Lines Matching refs:mdname

94     char mdname[OSSL_MAX_NAME_SIZE]; /* Purely informational */  member
123 const char *mdname, const char *mgf1_mdname, in rsa_check_padding() argument
128 if (mdname != NULL || mdnid != NID_undef) { in rsa_check_padding()
141 if ((mdname != NULL && !EVP_MD_is_a(prsactx->md, mdname)) in rsa_check_padding()
283 static int rsa_setup_md(PROV_RSA_CTX *ctx, const char *mdname, in rsa_setup_md() argument
289 if (mdname != NULL) { in rsa_setup_md()
290 EVP_MD *md = EVP_MD_fetch(ctx->libctx, mdname, mdprops); in rsa_setup_md()
294 size_t mdname_len = strlen(mdname); in rsa_setup_md()
298 || !rsa_check_padding(ctx, mdname, NULL, md_nid) in rsa_setup_md()
299 || mdname_len >= sizeof(ctx->mdname)) { in rsa_setup_md()
302 "%s could not be fetched", mdname); in rsa_setup_md()
305 "digest=%s", mdname); in rsa_setup_md()
306 if (mdname_len >= sizeof(ctx->mdname)) in rsa_setup_md()
308 "%s exceeds name buffer length", mdname); in rsa_setup_md()
314 if (ctx->mdname[0] != '\0' && !EVP_MD_is_a(md, ctx->mdname)) { in rsa_setup_md()
316 "digest %s != %s", mdname, ctx->mdname); in rsa_setup_md()
332 OPENSSL_strlcpy(ctx->mgf1_mdname, mdname, sizeof(ctx->mgf1_mdname)); in rsa_setup_md()
341 OPENSSL_strlcpy(ctx->mdname, mdname, sizeof(ctx->mdname)); in rsa_setup_md()
347 static int rsa_setup_mgf1_md(PROV_RSA_CTX *ctx, const char *mdname, in rsa_setup_mgf1_md() argument
357 if ((md = EVP_MD_fetch(ctx->libctx, mdname, mdprops)) == NULL) { in rsa_setup_mgf1_md()
359 "%s could not be fetched", mdname); in rsa_setup_mgf1_md()
364 || !rsa_check_padding(ctx, NULL, mdname, mdnid)) { in rsa_setup_mgf1_md()
367 "digest=%s", mdname); in rsa_setup_mgf1_md()
371 len = OPENSSL_strlcpy(ctx->mgf1_mdname, mdname, sizeof(ctx->mgf1_mdname)); in rsa_setup_mgf1_md()
374 "%s exceeds name buffer length", mdname); in rsa_setup_mgf1_md()
430 const char *mdname, *mgf1mdname; in rsa_signverify_init() local
433 mdname = ossl_rsa_oaeppss_nid2name(md_nid); in rsa_signverify_init()
436 if (mdname == NULL) { in rsa_signverify_init()
447 len = OPENSSL_strlcpy(prsactx->mdname, mdname, in rsa_signverify_init()
448 sizeof(prsactx->mdname)); in rsa_signverify_init()
449 if (len >= sizeof(prsactx->mdname)) { in rsa_signverify_init()
465 || !rsa_setup_md(prsactx, mdname, prsactx->propq) in rsa_signverify_init()
845 static int rsa_digest_signverify_init(void *vprsactx, const char *mdname, in rsa_digest_signverify_init() argument
857 if (mdname != NULL in rsa_digest_signverify_init()
859 && (mdname[0] == '\0' || OPENSSL_strcasecmp(prsactx->mdname, mdname) != 0) in rsa_digest_signverify_init()
860 && !rsa_setup_md(prsactx, mdname, prsactx->propq)) in rsa_digest_signverify_init()
894 static int rsa_digest_sign_init(void *vprsactx, const char *mdname, in rsa_digest_sign_init() argument
899 return rsa_digest_signverify_init(vprsactx, mdname, vrsa, in rsa_digest_sign_init()
931 static int rsa_digest_verify_init(void *vprsactx, const char *mdname, in rsa_digest_verify_init() argument
936 return rsa_digest_signverify_init(vprsactx, mdname, vrsa, in rsa_digest_verify_init()
1089 if (p != NULL && !OSSL_PARAM_set_utf8_string(p, prsactx->mdname)) in rsa_get_ctx_params()
1155 char mdname[OSSL_MAX_NAME_SIZE] = "", *pmdname = NULL; in rsa_set_ctx_params() local
1174 pmdname = mdname; in rsa_set_ctx_params()
1175 if (!OSSL_PARAM_get_utf8_string(p, &pmdname, sizeof(mdname))) in rsa_set_ctx_params()