/openssl-master/providers/implementations/signature/ |
A D | dsa_sig.c | 121 const char *mdname, const char *mdprops) in dsa_setup_md() argument 123 if (mdprops == NULL) in dsa_setup_md() 124 mdprops = ctx->propq; in dsa_setup_md() 129 EVP_MD *md = EVP_MD_fetch(ctx->libctx, mdname, mdprops); in dsa_setup_md() 489 char mdprops[OSSL_MAX_PROPQUERY_SIZE] = "", *pmdprops = mdprops; in dsa_set_ctx_params() local 497 && !OSSL_PARAM_get_utf8_string(propsp, &pmdprops, sizeof(mdprops))) in dsa_set_ctx_params() 499 if (!dsa_setup_md(pdsactx, mdname, mdprops)) in dsa_set_ctx_params()
|
A D | ecdsa_sig.c | 216 const char *mdprops) in ecdsa_setup_md() argument 232 if (mdprops == NULL) in ecdsa_setup_md() 233 mdprops = ctx->propq; in ecdsa_setup_md() 234 md = EVP_MD_fetch(ctx->libctx, mdname, mdprops); in ecdsa_setup_md() 496 char mdprops[OSSL_MAX_PROPQUERY_SIZE] = "", *pmdprops = mdprops; in ecdsa_set_ctx_params() local 504 && !OSSL_PARAM_get_utf8_string(propsp, &pmdprops, sizeof(mdprops))) in ecdsa_set_ctx_params() 506 if (!ecdsa_setup_md(ctx, mdname, mdprops)) in ecdsa_set_ctx_params()
|
A D | rsa_sig.c | 282 const char *mdprops) in rsa_setup_md() argument 284 if (mdprops == NULL) in rsa_setup_md() 285 mdprops = ctx->propq; in rsa_setup_md() 288 EVP_MD *md = EVP_MD_fetch(ctx->libctx, mdname, mdprops); in rsa_setup_md() 346 const char *mdprops) in rsa_setup_mgf1_md() argument 352 if (mdprops == NULL) in rsa_setup_mgf1_md() 353 mdprops = ctx->propq; in rsa_setup_mgf1_md() 355 if ((md = EVP_MD_fetch(ctx->libctx, mdname, mdprops)) == NULL) { in rsa_setup_mgf1_md() 1149 char mdprops[OSSL_MAX_PROPQUERY_SIZE] = "", *pmdprops = NULL; in rsa_set_ctx_params() local 1172 pmdprops = mdprops; in rsa_set_ctx_params() [all …]
|
/openssl-master/providers/implementations/asymciphers/ |
A D | rsa_enc.c | 427 char mdprops[OSSL_MAX_PROPQUERY_SIZE] = { '\0' }; in rsa_set_ctx_params() local 440 str = mdprops; in rsa_set_ctx_params() 444 if (!OSSL_PARAM_get_utf8_string(p, &str, sizeof(mdprops))) in rsa_set_ctx_params() 449 prsactx->oaep_md = EVP_MD_fetch(prsactx->libctx, mdname, mdprops); in rsa_set_ctx_params() 490 prsactx->oaep_md = EVP_MD_fetch(prsactx->libctx, "SHA1", mdprops); in rsa_set_ctx_params() 502 str = mdprops; in rsa_set_ctx_params() 506 if (!OSSL_PARAM_get_utf8_string(p, &str, sizeof(mdprops))) in rsa_set_ctx_params()
|
/openssl-master/crypto/rsa/ |
A D | rsa_lib.c | 883 const char *propkey, const char *mdprops) in int_set_rsa_md_name() argument 908 if (evp_pkey_ctx_is_provided(ctx) && mdprops != NULL) { in int_set_rsa_md_name() 910 *p++ = OSSL_PARAM_construct_utf8_string(propkey, (char *)mdprops, 0); in int_set_rsa_md_name() 985 const char *mdprops) in EVP_PKEY_CTX_set_rsa_pss_keygen_md_name() argument 989 OSSL_PKEY_PARAM_RSA_DIGEST_PROPS, mdprops); in EVP_PKEY_CTX_set_rsa_pss_keygen_md_name() 1003 const char *mdprops) in EVP_PKEY_CTX_set_rsa_oaep_md_name() argument 1008 OSSL_ASYM_CIPHER_PARAM_OAEP_DIGEST_PROPS, mdprops); in EVP_PKEY_CTX_set_rsa_oaep_md_name() 1040 const char *mdprops) in EVP_PKEY_CTX_set_rsa_mgf1_md_name() argument 1045 OSSL_PKEY_PARAM_MGF1_PROPERTIES, mdprops); in EVP_PKEY_CTX_set_rsa_mgf1_md_name()
|
/openssl-master/providers/implementations/keymgmt/ |
A D | dsa_kmgmt.c | 68 char *mdprops; member 480 OPENSSL_free(gctx->mdprops); in dsa_gen_set_params() 481 gctx->mdprops = OPENSSL_strdup(p->data); in dsa_gen_set_params() 482 if (gctx->mdprops == NULL) in dsa_gen_set_params() 558 if (!ossl_ffc_set_digest(ffc, gctx->mdname, gctx->mdprops)) in dsa_gen() 596 OPENSSL_free(gctx->mdprops); in dsa_gen_cleanup()
|
A D | dh_kmgmt.c | 73 char *mdprops; member 604 OPENSSL_free(gctx->mdprops); in dhx_gen_set_params() 605 gctx->mdprops = OPENSSL_strdup(p->data); in dhx_gen_set_params() 606 if (gctx->mdprops == NULL) in dhx_gen_set_params() 709 if (!ossl_ffc_set_digest(ffc, gctx->mdname, gctx->mdprops)) in dh_gen() 767 OPENSSL_free(gctx->mdprops); in dh_gen_cleanup()
|
/openssl-master/providers/implementations/exchange/ |
A D | dh_exch.c | 331 char mdprops[80] = { '\0' }; /* should be big enough */ in dh_set_ctx_params() local 337 str = mdprops; in dh_set_ctx_params() 342 if (!OSSL_PARAM_get_utf8_string(p, &str, sizeof(mdprops))) in dh_set_ctx_params() 347 pdhctx->kdf_md = EVP_MD_fetch(pdhctx->libctx, name, mdprops); in dh_set_ctx_params()
|
A D | ecdh_exch.c | 269 char mdprops[80] = { '\0' }; /* should be big enough */ in ecdh_set_ctx_params() local 275 str = mdprops; in ecdh_set_ctx_params() 280 if (!OSSL_PARAM_get_utf8_string(p, &str, sizeof(mdprops))) in ecdh_set_ctx_params() 285 pectx->kdf_md = EVP_MD_fetch(pectx->libctx, name, mdprops); in ecdh_set_ctx_params()
|
/openssl-master/crypto/ffc/ |
A D | ffc_params.c | 132 params->mdprops = props; in ossl_ffc_set_digest() 273 if (ffc->mdprops != NULL in ossl_ffc_params_todata() 276 ffc->mdprops)) in ossl_ffc_params_todata()
|
A D | ffc_params_generate.c | 537 md = EVP_MD_fetch(libctx, params->mdname, params->mdprops); in ossl_ffc_params_FIPS186_4_gen_verify() 546 md = EVP_MD_fetch(libctx, def_name, params->mdprops); in ossl_ffc_params_FIPS186_4_gen_verify() 832 md = EVP_MD_fetch(libctx, params->mdname, params->mdprops); in ossl_ffc_params_FIPS186_2_gen_verify() 841 md = EVP_MD_fetch(libctx, def_name, params->mdprops); in ossl_ffc_params_FIPS186_2_gen_verify()
|
/openssl-master/include/openssl/ |
A D | rsa.h | 145 const char *mdprops); 156 const char *mdprops); 160 const char *mdprops);
|
/openssl-master/include/internal/ |
A D | ffc.h | 114 const char *mdprops; member
|
/openssl-master/doc/man3/ |
A D | EVP_PKEY_CTX_set_rsa_pss_keygen_md.pod | 20 const char *mdprops);
|
A D | EVP_PKEY_CTX_ctrl.pod | 108 const char *mdprops); 114 const char *mdprops); 316 fetched using the properties I<mdprops>. If not explicitly set the signing 339 fetched using the properties I<mdprops>. The padding mode must have been set to
|