Linux sagir-us1.hostever.us 5.14.0-570.51.1.el9_6.x86_64 #1 SMP PREEMPT_DYNAMIC Wed Oct 8 09:41:34 EDT 2025 x86_64
LiteSpeed
Server IP : 104.247.108.91 & Your IP : 216.73.216.26
Domains : 74 Domain
User : georgeto
Terminal
Auto Root
Create File
Create Folder
Localroot Suggester
Backdoor Destroyer
Readme
/
usr /
local /
emps /
share /
doc /
openssl /
html /
man7 /
Delete
Unzip
Name
Size
Permission
Date
Action
img
[ DIR ]
drwxr-xr-x
2025-02-06 06:22
EVP_ASYM_CIPHER-SM2.html
2.21
KB
-rw-r--r--
2025-02-06 06:22
EVP_CIPHER-AES.html
4.63
KB
-rw-r--r--
2025-02-06 06:22
EVP_CIPHER-ARIA.html
3.22
KB
-rw-r--r--
2025-02-06 06:22
EVP_CIPHER-BLOWFISH.html
2.04
KB
-rw-r--r--
2025-02-06 06:22
EVP_CIPHER-CAMELLIA.html
3.17
KB
-rw-r--r--
2025-02-06 06:22
EVP_CIPHER-CAST.html
2.4
KB
-rw-r--r--
2025-02-06 06:22
EVP_CIPHER-CHACHA.html
1.96
KB
-rw-r--r--
2025-02-06 06:22
EVP_CIPHER-DES.html
3.15
KB
-rw-r--r--
2025-02-06 06:22
EVP_CIPHER-IDEA.html
2.12
KB
-rw-r--r--
2025-02-06 06:22
EVP_CIPHER-RC2.html
2.26
KB
-rw-r--r--
2025-02-06 06:22
EVP_CIPHER-RC4.html
1.98
KB
-rw-r--r--
2025-02-06 06:22
EVP_CIPHER-RC5.html
2.14
KB
-rw-r--r--
2025-02-06 06:22
EVP_CIPHER-SEED.html
2.15
KB
-rw-r--r--
2025-02-06 06:22
EVP_CIPHER-SM4.html
2.17
KB
-rw-r--r--
2025-02-06 06:22
EVP_KDF-HKDF.html
7.44
KB
-rw-r--r--
2025-02-06 06:22
EVP_KDF-KB.html
8.21
KB
-rw-r--r--
2025-02-06 06:22
EVP_KDF-KRB5KDF.html
5.37
KB
-rw-r--r--
2025-02-06 06:22
EVP_KDF-PBKDF1.html
3.85
KB
-rw-r--r--
2025-02-06 06:22
EVP_KDF-PBKDF2.html
4.66
KB
-rw-r--r--
2025-02-06 06:22
EVP_KDF-PKCS12KDF.html
4.11
KB
-rw-r--r--
2025-02-06 06:22
EVP_KDF-SCRYPT.html
7.08
KB
-rw-r--r--
2025-02-06 06:22
EVP_KDF-SS.html
8.43
KB
-rw-r--r--
2025-02-06 06:22
EVP_KDF-SSHKDF.html
7.24
KB
-rw-r--r--
2025-02-06 06:22
EVP_KDF-TLS13_KDF.html
6.5
KB
-rw-r--r--
2025-02-06 06:22
EVP_KDF-TLS1_PRF.html
4.9
KB
-rw-r--r--
2025-02-06 06:22
EVP_KDF-X942-ASN1.html
7.41
KB
-rw-r--r--
2025-02-06 06:22
EVP_KDF-X942-CONCAT.html
1.78
KB
-rw-r--r--
2025-02-06 06:22
EVP_KDF-X963.html
4.86
KB
-rw-r--r--
2025-02-06 06:22
EVP_KEM-RSA.html
2.85
KB
-rw-r--r--
2025-02-06 06:22
EVP_KEYEXCH-DH.html
6.42
KB
-rw-r--r--
2025-02-06 06:22
EVP_KEYEXCH-ECDH.html
6.21
KB
-rw-r--r--
2025-02-06 06:22
EVP_KEYEXCH-X25519.html
2.5
KB
-rw-r--r--
2025-02-06 06:22
EVP_MAC-BLAKE2.html
4.25
KB
-rw-r--r--
2025-02-06 06:22
EVP_MAC-CMAC.html
3.77
KB
-rw-r--r--
2025-02-06 06:22
EVP_MAC-GMAC.html
3.69
KB
-rw-r--r--
2025-02-06 06:22
EVP_MAC-HMAC.html
4.54
KB
-rw-r--r--
2025-02-06 06:22
EVP_MAC-KMAC.html
6.46
KB
-rw-r--r--
2025-02-06 06:22
EVP_MAC-Poly1305.html
3.17
KB
-rw-r--r--
2025-02-06 06:22
EVP_MAC-Siphash.html
3.29
KB
-rw-r--r--
2025-02-06 06:22
EVP_MD-BLAKE2.html
2.11
KB
-rw-r--r--
2025-02-06 06:22
EVP_MD-MD2.html
1.83
KB
-rw-r--r--
2025-02-06 06:22
EVP_MD-MD4.html
1.83
KB
-rw-r--r--
2025-02-06 06:22
EVP_MD-MD5-SHA1.html
3
KB
-rw-r--r--
2025-02-06 06:22
EVP_MD-MD5.html
1.83
KB
-rw-r--r--
2025-02-06 06:22
EVP_MD-MDC2.html
2.64
KB
-rw-r--r--
2025-02-06 06:22
EVP_MD-RIPEMD160.html
2.1
KB
-rw-r--r--
2025-02-06 06:22
EVP_MD-SHA1.html
3.03
KB
-rw-r--r--
2025-02-06 06:22
EVP_MD-SHA2.html
2.85
KB
-rw-r--r--
2025-02-06 06:22
EVP_MD-SHA3.html
2.16
KB
-rw-r--r--
2025-02-06 06:22
EVP_MD-SHAKE.html
3.98
KB
-rw-r--r--
2025-02-06 06:22
EVP_MD-SM3.html
1.84
KB
-rw-r--r--
2025-02-06 06:22
EVP_MD-WHIRLPOOL.html
1.86
KB
-rw-r--r--
2025-02-06 06:22
EVP_MD-common.html
2.88
KB
-rw-r--r--
2025-02-06 06:22
EVP_PKEY-DH.html
15.63
KB
-rw-r--r--
2025-02-06 06:22
EVP_PKEY-DSA.html
6.09
KB
-rw-r--r--
2025-02-06 06:22
EVP_PKEY-EC.html
14.04
KB
-rw-r--r--
2025-02-06 06:22
EVP_PKEY-FFC.html
11.47
KB
-rw-r--r--
2025-02-06 06:22
EVP_PKEY-HMAC.html
4.69
KB
-rw-r--r--
2025-02-06 06:22
EVP_PKEY-RSA.html
15.32
KB
-rw-r--r--
2025-02-06 06:22
EVP_PKEY-SM2.html
4.65
KB
-rw-r--r--
2025-02-06 06:22
EVP_PKEY-X25519.html
5.03
KB
-rw-r--r--
2025-02-06 06:22
EVP_RAND-CTR-DRBG.html
5.56
KB
-rw-r--r--
2025-02-06 06:22
EVP_RAND-HASH-DRBG.html
5.2
KB
-rw-r--r--
2025-02-06 06:22
EVP_RAND-HMAC-DRBG.html
5.39
KB
-rw-r--r--
2025-02-06 06:22
EVP_RAND-SEED-SRC.html
3.69
KB
-rw-r--r--
2025-02-06 06:22
EVP_RAND-TEST-RAND.html
6
KB
-rw-r--r--
2025-02-06 06:22
EVP_RAND.html
15.67
KB
-rw-r--r--
2025-02-06 06:22
EVP_SIGNATURE-DSA.html
2.92
KB
-rw-r--r--
2025-02-06 06:22
EVP_SIGNATURE-ECDSA.html
2.93
KB
-rw-r--r--
2025-02-06 06:22
EVP_SIGNATURE-ED25519.html
5.02
KB
-rw-r--r--
2025-02-06 06:22
EVP_SIGNATURE-HMAC.html
2.96
KB
-rw-r--r--
2025-02-06 06:22
EVP_SIGNATURE-RSA.html
5.58
KB
-rw-r--r--
2025-02-06 06:22
OSSL_PROVIDER-FIPS.html
19.9
KB
-rw-r--r--
2025-02-06 06:22
OSSL_PROVIDER-base.html
4.06
KB
-rw-r--r--
2025-02-06 06:22
OSSL_PROVIDER-default.html
13.14
KB
-rw-r--r--
2025-02-06 06:22
OSSL_PROVIDER-legacy.html
5.08
KB
-rw-r--r--
2025-02-06 06:22
OSSL_PROVIDER-null.html
1.75
KB
-rw-r--r--
2025-02-06 06:22
RAND.html
4.49
KB
-rw-r--r--
2025-02-06 06:22
RSA-PSS.html
3.29
KB
-rw-r--r--
2025-02-06 06:22
X25519.html
3.57
KB
-rw-r--r--
2025-02-06 06:22
bio.html
4.47
KB
-rw-r--r--
2025-02-06 06:22
crypto.html
27.34
KB
-rw-r--r--
2025-02-06 06:22
ct.html
2.71
KB
-rw-r--r--
2025-02-06 06:22
des_modes.html
7.94
KB
-rw-r--r--
2025-02-06 06:22
evp.html
7.56
KB
-rw-r--r--
2025-02-06 06:22
fips_module.html
22.56
KB
-rw-r--r--
2025-02-06 06:22
life_cycle-cipher.html
15.05
KB
-rw-r--r--
2025-02-06 06:22
life_cycle-digest.html
7.91
KB
-rw-r--r--
2025-02-06 06:22
life_cycle-kdf.html
5.43
KB
-rw-r--r--
2025-02-06 06:22
life_cycle-mac.html
7.63
KB
-rw-r--r--
2025-02-06 06:22
life_cycle-pkey.html
31.16
KB
-rw-r--r--
2025-02-06 06:22
life_cycle-rand.html
6.68
KB
-rw-r--r--
2025-02-06 06:22
migration_guide.html
123.13
KB
-rw-r--r--
2025-02-06 06:22
openssl-core.h.html
5.78
KB
-rw-r--r--
2025-02-06 06:22
openssl-core_dispatch.h.html
2.34
KB
-rw-r--r--
2025-02-06 06:22
openssl-core_names.h.html
2.58
KB
-rw-r--r--
2025-02-06 06:22
openssl-env.html
4.87
KB
-rw-r--r--
2025-02-06 06:22
openssl-glossary.html
9.71
KB
-rw-r--r--
2025-02-06 06:22
openssl-threads.html
5.79
KB
-rw-r--r--
2025-02-06 06:22
openssl_user_macros.html
3.89
KB
-rw-r--r--
2025-02-06 06:22
ossl_store-file.html
3.22
KB
-rw-r--r--
2025-02-06 06:22
ossl_store.html
3.96
KB
-rw-r--r--
2025-02-06 06:22
passphrase-encoding.html
8.83
KB
-rw-r--r--
2025-02-06 06:22
property.html
7.97
KB
-rw-r--r--
2025-02-06 06:22
provider-asym_cipher.html
14.77
KB
-rw-r--r--
2025-02-06 06:22
provider-base.html
37.71
KB
-rw-r--r--
2025-02-06 06:22
provider-cipher.html
14.16
KB
-rw-r--r--
2025-02-06 06:22
provider-decoder.html
13.65
KB
-rw-r--r--
2025-02-06 06:22
provider-digest.html
14.65
KB
-rw-r--r--
2025-02-06 06:22
provider-encoder.html
14.68
KB
-rw-r--r--
2025-02-06 06:22
provider-kdf.html
16.91
KB
-rw-r--r--
2025-02-06 06:22
provider-kem.html
11.05
KB
-rw-r--r--
2025-02-06 06:22
provider-keyexch.html
12.67
KB
-rw-r--r--
2025-02-06 06:22
provider-keymgmt.html
20.84
KB
-rw-r--r--
2025-02-06 06:22
provider-mac.html
11.35
KB
-rw-r--r--
2025-02-06 06:22
provider-object.html
8.26
KB
-rw-r--r--
2025-02-06 06:22
provider-rand.html
15.49
KB
-rw-r--r--
2025-02-06 06:22
provider-signature.html
25.29
KB
-rw-r--r--
2025-02-06 06:22
provider-storemgmt.html
10.11
KB
-rw-r--r--
2025-02-06 06:22
provider.html
11.75
KB
-rw-r--r--
2025-02-06 06:22
proxy-certificates.html
14.22
KB
-rw-r--r--
2025-02-06 06:22
ssl.html
5.33
KB
-rw-r--r--
2025-02-06 06:22
x509.html
3.75
KB
-rw-r--r--
2025-02-06 06:22
Save
Rename
<?xml version="1.0" ?> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <title>provider-kem</title> <meta http-equiv="content-type" content="text/html; charset=utf-8" /> <link rev="made" href="mailto:root@localhost" /> </head> <body style="background-color: white"> <ul id="index"> <li><a href="#NAME">NAME</a></li> <li><a href="#SYNOPSIS">SYNOPSIS</a></li> <li><a href="#DESCRIPTION">DESCRIPTION</a> <ul> <li><a href="#Context-Management-Functions">Context Management Functions</a></li> <li><a href="#Asymmetric-Key-Encapsulation-Functions">Asymmetric Key Encapsulation Functions</a></li> <li><a href="#Decapsulation-Functions">Decapsulation Functions</a></li> <li><a href="#Asymmetric-Key-Encapsulation-Parameters">Asymmetric Key Encapsulation Parameters</a></li> </ul> </li> <li><a href="#RETURN-VALUES">RETURN VALUES</a></li> <li><a href="#SEE-ALSO">SEE ALSO</a></li> <li><a href="#HISTORY">HISTORY</a></li> <li><a href="#COPYRIGHT">COPYRIGHT</a></li> </ul> <h1 id="NAME">NAME</h1> <p>provider-kem - The kem library <-> provider functions</p> <h1 id="SYNOPSIS">SYNOPSIS</h1> <pre><code> #include <openssl/core_dispatch.h> #include <openssl/core_names.h> /* * None of these are actual functions, but are displayed like this for * the function signatures for functions that are offered as function * pointers in OSSL_DISPATCH arrays. */ /* Context management */ void *OSSL_FUNC_kem_newctx(void *provctx); void OSSL_FUNC_kem_freectx(void *ctx); void *OSSL_FUNC_kem_dupctx(void *ctx); /* Encapsulation */ int OSSL_FUNC_kem_encapsulate_init(void *ctx, void *provkey, const char *name, const OSSL_PARAM params[]); int OSSL_FUNC_kem_encapsulate(void *ctx, unsigned char *out, size_t *outlen, unsigned char *secret, size_t *secretlen); /* Decapsulation */ int OSSL_FUNC_kem_decapsulate_init(void *ctx, void *provkey, const char *name); int OSSL_FUNC_kem_decapsulate(void *ctx, unsigned char *out, size_t *outlen, const unsigned char *in, size_t inlen); /* KEM parameters */ int OSSL_FUNC_kem_get_ctx_params(void *ctx, OSSL_PARAM params[]); const OSSL_PARAM *OSSL_FUNC_kem_gettable_ctx_params(void *ctx, void *provctx); int OSSL_FUNC_kem_set_ctx_params(void *ctx, const OSSL_PARAM params[]); const OSSL_PARAM *OSSL_FUNC_kem_settable_ctx_params(void *ctx, void *provctx);</code></pre> <h1 id="DESCRIPTION">DESCRIPTION</h1> <p>This documentation is primarily aimed at provider authors. See <a href="../man7/provider.html">provider(7)</a> for further information.</p> <p>The asymmetric kem (OSSL_OP_KEM) operation enables providers to implement asymmetric kem algorithms and make them available to applications via the API functions <a href="../man3/EVP_PKEY_encapsulate.html">EVP_PKEY_encapsulate(3)</a>, <a href="../man3/EVP_PKEY_decapsulate.html">EVP_PKEY_decapsulate(3)</a> and other related functions.</p> <p>All "functions" mentioned here are passed as function pointers between <i>libcrypto</i> and the provider in <b>OSSL_DISPATCH</b> arrays via <b>OSSL_ALGORITHM</b> arrays that are returned by the provider's provider_query_operation() function (see <a href="../man7/provider-base.html">"Provider Functions" in provider-base(7)</a>).</p> <p>All these "functions" have a corresponding function type definition named <b>OSSL_FUNC_{name}_fn</b>, and a helper function to retrieve the function pointer from an <b>OSSL_DISPATCH</b> element named <b>OSSL_FUNC_{name}</b>. For example, the "function" OSSL_FUNC_kem_newctx() has these:</p> <pre><code> typedef void *(OSSL_FUNC_kem_newctx_fn)(void *provctx); static ossl_inline OSSL_FUNC_kem_newctx_fn OSSL_FUNC_kem_newctx(const OSSL_DISPATCH *opf);</code></pre> <p><b>OSSL_DISPATCH</b> arrays are indexed by numbers that are provided as macros in <a href="../man7/openssl-core_dispatch.h.html">openssl-core_dispatch.h(7)</a>, as follows:</p> <pre><code> OSSL_FUNC_kem_newctx OSSL_FUNC_KEM_NEWCTX OSSL_FUNC_kem_freectx OSSL_FUNC_KEM_FREECTX OSSL_FUNC_kem_dupctx OSSL_FUNC_KEM_DUPCTX OSSL_FUNC_kem_encapsulate_init OSSL_FUNC_KEM_ENCAPSULATE_INIT OSSL_FUNC_kem_encapsulate OSSL_FUNC_KEM_ENCAPSULATE OSSL_FUNC_kem_decapsulate_init OSSL_FUNC_KEM_DECAPSULATE_INIT OSSL_FUNC_kem_decapsulate OSSL_FUNC_KEM_DECAPSULATE OSSL_FUNC_kem_get_ctx_params OSSL_FUNC_KEM_GET_CTX_PARAMS OSSL_FUNC_kem_gettable_ctx_params OSSL_FUNC_KEM_GETTABLE_CTX_PARAMS OSSL_FUNC_kem_set_ctx_params OSSL_FUNC_KEM_SET_CTX_PARAMS OSSL_FUNC_kem_settable_ctx_params OSSL_FUNC_KEM_SETTABLE_CTX_PARAMS</code></pre> <p>An asymmetric kem algorithm implementation may not implement all of these functions. In order to be a consistent set of functions a provider must implement OSSL_FUNC_kem_newctx and OSSL_FUNC_kem_freectx. It must also implement both of OSSL_FUNC_kem_encapsulate_init and OSSL_FUNC_kem_encapsulate, or both of OSSL_FUNC_kem_decapsulate_init and OSSL_FUNC_kem_decapsulate. OSSL_FUNC_kem_get_ctx_params is optional but if it is present then so must OSSL_FUNC_kem_gettable_ctx_params. Similarly, OSSL_FUNC_kem_set_ctx_params is optional but if it is present then so must OSSL_FUNC_kem_settable_ctx_params.</p> <p>An asymmetric kem algorithm must also implement some mechanism for generating, loading or importing keys via the key management (OSSL_OP_KEYMGMT) operation. See <a href="../man7/provider-keymgmt.html">provider-keymgmt(7)</a> for further details.</p> <h2 id="Context-Management-Functions">Context Management Functions</h2> <p>OSSL_FUNC_kem_newctx() should create and return a pointer to a provider side structure for holding context information during an asymmetric kem operation. A pointer to this context will be passed back in a number of the other asymmetric kem operation function calls. The parameter <i>provctx</i> is the provider context generated during provider initialisation (see <a href="../man7/provider.html">provider(7)</a>).</p> <p>OSSL_FUNC_kem_freectx() is passed a pointer to the provider side asymmetric kem context in the <i>ctx</i> parameter. This function should free any resources associated with that context.</p> <p>OSSL_FUNC_kem_dupctx() should duplicate the provider side asymmetric kem context in the <i>ctx</i> parameter and return the duplicate copy.</p> <h2 id="Asymmetric-Key-Encapsulation-Functions">Asymmetric Key Encapsulation Functions</h2> <p>OSSL_FUNC_kem_encapsulate_init() initialises a context for an asymmetric encapsulation given a provider side asymmetric kem context in the <i>ctx</i> parameter, a pointer to a provider key object in the <i>provkey</i> parameter and the <i>name</i> of the algorithm. The <i>params</i>, if not NULL, should be set on the context in a manner similar to using OSSL_FUNC_kem_set_ctx_params(). The key object should have been previously generated, loaded or imported into the provider using the key management (OSSL_OP_KEYMGMT) operation (see provider-keymgmt(7)>.</p> <p>OSSL_FUNC_kem_encapsulate() performs the actual encapsulation itself. A previously initialised asymmetric kem context is passed in the <i>ctx</i> parameter. Unless <i>out</i> is NULL, the data to be encapsulated is internally generated, and returned into the buffer pointed to by the <i>secret</i> parameter and the encapsulated data should also be written to the location pointed to by the <i>out</i> parameter. The length of the encapsulated data should be written to <i>*outlen</i> and the length of the generated secret should be written to <i>*secretlen</i>.</p> <p>If <i>out</i> is NULL then the maximum length of the encapsulated data should be written to <i>*outlen</i>, and the maximum length of the generated secret should be written to <i>*secretlen</i>.</p> <h2 id="Decapsulation-Functions">Decapsulation Functions</h2> <p>OSSL_FUNC_kem_decapsulate_init() initialises a context for an asymmetric decapsulation given a provider side asymmetric kem context in the <i>ctx</i> parameter, a pointer to a provider key object in the <i>provkey</i> parameter, and a <i>name</i> of the algorithm. The key object should have been previously generated, loaded or imported into the provider using the key management (OSSL_OP_KEYMGMT) operation (see provider-keymgmt(7)>.</p> <p>OSSL_FUNC_kem_decapsulate() performs the actual decapsulation itself. A previously initialised asymmetric kem context is passed in the <i>ctx</i> parameter. The data to be decapsulated is pointed to by the <i>in</i> parameter which is <i>inlen</i> bytes long. Unless <i>out</i> is NULL, the decapsulated data should be written to the location pointed to by the <i>out</i> parameter. The length of the decapsulated data should be written to <i>*outlen</i>. If <i>out</i> is NULL then the maximum length of the decapsulated data should be written to <i>*outlen</i>.</p> <h2 id="Asymmetric-Key-Encapsulation-Parameters">Asymmetric Key Encapsulation Parameters</h2> <p>See <a href="../man3/OSSL_PARAM.html">OSSL_PARAM(3)</a> for further details on the parameters structure used by the OSSL_FUNC_kem_get_ctx_params() and OSSL_FUNC_kem_set_ctx_params() functions.</p> <p>OSSL_FUNC_kem_get_ctx_params() gets asymmetric kem parameters associated with the given provider side asymmetric kem context <i>ctx</i> and stores them in <i>params</i>. Passing NULL for <i>params</i> should return true.</p> <p>OSSL_FUNC_kem_set_ctx_params() sets the asymmetric kem parameters associated with the given provider side asymmetric kem context <i>ctx</i> to <i>params</i>. Any parameter settings are additional to any that were previously set. Passing NULL for <i>params</i> should return true.</p> <p>No parameters are currently recognised by built-in asymmetric kem algorithms.</p> <p>OSSL_FUNC_kem_gettable_ctx_params() and OSSL_FUNC_kem_settable_ctx_params() get a constant <b>OSSL_PARAM</b> array that describes the gettable and settable parameters, i.e. parameters that can be used with OSSL_FUNC_kem_get_ctx_params() and OSSL_FUNC_kem_set_ctx_params() respectively. See <a href="../man3/OSSL_PARAM.html">OSSL_PARAM(3)</a> for the use of <b>OSSL_PARAM</b> as parameter descriptor.</p> <h1 id="RETURN-VALUES">RETURN VALUES</h1> <p>OSSL_FUNC_kem_newctx() and OSSL_FUNC_kem_dupctx() should return the newly created provider side asymmetric kem context, or NULL on failure.</p> <p>All other functions should return 1 for success or 0 on error.</p> <h1 id="SEE-ALSO">SEE ALSO</h1> <p><a href="../man7/provider.html">provider(7)</a></p> <h1 id="HISTORY">HISTORY</h1> <p>The provider KEM interface was introduced in OpenSSL 3.0.</p> <h1 id="COPYRIGHT">COPYRIGHT</h1> <p>Copyright 2020-2021 The OpenSSL Project Authors. All Rights Reserved.</p> <p>Licensed under the Apache License 2.0 (the "License"). You may not use this file except in compliance with the License. You can obtain a copy in the file LICENSE in the source distribution or at <a href="https://www.openssl.org/source/license.html">https://www.openssl.org/source/license.html</a>.</p> </body> </html>