/openssl/test/ |
H A D | namemap_internal_test.c | 135 EVP_CIPHER *fetched = EVP_CIPHER_fetch(NULL, "AES-256-CCM", NULL); in test_cipher_is_a() local 138 if (!TEST_ptr(fetched)) in test_cipher_is_a() 140 if (!TEST_true(EVP_CIPHER_is_a(fetched, "id-aes256-CCM")) in test_cipher_is_a() 141 || !TEST_false(EVP_CIPHER_is_a(fetched, "AES-128-GCM"))) in test_cipher_is_a() 147 EVP_CIPHER_free(fetched); in test_cipher_is_a() 157 EVP_MD *fetched = EVP_MD_fetch(NULL, "SHA2-512", NULL); in test_digest_is_a() local 160 if (!TEST_ptr(fetched)) in test_digest_is_a() 162 if (!TEST_true(EVP_MD_is_a(fetched, "SHA512")) in test_digest_is_a() 163 || !TEST_false(EVP_MD_is_a(fetched, "SHA1"))) in test_digest_is_a() 169 EVP_MD_free(fetched); in test_digest_is_a()
|
/openssl/doc/designs/ |
H A D | fetching-composite-algorithms.md | 13 explicitly fetched algorithms is lacking: asymmetric algorithms. 57 explicitly fetched implementation of a composite algorithm requires that 89 with the fetched algorithm: 91 - Check if the fetched operation name matches the key type (keymgmt name) 93 is useful when someone fetched the `EVP_SIGNATURE` "RSA". 94 - Check if the fetched algorithm name matches the name returned by the 96 when someone fetched the `EVP_SIGNATURE` "ECDSA", for which the key type 142 fetched result, commonly known as support for explicit fetching.
|
/openssl/doc/man7/ |
H A D | EVP_SIGNATURE-ECDSA.pod | 23 The base signature algorithm, supported explicitly fetched with 24 L<EVP_PKEY_sign_init_ex2(3)>, and implicitly fetched (through 49 supported explicitly fetched with L<EVP_PKEY_sign_init_ex2(3)> and
|
H A D | EVP_SIGNATURE-DSA.pod | 29 The base signature algorithm, supported explicitly fetched with 30 L<EVP_PKEY_sign_init_ex2(3)>, and implicitly fetched (through 55 supported explicitly fetched with L<EVP_PKEY_sign_init_ex2(3)> and
|
H A D | ossl-guide-libcrypto-introduction.pod | 48 In order to use an algorithm an implementation for it must first be "fetched". 59 implementation from a provider. This fetched object can then be passed to other 103 The algorithm implementation that is fetched can then be used with other diverse 118 fetched implicitly using default search criteria (which uses NULL for the 122 is supplied. In this case an algorithm implementation is implicitly fetched 135 explicitly fetched algorithm each subsequent time. This will typically be 146 If an explicitly fetched object is not passed to an operation, then any implicit 148 still be slower than passing the explicitly fetched object directly. 194 that can be fetched.
|
H A D | EVP_SIGNATURE-RSA.pod | 24 The base signature algorithm, supported explicitly fetched with 25 L<EVP_PKEY_sign_init_ex2(3)>, and implicitly fetched (through 56 are all supported explicitly fetched with L<EVP_PKEY_sign_init_ex2(3)> and
|
H A D | EVP_PKEY-HMAC.pod | 34 A property query string to be used when any algorithms are fetched.
|
/openssl/doc/man3/ |
H A D | RAND_set_DRBG_type.pod | 22 with properties I<propq> will be fetched. It will be instantiated with 29 with properties I<propq> will be fetched and used to seed the primary
|
H A D | EVP_PKEY_verify_recover.pod | 35 but works with an explicitly fetched B<EVP_SIGNATURE> I<algo>. 37 Depending on what algorithm was fetched, certain details revolving around the
|
H A D | OCSP_response_status.pod | 56 stored as a SHA1 hash. To calculate the hash the SHA1 algorithm is fetched using 69 the SHA1 algorithm is fetched using the library ctx I<libctx> and the property
|
H A D | TS_RESP_CTX_new.pod | 23 supply the fetched algorithms.
|
H A D | EVP_DigestInit.pod | 173 Decrements the reference count for the fetched B<EVP_MD> structure. 202 If this function happens to be used with a fetched B<EVP_MD>, it will 253 I<name>, which is fetched using the optional I<libctx> and I<propq> parameters. 269 value explicitly fetched with EVP_MD_fetch(). I<ctx> B<MUST NOT> be NULL. 281 value explicitly fetched with EVP_MD_fetch(). 368 Return the name of the given message digest. For fetched message 375 I<data>. This is only useful with fetched B<EVP_MD>s. 472 fetched from the loaded providers. This fetch could fail if no suitable 564 When used with a fetched B<EVP_MD>, EVP_MD_CTX_get_params() gets called with 574 When used with a fetched B<EVP_MD>, EVP_MD_CTX_get_params() gets called with
|
H A D | EVP_EncryptInit.pod | 273 Decrements the reference count for the fetched B<EVP_CIPHER> structure. 309 If this function happens to be used with a fetched B<EVP_CIPHER>, it will 483 fetched from the loaded providers. This fetch could fail if no suitable 505 fetched cipher has been assigned to the I<ctx>. It is recommended to use 571 Return the name of the passed cipher or context. For fetched ciphers with 578 I<data>. This is only useful with fetched B<EVP_CIPHER>s. 1103 When used with a fetched B<EVP_CIPHER>, EVP_CIPHER_CTX_set_params() and 1121 When used with a fetched B<EVP_CIPHER>, EVP_CIPHER_CTX_set_params() and 1154 When used with a fetched B<EVP_CIPHER>, EVP_CIPHER_CTX_set_params() and 1160 When used with a fetched B<EVP_CIPHER>, EVP_CIPHER_CTX_set_params() and [all …]
|
H A D | EVP_KDF.pod | 84 EVP_KDF_up_ref() increments the reference count of an already fetched 87 EVP_KDF_free() frees a fetched algorithm. 170 EVP_KDF_get0_name() return the name of the given KDF. For fetched KDFs 265 EVP_KDF_fetch() returns a pointer to a newly fetched B<EVP_KDF>, or
|
H A D | EVP_MAC.pod | 104 EVP_MAC_up_ref() increments the reference count of an already fetched 107 EVP_MAC_free() frees a fetched algorithm. 131 The MAC algorithm is fetched using any given I<libctx> and property query 229 EVP_MAC_get0_name() return the name of the given MAC. For fetched MACs 359 EVP_MAC_fetch() returns a pointer to a newly fetched B<EVP_MAC>, or
|
H A D | EVP_PKEY_verify.pod | 41 with an explicitly fetched B<EVP_SIGNATURE> I<algo>. 43 Depending on what algorithm was fetched, certain details revolving around the 115 an I<algo> that fetched C<RSA> and try to specify SHA256 separately to get the
|
H A D | X509_new.pod | 31 fetched algorithms (SHA1 is used internally). This created X509 object can then
|
H A D | SRP_Calc_B.pod | 65 are fetched and used during the calculation use the provided I<libctx> and
|
H A D | EVP_ASYM_CIPHER_free.pod | 57 fetched from.
|
H A D | EVP_KEM_free.pod | 51 EVP_KEM_get0_provider() returns the provider that I<kem> was fetched from.
|
H A D | EVP_KEYEXCH_free.pod | 50 fetched from.
|
/openssl/doc/internal/man3/ |
H A D | evp_md_get_number.pod | 45 useful with fetched B<EVP_CIPHER>s. 70 only useful with fetched B<EVP_MD>s.
|
H A D | evp_pkey_export_to_provider.pod | 31 exported, then I<*keymgmt> is assigned the implicitly fetched B<EVP_KEYMGMT>.
|
/openssl/crypto/pkcs12/ |
H A D | p12_mutl.c | 238 int fetched = 0; in pkcs12_gen_mac() local 248 fetched = 1; in pkcs12_gen_mac() 254 if (fetched) in pkcs12_gen_mac() 261 if (fetched) in pkcs12_gen_mac()
|
/openssl/crypto/pkcs7/ |
H A D | pk7_doit.c | 100 EVP_MD *fetched = NULL; in pkcs7_bio_add_digest() local 111 fetched = EVP_MD_fetch(ossl_pkcs7_ctx_get0_libctx(ctx), name, in pkcs7_bio_add_digest() 113 if (fetched != NULL) in pkcs7_bio_add_digest() 114 md = fetched; in pkcs7_bio_add_digest() 127 EVP_MD_free(fetched); in pkcs7_bio_add_digest() 130 EVP_MD_free(fetched); in pkcs7_bio_add_digest()
|