| /src/crypto/external/apache2/openssl/dist/providers/common/ |
| securitycheck_fips.c | 86 int approved = (nid != NID_undef && nid != NID_sha1); local 88 if (!approved) { 105 int approved; local 110 approved = 0; 114 approved = sha512_trunc_allowed; 118 approved = sha1_allowed; 122 approved = 1; 126 if (!approved) {
|
| /src/crypto/external/apache2/openssl/dist/providers/fips/include/fips/ |
| fipsindicator.h | 40 * the algorithm is approved or not. These checks may be in different stages. 41 * To keep it simple it is assumed that the algorithm is initially approved, 44 * The approved state should only be queried after the operation has completed 47 * If a FIPS approved check fails then we must decide what to do in this case. 56 unsigned char approved; member in struct:ossl_fips_ind_st 95 * This should be called if a FIPS check fails, to indicate the operation is not approved
|
| /src/crypto/external/apache2/openssl/dist/providers/implementations/exchange/ |
| ecx_exch.c | 193 int approved = 0; local 197 if (p != NULL && !OSSL_PARAM_set_int(p, approved))
|
| /src/crypto/external/apache2/openssl/dist/providers/implementations/macs/ |
| hmac_prov.c | 167 int approved = ossl_mac_check_key_size(keylen); local 169 if (!approved) { 298 int approved = 0; local 301 approved = OSSL_FIPS_IND_GET(macctx)->approved; 302 if (!OSSL_PARAM_set_int(p, approved))
|
| kmac_prov.c | 278 int approved = ossl_mac_check_key_size(keylen); local 280 if (!approved) {
|
| /src/crypto/external/apache2/openssl/dist/providers/implementations/kdfs/ |
| pbkdf2.c | 213 int approved = pbkdf2_lower_bound_check_passed(ctx->salt_len, ctx->iter, local 216 if (!approved) {
|
| /src/external/gpl2/xcvs/dist/src/ |
| parseinfo.c | 410 bool approved = false; local 422 approved = true; 424 if (approved) break; 426 if (!approved)
|
| /src/crypto/external/apache2/openssl/dist/providers/implementations/rands/ |
| drbg.c | 1010 int approved = digest_allowed(md); local 1012 if (!approved) {
|
| /src/crypto/external/apache2/openssl/dist/providers/implementations/signature/ |
| dsa_sig.c | 252 /* DSA Signing is not approved in FIPS 140-3 */ 263 int approved = ossl_dsa_check_key(ctx->dsa, sign); local 265 if (!approved) {
|
| rsa_sig.c | 642 int approved = (saltlen >= 0 && saltlen <= mdsize); local 644 if (!approved) {
|
| /src/crypto/external/apache2/openssl/dist/providers/implementations/keymgmt/ |
| ecx_kmgmt.c | 319 /* X25519 and X448 are not approved */ 320 int approved = 0; local 323 if (p != NULL && !OSSL_PARAM_set_int(p, approved)) 515 /* X25519/X448 are not FIPS approved, (ED25519/ED448 are approved) */
|
| /src/crypto/external/apache2/openssl/dist/test/ |
| evp_test.c | 110 TEST_info("(Indicator Callback received %s : %s is not approved)", type, desc); 114 static int check_fips_approved(EVP_TEST *t, int approved) 117 * If the expected result is approved 118 * then it is expected that approved will be 1 120 * approved should be 0 and the fips indicator callback should be triggered. 123 if (approved == 1 || fips_indicator_callback_unapproved_count == 0) { 124 TEST_error("Test is not expected to be FIPS approved"); 128 if (approved == 0 || fips_indicator_callback_unapproved_count > 0) { 129 TEST_error("Test is expected to be FIPS approved"); 141 * value of approved 143 int approved = 1; local 162 int approved = 1; local 189 int approved = 1; local 299 int approved = 1; local 311 int approved = 1; local [all...] |
| /src/external/mpl/bind/dist/lib/dns/ |
| zone.c | 7574 bool approved; local 7596 approved = false; 7598 approved = (zsk_count == count); 7602 return approved;
|
| /src/external/mpl/dhcp/bind/dist/lib/dns/ |
| zone.c | 7652 bool approved; local 7676 approved = false; 7678 approved = (zsk_count == count); 7682 return (approved);
|