/third_party/mbedtls/tests/suites/ |
D | test_suite_md.function | 106 void md_info( int md_type, char * md_name, int md_size ) 114 TEST_ASSERT( md_info == mbedtls_md_info_from_string( md_name ) ); 118 TEST_ASSERT( strcmp( mbedtls_md_get_name( md_info ), md_name ) == 0 ); 132 char md_name[100]; 137 memset( md_name, 0x00, 100 ); 142 strncpy( (char *) md_name, text_md_name, sizeof( md_name ) - 1 ); 143 md_info = mbedtls_md_info_from_string(md_name); 157 char md_name[100]; 161 memset( md_name, 0x00, 100 ); 164 strncpy( (char *) md_name, text_md_name, sizeof( md_name ) - 1 ); [all …]
|
/third_party/mbedtls/library/ |
D | md.c | 156 const mbedtls_md_info_t *mbedtls_md_info_from_string( const char *md_name ) in mbedtls_md_info_from_string() argument 158 if( NULL == md_name ) in mbedtls_md_info_from_string() 163 if( !strcmp( "MD5", md_name ) ) in mbedtls_md_info_from_string() 167 if( !strcmp( "RIPEMD160", md_name ) ) in mbedtls_md_info_from_string() 171 if( !strcmp( "SHA1", md_name ) || !strcmp( "SHA", md_name ) ) in mbedtls_md_info_from_string() 175 if( !strcmp( "SHA224", md_name ) ) in mbedtls_md_info_from_string() 179 if( !strcmp( "SHA256", md_name ) ) in mbedtls_md_info_from_string() 183 if( !strcmp( "SHA384", md_name ) ) in mbedtls_md_info_from_string() 187 if( !strcmp( "SHA512", md_name ) ) in mbedtls_md_info_from_string()
|
/third_party/openssl/apps/ |
D | dgst.c | 29 const char *sig_name, const char *md_name, 106 const char *md_name = NULL; in dgst_main() local 414 md_name = EVP_MD_get0_name(md); in dgst_main() 435 siglen, NULL, md_name, "stdin"); in dgst_main() 451 sigkey, sigbuf, siglen, sig_name, md_name, argv[i])) in dgst_main() 541 const char *sig_name, const char *md_name, in do_fp() argument 628 if (md_name != NULL) in do_fp() 629 BIO_printf(out, "-%s", md_name); in do_fp() 631 } else if (md_name != NULL) { in do_fp() 632 BIO_printf(out, "%s(%s)= ", md_name, file); in do_fp()
|
/third_party/openssl/crypto/pkcs12/ |
D | p12_mutl.c | 90 char md_name[80]; in pkcs12_gen_mac() local 109 if (OBJ_obj2txt(md_name, sizeof(md_name), macoid, 0) < 0) in pkcs12_gen_mac() 111 md = md_fetch = EVP_MD_fetch(p12->authsafes->ctx.libctx, md_name, in pkcs12_gen_mac()
|
/third_party/python/Objects/ |
D | moduleobject.c | 84 Py_XSETREF(mod->md_name, name); in module_init_dict() 101 m->md_name = NULL; in PyModule_NewObject() 675 if (verbose && m->md_name) { in module_dealloc() 676 PySys_FormatStderr("# destroy %U\n", m->md_name); in module_dealloc() 687 Py_XDECREF(m->md_name); in module_dealloc() 799 m->md_name ? " " : "", in module_clear() 800 m->md_name, ""); in module_clear()
|
/third_party/openssl/crypto/evp/ |
D | dsa_ctrl.c | 107 const char *md_name, in EVP_PKEY_CTX_set_dsa_paramgen_md_props() argument 117 (char *)md_name, 0); in EVP_PKEY_CTX_set_dsa_paramgen_md_props()
|
/third_party/openssl/crypto/x509/ |
D | x_all.c | 478 const char *md_name; in X509_digest_sig() local 521 md_name = "SHA512"; in X509_digest_sig() 524 md_name = "SHAKE256"; in X509_digest_sig() 527 md_name = "SHA256"; in X509_digest_sig() 530 if ((md = EVP_MD_fetch(cert->libctx, md_name, in X509_digest_sig()
|
/third_party/python/Include/internal/ |
D | pycore_moduleobject.h | 18 PyObject *md_name; member
|
/third_party/mbedtls/include/mbedtls/ |
D | md.h | 131 const mbedtls_md_info_t *mbedtls_md_info_from_string( const char *md_name );
|
/third_party/openssl/crypto/cms/ |
D | cms_sd.c | 785 char md_name[OSSL_MAX_NAME_SIZE]; in CMS_SignerInfo_sign() local 787 if (OBJ_obj2txt(md_name, sizeof(md_name), in CMS_SignerInfo_sign() 803 if (EVP_DigestSignInit_ex(mctx, &pctx, md_name, in CMS_SignerInfo_sign()
|
/third_party/openssl/include/openssl/ |
D | dsa.h | 31 const char *md_name,
|
/third_party/openssl/doc/man3/ |
D | EVP_PKEY_CTX_ctrl.pod | 129 const char *md_name, 404 parameter generation using I<md_name> and I<md_properties> to retrieve the 406 If not specified, I<md_name> will be set to one of SHA-1, SHA-224, or
|
/third_party/node/src/ |
D | node_crypto.cc | 6440 String::Utf8Value md_name(env->isolate(), args[2].As<String>()); in GenerateKeyPairRSAPSS() local 6441 md = EVP_get_digestbyname(*md_name); in GenerateKeyPairRSAPSS()
|