/openssl/test/recipes/ |
H A D | 15-test_genpkey.t | 17 my @algs = (); 18 push @algs, qw(RSA) unless disabled("rsa"); 19 push @algs, qw(DSA) unless disabled("dsa"); 20 push @algs, qw(DH DHX) unless disabled("dh"); 21 push @algs, qw(EC) unless disabled("ec"); 22 push @algs, qw(X25519 X448) unless disabled("ecx"); 23 push @algs, qw(SM2) unless disabled("sm2"); 25 plan tests => scalar(@algs); 27 foreach (@algs) {
|
H A D | 70-test_sslsigalgs.t | 369 my @algs; 375 @algs = unpack('S>*', $ext); 377 shift @algs; 378 foreach (@algs) { 392 @algs = unpack('S>*', $ext); 394 shift @algs; 395 foreach (@algs) {
|
/openssl/test/ |
H A D | filterprov.c | 98 const OSSL_ALGORITHM *algs) in filter_unquery() argument 109 if (globs->dispatch[i].alg == algs) in filter_unquery() 111 OSSL_PROVIDER_unquery_operation(globs->deflt, operation_id, algs); in filter_unquery() 175 const OSSL_ALGORITHM *algs; in filter_provider_set_filter() local 195 for (algs = provalgs; algs->algorithm_names != NULL; algs++) { in filter_provider_set_filter() 196 const char *found = strstr(algs->algorithm_names, name); in filter_provider_set_filter() 202 if (found != algs->algorithm_names && found[-1] != ':') in filter_provider_set_filter() 209 globs->dispatch[globs->num_dispatch].alg[algnum++] = *algs; in filter_provider_set_filter() 212 if (algs->algorithm_names == NULL) { in filter_provider_set_filter()
|
/openssl/providers/common/der/ |
H A D | ECX.asn1 | 12 id-edwards-curve-algs OBJECT IDENTIFIER ::= { 1 3 101 } 14 id-X25519 OBJECT IDENTIFIER ::= { id-edwards-curve-algs 110 } 15 id-X448 OBJECT IDENTIFIER ::= { id-edwards-curve-algs 111 } 16 id-Ed25519 OBJECT IDENTIFIER ::= { id-edwards-curve-algs 112 } 17 id-Ed448 OBJECT IDENTIFIER ::= { id-edwards-curve-algs 113 }
|
/openssl/ssl/ |
H A D | ssl_cert_comp.c | 160 static int ssl_set_cert_comp_pref(int *prefs, int *algs, size_t len) in ssl_set_cert_comp_pref() argument 170 if (len == 0 || algs == NULL) { in ssl_set_cert_comp_pref() 180 if (algs[i] != 0 && ossl_comp_has_alg(algs[i])) { in ssl_set_cert_comp_pref() 182 if (already_set[algs[i]]) in ssl_set_cert_comp_pref() 184 tmp_prefs[j++] = algs[i]; in ssl_set_cert_comp_pref() 185 already_set[algs[i]] = 1; in ssl_set_cert_comp_pref() 360 int SSL_CTX_set1_cert_comp_preference(SSL_CTX *ctx, int *algs, size_t len) in SSL_CTX_set1_cert_comp_preference() argument 363 return ssl_set_cert_comp_pref(ctx->cert_comp_prefs, algs, len); in SSL_CTX_set1_cert_comp_preference() 369 int SSL_set1_cert_comp_preference(SSL *ssl, int *algs, size_t len) in SSL_set1_cert_comp_preference() argument 376 return ssl_set_cert_comp_pref(sc->cert_comp_prefs, algs, len); in SSL_set1_cert_comp_preference()
|
/openssl/fuzz/ |
H A D | smime.c | 32 STACK_OF(X509_ALGOR) *algs; in FuzzerTestOneInput() 36 algs = PKCS7_get_smimecap(sk_PKCS7_SIGNER_INFO_value(p7si, i)); in FuzzerTestOneInput() 37 sk_X509_ALGOR_pop_free(algs, X509_ALGOR_free); in FuzzerTestOneInput()
|
/openssl/crypto/property/ |
H A D | property.c | 67 SPARSE_ARRAY_OF(ALGORITHM) *algs; 236 ossl_sa_ALGORITHM_set(store->algs, idx, NULL); in alg_cleanup() 250 if ((res->algs = ossl_sa_ALGORITHM_new()) == NULL in ossl_method_store_new() 263 if (store->algs != NULL) in ossl_method_store_free() 264 ossl_sa_ALGORITHM_doall_arg(store->algs, &alg_cleanup, store); in ossl_method_store_free() 265 ossl_sa_ALGORITHM_free(store->algs); in ossl_method_store_free() 284 return ossl_sa_ALGORITHM_get(store->algs, nid); in ossl_method_store_retrieve() 289 return ossl_sa_ALGORITHM_set(store->algs, alg->nid, alg); in ossl_method_store_insert() 541 ossl_sa_ALGORITHM_doall_arg(store->algs, &alg_cleanup_by_provider, &data); in ossl_method_store_remove_all_provided() 581 ossl_sa_ALGORITHM_doall_arg(store->algs, alg_copy, tmpalgs); in ossl_method_store_do_all() [all …]
|
/openssl/doc/man3/ |
H A D | SSL_CTX_set1_cert_comp_preference.pod | 18 int SSL_CTX_set1_cert_comp_preference(SSL_CTX *ctx, int *algs, size_t len); 19 int SSL_set1_cert_comp_preference(SSL *ssl, int *algs, size_t len); 42 to specify the preferred compression algorithms. The B<algs> argument is an array 43 of algorithms, and B<length> is number of elements in the B<algs> array. Only 44 those algorithms enabled in the library will be accepted in B<algs>, unknown 45 algorithms in B<algs> are ignored. On an error, the preference order is left 100 the B<len> argument is the size of the B<algs> argument in bytes.
|
H A D | SSL_CONF_cmd.pod | 112 =item B<-sigalgs> I<algs> 119 The B<algs> argument should be a colon separated list of signature 138 =item B<-client_sigalgs> I<algs> 141 authentication for TLSv1.2 and TLSv1.3. For servers the B<algs> is used 147 The syntax of B<algs> is identical to B<-sigalgs>. If not set, then the
|
H A D | OSSL_PROVIDER.pod | 49 const OSSL_ALGORITHM *algs);
|
/openssl/crypto/ |
H A D | provider.c | 98 const OSSL_ALGORITHM *algs) in OSSL_PROVIDER_unquery_operation() argument 100 ossl_provider_unquery_operation(prov, operation_id, algs); in OSSL_PROVIDER_unquery_operation()
|
H A D | provider_core.c | 1887 const OSSL_ALGORITHM *algs) in ossl_provider_unquery_operation() argument 1899 prov->unquery_operation(prov->provctx, operation_id, algs); in ossl_provider_unquery_operation()
|
/openssl/include/openssl/ |
H A D | provider.h | 51 int operation_id, const OSSL_ALGORITHM *algs);
|
H A D | cms.h.in | 306 int CMS_add_smimecap(CMS_SignerInfo *si, STACK_OF(X509_ALGOR) *algs); 307 int CMS_add_simple_smimecap(STACK_OF(X509_ALGOR) **algs,
|
H A D | ssl.h.in | 2803 int SSL_CTX_set1_cert_comp_preference(SSL_CTX *ctx, int *algs, size_t len); 2804 int SSL_set1_cert_comp_preference(SSL *ssl, int *algs, size_t len);
|
/openssl/crypto/cms/ |
H A D | cms_sd.c | 1117 int CMS_add_smimecap(CMS_SignerInfo *si, STACK_OF(X509_ALGOR) *algs) in CMS_add_smimecap() argument 1122 smderlen = i2d_X509_ALGORS(algs, &smder); in CMS_add_smimecap() 1131 int CMS_add_simple_smimecap(STACK_OF(X509_ALGOR) **algs, in CMS_add_simple_smimecap() argument 1151 if (*algs == NULL) in CMS_add_simple_smimecap() 1152 *algs = sk_X509_ALGOR_new_null(); in CMS_add_simple_smimecap() 1153 if (*algs == NULL || !sk_X509_ALGOR_push(*algs, alg)) { in CMS_add_simple_smimecap()
|
/openssl/include/internal/ |
H A D | provider.h | 95 const OSSL_ALGORITHM *algs);
|
/openssl/doc/internal/man3/ |
H A D | ossl_provider_new.pod | 91 const OSSL_ALGORITHM *algs);
|
/openssl/doc/man7/ |
H A D | provider-base.pod | 120 const OSSL_ALGORITHM *algs); 418 provider_query_operation() and I<algs> should be its return value.
|
/openssl/crypto/err/ |
H A D | openssl.txt | 1861 X509_R_UNKNOWN_SIGID_ALGS:144:unknown sigid algs
|