HomeSort by: relevance | last modified time | path
    Searched refs:mdname (Results 1 - 25 of 81) sorted by relevancy

1 2 3 4

  /src/crypto/external/bsd/openssl/dist/providers/implementations/signature/
dsa_sig.c 78 char mdname[OSSL_MAX_NAME_SIZE]; member in struct:__anon1622
121 const char *mdname, const char *mdprops)
126 if (mdname != NULL) {
129 EVP_MD *md = EVP_MD_fetch(ctx->libctx, mdname, mdprops);
132 size_t mdname_len = strlen(mdname);
137 "%s could not be fetched", mdname);
140 "digest=%s", mdname);
141 if (mdname_len >= sizeof(ctx->mdname))
143 "%s exceeds name buffer length", mdname);
149 if (ctx->mdname[0] != '\0' && !EVP_MD_is_a(md, ctx->mdname))
488 char mdname[OSSL_MAX_NAME_SIZE] = "", *pmdname = mdname; local
    [all...]
sm2_sig.c 76 char mdname[OSSL_MAX_NAME_SIZE]; member in struct:__anon1635
93 static int sm2sig_set_mdname(PROV_SM2_CTX *psm2ctx, const char *mdname)
96 psm2ctx->md = EVP_MD_fetch(psm2ctx->libctx, psm2ctx->mdname,
101 if (mdname == NULL)
104 if (strlen(mdname) >= sizeof(psm2ctx->mdname)
105 || !EVP_MD_is_a(psm2ctx->md, mdname)) {
107 mdname);
111 OPENSSL_strlcpy(psm2ctx->mdname, mdname, sizeof(psm2ctx->mdname))
471 char *mdname = NULL; local
    [all...]
ecdsa_sig.c 67 char mdname[OSSL_MAX_NAME_SIZE]; member in struct:__anon1623
215 static int ecdsa_setup_md(PROV_ECDSA_CTX *ctx, const char *mdname,
223 if (mdname == NULL)
226 mdname_len = strlen(mdname);
227 if (mdname_len >= sizeof(ctx->mdname)) {
229 "%s exceeds name buffer length", mdname);
234 md = EVP_MD_fetch(ctx->libctx, mdname, mdprops);
237 "%s could not be fetched", mdname);
245 "digest=%s", mdname);
251 if (ctx->mdname[0] != '\0' && !EVP_MD_is_a(md, ctx->mdname))
495 char mdname[OSSL_MAX_NAME_SIZE] = "", *pmdname = mdname; local
    [all...]
rsa_sig.c 94 char mdname[OSSL_MAX_NAME_SIZE]; /* Purely informational */ member in struct:__anon1634
123 const char *mdname, const char *mgf1_mdname,
128 if (mdname != NULL || mdnid != NID_undef) {
141 if ((mdname != NULL && !EVP_MD_is_a(prsactx->md, mdname))
283 static int rsa_setup_md(PROV_RSA_CTX *ctx, const char *mdname,
289 if (mdname != NULL) {
290 EVP_MD *md = EVP_MD_fetch(ctx->libctx, mdname, mdprops);
294 size_t mdname_len = strlen(mdname);
298 || !rsa_check_padding(ctx, mdname, NULL, md_nid
430 const char *mdname, *mgf1mdname; local
1155 char mdname[OSSL_MAX_NAME_SIZE] = "", *pmdname = NULL; local
    [all...]
  /src/crypto/external/apache2/openssl/dist/providers/common/include/prov/
provider_util.h 63 * Fetch a digest from the specified libctx using the provided mdname and
67 const char *mdname, const char *propquery);
94 * If any of the supplied ciphername/mdname etc are NULL then the values
100 const char *mdname,
127 const char *mdname,
  /src/crypto/external/bsd/openssl/dist/providers/common/include/prov/
provider_util.h 63 * Fetch a digest from the specified libctx using the provided mdname and
67 const char *mdname, const char *propquery);
92 * If any of the supplied ciphername/mdname etc are NULL then the values
98 const char *mdname,
125 const char *mdname,
  /src/crypto/external/apache2/openssl/dist/providers/implementations/signature/
sm2_sig.c 76 char mdname[OSSL_MAX_NAME_SIZE]; member in struct:__anon596
92 static int sm2sig_set_mdname(PROV_SM2_CTX *psm2ctx, const char *mdname)
95 psm2ctx->md = EVP_MD_fetch(psm2ctx->libctx, psm2ctx->mdname,
106 if (mdname == NULL)
109 if (strlen(mdname) >= sizeof(psm2ctx->mdname)
110 || !EVP_MD_is_a(psm2ctx->md, mdname)) {
112 mdname);
116 OPENSSL_strlcpy(psm2ctx->mdname, mdname, sizeof(psm2ctx->mdname))
479 char *mdname = NULL; local
    [all...]
ecdsa_sig.c 101 char mdname[OSSL_MAX_NAME_SIZE]; member in struct:__anon582
167 const char *mdname, const char *mdprops,
176 if (mdname == NULL)
179 mdname_len = strlen(mdname);
180 if (mdname_len >= sizeof(ctx->mdname)) {
182 "%s exceeds name buffer length", mdname);
187 md = EVP_MD_fetch(ctx->libctx, mdname, mdprops);
190 "%s could not be fetched", mdname);
196 "%s has invalid md size %d", mdname, md_size);
203 "digest=%s", mdname);
352 const char *mdname = NULL; local
781 char mdname[OSSL_MAX_NAME_SIZE] = "", *pmdname = mdname; local
    [all...]
dsa_sig.c 104 char mdname[OSSL_MAX_NAME_SIZE]; member in struct:__anon581
150 const char *mdname, const char *mdprops,
158 if (mdname != NULL) {
161 size_t mdname_len = strlen(mdname);
164 md = EVP_MD_fetch(ctx->libctx, mdname, mdprops);
169 "%s could not be fetched", mdname);
174 "digest=%s", mdname);
177 if (mdname_len >= sizeof(ctx->mdname)) {
179 "%s exceeds name buffer length", mdname);
204 if (ctx->mdname[0] != '\0
764 char mdname[OSSL_MAX_NAME_SIZE] = "", *pmdname = mdname; local
    [all...]
rsa_sig.c 128 char mdname[OSSL_MAX_NAME_SIZE]; /* Purely informational */ member in struct:__anon594
177 const char *mdname, const char *mgf1_mdname,
182 if (mdname != NULL || mdnid != NID_undef) {
195 if ((mdname != NULL && !EVP_MD_is_a(prsactx->md, mdname))
370 static int rsa_setup_md(PROV_RSA_CTX *ctx, const char *mdname,
378 if (mdname != NULL) {
380 size_t mdname_len = strlen(mdname);
382 md = EVP_MD_fetch(ctx->libctx, mdname, mdprops);
386 "%s could not be fetched", mdname);
551 const char *mdname, *mgf1mdname; local
1535 char mdname[OSSL_MAX_NAME_SIZE] = "", *pmdname = NULL; local
    [all...]
  /src/crypto/external/apache2/openssl/dist/include/internal/
hpke_util.h 35 const char *mdname; /* hash alg name for the HKDF */ member in struct:__anon418
48 const char *mdname; /* hash alg name for the HKDF */ member in struct:__anon419
96 EVP_KDF_CTX *ossl_kdf_ctx_create(const char *kdfname, const char *mdname,
  /src/crypto/external/bsd/openssl/dist/crypto/evp/
m_sigver.c 31 static const char *canon_mdname(const char *mdname)
33 if (mdname != NULL && strcmp(mdname, "UNDEF") == 0)
36 return mdname;
40 const EVP_MD *type, const char *mdname,
101 if (mdname == NULL && type == NULL)
102 mdname = canon_mdname(EVP_MD_get0_name(ctx->reqdigest));
218 if (mdname == NULL)
219 mdname = canon_mdname(EVP_MD_get0_name(type));
221 if (mdname == NULL && !reinit)
    [all...]
p5_crpt.c 42 const char *mdname = EVP_MD_name(md); local
95 (char *)mdname, 0);
  /src/crypto/external/apache2/openssl/dist/crypto/ec/
ecdh_kdf.c 33 const char *mdname = EVP_MD_get0_name(md); local
38 (char *)mdname, 0);
  /src/crypto/external/bsd/openssl/dist/crypto/ec/
ecdh_kdf.c 33 const char *mdname = EVP_MD_get0_name(md); local
38 (char *)mdname, 0);
  /src/crypto/external/apache2/openssl/dist/providers/common/
provider_util.c 168 const char *mdname, const char *propquery)
171 pd->md = pd->alloc_md = EVP_MD_fetch(libctx, mdname, propquery);
233 const char *mdname,
243 if (mdname == NULL) {
249 mdname = p->data;
271 if (mdname != NULL)
273 (char *)mdname, 0);
301 const char *mdname,
340 if (ossl_prov_set_macctx(*macctx, params, ciphername, mdname, NULL,
  /src/crypto/external/bsd/openssl/dist/providers/common/
provider_util.c 168 const char *mdname, const char *propquery)
171 pd->md = pd->alloc_md = EVP_MD_fetch(libctx, mdname, propquery);
227 const char *mdname,
237 if (mdname == NULL) {
242 mdname = p->data;
263 if (mdname != NULL)
265 (char *)mdname, 0);
294 const char *mdname,
332 if (ossl_prov_set_macctx(*macctx, params, ciphername, mdname, NULL,
  /src/crypto/external/apache2/openssl/dist/crypto/crmf/
crmf_pbm.c 134 char mdname[OSSL_MAX_NAME_SIZE]; local
157 OBJ_obj2txt(mdname, sizeof(mdname), pbmp->owf->algorithm, 0);
158 if ((owf = EVP_MD_fetch(libctx, mdname, propq)) == NULL) {
  /src/crypto/external/bsd/openssl/dist/crypto/crmf/
crmf_pbm.c 135 char mdname[OSSL_MAX_NAME_SIZE]; local
158 OBJ_obj2txt(mdname, sizeof(mdname), pbmp->owf->algorithm, 0);
159 if ((owf = EVP_MD_fetch(libctx, mdname, propq)) == NULL) {
  /src/crypto/external/apache2/openssl/dist/crypto/dh/
dh_kdf.c 38 const char *mdname = EVP_MD_get0_name(md); local
48 (char *)mdname, 0);
  /src/crypto/external/bsd/openssl/dist/crypto/dh/
dh_kdf.c 39 const char *mdname = EVP_MD_get0_name(md); local
49 (char *)mdname, 0);
  /src/crypto/external/apache2/openssl/dist/crypto/evp/
m_sigver.c 29 static const char *canon_mdname(const char *mdname)
31 if (mdname != NULL && strcmp(mdname, "UNDEF") == 0)
34 return mdname;
38 const EVP_MD *type, const char *mdname,
94 if (mdname == NULL && type == NULL)
95 mdname = canon_mdname(EVP_MD_get0_name(ctx->reqdigest));
209 if (mdname == NULL)
210 mdname = canon_mdname(EVP_MD_get0_name(type));
212 if (mdname == NULL && !reinit)
    [all...]
p5_crpt.c 42 const char *mdname = EVP_MD_name(md); local
94 (char *)mdname, 0);
  /src/crypto/external/bsd/openssl/dist/providers/implementations/asymciphers/
rsa_enc.c 428 char mdname[OSSL_MAX_NAME_SIZE]; local
439 str = mdname;
440 if (!OSSL_PARAM_get_utf8_string(p, &str, sizeof(mdname)))
452 prsactx->oaep_md = EVP_MD_fetch(prsactx->libctx, mdname, mdprops);
502 str = mdname;
503 if (!OSSL_PARAM_get_utf8_string(p, &str, sizeof(mdname)))
517 prsactx->mgf1_md = EVP_MD_fetch(prsactx->libctx, mdname, str);
  /src/crypto/external/apache2/openssl/dist/crypto/ffc/
ffc_params.c 134 params->mdname = alg;
188 dst->mdname = src->mdname;
270 if (ffc->mdname != NULL
273 ffc->mdname))

Completed in 37 milliseconds

1 2 3 4