algname
if (algname == NULL)
ctx = EVP_PKEY_CTX_new_from_name(libctx, algname, propq);
const char *ciphername = NULL, *paramfile = NULL, *algname = NULL;
show_gen_pkeyopt(algname, libctx, app_get0_propq());
algname = opt_arg();
if (algname != NULL) {
if (!init_gen_str(&ctx, algname, e, do_param, libctx, app_get0_propq()))
pkey = do_param ? app_paramgen(ctx, algname)
: app_keygen(ctx, algname, 0, 0 /* not verbose */);
const char *algname, ENGINE *e, int do_param,
pkey_id = get_legacy_pkey_id(libctx, algname, e);
ctx = EVP_PKEY_CTX_new_from_name(libctx, algname, propq);
BIO_printf(bio_err, "Error initializing %s context\n", algname);
static void show_gen_pkeyopt(const char *algname, OSSL_LIB_CTX *libctx, const char *propq)
int get_legacy_pkey_id(OSSL_LIB_CTX *libctx, const char *algname, ENGINE *e);
const char *algname, ENGINE *e, int do_param,
int get_legacy_pkey_id(OSSL_LIB_CTX *libctx, const char *algname, ENGINE *e)
ameth = EVP_PKEY_asn1_find_str(&tmpeng, algname, -1);
ameth = ENGINE_get_pkey_asn1_meth_str(e, algname, -1);
const char *algname = "";
&algname, EVP_PKEY_get0_asn1(pkey));
algname, EVP_PKEY_get_bits(pkey));
const char *algname, const char *opname,
return ossl_FIPS_IND_callback(libctx, algname, opname);
ossl_FIPS_IND_on_unapproved(&ctx->indicator, id, libctx, algname, opname, config_check_fn)
#define OSSL_FIPS_IND_ON_UNAPPROVED(ctx, id, libctx, algname, opname, configopt_fn)
const char *algname, const char *opname,
#define OSSL_FIPS_IND_ON_UNAPPROVED(ctx, id, libctx, algname, opname, config_check_fn) \
static int ecx_init(void *vecxctx, void *vkey, const char *algname)
if (!ossl_FIPS_IND_callback(key->libctx, algname, "Init"))
static int find_alg_id(OSSL_LIB_CTX *libctx, const char *algname,
cipher = EVP_CIPHER_fetch(libctx, algname, propq);
const char *algname;
int id = ssl_get_keyex(&algname, sc);
BIO_printf(bio, "KeyExchangeAlgorithm=%s\n", algname);
const char *algname;
int id = ssl_get_keyex(&algname, sc);
BIO_printf(bio, "KeyExchangeAlgorithm=%s\n", algname);
static int eddsa_create_pkey(EVP_PKEY **pkey, const char *algname,
|| !TEST_ptr(ctx = EVP_PKEY_CTX_new_from_name(libctx, algname, NULL))
char *algname;
|| !TEST_ptr(kdata->algname = OPENSSL_strdup(alg)))
OPENSSL_free(kdata->algname);
if ((pkey = EVP_PKEY_new_raw_public_key_ex(libctx, kdata->algname,
if ((pkey = EVP_PKEY_new_raw_private_key_ex(libctx, kdata->algname,
const char *algname;
algname = "RSA";
algname = "DSA";
algname = "DH";
algname = OBJ_nid2sn(keyid);
BIO_printf(out, "%d bits %s", EVP_PKEY_get_bits(key), algname);
const char *algname;
algname = NULL;
algname = optarg;
if (algname == NULL)
if (strcasecmp(algname, "hash") == 0)
else if (strcasecmp(algname, "mac") == 0)
else if (strcasecmp(algname, "cipher") == 0)
else if (strcasecmp(algname, "eta") == 0)
else if (strcasecmp(algname, "aead") == 0)
else if (strcasecmp(algname, "gmac") == 0 ||
strcasecmp(algname, "aes-cbc") == 0 ||
strcasecmp(algname, "aes-ctr") == 0 ||
strcasecmp(algname, "aes-xts") == 0 ||
strcasecmp(algname, "camellia-cbc") == 0 ||
strcasecmp(algname, "aes-gcm") == 0 ||
strcasecmp(algname, "aes-ccm") == 0)
run_prefix_tests(algname);
else if (strcasecmp(algname, "all") == 0) {
} else if (strchr(algname, '+') != NULL) {
eta = build_eta_name(algname);
alg = find_alg(algname);
errx(1, "Invalid algorithm %s", algname);
, algname(i, aalgs, nitems(aalgs))
, algname(i, espalgs, nitems(espalgs))