/openssl-master/crypto/objects/ |
A D | objects.txt | 464 id-pkix 1 : id-pe 465 id-pkix 2 : id-qt 466 id-pkix 3 : id-kp 467 id-pkix 4 : id-it 468 id-pkix 5 : id-pkip 469 id-pkix 6 : id-alg 470 id-pkix 7 : id-cmc 471 id-pkix 8 : id-on 472 id-pkix 9 : id-pda 475 id-pkix 14 : id-cp [all …]
|
/openssl-master/util/ |
A D | find-doc-nits | 281 my $id = shift; 425 my $id = shift; 441 my $id = shift; 505 my $id = shift; 533 my $id = shift; 601 my $id = shift; 676 my $id = shift; 688 if ( $id =~ m@man1/@ ) { 752 wording($id, $contents); 776 err($id, "Bad =over $1") [all …]
|
/openssl-master/providers/common/der/ |
A D | DIGESTS.asn1 | 4 id-sha1 OBJECT IDENTIFIER ::= { iso(1) 12 id-md2 OBJECT IDENTIFIER ::= { 15 id-md5 OBJECT IDENTIFIER ::= { 21 id-sha256 OBJECT IDENTIFIER ::= { hashAlgs 1 } 22 id-sha384 OBJECT IDENTIFIER ::= { hashAlgs 2 } 23 id-sha512 OBJECT IDENTIFIER ::= { hashAlgs 3 } 24 id-sha224 OBJECT IDENTIFIER ::= { hashAlgs 4 } 27 id-sha3-224 OBJECT IDENTIFIER ::= { hashAlgs 7 } 28 id-sha3-256 OBJECT IDENTIFIER ::= { hashAlgs 8 } 29 id-sha3-384 OBJECT IDENTIFIER ::= { hashAlgs 9 } [all …]
|
A D | ECX.asn1 | 6 id-edwards-curve-algs OBJECT IDENTIFIER ::= { 1 3 101 } 8 id-X25519 OBJECT IDENTIFIER ::= { id-edwards-curve-algs 110 } 9 id-X448 OBJECT IDENTIFIER ::= { id-edwards-curve-algs 111 } 10 id-Ed25519 OBJECT IDENTIFIER ::= { id-edwards-curve-algs 112 } 11 id-Ed448 OBJECT IDENTIFIER ::= { id-edwards-curve-algs 113 }
|
A D | DSA.asn1 | 7 id-dsa OBJECT IDENTIFIER ::= { 12 id-dsa-with-sha1 OBJECT IDENTIFIER ::= { 21 id-dsa-with-sha224 OBJECT IDENTIFIER ::= { sigAlgs 1 } 22 id-dsa-with-sha256 OBJECT IDENTIFIER ::= { sigAlgs 2 } 23 id-dsa-with-sha384 OBJECT IDENTIFIER ::= { sigAlgs 3 } 24 id-dsa-with-sha512 OBJECT IDENTIFIER ::= { sigAlgs 4 } 26 id-dsa-with-sha3-224 OBJECT IDENTIFIER ::= { sigAlgs 5 } 27 id-dsa-with-sha3-256 OBJECT IDENTIFIER ::= { sigAlgs 6 } 28 id-dsa-with-sha3-384 OBJECT IDENTIFIER ::= { sigAlgs 7 } 29 id-dsa-with-sha3-512 OBJECT IDENTIFIER ::= { sigAlgs 8 }
|
A D | RSA.asn1 | 24 -- When id-RSAES-OAEP is used in an AlgorithmIdentifier, the 27 id-RSAES-OAEP OBJECT IDENTIFIER ::= { pkcs-1 7 } 30 -- When id-pSpecified is used in an AlgorithmIdentifier, the 33 id-pSpecified OBJECT IDENTIFIER ::= { pkcs-1 9 } 36 -- When id-RSASSA-PSS is used in an AlgorithmIdentifier, the 39 id-RSASSA-PSS OBJECT IDENTIFIER ::= { pkcs-1 10 } 56 -- When id-mgf1 is used in an AlgorithmIdentifier, the parameters 59 id-mgf1 OBJECT IDENTIFIER ::= { pkcs-1 8 } 64 id-rsassa-pkcs1-v1_5-with-sha3-224 OBJECT IDENTIFIER ::= { sigAlgs 13 } 65 id-rsassa-pkcs1-v1_5-with-sha3-256 OBJECT IDENTIFIER ::= { sigAlgs 14 } [all …]
|
A D | EC.asn1 | 10 id-ecSigType OBJECT IDENTIFIER ::= { ansi-X9-62 signatures(4) } 14 ecdsa-with-SHA1 OBJECT IDENTIFIER ::= { id-ecSigType 1 } 16 id-publicKeyType OBJECT IDENTIFIER ::= { ansi-X9-62 keyType(2) } 18 id-ecPublicKey OBJECT IDENTIFIER ::= { id-publicKeyType 1 } 79 id-ecdsa-with-sha3-224 OBJECT IDENTIFIER ::= { sigAlgs 9 } 80 id-ecdsa-with-sha3-256 OBJECT IDENTIFIER ::= { sigAlgs 10 } 81 id-ecdsa-with-sha3-384 OBJECT IDENTIFIER ::= { sigAlgs 11 } 82 id-ecdsa-with-sha3-512 OBJECT IDENTIFIER ::= { sigAlgs 12 }
|
/openssl-master/crypto/ec/ |
A D | ecx_backend.h | 10 #define ISX448(id) ((id) == EVP_PKEY_X448) argument 11 #define IS25519(id) ((id) == EVP_PKEY_X25519 || (id) == EVP_PKEY_ED25519) argument 12 #define KEYLENID(id) (IS25519(id) ? X25519_KEYLEN \ argument 13 : ((id) == EVP_PKEY_X448 ? X448_KEYLEN \ 15 #define KEYNID2TYPE(id) \ argument 16 (IS25519(id) ? ((id) == EVP_PKEY_X25519 ? ECX_KEY_TYPE_X25519 \ 18 : ((id) == EVP_PKEY_X448 ? ECX_KEY_TYPE_X448 \
|
A D | ecx_backend.c | 146 int id, ecx_key_op_t op, in ossl_ecx_key_op() argument 162 if (id == EVP_PKEY_NONE) in ossl_ecx_key_op() 163 id = OBJ_obj2nid(palg->algorithm); in ossl_ecx_key_op() 164 else if (id != OBJ_obj2nid(palg->algorithm)) { in ossl_ecx_key_op() 170 if (p == NULL || id == EVP_PKEY_NONE || plen != KEYLENID(id)) { in ossl_ecx_key_op() 176 key = ossl_ecx_key_new(libctx, KEYNID2TYPE(id), 1, propq); in ossl_ecx_key_op() 192 if (id != EVP_PKEY_NONE) { in ossl_ecx_key_op() 193 if (RAND_priv_bytes_ex(libctx, privkey, KEYLENID(id), 0) <= 0) in ossl_ecx_key_op() 195 if (id == EVP_PKEY_X25519) { in ossl_ecx_key_op() 199 } else if (id == EVP_PKEY_X448) { in ossl_ecx_key_op() [all …]
|
/openssl-master/test/ |
A D | ciphername_test.c | 26 int id; member 368 static const char *get_std_name_by_id(int id) in get_std_name_by_id() argument 373 if (cipher_names[i].id == id) in get_std_name_by_id() 386 int i, id = 0, ret = 0; in test_cipher_name() local 433 id = SSL_CIPHER_get_id(c) & 0xFFFF; in test_cipher_name() 434 if ((id == 0xC102) || (id == 0xFF85) ||(id == 0xFF87)) in test_cipher_name() 438 q = get_std_name_by_id(id); in test_cipher_name() 441 q, id); in test_cipher_name() 447 q, p, id); in test_cipher_name() 455 q, r, id); in test_cipher_name()
|
A D | namemap_internal_test.c | 79 int id; in test_digestbyname() local 85 id = ossl_namemap_add_name(nm, 0, "SHA256"); in test_digestbyname() 86 if (!TEST_int_ne(id, 0)) in test_digestbyname() 88 if (!TEST_int_eq(ossl_namemap_add_name(nm, id, "foo"), id)) in test_digestbyname() 107 int id; in test_cipherbyname() local 113 id = ossl_namemap_add_name(nm, 0, "AES-128-CBC"); in test_cipherbyname() 114 if (!TEST_int_ne(id, 0)) in test_cipherbyname() 116 if (!TEST_int_eq(ossl_namemap_add_name(nm, id, "bar"), id)) in test_cipherbyname()
|
A D | evp_fetch_prov_test.c | 169 static int test_explicit_EVP_MD_fetch(const char *id) in test_explicit_EVP_MD_fetch() argument 179 md = EVP_MD_fetch(ctx, id, fetch_property); in test_explicit_EVP_MD_fetch() 215 char id[OSSL_MAX_NAME_SIZE]; in test_explicit_EVP_MD_fetch_by_X509_ALGOR() local 223 if (!TEST_true(OBJ_obj2txt(id, sizeof(id), obj, 0))) in test_explicit_EVP_MD_fetch_by_X509_ALGOR() 227 if (!TEST_true(OBJ_obj2txt(id, sizeof(id), obj, 1))) in test_explicit_EVP_MD_fetch_by_X509_ALGOR() 232 ret = test_explicit_EVP_MD_fetch(id); in test_explicit_EVP_MD_fetch_by_X509_ALGOR() 297 cipher = EVP_CIPHER_fetch(ctx, id, fetch_property); in test_explicit_EVP_CIPHER_fetch() 331 char id[OSSL_MAX_NAME_SIZE]; in test_explicit_EVP_CIPHER_fetch_by_X509_ALGOR() local 339 if (!TEST_true(OBJ_obj2txt(id, sizeof(id), obj, 0))) in test_explicit_EVP_CIPHER_fetch_by_X509_ALGOR() 343 if (!TEST_true(OBJ_obj2txt(id, sizeof(id), obj, 1))) in test_explicit_EVP_CIPHER_fetch_by_X509_ALGOR() [all …]
|
A D | evp_pkey_dparams_test.c | 113 static int params_bio_test(int id) in params_bio_test() argument 120 int type = pkey_params[id].type; in params_bio_test() 123 && TEST_ptr(in = BIO_new_mem_buf(pkey_params[id].param_bin, in params_bio_test() 124 (int)pkey_params[id].param_bin_len)) in params_bio_test() 132 && TEST_mem_eq(pkey_params[id].param_bin, in params_bio_test() 133 (int)pkey_params[id].param_bin_len, in params_bio_test()
|
/openssl-master/crypto/encode_decode/ |
A D | decoder_meth.c | 133 int id; in get_decoder_from_store() local 140 if ((id = methdata->id) == 0 && methdata->names != NULL) { in get_decoder_from_store() 151 if (id == 0) in get_decoder_from_store() 170 int id; in put_decoder_in_store() local 207 decoder->base.id = id; in ossl_decoder_from_algorithm() 305 if (id != 0) in construct_decoder() 366 if (id == 0) in inner_ossl_decoder_fetch() 369 if (id == 0 in inner_ossl_decoder_fetch() 379 methdata->id = id; in inner_ossl_decoder_fetch() 394 if (id != 0) in inner_ossl_decoder_fetch() [all …]
|
A D | encoder_meth.c | 133 int id; in get_encoder_from_store() local 140 if ((id = methdata->id) == 0 && methdata->names != NULL) { in get_encoder_from_store() 151 if (id == 0) in get_encoder_from_store() 170 int id; in put_encoder_in_store() local 207 encoder->base.id = id; in encoder_from_algorithm() 315 if (id != 0) in construct_encoder() 369 if (id == 0) in inner_ossl_encoder_fetch() 376 if (id == 0) in inner_ossl_encoder_fetch() 379 if (id == 0 in inner_ossl_encoder_fetch() 389 methdata->id = id; in inner_ossl_encoder_fetch() [all …]
|
/openssl-master/doc/man3/ |
A D | SSL_CTX_set_generate_session_id.pod | 13 typedef int (*GEN_SESSION_CB)(SSL *ssl, unsigned char *id, 29 SSL_has_matching_session_id() checks, whether a session with id B<id> 36 generates a session id. The session id is an arbitrary sequence of bytes. 37 The length of the session id is between 1 and 32 bytes. The session id is not 53 B<id> exceeding the given limit. 64 If an id conflict is not resolved, the handshake will fail. 77 can occur in that another thread generates the same session id. 91 same id is already in the cache. 101 static int generate_session_id(SSL *ssl, unsigned char *id, 107 RAND_pseudo_bytes(id, *id_len); [all …]
|
/openssl-master/crypto/store/ |
A D | store_meth.c | 136 int id; in get_loader_from_store() local 138 if ((id = methdata->scheme_id) == 0) { in get_loader_from_store() 160 int id; in put_loader_in_store() local 256 if (id != 0) in construct_loader() 295 if (!ossl_assert(id == 0 || scheme == NULL)) { in inner_loader_fetch() 301 if (id == 0 && scheme != NULL) in inner_loader_fetch() 302 id = ossl_namemap_name2num(namemap, scheme); in inner_loader_fetch() 308 if (id == 0) in inner_loader_fetch() 311 if (id == 0 in inner_loader_fetch() 321 methdata->scheme_id = id; in inner_loader_fetch() [all …]
|
/openssl-master/crypto/pkcs12/ |
A D | p12_key.c | 20 int saltlen, int id, int iter, int n, in PKCS12_key_gen_asc_ex() argument 35 ret = PKCS12_key_gen_uni_ex(unipass, uniplen, salt, saltlen, id, iter, in PKCS12_key_gen_asc_ex() 42 int saltlen, int id, int iter, int n, in PKCS12_key_gen_asc() argument 45 return PKCS12_key_gen_asc_ex(pass, passlen, salt, saltlen, id, iter, n, in PKCS12_key_gen_asc() 50 int saltlen, int id, int iter, int n, in PKCS12_key_gen_utf8_ex() argument 65 ret = PKCS12_key_gen_uni_ex(unipass, uniplen, salt, saltlen, id, iter, in PKCS12_key_gen_utf8_ex() 72 int saltlen, int id, int iter, int n, in PKCS12_key_gen_utf8() argument 75 return PKCS12_key_gen_utf8_ex(pass, passlen, salt, saltlen, id, iter, n, in PKCS12_key_gen_utf8() 80 int saltlen, int id, int iter, int n, in PKCS12_key_gen_uni_ex() argument 107 *p++ = OSSL_PARAM_construct_int(OSSL_KDF_PARAM_PKCS12_ID, &id); in PKCS12_key_gen_uni_ex() [all …]
|
/openssl-master/crypto/x509/ |
A D | x509_trust.c | 22 static int obj_trust(int id, X509 *x, int flags); 65 int X509_check_trust(X509 *x, int id, int flags) in X509_check_trust() argument 71 if (id == X509_TRUST_DEFAULT) in X509_check_trust() 74 idx = X509_TRUST_get_by_id(id); in X509_check_trust() 76 return default_trust(id, x, flags); in X509_check_trust() 97 int X509_TRUST_get_by_id(int id) in X509_TRUST_get_by_id() argument 102 if ((id >= X509_TRUST_MIN) && (id <= X509_TRUST_MAX)) in X509_TRUST_get_by_id() 103 return id - X509_TRUST_MIN; in X509_TRUST_get_by_id() 106 tmp.trust = id; in X509_TRUST_get_by_id() 135 idx = X509_TRUST_get_by_id(id); in X509_TRUST_add() [all …]
|
A D | pcy_data.c | 42 ASN1_OBJECT *id; in ossl_policy_data_new() local 47 id = OBJ_dup(cid); in ossl_policy_data_new() 48 if (id == NULL) in ossl_policy_data_new() 51 id = NULL; in ossl_policy_data_new() 54 ASN1_OBJECT_free(id); in ossl_policy_data_new() 61 ASN1_OBJECT_free(id); in ossl_policy_data_new() 69 if (id) in ossl_policy_data_new() 70 ret->valid_policy = id; in ossl_policy_data_new()
|
A D | v3_sxnet.c | 62 SXNETID *id; variable 79 id = sk_SXNETID_value(sx->ids, i); 83 ASN1_STRING_print(out, id->user); 153 SXNETID *id = NULL; in SXNET_add_id_INTEGER() local 178 if ((id = SXNETID_new()) == NULL) in SXNET_add_id_INTEGER() 183 if (!sk_SXNETID_push(sx->ids, id)) in SXNET_add_id_INTEGER() 185 id->zone = zone; in SXNET_add_id_INTEGER() 190 SXNETID_free(id); in SXNET_add_id_INTEGER() 228 SXNETID *id; in SXNET_get_id_INTEGER() local 231 id = sk_SXNETID_value(sx->ids, i); in SXNET_get_id_INTEGER() [all …]
|
/openssl-master/crypto/evp/ |
A D | dh_support.c | 17 int id; member 39 const char *ossl_dh_gen_type_id2name(int id) in ossl_dh_gen_type_id2name() argument 44 if (dhtype2id[i].id == id) in ossl_dh_gen_type_id2name() 59 return dhtype2id[i].id; in ossl_dh_gen_type_name2id()
|
/openssl-master/crypto/engine/ |
A D | eng_list.c | 62 conflict = (strcmp(iterator->id, e->id) == 0); in engine_list_add() 223 if ((e->id == NULL) || (e->name == NULL)) { in ENGINE_add() 257 dest->id = src->id; in engine_cpy() 283 ENGINE *ENGINE_by_id(const char *id) in ENGINE_by_id() argument 287 if (id == NULL) { in ENGINE_by_id() 301 while (iterator && (strcmp(id, iterator->id) != 0)) in ENGINE_by_id() 328 if (strcmp(id, "dynamic")) { in ENGINE_by_id() 332 if (!iterator || !ENGINE_ctrl_cmd_string(iterator, "ID", id, 0) || in ENGINE_by_id() 343 ERR_raise_data(ERR_LIB_ENGINE, ENGINE_R_NO_SUCH_ENGINE, "id=%s", id); in ENGINE_by_id()
|
/openssl-master/test/recipes/30-test_evp_data/ |
A D | evpkdf_x942.txt | 19 Ctrl.cekalg = cekalg:id-aes128-wrap 25 Ctrl.cekalg = cekalg:id-aes256-wrap 34 Ctrl.cekalg = cekalg:id-aes256-wrap 41 Ctrl.cekalg = cekalg:id-aes256-wrap 49 Ctrl.cekalg = cekalg:id-aes256-wrap 57 Ctrl.cekalg = cekalg:id-aes256-wrap 64 Ctrl.cekalg = cekalg:id-aes256-wrap 71 Ctrl.cekalg = cekalg:id-aes256-wrap 84 Ctrl.cekalg = cekalg:id-aes128-wrap 95 Ctrl.cekalg = cekalg:id-aes128-wrap
|
A D | evppbe_pkcs12.txt | 17 id = 1 25 id = 2 33 id = 3 41 id = 1 49 id = 2 57 id = 3
|