/openssl/test/recipes/30-test_evp_data/ |
H A D | evpkdf_ss.txt | 20 Ctrl.digest = digest:SHA1 26 Ctrl.digest = digest:SHA1 32 Ctrl.digest = digest:SHA1 38 Ctrl.digest = digest:SHA1 44 Ctrl.digest = digest:SHA1 50 Ctrl.digest = digest:SHA1 56 Ctrl.digest = digest:SHA1 62 Ctrl.digest = digest:SHA1 68 Ctrl.digest = digest:SHA1 74 Ctrl.digest = digest:SHA1 [all …]
|
H A D | evpkdf_ssh.txt | 18 Ctrl.digest = digest:SHA1 26 Ctrl.digest = digest:SHA1 34 Ctrl.digest = digest:SHA1 42 Ctrl.digest = digest:SHA1 50 Ctrl.digest = digest:SHA1 58 Ctrl.digest = digest:SHA1 66 Ctrl.digest = digest:SHA1 74 Ctrl.digest = digest:SHA1 82 Ctrl.digest = digest:SHA1 90 Ctrl.digest = digest:SHA1 [all …]
|
H A D | evpkdf_tls13_kdf.txt | 23 Ctrl.digest = digest:SHA2-256 29 Ctrl.digest = digest:SHA2-256 38 Ctrl.digest = digest:SHA2-256 47 Ctrl.digest = digest:SHA2-256 56 Ctrl.digest = digest:SHA2-256 65 Ctrl.digest = digest:SHA2-256 74 Ctrl.digest = digest:SHA2-256 82 Ctrl.digest = digest:SHA2-256 91 Ctrl.digest = digest:SHA2-256 100 Ctrl.digest = digest:SHA2-256 [all …]
|
H A D | evpkdf_x963.txt | 22 Ctrl.digest = digest:SHA1 28 Ctrl.digest = digest:SHA224 34 Ctrl.digest = digest:SHA256 40 Ctrl.digest = digest:SHA384 45 Ctrl.digest = digest:SHA384 51 Ctrl.digest = digest:SHA512 56 Ctrl.digest = digest:SHA512 62 Ctrl.digest = digest:SHA512 68 Ctrl.digest = digest:SHA512 74 Ctrl.digest = digest:SHA512 [all …]
|
H A D | evpkdf_hkdf.txt | 17 Ctrl.digest = digest:SHA256 25 Ctrl.digest = digest:SHA256 32 Ctrl.digest = digest:SHA256 38 Ctrl.digest = digest:SHA256 46 Ctrl.digest = digest:SHA256 53 Ctrl.digest = digest:SHA256 82 Ctrl.digest = digest:SHA1 91 Ctrl.digest = digest:SHA1 98 Ctrl.digest = digest:SHA1 104 Ctrl.digest = digest:SHA1 [all …]
|
H A D | evpkdf_pbkdf2.txt | 22 Ctrl.digest = digest:sha1 31 Ctrl.digest = digest:sha256 40 Ctrl.digest = digest:sha512 49 Ctrl.digest = digest:sha1 58 Ctrl.digest = digest:sha256 67 Ctrl.digest = digest:sha512 76 Ctrl.digest = digest:sha1 85 Ctrl.digest = digest:sha256 94 Ctrl.digest = digest:sha512 101 Ctrl.digest = digest:sha1 [all …]
|
H A D | evpkdf_pbkdf1.txt | 21 Ctrl.digest = digest:md2 29 Ctrl.digest = digest:md5 37 Ctrl.digest = digest:sha1 45 Ctrl.digest = digest:md2 53 Ctrl.digest = digest:md5 61 Ctrl.digest = digest:sha1 69 Ctrl.digest = digest:md2 77 Ctrl.digest = digest:md5 85 Ctrl.digest = digest:sha1 93 Ctrl.digest = digest:md2 [all …]
|
H A D | evpkdf_tls12_prf.txt | 18 Ctrl.digest = digest:SHA256 27 Ctrl.digest = digest:SHA256 37 Ctrl.digest = digest:SHA256 55 Ctrl.digest = digest:SHA256 69 Ctrl.digest = digest:SHA256 79 Ctrl.digest = digest:SHAKE-256 92 Ctrl.digest = digest:SHA512-256 106 Ctrl.digest-check = digest-check:0 107 Ctrl.digest = digest:SHA512-256 119 Ctrl.digest = digest:SHA256 [all …]
|
H A D | evpkdf_x942.txt | 17 Ctrl.digest = digest:SHA1 23 Ctrl.digest = digest:SHA1 32 Ctrl.digest = digest:SHA1 39 Ctrl.digest = digest:SHA1 47 Ctrl.digest = digest:SHA1 55 Ctrl.digest = digest:SHA1 62 Ctrl.digest = digest:SHA1 69 Ctrl.digest = digest:SHA1 81 Ctrl.digest = digest:SHA256 92 Ctrl.digest = digest:SHA256 [all …]
|
H A D | evpkdf_kbkdf_counter.txt | 713 Ctrl.digest = digest:SHA1 726 Ctrl.digest = digest:SHA1 739 Ctrl.digest = digest:SHA1 752 Ctrl.digest = digest:SHA1 770 Ctrl.digest = digest:SHA1 783 Ctrl.digest = digest:SHA1 796 Ctrl.digest = digest:SHA1 809 Ctrl.digest = digest:SHA1 827 Ctrl.digest = digest:SHA1 840 Ctrl.digest = digest:SHA1 [all …]
|
H A D | evpkdf_hmac_drbg.txt | 15 Ctrl.digest = digest:SHA1 22 Ctrl.digest = digest:SHA1 28 Ctrl.digest = digest:SHA256 35 Ctrl.digest = digest:SHA256 41 Ctrl.digest = digest:SHA256 47 Ctrl.digest = digest:SHAKE-256
|
H A D | evppkey_kdf_tls1_prf.txt | 66 # Missing digest. 75 Ctrl.digest = digest:SHAKE-256 84 # Test that the operation with unapproved digest function is rejected 88 Ctrl.digest = digest:SHA512-256 94 Reason = digest not allowed 96 # Test that the operation with unapproved digest function is is reported as 102 Ctrl.digest-check = digest-check:0 103 Ctrl.digest = digest:SHA512-256 114 Ctrl.digest = digest:SHA256 129 Ctrl.digest = digest:SHA256
|
H A D | evppkey_rsa.txt | 69 Ctrl = digest:SHA1 75 Ctrl = digest:SHA1 82 Ctrl = digest:SHA1 88 Ctrl = digest:sha1 139 Ctrl = digest:MDC2 145 Ctrl = digest:MDC2 152 Ctrl = digest:MDC2 159 Ctrl = digest:MDC2 165 Ctrl = digest:MDC2 172 Ctrl = digest:MDC2 [all …]
|
H A D | evpkdf_pvkkdf.txt | 21 Ctrl.digest = digest:md5 28 Ctrl.digest = digest:md5 35 Ctrl.digest = digest:md4
|
H A D | evpkdf_tls11_prf.txt | 17 Ctrl.digest = digest:MD5-SHA1 25 Ctrl.digest = digest:MD5-SHA1 34 Ctrl.digest = digest:MD5-SHA1
|
/openssl/crypto/evp/ |
H A D | digest.c | 47 if (ctx->digest != NULL && ctx->digest->freectx != NULL) in evp_md_ctx_clear_digest() 61 ctx->digest = NULL; in evp_md_ctx_clear_digest() 288 ctx->digest = type; in evp_md_init_internal() 664 if (out->digest == in->digest) { in EVP_MD_CTX_copy_ex() 748 if (digest != NULL && digest->get_params != NULL) in EVP_MD_get_params() 755 if (digest != NULL && digest->gettable_params != NULL) in EVP_MD_gettable_params() 774 if (ctx->digest != NULL && ctx->digest->set_ctx_params != NULL) in EVP_MD_CTX_set_params() 809 if (ctx->digest != NULL && ctx->digest->settable_ctx_params != NULL) { in EVP_MD_CTX_settable_params() 830 if (ctx->digest != NULL && ctx->digest->get_ctx_params != NULL) in EVP_MD_CTX_get_params() 865 if (ctx->digest != NULL && ctx->digest->gettable_ctx_params != NULL) { in EVP_MD_CTX_gettable_params() [all …]
|
/openssl/doc/man7/ |
H A D | provider-digest.pod | 5 provider-digest - The digest library E<lt>-E<gt> provider functions 117 provider side digest context in the I<dctx> parameter. 122 previously initialised digest operation. 132 The digest should be written to I<*out> and the length of the digest to 134 The digest should not exceed I<outsz> bytes. 137 No provider side digest context is used. 153 provider side digest context I<dctx> to I<params>. 181 The digest block size. 186 The digest output size. 244 provider side digest context, or NULL on failure. [all …]
|
H A D | EVP_MAC-HMAC.pod | 12 digest. 39 =item "digest" (B<OSSL_MAC_PARAM_DIGEST>) <UTF8 string> 41 Sets the name of the underlying digest to be used. 45 Sets the properties to be queried when trying to fetch the underlying digest. 46 This must be given together with the digest naming parameter ("digest", or 49 =item "digest-noinit" (B<OSSL_MAC_PARAM_DIGEST_NOINIT>) <integer> 51 A flag to set the MAC digest to not initialise the implementation 57 =item "digest-oneshot" (B<OSSL_MAC_PARAM_DIGEST_ONESHOT>) <integer> 59 A flag to set the MAC digest to be a one-shot operation.
|
/openssl/doc/man3/ |
H A D | BIO_f_md.pod | 21 BIO_f_md() returns the message digest BIO method. This is a filter 23 for the digest routines EVP_DigestInit(), EVP_DigestUpdate() 30 digest calculation and returns the digest value. BIO_puts() is 33 BIO_reset() reinitialises a digest BIO. 35 BIO_set_md() sets the message digest of BIO B<b> to B<md>: this 36 must be called to initialize a digest BIO before any data is 39 BIO_get_md() places a pointer to the digest BIOs digest method 42 BIO_get_md_ctx() returns the digest BIOs context into B<mdcp>. 55 After the digest has been retrieved from a digest BIO it must be 69 BIO_f_md() returns the digest BIO method. [all …]
|
H A D | EVP_DigestInit.pod | 30 - EVP digest routines 179 Allocates and returns a digest context. 267 Sets up digest context I<ctx> to use a digest I<type>. 279 Sets up digest context I<ctx> to use a digest I<type>. 460 Returns an B<EVP_MD> structure when passed a digest name, a digest B<NID> or an 522 Sets or gets a fixed digest length. 704 digest algorithms (such as L<EVP_sha3_512(3)>). The other digest algorithms 724 If digest contexts are not cleaned up after use, 737 digest name passed on the command line. 807 L<provider-digest(7)>, [all …]
|
/openssl/demos/digest/ |
H A D | EVP_MD_xof.c | 52 unsigned char *digest = NULL; in main() local 98 digest = OPENSSL_malloc(digest_len); in main() 99 if (digest == NULL) { in main() 105 if (EVP_DigestFinalXOF(ctx, digest, digest_len) == 0) { in main() 111 BIO_dump_indent_fp(stdout, digest, digest_len, 2); in main() 119 if (CRYPTO_memcmp(digest, known_answer, sizeof(known_answer)) != 0) { in main() 127 OPENSSL_free(digest); in main()
|
/openssl/providers/implementations/macs/ |
H A D | hmac_prov.c | 56 PROV_DIGEST digest; member 100 ossl_prov_digest_reset(&macctx->digest); in hmac_free() 122 memset(&dst->digest, 0, sizeof(dst->digest)); in hmac_dup() 125 || !ossl_prov_digest_copy(&dst->digest, &src->digest)) { in hmac_dup() 148 const EVP_MD *md = ossl_prov_digest_md(&macctx->digest); in hmac_block_size() 158 const EVP_MD *digest; in hmac_setkey() local 190 digest = ossl_prov_digest_md(&macctx->digest); in hmac_setkey() 192 if (key != NULL || (macctx->tls_data_size == 0 && digest != NULL)) in hmac_setkey() 193 return HMAC_Init_ex(macctx->ctx, key, keylen, digest, in hmac_setkey() 194 ossl_prov_digest_engine(&macctx->digest)); in hmac_setkey() [all …]
|
/openssl/include/crypto/ |
H A D | sm2.h | 29 const EVP_MD *digest, 38 const EVP_MD *digest, 44 const EVP_MD *digest, 67 int ossl_sm2_ciphertext_size(const EC_KEY *key, const EVP_MD *digest, 74 const EVP_MD *digest, 79 const EVP_MD *digest,
|
/openssl/providers/implementations/kdfs/ |
H A D | sshkdf.c | 45 PROV_DIGEST digest; member 85 ossl_prov_digest_reset(&ctx->digest); in kdf_sshkdf_reset() 106 || !ossl_prov_digest_copy(&dest->digest, &src->digest)) in kdf_sshkdf_dup() 181 md = ossl_prov_digest_md(&ctx->digest); in kdf_sshkdf_derive() 231 md = ossl_prov_digest_md(&ctx->digest); in kdf_sshkdf_set_ctx_params() 344 unsigned char digest[EVP_MAX_MD_SIZE]; in SSHKDF() local 368 if (!EVP_DigestFinal_ex(md, digest, &dsize)) in SSHKDF() 372 memcpy(okey, digest, okey_len); in SSHKDF() 377 memcpy(okey, digest, dsize); in SSHKDF() 402 memcpy(okey + cursize, digest, dsize); in SSHKDF() [all …]
|
/openssl/doc/man1/ |
H A D | openssl-pkeyutl.pod.in | 14 [B<-digest> I<algorithm>] 67 message digest algorithm. The user can specify a digest algorithm by using 71 =item B<-digest> I<algorithm> 276 must correspond to the digest type. 295 values are supported: B<digest> sets the salt length to the digest length, 300 =item B<rsa_mgf1_md:>I<digest> 302 For PSS and OAEP padding sets the MGF1 digest. If the MGF1 digest is not 305 =item B<rsa_oaep_md:>I<digest> 331 B<rsa_mgf1_md:>I<digest> 348 digest is assumed by default. [all …]
|