/third_party/openssl/providers/implementations/encode_decode/ |
D | decode_der2key.c | 547 #define DO_type_specific_keypair(keytype) \ argument 548 "type-specific", keytype##_evp_type, \ 550 keytype##_d2i_private_key, \ 551 keytype##_d2i_public_key, \ 555 keytype##_check, \ 556 keytype##_adjust, \ 557 keytype##_free 559 #define DO_type_specific_pub(keytype) \ argument 560 "type-specific", keytype##_evp_type, \ 563 keytype##_d2i_public_key, \ [all …]
|
D | decode_pvk2key.c | 209 #define IMPLEMENT_MS(KEYTYPE, keytype) \ argument 211 pvk2##keytype##_desc = { \ 213 ossl_##keytype##_keymgmt_functions, \ 214 keytype##_private_key_bio, \ 215 keytype##_adjust, \ 216 keytype##_free \ 218 static OSSL_FUNC_decoder_newctx_fn pvk2##keytype##_newctx; \ 219 static void *pvk2##keytype##_newctx(void *provctx) \ 221 return pvk2key_newctx(provctx, &pvk2##keytype##_desc); \ 224 ossl_##pvk_to_##keytype##_decoder_functions[] = { \ [all …]
|
D | decode_msblob2key.c | 243 #define IMPLEMENT_MSBLOB(KEYTYPE, keytype) \ argument 244 static const struct keytype_desc_st mstype##2##keytype##_desc = { \ 246 ossl_##keytype##_keymgmt_functions, \ 247 keytype##_decode_private_key, \ 248 keytype##_decode_public_key, \ 249 keytype##_adjust, \ 250 keytype##_free \ 252 static OSSL_FUNC_decoder_newctx_fn msblob2##keytype##_newctx; \ 253 static void *msblob2##keytype##_newctx(void *provctx) \ 255 return msblob2key_newctx(provctx, &mstype##2##keytype##_desc); \ [all …]
|
D | decode_epki2pki.c | 131 char keytype[OSSL_MAX_NAME_SIZE]; in epki2pki_decode() local 135 OBJ_obj2txt(keytype, sizeof(keytype), alg->algorithm, 0); in epki2pki_decode() 138 keytype, 0); in epki2pki_decode()
|
/third_party/openssl/test/ |
D | endecoder_legacy_test.c | 73 const char *keytype; member 216 const char *keytype; member 280 if (strcmp(keys[i].keytype, type) == 0) in lookup_key() 298 static int test_protected_PEM(const char *keytype, int evp_type, in test_protected_PEM() argument 338 keytype, selection, in test_protected_PEM() 366 static int test_unprotected_PEM(const char *keytype, int evp_type, in test_unprotected_PEM() argument 405 keytype, selection, in test_unprotected_PEM() 433 static int test_DER(const char *keytype, int evp_type, in test_DER() argument 472 keytype, selection, in test_DER() 515 || !TEST_ptr(key = lookup_key(test_stanza->keytype))) in test_key() [all …]
|
D | evp_extra_test2.c | 279 static int do_pkey_tofrom_data_select(EVP_PKEY *key, const char *keytype) in do_pkey_tofrom_data_select() argument 285 const char *privtag = strcmp(keytype, "RSA") == 0 ? "d" : "priv"; in do_pkey_tofrom_data_select() 286 const int use_octstring = strcmp(keytype, "X25519") == 0; in do_pkey_tofrom_data_select() 307 if (!TEST_ptr(fromctx = EVP_PKEY_CTX_new_from_name(mainctx, keytype, NULL)) in do_pkey_tofrom_data_select()
|
D | evp_extra_test.c | 548 const char *keytype; member 585 static EVP_PKEY *load_example_key(const char *keytype, in load_example_key() argument 591 OSSL_DECODER_CTX_new_for_pkey(&pkey, "DER", NULL, keytype, 0, in load_example_key() 693 static EVP_PKEY *make_key_fromdata(char *keytype, OSSL_PARAM *params) in make_key_fromdata() argument 698 if (!TEST_ptr(pctx = EVP_PKEY_CTX_new_from_name(testctx, keytype, testpropq))) in make_key_fromdata() 753 static int test_EVP_PKEY_ffc_priv_pub(char *keytype) in test_EVP_PKEY_ffc_priv_pub() argument 782 || !TEST_ptr(just_params = make_key_fromdata(keytype, params))) in test_EVP_PKEY_ffc_priv_pub() 803 || !TEST_ptr(params_and_priv = make_key_fromdata(keytype, params))) in test_EVP_PKEY_ffc_priv_pub() 824 || !TEST_ptr(params_and_pub = make_key_fromdata(keytype, params))) in test_EVP_PKEY_ffc_priv_pub() 847 || !TEST_ptr(params_and_keypair = make_key_fromdata(keytype, params))) in test_EVP_PKEY_ffc_priv_pub() [all …]
|
/third_party/openssl/crypto/asn1/ |
D | d2i_pr.c | 27 d2i_PrivateKey_decoder(int keytype, EVP_PKEY **a, const unsigned char **pp, in d2i_PrivateKey_decoder() argument 38 if (keytype != EVP_PKEY_NONE) { in d2i_PrivateKey_decoder() 39 key_name = evp_pkey_type2name(keytype); in d2i_PrivateKey_decoder() 78 ossl_d2i_PrivateKey_legacy(int keytype, EVP_PKEY **a, const unsigned char **pp, in ossl_d2i_PrivateKey_legacy() argument 97 if (!EVP_PKEY_set_type(ret, keytype)) { in ossl_d2i_PrivateKey_legacy() 123 if (EVP_PKEY_type(keytype) != EVP_PKEY_get_base_id(ret)) in ossl_d2i_PrivateKey_legacy() 143 EVP_PKEY *d2i_PrivateKey_ex(int keytype, EVP_PKEY **a, const unsigned char **pp, in d2i_PrivateKey_ex() argument 149 ret = d2i_PrivateKey_decoder(keytype, a, pp, length, libctx, propq); in d2i_PrivateKey_ex() 152 ret = ossl_d2i_PrivateKey_legacy(keytype, a, pp, length, libctx, propq); in d2i_PrivateKey_ex() 170 int keytype; in d2i_AutoPrivateKey_legacy() local [all …]
|
/third_party/openssl/crypto/encode_decode/ |
D | decoder_pkey.c | 303 EVP_PKEY **pkey, const char *keytype, in ossl_decoder_ctx_setup_for_pkey() argument 315 if (keytype != NULL in ossl_decoder_ctx_setup_for_pkey() 316 && (strcmp(keytype, "id-ecPublicKey") == 0 in ossl_decoder_ctx_setup_for_pkey() 317 || strcmp(keytype, "1.2.840.10045.2.1") == 0)) in ossl_decoder_ctx_setup_for_pkey() 324 keytype != NULL ? keytype : "", in ossl_decoder_ctx_setup_for_pkey() 325 keytype != NULL ? " keys" : "keys of any type", in ossl_decoder_ctx_setup_for_pkey() 361 if (keytype == NULL in ossl_decoder_ctx_setup_for_pkey() 362 || EVP_KEYMGMT_is_a(keymgmt, keytype) in ossl_decoder_ctx_setup_for_pkey() 429 const char *keytype, int selection, in OSSL_DECODER_CTX_new_for_pkey() argument 442 (void *)ctx, keytype, selection); in OSSL_DECODER_CTX_new_for_pkey() [all …]
|
/third_party/openssl/crypto/evp/ |
D | pmeth_lib.c | 41 int keytype, int optype, 141 static void help_get_legacy_alg_type_from_keymgmt(const char *keytype, in help_get_legacy_alg_type_from_keymgmt() argument 147 *type = evp_pkey_name2type(keytype); in help_get_legacy_alg_type_from_keymgmt() 182 const char *keytype, const char *propquery, in int_ctx_new() argument 198 keytype = EVP_KEYMGMT_get0_name(pkey->keymgmt); in int_ctx_new() 201 if (keytype != NULL) { in int_ctx_new() 202 id = evp_pkey_name2type(keytype); in int_ctx_new() 231 keytype = NULL; in int_ctx_new() 233 keytype = OBJ_nid2sn(id); in int_ctx_new() 267 if (e == NULL && app_pmeth == NULL && keytype != NULL) { in int_ctx_new() [all …]
|
D | p_lib.c | 490 const char *keytype, in EVP_PKEY_new_raw_private_key_ex() argument 494 return new_raw_key_int(libctx, keytype, propq, EVP_PKEY_NONE, NULL, priv, in EVP_PKEY_new_raw_private_key_ex() 506 const char *keytype, const char *propq, in EVP_PKEY_new_raw_public_key_ex() argument 509 return new_raw_key_int(libctx, keytype, propq, EVP_PKEY_NONE, NULL, pub, in EVP_PKEY_new_raw_public_key_ex() 2001 const char *keytype = NULL; in evp_pkey_copy_downgraded() local 2003 keytype = EVP_KEYMGMT_get0_name(keymgmt); in evp_pkey_copy_downgraded() 2014 keytype); in evp_pkey_copy_downgraded() 2020 keytype = OBJ_nid2sn(type); in evp_pkey_copy_downgraded() 2040 "key type = %s", keytype); in evp_pkey_copy_downgraded() 2069 "key type = %s", keytype); in evp_pkey_copy_downgraded()
|
D | ctrl_params_translate.c | 1972 OPENSSL_strcasecmp(ctx->pctx->keytype, value) != 0) { in fix_group_ecx() 2570 int keytype, int optype, in evp_pkey_ctx_ctrl_to_param() argument 2580 if (keytype == -1) in evp_pkey_ctx_ctrl_to_param() 2581 keytype = pctx->legacy_keytype; in evp_pkey_ctx_ctrl_to_param() 2583 tmpl.keytype1 = tmpl.keytype2 = keytype; in evp_pkey_ctx_ctrl_to_param() 2645 int keytype = pctx->legacy_keytype; in evp_pkey_ctx_ctrl_str_to_param() local 2651 tmpl.keytype1 = tmpl.keytype2 = keytype; in evp_pkey_ctx_ctrl_str_to_param() 2704 int keytype = pctx->legacy_keytype; in evp_pkey_ctx_setget_params_to_ctrl() local 2715 tmpl.keytype1 = tmpl.keytype2 = keytype; in evp_pkey_ctx_setget_params_to_ctrl() 2731 ret = EVP_PKEY_CTX_ctrl(pctx, keytype, optype, in evp_pkey_ctx_setget_params_to_ctrl()
|
/third_party/openssl/doc/man3/ |
D | PKCS12_create.pod | 13 int nid_key, int nid_cert, int iter, int mac_iter, int keytype); 16 int iter, int mac_iter, int keytype, 32 I<keytype> is the type of key. 39 The parameters I<nid_key>, I<nid_cert>, I<iter>, I<mac_iter> and I<keytype> 51 I<keytype> adds a flag to the store private key. This is a non standard extension
|
D | OSSL_DECODER_from_bio.pod | 56 const char *keytype = "RSA"; /* NULL for any key */ 60 keytype, 81 const char *keytype = "EC"; /* NULL for any key */ 87 keytype,
|
D | OSSL_DECODER_CTX_new_for_pkey.pod | 20 const char *keytype, int selection, 42 I<input_struct>, I<keytype> and I<selection> to specify what the input is 62 The search of decoder implementations can also be limited with I<keytype> 63 and I<selection>, which specifies the expected resulting keytype and contents. 65 find out the keytype and key contents on their own from the input they get.
|
/third_party/openssl/apps/ |
D | dhparam.c | 238 const char *keytype = "DH"; in dhparam_main() local 262 ? keytype : NULL, in dhparam_main() 269 && strcmp(keytype, "DH") == 0) { in dhparam_main() 278 keytype = "DHX"; in dhparam_main()
|
D | req.c | 1505 const char *keytype = NULL; in set_keygen_ctx() local 1516 keytype = "RSA"; in set_keygen_ctx() 1520 keytype = "RSA"; in set_keygen_ctx() 1540 keytype = gstr; in set_keygen_ctx() 1584 if (keytype == NULL) { in set_keygen_ctx() 1585 keytype = EVP_PKEY_get0_type_name(param); in set_keygen_ctx() 1586 if (keytype == NULL) { in set_keygen_ctx() 1595 *pkeytype = OPENSSL_strndup(keytype, keytypelen); in set_keygen_ctx() 1597 *pkeytype = OPENSSL_strdup(keytype); in set_keygen_ctx()
|
D | pkcs12.c | 162 int export_pkcs12 = 0, options = 0, chain = 0, twopass = 0, keytype = 0; in pkcs12_main() local 201 keytype = KEY_EX; in pkcs12_main() 204 keytype = KEY_SIG; in pkcs12_main() 413 if (keytype == KEY_EX) in pkcs12_main() 415 if (keytype == KEY_SIG) in pkcs12_main() 668 key_pbe, cert_pbe, iter, -1, keytype, in pkcs12_main()
|
/third_party/openssl/crypto/pkcs12/ |
D | p12_crt.c | 33 int iter, int mac_iter, int keytype, in PKCS12_create_ex() argument 88 bag = PKCS12_add_key_ex(&bags, pkey, keytype, iter, nid_key, pass, in PKCS12_create_ex() 136 int mac_iter, int keytype) in PKCS12_create() argument 139 iter, mac_iter, keytype, NULL, NULL); in PKCS12_create()
|
/third_party/openssl/doc/man7/ |
D | EVP_KEM-RSA.pod | 6 - EVP_KEM RSA keytype and algorithm support 10 The B<RSA> keytype and its parameters are described in L<EVP_PKEY-RSA(7)>.
|
/third_party/openssl/crypto/rsa/ |
D | rsa_lib.c | 880 int keytype, int optype, in int_set_rsa_md_name() argument 894 switch (keytype) { in int_set_rsa_md_name() 901 if (!EVP_PKEY_CTX_is_a(ctx, evp_pkey_type2name(keytype))) in int_set_rsa_md_name() 920 int keytype, int optype, in int_get_rsa_md_name() argument 934 switch (keytype) { in int_get_rsa_md_name() 941 if (!EVP_PKEY_CTX_is_a(ctx, evp_pkey_type2name(keytype))) in int_get_rsa_md_name()
|
/third_party/libabigail/tests/data/test-read-ctf/ |
D | test-forward-undefine-type-decl.c | 13 struct key_type *keytype; member
|
/third_party/openssl/include/crypto/ |
D | decoder.h | 36 EVP_PKEY **pkey, const char *keytype,
|
/third_party/openssl/test/recipes/30-test_evp_data/ |
D | evppkey_ecx.txt | 79 Reason = operation not supported for this keytype 83 Reason = operation not supported for this keytype 156 Reason = operation not supported for this keytype 160 Reason = operation not supported for this keytype
|
/third_party/rust/crates/rust-openssl/openssl-sys/src/handwritten/ |
D | pkcs12.rs | 48 keytype: c_int,
|