/openssl/providers/implementations/signature/ |
H A D | ecdsa_sig.c | 101 char mdname[OSSL_MAX_NAME_SIZE]; member 176 if (mdname == NULL) in ecdsa_setup_md() 179 mdname_len = strlen(mdname); in ecdsa_setup_md() 227 if (ctx->mdname[0] != '\0' && !EVP_MD_is_a(md, ctx->mdname)) { in ecdsa_setup_md() 229 "digest %s != %s", mdname, ctx->mdname); in ecdsa_setup_md() 254 OPENSSL_strlcpy(ctx->mdname, mdname, sizeof(ctx->mdname)); in ecdsa_setup_md() 344 const char *mdname = NULL; in ecdsa_sign_directly() local 347 mdname = ctx->mdname; in ecdsa_sign_directly() 514 if (mdname != NULL in ecdsa_digest_signverify_init() 516 && (mdname[0] == '\0' || OPENSSL_strcasecmp(ctx->mdname, mdname) != 0) in ecdsa_digest_signverify_init() [all …]
|
H A D | dsa_sig.c | 104 char mdname[OSSL_MAX_NAME_SIZE]; member 158 if (mdname != NULL) { in dsa_setup_md() 161 size_t mdname_len = strlen(mdname); in dsa_setup_md() 174 if (mdname_len >= sizeof(ctx->mdname)) in dsa_setup_md() 200 if (ctx->mdname[0] != '\0' in dsa_setup_md() 201 && !EVP_MD_is_a(md, ctx->mdname)) { in dsa_setup_md() 203 "digest %s != %s", mdname, ctx->mdname); in dsa_setup_md() 234 OPENSSL_strlcpy(ctx->mdname, mdname, sizeof(ctx->mdname)); in dsa_setup_md() 520 if (mdname != NULL in dsa_digest_signverify_init() 522 && (mdname[0] == '\0' || OPENSSL_strcasecmp(pdsactx->mdname, mdname) != 0) in dsa_digest_signverify_init() [all …]
|
H A D | sm2_sig.c | 76 char mdname[OSSL_MAX_NAME_SIZE]; member 106 if (mdname == NULL) in sm2sig_set_mdname() 109 if (strlen(mdname) >= sizeof(psm2ctx->mdname) in sm2sig_set_mdname() 110 || !EVP_MD_is_a(psm2ctx->md, mdname)) { in sm2sig_set_mdname() 112 mdname); in sm2sig_set_mdname() 116 OPENSSL_strlcpy(psm2ctx->mdname, mdname, sizeof(psm2ctx->mdname)); in sm2sig_set_mdname() 133 strcpy(ctx->mdname, OSSL_DIGEST_NAME_SM3); in sm2sig_newctx() 218 || !sm2sig_set_mdname(ctx, mdname)) in sm2sig_digest_signverify_init() 483 char *mdname = NULL; in sm2sig_set_ctx_params() local 488 OPENSSL_free(mdname); in sm2sig_set_ctx_params() [all …]
|
H A D | rsa_sig.c | 195 if ((mdname != NULL && !EVP_MD_is_a(prsactx->md, mdname)) in rsa_check_padding() 378 if (mdname != NULL) { in rsa_setup_md() 380 size_t mdname_len = strlen(mdname); in rsa_setup_md() 429 if (ctx->mdname[0] != '\0' && !EVP_MD_is_a(md, ctx->mdname)) { in rsa_setup_md() 431 "digest %s != %s", mdname, ctx->mdname); in rsa_setup_md() 454 OPENSSL_strlcpy(ctx->mdname, mdname, sizeof(ctx->mdname)); in rsa_setup_md() 557 if (mdname == NULL) { in rsa_signverify_init() 568 len = OPENSSL_strlcpy(prsactx->mdname, mdname, in rsa_signverify_init() 1202 if (mdname != NULL in rsa_digest_signverify_init() 1204 && (mdname[0] == '\0' || OPENSSL_strcasecmp(prsactx->mdname, mdname) != 0) in rsa_digest_signverify_init() [all …]
|
H A D | eddsa_sig.c | 671 static int ed25519_digest_signverify_init(void *vpeddsactx, const char *mdname, in ed25519_digest_signverify_init() argument 677 if (mdname != NULL && mdname[0] != '\0') { in ed25519_digest_signverify_init() 705 static int ed448_digest_signverify_init(void *vpeddsactx, const char *mdname, in ed448_digest_signverify_init() argument 711 if (mdname != NULL && mdname[0] != '\0') { in ed448_digest_signverify_init()
|
H A D | mac_legacy_sig.c | 96 static int mac_digest_sign_init(void *vpmacctx, const char *mdname, void *vkey, in mac_digest_sign_init() argument 127 (char *)mdname, in mac_digest_sign_init()
|
/openssl/crypto/evp/ |
H A D | m_sigver.c | 29 static const char *canon_mdname(const char *mdname) in canon_mdname() argument 31 if (mdname != NULL && strcmp(mdname, "UNDEF") == 0) in canon_mdname() 34 return mdname; in canon_mdname() 94 if (mdname == NULL && type == NULL) in do_sigver_init() 211 if (mdname == NULL) in do_sigver_init() 212 mdname = canon_mdname(EVP_MD_get0_name(type)); in do_sigver_init() 214 if (mdname == NULL && !reinit) { in do_sigver_init() 218 mdname = canon_mdname(locmdname); in do_sigver_init() 222 if (mdname != NULL) { in do_sigver_init() 274 if (ret > 0 || mdname != NULL) in do_sigver_init() [all …]
|
H A D | p5_crpt.c | 42 const char *mdname = EVP_MD_name(md); in PKCS5_PBE_keyivgen_ex() local 95 (char *)mdname, 0); in PKCS5_PBE_keyivgen_ex()
|
/openssl/providers/common/ |
H A D | provider_util.c | 168 const char *mdname, const char *propquery) in ossl_prov_digest_fetch() argument 171 pd->md = pd->alloc_md = EVP_MD_fetch(libctx, mdname, propquery); in ossl_prov_digest_fetch() 227 const char *mdname, in ossl_prov_set_macctx() argument 237 if (mdname == NULL) { in ossl_prov_set_macctx() 242 mdname = p->data; in ossl_prov_set_macctx() 263 if (mdname != NULL) in ossl_prov_set_macctx() 265 (char *)mdname, 0); in ossl_prov_set_macctx() 294 const char *mdname, in ossl_prov_macctx_load_from_params() argument 332 if (ossl_prov_set_macctx(*macctx, params, ciphername, mdname, NULL, in ossl_prov_macctx_load_from_params()
|
/openssl/providers/common/include/prov/ |
H A D | provider_util.h | 67 const char *mdname, const char *propquery); 98 const char *mdname, 125 const char *mdname,
|
/openssl/include/internal/ |
H A D | hpke_util.h | 35 const char *mdname; /* hash alg name for the HKDF */ member 48 const char *mdname; /* hash alg name for the HKDF */ member 96 EVP_KDF_CTX *ossl_kdf_ctx_create(const char *kdfname, const char *mdname,
|
/openssl/crypto/crmf/ |
H A D | crmf_pbm.c | 134 char mdname[OSSL_MAX_NAME_SIZE]; in OSSL_CRMF_pbm_new() local 157 OBJ_obj2txt(mdname, sizeof(mdname), pbmp->owf->algorithm, 0); in OSSL_CRMF_pbm_new() 158 if ((owf = EVP_MD_fetch(libctx, mdname, propq)) == NULL) { in OSSL_CRMF_pbm_new()
|
/openssl/crypto/rsa/ |
H A D | rsa_lib.c | 965 const char *mdkey, const char *mdname, in int_set_rsa_md_name() argument 970 if (ctx == NULL || mdname == NULL || (ctx->operation & optype) == 0) { in int_set_rsa_md_name() 990 *p++ = OSSL_PARAM_construct_utf8_string(mdkey, (char *)mdname, 0); in int_set_rsa_md_name() 1006 char *mdname, size_t mdnamesize) in int_get_rsa_md_name() argument 1010 if (ctx == NULL || mdname == NULL || (ctx->operation & optype) == 0) { in int_get_rsa_md_name() 1067 const char *mdname, in EVP_PKEY_CTX_set_rsa_pss_keygen_md_name() argument 1071 OSSL_PKEY_PARAM_RSA_DIGEST, mdname, in EVP_PKEY_CTX_set_rsa_pss_keygen_md_name() 1094 OSSL_ASYM_CIPHER_PARAM_OAEP_DIGEST, mdname, in EVP_PKEY_CTX_set_rsa_oaep_md_name() 1135 OSSL_PKEY_PARAM_MGF1_DIGEST, mdname, in EVP_PKEY_CTX_set_rsa_mgf1_md_name() 1158 const char *mdname) in EVP_PKEY_CTX_set_rsa_pss_keygen_mgf1_md_name() argument [all …]
|
H A D | rsa_backend.c | 319 const char *mdname = in ossl_rsa_pss_params_30_todata() local 338 if ((mdname != NULL in ossl_rsa_pss_params_30_todata() 339 && !ossl_param_build_set_utf8_string(bld, params, key_md, mdname)) in ossl_rsa_pss_params_30_todata() 414 const char *mdname = NULL; in ossl_rsa_pss_params_30_fromdata() local 417 mdname = param_md->data; in ossl_rsa_pss_params_30_fromdata() 418 else if (!OSSL_PARAM_get_utf8_ptr(param_mgf, &mdname)) in ossl_rsa_pss_params_30_fromdata() 421 if ((md = EVP_MD_fetch(libctx, mdname, propq)) == NULL in ossl_rsa_pss_params_30_fromdata()
|
/openssl/crypto/ec/ |
H A D | ecdh_kdf.c | 33 const char *mdname = EVP_MD_get0_name(md); in ossl_ecdh_kdf_X9_63() local 38 (char *)mdname, 0); in ossl_ecdh_kdf_X9_63()
|
/openssl/crypto/dh/ |
H A D | dh_kdf.c | 38 const char *mdname = EVP_MD_get0_name(md); in ossl_dh_kdf_X9_42_asn1() local 48 (char *)mdname, 0); in ossl_dh_kdf_X9_42_asn1()
|
/openssl/providers/implementations/asymciphers/ |
H A D | rsa_enc.c | 463 char mdname[OSSL_MAX_NAME_SIZE]; in rsa_set_ctx_params() local 481 str = mdname; in rsa_set_ctx_params() 482 if (!OSSL_PARAM_get_utf8_string(p, &str, sizeof(mdname))) in rsa_set_ctx_params() 494 prsactx->oaep_md = EVP_MD_fetch(prsactx->libctx, mdname, mdprops); in rsa_set_ctx_params() 544 str = mdname; in rsa_set_ctx_params() 545 if (!OSSL_PARAM_get_utf8_string(p, &str, sizeof(mdname))) in rsa_set_ctx_params() 559 prsactx->mgf1_md = EVP_MD_fetch(prsactx->libctx, mdname, str); in rsa_set_ctx_params()
|
/openssl/crypto/ffc/ |
H A D | ffc_params.c | 135 params->mdname = alg; in ossl_ffc_set_digest() 189 dst->mdname = src->mdname; in ossl_ffc_params_copy() 271 if (ffc->mdname != NULL in ossl_ffc_params_todata() 274 ffc->mdname)) in ossl_ffc_params_todata()
|
/openssl/providers/implementations/keymgmt/ |
H A D | dsa_kmgmt.c | 69 char *mdname; member 523 OPENSSL_free(gctx->mdname); in dsa_gen_set_params() 524 gctx->mdname = OPENSSL_strdup(p->data); in dsa_gen_set_params() 525 if (gctx->mdname == NULL) in dsa_gen_set_params() 659 if (gctx->mdname != NULL) in dsa_gen() 660 ossl_ffc_set_digest(ffc, gctx->mdname, gctx->mdprops); in dsa_gen() 696 OPENSSL_free(gctx->mdname); in dsa_gen_cleanup()
|
H A D | dh_kmgmt.c | 73 char *mdname; member 465 gctx->mdname = NULL; in dh_gen_init_base() 634 OPENSSL_free(gctx->mdname); in dhx_gen_set_params() 635 gctx->mdname = OPENSSL_strdup(p->data); in dhx_gen_set_params() 636 if (gctx->mdname == NULL) in dhx_gen_set_params() 760 if (gctx->mdname != NULL) in dh_gen() 761 ossl_ffc_set_digest(ffc, gctx->mdname, gctx->mdprops); in dh_gen() 816 OPENSSL_free(gctx->mdname); in dh_gen_cleanup()
|
/openssl/crypto/hpke/ |
H A D | hpke_util.c | 393 EVP_KDF_CTX *ossl_kdf_ctx_create(const char *kdfname, const char *mdname, in ossl_kdf_ctx_create() argument 406 if (kctx != NULL && mdname != NULL) { in ossl_kdf_ctx_create() 409 if (mdname != NULL) in ossl_kdf_ctx_create() 411 (char *)mdname, 0); in ossl_kdf_ctx_create()
|
/openssl/doc/man3/ |
H A D | EVP_PKEY_get_default_digest_nid.pod | 13 char *mdname, size_t mdname_sz); 20 I<pkey> into I<mdname>, up to at most I<mdname_sz> bytes including the
|
/openssl/test/ |
H A D | tls-provider.c | 2638 char mdname[OSSL_MAX_NAME_SIZE]; member 2669 const char *mdname, const char *mdprops) in xor_sig_setup_md() argument 2676 md = EVP_MD_fetch(ctx->libctx, mdname, mdprops); in xor_sig_setup_md() 2681 "%s could not be fetched", mdname); in xor_sig_setup_md() 2701 OPENSSL_strlcpy(ctx->mdname, mdname, sizeof(ctx->mdname)); in xor_sig_setup_md() 2822 char *rmdname = (char *)mdname; in xor_sig_digest_signverify_init() 2854 return xor_sig_digest_signverify_init(vpxor_sigctx, mdname, vxorsig, in xor_sig_digest_sign_init() 2860 return xor_sig_digest_signverify_init(vpxor_sigctx, mdname, in xor_sig_digest_verify_init() 3016 char mdname[OSSL_MAX_NAME_SIZE] = "", *pmdname = mdname; in xor_sig_set_ctx_params() local 3022 if (!OSSL_PARAM_get_utf8_string(p, &pmdname, sizeof(mdname))) in xor_sig_set_ctx_params() [all …]
|
/openssl/ssl/ |
H A D | tls13_enc.c | 43 const char *mdname = EVP_MD_get0_name(md); in tls13_hkdf_expand_ex() local 74 (char *)mdname, 0); in tls13_hkdf_expand_ex() 176 const char *mdname = EVP_MD_get0_name(md); in tls13_generate_secret() local 200 (char *)mdname, 0); in tls13_generate_secret() 270 const char *mdname = EVP_MD_get0_name(md); in tls13_final_finish_mac() local 305 if (!EVP_Q_mac(sctx->libctx, "HMAC", sctx->propq, mdname, in tls13_final_finish_mac()
|
/openssl/include/openssl/ |
H A D | rsa.h | 150 int EVP_PKEY_CTX_set_rsa_mgf1_md_name(EVP_PKEY_CTX *ctx, const char *mdname, 157 const char *mdname); 161 const char *mdname, 165 int EVP_PKEY_CTX_set_rsa_oaep_md_name(EVP_PKEY_CTX *ctx, const char *mdname,
|