var searchIndex = {}; searchIndex["openssl"] = {"doc":"","items":[[0,"asn1","openssl","",null,null],[3,"Asn1Time","openssl::asn1","",null,null],[11,"new","","Wraps existing ASN1_TIME and takes ownership",0,null],[11,"days_from_now","","Creates a new time on specified interval in days from now",0,{"inputs":[{"name":"u32"}],"output":{"name":"result"}}],[11,"get_handle","","Returns raw handle",0,null],[11,"drop","","",0,null],[0,"bn","openssl","",null,null],[3,"BigNum","openssl::bn","",null,null],[4,"RNGProperty","","",null,null],[13,"MsbMaybeZero","","",1,null],[13,"MsbOne","","",1,null],[13,"TwoMsbOne","","",1,null],[0,"unchecked","","",null,null],[11,"clone","","",2,null],[11,"neg","","",2,null],[11,"clone","","",1,null],[11,"new","","",2,{"inputs":[],"output":{"name":"result"}}],[11,"new_from","","",2,{"inputs":[{"name":"u64"}],"output":{"name":"result"}}],[11,"from_dec_str","","",2,{"inputs":[{"name":"str"}],"output":{"name":"result"}}],[11,"from_hex_str","","",2,{"inputs":[{"name":"str"}],"output":{"name":"result"}}],[11,"new_from_ffi","","",2,null],[11,"new_from_slice","","",2,null],[11,"checked_sqr","","",2,null],[11,"checked_nnmod","","",2,null],[11,"checked_mod_add","","",2,null],[11,"checked_mod_sub","","",2,null],[11,"checked_mod_mul","","",2,null],[11,"checked_mod_sqr","","",2,null],[11,"checked_exp","","",2,null],[11,"checked_mod_exp","","",2,null],[11,"checked_mod_inv","","",2,null],[11,"add_word","","",2,null],[11,"sub_word","","",2,null],[11,"mul_word","","",2,null],[11,"div_word","","",2,null],[11,"mod_word","","",2,null],[11,"checked_gcd","","",2,null],[11,"checked_generate_prime","","",2,{"inputs":[{"name":"i32"},{"name":"bool"},{"name":"option"},{"name":"option"}],"output":{"name":"result"}}],[11,"is_prime","","",2,null],[11,"is_prime_fast","","",2,null],[11,"checked_new_random","","",2,{"inputs":[{"name":"i32"},{"name":"rngproperty"},{"name":"bool"}],"output":{"name":"result"}}],[11,"checked_new_pseudo_random","","",2,{"inputs":[{"name":"i32"},{"name":"rngproperty"},{"name":"bool"}],"output":{"name":"result"}}],[11,"checked_rand_in_range","","",2,null],[11,"checked_pseudo_rand_in_range","","",2,null],[11,"set_bit","","",2,null],[11,"clear_bit","","",2,null],[11,"is_bit_set","","",2,null],[11,"mask_bits","","",2,null],[11,"checked_shl1","","",2,null],[11,"checked_shr1","","",2,null],[11,"checked_add","","",2,null],[11,"checked_sub","","",2,null],[11,"checked_mul","","",2,null],[11,"checked_div","","",2,null],[11,"checked_mod","","",2,null],[11,"checked_shl","","",2,null],[11,"checked_shr","","",2,null],[11,"negate","","",2,null],[11,"abs_cmp","","",2,null],[11,"is_negative","","",2,null],[11,"num_bits","","",2,null],[11,"num_bytes","","",2,null],[11,"raw","","",2,null],[11,"raw_ptr","","",2,null],[11,"into_raw","","",2,null],[11,"to_vec","","",2,null],[11,"to_dec_str","","",2,null],[11,"to_hex_str","","",2,null],[11,"fmt","","",2,null],[11,"eq","","",2,null],[11,"cmp","","",2,null],[11,"partial_cmp","","",2,null],[11,"drop","","",2,null],[0,"bio","openssl","",null,null],[3,"MemBio","openssl::bio","",null,null],[11,"drop","","",3,null],[11,"new","","Creates a new owned memory based BIO",3,{"inputs":[],"output":{"name":"result"}}],[11,"borrowed","","Returns a "borrow", i.e. it has no ownership",3,null],[11,"unwrap","","Consumes current bio and returns wrapped value\nNote that data ownership is lost and\nshould be managed manually",3,null],[11,"get_handle","","Temporarily gets wrapped value",3,null],[11,"set_eof","","Sets the BIO's EOF state.",3,null],[11,"read","","",3,null],[11,"write","","",3,null],[11,"flush","","",3,null],[0,"crypto","openssl","",null,null],[0,"hash","openssl::crypto","",null,null],[3,"Hasher","openssl::crypto::hash","Provides message digest (hash) computation.",null,null],[4,"Type","","Message digest (hash) type.",null,null],[13,"MD5","","",4,null],[13,"SHA1","","",4,null],[13,"SHA224","","",4,null],[13,"SHA256","","",4,null],[13,"SHA384","","",4,null],[13,"SHA512","","",4,null],[13,"RIPEMD160","","",4,null],[5,"hash","","Computes the hash of the `data` with the hash `t`.",null,null],[11,"clone","","",4,null],[11,"md_len","","Returns the length of the message digest.",4,null],[11,"evp_md","","Internal interface subject to removal.",4,null],[11,"new","","Creates a new `Hasher` with the specified hash type.",5,{"inputs":[{"name":"type"}],"output":{"name":"hasher"}}],[11,"finish","","Returns the hash of the data written since creation or\nthe last `finish` and resets the hasher.",5,null],[11,"write","","",5,null],[11,"flush","","",5,null],[11,"clone","","",5,null],[11,"drop","","",5,null],[0,"hmac","openssl::crypto","",null,null],[3,"HMAC","openssl::crypto::hmac","Provides HMAC computation.",null,null],[5,"hmac","","Computes the HMAC of the `data` with the hash `t` and `key`.",null,null],[11,"new","","Creates a new `HMAC` with the specified hash type using the `key`.",6,null],[11,"finish","","Returns the hash of the data written since creation or\nthe last `finish` and resets the hasher.",6,null],[11,"write","","",6,null],[11,"flush","","",6,null],[11,"clone","","",6,null],[11,"drop","","",6,null],[0,"pkcs5","openssl::crypto","",null,null],[3,"KeyIvPair","openssl::crypto::pkcs5","",null,null],[12,"key","","",7,null],[12,"iv","","",7,null],[5,"evp_bytes_to_key_pbkdf1_compatible","","Derives a key and an IV from various parameters.",null,null],[5,"pbkdf2_hmac_sha1","","Derives a key from a password and salt using the PBKDF2-HMAC-SHA1 algorithm.",null,null],[11,"fmt","","",7,null],[11,"hash","","",7,null],[11,"eq","","",7,null],[11,"ne","","",7,null],[11,"clone","","",7,null],[0,"pkey","openssl::crypto","",null,null],[3,"PKey","openssl::crypto::pkey","",null,null],[4,"Parts","","",null,null],[13,"Neither","","",8,null],[13,"Public","","",8,null],[13,"Both","","",8,null],[4,"Role","","Represents a role an asymmetric key might be appropriate for.",null,null],[13,"Encrypt","","",9,null],[13,"Decrypt","","",9,null],[13,"Sign","","",9,null],[13,"Verify","","",9,null],[4,"EncryptionPadding","","Type of encryption padding to use.",null,null],[13,"OAEP","","",10,null],[13,"PKCS1v15","","",10,null],[11,"clone","","",8,null],[11,"clone","","",9,null],[11,"clone","","",10,null],[11,"new","","",11,{"inputs":[],"output":{"name":"pkey"}}],[11,"from_handle","","",11,null],[11,"private_key_from_pem","","Reads private key from PEM, takes ownership of handle",11,{"inputs":[{"name":"r"}],"output":{"name":"result"}}],[11,"public_key_from_pem","","Reads public key from PEM, takes ownership of handle",11,{"inputs":[{"name":"r"}],"output":{"name":"result"}}],[11,"private_rsa_key_from_pem","","Reads an RSA private key from PEM, takes ownership of handle",11,{"inputs":[{"name":"r"}],"output":{"name":"result"}}],[11,"public_rsa_key_from_pem","","Reads an RSA public key from PEM, takes ownership of handle",11,{"inputs":[{"name":"r"}],"output":{"name":"result"}}],[11,"gen","","",11,null],[11,"set_rsa","","assign RSA key to this pkey",11,null],[11,"get_rsa","","get a reference to the interal RSA key for direct access to the key components",11,null],[11,"save_pub","","Returns a DER serialized form of the public key, suitable for load_pub().",11,null],[11,"load_pub","","Loads a DER serialized form of the public key, as produced by save_pub().",11,null],[11,"save_priv","","Returns a serialized form of the public and private keys, suitable for\nload_priv().",11,null],[11,"load_priv","","Loads a serialized form of the public and private keys, as produced by\nsave_priv().",11,null],[11,"write_pem","","Stores private key as a PEM",11,null],[11,"write_pub_pem","","Stores public key as a PEM",11,null],[11,"size","","Returns the size of the public key modulus.",11,null],[11,"can","","Returns whether this pkey object can perform the specified role.",11,null],[11,"max_data","","Returns the maximum amount of data that can be encrypted by an encrypt()\ncall.",11,null],[11,"private_encrypt_with_padding","","",11,null],[11,"public_encrypt_with_padding","","",11,null],[11,"private_decrypt_with_padding","","",11,null],[11,"public_decrypt_with_padding","","",11,null],[11,"encrypt","","Encrypts data with the public key, using OAEP padding, returning the encrypted data. The\nsupplied data must not be larger than max_data().",11,null],[11,"encrypt_with_padding","","Encrypts data with the public key, using provided padding, returning the encrypted data. The\nsupplied data must not be larger than max_data().",11,null],[11,"public_encrypt","","Encrypts data with the public key, using OAEP padding, returning the encrypted data. The\nsupplied data must not be larger than max_data().",11,null],[11,"public_decrypt","","Decrypts data with the public key, using PKCS1v15 padding, returning the decrypted data.",11,null],[11,"decrypt","","Decrypts data with the private key, expecting OAEP padding, returning the decrypted data.",11,null],[11,"decrypt_with_padding","","Decrypts data with the private key, using provided padding, returning the encrypted data. The\nsupplied data must not be larger than max_data().",11,null],[11,"private_decrypt","","Decrypts data with the private key, expecting OAEP padding, returning the decrypted data.",11,null],[11,"private_encrypt","","Encrypts data with the private key, using PKCS1v15 padding, returning the encrypted data. The\nsupplied data must not be larger than max_data().",11,null],[11,"sign","","Signs data, using OpenSSL's default scheme and adding sha256 ASN.1 information to the\nsignature.\nThe bytes to sign must be the result of a sha256 hashing;\nreturns the signature.",11,null],[11,"verify","","Verifies a signature s (using OpenSSL's default scheme and sha256) on the SHA256 hash of a\nmessage.\nReturns true if the signature is valid, and false otherwise.",11,null],[11,"sign_with_hash","","Signs data, using OpenSSL's default scheme and add ASN.1 information for the given hash type to the\nsignature.\nThe bytes to sign must be the result of this type of hashing;\nreturns the signature.",11,null],[11,"verify_with_hash","","",11,null],[11,"get_handle","","",11,null],[11,"public_eq","","",11,null],[11,"drop","","",11,null],[11,"clone","","",11,null],[0,"rand","openssl::crypto","",null,null],[5,"rand_bytes","openssl::crypto::rand","",null,{"inputs":[{"name":"usize"}],"output":{"name":"vec"}}],[0,"symm","openssl::crypto","",null,null],[3,"Crypter","openssl::crypto::symm","Represents a symmetric cipher context.",null,null],[4,"Mode","","",null,null],[13,"Encrypt","","",12,null],[13,"Decrypt","","",12,null],[4,"Type","","",null,null],[13,"AES_128_ECB","","",13,null],[13,"AES_128_CBC","","",13,null],[13,"AES_128_CFB1","","",13,null],[13,"AES_128_CFB128","","",13,null],[13,"AES_128_CFB8","","",13,null],[13,"AES_256_ECB","","",13,null],[13,"AES_256_CBC","","",13,null],[13,"AES_256_CFB1","","",13,null],[13,"AES_256_CFB128","","",13,null],[13,"AES_256_CFB8","","",13,null],[13,"DES_CBC","","",13,null],[13,"DES_ECB","","",13,null],[13,"RC4_128","","",13,null],[5,"encrypt","","Encrypts data, using the specified crypter type in encrypt mode with the\nspecified key and iv; returns the resulting (encrypted) data.",null,null],[5,"decrypt","","Decrypts data, using the specified crypter type in decrypt mode with the\nspecified key and iv; returns the resulting (decrypted) data.",null,null],[11,"clone","","",12,null],[11,"clone","","",13,null],[11,"new","","",14,{"inputs":[{"name":"type"}],"output":{"name":"crypter"}}],[11,"pad","","Enables or disables padding. If padding is disabled, total amount of\ndata encrypted must be a multiple of block size.",14,null],[11,"init","","Initializes this crypter.",14,null],[11,"update","","Update this crypter with more data to encrypt or decrypt. Returns\nencrypted or decrypted bytes.",14,null],[11,"finalize","","Finish crypting. Returns the remaining partial block of output, if any.",14,null],[11,"drop","","",14,null],[0,"memcmp","openssl::crypto","",null,null],[5,"eq","openssl::crypto::memcmp","Returns `true` iff `a` and `b` contain the same bytes.",null,null],[0,"rsa","openssl::crypto","",null,null],[3,"RSA","openssl::crypto::rsa","",null,null],[11,"drop","","",15,null],[11,"from_public_components","","only useful for associating the key material directly with the key, it's safer to use\nthe supplied load and save methods for DER formatted keys.",15,{"inputs":[{"name":"bignum"},{"name":"bignum"}],"output":{"name":"result"}}],[11,"from_private_components","","",15,{"inputs":[{"name":"bignum"},{"name":"bignum"},{"name":"bignum"},{"name":"bignum"},{"name":"bignum"},{"name":"bignum"},{"name":"bignum"},{"name":"bignum"}],"output":{"name":"result"}}],[11,"from_raw","","the caller should assert that the rsa pointer is valid.",15,null],[11,"private_key_from_pem","","Reads an RSA private key from PEM formatted data.",15,{"inputs":[{"name":"r"}],"output":{"name":"result"}}],[11,"private_key_to_pem","","Writes an RSA private key as unencrypted PEM formatted data",15,null],[11,"public_key_from_pem","","Reads an RSA public key from PEM formatted data.",15,{"inputs":[{"name":"r"}],"output":{"name":"result"}}],[11,"public_key_to_pem","","Writes an RSA public key as PEM formatted data",15,null],[11,"size","","",15,null],[11,"sign","","",15,null],[11,"verify","","",15,null],[11,"as_ptr","","",15,null],[11,"n","","",15,null],[11,"has_n","","",15,null],[11,"d","","",15,null],[11,"e","","",15,null],[11,"has_e","","",15,null],[11,"p","","",15,null],[11,"q","","",15,null],[11,"fmt","","",15,null],[0,"dh","openssl","",null,null],[3,"DH","openssl::dh","",null,null],[11,"from_params","","",16,{"inputs":[{"name":"bignum"},{"name":"bignum"},{"name":"bignum"}],"output":{"name":"result"}}],[11,"from_pem","","",16,{"inputs":[{"name":"r"}],"output":{"name":"result"}}],[11,"raw","","",16,null],[11,"raw_ptr","","",16,null],[11,"drop","","",16,null],[0,"ssl","openssl","",null,null],[3,"SslContextOptions","openssl::ssl","",null,null],[3,"SslVerifyMode","","",null,null],[3,"SslContext","","An SSL context object",null,null],[3,"CipherBits","","",null,null],[12,"secret","","The number of secret bits used for the cipher.",17,null],[12,"algorithm","","The number of bits processed by the chosen algorithm, if not None.",17,null],[3,"SslCipher","","",null,null],[3,"Ssl","","",null,null],[3,"SslStream","","A stream wrapper which handles SSL encryption for an underlying stream.",null,null],[3,"NonblockingSslStream","","# Deprecated",null,null],[4,"Error","","An SSL error.",null,null],[13,"ZeroReturn","","The SSL session has been closed by the other end",18,null],[13,"WantRead","","An attempt to read data from the underlying socket returned\n`WouldBlock`. Wait for read readiness and reattempt the operation.",18,null],[13,"WantWrite","","An attempt to write data from the underlying socket returned\n`WouldBlock`. Wait for write readiness and reattempt the operation.",18,null],[13,"WantX509Lookup","","The client certificate callback requested to be called again.",18,null],[13,"Stream","","An error reported by the underlying stream.",18,null],[13,"Ssl","","An error in the OpenSSL library.",18,null],[4,"SslMethod","","Determines the SSL method supported",null,null],[13,"Sslv23","","Support the SSLv2, SSLv3, TLSv1, TLSv1.1, and TLSv1.2 protocols depending on what the\nlinked OpenSSL library supports.",19,null],[13,"Tlsv1","","Only support the TLSv1 protocol.",19,null],[4,"MaybeSslStream","","A utility type to help in cases where the use of SSL is decided at runtime.",null,null],[13,"Ssl","","A connection using SSL",20,null],[13,"Normal","","A connection not using SSL",20,null],[5,"init","","Manually initialize SSL.\nIt is optional to call this function and safe to do so more than once.",null,{"inputs":[],"output":null}],[0,"error","","",null,null],[3,"OpenSslError","openssl::ssl::error","An error reported from OpenSSL.",null,null],[4,"Error","","An SSL error.",null,null],[13,"ZeroReturn","","The SSL session has been closed by the other end",18,null],[13,"WantRead","","An attempt to read data from the underlying socket returned\n`WouldBlock`. Wait for read readiness and reattempt the operation.",18,null],[13,"WantWrite","","An attempt to write data from the underlying socket returned\n`WouldBlock`. Wait for write readiness and reattempt the operation.",18,null],[13,"WantX509Lookup","","The client certificate callback requested to be called again.",18,null],[13,"Stream","","An error reported by the underlying stream.",18,null],[13,"Ssl","","An error in the OpenSSL library.",18,null],[4,"SslError","","An SSL error",null,null],[13,"StreamError","","The underlying stream reported an error",21,null],[13,"SslSessionClosed","","The SSL session has been closed by the other end",21,null],[13,"OpenSslErrors","","An error in the OpenSSL library",21,null],[4,"NonblockingSslError","","An error on a nonblocking stream.",null,null],[13,"SslError","","A standard SSL error occurred.",22,null],[13,"WantRead","","The OpenSSL library wants data from the remote socket;\nthe caller should wait for read readiness.",22,null],[13,"WantWrite","","The OpenSSL library wants to send data to the remote socket;\nthe caller should wait for write readiness.",22,null],[4,"OpensslError","","An error from the OpenSSL library",null,null],[13,"UnknownError","","An unknown error",23,null],[12,"library","openssl::ssl::error::OpensslError","The library reporting the error",23,null],[12,"function","","The function reporting the error",23,null],[12,"reason","","The reason for the error",23,null],[11,"fmt","openssl::ssl::error","",18,null],[11,"fmt","","",18,null],[11,"description","","",18,null],[11,"cause","","",18,null],[11,"get_stack","","Returns the contents of the OpenSSL error stack.",24,{"inputs":[],"output":{"name":"vec"}}],[11,"error_code","","Returns the raw OpenSSL error code for this error.",24,null],[11,"library","","Returns the name of the library reporting the error.",24,null],[11,"function","","Returns the name of the function reporting the error.",24,null],[11,"reason","","Returns the reason for the error.",24,null],[11,"fmt","","",24,null],[11,"fmt","","",24,null],[11,"description","","",24,null],[11,"fmt","","",21,null],[11,"fmt","","",22,null],[11,"fmt","","",21,null],[11,"description","","",21,null],[11,"cause","","",21,null],[11,"fmt","","",22,null],[11,"description","","",22,null],[11,"cause","","",22,null],[11,"from","","",22,{"inputs":[{"name":"sslerror"}],"output":{"name":"nonblockingsslerror"}}],[11,"eq","","",23,null],[11,"ne","","",23,null],[11,"clone","","",23,null],[11,"fmt","","",23,null],[11,"from_error_code","","",23,{"inputs":[{"name":"c_ulong"}],"output":{"name":"opensslerror"}}],[11,"get","","Creates a new `OpenSslErrors` with the current contents of the error\nstack.",21,{"inputs":[],"output":{"name":"sslerror"}}],[11,"from_error","","Creates an `SslError` from the raw numeric error code.",21,{"inputs":[{"name":"c_ulong"}],"output":{"name":"sslerror"}}],[6,"VerifyCallback","openssl::ssl","The signature of functions that can be used to manually verify certificates",null,null],[6,"VerifyCallbackData","","The signature of functions that can be used to manually verify certificates\nwhen user-data should be carried for all verification process",null,null],[6,"ServerNameCallback","","The signature of functions that can be used to choose the context depending on the server name",null,null],[6,"ServerNameCallbackData","","",null,null],[17,"SSL_OP_MICROSOFT_SESS_ID_BUG","","",null,null],[17,"SSL_OP_NETSCAPE_CHALLENGE_BUG","","",null,null],[17,"SSL_OP_LEGACY_SERVER_CONNECT","","",null,null],[17,"SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG","","",null,null],[17,"SSL_OP_TLSEXT_PADDING","","",null,null],[17,"SSL_OP_MICROSOFT_BIG_SSLV3_BUFFER","","",null,null],[17,"SSL_OP_SAFARI_ECDHE_ECDSA_BUG","","",null,null],[17,"SSL_OP_SSLEAY_080_CLIENT_DH_BUG","","",null,null],[17,"SSL_OP_TLS_D5_BUG","","",null,null],[17,"SSL_OP_TLS_BLOCK_PADDING_BUG","","",null,null],[17,"SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS","","",null,null],[17,"SSL_OP_NO_QUERY_MTU","","",null,null],[17,"SSL_OP_COOKIE_EXCHANGE","","",null,null],[17,"SSL_OP_NO_TICKET","","",null,null],[17,"SSL_OP_CISCO_ANYCONNECT","","",null,null],[17,"SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION","","",null,null],[17,"SSL_OP_NO_COMPRESSION","","",null,null],[17,"SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION","","",null,null],[17,"SSL_OP_SINGLE_ECDH_USE","","",null,null],[17,"SSL_OP_SINGLE_DH_USE","","",null,null],[17,"SSL_OP_CIPHER_SERVER_PREFERENCE","","",null,null],[17,"SSL_OP_TLS_ROLLBACK_BUG","","",null,null],[17,"SSL_OP_NO_SSLV2","","",null,null],[17,"SSL_OP_NO_SSLV3","","",null,null],[17,"SSL_OP_NO_DTLSV1","","",null,null],[17,"SSL_OP_NO_TLSV1","","",null,null],[17,"SSL_OP_NO_DTLSV1_2","","",null,null],[17,"SSL_OP_NO_TLSV1_2","","",null,null],[17,"SSL_OP_NO_TLSV1_1","","",null,null],[17,"SSL_OP_NETSCAPE_CA_DN_BUG","","",null,null],[17,"SSL_OP_NETSCAPE_DEMO_CIPHER_CHANGE_BUG","","",null,null],[17,"SSL_OP_CRYPTOPRO_TLSEXT_BUG","","",null,null],[17,"SSL_OP_SSLREF2_REUSE_CERT_TYPE_BUG","","",null,null],[17,"SSL_OP_MSIE_SSLV2_RSA_PADDING","","",null,null],[17,"SSL_OP_PKCS1_CHECK_1","","",null,null],[17,"SSL_OP_PKCS1_CHECK_2","","",null,null],[17,"SSL_OP_EPHEMERAL_RSA","","",null,null],[17,"SSL_OP_ALL","","",null,null],[17,"SSL_OP_NO_SSL_MASK","","",null,null],[17,"SSL_VERIFY_PEER","","Verify that the server's certificate is trusted",null,null],[17,"SSL_VERIFY_NONE","","Do not verify the server's certificate",null,null],[17,"SSL_VERIFY_FAIL_IF_NO_PEER_CERT","","Terminate handshake if client did not return a certificate.\nUse together with SSL_VERIFY_PEER.",null,null],[8,"IntoSsl","","",null,null],[10,"into_ssl","","",25,null],[11,"hash","","",26,null],[11,"cmp","","",26,null],[11,"partial_cmp","","",26,null],[11,"lt","","",26,null],[11,"le","","",26,null],[11,"gt","","",26,null],[11,"ge","","",26,null],[11,"clone","","",26,null],[11,"eq","","",26,null],[11,"ne","","",26,null],[11,"fmt","","",26,null],[11,"empty","","Returns an empty set of flags.",26,{"inputs":[],"output":{"name":"sslcontextoptions"}}],[11,"all","","Returns the set containing all flags.",26,{"inputs":[],"output":{"name":"sslcontextoptions"}}],[11,"bits","","Returns the raw value of the flags currently stored.",26,null],[11,"from_bits","","Convert from underlying bit representation, unless that\nrepresentation contains bits that do not correspond to a flag.",26,{"inputs":[{"name":"u64"}],"output":{"name":"option"}}],[11,"from_bits_truncate","","Convert from underlying bit representation, dropping any bits\nthat do not correspond to flags.",26,{"inputs":[{"name":"u64"}],"output":{"name":"sslcontextoptions"}}],[11,"is_empty","","Returns `true` if no flags are currently stored.",26,null],[11,"is_all","","Returns `true` if all flags are currently set.",26,null],[11,"intersects","","Returns `true` if there are flags common to both `self` and `other`.",26,null],[11,"contains","","Returns `true` all of the flags in `other` are contained within `self`.",26,null],[11,"insert","","Inserts the specified flags in-place.",26,null],[11,"remove","","Removes the specified flags in-place.",26,null],[11,"toggle","","Toggles the specified flags in-place.",26,null],[11,"bitor","","Returns the union of the two sets of flags.",26,null],[11,"bitor_assign","","Adds the set of flags.",26,null],[11,"bitxor","","Returns the left flags, but with all the right flags toggled.",26,null],[11,"bitxor_assign","","Toggles the set of flags.",26,null],[11,"bitand","","Returns the intersection between the two sets of flags.",26,null],[11,"bitand_assign","","Disables all flags disabled in the set.",26,null],[11,"sub","","Returns the set difference of the two sets of flags.",26,null],[11,"sub_assign","","Disables all flags enabled in the set.",26,null],[11,"not","","Returns the complement of this set of flags.",26,null],[11,"extend","","",26,null],[11,"from_iter","","",26,{"inputs":[{"name":"t"}],"output":{"name":"sslcontextoptions"}}],[11,"eq","","",19,null],[11,"hash","","",19,null],[11,"fmt","","",19,null],[11,"clone","","",19,null],[11,"is_dtls","","",19,null],[11,"is_dtlsv1","","",19,null],[11,"is_dtlsv1_2","","",19,null],[11,"hash","","",27,null],[11,"cmp","","",27,null],[11,"partial_cmp","","",27,null],[11,"lt","","",27,null],[11,"le","","",27,null],[11,"gt","","",27,null],[11,"ge","","",27,null],[11,"clone","","",27,null],[11,"eq","","",27,null],[11,"ne","","",27,null],[11,"fmt","","",27,null],[11,"empty","","Returns an empty set of flags.",27,{"inputs":[],"output":{"name":"sslverifymode"}}],[11,"all","","Returns the set containing all flags.",27,{"inputs":[],"output":{"name":"sslverifymode"}}],[11,"bits","","Returns the raw value of the flags currently stored.",27,null],[11,"from_bits","","Convert from underlying bit representation, unless that\nrepresentation contains bits that do not correspond to a flag.",27,{"inputs":[{"name":"i32"}],"output":{"name":"option"}}],[11,"from_bits_truncate","","Convert from underlying bit representation, dropping any bits\nthat do not correspond to flags.",27,{"inputs":[{"name":"i32"}],"output":{"name":"sslverifymode"}}],[11,"is_empty","","Returns `true` if no flags are currently stored.",27,null],[11,"is_all","","Returns `true` if all flags are currently set.",27,null],[11,"intersects","","Returns `true` if there are flags common to both `self` and `other`.",27,null],[11,"contains","","Returns `true` all of the flags in `other` are contained within `self`.",27,null],[11,"insert","","Inserts the specified flags in-place.",27,null],[11,"remove","","Removes the specified flags in-place.",27,null],[11,"toggle","","Toggles the specified flags in-place.",27,null],[11,"bitor","","Returns the union of the two sets of flags.",27,null],[11,"bitor_assign","","Adds the set of flags.",27,null],[11,"bitxor","","Returns the left flags, but with all the right flags toggled.",27,null],[11,"bitxor_assign","","Toggles the set of flags.",27,null],[11,"bitand","","Returns the intersection between the two sets of flags.",27,null],[11,"bitand_assign","","Disables all flags disabled in the set.",27,null],[11,"sub","","Returns the set difference of the two sets of flags.",27,null],[11,"sub_assign","","Disables all flags enabled in the set.",27,null],[11,"not","","Returns the complement of this set of flags.",27,null],[11,"extend","","",27,null],[11,"from_iter","","",27,{"inputs":[{"name":"t"}],"output":{"name":"sslverifymode"}}],[11,"clone","","",28,null],[11,"fmt","","",28,null],[11,"drop","","",28,null],[11,"new","","Creates a new SSL context.",28,{"inputs":[{"name":"sslmethod"}],"output":{"name":"result"}}],[11,"set_verify","","Configures the certificate verification method for new connections.",28,null],[11,"set_verify_with_data","","Configures the certificate verification method for new connections also\ncarrying supplied data.",28,null],[11,"set_servername_callback","","Configures the server name indication (SNI) callback for new connections",28,null],[11,"set_servername_callback_with_data","","Configures the server name indication (SNI) callback for new connections\ncarrying supplied data",28,null],[11,"set_verify_depth","","Sets verification depth",28,null],[11,"set_read_ahead","","",28,null],[11,"set_tmp_dh","","",28,null],[11,"set_default_verify_paths","","Use the default locations of trusted certificates for verification.",28,null],[11,"set_CA_file","","Specifies the file that contains trusted CA certificates.",28,null],[11,"set_session_id_context","","Set the context identifier for sessions",28,null],[11,"set_certificate_file","","Specifies the file that contains certificate",28,null],[11,"set_certificate_chain_file","","Specifies the file that contains certificate chain",28,null],[11,"set_certificate","","Specifies the certificate",28,null],[11,"add_extra_chain_cert","","Adds a certificate to the certificate chain presented together with the\ncertificate specified using set_certificate()",28,null],[11,"set_private_key_file","","Specifies the file that contains private key",28,null],[11,"set_private_key","","Specifies the private key",28,null],[11,"check_private_key","","Check consistency of private key and certificate",28,null],[11,"set_cipher_list","","",28,null],[11,"set_options","","",28,null],[11,"get_options","","",28,null],[11,"clear_options","","",28,null],[11,"name","","Returns the name of cipher.",29,null],[11,"version","","Returns the SSL/TLS protocol version that first defined the cipher.",29,null],[11,"bits","","Returns the number of bits used for the cipher.",29,null],[11,"description","","Returns a textual description of the cipher used",29,null],[11,"fmt","","",30,null],[11,"drop","","",30,null],[11,"clone","","# Deprecated",30,null],[11,"new","","",30,{"inputs":[{"name":"sslcontext"}],"output":{"name":"result"}}],[11,"set_verify","","Sets the verification mode to be used during the handshake process.",30,null],[11,"set_verify_callback","","Sets the certificate verification callback to be used during the\nhandshake process.",30,null],[11,"get_current_cipher","","",30,null],[11,"state_string","","",30,null],[11,"state_string_long","","",30,null],[11,"set_hostname","","Sets the host name to be used with SNI (Server Name Indication).",30,null],[11,"peer_certificate","","Returns the certificate of the peer, if present.",30,null],[11,"version","","Returns the name of the protocol used for the connection, e.g. "TLSv1.2", "SSLv3", etc.",30,null],[11,"pending","","Returns the number of bytes remaining in the currently processed TLS\nrecord.",30,null],[11,"compression","","Returns the compression currently in use.",30,null],[11,"get_ssl_method","","",30,null],[11,"get_servername","","Returns the server's name for the current connection",30,null],[11,"set_ssl_context","","change the context corresponding to the current connection",30,null],[11,"get_ssl_context","","obtain the context corresponding to the current connection",30,null],[11,"clone","","",31,null],[11,"fmt","","",31,null],[11,"as_raw_fd","","",31,null],[11,"connect","","Creates an SSL/TLS client operating over the provided stream.",31,{"inputs":[{"name":"t"},{"name":"s"}],"output":{"name":"result"}}],[11,"accept","","Creates an SSL/TLS server operating over the provided stream.",31,{"inputs":[{"name":"t"},{"name":"s"}],"output":{"name":"result"}}],[11,"connect_generic","","### Deprecated",31,{"inputs":[{"name":"t"},{"name":"s"}],"output":{"name":"result"}}],[11,"accept_generic","","### Deprecated",31,{"inputs":[{"name":"t"},{"name":"s"}],"output":{"name":"result"}}],[11,"ssl_read","","Like `read`, but returns an `ssl::Error` rather than an `io::Error`.",31,null],[11,"ssl_write","","Like `write`, but returns an `ssl::Error` rather than an `io::Error`.",31,null],[11,"get_ref","","Returns a reference to the underlying stream.",31,null],[11,"get_mut","","Returns a mutable reference to the underlying stream.",31,null],[11,"ssl","","Returns the OpenSSL `Ssl` object associated with this stream.",31,null],[11,"try_clone","","# Deprecated",31,null],[11,"read","","",31,null],[11,"write","","",31,null],[11,"flush","","",31,null],[11,"into_ssl","","",30,null],[11,"fmt","","",20,null],[11,"read","","",20,null],[11,"write","","",20,null],[11,"flush","","",20,null],[11,"get_ref","","Returns a reference to the underlying stream.",20,null],[11,"get_mut","","Returns a mutable reference to the underlying stream.",20,null],[11,"try_clone","","Like `TcpStream::try_clone`.",20,null],[11,"clone","","",32,null],[11,"as_raw_fd","","",32,null],[11,"try_clone","","",32,null],[11,"get_ref","","Returns a reference to the underlying stream.",32,null],[11,"get_mut","","Returns a mutable reference to the underlying stream.",32,null],[11,"ssl","","Returns a reference to the Ssl.",32,null],[11,"connect","","Create a new nonblocking client ssl connection on wrapped `stream`.",32,{"inputs":[{"name":"t"},{"name":"s"}],"output":{"name":"result"}}],[11,"accept","","Create a new nonblocking server ssl connection on wrapped `stream`.",32,{"inputs":[{"name":"t"},{"name":"s"}],"output":{"name":"result"}}],[11,"read","","Read bytes from the SSL stream into `buf`.",32,null],[11,"write","","Write bytes from `buf` to the SSL stream.",32,null],[0,"x509","openssl","",null,null],[3,"SslString","openssl::x509","",null,null],[3,"X509StoreContext","","",null,null],[3,"X509Generator","","Generator of private key/certificate pairs",null,null],[3,"X509","","A public key certificate",null,null],[3,"X509Name","","",null,null],[3,"X509NameEntry","","",null,null],[3,"X509Req","","A certificate signing request",null,null],[3,"GeneralNames","","A collection of OpenSSL `GENERAL_NAME`s.",null,null],[3,"GeneralNamesIter","","An iterator over OpenSSL `GENERAL_NAME`s.",null,null],[3,"GeneralName","","An OpenSSL `GENERAL_NAME`.",null,null],[4,"X509FileType","","",null,null],[13,"PEM","","",33,null],[13,"ASN1","","",33,null],[13,"Default","","",33,null],[4,"X509ValidationError","","",null,null],[13,"X509UnableToGetIssuerCert","","",34,null],[13,"X509UnableToGetCrl","","",34,null],[13,"X509UnableToDecryptCertSignature","","",34,null],[13,"X509UnableToDecryptCrlSignature","","",34,null],[13,"X509UnableToDecodeIssuerPublicKey","","",34,null],[13,"X509CertSignatureFailure","","",34,null],[13,"X509CrlSignatureFailure","","",34,null],[13,"X509CertNotYetValid","","",34,null],[13,"X509CertHasExpired","","",34,null],[13,"X509CrlNotYetValid","","",34,null],[13,"X509CrlHasExpired","","",34,null],[13,"X509ErrorInCertNotBeforeField","","",34,null],[13,"X509ErrorInCertNotAfterField","","",34,null],[13,"X509ErrorInCrlLastUpdateField","","",34,null],[13,"X509ErrorInCrlNextUpdateField","","",34,null],[13,"X509OutOfMem","","",34,null],[13,"X509DepthZeroSelfSignedCert","","",34,null],[13,"X509SelfSignedCertInChain","","",34,null],[13,"X509UnableToGetIssuerCertLocally","","",34,null],[13,"X509UnableToVerifyLeafSignature","","",34,null],[13,"X509CertChainTooLong","","",34,null],[13,"X509CertRevoked","","",34,null],[13,"X509InvalidCA","","",34,null],[13,"X509PathLengthExceeded","","",34,null],[13,"X509InvalidPurpose","","",34,null],[13,"X509CertUntrusted","","",34,null],[13,"X509CertRejected","","",34,null],[13,"X509SubjectIssuerMismatch","","",34,null],[13,"X509AkidSkidMismatch","","",34,null],[13,"X509AkidIssuerSerialMismatch","","",34,null],[13,"X509KeyusageNoCertsign","","",34,null],[13,"X509UnableToGetCrlIssuer","","",34,null],[13,"X509UnhandledCriticalExtension","","",34,null],[13,"X509KeyusageNoCrlSign","","",34,null],[13,"X509UnhandledCriticalCrlExtension","","",34,null],[13,"X509InvalidNonCA","","",34,null],[13,"X509ProxyPathLengthExceeded","","",34,null],[13,"X509KeyusageNoDigitalSignature","","",34,null],[13,"X509ProxyCertificatesNotAllowed","","",34,null],[13,"X509InvalidExtension","","",34,null],[13,"X509InavlidPolicyExtension","","",34,null],[13,"X509NoExplicitPolicy","","",34,null],[13,"X509DifferentCrlScope","","",34,null],[13,"X509UnsupportedExtensionFeature","","",34,null],[13,"X509UnnestedResource","","",34,null],[13,"X509PermittedVolation","","",34,null],[13,"X509ExcludedViolation","","",34,null],[13,"X509SubtreeMinmax","","",34,null],[13,"X509UnsupportedConstraintType","","",34,null],[13,"X509UnsupportedConstraintSyntax","","",34,null],[13,"X509UnsupportedNameSyntax","","",34,null],[13,"X509CrlPathValidationError","","",34,null],[13,"X509ApplicationVerification","","",34,null],[13,"X509UnknownError","","",34,null],[0,"extension","","",null,null],[4,"ExtensionType","openssl::x509::extension","Type-only version of the `Extension` enum.",null,null],[13,"KeyUsage","","",35,null],[13,"ExtKeyUsage","","",35,null],[13,"SubjectAltName","","",35,null],[13,"IssuerAltName","","",35,null],[13,"OtherNid","","",35,null],[13,"OtherStr","","",35,null],[4,"Extension","","A X.509 v3 certificate extension.",null,null],[13,"KeyUsage","","The purposes of the key contained in the certificate",36,null],[13,"ExtKeyUsage","","The extended purposes of the key contained in the certificate",36,null],[13,"SubjectAltName","","Subject Alternative Names",36,null],[13,"IssuerAltName","","Issuer Alternative Names",36,null],[13,"OtherNid","","Arbitrary extensions by NID. See `man x509v3_config` for value syntax.",36,null],[13,"OtherStr","","Arbitrary extensions by OID string. See `man ASN1_generate_nconf` for value syntax.",36,null],[4,"KeyUsageOption","","",null,null],[13,"DigitalSignature","","",37,null],[13,"NonRepudiation","","",37,null],[13,"KeyEncipherment","","",37,null],[13,"DataEncipherment","","",37,null],[13,"KeyAgreement","","",37,null],[13,"KeyCertSign","","",37,null],[13,"CRLSign","","",37,null],[13,"EncipherOnly","","",37,null],[13,"DecipherOnly","","",37,null],[4,"ExtKeyUsageOption","","",null,null],[13,"ServerAuth","","",38,null],[13,"ClientAuth","","",38,null],[13,"CodeSigning","","",38,null],[13,"EmailProtection","","",38,null],[13,"TimeStamping","","",38,null],[13,"MsCodeInd","","",38,null],[13,"MsCodeCom","","",38,null],[13,"MsCtlSign","","",38,null],[13,"MsSgc","","",38,null],[13,"MsEfs","","",38,null],[13,"NsSgc","","",38,null],[13,"Other","","An arbitrary key usage by OID.",38,null],[4,"AltNameOption","","",null,null],[13,"Other","","The value is specified as OID;content. See `man ASN1_generate_nconf` for more information on the content syntax.",39,null],[13,"Email","","",39,null],[13,"DNS","","",39,null],[13,"Directory","","",39,null],[13,"URI","","",39,null],[13,"IPAddress","","",39,null],[13,"RegisteredID","","",39,null],[11,"eq","","",35,null],[11,"ne","","",35,null],[11,"hash","","",35,null],[11,"clone","","",35,null],[11,"clone","","",36,null],[11,"get_type","","",36,null],[11,"get_nid","","",35,null],[11,"get_name","","",35,null],[11,"to_string","","",36,null],[11,"clone","","",37,null],[11,"fmt","","",37,null],[11,"clone","","",38,null],[11,"fmt","","",38,null],[11,"clone","","",39,null],[11,"fmt","","",39,null],[11,"drop","openssl::x509","",40,null],[11,"deref","","",40,null],[11,"fmt","","",40,null],[11,"fmt","","",40,null],[11,"clone","","",33,null],[11,"new","","",41,null],[11,"get_error","","",41,null],[11,"get_current_cert","","",41,null],[11,"error_depth","","",41,null],[11,"new","","Creates a new generator with the following defaults:",42,{"inputs":[],"output":{"name":"x509generator"}}],[11,"set_bitlength","","Sets desired bit length",42,null],[11,"set_valid_period","","Sets certificate validity period in days since today",42,null],[11,"add_name","","Add attribute to the name of the certificate",42,null],[11,"add_names","","Add multiple attributes to the name of the certificate",42,null],[11,"add_extension","","Add an extension to a certificate",42,null],[11,"add_extensions","","Add multiple extensions to a certificate",42,null],[11,"set_sign_hash","","",42,null],[11,"generate","","Generates a private key and a self-signed certificate and returns them",42,null],[11,"sign","","Sets the certificate public-key, then self-sign and return it\nNote: That the bit-length of the private key is used (set_bitlength is ignored)",42,null],[11,"request","","Obtain a certificate signing request (CSR)",42,null],[11,"new","","Creates new from handle with desired ownership.",43,null],[11,"new_in_ctx","","Creates a new certificate from context. Doesn't take ownership\nof handle.",43,null],[11,"from_pem","","Reads certificate from PEM, takes ownership of handle",43,{"inputs":[{"name":"r"}],"output":{"name":"result"}}],[11,"get_handle","","",43,null],[11,"subject_name","","",43,null],[11,"subject_alt_names","","Returns this certificate's SAN entries, if they exist.",43,null],[11,"public_key","","",43,null],[11,"fingerprint","","Returns certificate fingerprint calculated using provided hash",43,null],[11,"write_pem","","Writes certificate as PEM",43,null],[11,"clone","","",43,null],[11,"drop","","",43,null],[11,"text_by_nid","","",44,null],[11,"new","","Creates new from handle",45,null],[11,"from_pem","","Reads CSR from PEM",45,{"inputs":[{"name":"r"}],"output":{"name":"result"}}],[11,"write_pem","","Writes CSR as PEM",45,null],[11,"drop","","",45,null],[11,"clone","","",34,null],[11,"len","","Returns the number of `GeneralName`s in this structure.",46,null],[11,"get","","Returns the specified `GeneralName`.",46,null],[11,"iter","","Returns an iterator over the `GeneralName`s in this structure.",46,null],[11,"next","","",47,null],[11,"size_hint","","",47,null],[11,"dnsname","","Returns the contents of this `GeneralName` if it is a `dNSName`.",48,null],[11,"ipaddress","","Returns the contents of this `GeneralName` if it is an `iPAddress`.",48,null],[0,"nid","openssl","",null,null],[4,"Nid","openssl::nid","",null,null],[13,"Undefined","","",49,null],[13,"Rsadsi","","",49,null],[13,"Pkcs","","",49,null],[13,"MD2","","",49,null],[13,"MD4","","",49,null],[13,"MD5","","",49,null],[13,"RC4","","",49,null],[13,"RsaEncryption","","",49,null],[13,"RSA_MD2","","",49,null],[13,"RSA_MD5","","",49,null],[13,"PBE_MD2_DES","","",49,null],[13,"X500","","",49,null],[13,"x509","","",49,null],[13,"CN","","",49,null],[13,"C","","",49,null],[13,"L","","",49,null],[13,"ST","","",49,null],[13,"O","","",49,null],[13,"OU","","",49,null],[13,"RSA","","",49,null],[13,"Pkcs7","","",49,null],[13,"Pkcs7_data","","",49,null],[13,"Pkcs7_signedData","","",49,null],[13,"Pkcs7_envelopedData","","",49,null],[13,"Pkcs7_signedAndEnvelopedData","","",49,null],[13,"Pkcs7_digestData","","",49,null],[13,"Pkcs7_encryptedData","","",49,null],[13,"Pkcs3","","",49,null],[13,"DhKeyAgreement","","",49,null],[13,"DES_ECB","","",49,null],[13,"DES_CFB","","",49,null],[13,"DES_CBC","","",49,null],[13,"DES_EDE","","",49,null],[13,"DES_EDE3","","",49,null],[13,"IDEA_CBC","","",49,null],[13,"IDEA_CFB","","",49,null],[13,"IDEA_ECB","","",49,null],[13,"RC2_CBC","","",49,null],[13,"RC2_ECB","","",49,null],[13,"RC2_CFB","","",49,null],[13,"RC2_OFB","","",49,null],[13,"SHA","","",49,null],[13,"RSA_SHA","","",49,null],[13,"DES_EDE_CBC","","",49,null],[13,"DES_EDE3_CBC","","",49,null],[13,"DES_OFB","","",49,null],[13,"IDEA_OFB","","",49,null],[13,"Pkcs9","","",49,null],[13,"Email","","",49,null],[13,"UnstructuredName","","",49,null],[13,"ContentType","","",49,null],[13,"MessageDigest","","",49,null],[13,"SigningTime","","",49,null],[13,"CounterSignature","","",49,null],[13,"ChallengePassword","","",49,null],[13,"UnstructuredAddress","","",49,null],[13,"ExtendedCertificateAttributes","","",49,null],[13,"Netscape","","",49,null],[13,"NetscapeCertExtention","","",49,null],[13,"NetscapeDatatype","","",49,null],[13,"DES_EDE_CFB64","","",49,null],[13,"DES_EDE3_CFB64","","",49,null],[13,"DES_EDE_OFB64","","",49,null],[13,"DES_EDE3_OFB64","","",49,null],[13,"SHA1","","",49,null],[13,"RSA_SHA1","","",49,null],[13,"DSA_SHA","","",49,null],[13,"DSA_OLD","","",49,null],[13,"PBE_SHA1_RC2_64","","",49,null],[13,"PBKDF2","","",49,null],[13,"DSA_SHA1_OLD","","",49,null],[13,"NetscapeCertType","","",49,null],[13,"NetscapeBaseUrl","","",49,null],[13,"NetscapeRevocationUrl","","",49,null],[13,"NetscapeCARevocationUrl","","",49,null],[13,"NetscapeRenewalUrl","","",49,null],[13,"NetscapeCAPolicyUrl","","",49,null],[13,"NetscapeSSLServerName","","",49,null],[13,"NetscapeComment","","",49,null],[13,"NetscapeCertSequence","","",49,null],[13,"DESX_CBC","","",49,null],[13,"ID_CE","","",49,null],[13,"SubjectKeyIdentifier","","",49,null],[13,"KeyUsage","","",49,null],[13,"PrivateKeyUsagePeriod","","",49,null],[13,"SubjectAltName","","",49,null],[13,"IssuerAltName","","",49,null],[13,"BasicConstraints","","",49,null],[13,"CrlNumber","","",49,null],[13,"CertificatePolicies","","",49,null],[13,"AuthorityKeyIdentifier","","",49,null],[13,"BF_CBC","","",49,null],[13,"BF_ECB","","",49,null],[13,"BF_CFB","","",49,null],[13,"BF_OFB","","",49,null],[13,"MDC2","","",49,null],[13,"RSA_MDC2","","",49,null],[13,"RC4_40","","",49,null],[13,"RC2_40_CBC","","",49,null],[13,"G","","",49,null],[13,"S","","",49,null],[13,"I","","",49,null],[13,"UID","","uniqueIdentifier",49,null],[13,"CrlDistributionPoints","","",49,null],[13,"RSA_NP_MD5","","",49,null],[13,"SN","","",49,null],[13,"T","","",49,null],[13,"D","","",49,null],[13,"CAST5_CBC","","",49,null],[13,"CAST5_ECB","","",49,null],[13,"CAST5_CFB","","",49,null],[13,"CAST5_OFB","","",49,null],[13,"PbeWithMD5AndCast5CBC","","",49,null],[13,"DSA_SHA1","","",49,null],[13,"MD5_SHA1","","",49,null],[13,"RSA_SHA1_2","","",49,null],[13,"DSA","","",49,null],[13,"RIPEMD160","","",49,null],[13,"RSA_RIPEMD160","","",49,null],[13,"RC5_CBC","","",49,null],[13,"RC5_ECB","","",49,null],[13,"RC5_CFB","","",49,null],[13,"RC5_OFB","","",49,null],[13,"RLE","","",49,null],[13,"ZLIB","","",49,null],[13,"ExtendedKeyUsage","","",49,null],[13,"PKIX","","",49,null],[13,"ID_KP","","",49,null],[13,"ServerAuth","","",49,null],[13,"ClientAuth","","",49,null],[13,"CodeSigning","","",49,null],[13,"EmailProtection","","",49,null],[13,"TimeStamping","","",49,null],[13,"MsCodeInd","","",49,null],[13,"MsCodeCom","","",49,null],[13,"MsCtlSigh","","",49,null],[13,"MsSGC","","",49,null],[13,"MsEFS","","",49,null],[13,"NsSGC","","",49,null],[13,"DeltaCRL","","",49,null],[13,"CRLReason","","",49,null],[13,"InvalidityDate","","",49,null],[13,"SXNetID","","",49,null],[13,"PBE_SHA1_RC4_128","","",49,null],[13,"PBE_SHA1_RC4_40","","",49,null],[13,"PBE_SHA1_3DES","","",49,null],[13,"PBE_SHA1_2DES","","",49,null],[13,"PBE_SHA1_RC2_128","","",49,null],[13,"PBE_SHA1_RC2_40","","",49,null],[13,"KeyBag","","",49,null],[13,"Pkcs8ShroudedKeyBag","","",49,null],[13,"CertBag","","",49,null],[13,"CrlBag","","",49,null],[13,"SecretBag","","",49,null],[13,"SafeContentsBag","","",49,null],[13,"FriendlyName","","",49,null],[13,"LocalKeyID","","",49,null],[13,"X509Certificate","","",49,null],[13,"SdsiCertificate","","",49,null],[13,"X509Crl","","",49,null],[13,"PBES2","","",49,null],[13,"PBMAC1","","",49,null],[13,"HmacWithSha1","","",49,null],[13,"ID_QT_CPS","","",49,null],[13,"ID_QT_UNOTICE","","",49,null],[13,"RC2_64_CBC","","",49,null],[13,"SMIMECaps","","",49,null],[13,"PBE_MD2_RC2_64","","",49,null],[13,"PBE_MD5_RC2_64","","",49,null],[13,"PBE_SHA1_DES","","",49,null],[13,"MicrosoftExtensionRequest","","",49,null],[13,"ExtensionRequest","","",49,null],[13,"Name","","",49,null],[13,"DnQualifier","","",49,null],[13,"IdPe","","",49,null],[13,"IdAd","","",49,null],[13,"AuthorityInfoAccess","","",49,null],[13,"OCSP","","",49,null],[13,"CaIssuers","","",49,null],[13,"OCSPSigning","","",49,null],[13,"UserId","","Shown as UID in cert subject",49,null],[13,"SHA256","","",49,null],[13,"SHA384","","",49,null],[13,"SHA512","","",49,null],[13,"SHA224","","",49,null],[11,"eq","","",49,null],[11,"hash","","",49,null],[11,"clone","","",49,null],[0,"version","openssl","",null,null],[5,"number","openssl::version","OPENSSL_VERSION_NUMBER is a numeric release version identifier:",null,{"inputs":[],"output":{"name":"i64"}}],[5,"version","","The text variant of the version number and the release date. For example, "OpenSSL 0.9.5a 1 Apr 2000".",null,{"inputs":[],"output":{"name":"str"}}],[5,"c_flags","","The compiler flags set for the compilation process in the form "compiler: ..." if available or\n"compiler: information not available" otherwise.",null,{"inputs":[],"output":{"name":"str"}}],[5,"built_on","","The date of the build process in the form "built on: ..." if available or "built on: date not available" otherwise.",null,{"inputs":[],"output":{"name":"str"}}],[5,"platform","","The "Configure" target of the library build in the form "platform: ..." if available or "platform: information not available" otherwise.",null,{"inputs":[],"output":{"name":"str"}}],[5,"dir","","The "OPENSSLDIR" setting of the library build in the form "OPENSSLDIR: "..."" if available or "OPENSSLDIR: N/A" otherwise.",null,{"inputs":[],"output":{"name":"str"}}]],"paths":[[3,"Asn1Time"],[4,"RNGProperty"],[3,"BigNum"],[3,"MemBio"],[4,"Type"],[3,"Hasher"],[3,"HMAC"],[3,"KeyIvPair"],[4,"Parts"],[4,"Role"],[4,"EncryptionPadding"],[3,"PKey"],[4,"Mode"],[4,"Type"],[3,"Crypter"],[3,"RSA"],[3,"DH"],[3,"CipherBits"],[4,"Error"],[4,"SslMethod"],[4,"MaybeSslStream"],[4,"SslError"],[4,"NonblockingSslError"],[4,"OpensslError"],[3,"OpenSslError"],[8,"IntoSsl"],[3,"SslContextOptions"],[3,"SslVerifyMode"],[3,"SslContext"],[3,"SslCipher"],[3,"Ssl"],[3,"SslStream"],[3,"NonblockingSslStream"],[4,"X509FileType"],[4,"X509ValidationError"],[4,"ExtensionType"],[4,"Extension"],[4,"KeyUsageOption"],[4,"ExtKeyUsageOption"],[4,"AltNameOption"],[3,"SslString"],[3,"X509StoreContext"],[3,"X509Generator"],[3,"X509"],[3,"X509Name"],[3,"X509Req"],[3,"GeneralNames"],[3,"GeneralNamesIter"],[3,"GeneralName"],[4,"Nid"]]}; initSearch(searchIndex);