sendmmsg(BIO *b, BIO_MSG *msg, 23 int BIO_recvmmsg(BIO *b, BIO_MSG *msg, 99 which is also the length of the array pointed to by I<msg>.
|
| /doc/internal/man3/ |
| A D | ossl_cmp_msg_protect.pod | 15 const OSSL_CMP_MSG *msg); 16 int ossl_cmp_msg_protect(OSSL_CMP_CTX *ctx, OSSL_CMP_MSG *msg); 17 int ossl_cmp_msg_add_extraCerts(OSSL_CMP_CTX *ctx, OSSL_CMP_MSG *msg); 21 ossl_cmp_calc_protection() calculates the protection for the given I<msg> 24 Unless I<msg->header->protectionAlg> is B<PasswordBasedMAC>, 28 ossl_cmp_msg_protect() (re-)protects the given message I<msg> using an algorithm 34 ossl_cmp_msg_add_extraCerts() adds elements to the extraCerts field in I<msg>.
|
| A D | ossl_cmp_msg_create.pod | 73 int ossl_cmp_msg_get_bodytype(const OSSL_CMP_MSG *msg); 74 int ossl_cmp_msg_set_bodytype( OSSL_CMP_MSG *msg, int type); 76 int ossl_cmp_msg_gen_ITAV_push0(OSSL_CMP_MSG *msg, OSSL_CMP_ITAV *itav); 77 int ossl_cmp_msg_gen_ITAVs_push1(OSSL_CMP_MSG *msg, 100 PKIMessage B<msg> of GenMsg or GenRep type. Consumes the B<itavs> pointer. 104 of the PKIMessage B<msg> of GenMsg or GenRep type.
|
| A D | ossl_cmp_print_log.pod | 28 #define ossl_cmp_alert(ctx, msg) 29 #define ossl_cmp_err(ctx, msg) 30 #define ossl_cmp_warn(ctx, msg) 31 #define ossl_cmp_info(ctx, msg) 32 #define ossl_cmp_debug(ctx, (msg) 33 #define ossl_cmp_log(level, ctx, msg)
|
| A D | ossl_cmp_msg_check_update.pod | 14 const OSSL_CMP_MSG *msg, 17 int ossl_cmp_msg_check_update(OSSL_CMP_CTX *ctx, const OSSL_CMP_MSG *msg, 22 ossl_cmp_msg_check_update() does all generic checks on the given message B<msg>, 26 The B<msg> is checked for the following: 49 The callback is passed also the arguments B<ctx>, B<msg>, and <cb_arg> 54 ossl_cmp_msg_check_update() adds all extraCerts contained in the <msg> to
|
| A D | OSSL_DEPRECATED.pod | 12 #define OSSL_DEPRECATED_FOR(since, msg) 23 second argument I<msg>, which is an additional text messages to be displayed
|
| /doc/designs/ddd/ |
| A D | ddd-01-conn-blocking.c | 140 static char msg[384], host_port[300]; in main() local 152 mlen = snprintf(msg, sizeof(msg), in main() 167 l = tx(b, msg, mlen); in main()
|
| A D | ddd-03-fd-blocking.c | 140 static char msg[300]; in main() local 151 mlen = snprintf(msg, sizeof(msg), in main() 193 l = tx(ssl, msg, mlen); in main()
|
| /doc/man1/ |
| A D | openssl-mac.pod.in | 129 -in msg.bin HMAC 134 -in msg.bin -out out.bin -binary SipHash 140 -in msg.bin CMAC 146 -macopt size:16 -in msg.bin KMAC128 151 -macopt hexkey:77A77FAF290C1FA30C683DF16BA7A77B -in msg.bin GMAC
|
| A D | openssl-smime.pod.in | 369 openssl smime -sign -in message.txt -text -out mail.msg \ 374 openssl smime -sign -in message.txt -text -out mail.msg -nodetach \ 380 openssl smime -sign -in in.txt -text -out mail.msg \ 385 openssl smime -sign -in message.txt -text -out mail.msg \ 396 openssl smime -verify -in mail.msg -signer user.pem -out signedtext.txt 400 openssl smime -encrypt -in in.txt -out mail.msg -from steve@openssl.org \ 407 | openssl smime -encrypt -out mail.msg \ 416 openssl smime -decrypt -in mail.msg -recip mycert.pem -inkey key.pem 436 openssl smime -encrypt -in plain.txt -camellia128 -out mail.msg cert.pem 440 openssl smime -resign -in mail.msg -signer newsign.pem -out mail2.msg
|
| A D | openssl-cms.pod.in | 817 openssl cms -sign -in message.txt -text -out mail.msg \ 822 openssl cms -sign -in message.txt -text -out mail.msg -nodetach \ 828 openssl cms -sign -in in.txt -text -out mail.msg \ 833 openssl cms -sign -in message.txt -text -out mail.msg \ 850 -des3 user.pem -out mail.msg 855 | openssl cms -encrypt -out mail.msg \ 864 openssl cms -decrypt -in mail.msg -recip mycert.pem -inkey key.pem 888 openssl cms -resign -in mail.msg -signer newsign.pem -out mail2.msg 892 openssl cms -sign -in message.txt -text -out mail.msg \ 897 openssl cms -encrypt -in plain.txt -out mail.msg \ [all …]
|
| /doc/man7/ |
| A D | EVP_SIGNATURE-SLH-DSA.pod | 94 void do_sign(EVP_PKEY *key, unsigned char *msg, size_t msg_len) 107 EVP_PKEY_sign(sctx, NULL, &sig_len, msg, msg_len); 109 EVP_PKEY_sign(sctx, sig, &sig_len, msg, msg_len);
|
| A D | EVP_SIGNATURE-ML-DSA.pod | 98 void do_sign(EVP_PKEY *key, unsigned char *msg, size_t msg_len) 111 EVP_PKEY_sign(sctx, NULL, &sig_len, msg, msg_len); 113 EVP_PKEY_sign(sctx, sig, &sig_len, msg, msg_len);
|
| A D | EVP_SIGNATURE-ED25519.pod | 141 void do_sign(EVP_PKEY *ed_key, unsigned char *msg, size_t msg_len) 157 EVP_DigestSign(md_ctx, NULL, &sig_len, msg, msg_len); 160 EVP_DigestSign(md_ctx, sig, &sig_len, msg, msg_len);
|
| A D | EVP_SIGNATURE-LMS.pod | 45 ret = EVP_PKEY_verify(ctx, sigdata, sigdata_len, msg, msglen);
|
| A D | EVP_PKEY-SM2.pod | 77 EVP_DigestVerifyUpdate(mctx, msg, msg_len);
|
| /doc/designs/quic-design/ |
| A D | quic-fault-injector.md | 285 unsigned char *msg, 433 char *msg = "Hello World!"; 434 size_t msglen = strlen(msg); 458 if (!TEST_true(ossl_quic_tserver_write(qtserv, (unsigned char *)msg, msglen,
|