Searched refs:NID_md5_sha1 (Results 1 – 13 of 13) sorted by relevance
/third_party/openssl/crypto/evp/ |
D | m_md5_sha1.c | 124 NID_md5_sha1, 125 NID_md5_sha1,
|
/third_party/openssl/crypto/rsa/ |
D | rsa_sign.c | 81 if (type == NID_md5_sha1) { in RSA_sign() 148 if (type == NID_md5_sha1) { in int_rsa_verify()
|
D | rsa_pmeth.c | 378 case NID_md5_sha1: in check_padding_md()
|
/third_party/openssl/doc/man3/ |
D | RSA_sign.pod | 30 If B<type> is B<NID_md5_sha1>,
|
/third_party/openssl/crypto/kdf/ |
D | tls1_prf.c | 253 if (EVP_MD_type(md) == NID_md5_sha1) { in tls1_prf_alg()
|
/third_party/openssl/ssl/ |
D | s3_enc.c | 424 if (EVP_MD_CTX_type(s->s3->handshake_dgst) != NID_md5_sha1) { in ssl3_final_finish_mac()
|
D | ssl_ciph.c | 111 {0, NID_md5_sha1}, /* SSL_MD_MD5_SHA1_IDX 9 */
|
D | t1_lib.c | 778 NID_md5_sha1, SSL_MD_MD5_SHA1_IDX,
|
/third_party/openssl/apps/ |
D | speed.c | 1056 ret = RSA_sign(NID_md5_sha1, buf, 36, buf2, rsa_num, rsa_key[testnum]); in RSA_sign_loop() 1077 RSA_verify(NID_md5_sha1, buf, 36, buf2, rsa_num, rsa_key[testnum]); in RSA_verify_loop() 2719 st = RSA_sign(NID_md5_sha1, loopargs[i].buf, 36, loopargs[i].buf2, in speed_main() 2746 st = RSA_verify(NID_md5_sha1, loopargs[i].buf, 36, loopargs[i].buf2, in speed_main()
|
/third_party/openssl/crypto/objects/ |
D | obj_dat.h | 1197 {"MD5-SHA1", "md5-sha1", NID_md5_sha1},
|
/third_party/openssl/engines/ |
D | e_capi.c | 860 case NID_md5_sha1: in capi_rsa_sign()
|
/third_party/openssl/include/openssl/ |
D | obj_mac.h | 1157 #define NID_md5_sha1 114 macro
|
/third_party/openssl/ |
D | CHANGES | 12098 This necessitated the support of an extra signature type NID_md5_sha1
|