Home
last modified time | relevance | path

Searched refs:desc (Results 1 – 25 of 67) sorted by relevance

123

/openssl/test/recipes/
H A D20-test_kdf.t21 desc => 'TLS1-PRF SHA256' },
27 desc => 'HKDF SHA256' },
30 desc => 'PBKDF2 SHA256'},
33 desc => 'SSKDF KMAC128'},
42 desc => 'SSHKDF SHA256'},
53 desc => 'HKDF SHA256' },
56 desc => 'PBKDF2 SHA256'},
59 desc => 'SSKDF KMAC128'},
68 desc => 'SSHKDF SHA256'},
73 desc => 'SSKDF KMAC128'},
[all …]
H A D20-test_mac.t24 desc => 'HMAC SHA1' },
29 desc => 'HMAC SHA1 via -macopt' },
34 desc => 'GMAC' },
39 desc => 'GMAC via -macopt' },
44 desc => 'KMAC128' },
49 desc => 'KMAC256' },
62 desc => 'SipHash No input' }
70 desc => 'CMAC AES-256-CBC' },
75 desc => 'CMAC AES-256-CBC' },
95 desc => 'KMAC128 Fail no key' },
[all …]
H A D20-test_rand_config.t23 desc => 'HASH-DRBG SHA2-512/256' },
29 desc => 'HASH-DRBG SHA3/512' },
35 desc => 'HMAC-DRBG SHA3/256' },
39 desc => 'CTR-DRBG AES-128 no DRBG' },
41 desc => 'CTR-DRBG AES-256 defaults' },
49 desc => 'CTR-DRBG ARIA-128' },
55 desc => 'CTR-DRBG ARIA-256' },
88 ok(comparelines($_->{expected}), $_->{desc});
H A D02-test_errstr.t112 my $desc = shift;
119 $desc = "match '$first' ($desc) with one of ( '"
122 $desc = "match '$first' ($desc) with '$strings[0]'";
129 $desc );
/openssl/providers/common/
H A Dsecuritycheck_fips.c38 const RSA *rsa, const char *desc, int protect) in ossl_fips_ind_rsa_key_check() argument
43 if (!ossl_FIPS_IND_on_unapproved(ind, id, libctx, desc, "Key size", in ossl_fips_ind_rsa_key_check()
46 "operation: %s", desc); in ossl_fips_ind_rsa_key_check()
56 const EC_GROUP *group, const char *desc, in ossl_fips_ind_ec_key_check() argument
68 if (!ossl_FIPS_IND_on_unapproved(ind, id, libctx, desc, "EC Key", in ossl_fips_ind_ec_key_check()
83 const EVP_MD *md, const char *desc) in ossl_fips_ind_digest_exch_check() argument
89 if (!ossl_FIPS_IND_on_unapproved(ind, id, libctx, desc, "Digest", in ossl_fips_ind_digest_exch_check()
101 const char *desc, in ossl_fips_ind_digest_sign_check() argument
112 if (!ossl_FIPS_IND_on_unapproved(ind, id, libctx, desc, "Digest SHA1", in ossl_fips_ind_digest_sign_check()
/openssl/providers/implementations/encode_decode/
H A Ddecode_msblob2key.c58 const struct keytype_desc_st *desc; member
70 ctx->desc = desc; in msblob2key_newctx()
125 if ((isdss && ctx->desc->type != EVP_PKEY_DSA) in msblob2key_decode()
126 || (!isdss && ctx->desc->type != EVP_PKEY_RSA)) in msblob2key_decode()
146 && ctx->desc->read_private_key != NULL) { in msblob2key_decode()
160 && ctx->desc->read_public_key != NULL) { in msblob2key_decode()
162 key = ctx->desc->read_public_key(&p, bitlen, ispub); in msblob2key_decode()
167 if (key != NULL && ctx->desc->adjust_key != NULL) in msblob2key_decode()
168 ctx->desc->adjust_key(key, ctx); in msblob2key_decode()
208 ctx->desc->free_key(key); in msblob2key_decode()
[all …]
H A Ddecode_der2key.c94 const struct keytype_desc_st *desc; member
138 ctx->desc = desc; in der2key_newctx()
227 selection = ctx->desc->selection_mask; in der2key_decode()
242 if (ctx->desc->d2i_PKCS8 != NULL) { in der2key_decode()
258 if (ctx->desc->d2i_PUBKEY != NULL) in der2key_decode()
269 if (ctx->desc->d2i_key_params != NULL) in der2key_decode()
289 && ctx->desc->check_key != NULL in der2key_decode()
290 && !ctx->desc->check_key(key, ctx)) { in der2key_decode()
291 ctx->desc->free_key(key); in der2key_decode()
296 ctx->desc->adjust_key(key, ctx); in der2key_decode()
[all …]
H A Ddecode_pvk2key.c62 const struct keytype_desc_st *desc; member
68 pvk2key_newctx(void *provctx, const struct keytype_desc_st *desc) in pvk2key_newctx() argument
74 ctx->desc = desc; in pvk2key_newctx()
135 && ctx->desc->read_private_key != NULL) { in pvk2key_decode()
143 key = ctx->desc->read_private_key(in, ossl_pw_pvk_password, &pwdata, in pvk2key_decode()
167 if (key != NULL && ctx->desc->adjust_key != NULL) in pvk2key_decode()
168 ctx->desc->adjust_key(key, ctx); in pvk2key_decode()
193 (char *)ctx->desc->name, 0); in pvk2key_decode()
205 ctx->desc->free_key(key); in pvk2key_decode()
216 ossl_prov_get_keymgmt_export(ctx->desc->fns); in pvk2key_export_object()
/openssl/apps/include/
H A Dapps.h85 int check_cert_time_string(const char *time, const char *desc);
118 char *get_passwd(const char *pass, const char *desc);
121 X509_REQ *load_csr(const char *file, int format, const char *desc);
125 const char *pass, const char *desc);
126 # define load_cert(uri, format, desc) load_cert_pass(uri, format, 1, NULL, desc) argument
128 const char *desc);
132 const char *pass, ENGINE *e, const char *desc);
137 const char *keytype, const char *desc);
151 const char *pass, const char *desc);
153 const char *pass, const char *desc);
[all …]
/openssl/ssl/
H A Ds3_msg.c44 int ssl3_send_alert(SSL_CONNECTION *s, int level, int desc) in ssl3_send_alert() argument
50 desc = tls13_alert_code(desc); in ssl3_send_alert()
52 desc = ssl->method->ssl3_enc->alert_value(desc); in ssl3_send_alert()
53 if (s->version == SSL3_VERSION && desc == SSL_AD_PROTOCOL_VERSION) in ssl3_send_alert()
54 desc = SSL_AD_HANDSHAKE_FAILURE; /* SSL 3.0 does not have in ssl3_send_alert()
56 if (desc < 0) in ssl3_send_alert()
58 if (s->shutdown & SSL_SENT_SHUTDOWN && desc != SSL_AD_CLOSE_NOTIFY) in ssl3_send_alert()
66 s->s3.send_alert[1] = desc; in ssl3_send_alert()
/openssl/test/testutil/
H A Dtests.c99 void test_info_c90(const char *desc, ...) in test_info_c90() argument
103 va_start(ap, desc); in test_info_c90()
108 void test_info(const char *file, int line, const char *desc, ...) in test_info() argument
112 va_start(ap, desc); in test_info()
117 void test_error_c90(const char *desc, ...) in test_error_c90() argument
121 va_start(ap, desc); in test_error_c90()
131 va_start(ap, desc); in test_error()
160 int test_skip(const char *file, int line, const char *desc, ...) in test_skip() argument
164 va_start(ap, desc); in test_skip()
170 int test_skip_c90(const char *desc, ...) in test_skip_c90() argument
[all …]
/openssl/crypto/
H A Dself_test_core.c25 const char *desc; member
88 (char *)st->desc, 0); in self_test_setparams()
104 ret->desc = ""; in OSSL_SELF_TEST_new()
116 const char *desc) in OSSL_SELF_TEST_onbegin() argument
121 st->desc = desc; in OSSL_SELF_TEST_onbegin()
141 st->desc = OSSL_SELF_TEST_DESC_NONE; in OSSL_SELF_TEST_onend()
/openssl/providers/implementations/signature/
H A Ddsa_sig.c151 const char *desc) in dsa_setup_md() argument
246 const char *desc) in dsa_sign_check_approved() argument
251 ctx->libctx, desc, "DSA", in dsa_sign_check_approved()
257 static int dsa_check_key(PROV_DSA_CTX *ctx, int sign, const char *desc) in dsa_check_key() argument
263 ctx->libctx, desc, "DSA Key", in dsa_check_key()
277 const char *desc) in dsa_signverify_init() argument
309 if (!dsa_check_key(pdsactx, operation_is_sign, desc)) in dsa_signverify_init()
517 operation, desc)) in dsa_digest_signverify_init()
523 && !dsa_setup_md(pdsactx, mdname, NULL, desc)) in dsa_digest_signverify_init()
902 desc)) in dsa_sigalg_signverify_init()
[all …]
H A Decdsa_sig.c168 const char *desc) in ecdsa_setup_md() argument
220 md_nid, sha1_allowed, desc, in ecdsa_setup_md()
266 const char *desc) in ecdsa_signverify_init() argument
292 EC_KEY_get0_group(ctx->ec), desc, in ecdsa_signverify_init()
500 int operation, const char *desc) in ecdsa_digest_signverify_init() argument
511 operation, desc)) in ecdsa_digest_signverify_init()
517 && !ecdsa_setup_md(ctx, mdname, NULL, desc)) in ecdsa_digest_signverify_init()
912 int operation, const char *desc) in ecdsa_sigalg_signverify_init() argument
920 desc)) in ecdsa_sigalg_signverify_init()
923 if (!ecdsa_setup_md(ctx, mdname, NULL, desc)) in ecdsa_sigalg_signverify_init()
[all …]
/openssl/apps/lib/
H A Dapps.c215 if (desc == NULL) in get_passwd()
489 if (desc == NULL) in load_cert_pass()
511 if (desc == NULL) in load_crl()
512 desc = "CRL"; in load_crl()
611 if (desc == NULL) in load_key()
630 if (desc == NULL) in load_pubkey()
650 if (desc == NULL) in load_keyparams_suppress()
747 if (desc == NULL) in load_cert_certs()
861 if (desc == NULL) in load_certs()
882 if (desc == NULL) in load_crls()
[all …]
H A Dengine.c105 char *make_engine_uri(ENGINE *e, const char *key_id, const char *desc) in make_engine_uri() argument
111 BIO_printf(bio_err, "No engine specified for loading %s\n", desc); in make_engine_uri()
113 BIO_printf(bio_err, "No engine key id specified for loading %s\n", desc); in make_engine_uri()
133 BIO_printf(bio_err, "Engines not supported for loading %s\n", desc); in make_engine_uri()
/openssl/apps/
H A Dlist.c145 if (desc != NULL) in list_ciphers()
229 if (desc != NULL) in list_digests()
290 if (desc != NULL) in list_macs()
354 if (desc != NULL) in list_kdfs()
419 if (desc != NULL) in list_random_generators()
554 if (desc != NULL) in list_encoders()
619 if (desc != NULL) in list_decoders()
668 if (desc != NULL) in list_keymanagers()
738 if (desc != NULL) in list_signatures()
844 if (desc != NULL) in list_kems()
[all …]
H A Dcmp.c757 char *pass_string = get_passwd(pass, desc); in load_key_pwd()
820 if (filenames == NULL || desc == NULL) { in read_PKIMESSAGE()
836 CMP_info2("%s %s", desc, file); in read_PKIMESSAGE()
1825 desc = opt_csr == NULL in setup_request_ctx()
2348 n, desc, file); in save_free_certs()
2388 file, desc); in save_crl()
2410 file, desc); in delete_file()
2440 return (crl == NULL) ? delete_file(file, desc) : save_crl(crl, file, desc); in save_crl_or_delete()
3243 CMP_info1("No %s", desc); in print_keyspec()
3252 BIO_printf(mem, "Key %s:\n", desc); in print_keyspec()
[all …]
H A Dengine.c156 char *desc = NULL; in util_verbose() local
190 desc = app_malloc(len + 1, "description buffer"); in util_verbose()
191 if (ENGINE_ctrl(e, ENGINE_CTRL_GET_DESC_FROM_CMD, num, desc, in util_verbose()
215 (desc == NULL) ? "<no description>" : desc); in util_verbose()
224 OPENSSL_free(desc); in util_verbose()
225 desc = NULL; in util_verbose()
235 OPENSSL_free(desc); in util_verbose()
/openssl/providers/fips/include/fips/
H A Dfipsindicator.h63 const char *desc);
126 const RSA *rsa, const char *desc, int protect);
129 const EC_GROUP *group, const char *desc,
133 const EVP_MD *md, const char *desc);
137 const char *desc,
/openssl/providers/implementations/kdfs/
H A Dpbkdf2.c183 const char **desc) in pbkdf2_lower_bound_check_passed() argument
187 if (desc != NULL) in pbkdf2_lower_bound_check_passed()
188 *desc = "Key size"; in pbkdf2_lower_bound_check_passed()
193 if (desc != NULL) in pbkdf2_lower_bound_check_passed()
194 *desc = "Salt size"; in pbkdf2_lower_bound_check_passed()
199 if (desc != NULL) in pbkdf2_lower_bound_check_passed()
200 *desc = "Iteration count"; in pbkdf2_lower_bound_check_passed()
212 const char *desc = NULL; in fips_lower_bound_check_passed() local
214 keylen, &error, &desc); in fips_lower_bound_check_passed()
218 "PBKDF2", desc, in fips_lower_bound_check_passed()
/openssl/doc/man3/
H A DOSSL_INDICATOR_set_callback.pod12 typedef int (OSSL_INDICATOR_CALLBACK)(const char *type, const char *desc,
32 The user's callback B<OSSL_INDICATOR_CALLBACK> I<type> and I<desc>
49 static int indicator_cb(const char *type, const char *desc,
52 if (type != NULL && desc != NULL)
53 fprintf(stdout, "%s %s is not approved\n", type, desc);
/openssl/crypto/cmp/
H A Dcmp_genm.c77 int expected, const char *desc) in get_genm_itav() argument
99 "with infoType %s", desc); in get_genm_itav()
105 … "response on genm requesting infoType %s does not include suitable value", desc); in get_genm_itav()
113 n, desc); in get_genm_itav()
129 ossl_cmp_log2(WARN, ctx, "%s' while expecting 'id-it-%s'", name, desc); in get_genm_itav()
133 "could not find any ITAV for %s", desc); in get_genm_itav()
251 X509 *target, const char *desc) in verify_ss_cert_trans() argument
277 desc, trusted == NULL ? "using trust store" in verify_ss_cert_trans()
/openssl/demos/guide/
H A Dquic-hq-interop.c541 SSL_free(poll_list[poll_idx].desc.value.ssl); in build_request_set()
630 poll_list[poll_idx].desc = SSL_as_poll_descriptor(new_stream); in build_request_set()
635 while (!SSL_write_ex2(poll_list[poll_idx].desc.value.ssl, in build_request_set()
638 if (handle_io_failure(poll_list[poll_idx].desc.value.ssl, 0) == 1) in build_request_set()
651 SSL_free(poll_list[poll_idx].desc.value.ssl); in build_request_set()
959 if (!SSL_read_ex(poll_list[poll_idx].desc.value.ssl, buf, in main()
961 switch (handle_io_failure(poll_list[poll_idx].desc.value.ssl, in main()
1032 SSL_free(poll_list[poll_idx].desc.value.ssl); in main()
/openssl/ssl/rio/
H A Dpoll_immediate.c75 switch (item->desc.type) { in SSL_poll()
77 ssl = item->desc.value.ssl; in SSL_poll()
111 "type %d", item->desc.type); in SSL_poll()

Completed in 59 milliseconds

123