Lines Matching full:fetched
1 Functions for explicitly fetched PKEY algorithms
8 basic need, explicitly fetched signature algorithms. The following method
20 They can be extended to accept an explicitly fetched algorithm of the right
22 when the fetched algorithm permits it (for example, RSA-SHA256).
133 the use of an explicitly fetched implementation of a composite algorithm
187 an explicitly fetched `EVP_SIGNATURE` argument (they can at least be used
189 is possible to use with the explicitly fetched algorithm, the following
192 - Check if the fetched operation name matches the key type (keymgmt name)
194 is useful when someone fetched the `EVP_SIGNATURE` "RSA". This requires
197 - Check if the fetched algorithm name matches the name returned by the
199 when someone fetched the `EVP_SIGNATURE` "ECDSA", for which the key type