Lines Matching defs:mdname

94     char mdname[OSSL_MAX_NAME_SIZE]; /* Purely informational */
123 const char *mdname, const char *mgf1_mdname,
128 if (mdname != NULL || mdnid != NID_undef) {
141 if ((mdname != NULL && !EVP_MD_is_a(prsactx->md, mdname))
283 static int rsa_setup_md(PROV_RSA_CTX *ctx, const char *mdname,
289 if (mdname != NULL) {
290 EVP_MD *md = EVP_MD_fetch(ctx->libctx, mdname, mdprops);
294 size_t mdname_len = strlen(mdname);
298 || !rsa_check_padding(ctx, mdname, NULL, md_nid)
299 || mdname_len >= sizeof(ctx->mdname)) {
302 "%s could not be fetched", mdname);
305 "digest=%s", mdname);
306 if (mdname_len >= sizeof(ctx->mdname))
308 "%s exceeds name buffer length", mdname);
314 if (ctx->mdname[0] != '\0' && !EVP_MD_is_a(md, ctx->mdname)) {
316 "digest %s != %s", mdname, ctx->mdname);
332 OPENSSL_strlcpy(ctx->mgf1_mdname, mdname, sizeof(ctx->mgf1_mdname));
341 OPENSSL_strlcpy(ctx->mdname, mdname, sizeof(ctx->mdname));
347 static int rsa_setup_mgf1_md(PROV_RSA_CTX *ctx, const char *mdname,
357 if ((md = EVP_MD_fetch(ctx->libctx, mdname, mdprops)) == NULL) {
359 "%s could not be fetched", mdname);
364 || !rsa_check_padding(ctx, NULL, mdname, mdnid)) {
367 "digest=%s", mdname);
371 len = OPENSSL_strlcpy(ctx->mgf1_mdname, mdname, sizeof(ctx->mgf1_mdname));
374 "%s exceeds name buffer length", mdname);
430 const char *mdname, *mgf1mdname;
433 mdname = ossl_rsa_oaeppss_nid2name(md_nid);
436 if (mdname == NULL) {
447 len = OPENSSL_strlcpy(prsactx->mdname, mdname,
448 sizeof(prsactx->mdname));
449 if (len >= sizeof(prsactx->mdname)) {
465 || !rsa_setup_md(prsactx, mdname, prsactx->propq)
845 static int rsa_digest_signverify_init(void *vprsactx, const char *mdname,
857 if (mdname != NULL
859 && (mdname[0] == '\0' || OPENSSL_strcasecmp(prsactx->mdname, mdname) != 0)
860 && !rsa_setup_md(prsactx, mdname, prsactx->propq))
894 static int rsa_digest_sign_init(void *vprsactx, const char *mdname,
899 return rsa_digest_signverify_init(vprsactx, mdname, vrsa,
931 static int rsa_digest_verify_init(void *vprsactx, const char *mdname,
936 return rsa_digest_signverify_init(vprsactx, mdname, vrsa,
1088 if (p != NULL && !OSSL_PARAM_set_utf8_string(p, prsactx->mdname))
1154 char mdname[OSSL_MAX_NAME_SIZE] = "", *pmdname = NULL;
1173 pmdname = mdname;
1174 if (!OSSL_PARAM_get_utf8_string(p, &pmdname, sizeof(mdname)))