OSSL_METHOD_STORE, ossl_method_store_new, ossl_method_store_free,
ossl_method_store_init, ossl_method_store_cleanup,
ossl_method_store_add, ossl_method_store_fetch,
-ossl_method_store_remove, ossl_method_store_remove_all_provided,
+ossl_method_store_remove, ossl_method_store_remove_all_provided,
ossl_method_store_cache_get, ossl_method_store_cache_set,
ossl_method_store_cache_flush_all
- implementation method store and query
int OSSL_DECODER_CTX_set_input_structure(OSSL_DECODER_CTX *ctx,
const char *input_structure);
int OSSL_DECODER_CTX_add_decoder(OSSL_DECODER_CTX *ctx, OSSL_DECODER *decoder);
- int OSSL_DECODER_CTX_add_extra(OSSL_DECODER_CTX *ctx,
- OSSL_LIB_CTX *libctx,
+ int OSSL_DECODER_CTX_add_extra(OSSL_DECODER_CTX *ctx,
+ OSSL_LIB_CTX *libctx,
const char *propq);
int OSSL_DECODER_CTX_get_num_decoders(OSSL_DECODER_CTX *ctx);
=head2 HPKE Roles
-HPKE contexts have a role - either sender or receiver. This is used
+HPKE contexts have a role - either sender or receiver. This is used
to control which functions can be called and so that senders do not
reuse a key and nonce with different plaintexts.
-OSSL_HPKE_CTX_free(), OSSL_HPKE_export(), OSSL_HPKE_CTX_set1_psk(),
+OSSL_HPKE_CTX_free(), OSSL_HPKE_export(), OSSL_HPKE_CTX_set1_psk(),
and OSSL_HPKE_CTX_get_seq() can be called regardless of role.
=over 4
=item B<OSSL_HPKE_ROLE_SENDER>, 0
An I<OSSL_HPKE_CTX> with this role can be used with
-OSSL_HPKE_encap(), OSSL_HPKE_seal(), OSSL_HPKE_CTX_set1_ikme() and
+OSSL_HPKE_encap(), OSSL_HPKE_seal(), OSSL_HPKE_CTX_set1_ikme() and
OSSL_HPKE_CTX_set1_authpriv().
=item B<OSSL_HPKE_ROLE_RECEIVER>, 1
=head1 RETURN VALUES
-PKCS12_SAFEBAG_set0_attrs() does not return a value.
+PKCS12_SAFEBAG_set0_attrs() does not return a value.
=head1 COPYRIGHT
I<ctx> and property query I<propq> to be used to select algorithm implementations.
PKCS12_create_ex2() is identical to PKCS12_create_ex() but allows for a user defined
-callback I<cb> of type B<PKCS12_create_cb> to be specified and also allows for an
+callback I<cb> of type B<PKCS12_create_cb> to be specified and also allows for an
optional argument I<cbarg> to be passed back to the callback.
The I<cb> if specified will be called for every safebag added to the
/* Do SSL_connect() handshake and handle errors here */
- /* Optional: verify the peer RPK */
+ /* Optional: verify the peer RPK */
verify_result = SSL_get_verify_result(ssl);
if (verify_result == X509_V_OK) {
/* The server's raw public key matched the TLSA record */
/* this should not happen but check anyway */
if (idx < 0
- || (ssl = X509_STORE_CTX_get_ex_data(ctx, idx)) == NULL)
+ || (ssl = X509_STORE_CTX_get_ex_data(ctx, idx)) == NULL)
return 0;
if (/* we need to retry verification callback */)
DRBG tests used with the "DRBG" type.
-= item "RNG" (B<OSSL_SELF_TEST_DESC_RNG>)
+=item "RNG" (B<OSSL_SELF_TEST_DESC_RNG>)
"Continuous_RNG_Test" uses this.