/third_party/node/deps/openssl/openssl/providers/implementations/signature/ |
H A D | ecdsa_sig.c | 67 char mdname[OSSL_MAX_NAME_SIZE]; member 215 static int ecdsa_setup_md(PROV_ECDSA_CTX *ctx, const char *mdname, in ecdsa_setup_md() argument 223 if (mdname == NULL) in ecdsa_setup_md() 226 mdname_len = strlen(mdname); in ecdsa_setup_md() 227 if (mdname_len >= sizeof(ctx->mdname)) { in ecdsa_setup_md() 229 "%s exceeds name buffer length", mdname); in ecdsa_setup_md() 234 md = EVP_MD_fetch(ctx->libctx, mdname, mdprops); in ecdsa_setup_md() 237 "%s could not be fetched", mdname); in ecdsa_setup_md() 245 "digest=%s", mdname); in ecdsa_setup_md() 251 if (ctx->mdname[ in ecdsa_setup_md() 281 ecdsa_digest_signverify_init(void *vctx, const char *mdname, void *ec, const OSSL_PARAM params[], int operation) ecdsa_digest_signverify_init() argument 311 ecdsa_digest_sign_init(void *vctx, const char *mdname, void *ec, const OSSL_PARAM params[]) ecdsa_digest_sign_init() argument 318 ecdsa_digest_verify_init(void *vctx, const char *mdname, void *ec, const OSSL_PARAM params[]) ecdsa_digest_verify_init() argument 495 char mdname[OSSL_MAX_NAME_SIZE] = "", *pmdname = mdname; ecdsa_set_ctx_params() local [all...] |
H A D | dsa_sig.c | 78 char mdname[OSSL_MAX_NAME_SIZE]; member 121 const char *mdname, const char *mdprops) in dsa_setup_md() 126 if (mdname != NULL) { in dsa_setup_md() 129 EVP_MD *md = EVP_MD_fetch(ctx->libctx, mdname, mdprops); in dsa_setup_md() 132 size_t mdname_len = strlen(mdname); in dsa_setup_md() 137 "%s could not be fetched", mdname); in dsa_setup_md() 140 "digest=%s", mdname); in dsa_setup_md() 141 if (mdname_len >= sizeof(ctx->mdname)) in dsa_setup_md() 143 "%s exceeds name buffer length", mdname); in dsa_setup_md() 149 if (ctx->mdname[ in dsa_setup_md() 120 dsa_setup_md(PROV_DSA_CTX *ctx, const char *mdname, const char *mdprops) dsa_setup_md() argument 274 dsa_digest_signverify_init(void *vpdsactx, const char *mdname, void *vdsa, const OSSL_PARAM params[], int operation) dsa_digest_signverify_init() argument 308 dsa_digest_sign_init(void *vpdsactx, const char *mdname, void *vdsa, const OSSL_PARAM params[]) dsa_digest_sign_init() argument 315 dsa_digest_verify_init(void *vpdsactx, const char *mdname, void *vdsa, const OSSL_PARAM params[]) dsa_digest_verify_init() argument 488 char mdname[OSSL_MAX_NAME_SIZE] = "", *pmdname = mdname; dsa_set_ctx_params() local [all...] |
H A D | rsa_sig.c | 94 char mdname[OSSL_MAX_NAME_SIZE]; /* Purely informational */ member 123 const char *mdname, const char *mgf1_mdname, in rsa_check_padding() 128 if (mdname != NULL || mdnid != NID_undef) { in rsa_check_padding() 141 if ((mdname != NULL && !EVP_MD_is_a(prsactx->md, mdname)) in rsa_check_padding() 283 static int rsa_setup_md(PROV_RSA_CTX *ctx, const char *mdname, in rsa_setup_md() argument 289 if (mdname != NULL) { in rsa_setup_md() 290 EVP_MD *md = EVP_MD_fetch(ctx->libctx, mdname, mdprops); in rsa_setup_md() 294 size_t mdname_len = strlen(mdname); in rsa_setup_md() 298 || !rsa_check_padding(ctx, mdname, NUL in rsa_setup_md() 122 rsa_check_padding(const PROV_RSA_CTX *prsactx, const char *mdname, const char *mgf1_mdname, int mdnid) rsa_check_padding() argument 347 rsa_setup_mgf1_md(PROV_RSA_CTX *ctx, const char *mdname, const char *mdprops) rsa_setup_mgf1_md() argument 430 const char *mdname, *mgf1mdname; rsa_signverify_init() local 845 rsa_digest_signverify_init(void *vprsactx, const char *mdname, void *vrsa, const OSSL_PARAM params[], int operation) rsa_digest_signverify_init() argument 894 rsa_digest_sign_init(void *vprsactx, const char *mdname, void *vrsa, const OSSL_PARAM params[]) rsa_digest_sign_init() argument 931 rsa_digest_verify_init(void *vprsactx, const char *mdname, void *vrsa, const OSSL_PARAM params[]) rsa_digest_verify_init() argument 1155 char mdname[OSSL_MAX_NAME_SIZE] = "", *pmdname = NULL; rsa_set_ctx_params() local [all...] |
H A D | sm2_sig.c | 76 char mdname[OSSL_MAX_NAME_SIZE]; member 93 static int sm2sig_set_mdname(PROV_SM2_CTX *psm2ctx, const char *mdname) in sm2sig_set_mdname() argument 96 psm2ctx->md = EVP_MD_fetch(psm2ctx->libctx, psm2ctx->mdname, in sm2sig_set_mdname() 101 if (mdname == NULL) in sm2sig_set_mdname() 104 if (strlen(mdname) >= sizeof(psm2ctx->mdname) in sm2sig_set_mdname() 105 || !EVP_MD_is_a(psm2ctx->md, mdname)) { in sm2sig_set_mdname() 107 mdname); in sm2sig_set_mdname() 111 OPENSSL_strlcpy(psm2ctx->mdname, mdname, sizeo in sm2sig_set_mdname() 204 sm2sig_digest_signverify_init(void *vpsm2ctx, const char *mdname, void *ec, const OSSL_PARAM params[]) sm2sig_digest_signverify_init() argument 471 char *mdname = NULL; sm2sig_set_ctx_params() local [all...] |
/third_party/openssl/providers/implementations/signature/ |
H A D | ecdsa_sig.c | 67 char mdname[OSSL_MAX_NAME_SIZE]; member 215 static int ecdsa_setup_md(PROV_ECDSA_CTX *ctx, const char *mdname, in ecdsa_setup_md() argument 223 if (mdname == NULL) in ecdsa_setup_md() 226 mdname_len = strlen(mdname); in ecdsa_setup_md() 227 if (mdname_len >= sizeof(ctx->mdname)) { in ecdsa_setup_md() 229 "%s exceeds name buffer length", mdname); in ecdsa_setup_md() 234 md = EVP_MD_fetch(ctx->libctx, mdname, mdprops); in ecdsa_setup_md() 237 "%s could not be fetched", mdname); in ecdsa_setup_md() 245 "digest=%s", mdname); in ecdsa_setup_md() 251 if (ctx->mdname[ in ecdsa_setup_md() 281 ecdsa_digest_signverify_init(void *vctx, const char *mdname, void *ec, const OSSL_PARAM params[], int operation) ecdsa_digest_signverify_init() argument 311 ecdsa_digest_sign_init(void *vctx, const char *mdname, void *ec, const OSSL_PARAM params[]) ecdsa_digest_sign_init() argument 318 ecdsa_digest_verify_init(void *vctx, const char *mdname, void *ec, const OSSL_PARAM params[]) ecdsa_digest_verify_init() argument 495 char mdname[OSSL_MAX_NAME_SIZE] = "", *pmdname = mdname; ecdsa_set_ctx_params() local [all...] |
H A D | dsa_sig.c | 78 char mdname[OSSL_MAX_NAME_SIZE]; member 121 const char *mdname, const char *mdprops) in dsa_setup_md() 126 if (mdname != NULL) { in dsa_setup_md() 129 EVP_MD *md = EVP_MD_fetch(ctx->libctx, mdname, mdprops); in dsa_setup_md() 132 size_t mdname_len = strlen(mdname); in dsa_setup_md() 137 "%s could not be fetched", mdname); in dsa_setup_md() 140 "digest=%s", mdname); in dsa_setup_md() 141 if (mdname_len >= sizeof(ctx->mdname)) in dsa_setup_md() 143 "%s exceeds name buffer length", mdname); in dsa_setup_md() 149 if (ctx->mdname[ in dsa_setup_md() 120 dsa_setup_md(PROV_DSA_CTX *ctx, const char *mdname, const char *mdprops) dsa_setup_md() argument 274 dsa_digest_signverify_init(void *vpdsactx, const char *mdname, void *vdsa, const OSSL_PARAM params[], int operation) dsa_digest_signverify_init() argument 308 dsa_digest_sign_init(void *vpdsactx, const char *mdname, void *vdsa, const OSSL_PARAM params[]) dsa_digest_sign_init() argument 315 dsa_digest_verify_init(void *vpdsactx, const char *mdname, void *vdsa, const OSSL_PARAM params[]) dsa_digest_verify_init() argument 488 char mdname[OSSL_MAX_NAME_SIZE] = "", *pmdname = mdname; dsa_set_ctx_params() local [all...] |
H A D | rsa_sig.c | 94 char mdname[OSSL_MAX_NAME_SIZE]; /* Purely informational */ member 123 const char *mdname, const char *mgf1_mdname, in rsa_check_padding() 128 if (mdname != NULL || mdnid != NID_undef) { in rsa_check_padding() 141 if ((mdname != NULL && !EVP_MD_is_a(prsactx->md, mdname)) in rsa_check_padding() 283 static int rsa_setup_md(PROV_RSA_CTX *ctx, const char *mdname, in rsa_setup_md() argument 289 if (mdname != NULL) { in rsa_setup_md() 290 EVP_MD *md = EVP_MD_fetch(ctx->libctx, mdname, mdprops); in rsa_setup_md() 294 size_t mdname_len = strlen(mdname); in rsa_setup_md() 298 || !rsa_check_padding(ctx, mdname, NUL in rsa_setup_md() 122 rsa_check_padding(const PROV_RSA_CTX *prsactx, const char *mdname, const char *mgf1_mdname, int mdnid) rsa_check_padding() argument 347 rsa_setup_mgf1_md(PROV_RSA_CTX *ctx, const char *mdname, const char *mdprops) rsa_setup_mgf1_md() argument 430 const char *mdname, *mgf1mdname; rsa_signverify_init() local 845 rsa_digest_signverify_init(void *vprsactx, const char *mdname, void *vrsa, const OSSL_PARAM params[], int operation) rsa_digest_signverify_init() argument 894 rsa_digest_sign_init(void *vprsactx, const char *mdname, void *vrsa, const OSSL_PARAM params[]) rsa_digest_sign_init() argument 931 rsa_digest_verify_init(void *vprsactx, const char *mdname, void *vrsa, const OSSL_PARAM params[]) rsa_digest_verify_init() argument 1154 char mdname[OSSL_MAX_NAME_SIZE] = "", *pmdname = NULL; rsa_set_ctx_params() local [all...] |
H A D | sm2_sig.c | 76 char mdname[OSSL_MAX_NAME_SIZE]; member 93 static int sm2sig_set_mdname(PROV_SM2_CTX *psm2ctx, const char *mdname) in sm2sig_set_mdname() argument 96 psm2ctx->md = EVP_MD_fetch(psm2ctx->libctx, psm2ctx->mdname, in sm2sig_set_mdname() 101 if (mdname == NULL) in sm2sig_set_mdname() 104 if (strlen(mdname) >= sizeof(psm2ctx->mdname) in sm2sig_set_mdname() 105 || !EVP_MD_is_a(psm2ctx->md, mdname)) { in sm2sig_set_mdname() 107 mdname); in sm2sig_set_mdname() 111 OPENSSL_strlcpy(psm2ctx->mdname, mdname, sizeo in sm2sig_set_mdname() 204 sm2sig_digest_signverify_init(void *vpsm2ctx, const char *mdname, void *ec, const OSSL_PARAM params[]) sm2sig_digest_signverify_init() argument 462 char *mdname = NULL; sm2sig_set_ctx_params() local [all...] |
/third_party/node/deps/openssl/openssl/crypto/evp/ |
H A D | m_sigver.c | 31 static const char *canon_mdname(const char *mdname) in canon_mdname() argument 33 if (mdname != NULL && strcmp(mdname, "UNDEF") == 0) in canon_mdname() 36 return mdname; in canon_mdname() 40 const EVP_MD *type, const char *mdname, in do_sigver_init() 101 if (mdname == NULL && type == NULL) in do_sigver_init() 102 mdname = canon_mdname(EVP_MD_get0_name(ctx->reqdigest)); in do_sigver_init() 218 if (mdname == NULL) in do_sigver_init() 219 mdname = canon_mdname(EVP_MD_get0_name(type)); in do_sigver_init() 221 if (mdname in do_sigver_init() 39 do_sigver_init(EVP_MD_CTX *ctx, EVP_PKEY_CTX **pctx, const EVP_MD *type, const char *mdname, OSSL_LIB_CTX *libctx, const char *props, ENGINE *e, EVP_PKEY *pkey, int ver, const OSSL_PARAM params[]) do_sigver_init() argument 374 EVP_DigestSignInit_ex(EVP_MD_CTX *ctx, EVP_PKEY_CTX **pctx, const char *mdname, OSSL_LIB_CTX *libctx, const char *props, EVP_PKEY *pkey, const OSSL_PARAM params[]) EVP_DigestSignInit_ex() argument 390 EVP_DigestVerifyInit_ex(EVP_MD_CTX *ctx, EVP_PKEY_CTX **pctx, const char *mdname, OSSL_LIB_CTX *libctx, const char *props, EVP_PKEY *pkey, const OSSL_PARAM params[]) EVP_DigestVerifyInit_ex() argument [all...] |
/third_party/openssl/crypto/evp/ |
H A D | m_sigver.c | 31 static const char *canon_mdname(const char *mdname) in canon_mdname() argument 33 if (mdname != NULL && strcmp(mdname, "UNDEF") == 0) in canon_mdname() 36 return mdname; in canon_mdname() 40 const EVP_MD *type, const char *mdname, in do_sigver_init() 101 if (mdname == NULL && type == NULL) in do_sigver_init() 102 mdname = canon_mdname(EVP_MD_get0_name(ctx->reqdigest)); in do_sigver_init() 218 if (mdname == NULL) in do_sigver_init() 219 mdname = canon_mdname(EVP_MD_get0_name(type)); in do_sigver_init() 221 if (mdname in do_sigver_init() 39 do_sigver_init(EVP_MD_CTX *ctx, EVP_PKEY_CTX **pctx, const EVP_MD *type, const char *mdname, OSSL_LIB_CTX *libctx, const char *props, ENGINE *e, EVP_PKEY *pkey, int ver, const OSSL_PARAM params[]) do_sigver_init() argument 374 EVP_DigestSignInit_ex(EVP_MD_CTX *ctx, EVP_PKEY_CTX **pctx, const char *mdname, OSSL_LIB_CTX *libctx, const char *props, EVP_PKEY *pkey, const OSSL_PARAM params[]) EVP_DigestSignInit_ex() argument 390 EVP_DigestVerifyInit_ex(EVP_MD_CTX *ctx, EVP_PKEY_CTX **pctx, const char *mdname, OSSL_LIB_CTX *libctx, const char *props, EVP_PKEY *pkey, const OSSL_PARAM params[]) EVP_DigestVerifyInit_ex() argument [all...] |
/third_party/node/deps/openssl/openssl/providers/common/ |
H A D | provider_util.c | 168 const char *mdname, const char *propquery) in ossl_prov_digest_fetch() 171 pd->md = pd->alloc_md = EVP_MD_fetch(libctx, mdname, propquery); in ossl_prov_digest_fetch() 227 const char *mdname, in ossl_prov_set_macctx() 237 if (mdname == NULL) { in ossl_prov_set_macctx() 242 mdname = p->data; in ossl_prov_set_macctx() 263 if (mdname != NULL) in ossl_prov_set_macctx() 265 (char *)mdname, 0); in ossl_prov_set_macctx() 294 const char *mdname, in ossl_prov_macctx_load_from_params() 332 if (ossl_prov_set_macctx(*macctx, params, ciphername, mdname, NULL, in ossl_prov_macctx_load_from_params() 167 ossl_prov_digest_fetch(PROV_DIGEST *pd, OSSL_LIB_CTX *libctx, const char *mdname, const char *propquery) ossl_prov_digest_fetch() argument 224 ossl_prov_set_macctx(EVP_MAC_CTX *macctx, const OSSL_PARAM params[], const char *ciphername, const char *mdname, const char *engine, const char *properties, const unsigned char *key, size_t keylen) ossl_prov_set_macctx() argument 290 ossl_prov_macctx_load_from_params(EVP_MAC_CTX **macctx, const OSSL_PARAM params[], const char *macname, const char *ciphername, const char *mdname, OSSL_LIB_CTX *libctx) ossl_prov_macctx_load_from_params() argument
|
/third_party/openssl/providers/common/ |
H A D | provider_util.c | 168 const char *mdname, const char *propquery) in ossl_prov_digest_fetch() 171 pd->md = pd->alloc_md = EVP_MD_fetch(libctx, mdname, propquery); in ossl_prov_digest_fetch() 227 const char *mdname, in ossl_prov_set_macctx() 237 if (mdname == NULL) { in ossl_prov_set_macctx() 242 mdname = p->data; in ossl_prov_set_macctx() 263 if (mdname != NULL) in ossl_prov_set_macctx() 265 (char *)mdname, 0); in ossl_prov_set_macctx() 294 const char *mdname, in ossl_prov_macctx_load_from_params() 332 if (ossl_prov_set_macctx(*macctx, params, ciphername, mdname, NULL, in ossl_prov_macctx_load_from_params() 167 ossl_prov_digest_fetch(PROV_DIGEST *pd, OSSL_LIB_CTX *libctx, const char *mdname, const char *propquery) ossl_prov_digest_fetch() argument 224 ossl_prov_set_macctx(EVP_MAC_CTX *macctx, const OSSL_PARAM params[], const char *ciphername, const char *mdname, const char *engine, const char *properties, const unsigned char *key, size_t keylen) ossl_prov_set_macctx() argument 290 ossl_prov_macctx_load_from_params(EVP_MAC_CTX **macctx, const OSSL_PARAM params[], const char *macname, const char *ciphername, const char *mdname, OSSL_LIB_CTX *libctx) ossl_prov_macctx_load_from_params() argument
|
/third_party/node/deps/openssl/openssl/providers/common/include/prov/ |
H A D | provider_util.h | 63 * Fetch a digest from the specified libctx using the provided mdname and 67 const char *mdname, const char *propquery); 92 * If any of the supplied ciphername/mdname etc are NULL then the values 98 const char *mdname, 125 const char *mdname,
|
/third_party/openssl/providers/common/include/prov/ |
H A D | provider_util.h | 63 * Fetch a digest from the specified libctx using the provided mdname and 67 const char *mdname, const char *propquery); 92 * If any of the supplied ciphername/mdname etc are NULL then the values 98 const char *mdname, 125 const char *mdname,
|
/third_party/node/deps/openssl/openssl/crypto/rsa/ |
H A D | rsa_lib.c | 886 const char *mdkey, const char *mdname, in int_set_rsa_md_name() 891 if (ctx == NULL || mdname == NULL || (ctx->operation & optype) == 0) { in int_set_rsa_md_name() 911 *p++ = OSSL_PARAM_construct_utf8_string(mdkey, (char *)mdname, 0); in int_set_rsa_md_name() 927 char *mdname, size_t mdnamesize) in int_get_rsa_md_name() 931 if (ctx == NULL || mdname == NULL || (ctx->operation & optype) == 0) { in int_get_rsa_md_name() 951 *p++ = OSSL_PARAM_construct_utf8_string(mdkey, (char *)mdname, mdnamesize); in int_get_rsa_md_name() 988 const char *mdname, in EVP_PKEY_CTX_set_rsa_pss_keygen_md_name() 992 OSSL_PKEY_PARAM_RSA_DIGEST, mdname, in EVP_PKEY_CTX_set_rsa_pss_keygen_md_name() 1010 int EVP_PKEY_CTX_set_rsa_oaep_md_name(EVP_PKEY_CTX *ctx, const char *mdname, in EVP_PKEY_CTX_set_rsa_oaep_md_name() argument 1015 OSSL_ASYM_CIPHER_PARAM_OAEP_DIGEST, mdname, in EVP_PKEY_CTX_set_rsa_oaep_md_name() 882 int_set_rsa_md_name(EVP_PKEY_CTX *ctx, int keytype, int optype, const char *mdkey, const char *mdname, const char *propkey, const char *mdprops) int_set_rsa_md_name() argument 922 int_get_rsa_md_name(EVP_PKEY_CTX *ctx, int keytype, int optype, const char *mdkey, char *mdname, size_t mdnamesize) int_get_rsa_md_name() argument 987 EVP_PKEY_CTX_set_rsa_pss_keygen_md_name(EVP_PKEY_CTX *ctx, const char *mdname, const char *mdprops) EVP_PKEY_CTX_set_rsa_pss_keygen_md_name() argument 1051 EVP_PKEY_CTX_set_rsa_mgf1_md_name(EVP_PKEY_CTX *ctx, const char *mdname, const char *mdprops) EVP_PKEY_CTX_set_rsa_mgf1_md_name() argument 1078 EVP_PKEY_CTX_set_rsa_pss_keygen_mgf1_md_name(EVP_PKEY_CTX *ctx, const char *mdname) EVP_PKEY_CTX_set_rsa_pss_keygen_mgf1_md_name() argument [all...] |
H A D | rsa_backend.c | 183 const char *mdname = in ossl_rsa_pss_params_30_todata() local 202 if ((mdname != NULL in ossl_rsa_pss_params_30_todata() 203 && !ossl_param_build_set_utf8_string(bld, params, key_md, mdname)) in ossl_rsa_pss_params_30_todata() 278 const char *mdname = NULL; in ossl_rsa_pss_params_30_fromdata() local 281 mdname = param_md->data; in ossl_rsa_pss_params_30_fromdata() 282 else if (!OSSL_PARAM_get_utf8_ptr(param_mgf, &mdname)) in ossl_rsa_pss_params_30_fromdata() 285 if ((md = EVP_MD_fetch(libctx, mdname, propq)) == NULL in ossl_rsa_pss_params_30_fromdata()
|
/third_party/openssl/crypto/rsa/ |
H A D | rsa_lib.c | 882 const char *mdkey, const char *mdname, in int_set_rsa_md_name() 887 if (ctx == NULL || mdname == NULL || (ctx->operation & optype) == 0) { in int_set_rsa_md_name() 907 *p++ = OSSL_PARAM_construct_utf8_string(mdkey, (char *)mdname, 0); in int_set_rsa_md_name() 923 char *mdname, size_t mdnamesize) in int_get_rsa_md_name() 927 if (ctx == NULL || mdname == NULL || (ctx->operation & optype) == 0) { in int_get_rsa_md_name() 947 *p++ = OSSL_PARAM_construct_utf8_string(mdkey, (char *)mdname, mdnamesize); in int_get_rsa_md_name() 984 const char *mdname, in EVP_PKEY_CTX_set_rsa_pss_keygen_md_name() 988 OSSL_PKEY_PARAM_RSA_DIGEST, mdname, in EVP_PKEY_CTX_set_rsa_pss_keygen_md_name() 1002 int EVP_PKEY_CTX_set_rsa_oaep_md_name(EVP_PKEY_CTX *ctx, const char *mdname, in EVP_PKEY_CTX_set_rsa_oaep_md_name() argument 1007 OSSL_ASYM_CIPHER_PARAM_OAEP_DIGEST, mdname, in EVP_PKEY_CTX_set_rsa_oaep_md_name() 878 int_set_rsa_md_name(EVP_PKEY_CTX *ctx, int keytype, int optype, const char *mdkey, const char *mdname, const char *propkey, const char *mdprops) int_set_rsa_md_name() argument 918 int_get_rsa_md_name(EVP_PKEY_CTX *ctx, int keytype, int optype, const char *mdkey, char *mdname, size_t mdnamesize) int_get_rsa_md_name() argument 983 EVP_PKEY_CTX_set_rsa_pss_keygen_md_name(EVP_PKEY_CTX *ctx, const char *mdname, const char *mdprops) EVP_PKEY_CTX_set_rsa_pss_keygen_md_name() argument 1039 EVP_PKEY_CTX_set_rsa_mgf1_md_name(EVP_PKEY_CTX *ctx, const char *mdname, const char *mdprops) EVP_PKEY_CTX_set_rsa_mgf1_md_name() argument 1066 EVP_PKEY_CTX_set_rsa_pss_keygen_mgf1_md_name(EVP_PKEY_CTX *ctx, const char *mdname) EVP_PKEY_CTX_set_rsa_pss_keygen_mgf1_md_name() argument [all...] |
H A D | rsa_backend.c | 195 const char *mdname = in ossl_rsa_pss_params_30_todata() local 214 if ((mdname != NULL in ossl_rsa_pss_params_30_todata() 215 && !ossl_param_build_set_utf8_string(bld, params, key_md, mdname)) in ossl_rsa_pss_params_30_todata() 290 const char *mdname = NULL; in ossl_rsa_pss_params_30_fromdata() local 293 mdname = param_md->data; in ossl_rsa_pss_params_30_fromdata() 294 else if (!OSSL_PARAM_get_utf8_ptr(param_mgf, &mdname)) in ossl_rsa_pss_params_30_fromdata() 297 if ((md = EVP_MD_fetch(libctx, mdname, propq)) == NULL in ossl_rsa_pss_params_30_fromdata()
|
/third_party/node/deps/openssl/openssl/crypto/crmf/ |
H A D | crmf_pbm.c | 135 char mdname[OSSL_MAX_NAME_SIZE]; in OSSL_CRMF_pbm_new() local 158 OBJ_obj2txt(mdname, sizeof(mdname), pbmp->owf->algorithm, 0); in OSSL_CRMF_pbm_new() 159 if ((owf = EVP_MD_fetch(libctx, mdname, propq)) == NULL) { in OSSL_CRMF_pbm_new()
|
/third_party/openssl/crypto/crmf/ |
H A D | crmf_pbm.c | 135 char mdname[OSSL_MAX_NAME_SIZE]; in OSSL_CRMF_pbm_new() local 158 OBJ_obj2txt(mdname, sizeof(mdname), pbmp->owf->algorithm, 0); in OSSL_CRMF_pbm_new() 159 if ((owf = EVP_MD_fetch(libctx, mdname, propq)) == NULL) { in OSSL_CRMF_pbm_new()
|
/third_party/node/deps/openssl/openssl/providers/implementations/asymciphers/ |
H A D | rsa_enc.c | 428 char mdname[OSSL_MAX_NAME_SIZE]; in rsa_set_ctx_params() local 439 str = mdname; in rsa_set_ctx_params() 440 if (!OSSL_PARAM_get_utf8_string(p, &str, sizeof(mdname))) in rsa_set_ctx_params() 452 prsactx->oaep_md = EVP_MD_fetch(prsactx->libctx, mdname, mdprops); in rsa_set_ctx_params() 502 str = mdname; in rsa_set_ctx_params() 503 if (!OSSL_PARAM_get_utf8_string(p, &str, sizeof(mdname))) in rsa_set_ctx_params() 517 prsactx->mgf1_md = EVP_MD_fetch(prsactx->libctx, mdname, str); in rsa_set_ctx_params()
|
/third_party/openssl/providers/implementations/asymciphers/ |
H A D | rsa_enc.c | 428 char mdname[OSSL_MAX_NAME_SIZE]; in rsa_set_ctx_params() local 439 str = mdname; in rsa_set_ctx_params() 440 if (!OSSL_PARAM_get_utf8_string(p, &str, sizeof(mdname))) in rsa_set_ctx_params() 452 prsactx->oaep_md = EVP_MD_fetch(prsactx->libctx, mdname, mdprops); in rsa_set_ctx_params() 502 str = mdname; in rsa_set_ctx_params() 503 if (!OSSL_PARAM_get_utf8_string(p, &str, sizeof(mdname))) in rsa_set_ctx_params() 517 prsactx->mgf1_md = EVP_MD_fetch(prsactx->libctx, mdname, str); in rsa_set_ctx_params()
|
/third_party/node/deps/openssl/openssl/crypto/ffc/ |
H A D | ffc_params.c | 130 params->mdname = alg; in ossl_ffc_set_digest() 185 dst->mdname = src->mdname; in ossl_ffc_params_copy() 270 if (ffc->mdname != NULL in ossl_ffc_params_todata() 273 ffc->mdname)) in ossl_ffc_params_todata()
|
/third_party/openssl/crypto/ffc/ |
H A D | ffc_params.c | 130 params->mdname = alg; in ossl_ffc_set_digest() 185 dst->mdname = src->mdname; in ossl_ffc_params_copy() 270 if (ffc->mdname != NULL in ossl_ffc_params_todata() 273 ffc->mdname)) in ossl_ffc_params_todata()
|
/third_party/node/deps/openssl/openssl/crypto/ec/ |
H A D | ecdh_kdf.c | 33 const char *mdname = EVP_MD_get0_name(md); in ossl_ecdh_kdf_X9_63() local 38 (char *)mdname, 0); in ossl_ecdh_kdf_X9_63()
|