/openssl-master/test/ssl-tests/ |
A D | 28-seclevel.cnf | 1 # Generated with generate_ssl_tests.pl 5 test-0 = 0-SECLEVEL 3 with default key 6 test-1 = 1-SECLEVEL 4 with ED448 key 7 test-2 = 2-SECLEVEL 5 server with ED448 key 13 [0-SECLEVEL 3 with default key] 16 [0-SECLEVEL 3 with default key-ssl] 20 [0-SECLEVEL 3 with default key-server] 36 [1-SECLEVEL 4 with ED448 key] 39 [1-SECLEVEL 4 with ED448 key-ssl] 43 [1-SECLEVEL 4 with ED448 key-server] [all …]
|
A D | 12-ct.cnf | 1 # Generated with generate_ssl_tests.pl 6 test-1 = 1-ct-permissive-with-scts 8 test-3 = 3-ct-strict-with-scts 40 [1-ct-permissive-with-scts] 43 [1-ct-permissive-with-scts-ssl] 47 [1-ct-permissive-with-scts-server] 52 [1-ct-permissive-with-scts-client] 95 [3-ct-strict-with-scts] 98 [3-ct-strict-with-scts-ssl] 102 [3-ct-strict-with-scts-server] [all …]
|
A D | 28-seclevel.cnf.in | 5 # this file except in compliance with the License. You can obtain a copy 19 name => "SECLEVEL 3 with default key", 28 name => "SECLEVEL 4 with ED448 key", 39 # then the security level is chaged. If you try this with s_server 41 name => "SECLEVEL 5 server with ED448 key", 52 name => "SECLEVEL 5 client with ED448 key", 61 name => "SECLEVEL 3 with P-384 key, X25519 ECDHE", 74 name => "SECLEVEL 3 with ED448 key, TLSv1.2",
|
A D | 03-custom_verify.cnf.in | 5 # this file except in compliance with the License. You can obtain a copy 25 # Same test as above but with a custom callback that always fails. 40 # Same test as above but with a custom callback that always succeeds. 54 # Same test as above but with a custom callback that requests retry once. 80 # Same test as above but with a custom callback that always fails. 97 # Same test as above but with a custom callback that always succeeds. 129 # Same test as above but with a custom callback that always succeeds. 144 # Same test as above but with a custom callback that always fails.
|
A D | 09-alpn.cnf | 1 # Generated with generate_ssl_tests.pl 11 test-6 = 6-alpn-with-sni-no-context-switch 12 test-7 = 7-alpn-with-sni-context-switch 200 [6-alpn-with-sni-no-context-switch] 203 [6-alpn-with-sni-no-context-switch-ssl] 208 [6-alpn-with-sni-no-context-switch-server] 244 [7-alpn-with-sni-context-switch] 247 [7-alpn-with-sni-context-switch-ssl] 252 [7-alpn-with-sni-context-switch-server] 257 [7-alpn-with-sni-context-switch-server2] [all …]
|
/openssl-master/providers/common/der/ |
A D | DSA.asn1 | 10 -- OID for DSA signature generated with SHA-1 hash 12 id-dsa-with-sha1 OBJECT IDENTIFIER ::= { 21 id-dsa-with-sha224 OBJECT IDENTIFIER ::= { sigAlgs 1 } 22 id-dsa-with-sha256 OBJECT IDENTIFIER ::= { sigAlgs 2 } 23 id-dsa-with-sha384 OBJECT IDENTIFIER ::= { sigAlgs 3 } 24 id-dsa-with-sha512 OBJECT IDENTIFIER ::= { sigAlgs 4 } 26 id-dsa-with-sha3-224 OBJECT IDENTIFIER ::= { sigAlgs 5 } 27 id-dsa-with-sha3-256 OBJECT IDENTIFIER ::= { sigAlgs 6 } 28 id-dsa-with-sha3-384 OBJECT IDENTIFIER ::= { sigAlgs 7 } 29 id-dsa-with-sha3-512 OBJECT IDENTIFIER ::= { sigAlgs 8 }
|
A D | EC.asn1 | 12 -- OID for ECDSA signatures with SHA-1 14 ecdsa-with-SHA1 OBJECT IDENTIFIER ::= { id-ecSigType 1 } 62 ecdsa-with-SHA224 OBJECT IDENTIFIER ::= { iso(1) member-body(2) 63 us(840) ansi-X9-62(10045) signatures(4) ecdsa-with-SHA2(3) 1 } 65 ecdsa-with-SHA256 OBJECT IDENTIFIER ::= { iso(1) member-body(2) 68 ecdsa-with-SHA384 OBJECT IDENTIFIER ::= { iso(1) member-body(2) 71 ecdsa-with-SHA512 OBJECT IDENTIFIER ::= { iso(1) member-body(2) 79 id-ecdsa-with-sha3-224 OBJECT IDENTIFIER ::= { sigAlgs 9 } 80 id-ecdsa-with-sha3-256 OBJECT IDENTIFIER ::= { sigAlgs 10 } 81 id-ecdsa-with-sha3-384 OBJECT IDENTIFIER ::= { sigAlgs 11 } [all …]
|
/openssl-master/test/recipes/30-test_evp_data/ |
A D | evppkey_ecc.txt | 44 # ECDH Alice with Bob peer 50 # ECDH Bob with Alice peer 56 # ECC CDH Alice with Bob peer 63 # ECC CDH Bob with Alice peer 122 # ECDH Alice with Bob peer 128 # ECDH Bob with Alice peer 200 # ECDH Alice with Bob peer 206 # ECDH Bob with Alice peer 278 # ECDH Alice with Bob peer 284 # ECDH Bob with Alice peer [all …]
|
A D | evppkey_brainpool.txt | 42 # ECDH Alice with Bob peer 47 # ECDH Bob with Alice peer 80 # ECDH Alice with Bob peer 85 # ECDH Bob with Alice peer 120 # ECDH Alice with Bob peer 125 # ECDH Bob with Alice peer 160 # ECDH Alice with Bob peer 165 # ECDH Bob with Alice peer 200 # ECDH Alice with Bob peer 205 # ECDH Bob with Alice peer [all …]
|
A D | evppkey_ecdh.txt | 53 # ECDH Alice with Bob peer 59 # ECDH Bob with Alice peer 97 # ECDH Alice with Bob peer 104 # ECDH Bob with Alice peer 142 # ECDH Alice with Bob peer 149 # ECDH Bob with Alice peer 188 # ECDH Alice with Bob peer 195 # ECDH Bob with Alice peer 236 # ECDH Alice with Bob peer 243 # ECDH Bob with Alice peer [all …]
|
A D | evppkey_dsa.txt | 9 # Tests start with one of these keywords 255 # Test sign with a 2048 bit key with N == 224 is allowed in fips mode 262 # Test sign with a 2048 bit key with N == 256 is allowed in fips mode 268 # Test sign with a 3072 bit key with N == 256 is allowed in fips mode 274 # Test sign with a 2048 bit SHA3 is allowed in fips mode 280 # Test verify with a 1024 bit key is allowed in fips mode 286 # Test verify with SHA1 is allowed in fips mode 294 # Test sign with a 1024 bit key is not allowed in fips mode 302 # Test sign with SHA1 is not allowed in fips mode 310 # Test sign with a 3072 bit key with N == 224 is not allowed in fips mode [all …]
|
/openssl-master/doc/man7/ |
A D | EVP_MAC-CMAC.pod | 16 This implementation is identified with this name and properties, to be 17 used with EVP_MAC_fetch(): 30 The following parameter can be set with EVP_MAC_CTX_set_params(): 46 This must be given together with the cipher naming parameter to be considered 51 The following parameters can be retrieved with 58 The "size" parameter can also be retrieved with with EVP_MAC_CTX_get_mac_size(). 67 Gets the MAC block size. The "block-size" parameter can also be retrieved with 82 this file except in compliance with the License. You can obtain a copy
|
A D | EVP_MD-MDC2.pod | 13 This implementation is only available with the legacy provider, and is 14 identified with the name "MDC2". 24 settable for an B<EVP_MD_CTX> with L<EVP_MD_CTX_set_params(3)>: 31 Normally the final MDC2 block is padded with zeros. 32 If the pad type is set to 2 then the final block is padded with 0x80 followed by 46 this file except in compliance with the License. You can obtain a copy
|
A D | EVP_MAC-Poly1305.pod | 13 This implementation is identified with this name and properties, to be 14 used with EVP_MAC_fetch(): 27 The following parameter can be set with EVP_MAC_CTX_set_params(): 38 The following parameters can be retrieved with 49 The "size" parameter can also be retrieved with with EVP_MAC_CTX_get_mac_size(). 69 this file except in compliance with the License. You can obtain a copy
|
A D | EVP_MAC-BLAKE2.pod | 14 These implementations are identified with one of these names and 15 properties, to be used with EVP_MAC_fetch(): 30 All these parameters can be set with EVP_MAC_CTX_set_params(). 31 Furthermore, the "size" parameter can be retrieved with 32 EVP_MAC_CTX_get_params(), or with EVP_MAC_CTX_get_mac_size(). 34 Likewise, the "block-size" parameter can be retrieved with 35 EVP_MAC_CTX_get_params(), or with EVP_MAC_CTX_get_block_size(). 86 this file except in compliance with the License. You can obtain a copy
|
A D | EVP_MAC-HMAC.pod | 16 This implementation is identified with this name and properties, to be 17 used with EVP_MAC_fetch(): 30 The following parameter can be set with EVP_MAC_CTX_set_params(): 46 This must be given together with the digest naming parameter ("digest", or 66 The following parameter can be retrieved with EVP_MAC_CTX_get_params(): 72 The "size" parameter can also be retrieved with EVP_MAC_CTX_get_mac_size(). 81 Gets the MAC block size. The "block-size" parameter can also be retrieved with 96 this file except in compliance with the License. You can obtain a copy
|
A D | EVP_MAC-GMAC.pod | 16 This implementation is identified with this name and properties, to be 17 used with EVP_MAC_fetch(): 30 The following parameter can be set with EVP_MAC_CTX_set_params(): 50 This must be given together with the cipher naming parameter to be considered 55 The following parameters can be retrieved with 66 The "size" parameter can also be retrieved with EVP_MAC_CTX_get_mac_size(). 79 this file except in compliance with the License. You can obtain a copy
|
A D | EVP_MAC-Siphash.pod | 13 This implementation is identified with this name and properties, to be 14 used with EVP_MAC_fetch(): 28 All these parameters can be set with EVP_MAC_CTX_set_params(). 29 Furthermore, the "size" parameter can be retrieved with 30 EVP_MAC_CTX_get_params(), or with EVP_MAC_CTX_get_mac_size(). 64 this file except in compliance with the License. You can obtain a copy
|
/openssl-master/doc/man3/ |
A D | EVP_des_cbc.pod | 54 DES in CBC, ECB, CFB with 64-bit shift, CFB with 1-bit shift, CFB with 8-bit 68 Two key triple DES in ECB, CBC, CFB with 64-bit shift and OFB modes. 79 Three-key triple DES in ECB, CBC, CFB with 64-bit shift, CFB with 1-bit shift, 80 CFB with 8-bit shift and OFB modes. 105 this file except in compliance with the License. You can obtain a copy
|
A D | EVP_aes_128_gcm.pod | 94 AES for 128, 192 and 256 bit keys in the following modes: CBC, CFB with 128-bit 95 shift, CFB with 1-bit shift, CFB with 8-bit shift, CTR, ECB, and OFB. 100 Authenticated encryption with AES in CBC mode using SHA-1 as HMAC, with keys of 110 Authenticated encryption with AES in CBC mode using SHA256 (SHA-2, 256-bits) as 111 HMAC, with keys of 128 and 256 bits length respectively. The authentication tag 146 AES key wrap with 128, 192 and 256 bit keys, as according to RFC 3394 section 147 2.2.1 ("wrap") and RFC 5649 section 4.1 ("wrap with padding") respectively. 153 SP 800-38E. The XTS (XEX-based tweaked-codebook mode with ciphertext stealing) 165 similarly with the "Decrypt" functions). 189 this file except in compliance with the License. You can obtain a copy
|
A D | X509_LOOKUP_hash_dir.pod | 30 lookup methods to use with B<X509_STORE>, provided by OpenSSL library. 44 parameter is associated with. 50 B<X509_load_cert_crl_file> with B<FILETYPE_ASN1> is equivalent to 53 Constant B<FILETYPE_DEFAULT> with NULL filename causes these functions 76 This method should be used by applications which work with a small 88 with a filename of the form I<hash>.I<N> for a certificate, or 99 more objects with the same hash beyond the first missing number in the 103 certificates with same subject name hash value. 109 loaded, hash_dir lookup method checks only for certificates with 117 hashed names for all files with F<.pem> suffix in a given directory. [all …]
|
A D | BIO_ADDR.pod | 32 addresses that OpenSSL deals with, currently transparently 37 with routines that will fill it with information, such as 40 BIO_ADDR_free() frees a B<BIO_ADDR> created with BIO_ADDR_new(). 46 size B<wherelen> with an address in network byte order pointed at 49 therefore ignored) and populates the given B<BIO_ADDR> with them. 75 BIO_ADDR_hostname_string() returns a character string with the 80 with OPENSSL_free(). 82 BIO_ADDR_service_string() returns a character string with the 87 with OPENSSL_free(). 89 BIO_ADDR_path_string() returns a character string with the path [all …]
|
A D | EVP_rc4.pod | 26 RC4 stream cipher. This is a variable key length cipher with a default key 31 RC4 stream cipher with 40 bit key length. 33 WARNING: this function is obsolete. Its usage should be replaced with the 38 Authenticated encryption with the RC4 stream cipher with MD5 as HMAC. 63 this file except in compliance with the License. You can obtain a copy
|
/openssl-master/test/recipes/95-test_external_krb5_data/ |
A D | krb5.sh | 16 ./configure --with-ldap --with-prng-alg=os --enable-pkinit \ 17 --with-crypto-impl=openssl --with-tls-impl=openssl \
|
/openssl-master/ |
A D | NOTES-NONSTOP.md | 11 Specify the `--with-rand-seed=rdcpu` option to the `./Configure` script. 15 specify the `--with-rand-seed=egd` option to the `./Configure` script. 36 * `nonstop-nsx_spt_floss` selects the SPT build with FLOSS. FLOSS is 110 ./Configure nonstop-nsx_64 no-makedepend --with-rand-seed=rdcpu 140 Cross Compiling with NSDEE 224 --with-rand-seed=egd ${CIPHENABLES} ${DBGFLAG} ${SYSTEMLIBS} 227 --with-rand-seed=egd ${CIPHENABLES} ${DBGFLAG} ${SYSTEMLIBS} 230 --with-rand-seed=egd ${CIPHENABLES} ${DBGFLAG} ${SYSTEMLIBS} 233 --with-rand-seed=egd ${CIPHENABLES} ${DBGFLAG} ${SYSTEMLIBS} 236 --with-rand-seed=egd ${CIPHENABLES} ${DBGFLAG} ${SYSTEMLIBS} [all …]
|