/openssl/providers/implementations/signature/ |
H A D | dsa_sig.c | 77 char mdname[OSSL_MAX_NAME_SIZE]; member 125 if (mdname != NULL) { in dsa_setup_md() 131 size_t mdname_len = strlen(mdname); in dsa_setup_md() 139 "digest=%s", mdname); in dsa_setup_md() 140 if (mdname_len >= sizeof(ctx->mdname)) in dsa_setup_md() 148 if (ctx->mdname[0] != '\0' && !EVP_MD_is_a(md, ctx->mdname)) { in dsa_setup_md() 150 "digest %s != %s", mdname, ctx->mdname); in dsa_setup_md() 180 OPENSSL_strlcpy(ctx->mdname, mdname, sizeof(ctx->mdname)); in dsa_setup_md() 285 if (!dsa_setup_md(pdsactx, mdname, NULL)) in dsa_digest_signverify_init() 487 char mdname[OSSL_MAX_NAME_SIZE] = "", *pmdname = mdname; in dsa_set_ctx_params() local [all …]
|
H A D | ecdsa_sig.c | 67 char mdname[OSSL_MAX_NAME_SIZE]; member 223 if (mdname == NULL) in ecdsa_setup_md() 226 mdname_len = strlen(mdname); in ecdsa_setup_md() 227 if (mdname_len >= sizeof(ctx->mdname)) { in ecdsa_setup_md() 245 "digest=%s", mdname); in ecdsa_setup_md() 251 if (ctx->mdname[0] != '\0' && !EVP_MD_is_a(md, ctx->mdname)) { in ecdsa_setup_md() 253 "digest %s != %s", mdname, ctx->mdname); in ecdsa_setup_md() 276 OPENSSL_strlcpy(ctx->mdname, mdname, sizeof(ctx->mdname)); in ecdsa_setup_md() 291 || !ecdsa_setup_md(ctx, mdname, NULL)) in ecdsa_digest_signverify_init() 495 char mdname[OSSL_MAX_NAME_SIZE] = "", *pmdname = mdname; in ecdsa_set_ctx_params() local [all …]
|
H A D | rsa_sig.c | 141 if ((mdname != NULL && !EVP_MD_is_a(prsactx->md, mdname)) in rsa_check_padding() 289 if (mdname != NULL) { in rsa_setup_md() 294 size_t mdname_len = strlen(mdname); in rsa_setup_md() 314 if (ctx->mdname[0] != '\0' && !EVP_MD_is_a(md, ctx->mdname)) { in rsa_setup_md() 316 "digest %s != %s", mdname, ctx->mdname); in rsa_setup_md() 341 OPENSSL_strlcpy(ctx->mdname, mdname, sizeof(ctx->mdname)); in rsa_setup_md() 436 if (mdname == NULL) { in rsa_signverify_init() 447 len = OPENSSL_strlcpy(prsactx->mdname, mdname, in rsa_signverify_init() 854 if (mdname != NULL in rsa_digest_signverify_init() 856 && (mdname[0] == '\0' || OPENSSL_strcasecmp(prsactx->mdname, mdname) != 0) in rsa_digest_signverify_init() [all …]
|
H A D | sm2_sig.c | 76 char mdname[OSSL_MAX_NAME_SIZE]; member 101 if (mdname == NULL) in sm2sig_set_mdname() 104 if (strlen(mdname) >= sizeof(psm2ctx->mdname) in sm2sig_set_mdname() 105 || !EVP_MD_is_a(psm2ctx->md, mdname)) { in sm2sig_set_mdname() 107 mdname); in sm2sig_set_mdname() 111 OPENSSL_strlcpy(psm2ctx->mdname, mdname, sizeof(psm2ctx->mdname)); in sm2sig_set_mdname() 129 strcpy(ctx->mdname, OSSL_DIGEST_NAME_SM3); in sm2sig_newctx() 213 || !sm2sig_set_mdname(ctx, mdname)) in sm2sig_digest_signverify_init() 462 char *mdname = NULL; in sm2sig_set_ctx_params() local 467 OPENSSL_free(mdname); in sm2sig_set_ctx_params() [all …]
|
H A D | eddsa_sig.c | 85 static int eddsa_digest_signverify_init(void *vpeddsactx, const char *mdname, in eddsa_digest_signverify_init() argument 97 if (mdname != NULL && mdname[0] != '\0') { in eddsa_digest_signverify_init()
|
H A D | mac_legacy_sig.c | 98 static int mac_digest_sign_init(void *vpmacctx, const char *mdname, void *vkey, in mac_digest_sign_init() argument 129 (char *)mdname, in mac_digest_sign_init()
|
/openssl/crypto/evp/ |
H A D | m_sigver.c | 31 static const char *canon_mdname(const char *mdname) in canon_mdname() argument 33 if (mdname != NULL && strcmp(mdname, "UNDEF") == 0) in canon_mdname() 36 return mdname; in canon_mdname() 94 if (mdname == NULL && type == NULL) in do_sigver_init() 211 if (mdname == NULL) in do_sigver_init() 212 mdname = canon_mdname(EVP_MD_get0_name(type)); in do_sigver_init() 214 if (mdname == NULL && !reinit) { in do_sigver_init() 218 mdname = canon_mdname(locmdname); in do_sigver_init() 222 if (mdname != NULL) { in do_sigver_init() 274 if (ret > 0 || mdname != NULL) in do_sigver_init() [all …]
|
H A D | p5_crpt.c | 42 const char *mdname = EVP_MD_name(md); in PKCS5_PBE_keyivgen_ex() local 95 (char *)mdname, 0); in PKCS5_PBE_keyivgen_ex()
|
H A D | p_lib.c | 1248 static void mdname2nid(const char *mdname, void *data) in mdname2nid() argument 1255 *nid = OBJ_sn2nid(mdname); in mdname2nid() 1257 *nid = OBJ_ln2nid(mdname); in mdname2nid() 1268 char mdname[80] = ""; in legacy_asn1_ctrl_to_param() local 1269 int rv = EVP_PKEY_get_default_digest_name(pkey, mdname, in legacy_asn1_ctrl_to_param() 1270 sizeof(mdname)); in legacy_asn1_ctrl_to_param() 1281 md = EVP_MD_fetch(libctx, mdname, NULL); in legacy_asn1_ctrl_to_param() 1290 mdnum = ossl_namemap_name2num(namemap, mdname); in legacy_asn1_ctrl_to_param() 1324 char *mdname, size_t mdname_sz) in EVP_PKEY_get_default_digest_name() argument 1329 mdname, mdname_sz); in EVP_PKEY_get_default_digest_name() [all …]
|
/openssl/providers/common/ |
H A D | provider_util.c | 168 const char *mdname, const char *propquery) in ossl_prov_digest_fetch() argument 171 pd->md = pd->alloc_md = EVP_MD_fetch(libctx, mdname, propquery); in ossl_prov_digest_fetch() 227 const char *mdname, in ossl_prov_set_macctx() argument 237 if (mdname == NULL) { in ossl_prov_set_macctx() 242 mdname = p->data; in ossl_prov_set_macctx() 263 if (mdname != NULL) in ossl_prov_set_macctx() 265 (char *)mdname, 0); in ossl_prov_set_macctx() 294 const char *mdname, in ossl_prov_macctx_load_from_params() argument 332 if (ossl_prov_set_macctx(*macctx, params, ciphername, mdname, NULL, in ossl_prov_macctx_load_from_params()
|
/openssl/providers/common/include/prov/ |
H A D | provider_util.h | 67 const char *mdname, const char *propquery); 98 const char *mdname, 125 const char *mdname,
|
/openssl/crypto/crmf/ |
H A D | crmf_pbm.c | 134 char mdname[OSSL_MAX_NAME_SIZE]; in OSSL_CRMF_pbm_new() local 157 OBJ_obj2txt(mdname, sizeof(mdname), pbmp->owf->algorithm, 0); in OSSL_CRMF_pbm_new() 158 if ((owf = EVP_MD_fetch(libctx, mdname, propq)) == NULL) { in OSSL_CRMF_pbm_new()
|
/openssl/crypto/rsa/ |
H A D | rsa_lib.c | 882 const char *mdkey, const char *mdname, in int_set_rsa_md_name() argument 887 if (ctx == NULL || mdname == NULL || (ctx->operation & optype) == 0) { in int_set_rsa_md_name() 907 *p++ = OSSL_PARAM_construct_utf8_string(mdkey, (char *)mdname, 0); in int_set_rsa_md_name() 923 char *mdname, size_t mdnamesize) in int_get_rsa_md_name() argument 927 if (ctx == NULL || mdname == NULL || (ctx->operation & optype) == 0) { in int_get_rsa_md_name() 984 const char *mdname, in EVP_PKEY_CTX_set_rsa_pss_keygen_md_name() argument 988 OSSL_PKEY_PARAM_RSA_DIGEST, mdname, in EVP_PKEY_CTX_set_rsa_pss_keygen_md_name() 1007 OSSL_ASYM_CIPHER_PARAM_OAEP_DIGEST, mdname, in EVP_PKEY_CTX_set_rsa_oaep_md_name() 1044 OSSL_PKEY_PARAM_MGF1_DIGEST, mdname, in EVP_PKEY_CTX_set_rsa_mgf1_md_name() 1067 const char *mdname) in EVP_PKEY_CTX_set_rsa_pss_keygen_mgf1_md_name() argument [all …]
|
H A D | rsa_backend.c | 195 const char *mdname = in ossl_rsa_pss_params_30_todata() local 214 if ((mdname != NULL in ossl_rsa_pss_params_30_todata() 215 && !ossl_param_build_set_utf8_string(bld, params, key_md, mdname)) in ossl_rsa_pss_params_30_todata() 290 const char *mdname = NULL; in ossl_rsa_pss_params_30_fromdata() local 293 mdname = param_md->data; in ossl_rsa_pss_params_30_fromdata() 294 else if (!OSSL_PARAM_get_utf8_ptr(param_mgf, &mdname)) in ossl_rsa_pss_params_30_fromdata() 297 if ((md = EVP_MD_fetch(libctx, mdname, propq)) == NULL in ossl_rsa_pss_params_30_fromdata()
|
/openssl/crypto/ec/ |
H A D | ecdh_kdf.c | 33 const char *mdname = EVP_MD_get0_name(md); in ossl_ecdh_kdf_X9_63() local 38 (char *)mdname, 0); in ossl_ecdh_kdf_X9_63()
|
/openssl/crypto/dh/ |
H A D | dh_kdf.c | 38 const char *mdname = EVP_MD_get0_name(md); in ossl_dh_kdf_X9_42_asn1() local 48 (char *)mdname, 0); in ossl_dh_kdf_X9_42_asn1()
|
/openssl/providers/implementations/asymciphers/ |
H A D | rsa_enc.c | 426 char mdname[OSSL_MAX_NAME_SIZE]; in rsa_set_ctx_params() local 428 char *str = mdname; in rsa_set_ctx_params() 437 if (!OSSL_PARAM_get_utf8_string(p, &str, sizeof(mdname))) in rsa_set_ctx_params() 449 prsactx->oaep_md = EVP_MD_fetch(prsactx->libctx, mdname, mdprops); in rsa_set_ctx_params() 499 if (!OSSL_PARAM_get_utf8_string(p, &str, sizeof(mdname))) in rsa_set_ctx_params() 513 prsactx->mgf1_md = EVP_MD_fetch(prsactx->libctx, mdname, str); in rsa_set_ctx_params()
|
/openssl/providers/implementations/keymgmt/ |
H A D | dsa_kmgmt.c | 66 char *mdname; member 503 OPENSSL_free(gctx->mdname); in dsa_gen_set_params() 504 gctx->mdname = OPENSSL_strdup(p->data); in dsa_gen_set_params() 505 if (gctx->mdname == NULL) in dsa_gen_set_params() 589 if (gctx->mdname != NULL) { in dsa_gen() 590 if (!ossl_ffc_set_digest(ffc, gctx->mdname, gctx->mdprops)) in dsa_gen() 627 OPENSSL_free(gctx->mdname); in dsa_gen_cleanup()
|
H A D | dh_kmgmt.c | 72 char *mdname; member 459 gctx->mdname = NULL; in dh_gen_init_base() 625 OPENSSL_free(gctx->mdname); in dhx_gen_set_params() 626 gctx->mdname = OPENSSL_strdup(p->data); in dhx_gen_set_params() 627 if (gctx->mdname == NULL) in dhx_gen_set_params() 738 if (gctx->mdname != NULL) { in dh_gen() 739 if (!ossl_ffc_set_digest(ffc, gctx->mdname, gctx->mdprops)) in dh_gen() 796 OPENSSL_free(gctx->mdname); in dh_gen_cleanup()
|
/openssl/doc/man3/ |
H A D | EVP_PKEY_get_default_digest_nid.pod | 13 char *mdname, size_t mdname_sz); 20 I<pkey> into I<mdname>, up to at most I<mdname_sz> bytes including the
|
H A D | EVP_DigestSignInit.pod | 13 const char *mdname, OSSL_LIB_CTX *libctx, 31 with the name I<mdname> and private key I<pkey>. The name of the digest to be 61 The digest I<mdname> may be NULL if the signing algorithm supports it. The 115 except that the I<mdname> parameter will be inferred from the supplied
|
H A D | EVP_PKEY_CTX_set_rsa_pss_keygen_md.pod | 19 const char *mdname, 24 const char *mdname);
|
/openssl/crypto/ffc/ |
H A D | ffc_params.c | 130 params->mdname = alg; in ossl_ffc_set_digest() 268 if (ffc->mdname != NULL in ossl_ffc_params_todata() 271 ffc->mdname)) in ossl_ffc_params_todata()
|
/openssl/ssl/ |
H A D | tls13_enc.c | 46 const char *mdname = EVP_MD_get0_name(md); in tls13_hkdf_expand() local 81 (char *)mdname, 0); in tls13_hkdf_expand() 176 const char *mdname = EVP_MD_get0_name(md); in tls13_generate_secret() local 203 (char *)mdname, 0); in tls13_generate_secret() 267 const char *mdname = EVP_MD_get0_name(md); in tls13_final_finish_mac() local 302 if (!EVP_Q_mac(sctx->libctx, "HMAC", sctx->propq, mdname, in tls13_final_finish_mac()
|
/openssl/include/openssl/ |
H A D | rsa.h | 147 int EVP_PKEY_CTX_set_rsa_mgf1_md_name(EVP_PKEY_CTX *ctx, const char *mdname, 154 const char *mdname); 158 const char *mdname, 162 int EVP_PKEY_CTX_set_rsa_oaep_md_name(EVP_PKEY_CTX *ctx, const char *mdname,
|