Home
last modified time | relevance | path

Searched refs:mdname (Results 1 - 25 of 69) sorted by relevance

123

/third_party/node/deps/openssl/openssl/providers/implementations/signature/
H A Decdsa_sig.c67 char mdname[OSSL_MAX_NAME_SIZE]; member
215 static int ecdsa_setup_md(PROV_ECDSA_CTX *ctx, const char *mdname, in ecdsa_setup_md() argument
223 if (mdname == NULL) in ecdsa_setup_md()
226 mdname_len = strlen(mdname); in ecdsa_setup_md()
227 if (mdname_len >= sizeof(ctx->mdname)) { in ecdsa_setup_md()
229 "%s exceeds name buffer length", mdname); in ecdsa_setup_md()
234 md = EVP_MD_fetch(ctx->libctx, mdname, mdprops); in ecdsa_setup_md()
237 "%s could not be fetched", mdname); in ecdsa_setup_md()
245 "digest=%s", mdname); in ecdsa_setup_md()
251 if (ctx->mdname[ in ecdsa_setup_md()
281 ecdsa_digest_signverify_init(void *vctx, const char *mdname, void *ec, const OSSL_PARAM params[], int operation) ecdsa_digest_signverify_init() argument
311 ecdsa_digest_sign_init(void *vctx, const char *mdname, void *ec, const OSSL_PARAM params[]) ecdsa_digest_sign_init() argument
318 ecdsa_digest_verify_init(void *vctx, const char *mdname, void *ec, const OSSL_PARAM params[]) ecdsa_digest_verify_init() argument
495 char mdname[OSSL_MAX_NAME_SIZE] = "", *pmdname = mdname; ecdsa_set_ctx_params() local
[all...]
H A Ddsa_sig.c78 char mdname[OSSL_MAX_NAME_SIZE]; member
121 const char *mdname, const char *mdprops) in dsa_setup_md()
126 if (mdname != NULL) { in dsa_setup_md()
129 EVP_MD *md = EVP_MD_fetch(ctx->libctx, mdname, mdprops); in dsa_setup_md()
132 size_t mdname_len = strlen(mdname); in dsa_setup_md()
137 "%s could not be fetched", mdname); in dsa_setup_md()
140 "digest=%s", mdname); in dsa_setup_md()
141 if (mdname_len >= sizeof(ctx->mdname)) in dsa_setup_md()
143 "%s exceeds name buffer length", mdname); in dsa_setup_md()
149 if (ctx->mdname[ in dsa_setup_md()
120 dsa_setup_md(PROV_DSA_CTX *ctx, const char *mdname, const char *mdprops) dsa_setup_md() argument
274 dsa_digest_signverify_init(void *vpdsactx, const char *mdname, void *vdsa, const OSSL_PARAM params[], int operation) dsa_digest_signverify_init() argument
308 dsa_digest_sign_init(void *vpdsactx, const char *mdname, void *vdsa, const OSSL_PARAM params[]) dsa_digest_sign_init() argument
315 dsa_digest_verify_init(void *vpdsactx, const char *mdname, void *vdsa, const OSSL_PARAM params[]) dsa_digest_verify_init() argument
488 char mdname[OSSL_MAX_NAME_SIZE] = "", *pmdname = mdname; dsa_set_ctx_params() local
[all...]
H A Drsa_sig.c94 char mdname[OSSL_MAX_NAME_SIZE]; /* Purely informational */ member
123 const char *mdname, const char *mgf1_mdname, in rsa_check_padding()
128 if (mdname != NULL || mdnid != NID_undef) { in rsa_check_padding()
141 if ((mdname != NULL && !EVP_MD_is_a(prsactx->md, mdname)) in rsa_check_padding()
283 static int rsa_setup_md(PROV_RSA_CTX *ctx, const char *mdname, in rsa_setup_md() argument
289 if (mdname != NULL) { in rsa_setup_md()
290 EVP_MD *md = EVP_MD_fetch(ctx->libctx, mdname, mdprops); in rsa_setup_md()
294 size_t mdname_len = strlen(mdname); in rsa_setup_md()
298 || !rsa_check_padding(ctx, mdname, NUL in rsa_setup_md()
122 rsa_check_padding(const PROV_RSA_CTX *prsactx, const char *mdname, const char *mgf1_mdname, int mdnid) rsa_check_padding() argument
347 rsa_setup_mgf1_md(PROV_RSA_CTX *ctx, const char *mdname, const char *mdprops) rsa_setup_mgf1_md() argument
430 const char *mdname, *mgf1mdname; rsa_signverify_init() local
845 rsa_digest_signverify_init(void *vprsactx, const char *mdname, void *vrsa, const OSSL_PARAM params[], int operation) rsa_digest_signverify_init() argument
894 rsa_digest_sign_init(void *vprsactx, const char *mdname, void *vrsa, const OSSL_PARAM params[]) rsa_digest_sign_init() argument
931 rsa_digest_verify_init(void *vprsactx, const char *mdname, void *vrsa, const OSSL_PARAM params[]) rsa_digest_verify_init() argument
1155 char mdname[OSSL_MAX_NAME_SIZE] = "", *pmdname = NULL; rsa_set_ctx_params() local
[all...]
H A Dsm2_sig.c76 char mdname[OSSL_MAX_NAME_SIZE]; member
93 static int sm2sig_set_mdname(PROV_SM2_CTX *psm2ctx, const char *mdname) in sm2sig_set_mdname() argument
96 psm2ctx->md = EVP_MD_fetch(psm2ctx->libctx, psm2ctx->mdname, in sm2sig_set_mdname()
101 if (mdname == NULL) in sm2sig_set_mdname()
104 if (strlen(mdname) >= sizeof(psm2ctx->mdname) in sm2sig_set_mdname()
105 || !EVP_MD_is_a(psm2ctx->md, mdname)) { in sm2sig_set_mdname()
107 mdname); in sm2sig_set_mdname()
111 OPENSSL_strlcpy(psm2ctx->mdname, mdname, sizeo in sm2sig_set_mdname()
204 sm2sig_digest_signverify_init(void *vpsm2ctx, const char *mdname, void *ec, const OSSL_PARAM params[]) sm2sig_digest_signverify_init() argument
471 char *mdname = NULL; sm2sig_set_ctx_params() local
[all...]
/third_party/openssl/providers/implementations/signature/
H A Decdsa_sig.c67 char mdname[OSSL_MAX_NAME_SIZE]; member
215 static int ecdsa_setup_md(PROV_ECDSA_CTX *ctx, const char *mdname, in ecdsa_setup_md() argument
223 if (mdname == NULL) in ecdsa_setup_md()
226 mdname_len = strlen(mdname); in ecdsa_setup_md()
227 if (mdname_len >= sizeof(ctx->mdname)) { in ecdsa_setup_md()
229 "%s exceeds name buffer length", mdname); in ecdsa_setup_md()
234 md = EVP_MD_fetch(ctx->libctx, mdname, mdprops); in ecdsa_setup_md()
237 "%s could not be fetched", mdname); in ecdsa_setup_md()
245 "digest=%s", mdname); in ecdsa_setup_md()
251 if (ctx->mdname[ in ecdsa_setup_md()
281 ecdsa_digest_signverify_init(void *vctx, const char *mdname, void *ec, const OSSL_PARAM params[], int operation) ecdsa_digest_signverify_init() argument
311 ecdsa_digest_sign_init(void *vctx, const char *mdname, void *ec, const OSSL_PARAM params[]) ecdsa_digest_sign_init() argument
318 ecdsa_digest_verify_init(void *vctx, const char *mdname, void *ec, const OSSL_PARAM params[]) ecdsa_digest_verify_init() argument
495 char mdname[OSSL_MAX_NAME_SIZE] = "", *pmdname = mdname; ecdsa_set_ctx_params() local
[all...]
H A Ddsa_sig.c78 char mdname[OSSL_MAX_NAME_SIZE]; member
121 const char *mdname, const char *mdprops) in dsa_setup_md()
126 if (mdname != NULL) { in dsa_setup_md()
129 EVP_MD *md = EVP_MD_fetch(ctx->libctx, mdname, mdprops); in dsa_setup_md()
132 size_t mdname_len = strlen(mdname); in dsa_setup_md()
137 "%s could not be fetched", mdname); in dsa_setup_md()
140 "digest=%s", mdname); in dsa_setup_md()
141 if (mdname_len >= sizeof(ctx->mdname)) in dsa_setup_md()
143 "%s exceeds name buffer length", mdname); in dsa_setup_md()
149 if (ctx->mdname[ in dsa_setup_md()
120 dsa_setup_md(PROV_DSA_CTX *ctx, const char *mdname, const char *mdprops) dsa_setup_md() argument
274 dsa_digest_signverify_init(void *vpdsactx, const char *mdname, void *vdsa, const OSSL_PARAM params[], int operation) dsa_digest_signverify_init() argument
308 dsa_digest_sign_init(void *vpdsactx, const char *mdname, void *vdsa, const OSSL_PARAM params[]) dsa_digest_sign_init() argument
315 dsa_digest_verify_init(void *vpdsactx, const char *mdname, void *vdsa, const OSSL_PARAM params[]) dsa_digest_verify_init() argument
488 char mdname[OSSL_MAX_NAME_SIZE] = "", *pmdname = mdname; dsa_set_ctx_params() local
[all...]
H A Drsa_sig.c94 char mdname[OSSL_MAX_NAME_SIZE]; /* Purely informational */ member
123 const char *mdname, const char *mgf1_mdname, in rsa_check_padding()
128 if (mdname != NULL || mdnid != NID_undef) { in rsa_check_padding()
141 if ((mdname != NULL && !EVP_MD_is_a(prsactx->md, mdname)) in rsa_check_padding()
283 static int rsa_setup_md(PROV_RSA_CTX *ctx, const char *mdname, in rsa_setup_md() argument
289 if (mdname != NULL) { in rsa_setup_md()
290 EVP_MD *md = EVP_MD_fetch(ctx->libctx, mdname, mdprops); in rsa_setup_md()
294 size_t mdname_len = strlen(mdname); in rsa_setup_md()
298 || !rsa_check_padding(ctx, mdname, NUL in rsa_setup_md()
122 rsa_check_padding(const PROV_RSA_CTX *prsactx, const char *mdname, const char *mgf1_mdname, int mdnid) rsa_check_padding() argument
347 rsa_setup_mgf1_md(PROV_RSA_CTX *ctx, const char *mdname, const char *mdprops) rsa_setup_mgf1_md() argument
430 const char *mdname, *mgf1mdname; rsa_signverify_init() local
845 rsa_digest_signverify_init(void *vprsactx, const char *mdname, void *vrsa, const OSSL_PARAM params[], int operation) rsa_digest_signverify_init() argument
894 rsa_digest_sign_init(void *vprsactx, const char *mdname, void *vrsa, const OSSL_PARAM params[]) rsa_digest_sign_init() argument
931 rsa_digest_verify_init(void *vprsactx, const char *mdname, void *vrsa, const OSSL_PARAM params[]) rsa_digest_verify_init() argument
1154 char mdname[OSSL_MAX_NAME_SIZE] = "", *pmdname = NULL; rsa_set_ctx_params() local
[all...]
H A Dsm2_sig.c76 char mdname[OSSL_MAX_NAME_SIZE]; member
93 static int sm2sig_set_mdname(PROV_SM2_CTX *psm2ctx, const char *mdname) in sm2sig_set_mdname() argument
96 psm2ctx->md = EVP_MD_fetch(psm2ctx->libctx, psm2ctx->mdname, in sm2sig_set_mdname()
101 if (mdname == NULL) in sm2sig_set_mdname()
104 if (strlen(mdname) >= sizeof(psm2ctx->mdname) in sm2sig_set_mdname()
105 || !EVP_MD_is_a(psm2ctx->md, mdname)) { in sm2sig_set_mdname()
107 mdname); in sm2sig_set_mdname()
111 OPENSSL_strlcpy(psm2ctx->mdname, mdname, sizeo in sm2sig_set_mdname()
204 sm2sig_digest_signverify_init(void *vpsm2ctx, const char *mdname, void *ec, const OSSL_PARAM params[]) sm2sig_digest_signverify_init() argument
462 char *mdname = NULL; sm2sig_set_ctx_params() local
[all...]
/third_party/node/deps/openssl/openssl/crypto/evp/
H A Dm_sigver.c31 static const char *canon_mdname(const char *mdname) in canon_mdname() argument
33 if (mdname != NULL && strcmp(mdname, "UNDEF") == 0) in canon_mdname()
36 return mdname; in canon_mdname()
40 const EVP_MD *type, const char *mdname, in do_sigver_init()
101 if (mdname == NULL && type == NULL) in do_sigver_init()
102 mdname = canon_mdname(EVP_MD_get0_name(ctx->reqdigest)); in do_sigver_init()
218 if (mdname == NULL) in do_sigver_init()
219 mdname = canon_mdname(EVP_MD_get0_name(type)); in do_sigver_init()
221 if (mdname in do_sigver_init()
39 do_sigver_init(EVP_MD_CTX *ctx, EVP_PKEY_CTX **pctx, const EVP_MD *type, const char *mdname, OSSL_LIB_CTX *libctx, const char *props, ENGINE *e, EVP_PKEY *pkey, int ver, const OSSL_PARAM params[]) do_sigver_init() argument
374 EVP_DigestSignInit_ex(EVP_MD_CTX *ctx, EVP_PKEY_CTX **pctx, const char *mdname, OSSL_LIB_CTX *libctx, const char *props, EVP_PKEY *pkey, const OSSL_PARAM params[]) EVP_DigestSignInit_ex() argument
390 EVP_DigestVerifyInit_ex(EVP_MD_CTX *ctx, EVP_PKEY_CTX **pctx, const char *mdname, OSSL_LIB_CTX *libctx, const char *props, EVP_PKEY *pkey, const OSSL_PARAM params[]) EVP_DigestVerifyInit_ex() argument
[all...]
/third_party/openssl/crypto/evp/
H A Dm_sigver.c31 static const char *canon_mdname(const char *mdname) in canon_mdname() argument
33 if (mdname != NULL && strcmp(mdname, "UNDEF") == 0) in canon_mdname()
36 return mdname; in canon_mdname()
40 const EVP_MD *type, const char *mdname, in do_sigver_init()
101 if (mdname == NULL && type == NULL) in do_sigver_init()
102 mdname = canon_mdname(EVP_MD_get0_name(ctx->reqdigest)); in do_sigver_init()
218 if (mdname == NULL) in do_sigver_init()
219 mdname = canon_mdname(EVP_MD_get0_name(type)); in do_sigver_init()
221 if (mdname in do_sigver_init()
39 do_sigver_init(EVP_MD_CTX *ctx, EVP_PKEY_CTX **pctx, const EVP_MD *type, const char *mdname, OSSL_LIB_CTX *libctx, const char *props, ENGINE *e, EVP_PKEY *pkey, int ver, const OSSL_PARAM params[]) do_sigver_init() argument
374 EVP_DigestSignInit_ex(EVP_MD_CTX *ctx, EVP_PKEY_CTX **pctx, const char *mdname, OSSL_LIB_CTX *libctx, const char *props, EVP_PKEY *pkey, const OSSL_PARAM params[]) EVP_DigestSignInit_ex() argument
390 EVP_DigestVerifyInit_ex(EVP_MD_CTX *ctx, EVP_PKEY_CTX **pctx, const char *mdname, OSSL_LIB_CTX *libctx, const char *props, EVP_PKEY *pkey, const OSSL_PARAM params[]) EVP_DigestVerifyInit_ex() argument
[all...]
/third_party/node/deps/openssl/openssl/providers/common/
H A Dprovider_util.c168 const char *mdname, const char *propquery) in ossl_prov_digest_fetch()
171 pd->md = pd->alloc_md = EVP_MD_fetch(libctx, mdname, propquery); in ossl_prov_digest_fetch()
227 const char *mdname, in ossl_prov_set_macctx()
237 if (mdname == NULL) { in ossl_prov_set_macctx()
242 mdname = p->data; in ossl_prov_set_macctx()
263 if (mdname != NULL) in ossl_prov_set_macctx()
265 (char *)mdname, 0); in ossl_prov_set_macctx()
294 const char *mdname, in ossl_prov_macctx_load_from_params()
332 if (ossl_prov_set_macctx(*macctx, params, ciphername, mdname, NULL, in ossl_prov_macctx_load_from_params()
167 ossl_prov_digest_fetch(PROV_DIGEST *pd, OSSL_LIB_CTX *libctx, const char *mdname, const char *propquery) ossl_prov_digest_fetch() argument
224 ossl_prov_set_macctx(EVP_MAC_CTX *macctx, const OSSL_PARAM params[], const char *ciphername, const char *mdname, const char *engine, const char *properties, const unsigned char *key, size_t keylen) ossl_prov_set_macctx() argument
290 ossl_prov_macctx_load_from_params(EVP_MAC_CTX **macctx, const OSSL_PARAM params[], const char *macname, const char *ciphername, const char *mdname, OSSL_LIB_CTX *libctx) ossl_prov_macctx_load_from_params() argument
/third_party/openssl/providers/common/
H A Dprovider_util.c168 const char *mdname, const char *propquery) in ossl_prov_digest_fetch()
171 pd->md = pd->alloc_md = EVP_MD_fetch(libctx, mdname, propquery); in ossl_prov_digest_fetch()
227 const char *mdname, in ossl_prov_set_macctx()
237 if (mdname == NULL) { in ossl_prov_set_macctx()
242 mdname = p->data; in ossl_prov_set_macctx()
263 if (mdname != NULL) in ossl_prov_set_macctx()
265 (char *)mdname, 0); in ossl_prov_set_macctx()
294 const char *mdname, in ossl_prov_macctx_load_from_params()
332 if (ossl_prov_set_macctx(*macctx, params, ciphername, mdname, NULL, in ossl_prov_macctx_load_from_params()
167 ossl_prov_digest_fetch(PROV_DIGEST *pd, OSSL_LIB_CTX *libctx, const char *mdname, const char *propquery) ossl_prov_digest_fetch() argument
224 ossl_prov_set_macctx(EVP_MAC_CTX *macctx, const OSSL_PARAM params[], const char *ciphername, const char *mdname, const char *engine, const char *properties, const unsigned char *key, size_t keylen) ossl_prov_set_macctx() argument
290 ossl_prov_macctx_load_from_params(EVP_MAC_CTX **macctx, const OSSL_PARAM params[], const char *macname, const char *ciphername, const char *mdname, OSSL_LIB_CTX *libctx) ossl_prov_macctx_load_from_params() argument
/third_party/node/deps/openssl/openssl/providers/common/include/prov/
H A Dprovider_util.h63 * Fetch a digest from the specified libctx using the provided mdname and
67 const char *mdname, const char *propquery);
92 * If any of the supplied ciphername/mdname etc are NULL then the values
98 const char *mdname,
125 const char *mdname,
/third_party/openssl/providers/common/include/prov/
H A Dprovider_util.h63 * Fetch a digest from the specified libctx using the provided mdname and
67 const char *mdname, const char *propquery);
92 * If any of the supplied ciphername/mdname etc are NULL then the values
98 const char *mdname,
125 const char *mdname,
/third_party/node/deps/openssl/openssl/crypto/rsa/
H A Drsa_lib.c886 const char *mdkey, const char *mdname, in int_set_rsa_md_name()
891 if (ctx == NULL || mdname == NULL || (ctx->operation & optype) == 0) { in int_set_rsa_md_name()
911 *p++ = OSSL_PARAM_construct_utf8_string(mdkey, (char *)mdname, 0); in int_set_rsa_md_name()
927 char *mdname, size_t mdnamesize) in int_get_rsa_md_name()
931 if (ctx == NULL || mdname == NULL || (ctx->operation & optype) == 0) { in int_get_rsa_md_name()
951 *p++ = OSSL_PARAM_construct_utf8_string(mdkey, (char *)mdname, mdnamesize); in int_get_rsa_md_name()
988 const char *mdname, in EVP_PKEY_CTX_set_rsa_pss_keygen_md_name()
992 OSSL_PKEY_PARAM_RSA_DIGEST, mdname, in EVP_PKEY_CTX_set_rsa_pss_keygen_md_name()
1010 int EVP_PKEY_CTX_set_rsa_oaep_md_name(EVP_PKEY_CTX *ctx, const char *mdname, in EVP_PKEY_CTX_set_rsa_oaep_md_name() argument
1015 OSSL_ASYM_CIPHER_PARAM_OAEP_DIGEST, mdname, in EVP_PKEY_CTX_set_rsa_oaep_md_name()
882 int_set_rsa_md_name(EVP_PKEY_CTX *ctx, int keytype, int optype, const char *mdkey, const char *mdname, const char *propkey, const char *mdprops) int_set_rsa_md_name() argument
922 int_get_rsa_md_name(EVP_PKEY_CTX *ctx, int keytype, int optype, const char *mdkey, char *mdname, size_t mdnamesize) int_get_rsa_md_name() argument
987 EVP_PKEY_CTX_set_rsa_pss_keygen_md_name(EVP_PKEY_CTX *ctx, const char *mdname, const char *mdprops) EVP_PKEY_CTX_set_rsa_pss_keygen_md_name() argument
1051 EVP_PKEY_CTX_set_rsa_mgf1_md_name(EVP_PKEY_CTX *ctx, const char *mdname, const char *mdprops) EVP_PKEY_CTX_set_rsa_mgf1_md_name() argument
1078 EVP_PKEY_CTX_set_rsa_pss_keygen_mgf1_md_name(EVP_PKEY_CTX *ctx, const char *mdname) EVP_PKEY_CTX_set_rsa_pss_keygen_mgf1_md_name() argument
[all...]
H A Drsa_backend.c183 const char *mdname = in ossl_rsa_pss_params_30_todata() local
202 if ((mdname != NULL in ossl_rsa_pss_params_30_todata()
203 && !ossl_param_build_set_utf8_string(bld, params, key_md, mdname)) in ossl_rsa_pss_params_30_todata()
278 const char *mdname = NULL; in ossl_rsa_pss_params_30_fromdata() local
281 mdname = param_md->data; in ossl_rsa_pss_params_30_fromdata()
282 else if (!OSSL_PARAM_get_utf8_ptr(param_mgf, &mdname)) in ossl_rsa_pss_params_30_fromdata()
285 if ((md = EVP_MD_fetch(libctx, mdname, propq)) == NULL in ossl_rsa_pss_params_30_fromdata()
/third_party/openssl/crypto/rsa/
H A Drsa_lib.c882 const char *mdkey, const char *mdname, in int_set_rsa_md_name()
887 if (ctx == NULL || mdname == NULL || (ctx->operation & optype) == 0) { in int_set_rsa_md_name()
907 *p++ = OSSL_PARAM_construct_utf8_string(mdkey, (char *)mdname, 0); in int_set_rsa_md_name()
923 char *mdname, size_t mdnamesize) in int_get_rsa_md_name()
927 if (ctx == NULL || mdname == NULL || (ctx->operation & optype) == 0) { in int_get_rsa_md_name()
947 *p++ = OSSL_PARAM_construct_utf8_string(mdkey, (char *)mdname, mdnamesize); in int_get_rsa_md_name()
984 const char *mdname, in EVP_PKEY_CTX_set_rsa_pss_keygen_md_name()
988 OSSL_PKEY_PARAM_RSA_DIGEST, mdname, in EVP_PKEY_CTX_set_rsa_pss_keygen_md_name()
1002 int EVP_PKEY_CTX_set_rsa_oaep_md_name(EVP_PKEY_CTX *ctx, const char *mdname, in EVP_PKEY_CTX_set_rsa_oaep_md_name() argument
1007 OSSL_ASYM_CIPHER_PARAM_OAEP_DIGEST, mdname, in EVP_PKEY_CTX_set_rsa_oaep_md_name()
878 int_set_rsa_md_name(EVP_PKEY_CTX *ctx, int keytype, int optype, const char *mdkey, const char *mdname, const char *propkey, const char *mdprops) int_set_rsa_md_name() argument
918 int_get_rsa_md_name(EVP_PKEY_CTX *ctx, int keytype, int optype, const char *mdkey, char *mdname, size_t mdnamesize) int_get_rsa_md_name() argument
983 EVP_PKEY_CTX_set_rsa_pss_keygen_md_name(EVP_PKEY_CTX *ctx, const char *mdname, const char *mdprops) EVP_PKEY_CTX_set_rsa_pss_keygen_md_name() argument
1039 EVP_PKEY_CTX_set_rsa_mgf1_md_name(EVP_PKEY_CTX *ctx, const char *mdname, const char *mdprops) EVP_PKEY_CTX_set_rsa_mgf1_md_name() argument
1066 EVP_PKEY_CTX_set_rsa_pss_keygen_mgf1_md_name(EVP_PKEY_CTX *ctx, const char *mdname) EVP_PKEY_CTX_set_rsa_pss_keygen_mgf1_md_name() argument
[all...]
H A Drsa_backend.c195 const char *mdname = in ossl_rsa_pss_params_30_todata() local
214 if ((mdname != NULL in ossl_rsa_pss_params_30_todata()
215 && !ossl_param_build_set_utf8_string(bld, params, key_md, mdname)) in ossl_rsa_pss_params_30_todata()
290 const char *mdname = NULL; in ossl_rsa_pss_params_30_fromdata() local
293 mdname = param_md->data; in ossl_rsa_pss_params_30_fromdata()
294 else if (!OSSL_PARAM_get_utf8_ptr(param_mgf, &mdname)) in ossl_rsa_pss_params_30_fromdata()
297 if ((md = EVP_MD_fetch(libctx, mdname, propq)) == NULL in ossl_rsa_pss_params_30_fromdata()
/third_party/node/deps/openssl/openssl/crypto/crmf/
H A Dcrmf_pbm.c135 char mdname[OSSL_MAX_NAME_SIZE]; in OSSL_CRMF_pbm_new() local
158 OBJ_obj2txt(mdname, sizeof(mdname), pbmp->owf->algorithm, 0); in OSSL_CRMF_pbm_new()
159 if ((owf = EVP_MD_fetch(libctx, mdname, propq)) == NULL) { in OSSL_CRMF_pbm_new()
/third_party/openssl/crypto/crmf/
H A Dcrmf_pbm.c135 char mdname[OSSL_MAX_NAME_SIZE]; in OSSL_CRMF_pbm_new() local
158 OBJ_obj2txt(mdname, sizeof(mdname), pbmp->owf->algorithm, 0); in OSSL_CRMF_pbm_new()
159 if ((owf = EVP_MD_fetch(libctx, mdname, propq)) == NULL) { in OSSL_CRMF_pbm_new()
/third_party/node/deps/openssl/openssl/providers/implementations/asymciphers/
H A Drsa_enc.c428 char mdname[OSSL_MAX_NAME_SIZE]; in rsa_set_ctx_params() local
439 str = mdname; in rsa_set_ctx_params()
440 if (!OSSL_PARAM_get_utf8_string(p, &str, sizeof(mdname))) in rsa_set_ctx_params()
452 prsactx->oaep_md = EVP_MD_fetch(prsactx->libctx, mdname, mdprops); in rsa_set_ctx_params()
502 str = mdname; in rsa_set_ctx_params()
503 if (!OSSL_PARAM_get_utf8_string(p, &str, sizeof(mdname))) in rsa_set_ctx_params()
517 prsactx->mgf1_md = EVP_MD_fetch(prsactx->libctx, mdname, str); in rsa_set_ctx_params()
/third_party/openssl/providers/implementations/asymciphers/
H A Drsa_enc.c428 char mdname[OSSL_MAX_NAME_SIZE]; in rsa_set_ctx_params() local
439 str = mdname; in rsa_set_ctx_params()
440 if (!OSSL_PARAM_get_utf8_string(p, &str, sizeof(mdname))) in rsa_set_ctx_params()
452 prsactx->oaep_md = EVP_MD_fetch(prsactx->libctx, mdname, mdprops); in rsa_set_ctx_params()
502 str = mdname; in rsa_set_ctx_params()
503 if (!OSSL_PARAM_get_utf8_string(p, &str, sizeof(mdname))) in rsa_set_ctx_params()
517 prsactx->mgf1_md = EVP_MD_fetch(prsactx->libctx, mdname, str); in rsa_set_ctx_params()
/third_party/node/deps/openssl/openssl/crypto/ffc/
H A Dffc_params.c130 params->mdname = alg; in ossl_ffc_set_digest()
185 dst->mdname = src->mdname; in ossl_ffc_params_copy()
270 if (ffc->mdname != NULL in ossl_ffc_params_todata()
273 ffc->mdname)) in ossl_ffc_params_todata()
/third_party/openssl/crypto/ffc/
H A Dffc_params.c130 params->mdname = alg; in ossl_ffc_set_digest()
185 dst->mdname = src->mdname; in ossl_ffc_params_copy()
270 if (ffc->mdname != NULL in ossl_ffc_params_todata()
273 ffc->mdname)) in ossl_ffc_params_todata()
/third_party/node/deps/openssl/openssl/crypto/ec/
H A Decdh_kdf.c33 const char *mdname = EVP_MD_get0_name(md); in ossl_ecdh_kdf_X9_63() local
38 (char *)mdname, 0); in ossl_ecdh_kdf_X9_63()

Completed in 22 milliseconds

123