/openssl/apps/ |
H A D | cms.c | 359 operation = SMIME_SIGN; in cms_main() 362 operation = SMIME_VERIFY; in cms_main() 365 operation = SMIME_RESIGN; in cms_main() 763 if (operation & SMIME_SIGNERS) { in cms_main() 801 } else if (!operation) { in cms_main() 828 if (!(operation & SMIME_OP)) in cms_main() 830 if (!(operation & SMIME_IP)) in cms_main() 888 if ((operation == SMIME_DECRYPT) || (operation == SMIME_ENCRYPT)) { in cms_main() 891 } else if ((operation == SMIME_SIGN) || (operation == SMIME_SIGN_RECEIPT)) { in cms_main() 930 if (operation & SMIME_IP) { in cms_main() [all …]
|
H A D | smime.c | 137 switch (operation) { in operation_name() 156 ((operation != 0 && (operation != (op))) \ 159 : (operation = (op))) 415 if (!operation) { in smime_main() 421 if (operation & SMIME_SIGNERS) { in smime_main() 466 if (!(operation & SMIME_SIGNERS)) in smime_main() 469 if (!(operation & SMIME_OP)) { in smime_main() 474 if (!(operation & SMIME_IP)) { in smime_main() 479 if (operation == SMIME_ENCRYPT) { in smime_main() 532 if (operation & SMIME_IP) { in smime_main() [all …]
|
/openssl/crypto/evp/ |
H A D | pmeth_gn.c | 25 static int gen_init(EVP_PKEY_CTX *ctx, int operation) in gen_init() argument 33 ctx->operation = operation; in gen_init() 38 switch (operation) { in gen_init() 62 || (operation == EVP_PKEY_OP_PARAMGEN in gen_init() 64 || (operation == EVP_PKEY_OP_KEYGEN in gen_init() 69 switch (operation) { in gen_init() 84 ctx->operation = EVP_PKEY_OP_UNDEFINED; in gen_init() 223 switch (ctx->operation) { in EVP_PKEY_generate() 270 if (ctx->operation != EVP_PKEY_OP_KEYGEN) { in EVP_PKEY_keygen() 348 ctx->operation = operation; in fromdata_init() [all …]
|
H A D | signature.c | 515 ctx->operation = operation; in evp_pkey_signature_init() 719 switch (operation) { in evp_pkey_signature_init() 790 switch (operation) { in evp_pkey_signature_init() 822 ctx->operation = EVP_PKEY_OP_UNDEFINED; in evp_pkey_signature_init() 857 if (ctx->operation != EVP_PKEY_OP_SIGNMSG) { in EVP_PKEY_sign_message_update() 879 if (ctx->operation != EVP_PKEY_OP_SIGNMSG) { in EVP_PKEY_sign_message_final() 905 if (ctx->operation != EVP_PKEY_OP_SIGN in EVP_PKEY_sign() 906 && ctx->operation != EVP_PKEY_OP_SIGNMSG) { in EVP_PKEY_sign() 985 if (ctx->operation != EVP_PKEY_OP_VERIFYMSG) { in EVP_PKEY_verify_message_update() 1006 if (ctx->operation != EVP_PKEY_OP_VERIFYMSG) { in EVP_PKEY_verify_message_final() [all …]
|
H A D | m_sigver.c | 196 locpctx->operation = ver ? EVP_PKEY_OP_VERIFYCTX in do_sigver_init() 281 locpctx->operation = EVP_PKEY_OP_UNDEFINED; in do_sigver_init() 322 ctx->pctx->operation = EVP_PKEY_OP_VERIFY; in do_sigver_init() 331 ctx->pctx->operation = EVP_PKEY_OP_SIGNCTX; in do_sigver_init() 333 ctx->pctx->operation = EVP_PKEY_OP_SIGN; in do_sigver_init() 406 || pctx->operation != EVP_PKEY_OP_SIGNCTX in EVP_DigestSignUpdate() 441 || pctx->operation != EVP_PKEY_OP_VERIFYCTX in EVP_DigestVerifyUpdate() 479 || pctx->operation != EVP_PKEY_OP_SIGNCTX in EVP_DigestSignFinal() 588 if (pctx->operation == EVP_PKEY_OP_SIGNCTX in EVP_DigestSign() 625 || pctx->operation != EVP_PKEY_OP_VERIFYCTX in EVP_DigestVerifyFinal() [all …]
|
H A D | asymcipher.c | 30 static int evp_pkey_asym_cipher_init(EVP_PKEY_CTX *ctx, int operation, in evp_pkey_asym_cipher_init() argument 47 ctx->operation = operation; in evp_pkey_asym_cipher_init() 162 switch (operation) { in evp_pkey_asym_cipher_init() 202 switch (ctx->operation) { in evp_pkey_asym_cipher_init() 221 ctx->operation = EVP_PKEY_OP_UNDEFINED; in evp_pkey_asym_cipher_init() 248 if (ctx->operation != EVP_PKEY_OP_ENCRYPT) { in EVP_PKEY_encrypt() 290 if (ctx->operation != EVP_PKEY_OP_DECRYPT) { in EVP_PKEY_decrypt()
|
/openssl/crypto/rsa/ |
H A D | rsa_asn1.c | 28 static int rsa_cb(int operation, ASN1_VALUE **pval, const ASN1_ITEM *it, in rsa_cb() argument 31 if (operation == ASN1_OP_NEW_PRE) { in rsa_cb() 36 } else if (operation == ASN1_OP_FREE_PRE) { in rsa_cb() 40 } else if (operation == ASN1_OP_D2I_POST) { in rsa_cb() 77 static int rsa_pss_cb(int operation, ASN1_VALUE **pval, const ASN1_ITEM *it, 80 if (operation == ASN1_OP_FREE_PRE) { 98 static int rsa_oaep_cb(int operation, ASN1_VALUE **pval, const ASN1_ITEM *it, 101 if (operation == ASN1_OP_FREE_PRE) {
|
/openssl/doc/man7/ |
H A D | provider.pod | 5 provider - OpenSSL operation implementation providers 27 An I<algorithm> is a named method to perform an operation. 77 operation implementations for diverse algorithms. 116 The number for this operation is B<OSSL_OP_DIGEST>. 124 The number for this operation is B<OSSL_OP_CIPHER>. 132 The number for this operation is B<OSSL_OP_MAC>. 140 The number for this operation is B<OSSL_OP_KDF>. 148 The number for this operation is B<OSSL_OP_KEYEXCH>. 163 The number for this operation is B<OSSL_OP_KEM>. 184 The number for this operation is B<OSSL_OP_RAND>. [all …]
|
H A D | openssl-core_dispatch.h.pod | 14 The F<< <openssl/core_dispatch.h> >> header defines all the operation 18 The operation and dispatch numbers are represented with macros, which 23 =item operation numbers 30 C<I<opname>> is the same as in the macro for the operation this
|
H A D | EVP_KDF-HKDF.pod | 49 This parameter sets the mode for the HKDF operation. 57 up for HKDF will perform an extract followed by an expand operation in one go. 58 The derived key returned will be the result after the expand operation. The 67 operation. The value returned will be the intermediate fixed-length pseudorandom 77 operation. The input key should be set to the intermediate fixed-length 78 pseudorandom key K returned from a previous extract operation. 93 A getter that returns 1 if the operation is FIPS approved, or 0 otherwise. 116 The output length of an HKDF expand operation is specified via the I<keylen>
|
/openssl/test/ |
H A D | filterprov.c | 31 int operation; member 89 if (globs->dispatch[i].operation == operation_id) { in filter_query() 203 int filter_provider_set_filter(int operation, const char *filterstr) in filter_provider_set_filter() argument 212 operation, in filter_provider_set_filter() 257 globs->dispatch[globs->num_dispatch].operation = operation; in filter_provider_set_filter() 263 OSSL_PROVIDER_unquery_operation(globs->deflt, operation, provalgs); in filter_provider_set_filter()
|
/openssl/fuzz/ |
H A D | ml-kem.c | 634 uint8_t operation; in FuzzerTestOneInput() local 645 buffer_cursor = consume_uint8t(buf, &len, &operation); in FuzzerTestOneInput() 652 operation %= OSSL_NELEM(ops); in FuzzerTestOneInput() 657 if (ops[operation].setup != NULL) in FuzzerTestOneInput() 658 ops[operation].setup(&buffer_cursor, &len, &in1, &in2); in FuzzerTestOneInput() 659 if (ops[operation].doit != NULL) in FuzzerTestOneInput() 660 ops[operation].doit(&buffer_cursor, &len, in1, in2, &out1, &out2); in FuzzerTestOneInput() 661 if (ops[operation].cleanup != NULL) in FuzzerTestOneInput() 662 ops[operation].cleanup(in1, in2, out1, out2); in FuzzerTestOneInput()
|
H A D | ml-dsa.c | 649 uint8_t operation; in FuzzerTestOneInput() local 658 buffer_cursor = consume_uint8_t(buf, &len, &operation); in FuzzerTestOneInput() 663 operation %= OSSL_NELEM(ops); in FuzzerTestOneInput() 666 if (ops[operation].setup != NULL) in FuzzerTestOneInput() 667 ops[operation].setup(&buffer_cursor, &len, &in1, &in2); in FuzzerTestOneInput() 668 if (ops[operation].doit != NULL) in FuzzerTestOneInput() 669 ops[operation].doit(&buffer_cursor, &len, in1, in2, &out1, &out2); in FuzzerTestOneInput() 670 if (ops[operation].cleanup != NULL) in FuzzerTestOneInput() 671 ops[operation].cleanup(in1, in2, out1, out2); in FuzzerTestOneInput()
|
H A D | slh-dsa.c | 572 uint8_t operation; in FuzzerTestOneInput() local 583 buffer_cursor = consume_uint8t(buf, &len, &operation); in FuzzerTestOneInput() 590 operation %= OSSL_NELEM(ops); in FuzzerTestOneInput() 595 if (ops[operation].setup != NULL) in FuzzerTestOneInput() 596 ops[operation].setup(&buffer_cursor, &len, &in1, &in2); in FuzzerTestOneInput() 597 if (ops[operation].doit != NULL) in FuzzerTestOneInput() 598 ops[operation].doit(&buffer_cursor, &len, in1, in2, &out1, &out2); in FuzzerTestOneInput() 599 if (ops[operation].cleanup != NULL) in FuzzerTestOneInput() 600 ops[operation].cleanup(in1, in2, out1, out2); in FuzzerTestOneInput()
|
/openssl/doc/man3/ |
H A D | SSL_want.pod | 7 SSL_want_client_hello_cb - obtain state information TLS/SSL I/O operation 36 only. The information must therefore only be used for normal operation under 56 B<BIO> layer in order to complete the actual SSL_*() operation. 62 complete the actual SSL_*() operation. 67 The operation did not complete because an application callback set by 73 The operation did not complete because a certificate verification callback 79 An asynchronous operation partially completed and was then paused. See 91 The operation did not complete because an application callback set by
|
H A D | SSL_get_error.pod | 5 SSL_get_error - obtain result code for TLS/SSL I/O operation 23 used in the same thread that performed the TLS/SSL I/O operation, and no 25 thread's error queue must be empty before the TLS/SSL I/O operation is 47 The TLS/SSL I/O operation completed. This result code is returned 63 The operation did not complete and can be retried later. 66 operation was a read operation from a nonblocking B<BIO>. 68 operation. 131 The operation did not complete because an application callback set by 138 The operation did not complete because an asynchronous engine is still 155 operation after a currently executing asynchronous operation for the current [all …]
|
H A D | EVP_PKEY_CTX_set_hkdf_md.pod | 36 EVP_PKEY_CTX_set_hkdf_mode() sets the mode for the HKDF operation. There 44 up for HKDF will perform an extract followed by an expand operation in one go. 45 The derived key returned will be the result after the expand operation. The 54 operation. The value returned will be the intermediate fixed-length pseudorandom 63 operation. The input key should be set to the intermediate fixed-length 64 pseudorandom key K returned from a previous extract operation. 105 The output length of an HKDF expand operation is specified via the length 109 performs an expand operation. Instead, the caller must allocate a buffer of the 119 In particular a return value of -2 indicates the operation is not supported by
|
/openssl/providers/common/ |
H A D | securitycheck.c | 25 int ossl_rsa_key_op_get_protect(const RSA *rsa, int operation, int *outprotect) in ossl_rsa_key_op_get_protect() argument 29 switch (operation) { in ossl_rsa_key_op_get_protect() 48 "operation: %d", operation); in ossl_rsa_key_op_get_protect() 54 "invalid operation: %d", operation); in ossl_rsa_key_op_get_protect()
|
/openssl/crypto/cms/ |
H A D | cms_asn1.c | 46 static int cms_si_cb(int operation, ASN1_VALUE **pval, const ASN1_ITEM *it, 49 if (operation == ASN1_OP_FREE_POST) { 94 static int cms_ec_cb(int operation, ASN1_VALUE **pval, const ASN1_ITEM *it, 99 if (operation == ASN1_OP_FREE_POST) 133 static int cms_rek_cb(int operation, ASN1_VALUE **pval, const ASN1_ITEM *it, 137 if (operation == ASN1_OP_FREE_POST) { 163 if (operation == ASN1_OP_NEW_POST) { 169 } else if (operation == ASN1_OP_FREE_POST) { 213 if (operation == ASN1_OP_FREE_PRE) { 306 static int cms_cb(int operation, ASN1_VALUE **pval, const ASN1_ITEM *it, in cms_cb() argument [all …]
|
/openssl/crypto/x509/ |
H A D | x_req.c | 35 static int rinf_cb(int operation, ASN1_VALUE **pval, const ASN1_ITEM *it, in rinf_cb() argument 40 if (operation == ASN1_OP_NEW_POST) { in rinf_cb() 48 static int req_cb(int operation, ASN1_VALUE **pval, const ASN1_ITEM *it, in req_cb() argument 53 switch (operation) { in req_cb()
|
/openssl/crypto/dsa/ |
H A D | dsa_asn1.c | 25 static int dsa_cb(int operation, ASN1_VALUE **pval, const ASN1_ITEM *it, in dsa_cb() argument 28 if (operation == ASN1_OP_NEW_PRE) { in dsa_cb() 33 } else if (operation == ASN1_OP_FREE_PRE) { in dsa_cb()
|
/openssl/crypto/pkcs7/ |
H A D | pk7_asn1.c | 33 static int pk7_cb(int operation, ASN1_VALUE **pval, const ASN1_ITEM *it, in pk7_cb() argument 39 switch (operation) { in pk7_cb() 137 static int si_cb(int operation, ASN1_VALUE **pval, const ASN1_ITEM *it, 140 if (operation == ASN1_OP_FREE_POST) { 180 static int ri_cb(int operation, ASN1_VALUE **pval, const ASN1_ITEM *it, 183 if (operation == ASN1_OP_FREE_POST) {
|
/openssl/providers/implementations/signature/ |
H A D | dsa_sig.c | 76 int operation; member 187 = ((ctx->operation in dsa_setup_md() 276 const OSSL_PARAM params[], int operation, in dsa_signverify_init() argument 297 pdsactx->operation = operation; in dsa_signverify_init() 414 if (pdsactx->operation == EVP_PKEY_OP_SIGNMSG) { in dsa_sign() 495 if (pdsactx->operation == EVP_PKEY_OP_VERIFYMSG) { in dsa_verify() 509 int operation, const char *desc) in dsa_digest_signverify_init() argument 517 operation, desc)) in dsa_digest_signverify_init() 894 int operation, const char *desc) in dsa_sigalg_signverify_init() argument 945 if (pdsactx != NULL && pdsactx->operation == EVP_PKEY_OP_VERIFYMSG) in dsa_sigalg_settable_ctx_params() [all …]
|
/openssl/crypto/dh/ |
H A D | dh_asn1.c | 25 static int dh_cb(int operation, ASN1_VALUE **pval, const ASN1_ITEM *it, in dh_cb() argument 28 if (operation == ASN1_OP_NEW_PRE) { in dh_cb() 33 } else if (operation == ASN1_OP_FREE_PRE) { in dh_cb() 37 } else if (operation == ASN1_OP_D2I_POST) { in dh_cb()
|
/openssl/crypto/asn1/ |
H A D | nsseq.c | 16 static int nsseq_cb(int operation, ASN1_VALUE **pval, const ASN1_ITEM *it, in nsseq_cb() argument 19 if (operation == ASN1_OP_NEW_POST) { in nsseq_cb()
|