HomeSort by: relevance | last modified time | path
    Searched defs:approved (Results 1 - 14 of 14) sorted by relevancy

  /src/crypto/external/apache2/openssl/dist/providers/common/
securitycheck_fips.c 86 int approved = (nid != NID_undef && nid != NID_sha1); local
88 if (!approved) {
105 int approved; local
110 approved = 0;
114 approved = sha512_trunc_allowed;
118 approved = sha1_allowed;
122 approved = 1;
126 if (!approved) {
  /src/crypto/external/apache2/openssl/dist/providers/fips/include/fips/
fipsindicator.h 40 * the algorithm is approved or not. These checks may be in different stages.
41 * To keep it simple it is assumed that the algorithm is initially approved,
44 * The approved state should only be queried after the operation has completed
47 * If a FIPS approved check fails then we must decide what to do in this case.
56 unsigned char approved; member in struct:ossl_fips_ind_st
95 * This should be called if a FIPS check fails, to indicate the operation is not approved
  /src/crypto/external/apache2/openssl/dist/providers/implementations/exchange/
ecx_exch.c 193 int approved = 0; local
197 if (p != NULL && !OSSL_PARAM_set_int(p, approved))
  /src/crypto/external/apache2/openssl/dist/providers/implementations/macs/
hmac_prov.c 167 int approved = ossl_mac_check_key_size(keylen); local
169 if (!approved) {
298 int approved = 0; local
301 approved = OSSL_FIPS_IND_GET(macctx)->approved;
302 if (!OSSL_PARAM_set_int(p, approved))
kmac_prov.c 278 int approved = ossl_mac_check_key_size(keylen); local
280 if (!approved) {
  /src/crypto/external/apache2/openssl/dist/providers/implementations/kdfs/
pbkdf2.c 213 int approved = pbkdf2_lower_bound_check_passed(ctx->salt_len, ctx->iter, local
216 if (!approved) {
  /src/external/gpl2/xcvs/dist/src/
parseinfo.c 410 bool approved = false; local
422 approved = true;
424 if (approved) break;
426 if (!approved)
  /src/crypto/external/apache2/openssl/dist/providers/implementations/rands/
drbg.c 1010 int approved = digest_allowed(md); local
1012 if (!approved) {
  /src/crypto/external/apache2/openssl/dist/providers/implementations/signature/
dsa_sig.c 252 /* DSA Signing is not approved in FIPS 140-3 */
263 int approved = ossl_dsa_check_key(ctx->dsa, sign); local
265 if (!approved) {
rsa_sig.c 642 int approved = (saltlen >= 0 && saltlen <= mdsize); local
644 if (!approved) {
  /src/crypto/external/apache2/openssl/dist/providers/implementations/keymgmt/
ecx_kmgmt.c 319 /* X25519 and X448 are not approved */
320 int approved = 0; local
323 if (p != NULL && !OSSL_PARAM_set_int(p, approved))
515 /* X25519/X448 are not FIPS approved, (ED25519/ED448 are approved) */
  /src/crypto/external/apache2/openssl/dist/test/
evp_test.c 110 TEST_info("(Indicator Callback received %s : %s is not approved)", type, desc);
114 static int check_fips_approved(EVP_TEST *t, int approved)
117 * If the expected result is approved
118 * then it is expected that approved will be 1
120 * approved should be 0 and the fips indicator callback should be triggered.
123 if (approved == 1 || fips_indicator_callback_unapproved_count == 0) {
124 TEST_error("Test is not expected to be FIPS approved");
128 if (approved == 0 || fips_indicator_callback_unapproved_count > 0) {
129 TEST_error("Test is expected to be FIPS approved");
141 * value of approved
143 int approved = 1; local
162 int approved = 1; local
189 int approved = 1; local
299 int approved = 1; local
311 int approved = 1; local
    [all...]
  /src/external/mpl/bind/dist/lib/dns/
zone.c 7574 bool approved; local
7596 approved = false;
7598 approved = (zsk_count == count);
7602 return approved;
  /src/external/mpl/dhcp/bind/dist/lib/dns/
zone.c 7652 bool approved; local
7676 approved = false;
7678 approved = (zsk_count == count);
7682 return (approved);

Completed in 70 milliseconds