Home
last modified time | relevance | path

Searched refs:structure (Results 1 – 25 of 610) sorted by relevance

12345678910>>...25

/freebsd/crypto/openssl/test/
H A Dendecoder_legacy_test.c74 const char *structure[2]; member
305 const char *structure) in test_protected_PEM() argument
323 "PEM", structure, in test_protected_PEM()
337 "PEM", structure, in test_protected_PEM()
373 const char *structure) in test_unprotected_PEM() argument
391 "PEM", structure, in test_unprotected_PEM()
404 "PEM", structure, in test_unprotected_PEM()
438 const char *structure) in test_DER() argument
456 "DER", structure, in test_DER()
471 "DER", structure, in test_DER()
[all …]
/freebsd/sys/ofed/drivers/infiniband/core/
H A Dib_packer.c41 static u64 value_read(int offset, int size, void *structure) in value_read() argument
44 case 1: return *(u8 *) ((char *)structure + offset); in value_read()
45 case 2: return be16_to_cpup((__be16 *) ((char *)structure + offset)); in value_read()
46 case 4: return be32_to_cpup((__be32 *) ((char *)structure + offset)); in value_read()
47 case 8: return be64_to_cpup((__be64 *) ((char *)structure + offset)); in value_read()
66 void *structure, in ib_pack() argument
82 structure) << shift; in ib_pack()
99 structure) << shift; in ib_pack()
116 (char *)structure + desc[i].struct_offset_bytes, in ib_pack()
128 static void value_write(int offset, int size, u64 val, void *structure) in value_write() argument
[all …]
/freebsd/crypto/openssl/doc/man3/
H A DPKCS7_sign_add_signer.pod6 PKCS7_add_certificate, PKCS7_add_crl - add information to PKCS7 structure
20 key I<pkey> using message digest I<md> to a PKCS7 signed data structure I<p7>.
22 The B<PKCS7> structure should be obtained from an initial call to PKCS7_sign()
24 signed data structure.
29 Unless the B<PKCS7_REUSE_DIGEST> flag is set the returned B<PKCS7> structure
37 signed data structure where the simpler PKCS7_sign() function defaults are
45 digest value from the B<PKCS7> structure: to add a signer to an existing structure.
47 returned B<PKCS7> structure will be valid and finalized when this flag is set.
50 B<PKCS7_SIGNER_INO> structure will not be finalized so additional attributes
55 B<PKCS7> structure, the signer's certificate must still be supplied in the
[all …]
H A DCMS_get0_RecipientInfos.pod46 structures associated with a CMS EnvelopedData structure.
48 CMS_RecipientInfo_type() returns the type of CMS_RecipientInfo structure B<ri>.
53 identifier associated with a specific CMS_RecipientInfo structure B<ri>, which
58 CMS_RecipientInfo structure B<ri>, which must be of type CMS_RECIPINFO_TRANS.
62 the CMS_RecipientInfo structure B<ri>, which must be of type
66 and peer certificate B<peer> with the CMS_RecipientInfo structure B<ri>, which
70 CMS_RecipientInfo structure B<ri>, which must be of type CMS_RECIPINFO_AGREE.
73 CMS_RecipientInfo structure B<ri> which must be of type CMS_RECIPINFO_KEK. Any
83 parameters against the B<keyIdentifier> CMS_RecipientInfo structure B<ri>,
88 B<keylen> with the CMS_RecipientInfo structure B<ri>, which must be of type
[all …]
H A DCMS_add1_signer.pod5 CMS_add1_signer, CMS_SignerInfo_sign - add a signer to a CMS_ContentInfo signed data structure
21 structure B<cms>.
23 The CMS_ContentInfo structure should be obtained from an initial call to
25 valid CMS_ContentInfo SignedData structure.
31 structure is not complete and must be finalized either by streaming (if
35 structure, its main use is when the B<CMS_REUSE_DIGEST> and B<CMS_PARTIAL> flags
41 over a CMS signed data structure where the simpler CMS_sign() function defaults
44 CMS_SignerInfo structure and the CMS attribute utility functions or the
51 digest value from the CMS_ContentInfo structure: to add a signer to an existing
52 structure. An error occurs if a matching digest value cannot be found to copy.
[all …]
H A Dd2i_RSAPrivateKey.pod128 because the PKCS#1 B<RSA> structure doesn't include any key parameters.
131 B<I<TYPE>> private key data organized in a type specific structure.
134 B<I<TYPE>> public key data organized in a type specific structure.
137 key parameters organized in a type specific structure.
140 public key data organized in a B<SubjectPublicKeyInfo> structure.
143 B<I<TYPE>> data into a type specific DER encoded structure.
146 B<I<TYPE>> data into a type specific DER encoded structure.
149 parameters data into a type specific DER encoded structure.
152 B<I<TYPE>> data into a DER encoded B<SubjectPublicKeyInfo> structure.
155 structure defined by PKCS#1.
[all …]
H A DASN1_aux_cb.pod18 int enc_offset; /* Offset of ASN1_ENCODING structure */
45 additional information about the ASN.1 structure. An B<ASN1_AUX> structure is
46 associated with the structure during the definition of the ASN.1 template. For
47 example an B<ASN1_AUX> structure will be associated by using one of the various
52 An B<ASN1_AUX> structure contains the following information.
78 offset into the B<ASN1_VALUE> structure where a B<CRYPTO_REF_COUNT> may be
84 offset into the B<ASN1_VALUE> structure where a B<CRYPTO_RWLOCK> may be
117 Invoked when processing a B<CHOICE>, B<SEQUENCE> or B<NDEF_SEQUENCE> structure
124 Invoked when processing a B<CHOICE>, B<SEQUENCE> or B<NDEF_SEQUENCE> structure
130 Invoked when processing a B<CHOICE>, B<SEQUENCE> or B<NDEF_SEQUENCE> structure
[all …]
H A DCMS_add1_recipient_cert.pod5 … CMS_add1_recipient_cert, CMS_add0_recipient_key - add recipients to a CMS enveloped data structure
33 data structure B<cms> as a KeyTransRecipientInfo structure.
38 data structure B<cms> as a KEKRecipientInfo structure.
40 The CMS_ContentInfo structure should be obtained from an initial call to
46 enveloped data structure where the simpler CMS_encrypt() function defaults are
49 CMS_RecipientInfo structure and the CMS attribute utility functions.
64 pointer to the CMS_RecipientInfo structure just added or NULL if an error
H A DPKCS7_sign.pod6 - create a PKCS#7 signedData structure
20 PKCS7_sign_ex() creates and returns a PKCS#7 signedData structure.
23 in the PKCS#7 structure (for example any intermediate CAs in the chain).
39 will not be included in the PKCS7 structure.
44 The data being signed is included in the PKCS7 structure, unless
54 The signedData structure includes several PKCS#7 authenticatedAttributes
64 If the flags B<PKCS7_STREAM> is set then the returned B<PKCS7> structure is
70 If the B<PKCS7_PARTIAL> flag is set a partial B<PKCS7> structure is output to
73 If the flag B<PKCS7_STREAM> is set the returned B<PKCS7> structure is B<not>
75 finalize the B<PKCS7> structure will give unpredictable results.
[all …]
H A DASN1_TIME_set.pod70 functions set the structure I<s> to the time represented by the time_t
71 value I<t>. If I<s> is NULL a new time structure is allocated and returned.
74 functions set the time structure I<s> to the time represented
78 seconds in a day. If I<s> is NULL a new structure is allocated
82 ASN1_GENERALIZEDTIME_set_string() functions set the time structure I<s>
88 ASN1_TIME_set_string_X509() sets B<ASN1_TIME> structure I<s> to the time
101 functions check the syntax of the time structure I<s>.
104 functions print the time structure I<s> to BIO I<b> in human readable
107 If the time structure has invalid format it prints out "Bad time value" and
114 ASN1_TIME_to_tm() converts the time I<s> to the standard I<tm> structure.
[all …]
H A DCMS_encrypt.pod5 CMS_encrypt_ex, CMS_encrypt - create a CMS envelopedData structure
20 AuthEnvelopedData structure. I<certs> is a list of recipient certificates.
33 its parameters. If the cipher mode is GCM, then an AuthEnvelopedData structure
34 containing MAC is used. Otherwise an EnvelopedData structure is used. Currently
58 If the B<CMS_STREAM> flag is set a partial B<CMS_ContentInfo> structure is
61 If the B<CMS_PARTIAL> flag is set a partial B<CMS_ContentInfo> structure is
65 The data being encrypted is included in the CMS_ContentInfo structure, unless
69 If the flag B<CMS_STREAM> is set the returned B<CMS_ContentInfo> structure is
71 properly finalize the B<CMS_ContentInfo> structure will give unpredictable
75 PEM_write_bio_CMS_stream() finalize the structure. Alternatively finalization
[all …]
H A DSSL_new.pod5 SSL_dup, SSL_new, SSL_up_ref - create an SSL structure for a connection
17 SSL_new() creates a new B<SSL> structure which is needed to hold the
18 data for a TLS/SSL connection. The new structure inherits the settings
20 options, verification settings, timeout settings. An B<SSL> structure is
21 reference counted. Creating an B<SSL> structure for the first time increments
24 structure are freed.
27 existing B<SSL> structure.
29 The function SSL_dup() creates and returns a new B<SSL> structure from the same
107 The creation of a new SSL structure failed. Check the error stack to
110 =item Pointer to an SSL structure
[all …]
H A DCMS_sign.pod5 CMS_sign, CMS_sign_ex - create a CMS SignedData structure
20 CMS_sign_ex() creates and returns a CMS SignedData structure.
23 in the CMS structure (for example any intermediate CAs in the chain). The
45 CMS_ContentInfo structure, the signer's certificate must still be supplied in
50 The data being signed is included in the CMS_ContentInfo structure, unless
60 The SignedData structure includes several CMS signedAttributes including the
79 structure is just initialized ready to perform the signing operation. The
84 If the B<CMS_PARTIAL> flag is set a partial B<CMS_ContentInfo> structure is
88 If the flag B<CMS_STREAM> is set the returned B<CMS_ContentInfo> structure is
90 properly finalize the B<CMS_ContentInfo> structure will give unpredictable
[all …]
H A DCMS_compress.pod5 CMS_compress - create a CMS CompressedData structure
15 CMS_compress() creates and returns a CMS CompressedData structure. B<comp_nid>
35 If the B<CMS_STREAM> flag is set a partial B<CMS_ContentInfo> structure is
38 The compressed data is included in the CMS_ContentInfo structure, unless
42 If the flag B<CMS_STREAM> is set the returned B<CMS_ContentInfo> structure is
44 properly finalize the B<CMS_ContentInfo> structure will give unpredictable
48 PEM_write_bio_CMS_stream() finalize the structure. Alternatively finalization
57 CMS_compress() returns either a CMS_ContentInfo structure or NULL if an error
H A Dd2i_X509.pod387 pointer to the B<I<TYPE>> structure is returned and I<*ppin> is incremented to
389 to the returned structure is also written to I<*a>. If an error occurred
395 contains a valid B<I<TYPE>> structure and an attempt is made to reuse it.
397 context on the decoded structure this way (see the B<EXAMPLES> section).
408 B<i2d_I<TYPE>>() encodes the structure pointed to by I<a> into DER format.
419 the encoding of the structure I<a> to BIO I<bp> and it
423 the encoding of the structure I<a> to FILE pointer I<fp> and it
432 "internal" (that is, an internal C structure) and "DER" respectively.
437 The actual TYPE structure passed to B<i2d_I<TYPE>>() must be a valid
438 populated B<I<TYPE>> structure -- it B<cannot> simply be fed with an
[all …]
H A DPKCS12_init.pod5 PKCS12_init, PKCS12_init_ex - Create a new empty PKCS#12 structure
16 PKCS12_init() creates an empty PKCS#12 structure. Any PKCS#7 authSafes added
17 to this structure are enclosed first within a single PKCS#7 contentInfo
20 PKCS12_init_ex() creates an empty PKCS#12 structure and assigns the supplied
26 PKCS12_init() and PKCS12_init_ex() return a valid B<PKCS12> structure or NULL
H A DOCSP_REQUEST_new.pod29 OCSP_REQUEST_new() allocates and returns an empty B<OCSP_REQUEST> structure.
31 OCSP_REQUEST_free() frees up the request structure B<req>.
35 the B<OCSP_ONEREQ> structure added so an application can add additional
56 OCSP_REQUEST_new() returns an empty B<OCSP_REQUEST> structure or B<NULL> if
59 OCSP_request_add0_id() returns the B<OCSP_ONEREQ> structure containing B<cid>
68 OCSP_request_onereq_get0() returns a pointer to an B<OCSP_ONEREQ> structure
73 An OCSP request structure contains one or more B<OCSP_ONEREQ> structures
81 Create an B<OCSP_REQUEST> structure for certificate B<cert> with issuer
H A DASN1_OBJECT_new.pod17 B<ASN1_OBJECT> structure, which represents an ASN1 OBJECT IDENTIFIER.
19 ASN1_OBJECT_new() allocates and initializes an B<ASN1_OBJECT> structure.
21 ASN1_OBJECT_free() frees up the B<ASN1_OBJECT> structure I<a>.
26 Although ASN1_OBJECT_new() allocates a new B<ASN1_OBJECT> structure it
34 Otherwise it returns a pointer to the newly allocated structure.
H A DX509_PUBKEY_new.pod45 The B<X509_PUBKEY> structure represents the ASN.1 B<SubjectPublicKeyInfo>
46 structure defined in RFC5280 and used in certificates and certificate requests.
48 X509_PUBKEY_new_ex() allocates and initializes an B<X509_PUBKEY> structure
60 X509_PUBKEY_free() frees up B<X509_PUBKEY> structure I<a>. If I<a> is NULL
64 in the B<EVP_PKEY> structure I<pkey>. If I<*x> is not NULL any existing
65 public key structure will be freed.
74 d2i_PUBKEY_ex() decodes an B<EVP_PKEY> structure using B<SubjectPublicKeyInfo>
81 i2d_PUBKEY() encodes an B<EVP_PKEY> structure using B<SubjectPublicKeyInfo>
90 algorithm parameters is set to I<type> using the structure I<pval>.
118 Otherwise they return a pointer to the newly allocated structure.
[all …]
H A DASN1_TYPE_get.pod23 These functions allow an B<ASN1_TYPE> structure to be manipulated. The
24 B<ASN1_TYPE> structure can contain any ASN.1 type or constructed type
39 I<t> using the ASN.1 structure I<it>. If successful it returns a pointer
40 to the ASN.1 structure corresponding to I<it> which must be freed by the
43 ASN1_TYPE_pack_sequence() attempts to encode the ASN.1 structure I<s>
56 B<V_ASN1_OBJECT> then value is an B<ASN1_OBJECT> structure. Otherwise I<type>
57 is and B<ASN1_STRING> structure. If I<type> corresponds to a primitive type
86 ASN1_TYPE_unpack_sequence() returns a pointer to an ASN.1 structure or
89 ASN1_TYPE_pack_sequence() return an B<ASN1_TYPE> structure if it succeeds or
H A DCMS_get0_type.pod18 CMS_get0_type() returns the content type of a CMS_ContentInfo structure as
20 CMS_ContentInfo structure based on this value.
23 structure. It should be called with CMS functions (such as L<CMS_sign(3)>,
26 flag and B<before> the structure is finalised, otherwise the results are
59 access, modify or create the embedded content in a B<CMS_ContentInfo> structure
65 CMS_get0_type() and CMS_get0_eContentType() return an ASN1_OBJECT structure.
H A Ds2i_ASN1_IA5STRING.pod47 "internal" (that is, an internal C structure) and string respectively.
60 B<ASN1_IA5STRING> structure or NULL if an error occurs.
66 structure or NULL if an error occurs.
72 B<ASN1_OCTET_STRING> structure or NULL if an error occurs.
78 structure or NULL if an error occurs.
81 B<ASN1_UTF8STRING> structure or NULL if an error occurs.
H A DPEM_read_bio_PrivateKey.pod222 an EVP_PKEY structure. The write routines use PKCS#8 private key format and are
231 key in an EVP_PKEY structure in PKCS#8 EncryptedPrivateKeyInfo format using
236 structure is used instead.
245 structure. The public key is encoded as a SubjectPublicKeyInfo
246 structure.
249 RSA structure. The write routines uses traditional format. The read
254 RSA structure. The public key is encoded using a PKCS#1 RSAPublicKey
255 structure.
258 an RSA structure. However, the public key is encoded using a
259 SubjectPublicKeyInfo structure and an error occurs if the public
[all …]
/freebsd/sys/contrib/openzfs/config/
H A Dkernel-proc-operations.m43 dnl # The proc_ops structure was introduced to replace the use of
4 dnl # of the file_operations structure when registering proc handlers.
34 AC_MSG_CHECKING([whether proc_ops structure exists])
37 AC_DEFINE(HAVE_PROC_OPS_STRUCT, 1, [proc_ops structure exists])
/freebsd/crypto/openssl/doc/man1/
H A Dopenssl-crl2pkcs7.pod.in6 openssl-crl2pkcs7 - Create a PKCS#7 structure from a CRL and certificates
24 only" structure.
51 Specifies the output filename to write the PKCS#7 structure to or standard
57 All certificates in the file will be added to the PKCS#7 structure. This
72 Create a PKCS#7 structure from a certificate and CRL:
76 Creates a PKCS#7 structure in DER format with no CRL from several
84 The output file is a PKCS#7 signed data structure containing no signers and

12345678910>>...25