Home
last modified time | relevance | path

Searched refs:keytype (Results 1 – 25 of 62) sorted by relevance

123

/third_party/openssl/providers/implementations/encode_decode/
Ddecode_der2key.c547 #define DO_type_specific_keypair(keytype) \ argument
548 "type-specific", keytype##_evp_type, \
550 keytype##_d2i_private_key, \
551 keytype##_d2i_public_key, \
555 keytype##_check, \
556 keytype##_adjust, \
557 keytype##_free
559 #define DO_type_specific_pub(keytype) \ argument
560 "type-specific", keytype##_evp_type, \
563 keytype##_d2i_public_key, \
[all …]
Ddecode_pvk2key.c209 #define IMPLEMENT_MS(KEYTYPE, keytype) \ argument
211 pvk2##keytype##_desc = { \
213 ossl_##keytype##_keymgmt_functions, \
214 keytype##_private_key_bio, \
215 keytype##_adjust, \
216 keytype##_free \
218 static OSSL_FUNC_decoder_newctx_fn pvk2##keytype##_newctx; \
219 static void *pvk2##keytype##_newctx(void *provctx) \
221 return pvk2key_newctx(provctx, &pvk2##keytype##_desc); \
224 ossl_##pvk_to_##keytype##_decoder_functions[] = { \
[all …]
Ddecode_msblob2key.c243 #define IMPLEMENT_MSBLOB(KEYTYPE, keytype) \ argument
244 static const struct keytype_desc_st mstype##2##keytype##_desc = { \
246 ossl_##keytype##_keymgmt_functions, \
247 keytype##_decode_private_key, \
248 keytype##_decode_public_key, \
249 keytype##_adjust, \
250 keytype##_free \
252 static OSSL_FUNC_decoder_newctx_fn msblob2##keytype##_newctx; \
253 static void *msblob2##keytype##_newctx(void *provctx) \
255 return msblob2key_newctx(provctx, &mstype##2##keytype##_desc); \
[all …]
Ddecode_epki2pki.c131 char keytype[OSSL_MAX_NAME_SIZE]; in epki2pki_decode() local
135 OBJ_obj2txt(keytype, sizeof(keytype), alg->algorithm, 0); in epki2pki_decode()
138 keytype, 0); in epki2pki_decode()
/third_party/openssl/test/
Dendecoder_legacy_test.c73 const char *keytype; member
216 const char *keytype; member
280 if (strcmp(keys[i].keytype, type) == 0) in lookup_key()
298 static int test_protected_PEM(const char *keytype, int evp_type, in test_protected_PEM() argument
338 keytype, selection, in test_protected_PEM()
366 static int test_unprotected_PEM(const char *keytype, int evp_type, in test_unprotected_PEM() argument
405 keytype, selection, in test_unprotected_PEM()
433 static int test_DER(const char *keytype, int evp_type, in test_DER() argument
472 keytype, selection, in test_DER()
515 || !TEST_ptr(key = lookup_key(test_stanza->keytype))) in test_key()
[all …]
Devp_extra_test2.c279 static int do_pkey_tofrom_data_select(EVP_PKEY *key, const char *keytype) in do_pkey_tofrom_data_select() argument
285 const char *privtag = strcmp(keytype, "RSA") == 0 ? "d" : "priv"; in do_pkey_tofrom_data_select()
286 const int use_octstring = strcmp(keytype, "X25519") == 0; in do_pkey_tofrom_data_select()
307 if (!TEST_ptr(fromctx = EVP_PKEY_CTX_new_from_name(mainctx, keytype, NULL)) in do_pkey_tofrom_data_select()
Devp_extra_test.c548 const char *keytype; member
585 static EVP_PKEY *load_example_key(const char *keytype, in load_example_key() argument
591 OSSL_DECODER_CTX_new_for_pkey(&pkey, "DER", NULL, keytype, 0, in load_example_key()
693 static EVP_PKEY *make_key_fromdata(char *keytype, OSSL_PARAM *params) in make_key_fromdata() argument
698 if (!TEST_ptr(pctx = EVP_PKEY_CTX_new_from_name(testctx, keytype, testpropq))) in make_key_fromdata()
753 static int test_EVP_PKEY_ffc_priv_pub(char *keytype) in test_EVP_PKEY_ffc_priv_pub() argument
782 || !TEST_ptr(just_params = make_key_fromdata(keytype, params))) in test_EVP_PKEY_ffc_priv_pub()
803 || !TEST_ptr(params_and_priv = make_key_fromdata(keytype, params))) in test_EVP_PKEY_ffc_priv_pub()
824 || !TEST_ptr(params_and_pub = make_key_fromdata(keytype, params))) in test_EVP_PKEY_ffc_priv_pub()
847 || !TEST_ptr(params_and_keypair = make_key_fromdata(keytype, params))) in test_EVP_PKEY_ffc_priv_pub()
[all …]
/third_party/openssl/crypto/asn1/
Dd2i_pr.c27 d2i_PrivateKey_decoder(int keytype, EVP_PKEY **a, const unsigned char **pp, in d2i_PrivateKey_decoder() argument
38 if (keytype != EVP_PKEY_NONE) { in d2i_PrivateKey_decoder()
39 key_name = evp_pkey_type2name(keytype); in d2i_PrivateKey_decoder()
78 ossl_d2i_PrivateKey_legacy(int keytype, EVP_PKEY **a, const unsigned char **pp, in ossl_d2i_PrivateKey_legacy() argument
97 if (!EVP_PKEY_set_type(ret, keytype)) { in ossl_d2i_PrivateKey_legacy()
123 if (EVP_PKEY_type(keytype) != EVP_PKEY_get_base_id(ret)) in ossl_d2i_PrivateKey_legacy()
143 EVP_PKEY *d2i_PrivateKey_ex(int keytype, EVP_PKEY **a, const unsigned char **pp, in d2i_PrivateKey_ex() argument
149 ret = d2i_PrivateKey_decoder(keytype, a, pp, length, libctx, propq); in d2i_PrivateKey_ex()
152 ret = ossl_d2i_PrivateKey_legacy(keytype, a, pp, length, libctx, propq); in d2i_PrivateKey_ex()
170 int keytype; in d2i_AutoPrivateKey_legacy() local
[all …]
/third_party/openssl/crypto/encode_decode/
Ddecoder_pkey.c303 EVP_PKEY **pkey, const char *keytype, in ossl_decoder_ctx_setup_for_pkey() argument
315 if (keytype != NULL in ossl_decoder_ctx_setup_for_pkey()
316 && (strcmp(keytype, "id-ecPublicKey") == 0 in ossl_decoder_ctx_setup_for_pkey()
317 || strcmp(keytype, "1.2.840.10045.2.1") == 0)) in ossl_decoder_ctx_setup_for_pkey()
324 keytype != NULL ? keytype : "", in ossl_decoder_ctx_setup_for_pkey()
325 keytype != NULL ? " keys" : "keys of any type", in ossl_decoder_ctx_setup_for_pkey()
361 if (keytype == NULL in ossl_decoder_ctx_setup_for_pkey()
362 || EVP_KEYMGMT_is_a(keymgmt, keytype) in ossl_decoder_ctx_setup_for_pkey()
429 const char *keytype, int selection, in OSSL_DECODER_CTX_new_for_pkey() argument
442 (void *)ctx, keytype, selection); in OSSL_DECODER_CTX_new_for_pkey()
[all …]
/third_party/openssl/crypto/evp/
Dpmeth_lib.c41 int keytype, int optype,
141 static void help_get_legacy_alg_type_from_keymgmt(const char *keytype, in help_get_legacy_alg_type_from_keymgmt() argument
147 *type = evp_pkey_name2type(keytype); in help_get_legacy_alg_type_from_keymgmt()
182 const char *keytype, const char *propquery, in int_ctx_new() argument
198 keytype = EVP_KEYMGMT_get0_name(pkey->keymgmt); in int_ctx_new()
201 if (keytype != NULL) { in int_ctx_new()
202 id = evp_pkey_name2type(keytype); in int_ctx_new()
231 keytype = NULL; in int_ctx_new()
233 keytype = OBJ_nid2sn(id); in int_ctx_new()
267 if (e == NULL && app_pmeth == NULL && keytype != NULL) { in int_ctx_new()
[all …]
Dp_lib.c490 const char *keytype, in EVP_PKEY_new_raw_private_key_ex() argument
494 return new_raw_key_int(libctx, keytype, propq, EVP_PKEY_NONE, NULL, priv, in EVP_PKEY_new_raw_private_key_ex()
506 const char *keytype, const char *propq, in EVP_PKEY_new_raw_public_key_ex() argument
509 return new_raw_key_int(libctx, keytype, propq, EVP_PKEY_NONE, NULL, pub, in EVP_PKEY_new_raw_public_key_ex()
2001 const char *keytype = NULL; in evp_pkey_copy_downgraded() local
2003 keytype = EVP_KEYMGMT_get0_name(keymgmt); in evp_pkey_copy_downgraded()
2014 keytype); in evp_pkey_copy_downgraded()
2020 keytype = OBJ_nid2sn(type); in evp_pkey_copy_downgraded()
2040 "key type = %s", keytype); in evp_pkey_copy_downgraded()
2069 "key type = %s", keytype); in evp_pkey_copy_downgraded()
Dctrl_params_translate.c1972 OPENSSL_strcasecmp(ctx->pctx->keytype, value) != 0) { in fix_group_ecx()
2570 int keytype, int optype, in evp_pkey_ctx_ctrl_to_param() argument
2580 if (keytype == -1) in evp_pkey_ctx_ctrl_to_param()
2581 keytype = pctx->legacy_keytype; in evp_pkey_ctx_ctrl_to_param()
2583 tmpl.keytype1 = tmpl.keytype2 = keytype; in evp_pkey_ctx_ctrl_to_param()
2645 int keytype = pctx->legacy_keytype; in evp_pkey_ctx_ctrl_str_to_param() local
2651 tmpl.keytype1 = tmpl.keytype2 = keytype; in evp_pkey_ctx_ctrl_str_to_param()
2704 int keytype = pctx->legacy_keytype; in evp_pkey_ctx_setget_params_to_ctrl() local
2715 tmpl.keytype1 = tmpl.keytype2 = keytype; in evp_pkey_ctx_setget_params_to_ctrl()
2731 ret = EVP_PKEY_CTX_ctrl(pctx, keytype, optype, in evp_pkey_ctx_setget_params_to_ctrl()
/third_party/openssl/doc/man3/
DPKCS12_create.pod13 int nid_key, int nid_cert, int iter, int mac_iter, int keytype);
16 int iter, int mac_iter, int keytype,
32 I<keytype> is the type of key.
39 The parameters I<nid_key>, I<nid_cert>, I<iter>, I<mac_iter> and I<keytype>
51 I<keytype> adds a flag to the store private key. This is a non standard extension
DOSSL_DECODER_from_bio.pod56 const char *keytype = "RSA"; /* NULL for any key */
60 keytype,
81 const char *keytype = "EC"; /* NULL for any key */
87 keytype,
DOSSL_DECODER_CTX_new_for_pkey.pod20 const char *keytype, int selection,
42 I<input_struct>, I<keytype> and I<selection> to specify what the input is
62 The search of decoder implementations can also be limited with I<keytype>
63 and I<selection>, which specifies the expected resulting keytype and contents.
65 find out the keytype and key contents on their own from the input they get.
/third_party/openssl/apps/
Ddhparam.c238 const char *keytype = "DH"; in dhparam_main() local
262 ? keytype : NULL, in dhparam_main()
269 && strcmp(keytype, "DH") == 0) { in dhparam_main()
278 keytype = "DHX"; in dhparam_main()
Dreq.c1505 const char *keytype = NULL; in set_keygen_ctx() local
1516 keytype = "RSA"; in set_keygen_ctx()
1520 keytype = "RSA"; in set_keygen_ctx()
1540 keytype = gstr; in set_keygen_ctx()
1584 if (keytype == NULL) { in set_keygen_ctx()
1585 keytype = EVP_PKEY_get0_type_name(param); in set_keygen_ctx()
1586 if (keytype == NULL) { in set_keygen_ctx()
1595 *pkeytype = OPENSSL_strndup(keytype, keytypelen); in set_keygen_ctx()
1597 *pkeytype = OPENSSL_strdup(keytype); in set_keygen_ctx()
Dpkcs12.c162 int export_pkcs12 = 0, options = 0, chain = 0, twopass = 0, keytype = 0; in pkcs12_main() local
201 keytype = KEY_EX; in pkcs12_main()
204 keytype = KEY_SIG; in pkcs12_main()
413 if (keytype == KEY_EX) in pkcs12_main()
415 if (keytype == KEY_SIG) in pkcs12_main()
668 key_pbe, cert_pbe, iter, -1, keytype, in pkcs12_main()
/third_party/openssl/crypto/pkcs12/
Dp12_crt.c33 int iter, int mac_iter, int keytype, in PKCS12_create_ex() argument
88 bag = PKCS12_add_key_ex(&bags, pkey, keytype, iter, nid_key, pass, in PKCS12_create_ex()
136 int mac_iter, int keytype) in PKCS12_create() argument
139 iter, mac_iter, keytype, NULL, NULL); in PKCS12_create()
/third_party/openssl/doc/man7/
DEVP_KEM-RSA.pod6 - EVP_KEM RSA keytype and algorithm support
10 The B<RSA> keytype and its parameters are described in L<EVP_PKEY-RSA(7)>.
/third_party/openssl/crypto/rsa/
Drsa_lib.c880 int keytype, int optype, in int_set_rsa_md_name() argument
894 switch (keytype) { in int_set_rsa_md_name()
901 if (!EVP_PKEY_CTX_is_a(ctx, evp_pkey_type2name(keytype))) in int_set_rsa_md_name()
920 int keytype, int optype, in int_get_rsa_md_name() argument
934 switch (keytype) { in int_get_rsa_md_name()
941 if (!EVP_PKEY_CTX_is_a(ctx, evp_pkey_type2name(keytype))) in int_get_rsa_md_name()
/third_party/libabigail/tests/data/test-read-ctf/
Dtest-forward-undefine-type-decl.c13 struct key_type *keytype; member
/third_party/openssl/include/crypto/
Ddecoder.h36 EVP_PKEY **pkey, const char *keytype,
/third_party/openssl/test/recipes/30-test_evp_data/
Devppkey_ecx.txt79 Reason = operation not supported for this keytype
83 Reason = operation not supported for this keytype
156 Reason = operation not supported for this keytype
160 Reason = operation not supported for this keytype
/third_party/rust/crates/rust-openssl/openssl-sys/src/handwritten/
Dpkcs12.rs48 keytype: c_int,

123