/openssl/apps/ |
H A D | list.c | 132 if (names != NULL && EVP_CIPHER_names_do_all(c, collect_names, names)) { in list_ciphers() 216 if (names != NULL && EVP_MD_names_do_all(m, collect_names, names)) { in list_digests() 277 if (names != NULL && EVP_MAC_names_do_all(m, collect_names, names)) { in list_macs() 341 if (names != NULL && EVP_KDF_names_do_all(k, collect_names, names)) { in list_kdfs() 540 if (names != NULL && OSSL_ENCODER_names_do_all(k, collect_names, names)) { in list_encoders() 605 if (names != NULL && OSSL_DECODER_names_do_all(k, collect_names, names)) { in list_decoders() 661 if (names != NULL && EVP_KEYMGMT_names_do_all(k, collect_names, names)) { in list_keymanagers() 724 if (names != NULL && EVP_SIGNATURE_names_do_all(k, collect_names, names)) { in list_signatures() 783 if (names != NULL && EVP_KEM_names_do_all(k, collect_names, names)) { in list_kems() 844 if (names != NULL in list_asymciphers() [all …]
|
/openssl/apps/lib/ |
H A D | names.c | 23 STACK_OF(OPENSSL_CSTRING) *names = vdata; in collect_names() 25 sk_OPENSSL_CSTRING_push(names, name); in collect_names() 28 void print_names(BIO *out, STACK_OF(OPENSSL_CSTRING) *names) in print_names() argument 30 int i = sk_OPENSSL_CSTRING_num(names); in print_names() 33 sk_OPENSSL_CSTRING_sort(names); in print_names() 37 const char *name = sk_OPENSSL_CSTRING_value(names, j); in print_names()
|
/openssl/doc/man7/ |
H A D | openssl-core_names.h.pod | 5 openssl/core_names.h - OpenSSL provider parameter names 14 for L<OSSL_PARAM(3)> names, algorithm names and other known names used 17 Existing names are further described in the manuals for OpenSSL's 32 I<This header file does not constitute a general registry of names>. 34 their own parameter names. 38 to the names provided in this header to work in a compatible manner.
|
H A D | EVP_MD-SHA2.pod | 25 Known names are "SHA2-224", "SHA-224" and "SHA224". 29 Known names are "SHA2-256", "SHA-256" and "SHA256". 33 Known names are "SHA2-384", "SHA-384" and "SHA384". 37 Known names are "SHA2-512", "SHA-512" and "SHA512". 49 Known names are "SHA2-256/192", "SHA-256/192" and "SHA256-192". 53 Known names are "SHA2-512/224", "SHA-512/224" and "SHA512-224". 57 Known names are "SHA2-512/256", "SHA-512/256" and "SHA512-256".
|
/openssl/crypto/encode_decode/ |
H A D | encoder_pkey.c | 75 STACK_OF(OPENSSL_CSTRING) *names; 106 int i, end_i = sk_OPENSSL_CSTRING_num(data->names); in collect_encoder() 132 STACK_OF(OPENSSL_CSTRING) *names; 145 if (sk_OPENSSL_CSTRING_push(data->names, name) <= 0) in collect_name() 257 keymgmt_data.names = sk_OPENSSL_CSTRING_new_null(); in ossl_encoder_ctx_setup_for_pkey() 258 if (keymgmt_data.names == NULL) { in ossl_encoder_ctx_setup_for_pkey() 266 sk_OPENSSL_CSTRING_free(keymgmt_data.names); in ossl_encoder_ctx_setup_for_pkey() 270 encoder_data.names = keymgmt_data.names; in ossl_encoder_ctx_setup_for_pkey() 284 end = sk_OPENSSL_CSTRING_num(encoder_data.names); in ossl_encoder_ctx_setup_for_pkey() 288 sk_OPENSSL_CSTRING_free(keymgmt_data.names); in ossl_encoder_ctx_setup_for_pkey() [all …]
|
H A D | decoder_meth.c | 71 const char *names; /* For get_decoder_from_store() */ member 141 if ((id = methdata->id) == 0 && methdata->names != NULL) { in get_decoder_from_store() 143 const char *names = methdata->names; in get_decoder_from_store() local 144 const char *q = strchr(names, NAME_SEPARATOR); in get_decoder_from_store() 145 size_t l = (q == NULL ? strlen(names) : (size_t)(q - names)); in get_decoder_from_store() 149 id = ossl_namemap_name2num_n(namemap, names, l); in get_decoder_from_store() 180 if (names != NULL) { in put_decoder_in_store() 181 const char *q = strchr(names, NAME_SEPARATOR); in put_decoder_in_store() 183 l = (q == NULL ? strlen(names) : (size_t)(q - names)); in put_decoder_in_store() 305 const char *names = algodef->algorithm_names; in construct_decoder() local [all …]
|
H A D | encoder_meth.c | 71 const char *names; /* For get_encoder_from_store() */ member 141 if ((id = methdata->id) == 0 && methdata->names != NULL) { in get_encoder_from_store() 143 const char *names = methdata->names; in get_encoder_from_store() local 144 const char *q = strchr(names, NAME_SEPARATOR); in get_encoder_from_store() 145 size_t l = (q == NULL ? strlen(names) : (size_t)(q - names)); in get_encoder_from_store() 149 id = ossl_namemap_name2num_n(namemap, methdata->names, l); in get_encoder_from_store() 180 if (names != NULL) { in put_encoder_in_store() 181 const char *q = strchr(names, NAME_SEPARATOR); in put_encoder_in_store() 183 l = (q == NULL ? strlen(names) : (size_t)(q - names)); in put_encoder_in_store() 315 const char *names = algodef->algorithm_names; in construct_encoder() local [all …]
|
/openssl/util/perl/OpenSSL/ |
H A D | paramnames.pm | 643 my @names = keys %$trieref; 644 my $num = @names; 646 return (1, '', $trieref->{$names[0]}) if ($num == 1 and $names[0] eq 'val'); 649 my ($res, $suffix, $name) = locate_long_endings($trieref->{$names[0]}); 650 my $e = $names[0] . $suffix; 658 for my $l (@names) {
|
/openssl/crypto/evp/ |
H A D | evp_fetch.c | 31 const char *names; /* For get_evp_method_from_store() */ member 136 const char *names = methdata->names; in get_evp_method_from_store() local 137 const char *q = strchr(names, NAME_SEPARATOR); in get_evp_method_from_store() 138 size_t l = (q == NULL ? strlen(names) : (size_t)(q - names)); in get_evp_method_from_store() 142 name_id = ossl_namemap_name2num_n(namemap, names, l); in get_evp_method_from_store() 176 if (names != NULL) { in put_evp_method_in_store() 177 const char *q = strchr(names, NAME_SEPARATOR); in put_evp_method_in_store() 179 l = (q == NULL ? strlen(names) : (size_t)(q - names)); in put_evp_method_in_store() 183 || (name_id = ossl_namemap_name2num_n(namemap, names, l)) == 0 in put_evp_method_in_store() 213 const char *names = algodef->algorithm_names; in construct_evp_method() local [all …]
|
/openssl/doc/internal/man3/ |
H A D | ossl_namemap_new.pod | 31 const char *names, const char separator); 35 A B<OSSL_NAMEMAP> is a one-to-many number E<lt>-E<gt> names map, which 36 can be used to give any arbitrary set of names (any string) a unique 58 names already associated with that number. 67 ossl_namemap_doall_names() walks through all names associated with 73 ossl_namemap_add_names() divides up a set of names given in I<names>, 92 pointers to the names corresponding to the given number, or NULL if 99 ossl_namemap_doall_names() returns 1 if the callback was called for all names. A 100 return value of 0 means that the callback was not called for any names. 103 names, or zero on error. [all …]
|
/openssl/util/perl/OpenSSL/Util/ |
H A D | Pod.pm | 175 my @names = 184 join(', ', @names, @invisible_names), "\n" 188 names => [ @names, @invisible_names ],
|
/openssl/crypto/ |
H A D | param_build_set.c | 99 const char *names[], in ossl_param_build_set_multi_key_bn() argument 107 for (i = 0; i < sz && names[i] != NULL; ++i) { in ossl_param_build_set_multi_key_bn() 109 if (bn != NULL && !OSSL_PARAM_BLD_push_BN(bld, names[i], bn)) in ossl_param_build_set_multi_key_bn() 115 for (i = 0; i < sz && names[i] != NULL; ++i) { in ossl_param_build_set_multi_key_bn() 117 p = OSSL_PARAM_locate(params, names[i]); in ossl_param_build_set_multi_key_bn()
|
H A D | core_namemap.c | 112 const char **names; member 119 data->names[data->found++] = namenum->name; in do_name() 156 cbdata.names = OPENSSL_malloc(sizeof(*cbdata.names) * num_names); in ossl_namemap_doall_names() 157 if (cbdata.names == NULL) { in ossl_namemap_doall_names() 166 fn(cbdata.names[i], data); in ossl_namemap_doall_names() 168 OPENSSL_free(cbdata.names); in ossl_namemap_doall_names() 298 const char *names, const char separator) in ossl_namemap_add_names() argument 308 if ((tmp = OPENSSL_strdup(names)) == NULL) in ossl_namemap_add_names() 344 p, this_number, names); in ossl_namemap_add_names()
|
/openssl/crypto/objects/ |
H A D | o_names.c | 306 const OBJ_NAME **names; member 316 d->names[d->n++] = name; in do_all_sorted_fn() 335 d.names = in OBJ_NAME_do_all_sorted() 336 OPENSSL_malloc(sizeof(*d.names) * lh_OBJ_NAME_num_items(names_lh)); in OBJ_NAME_do_all_sorted() 338 if (d.names != NULL) { in OBJ_NAME_do_all_sorted() 342 qsort((void *)d.names, d.n, sizeof(*d.names), do_all_sorted_cmp); in OBJ_NAME_do_all_sorted() 345 fn(d.names[n], arg); in OBJ_NAME_do_all_sorted() 347 OPENSSL_free((void *)d.names); in OBJ_NAME_do_all_sorted()
|
/openssl/test/ssl-tests/ |
H A D | 04-client_auth.cnf | 11 test-6 = 6-client-auth-flex-require-non-empty-names 17 test-12 = 12-client-auth-TLSv1-require-non-empty-names 23 test-18 = 18-client-auth-TLSv1.1-require-non-empty-names 210 [6-client-auth-flex-require-non-empty-names] 213 [6-client-auth-flex-require-non-empty-names-ssl] 217 [6-client-auth-flex-require-non-empty-names-server] 385 [12-client-auth-TLSv1-require-non-empty-names] 388 [12-client-auth-TLSv1-require-non-empty-names-ssl] 568 [18-client-auth-TLSv1.1-require-non-empty-names] 823 [26-client-auth-TLSv1.2-require-non-empty-names] [all …]
|
H A D | 26-tls13_client_auth.cnf | 9 test-4 = 4-client-auth-TLSv1.3-require-non-empty-names 14 test-9 = 9-client-auth-TLSv1.3-require-non-empty-names-post-handshake 142 [4-client-auth-TLSv1.3-require-non-empty-names] 143 ssl_conf = 4-client-auth-TLSv1.3-require-non-empty-names-ssl 145 [4-client-auth-TLSv1.3-require-non-empty-names-ssl] 146 server = 4-client-auth-TLSv1.3-require-non-empty-names-server 147 client = 4-client-auth-TLSv1.3-require-non-empty-names-client 149 [4-client-auth-TLSv1.3-require-non-empty-names-server] 160 [4-client-auth-TLSv1.3-require-non-empty-names-client] 310 [9-client-auth-TLSv1.3-require-non-empty-names-post-handshake] [all …]
|
/openssl/doc/man3/ |
H A D | SSL_CTX_set0_CA_list.pod | 42 The functions described here set and manage the list of CA names that are sent 45 For TLS versions 1.2 and earlier the list of CA names is only sent from the 47 names set is never sent from client to server and the list of CA names retrieved 50 For TLS 1.3 the list of CA names is sent using the B<certificate_authorities> 54 In most cases it is not necessary to set CA names on the client side. The list 55 of CA names that are acceptable to the client will be sent in plaintext to the 58 and therefore setting CA names on the client side will have no impact if that 92 SSL_get0_peer_CA_list() retrieves the list of CA names (if any) the peer 138 only contains the names, not the complete certificates); use 158 and SSL_get0_CA_list() return a stack of CA names or B<NULL> is no CA names are [all …]
|
/openssl/doc/man1/ |
H A D | openssl-list.pod.in | 136 See L</Display of algorithm names> for a description of how names are 149 See L</Display of algorithm names> for a description of how names are 155 See L</Display of algorithm names> for a description of how names are 164 See L</Display of algorithm names> for a description of how names are 207 Display a list of all loaded providers with their names, version and status. 226 Display a list of built in objects, i.e. OIDs with names. They're listed in the 241 =head2 Display of algorithm names 243 Algorithm names may be displayed in one of two manners: 260 or like this if it's labeled with multiple names:
|
/openssl/test/ |
H A D | ssl_test.c | 234 static void print_ca_names(STACK_OF(X509_NAME) *names) in print_ca_names() argument 238 if (names == NULL || sk_X509_NAME_num(names) == 0) { in print_ca_names() 242 for (i = 0; i < sk_X509_NAME_num(names); i++) { in print_ca_names() 243 X509_NAME_print_ex(bio_err, sk_X509_NAME_value(names, i), 4, in print_ca_names() 251 STACK_OF(X509_NAME) *names) in check_ca_names() 257 if (names == NULL || sk_X509_NAME_num(names) == 0) { in check_ca_names() 262 if (sk_X509_NAME_num(names) != sk_X509_NAME_num(expected_names)) in check_ca_names() 264 for (i = 0; i < sk_X509_NAME_num(names); i++) { in check_ca_names() 265 if (!TEST_int_eq(X509_NAME_cmp(sk_X509_NAME_value(names, i), in check_ca_names() 277 print_ca_names(names); in check_ca_names()
|
/openssl/crypto/x509/ |
H A D | x509aset.c | 37 static int replace_dirName(GENERAL_NAMES **names, const X509_NAME *dirName) in replace_dirName() argument 65 GENERAL_NAMES_free(*names); in replace_dirName() 66 *names = new_names; in replace_dirName() 124 void X509_ACERT_set0_holder_entityName(X509_ACERT *x, GENERAL_NAMES *names) in X509_ACERT_set0_holder_entityName() argument 127 x->acinfo->holder.entityName = names; in X509_ACERT_set0_holder_entityName()
|
/openssl/include/openssl/ |
H A D | core.h | 198 # pragma names save 199 # pragma names uppercase,truncated 203 # pragma names restore
|
H A D | __DECC_INCLUDE_PROLOGUE.H | 21 # pragma names save 25 # pragma names as_is,shortened
|
/openssl/include/crypto/ |
H A D | __DECC_INCLUDE_PROLOGUE.H | 16 #pragma names save 20 #pragma names as_is,shortened
|
/openssl/include/internal/ |
H A D | __DECC_INCLUDE_PROLOGUE.H | 16 #pragma names save 20 #pragma names as_is,shortened
|
/openssl/providers/implementations/include/prov/ |
H A D | __DECC_INCLUDE_PROLOGUE.H | 21 # pragma names save 25 # pragma names as_is,shortened
|