/openssl/crypto/hpke/ |
H A D | hpke.c | 52 OSSL_HPKE_SUITE suite; /* suite */ member 359 suite->kem_id = kem_info->kem_id; in hpke_random_suite() 363 suite->kdf_id = kdf_info->kdf_id; in hpke_random_suite() 367 suite->aead_id = aead_info->aead_id; in hpke_random_suite() 707 suitebuf[0] = ctx->suite.kem_id / 256; in hpke_do_middle() 708 suitebuf[1] = ctx->suite.kem_id % 256; in hpke_do_middle() 709 suitebuf[2] = ctx->suite.kdf_id / 256; in hpke_do_middle() 710 suitebuf[3] = ctx->suite.kdf_id % 256; in hpke_do_middle() 836 ctx->suite = suite; in OSSL_HPKE_CTX_new() 1273 suitebuf[0] = ctx->suite.kem_id / 256; in OSSL_HPKE_export() [all …]
|
H A D | hpke_util.c | 451 int ossl_hpke_str2suite(const char *suitestr, OSSL_HPKE_SUITE *suite) in ossl_hpke_str2suite() argument 459 if (suitestr == NULL || suitestr[0] == 0x00 || suite == NULL) { in ossl_hpke_str2suite() 520 suite->kem_id = kem; in ossl_hpke_str2suite() 521 suite->kdf_id = kdf; in ossl_hpke_str2suite() 522 suite->aead_id = aead; in ossl_hpke_str2suite()
|
/openssl/include/openssl/ |
H A D | hpke.h | 108 OSSL_HPKE_CTX *OSSL_HPKE_CTX_new(int mode, OSSL_HPKE_SUITE suite, int role, 121 int OSSL_HPKE_keygen(OSSL_HPKE_SUITE suite, 154 int OSSL_HPKE_suite_check(OSSL_HPKE_SUITE suite); 156 OSSL_HPKE_SUITE *suite, 160 int OSSL_HPKE_str2suite(const char *str, OSSL_HPKE_SUITE *suite); 161 size_t OSSL_HPKE_get_ciphertext_size(OSSL_HPKE_SUITE suite, size_t clearlen); 162 size_t OSSL_HPKE_get_public_encap_size(OSSL_HPKE_SUITE suite); 163 size_t OSSL_HPKE_get_recommended_ikmelen(OSSL_HPKE_SUITE suite);
|
/openssl/test/ |
H A D | README-external.md | 8 Python PYCA/Cryptography test suite 11 This python test suite runs cryptographic tests with a local OpenSSL build as 34 krb5 test suite 37 Much like the PYCA/Cryptography test suite, this builds and runs the krb5 56 krb5's tests will then be run as part of the rest of the suite, or can be 64 krb5 will automatically adapt its test suite to account for the configuration 68 GOST engine test suite 90 OQSprovider test suite 93 Much like the PYCA/Cryptography test suite, this builds and runs the OQS 121 pkcs11-provider test suite [all …]
|
H A D | hpke_test.c | 27 OSSL_HPKE_SUITE suite; member 133 if (!TEST_true(OSSL_HPKE_keygen(base->suite, in do_testhpke() 1648 OSSL_HPKE_SUITE suite = OSSL_HPKE_SUITE_DEFAULT; in test_hpke_random_suites() local 1681 suite.kem_id = OSSL_HPKE_KEM_ID_P521; in test_hpke_random_suites() 1682 if (!TEST_true(OSSL_HPKE_get_grease_value(&suite, &suite2, in test_hpke_random_suites() 1697 suite.aead_id = 0x1234; /* bad aead */ in test_hpke_random_suites() 1698 if (!TEST_false(OSSL_HPKE_get_grease_value(&suite, &suite2, in test_hpke_random_suites() 1703 suite.aead_id = def_suite.aead_id; /* good aead */ in test_hpke_random_suites() 1704 suite.kdf_id = 0x3451; /* bad kdf */ in test_hpke_random_suites() 1710 suite.kdf_id = def_suite.kdf_id; /* good kdf */ in test_hpke_random_suites() [all …]
|
H A D | quic_record_test.c | 61 #define RX_OP_PROVIDE_SECRET(el, suite, key) \ argument 64 NULL, (el), (suite), 0, NULL, NULL \ 3019 #define TX_OP_PROVIDE_SECRET(el, suite, key) \ argument 3022 NULL, (el), (suite), NULL \
|
H A D | README.ssltest.md | 245 the test suite has any skip conditions, update those too (see 257 or follow the instructions above to run the SSL test suite.
|
/openssl/doc/man3/ |
H A D | OSSL_HPKE_CTX_new.pod | 27 OSSL_HPKE_CTX *OSSL_HPKE_CTX_new(int mode, OSSL_HPKE_SUITE suite, int role, 40 int OSSL_HPKE_keygen(OSSL_HPKE_SUITE suite, 70 int OSSL_HPKE_suite_check(OSSL_HPKE_SUITE suite); 72 OSSL_HPKE_SUITE *suite, 77 int OSSL_HPKE_str2suite(const char *str, OSSL_HPKE_SUITE *suite); 79 size_t OSSL_HPKE_get_public_encap_size(OSSL_HPKE_SUITE suite); 80 size_t OSSL_HPKE_get_recommended_ikmelen(OSSL_HPKE_SUITE suite); 298 on the HPKE I<suite> to be used. It returns a L<EVP_PKEY(3)> pointer 308 then a randomly generated key for the relevant I<suite> will be produced. 427 OSSL_HPKE_suite_check() checks if a specific B<OSSL_HPKE_SUITE> I<suite> [all …]
|
H A D | SSL_CTX_set_security_level.pod | 78 are prohibited. Any cipher suite using MD5 for the MAC is also prohibited. Any 88 In addition to the level 1 exclusions any cipher suite using RC4 is also 130 cipher suite encryption algorithms, supported ECC curves, supported 133 settings an application has set: so if the cipher suite is set to B<ALL>
|
H A D | SSL_get_peer_signature_nid.pod | 36 possible reasons for failure: the cipher suite has no signature (e.g. it
|
H A D | SSL_get_current_cipher.pod | 51 of cipher suite, or NULL if no such cipher is known.
|
H A D | SSL_CTX_set_tlsext_ticket_key_cb.pod | 137 using that session: even if the cipher suite supports forward secrecy. As 142 For example if a cipher suite uses 256 bit ciphers but only a 128 bit ticket key
|
H A D | SSL_get_ciphers.pod | 54 as a wire-protocol cipher suite specification (in the three-octet-per-cipher
|
H A D | SSL_CTX_set_ct_validation_callback.pod | 81 employing an anonymous (aNULL) cipher suite.
|
/openssl/include/internal/ |
H A D | hpke_util.h | 99 int ossl_hpke_str2suite(const char *suitestr, OSSL_HPKE_SUITE *suite);
|
/openssl/test/recipes/30-test_evp_data/ |
H A D | evpmd_sm3.txt | 31 # From GmSSL test suite
|
/openssl/doc/man7/ |
H A D | EVP_CIPHER-NULL.pod | 10 This is used when the TLS cipher suite is TLS_NULL_WITH_NULL_NULL.
|
/openssl/external/perl/Text-Template-1.56/ |
H A D | Changes | 66 - Test suite cleanups: 97 there is a test in the test suite for it. 98 - Minor changes to the test suite to prevent spurious errors. 283 change, it passes the test suite that the previous versions passed. If you
|
H A D | README | 61 the test suite that the old beta versions passed.
|
/openssl/doc/man1/ |
H A D | openssl-ciphers.pod.in | 73 Verbose output: For each cipher suite, list details as provided by 78 Like B<-v>, but include the official cipher suite values in hex. 89 Precede each cipher suite by its standard name. 124 It can consist of a single cipher suite such as B<RC4-SHA>. 396 Enables suite B mode of operation using 128 (permitting 192 bit mode by peer) 405 used and only the two suite B compliant cipher suites 424 It should be noted, that several cipher suite names do not include the
|
H A D | openssl-s_time.pod.in | 101 configured. Although the server determines which cipher suite is used it should 109 configured. Although the server determines which cipher suite is used it should
|
H A D | openssl-s_server.pod.in | 212 If the cipher suite cannot request a client certificate (for example an 213 anonymous cipher suite or PSK) this option has no effect. 589 a suitable cipher suite has been negotiated, an engine that supports pipelining 597 engine) and a suitable cipher suite has been negotiated. The default value is 1. 722 cipher suite, and warn if they do not. By default, the expected PSK 727 Use the PSK identity hint I<val> when using a PSK cipher suite. 731 Use the PSK key I<val> when using a PSK cipher suite. The key is
|
/openssl/ |
H A D | NOTES-NONSTOP.md | 141 The OpenSSL test suite will not run on your workstation. In order to verify the 143 server. You can also build under gcc and run the test suite for Windows but that
|
H A D | NOTES-ANDROID.md | 80 test suite on Linux system by employing qemu-user. The trick is static
|
H A D | NOTES-VMS.md | 71 as running the test suite.
|