Lines Matching refs:name

196 static int opt_found(const char *name, unsigned int *result,
202 if (strcmp(name, pairs->name) == 0) {
274 /* name of algorithms to test. MUST BE KEEP IN SYNC with above enum ! */
508 static int have_md(const char *name)
513 if (opt_md_silent(name, &md)) {
524 static int have_cipher(const char *name)
529 if (opt_cipher_silent(name, &cipher)) {
1261 const char *name;
1400 const char *name;
1419 * add tests over more curves, simply add the curve NID and curve name to
1472 OPENSSL_assert(strcmp(eddsa_choices[EdDSA_NUM - 1].name, "ed448") == 0);
1475 OPENSSL_assert(strcmp(ecdh_choices[EC_NUM - 1].name, "ecdhx448") == 0);
1478 OPENSSL_assert(strcmp(ecdsa_choices[ECDSA_NUM - 1].name, "ecdsabrp512t1") == 0);
1482 OPENSSL_assert(strcmp(sm2_choices[SM2_NUM - 1].name, "curveSM2") == 0);
1545 * So store the name here and run setup_engine() later on.
1993 "HMAC name");
2298 + strlen(evp_mac_ciphername), "CMAC name");
2745 pkey_print_message("sign", ed_curves[testnum].name,
2756 ed_curves[testnum].name, d);
2774 pkey_print_message("verify", ed_curves[testnum].name,
2784 ed_curves[testnum].name, d);
2877 pkey_print_message("sign", sm2_curves[testnum].name,
2888 sm2_curves[testnum].name, d);
2907 pkey_print_message("verify", sm2_curves[testnum].name,
2917 sm2_curves[testnum].name, d);
3197 ec_curves[k].bits, ec_curves[k].name,
3217 ec_curves[k].bits, ec_curves[k].name,
3232 k, ed_curves[k].bits, ed_curves[k].name,
3236 ed_curves[k].bits, ed_curves[k].name,
3253 k, sm2_curves[k].bits, sm2_curves[k].name,
3257 sm2_curves[k].bits, sm2_curves[k].name,
3644 app_bail_out("failed to get cipher name\n");