| /src/crypto/openssl/test/ |
| H A D | namemap_internal_test.c | 135 EVP_CIPHER *fetched = EVP_CIPHER_fetch(NULL, "AES-256-CCM", NULL); in test_cipher_is_a() local 138 if (!TEST_ptr(fetched)) in test_cipher_is_a() 140 if (!TEST_true(EVP_CIPHER_is_a(fetched, "id-aes256-CCM")) in test_cipher_is_a() 141 || !TEST_false(EVP_CIPHER_is_a(fetched, "AES-128-GCM"))) in test_cipher_is_a() 147 EVP_CIPHER_free(fetched); in test_cipher_is_a() 157 EVP_MD *fetched = EVP_MD_fetch(NULL, "SHA2-512", NULL); in test_digest_is_a() local 160 if (!TEST_ptr(fetched)) in test_digest_is_a() 162 if (!TEST_true(EVP_MD_is_a(fetched, "SHA512")) in test_digest_is_a() 163 || !TEST_false(EVP_MD_is_a(fetched, "SHA1"))) in test_digest_is_a() 169 EVP_MD_free(fetched); in test_digest_is_a()
|
| /src/crypto/krb5/src/lib/krb5/ccache/ |
| H A D | cc_retr.c | 209 } fetched, best; in krb5_cc_retrieve_cred_seq() local 211 #define fetchcreds (fetched.creds) in krb5_cc_retrieve_cred_seq() 221 fetched.pref = pref (fetchcreds.keyblock.enctype, in krb5_cc_retrieve_cred_seq() 223 if (fetched.pref < 0) in krb5_cc_retrieve_cred_seq() 225 else if (!have_creds || fetched.pref < best.pref) { in krb5_cc_retrieve_cred_seq() 230 best = fetched; in krb5_cc_retrieve_cred_seq()
|
| /src/crypto/openssl/doc/designs/ |
| H A D | functions-for-explicitly-fetched-signature-algorithms.md | 1 Functions for explicitly fetched PKEY algorithms 8 basic need, explicitly fetched signature algorithms. The following method 20 They can be extended to accept an explicitly fetched algorithm of the right 22 when the fetched algorithm permits it (for example, RSA-SHA256). 133 the use of an explicitly fetched implementation of a composite algorithm 187 an explicitly fetched `EVP_SIGNATURE` argument (they can at least be used 189 is possible to use with the explicitly fetched algorithm, the following 192 - Check if the fetched operation name matches the key type (keymgmt name) 194 is useful when someone fetched the `EVP_SIGNATURE` "RSA". This requires 197 - Check if the fetched algorithm name matches the name returned by the [all …]
|
| H A D | fetching-composite-algorithms.md | 13 explicitly fetched algorithms is lacking: asymmetric algorithms. 49 - [Functions for explicitly fetched signature algorithms] 50 - [Functions for explicitly fetched asym-cipher algorithms] (not yet designed) 51 - [Functions for explicitly fetched keyexch algorithms] (not yet designed) 86 fetched result, commonly known as support for explicit fetching. 134 [Functions for explicitly fetched signature algorithms]: 135 functions-for-explicitly-fetched-signature-algorithms.md
|
| H A D | ml-dsa.md | 25 algorithms are pre-fetched and stored within a `ML_DSA` key. 26 Any functions that require these pre-fetched objects must pass either the key 27 or the pre-fetched object within the key as a parameter. 32 contained 2 `EVP_MD_CTXs` with the pre-fetched `EVP_MD` shake objects. It was
|
| H A D | evp-cipher-pipeline.md | 61 * This function works only with explicitly fetched EVP_CIPHER instances. i.e. 62 * fetched using `EVP_CIPHER_fetch()`. For non-fetched ciphers, it returns 0. 185 b. When a Provider that supports pipelining is fetched,
|
| /src/crypto/krb5/src/windows/leashdll/ |
| H A D | lshutil.cpp | 106 ULONG fetched = 0; in Next() local 107 while (fetched < count) { in Next() 119 elements[fetched++] = copy; in Next() 128 *pFetched = fetched; in Next() 130 return fetched == count ? S_OK : S_FALSE; in Next()
|
| /src/crypto/openssl/doc/man7/ |
| H A D | EVP_SIGNATURE-ECDSA.pod | 23 The base signature algorithm, supported explicitly fetched with 24 L<EVP_PKEY_sign_init_ex2(3)>, and implicitly fetched (through 49 supported explicitly fetched with L<EVP_PKEY_sign_init_ex2(3)> and
|
| H A D | EVP_SIGNATURE-DSA.pod | 29 The base signature algorithm, supported explicitly fetched with 30 L<EVP_PKEY_sign_init_ex2(3)>, and implicitly fetched (through 55 supported explicitly fetched with L<EVP_PKEY_sign_init_ex2(3)> and
|
| H A D | ossl-guide-libcrypto-introduction.pod | 48 In order to use an algorithm an implementation for it must first be "fetched". 59 implementation from a provider. This fetched object can then be passed to other 103 The algorithm implementation that is fetched can then be used with other diverse 118 fetched implicitly using default search criteria (which uses NULL for the 122 is supplied. In this case an algorithm implementation is implicitly fetched 135 explicitly fetched algorithm each subsequent time. This will typically be 146 If an explicitly fetched object is not passed to an operation, then any implicit 148 still be slower than passing the explicitly fetched object directly. 194 that can be fetched.
|
| H A D | EVP_SIGNATURE-RSA.pod | 24 The base signature algorithm, supported explicitly fetched with 25 L<EVP_PKEY_sign_init_ex2(3)>, and implicitly fetched (through 56 are all supported explicitly fetched with L<EVP_PKEY_sign_init_ex2(3)> and
|
| /src/crypto/openssl/doc/man3/ |
| H A D | RAND_set_DRBG_type.pod | 22 with properties I<propq> will be fetched. It will be instantiated with 29 with properties I<propq> will be fetched and used to seed the primary
|
| H A D | EVP_EncryptInit.pod | 297 Decrements the reference count for the fetched B<EVP_CIPHER> structure. 333 If this function happens to be used with a fetched B<EVP_CIPHER>, it will 467 EVP_CipherInit_ex() except if the I<type> is not a fetched cipher they use the 493 This function checks if a B<EVP_CIPHER> fetched using EVP_CIPHER_fetch() supports 495 This function will return 0 for non-fetched ciphers such as EVP_aes_128_gcm(). 504 For non-fetched ciphers, EVP_CipherPipelineEncryptInit() or 554 fetched from the loaded providers. This fetch could fail if no suitable 576 fetched cipher has been assigned to the I<ctx>. It is recommended to use 646 Return the name of the passed cipher or context. For fetched ciphers with 653 I<data>. This is only useful with fetched B<EVP_CIPHER>s. [all …]
|
| H A D | EVP_DigestInit.pod | 173 Decrements the reference count for the fetched B<EVP_MD> structure. 202 If this function happens to be used with a fetched B<EVP_MD>, it will 253 I<name>, which is fetched using the optional I<libctx> and I<propq> parameters. 269 value explicitly fetched with EVP_MD_fetch(). I<ctx> B<MUST NOT> be NULL. 281 value explicitly fetched with EVP_MD_fetch(). 368 Return the name of the given message digest. For fetched message 375 I<data>. This is only useful with fetched B<EVP_MD>s. 472 fetched from the loaded providers. This fetch could fail if no suitable 564 When used with a fetched B<EVP_MD>, EVP_MD_CTX_get_params() gets called with 574 When used with a fetched B<EVP_MD>, EVP_MD_CTX_get_params() gets called with
|
| H A D | OCSP_response_status.pod | 56 stored as a SHA1 hash. To calculate the hash the SHA1 algorithm is fetched using 69 the SHA1 algorithm is fetched using the library ctx I<libctx> and the property
|
| H A D | EVP_PKEY_verify_recover.pod | 35 but works with an explicitly fetched B<EVP_SIGNATURE> I<algo>. 37 Depending on what algorithm was fetched, certain details revolving around the
|
| H A D | EVP_KDF.pod | 84 EVP_KDF_up_ref() increments the reference count of an already fetched 87 EVP_KDF_free() frees a fetched algorithm. 170 EVP_KDF_get0_name() return the name of the given KDF. For fetched KDFs 265 EVP_KDF_fetch() returns a pointer to a newly fetched B<EVP_KDF>, or
|
| H A D | TS_RESP_CTX_new.pod | 23 supply the fetched algorithms.
|
| /src/crypto/openssl/crypto/pkcs12/ |
| H A D | p12_mutl.c | 253 int fetched = 0; in pkcs12_gen_mac() local 263 fetched = 1; in pkcs12_gen_mac() 269 if (fetched) in pkcs12_gen_mac() 276 if (fetched) in pkcs12_gen_mac()
|
| /src/crypto/openssl/doc/internal/man3/ |
| H A D | evp_md_get_number.pod | 45 useful with fetched B<EVP_CIPHER>s. 70 only useful with fetched B<EVP_MD>s.
|
| /src/sys/dev/sound/pcm/ |
| H A D | feeder_rate.c | 1543 int32_t fetch, fetched, start, cp; in z_resampler_feed_internal() local 1585 fetched = z_fetched(info); in z_resampler_feed_internal() 1588 cp = (info->z_size << 1) + fetched; in z_resampler_feed_internal() 1594 z_next(info, info->z_start, fetched + 1); in z_resampler_feed_internal() 1603 start, fetched, cp, info->z_cycle, in z_resampler_feed_internal() 1614 fetched = SND_FXDIV(z_feed(f->source, c, in z_resampler_feed_internal() 1622 reqin -= fetched; in z_resampler_feed_internal() 1623 info->z_pos += fetched; in z_resampler_feed_internal() 1624 if (fetched != fetch) in z_resampler_feed_internal()
|
| /src/contrib/unbound/validator/ |
| H A D | autotrust.h | 81 uint8_t fetched; member
|
| /src/usr.sbin/bluetooth/bcmfw/ |
| H A D | README | 18 Until then, the firmware files can be fetched as part of
|
| /src/crypto/openssl/crypto/pkcs7/ |
| H A D | pk7_doit.c | 99 EVP_MD *fetched = NULL; in pkcs7_bio_add_digest() local 110 fetched = EVP_MD_fetch(ossl_pkcs7_ctx_get0_libctx(ctx), name, in pkcs7_bio_add_digest() 112 if (fetched != NULL) in pkcs7_bio_add_digest() 113 md = fetched; in pkcs7_bio_add_digest() 126 EVP_MD_free(fetched); in pkcs7_bio_add_digest() 129 EVP_MD_free(fetched); in pkcs7_bio_add_digest()
|
| /src/contrib/tcpdump/ |
| H A D | CONTRIBUTING.md | 175 be fetched using the `GET_*()` macros, which are defined in 222 `U` indicates that an unsigned value is fetched; `S` indicates that a 223 signed value is fetched. For multi-byte values, `BE` indicates that 224 a big-endian value ("network byte order") is fetched, and `LE` 225 indicates that a little-endian value is fetched. *n* is the length, 226 in bytes, of the multi-byte integral value to be fetched.
|