| /src/crypto/external/bsd/openssl/dist/providers/implementations/signature/ |
| dsa_sig.c | 78 char mdname[OSSL_MAX_NAME_SIZE]; member in struct:__anon1622 121 const char *mdname, const char *mdprops) 126 if (mdname != NULL) { 129 EVP_MD *md = EVP_MD_fetch(ctx->libctx, mdname, mdprops); 132 size_t mdname_len = strlen(mdname); 137 "%s could not be fetched", mdname); 140 "digest=%s", mdname); 141 if (mdname_len >= sizeof(ctx->mdname)) 143 "%s exceeds name buffer length", mdname); 149 if (ctx->mdname[0] != '\0' && !EVP_MD_is_a(md, ctx->mdname)) 488 char mdname[OSSL_MAX_NAME_SIZE] = "", *pmdname = mdname; local [all...] |
| sm2_sig.c | 76 char mdname[OSSL_MAX_NAME_SIZE]; member in struct:__anon1635 93 static int sm2sig_set_mdname(PROV_SM2_CTX *psm2ctx, const char *mdname) 96 psm2ctx->md = EVP_MD_fetch(psm2ctx->libctx, psm2ctx->mdname, 101 if (mdname == NULL) 104 if (strlen(mdname) >= sizeof(psm2ctx->mdname) 105 || !EVP_MD_is_a(psm2ctx->md, mdname)) { 107 mdname); 111 OPENSSL_strlcpy(psm2ctx->mdname, mdname, sizeof(psm2ctx->mdname)) 471 char *mdname = NULL; local [all...] |
| ecdsa_sig.c | 67 char mdname[OSSL_MAX_NAME_SIZE]; member in struct:__anon1623 215 static int ecdsa_setup_md(PROV_ECDSA_CTX *ctx, const char *mdname, 223 if (mdname == NULL) 226 mdname_len = strlen(mdname); 227 if (mdname_len >= sizeof(ctx->mdname)) { 229 "%s exceeds name buffer length", mdname); 234 md = EVP_MD_fetch(ctx->libctx, mdname, mdprops); 237 "%s could not be fetched", mdname); 245 "digest=%s", mdname); 251 if (ctx->mdname[0] != '\0' && !EVP_MD_is_a(md, ctx->mdname)) 495 char mdname[OSSL_MAX_NAME_SIZE] = "", *pmdname = mdname; local [all...] |
| rsa_sig.c | 94 char mdname[OSSL_MAX_NAME_SIZE]; /* Purely informational */ member in struct:__anon1634 123 const char *mdname, const char *mgf1_mdname, 128 if (mdname != NULL || mdnid != NID_undef) { 141 if ((mdname != NULL && !EVP_MD_is_a(prsactx->md, mdname)) 283 static int rsa_setup_md(PROV_RSA_CTX *ctx, const char *mdname, 289 if (mdname != NULL) { 290 EVP_MD *md = EVP_MD_fetch(ctx->libctx, mdname, mdprops); 294 size_t mdname_len = strlen(mdname); 298 || !rsa_check_padding(ctx, mdname, NULL, md_nid 430 const char *mdname, *mgf1mdname; local 1155 char mdname[OSSL_MAX_NAME_SIZE] = "", *pmdname = NULL; local [all...] |
| /src/crypto/external/apache2/openssl/dist/providers/common/include/prov/ |
| provider_util.h | 63 * Fetch a digest from the specified libctx using the provided mdname and 67 const char *mdname, const char *propquery); 94 * If any of the supplied ciphername/mdname etc are NULL then the values 100 const char *mdname, 127 const char *mdname,
|
| /src/crypto/external/bsd/openssl/dist/providers/common/include/prov/ |
| provider_util.h | 63 * Fetch a digest from the specified libctx using the provided mdname and 67 const char *mdname, const char *propquery); 92 * If any of the supplied ciphername/mdname etc are NULL then the values 98 const char *mdname, 125 const char *mdname,
|
| /src/crypto/external/apache2/openssl/dist/providers/implementations/signature/ |
| sm2_sig.c | 76 char mdname[OSSL_MAX_NAME_SIZE]; member in struct:__anon596 92 static int sm2sig_set_mdname(PROV_SM2_CTX *psm2ctx, const char *mdname) 95 psm2ctx->md = EVP_MD_fetch(psm2ctx->libctx, psm2ctx->mdname, 106 if (mdname == NULL) 109 if (strlen(mdname) >= sizeof(psm2ctx->mdname) 110 || !EVP_MD_is_a(psm2ctx->md, mdname)) { 112 mdname); 116 OPENSSL_strlcpy(psm2ctx->mdname, mdname, sizeof(psm2ctx->mdname)) 479 char *mdname = NULL; local [all...] |
| ecdsa_sig.c | 101 char mdname[OSSL_MAX_NAME_SIZE]; member in struct:__anon582 167 const char *mdname, const char *mdprops, 176 if (mdname == NULL) 179 mdname_len = strlen(mdname); 180 if (mdname_len >= sizeof(ctx->mdname)) { 182 "%s exceeds name buffer length", mdname); 187 md = EVP_MD_fetch(ctx->libctx, mdname, mdprops); 190 "%s could not be fetched", mdname); 196 "%s has invalid md size %d", mdname, md_size); 203 "digest=%s", mdname); 352 const char *mdname = NULL; local 781 char mdname[OSSL_MAX_NAME_SIZE] = "", *pmdname = mdname; local [all...] |
| dsa_sig.c | 104 char mdname[OSSL_MAX_NAME_SIZE]; member in struct:__anon581 150 const char *mdname, const char *mdprops, 158 if (mdname != NULL) { 161 size_t mdname_len = strlen(mdname); 164 md = EVP_MD_fetch(ctx->libctx, mdname, mdprops); 169 "%s could not be fetched", mdname); 174 "digest=%s", mdname); 177 if (mdname_len >= sizeof(ctx->mdname)) { 179 "%s exceeds name buffer length", mdname); 204 if (ctx->mdname[0] != '\0 764 char mdname[OSSL_MAX_NAME_SIZE] = "", *pmdname = mdname; local [all...] |
| rsa_sig.c | 128 char mdname[OSSL_MAX_NAME_SIZE]; /* Purely informational */ member in struct:__anon594 177 const char *mdname, const char *mgf1_mdname, 182 if (mdname != NULL || mdnid != NID_undef) { 195 if ((mdname != NULL && !EVP_MD_is_a(prsactx->md, mdname)) 370 static int rsa_setup_md(PROV_RSA_CTX *ctx, const char *mdname, 378 if (mdname != NULL) { 380 size_t mdname_len = strlen(mdname); 382 md = EVP_MD_fetch(ctx->libctx, mdname, mdprops); 386 "%s could not be fetched", mdname); 551 const char *mdname, *mgf1mdname; local 1535 char mdname[OSSL_MAX_NAME_SIZE] = "", *pmdname = NULL; local [all...] |
| /src/crypto/external/apache2/openssl/dist/include/internal/ |
| hpke_util.h | 35 const char *mdname; /* hash alg name for the HKDF */ member in struct:__anon418 48 const char *mdname; /* hash alg name for the HKDF */ member in struct:__anon419 96 EVP_KDF_CTX *ossl_kdf_ctx_create(const char *kdfname, const char *mdname,
|
| /src/crypto/external/bsd/openssl/dist/crypto/evp/ |
| m_sigver.c | 31 static const char *canon_mdname(const char *mdname) 33 if (mdname != NULL && strcmp(mdname, "UNDEF") == 0) 36 return mdname; 40 const EVP_MD *type, const char *mdname, 101 if (mdname == NULL && type == NULL) 102 mdname = canon_mdname(EVP_MD_get0_name(ctx->reqdigest)); 218 if (mdname == NULL) 219 mdname = canon_mdname(EVP_MD_get0_name(type)); 221 if (mdname == NULL && !reinit) [all...] |
| p5_crpt.c | 42 const char *mdname = EVP_MD_name(md); local 95 (char *)mdname, 0);
|
| /src/crypto/external/apache2/openssl/dist/crypto/ec/ |
| ecdh_kdf.c | 33 const char *mdname = EVP_MD_get0_name(md); local 38 (char *)mdname, 0);
|
| /src/crypto/external/bsd/openssl/dist/crypto/ec/ |
| ecdh_kdf.c | 33 const char *mdname = EVP_MD_get0_name(md); local 38 (char *)mdname, 0);
|
| /src/crypto/external/apache2/openssl/dist/providers/common/ |
| provider_util.c | 168 const char *mdname, const char *propquery) 171 pd->md = pd->alloc_md = EVP_MD_fetch(libctx, mdname, propquery); 233 const char *mdname, 243 if (mdname == NULL) { 249 mdname = p->data; 271 if (mdname != NULL) 273 (char *)mdname, 0); 301 const char *mdname, 340 if (ossl_prov_set_macctx(*macctx, params, ciphername, mdname, NULL,
|
| /src/crypto/external/bsd/openssl/dist/providers/common/ |
| provider_util.c | 168 const char *mdname, const char *propquery) 171 pd->md = pd->alloc_md = EVP_MD_fetch(libctx, mdname, propquery); 227 const char *mdname, 237 if (mdname == NULL) { 242 mdname = p->data; 263 if (mdname != NULL) 265 (char *)mdname, 0); 294 const char *mdname, 332 if (ossl_prov_set_macctx(*macctx, params, ciphername, mdname, NULL,
|
| /src/crypto/external/apache2/openssl/dist/crypto/crmf/ |
| crmf_pbm.c | 134 char mdname[OSSL_MAX_NAME_SIZE]; local 157 OBJ_obj2txt(mdname, sizeof(mdname), pbmp->owf->algorithm, 0); 158 if ((owf = EVP_MD_fetch(libctx, mdname, propq)) == NULL) {
|
| /src/crypto/external/bsd/openssl/dist/crypto/crmf/ |
| crmf_pbm.c | 135 char mdname[OSSL_MAX_NAME_SIZE]; local 158 OBJ_obj2txt(mdname, sizeof(mdname), pbmp->owf->algorithm, 0); 159 if ((owf = EVP_MD_fetch(libctx, mdname, propq)) == NULL) {
|
| /src/crypto/external/apache2/openssl/dist/crypto/dh/ |
| dh_kdf.c | 38 const char *mdname = EVP_MD_get0_name(md); local 48 (char *)mdname, 0);
|
| /src/crypto/external/bsd/openssl/dist/crypto/dh/ |
| dh_kdf.c | 39 const char *mdname = EVP_MD_get0_name(md); local 49 (char *)mdname, 0);
|
| /src/crypto/external/apache2/openssl/dist/crypto/evp/ |
| m_sigver.c | 29 static const char *canon_mdname(const char *mdname) 31 if (mdname != NULL && strcmp(mdname, "UNDEF") == 0) 34 return mdname; 38 const EVP_MD *type, const char *mdname, 94 if (mdname == NULL && type == NULL) 95 mdname = canon_mdname(EVP_MD_get0_name(ctx->reqdigest)); 209 if (mdname == NULL) 210 mdname = canon_mdname(EVP_MD_get0_name(type)); 212 if (mdname == NULL && !reinit) [all...] |
| p5_crpt.c | 42 const char *mdname = EVP_MD_name(md); local 94 (char *)mdname, 0);
|
| /src/crypto/external/bsd/openssl/dist/providers/implementations/asymciphers/ |
| rsa_enc.c | 428 char mdname[OSSL_MAX_NAME_SIZE]; local 439 str = mdname; 440 if (!OSSL_PARAM_get_utf8_string(p, &str, sizeof(mdname))) 452 prsactx->oaep_md = EVP_MD_fetch(prsactx->libctx, mdname, mdprops); 502 str = mdname; 503 if (!OSSL_PARAM_get_utf8_string(p, &str, sizeof(mdname))) 517 prsactx->mgf1_md = EVP_MD_fetch(prsactx->libctx, mdname, str);
|
| /src/crypto/external/apache2/openssl/dist/crypto/ffc/ |
| ffc_params.c | 134 params->mdname = alg; 188 dst->mdname = src->mdname; 270 if (ffc->mdname != NULL 273 ffc->mdname))
|