Home
last modified time | relevance | path

Searched refs:origin (Results 1 – 17 of 17) sorted by relevance

/openssl/doc/internal/man7/
H A DEVP_PKEY.pod23 as its "internal key" or "origin" (the reason for "origin" is
29 =item legacy origin
43 =item provider-native origin
60 confusing which one of the two is the origin.
99 For legacy origin keys, this requires the associated
123 "provider native origin".>
126 what form the origin has.
127 For a legacy origin, this requires that the associated
138 (ENGINE for legacy origin keys, provider for provider side origin
172 For legacy origin keys, that's done with the help of the
[all …]
/openssl/crypto/evp/
H A Dcmeth_lib.c31 cipher->origin = EVP_ORIG_METH; in EVP_CIPHER_meth_new()
53 to->origin = EVP_ORIG_METH; in EVP_CIPHER_meth_dup()
60 if (cipher == NULL || cipher->origin != EVP_ORIG_METH) in EVP_CIPHER_meth_free()
H A Ddigest.c233 || (type != NULL && type->origin == EVP_ORIG_METH) in evp_md_init_internal()
235 && ctx->digest->origin == EVP_ORIG_METH)) { in evp_md_init_internal()
1174 if (md->origin == EVP_ORIG_DYNAMIC) in EVP_MD_up_ref()
1183 if (md == NULL || md->origin != EVP_ORIG_DYNAMIC) in EVP_MD_free()
H A Devp_enc.c148 || (cipher != NULL && cipher->origin == EVP_ORIG_METH) in evp_cipher_init_internal()
150 && ctx->cipher->origin == EVP_ORIG_METH)) { in evp_cipher_init_internal()
1727 if (cipher->origin == EVP_ORIG_DYNAMIC) in EVP_CIPHER_up_ref()
1744 if (cipher == NULL || cipher->origin != EVP_ORIG_DYNAMIC) in EVP_CIPHER_free()
H A Devp_lib.c834 md->origin = EVP_ORIG_METH; in EVP_MD_meth_new()
855 to->origin = EVP_ORIG_METH; in EVP_MD_meth_dup()
870 if (md == NULL || md->origin != EVP_ORIG_METH) in EVP_MD_meth_free()
/openssl/doc/internal/man3/
H A Devp_pkey_export_to_provider.pod21 This manual uses the term "origin", which is explained in internal
24 evp_pkey_export_to_provider() exports the "origin" key contained in I<pk>
30 If I<keymgmt> isn't NULL but I<*keymgmt> is, and the "origin" was successfully
H A Devp_keymgmt_util_export_to_provider.pod62 information from the provvider "origin" and save it in I<pk>'s
/openssl/providers/common/
H A Dprovider_util.c119 if (cipher != NULL && cipher->origin != EVP_ORIG_GLOBAL) in ossl_prov_cipher_load_from_params()
203 if (md != NULL && md->origin != EVP_ORIG_GLOBAL) in ossl_prov_digest_load_from_params()
/openssl/.github/workflows/
H A Dstyle-checks.yml32 git fetch origin $GITHUB_BASE_REF:$GITHUB_BASE_REF
/openssl/doc/designs/quic-design/
H A Ddgram-api.md356 For send/receive addresses, we import the `BIO_(set|get)_dgram_(origin|dest)`
357 APIs proposed in the sendmsg/recvmsg PR (#5257). `BIO_get_dgram_(origin|dest)`
359 `BIO_set_dgram_(origin|dest)` should be called immediately before
368 Note that since `BIO_set_dgram_(origin|dest)` sets data on outgoing packets and
369 `BIO_get_dgram_(origin|dest)` gets data on incoming packets, it doesn't follow
371 variables called "dgram origin" and "dgram destination", even though they look
377 `BIO_set_outgoing_dgram_(origin|dest)` and
378 `BIO_get_incoming_dgram_(origin|dest)`.
474 (`BIO_(set|get)_dgram_(origin|dest)`) as this would pose a problem. But I mainly
/openssl/test/
H A DREADME-external.md162 $ git pull origin master
/openssl/include/crypto/
H A Devp.h263 int origin; member
311 int origin; member
/openssl/include/openssl/
H A Dct.h.in283 * The origin of this SCT, e.g. TLS extension, OCSP response, etc.
288 * Set the origin of this SCT, e.g. TLS extension, OCSP response, etc.
/openssl/
H A DLICENSE.txt142 origin of the Work and reproducing the content of the NOTICE file.
/openssl/doc/man3/
H A DSSL_CTX_dane_enable.pod152 The malicious server may then be able to violate cross-origin scripting
/openssl/ssl/
H A Dssl_lib.c6248 sct_source_t origin) in ct_move_scts() argument
6262 if (SCT_set_source(sct, origin) != 1) in ct_move_scts()
/openssl/doc/man1/
H A Dopenssl-s_client.pod.in410 The malicious server may then be able to violate cross-origin scripting

Completed in 76 milliseconds