/openssl/test/recipes/ |
H A D | 20-test_kdf.t | 21 desc => 'TLS1-PRF SHA256' }, 27 desc => 'HKDF SHA256' }, 30 desc => 'PBKDF2 SHA256'}, 33 desc => 'SSKDF KMAC128'}, 42 desc => 'SSHKDF SHA256'}, 53 desc => 'HKDF SHA256' }, 56 desc => 'PBKDF2 SHA256'}, 59 desc => 'SSKDF KMAC128'}, 68 desc => 'SSHKDF SHA256'}, 73 desc => 'SSKDF KMAC128'}, [all …]
|
H A D | 20-test_mac.t | 24 desc => 'HMAC SHA1' }, 29 desc => 'HMAC SHA1 via -macopt' }, 34 desc => 'GMAC' }, 39 desc => 'GMAC via -macopt' }, 44 desc => 'KMAC128' }, 49 desc => 'KMAC256' }, 62 desc => 'SipHash No input' } 70 desc => 'CMAC AES-256-CBC' }, 75 desc => 'CMAC AES-256-CBC' }, 95 desc => 'KMAC128 Fail no key' }, [all …]
|
H A D | 20-test_rand_config.t | 23 desc => 'HASH-DRBG SHA2-512/256' }, 29 desc => 'HASH-DRBG SHA3/512' }, 35 desc => 'HMAC-DRBG SHA3/256' }, 39 desc => 'CTR-DRBG AES-128 no DRBG' }, 41 desc => 'CTR-DRBG AES-256 defaults' }, 49 desc => 'CTR-DRBG ARIA-128' }, 55 desc => 'CTR-DRBG ARIA-256' }, 88 ok(comparelines($_->{expected}), $_->{desc});
|
H A D | 02-test_errstr.t | 112 my $desc = shift; 119 $desc = "match '$first' ($desc) with one of ( '" 122 $desc = "match '$first' ($desc) with '$strings[0]'"; 129 $desc );
|
/openssl/providers/common/ |
H A D | securitycheck_fips.c | 38 const RSA *rsa, const char *desc, int protect) in ossl_fips_ind_rsa_key_check() argument 43 if (!ossl_FIPS_IND_on_unapproved(ind, id, libctx, desc, "Key size", in ossl_fips_ind_rsa_key_check() 46 "operation: %s", desc); in ossl_fips_ind_rsa_key_check() 56 const EC_GROUP *group, const char *desc, in ossl_fips_ind_ec_key_check() argument 68 if (!ossl_FIPS_IND_on_unapproved(ind, id, libctx, desc, "EC Key", in ossl_fips_ind_ec_key_check() 83 const EVP_MD *md, const char *desc) in ossl_fips_ind_digest_exch_check() argument 89 if (!ossl_FIPS_IND_on_unapproved(ind, id, libctx, desc, "Digest", in ossl_fips_ind_digest_exch_check() 101 const char *desc, in ossl_fips_ind_digest_sign_check() argument 112 if (!ossl_FIPS_IND_on_unapproved(ind, id, libctx, desc, "Digest SHA1", in ossl_fips_ind_digest_sign_check()
|
/openssl/providers/implementations/encode_decode/ |
H A D | decode_msblob2key.c | 58 const struct keytype_desc_st *desc; member 70 ctx->desc = desc; in msblob2key_newctx() 125 if ((isdss && ctx->desc->type != EVP_PKEY_DSA) in msblob2key_decode() 126 || (!isdss && ctx->desc->type != EVP_PKEY_RSA)) in msblob2key_decode() 146 && ctx->desc->read_private_key != NULL) { in msblob2key_decode() 160 && ctx->desc->read_public_key != NULL) { in msblob2key_decode() 162 key = ctx->desc->read_public_key(&p, bitlen, ispub); in msblob2key_decode() 167 if (key != NULL && ctx->desc->adjust_key != NULL) in msblob2key_decode() 168 ctx->desc->adjust_key(key, ctx); in msblob2key_decode() 208 ctx->desc->free_key(key); in msblob2key_decode() [all …]
|
H A D | decode_der2key.c | 94 const struct keytype_desc_st *desc; member 138 ctx->desc = desc; in der2key_newctx() 227 selection = ctx->desc->selection_mask; in der2key_decode() 242 if (ctx->desc->d2i_PKCS8 != NULL) { in der2key_decode() 258 if (ctx->desc->d2i_PUBKEY != NULL) in der2key_decode() 269 if (ctx->desc->d2i_key_params != NULL) in der2key_decode() 289 && ctx->desc->check_key != NULL in der2key_decode() 290 && !ctx->desc->check_key(key, ctx)) { in der2key_decode() 291 ctx->desc->free_key(key); in der2key_decode() 296 ctx->desc->adjust_key(key, ctx); in der2key_decode() [all …]
|
H A D | decode_pvk2key.c | 62 const struct keytype_desc_st *desc; member 68 pvk2key_newctx(void *provctx, const struct keytype_desc_st *desc) in pvk2key_newctx() argument 74 ctx->desc = desc; in pvk2key_newctx() 135 && ctx->desc->read_private_key != NULL) { in pvk2key_decode() 143 key = ctx->desc->read_private_key(in, ossl_pw_pvk_password, &pwdata, in pvk2key_decode() 167 if (key != NULL && ctx->desc->adjust_key != NULL) in pvk2key_decode() 168 ctx->desc->adjust_key(key, ctx); in pvk2key_decode() 193 (char *)ctx->desc->name, 0); in pvk2key_decode() 205 ctx->desc->free_key(key); in pvk2key_decode() 216 ossl_prov_get_keymgmt_export(ctx->desc->fns); in pvk2key_export_object()
|
/openssl/apps/include/ |
H A D | apps.h | 85 int check_cert_time_string(const char *time, const char *desc); 118 char *get_passwd(const char *pass, const char *desc); 121 X509_REQ *load_csr(const char *file, int format, const char *desc); 125 const char *pass, const char *desc); 126 # define load_cert(uri, format, desc) load_cert_pass(uri, format, 1, NULL, desc) argument 128 const char *desc); 132 const char *pass, ENGINE *e, const char *desc); 137 const char *keytype, const char *desc); 151 const char *pass, const char *desc); 153 const char *pass, const char *desc); [all …]
|
/openssl/ssl/ |
H A D | s3_msg.c | 44 int ssl3_send_alert(SSL_CONNECTION *s, int level, int desc) in ssl3_send_alert() argument 50 desc = tls13_alert_code(desc); in ssl3_send_alert() 52 desc = ssl->method->ssl3_enc->alert_value(desc); in ssl3_send_alert() 53 if (s->version == SSL3_VERSION && desc == SSL_AD_PROTOCOL_VERSION) in ssl3_send_alert() 54 desc = SSL_AD_HANDSHAKE_FAILURE; /* SSL 3.0 does not have in ssl3_send_alert() 56 if (desc < 0) in ssl3_send_alert() 58 if (s->shutdown & SSL_SENT_SHUTDOWN && desc != SSL_AD_CLOSE_NOTIFY) in ssl3_send_alert() 66 s->s3.send_alert[1] = desc; in ssl3_send_alert()
|
/openssl/test/testutil/ |
H A D | tests.c | 99 void test_info_c90(const char *desc, ...) in test_info_c90() argument 103 va_start(ap, desc); in test_info_c90() 108 void test_info(const char *file, int line, const char *desc, ...) in test_info() argument 112 va_start(ap, desc); in test_info() 117 void test_error_c90(const char *desc, ...) in test_error_c90() argument 121 va_start(ap, desc); in test_error_c90() 131 va_start(ap, desc); in test_error() 160 int test_skip(const char *file, int line, const char *desc, ...) in test_skip() argument 164 va_start(ap, desc); in test_skip() 170 int test_skip_c90(const char *desc, ...) in test_skip_c90() argument [all …]
|
/openssl/crypto/ |
H A D | self_test_core.c | 25 const char *desc; member 88 (char *)st->desc, 0); in self_test_setparams() 104 ret->desc = ""; in OSSL_SELF_TEST_new() 116 const char *desc) in OSSL_SELF_TEST_onbegin() argument 121 st->desc = desc; in OSSL_SELF_TEST_onbegin() 141 st->desc = OSSL_SELF_TEST_DESC_NONE; in OSSL_SELF_TEST_onend()
|
/openssl/providers/implementations/signature/ |
H A D | dsa_sig.c | 151 const char *desc) in dsa_setup_md() argument 246 const char *desc) in dsa_sign_check_approved() argument 251 ctx->libctx, desc, "DSA", in dsa_sign_check_approved() 257 static int dsa_check_key(PROV_DSA_CTX *ctx, int sign, const char *desc) in dsa_check_key() argument 263 ctx->libctx, desc, "DSA Key", in dsa_check_key() 277 const char *desc) in dsa_signverify_init() argument 309 if (!dsa_check_key(pdsactx, operation_is_sign, desc)) in dsa_signverify_init() 517 operation, desc)) in dsa_digest_signverify_init() 523 && !dsa_setup_md(pdsactx, mdname, NULL, desc)) in dsa_digest_signverify_init() 902 desc)) in dsa_sigalg_signverify_init() [all …]
|
H A D | ecdsa_sig.c | 168 const char *desc) in ecdsa_setup_md() argument 220 md_nid, sha1_allowed, desc, in ecdsa_setup_md() 266 const char *desc) in ecdsa_signverify_init() argument 292 EC_KEY_get0_group(ctx->ec), desc, in ecdsa_signverify_init() 500 int operation, const char *desc) in ecdsa_digest_signverify_init() argument 511 operation, desc)) in ecdsa_digest_signverify_init() 517 && !ecdsa_setup_md(ctx, mdname, NULL, desc)) in ecdsa_digest_signverify_init() 912 int operation, const char *desc) in ecdsa_sigalg_signverify_init() argument 920 desc)) in ecdsa_sigalg_signverify_init() 923 if (!ecdsa_setup_md(ctx, mdname, NULL, desc)) in ecdsa_sigalg_signverify_init() [all …]
|
/openssl/apps/lib/ |
H A D | apps.c | 215 if (desc == NULL) in get_passwd() 489 if (desc == NULL) in load_cert_pass() 511 if (desc == NULL) in load_crl() 512 desc = "CRL"; in load_crl() 611 if (desc == NULL) in load_key() 630 if (desc == NULL) in load_pubkey() 650 if (desc == NULL) in load_keyparams_suppress() 747 if (desc == NULL) in load_cert_certs() 861 if (desc == NULL) in load_certs() 882 if (desc == NULL) in load_crls() [all …]
|
H A D | engine.c | 105 char *make_engine_uri(ENGINE *e, const char *key_id, const char *desc) in make_engine_uri() argument 111 BIO_printf(bio_err, "No engine specified for loading %s\n", desc); in make_engine_uri() 113 BIO_printf(bio_err, "No engine key id specified for loading %s\n", desc); in make_engine_uri() 133 BIO_printf(bio_err, "Engines not supported for loading %s\n", desc); in make_engine_uri()
|
/openssl/apps/ |
H A D | list.c | 145 if (desc != NULL) in list_ciphers() 229 if (desc != NULL) in list_digests() 290 if (desc != NULL) in list_macs() 354 if (desc != NULL) in list_kdfs() 419 if (desc != NULL) in list_random_generators() 554 if (desc != NULL) in list_encoders() 619 if (desc != NULL) in list_decoders() 668 if (desc != NULL) in list_keymanagers() 738 if (desc != NULL) in list_signatures() 844 if (desc != NULL) in list_kems() [all …]
|
H A D | cmp.c | 757 char *pass_string = get_passwd(pass, desc); in load_key_pwd() 820 if (filenames == NULL || desc == NULL) { in read_PKIMESSAGE() 836 CMP_info2("%s %s", desc, file); in read_PKIMESSAGE() 1825 desc = opt_csr == NULL in setup_request_ctx() 2348 n, desc, file); in save_free_certs() 2388 file, desc); in save_crl() 2410 file, desc); in delete_file() 2440 return (crl == NULL) ? delete_file(file, desc) : save_crl(crl, file, desc); in save_crl_or_delete() 3243 CMP_info1("No %s", desc); in print_keyspec() 3252 BIO_printf(mem, "Key %s:\n", desc); in print_keyspec() [all …]
|
H A D | engine.c | 156 char *desc = NULL; in util_verbose() local 190 desc = app_malloc(len + 1, "description buffer"); in util_verbose() 191 if (ENGINE_ctrl(e, ENGINE_CTRL_GET_DESC_FROM_CMD, num, desc, in util_verbose() 215 (desc == NULL) ? "<no description>" : desc); in util_verbose() 224 OPENSSL_free(desc); in util_verbose() 225 desc = NULL; in util_verbose() 235 OPENSSL_free(desc); in util_verbose()
|
/openssl/providers/fips/include/fips/ |
H A D | fipsindicator.h | 63 const char *desc); 126 const RSA *rsa, const char *desc, int protect); 129 const EC_GROUP *group, const char *desc, 133 const EVP_MD *md, const char *desc); 137 const char *desc,
|
/openssl/providers/implementations/kdfs/ |
H A D | pbkdf2.c | 183 const char **desc) in pbkdf2_lower_bound_check_passed() argument 187 if (desc != NULL) in pbkdf2_lower_bound_check_passed() 188 *desc = "Key size"; in pbkdf2_lower_bound_check_passed() 193 if (desc != NULL) in pbkdf2_lower_bound_check_passed() 194 *desc = "Salt size"; in pbkdf2_lower_bound_check_passed() 199 if (desc != NULL) in pbkdf2_lower_bound_check_passed() 200 *desc = "Iteration count"; in pbkdf2_lower_bound_check_passed() 212 const char *desc = NULL; in fips_lower_bound_check_passed() local 214 keylen, &error, &desc); in fips_lower_bound_check_passed() 218 "PBKDF2", desc, in fips_lower_bound_check_passed()
|
/openssl/doc/man3/ |
H A D | OSSL_INDICATOR_set_callback.pod | 12 typedef int (OSSL_INDICATOR_CALLBACK)(const char *type, const char *desc, 32 The user's callback B<OSSL_INDICATOR_CALLBACK> I<type> and I<desc> 49 static int indicator_cb(const char *type, const char *desc, 52 if (type != NULL && desc != NULL) 53 fprintf(stdout, "%s %s is not approved\n", type, desc);
|
/openssl/crypto/cmp/ |
H A D | cmp_genm.c | 77 int expected, const char *desc) in get_genm_itav() argument 99 "with infoType %s", desc); in get_genm_itav() 105 … "response on genm requesting infoType %s does not include suitable value", desc); in get_genm_itav() 113 n, desc); in get_genm_itav() 129 ossl_cmp_log2(WARN, ctx, "%s' while expecting 'id-it-%s'", name, desc); in get_genm_itav() 133 "could not find any ITAV for %s", desc); in get_genm_itav() 251 X509 *target, const char *desc) in verify_ss_cert_trans() argument 277 desc, trusted == NULL ? "using trust store" in verify_ss_cert_trans()
|
/openssl/demos/guide/ |
H A D | quic-hq-interop.c | 541 SSL_free(poll_list[poll_idx].desc.value.ssl); in build_request_set() 630 poll_list[poll_idx].desc = SSL_as_poll_descriptor(new_stream); in build_request_set() 635 while (!SSL_write_ex2(poll_list[poll_idx].desc.value.ssl, in build_request_set() 638 if (handle_io_failure(poll_list[poll_idx].desc.value.ssl, 0) == 1) in build_request_set() 651 SSL_free(poll_list[poll_idx].desc.value.ssl); in build_request_set() 959 if (!SSL_read_ex(poll_list[poll_idx].desc.value.ssl, buf, in main() 961 switch (handle_io_failure(poll_list[poll_idx].desc.value.ssl, in main() 1032 SSL_free(poll_list[poll_idx].desc.value.ssl); in main()
|
/openssl/ssl/rio/ |
H A D | poll_immediate.c | 75 switch (item->desc.type) { in SSL_poll() 77 ssl = item->desc.value.ssl; in SSL_poll() 111 "type %d", item->desc.type); in SSL_poll()
|