/openssl/test/recipes/30-test_evp_data/ |
H A D | evpkdf_ss.txt | 20 Ctrl.digest = digest:SHA1 26 Ctrl.digest = digest:SHA1 32 Ctrl.digest = digest:SHA1 38 Ctrl.digest = digest:SHA1 44 Ctrl.digest = digest:SHA1 50 Ctrl.digest = digest:SHA1 56 Ctrl.digest = digest:SHA1 62 Ctrl.digest = digest:SHA1 68 Ctrl.digest = digest:SHA1 74 Ctrl.digest = digest:SHA1 [all …]
|
H A D | evpkdf_ssh.txt | 18 Ctrl.digest = digest:SHA1 26 Ctrl.digest = digest:SHA1 34 Ctrl.digest = digest:SHA1 42 Ctrl.digest = digest:SHA1 50 Ctrl.digest = digest:SHA1 58 Ctrl.digest = digest:SHA1 66 Ctrl.digest = digest:SHA1 74 Ctrl.digest = digest:SHA1 82 Ctrl.digest = digest:SHA1 90 Ctrl.digest = digest:SHA1 [all …]
|
H A D | evpkdf_tls13_kdf.txt | 23 Ctrl.digest = digest:SHA2-256 29 Ctrl.digest = digest:SHA2-256 38 Ctrl.digest = digest:SHA2-256 47 Ctrl.digest = digest:SHA2-256 56 Ctrl.digest = digest:SHA2-256 65 Ctrl.digest = digest:SHA2-256 74 Ctrl.digest = digest:SHA2-256 82 Ctrl.digest = digest:SHA2-256 91 Ctrl.digest = digest:SHA2-256 100 Ctrl.digest = digest:SHA2-256 [all …]
|
H A D | evpkdf_x963.txt | 22 Ctrl.digest = digest:SHA1 28 Ctrl.digest = digest:SHA224 34 Ctrl.digest = digest:SHA256 40 Ctrl.digest = digest:SHA384 45 Ctrl.digest = digest:SHA384 51 Ctrl.digest = digest:SHA512 56 Ctrl.digest = digest:SHA512 62 Ctrl.digest = digest:SHA512 68 Ctrl.digest = digest:SHA512 74 Ctrl.digest = digest:SHA512 [all …]
|
H A D | evpkdf_hkdf.txt | 17 Ctrl.digest = digest:SHA256 25 Ctrl.digest = digest:SHA256 32 Ctrl.digest = digest:SHA256 38 Ctrl.digest = digest:SHA256 46 Ctrl.digest = digest:SHA256 53 Ctrl.digest = digest:SHA256 82 Ctrl.digest = digest:SHA1 91 Ctrl.digest = digest:SHA1 98 Ctrl.digest = digest:SHA1 104 Ctrl.digest = digest:SHA1 [all …]
|
H A D | evpkdf_pbkdf2.txt | 22 Ctrl.digest = digest:sha1 31 Ctrl.digest = digest:sha256 40 Ctrl.digest = digest:sha512 49 Ctrl.digest = digest:sha1 58 Ctrl.digest = digest:sha256 67 Ctrl.digest = digest:sha512 76 Ctrl.digest = digest:sha1 85 Ctrl.digest = digest:sha256 94 Ctrl.digest = digest:sha512 101 Ctrl.digest = digest:sha1 [all …]
|
H A D | evpkdf_pbkdf1.txt | 21 Ctrl.digest = digest:md2 29 Ctrl.digest = digest:md5 37 Ctrl.digest = digest:sha1 45 Ctrl.digest = digest:md2 53 Ctrl.digest = digest:md5 61 Ctrl.digest = digest:sha1 69 Ctrl.digest = digest:md2 77 Ctrl.digest = digest:md5 85 Ctrl.digest = digest:sha1 93 Ctrl.digest = digest:md2 [all …]
|
H A D | evpkdf_tls12_prf.txt | 18 Ctrl.digest = digest:SHA256 27 Ctrl.digest = digest:SHA256 37 Ctrl.digest = digest:SHA256 55 Ctrl.digest = digest:SHA256 69 Ctrl.digest = digest:SHA256 79 Ctrl.digest = digest:SHAKE-256 92 Ctrl.digest = digest:SHA512-256 106 Ctrl.digest-check = digest-check:0 107 Ctrl.digest = digest:SHA512-256 119 Ctrl.digest = digest:SHA256 [all …]
|
H A D | evpkdf_x942.txt | 17 Ctrl.digest = digest:SHA1 23 Ctrl.digest = digest:SHA1 32 Ctrl.digest = digest:SHA1 39 Ctrl.digest = digest:SHA1 47 Ctrl.digest = digest:SHA1 55 Ctrl.digest = digest:SHA1 62 Ctrl.digest = digest:SHA1 69 Ctrl.digest = digest:SHA1 82 Ctrl.digest = digest:SHA256 94 Ctrl.digest = digest:SHA256 [all …]
|
H A D | evpkdf_kbkdf_counter.txt | 713 Ctrl.digest = digest:SHA1 726 Ctrl.digest = digest:SHA1 739 Ctrl.digest = digest:SHA1 752 Ctrl.digest = digest:SHA1 770 Ctrl.digest = digest:SHA1 783 Ctrl.digest = digest:SHA1 796 Ctrl.digest = digest:SHA1 809 Ctrl.digest = digest:SHA1 827 Ctrl.digest = digest:SHA1 840 Ctrl.digest = digest:SHA1 [all …]
|
H A D | evpkdf_hmac_drbg.txt | 15 Ctrl.digest = digest:SHA1 22 Ctrl.digest = digest:SHA1 28 Ctrl.digest = digest:SHA256 35 Ctrl.digest = digest:SHA256 41 Ctrl.digest = digest:SHA256 47 Ctrl.digest = digest:SHAKE-256
|
H A D | evppkey_kdf_tls1_prf.txt | 66 # Missing digest. 75 Ctrl.digest = digest:SHAKE-256 84 # Test that the operation with unapproved digest function is rejected 88 Ctrl.digest = digest:SHA512-256 94 Reason = digest not allowed 96 # Test that the operation with unapproved digest function is is reported as 102 Ctrl.digest-check = digest-check:0 103 Ctrl.digest = digest:SHA512-256 114 Ctrl.digest = digest:SHA256 129 Ctrl.digest = digest:SHA256
|
H A D | evppkey_rsa.txt | 69 Ctrl = digest:SHA1 75 Ctrl = digest:SHA1 82 Ctrl = digest:SHA1 88 Ctrl = digest:sha1 139 Ctrl = digest:MDC2 145 Ctrl = digest:MDC2 152 Ctrl = digest:MDC2 159 Ctrl = digest:MDC2 165 Ctrl = digest:MDC2 172 Ctrl = digest:MDC2 [all …]
|
H A D | evpkdf_pvkkdf.txt | 21 Ctrl.digest = digest:md5 28 Ctrl.digest = digest:md5 35 Ctrl.digest = digest:md4
|
H A D | evpkdf_tls11_prf.txt | 17 Ctrl.digest = digest:MD5-SHA1 25 Ctrl.digest = digest:MD5-SHA1 34 Ctrl.digest = digest:MD5-SHA1
|
/openssl/crypto/evp/ |
H A D | digest.c | 47 if (ctx->digest != NULL && ctx->digest->freectx != NULL) in evp_md_ctx_clear_digest() 288 ctx->digest = type; in evp_md_init_internal() 620 if (out->digest == in->digest && in->digest->copyctx != NULL) { in EVP_MD_CTX_copy_ex() 678 if (out->digest == in->digest) { in EVP_MD_CTX_copy_ex() 762 if (digest != NULL && digest->get_params != NULL) in EVP_MD_get_params() 769 if (digest != NULL && digest->gettable_params != NULL) in EVP_MD_gettable_params() 788 if (ctx->digest != NULL && ctx->digest->set_ctx_params != NULL) in EVP_MD_CTX_set_params() 823 if (ctx->digest != NULL && ctx->digest->settable_ctx_params != NULL) { in EVP_MD_CTX_settable_params() 844 if (ctx->digest != NULL && ctx->digest->get_ctx_params != NULL) in EVP_MD_CTX_get_params() 879 if (ctx->digest != NULL && ctx->digest->gettable_ctx_params != NULL) { in EVP_MD_CTX_gettable_params() [all …]
|
/openssl/doc/man7/ |
H A D | provider-digest.pod | 5 provider-digest - The digest library E<lt>-E<gt> provider functions 127 provider side digest context in the I<dctx> parameter. 132 previously initialised digest operation. 142 The digest should be written to I<*out> and the length of the digest to 144 The digest should not exceed I<outsz> bytes. 147 No provider side digest context is used. 163 provider side digest context I<dctx> to I<params>. 191 The digest block size. 196 The digest output size. 254 provider side digest context, or NULL on failure. [all …]
|
H A D | EVP_MAC-HMAC.pod | 12 digest. 39 =item "digest" (B<OSSL_MAC_PARAM_DIGEST>) <UTF8 string> 41 Sets the name of the underlying digest to be used. 45 Sets the properties to be queried when trying to fetch the underlying digest. 46 This must be given together with the digest naming parameter ("digest", or 49 =item "digest-noinit" (B<OSSL_MAC_PARAM_DIGEST_NOINIT>) <integer> 51 A flag to set the MAC digest to not initialise the implementation 57 =item "digest-oneshot" (B<OSSL_MAC_PARAM_DIGEST_ONESHOT>) <integer> 59 A flag to set the MAC digest to be a one-shot operation.
|
/openssl/doc/man3/ |
H A D | BIO_f_md.pod | 21 BIO_f_md() returns the message digest BIO method. This is a filter 23 for the digest routines EVP_DigestInit(), EVP_DigestUpdate() 30 digest calculation and returns the digest value. BIO_puts() is 33 BIO_reset() reinitialises a digest BIO. 35 BIO_set_md() sets the message digest of BIO B<b> to B<md>: this 36 must be called to initialize a digest BIO before any data is 39 BIO_get_md() places a pointer to the digest BIOs digest method 42 BIO_get_md_ctx() returns the digest BIOs context into B<mdcp>. 55 After the digest has been retrieved from a digest BIO it must be 69 BIO_f_md() returns the digest BIO method. [all …]
|
H A D | EVP_DigestInit.pod | 30 - EVP digest routines 179 Allocates and returns a digest context. 267 Sets up digest context I<ctx> to use a digest I<type>. 279 Sets up digest context I<ctx> to use a digest I<type>. 460 Returns an B<EVP_MD> structure when passed a digest name, a digest B<NID> or an 522 Sets or gets a fixed digest length. 704 digest algorithms (such as L<EVP_sha3_512(3)>). The other digest algorithms 724 If digest contexts are not cleaned up after use, 737 digest name passed on the command line. 807 L<provider-digest(7)>, [all …]
|
/openssl/demos/digest/ |
H A D | EVP_MD_xof.c | 52 unsigned char *digest = NULL; in main() local 98 digest = OPENSSL_malloc(digest_len); in main() 99 if (digest == NULL) { in main() 105 if (EVP_DigestFinalXOF(ctx, digest, digest_len) == 0) { in main() 111 BIO_dump_indent_fp(stdout, digest, digest_len, 2); in main() 119 if (CRYPTO_memcmp(digest, known_answer, sizeof(known_answer)) != 0) { in main() 127 OPENSSL_free(digest); in main()
|
/openssl/providers/implementations/macs/ |
H A D | hmac_prov.c | 56 PROV_DIGEST digest; member 100 ossl_prov_digest_reset(&macctx->digest); in hmac_free() 122 memset(&dst->digest, 0, sizeof(dst->digest)); in hmac_dup() 125 || !ossl_prov_digest_copy(&dst->digest, &src->digest)) { in hmac_dup() 148 const EVP_MD *md = ossl_prov_digest_md(&macctx->digest); in hmac_block_size() 158 const EVP_MD *digest; in hmac_setkey() local 190 digest = ossl_prov_digest_md(&macctx->digest); in hmac_setkey() 192 if (key != NULL || (macctx->tls_data_size == 0 && digest != NULL)) in hmac_setkey() 193 return HMAC_Init_ex(macctx->ctx, key, keylen, digest, in hmac_setkey() 194 ossl_prov_digest_engine(&macctx->digest)); in hmac_setkey() [all …]
|
/openssl/include/crypto/ |
H A D | sm2.h | 29 const EVP_MD *digest, 38 const EVP_MD *digest, 44 const EVP_MD *digest, 67 int ossl_sm2_ciphertext_size(const EC_KEY *key, const EVP_MD *digest, 74 const EVP_MD *digest, 79 const EVP_MD *digest,
|
/openssl/providers/implementations/kdfs/ |
H A D | sshkdf.c | 45 PROV_DIGEST digest; member 85 ossl_prov_digest_reset(&ctx->digest); in kdf_sshkdf_reset() 106 || !ossl_prov_digest_copy(&dest->digest, &src->digest)) in kdf_sshkdf_dup() 181 md = ossl_prov_digest_md(&ctx->digest); in kdf_sshkdf_derive() 231 md = ossl_prov_digest_md(&ctx->digest); in kdf_sshkdf_set_ctx_params() 344 unsigned char digest[EVP_MAX_MD_SIZE]; in SSHKDF() local 368 if (!EVP_DigestFinal_ex(md, digest, &dsize)) in SSHKDF() 372 memcpy(okey, digest, okey_len); in SSHKDF() 377 memcpy(okey, digest, dsize); in SSHKDF() 402 memcpy(okey + cursize, digest, dsize); in SSHKDF() [all …]
|
/openssl/doc/man1/ |
H A D | openssl-pkeyutl.pod.in | 14 [B<-digest> I<algorithm>] 71 the user can specify a digest algorithm by using the B<-digest> option. 81 =item B<-digest> I<algorithm> 154 be a digest, but this may then require an additional B<-pkeyopt> C<digest:>I<md> 332 values are supported: B<digest> sets the salt length to the digest length, 337 =item B<rsa_mgf1_md:>I<digest> 339 For PSS and OAEP padding sets the MGF1 digest. If the MGF1 digest is not 342 =item B<rsa_oaep_md:>I<digest> 368 B<rsa_mgf1_md:>I<digest> 385 digest is assumed by default. [all …]
|