/dports/www/chromium-legacy/chromium-88.0.4324.182/third_party/boringssl/src/ssl/ |
H A D | ssl_privkey.cc | 510 int hash_nid; member 539 const int hash_nid = values[i]; in parse_sigalg_pairs() local 544 if (candidate.pkey_type == pkey_type && candidate.hash_nid == hash_nid) { in parse_sigalg_pairs() 553 ERR_add_error_dataf("unknown hash:%d pkey:%d", hash_nid, pkey_type); in parse_sigalg_pairs() 660 int pkey_type = 0, hash_nid = 0; in parse_sigalgs_list() local 727 hash_nid = NID_sha1; in parse_sigalgs_list() 729 hash_nid = NID_sha256; in parse_sigalgs_list() 731 hash_nid = NID_sha384; in parse_sigalgs_list() 733 hash_nid = NID_sha512; in parse_sigalgs_list() 743 candidate.hash_nid == hash_nid) { in parse_sigalgs_list()
|
/dports/www/qt5-webengine/qtwebengine-everywhere-src-5.15.2/src/3rdparty/chromium/third_party/boringssl/src/ssl/ |
H A D | ssl_privkey.cc | 510 int hash_nid; member 539 const int hash_nid = values[i]; in parse_sigalg_pairs() local 544 if (candidate.pkey_type == pkey_type && candidate.hash_nid == hash_nid) { in parse_sigalg_pairs() 553 ERR_add_error_dataf("unknown hash:%d pkey:%d", hash_nid, pkey_type); in parse_sigalg_pairs() 660 int pkey_type = 0, hash_nid = 0; in parse_sigalgs_list() local 727 hash_nid = NID_sha1; in parse_sigalgs_list() 729 hash_nid = NID_sha256; in parse_sigalgs_list() 731 hash_nid = NID_sha384; in parse_sigalgs_list() 733 hash_nid = NID_sha512; in parse_sigalgs_list() 743 candidate.hash_nid == hash_nid) { in parse_sigalgs_list()
|
/dports/net/quiche/quiche-0.9.0/cargo-crates/boring-sys-1.1.1/deps/boringssl/src/ssl/ |
H A D | ssl_privkey.cc | 510 int hash_nid; member 539 const int hash_nid = values[i]; in parse_sigalg_pairs() local 544 if (candidate.pkey_type == pkey_type && candidate.hash_nid == hash_nid) { in parse_sigalg_pairs() 553 ERR_add_error_dataf("unknown hash:%d pkey:%d", hash_nid, pkey_type); in parse_sigalg_pairs() 660 int pkey_type = 0, hash_nid = 0; in parse_sigalgs_list() local 727 hash_nid = NID_sha1; in parse_sigalgs_list() 729 hash_nid = NID_sha256; in parse_sigalgs_list() 731 hash_nid = NID_sha384; in parse_sigalgs_list() 733 hash_nid = NID_sha512; in parse_sigalgs_list() 743 candidate.hash_nid == hash_nid) { in parse_sigalgs_list()
|
/dports/net/quiche/quiche-0.9.0/deps/boringssl/src/ssl/ |
H A D | ssl_privkey.cc | 510 int hash_nid; member 539 const int hash_nid = values[i]; in parse_sigalg_pairs() local 544 if (candidate.pkey_type == pkey_type && candidate.hash_nid == hash_nid) { in parse_sigalg_pairs() 553 ERR_add_error_dataf("unknown hash:%d pkey:%d", hash_nid, pkey_type); in parse_sigalg_pairs() 660 int pkey_type = 0, hash_nid = 0; in parse_sigalgs_list() local 727 hash_nid = NID_sha1; in parse_sigalgs_list() 729 hash_nid = NID_sha256; in parse_sigalgs_list() 731 hash_nid = NID_sha384; in parse_sigalgs_list() 733 hash_nid = NID_sha512; in parse_sigalgs_list() 743 candidate.hash_nid == hash_nid) { in parse_sigalgs_list()
|
/dports/security/boringssl/boringssl-6a71840/ssl/ |
H A D | ssl_privkey.cc | 510 int hash_nid; member 539 const int hash_nid = values[i]; in parse_sigalg_pairs() local 544 if (candidate.pkey_type == pkey_type && candidate.hash_nid == hash_nid) { in parse_sigalg_pairs() 553 ERR_add_error_dataf("unknown hash:%d pkey:%d", hash_nid, pkey_type); in parse_sigalg_pairs() 660 int pkey_type = 0, hash_nid = 0; in parse_sigalgs_list() local 727 hash_nid = NID_sha1; in parse_sigalgs_list() 729 hash_nid = NID_sha256; in parse_sigalgs_list() 731 hash_nid = NID_sha384; in parse_sigalgs_list() 733 hash_nid = NID_sha512; in parse_sigalgs_list() 743 candidate.hash_nid == hash_nid) { in parse_sigalgs_list()
|
/dports/devel/pecl-grpc/grpc-1.42.0/third_party/boringssl-with-bazel/src/ssl/ |
H A D | ssl_privkey.cc | 512 int hash_nid; member 541 const int hash_nid = values[i]; in parse_sigalg_pairs() local 546 if (candidate.pkey_type == pkey_type && candidate.hash_nid == hash_nid) { in parse_sigalg_pairs() 555 ERR_add_error_dataf("unknown hash:%d pkey:%d", hash_nid, pkey_type); in parse_sigalg_pairs() 662 int pkey_type = 0, hash_nid = 0; in parse_sigalgs_list() local 729 hash_nid = NID_sha1; in parse_sigalgs_list() 731 hash_nid = NID_sha256; in parse_sigalgs_list() 733 hash_nid = NID_sha384; in parse_sigalgs_list() 735 hash_nid = NID_sha512; in parse_sigalgs_list() 745 candidate.hash_nid == hash_nid) { in parse_sigalgs_list()
|
/dports/devel/py-grpcio/grpcio-1.43.0/third_party/boringssl-with-bazel/src/ssl/ |
H A D | ssl_privkey.cc | 512 int hash_nid; member 541 const int hash_nid = values[i]; in parse_sigalg_pairs() local 546 if (candidate.pkey_type == pkey_type && candidate.hash_nid == hash_nid) { in parse_sigalg_pairs() 555 ERR_add_error_dataf("unknown hash:%d pkey:%d", hash_nid, pkey_type); in parse_sigalg_pairs() 662 int pkey_type = 0, hash_nid = 0; in parse_sigalgs_list() local 729 hash_nid = NID_sha1; in parse_sigalgs_list() 731 hash_nid = NID_sha256; in parse_sigalgs_list() 733 hash_nid = NID_sha384; in parse_sigalgs_list() 735 hash_nid = NID_sha512; in parse_sigalgs_list() 745 candidate.hash_nid == hash_nid) { in parse_sigalgs_list()
|
/dports/security/gost-engine/engine-7ed64cd/ |
H A D | test_digest.c | 129 static int do_digest(int hash_nid, const char *plaintext, unsigned int psize, in do_digest() argument 133 if (hash_nid == NID_id_GostR3411_2012_256) in do_digest() 135 else if (hash_nid == NID_id_GostR3411_2012_512) in do_digest() 138 T(mdtype = EVP_get_digestbynid(hash_nid)); in do_digest()
|
H A D | test_params.c | 936 int algnid, hash_nid, pknid; in test_cert() local 938 T(OBJ_find_sigid_algs(algnid, &hash_nid, &pknid)); in test_cert() 944 T(mdtype = EVP_get_digestbynid(hash_nid)); in test_cert() 983 int hash_nid = 0; in test_param() local 1000 hash_nid = NID_id_GostR3411_2012_256; in test_param() 1003 hash_nid = NID_id_GostR3411_2012_512; in test_param() 1060 T(mdtype = EVP_get_digestbynid(hash_nid)); in test_param() 1078 T(mdtype = EVP_get_digestbynid(hash_nid)); in test_param()
|
/dports/security/xca/xca-2.4.0/widgets/ |
H A D | hashBox.cpp | 153 int hash_nid; in setCurrentMD() local 159 if (!OBJ_find_sigid_algs(EVP_MD_type(md), &hash_nid, NULL)) in setCurrentMD() 160 hash_nid = EVP_MD_type(md); in setCurrentMD() 162 if (hash_nid == hashalgos[idx].nid) { in setCurrentMD()
|
/dports/lang/mono/mono-5.10.1.57/external/boringssl/crypto/rsa/ |
H A D | rsa.c | 373 int *is_alloced, int hash_nid, const uint8_t *msg, in RSA_add_pkcs1_prefix() argument 377 if (hash_nid == NID_md5_sha1) { in RSA_add_pkcs1_prefix() 392 if (sig_prefix->nid != hash_nid) { in RSA_add_pkcs1_prefix() 427 int RSA_sign(int hash_nid, const uint8_t *in, unsigned in_len, uint8_t *out, in RSA_sign() argument 437 return rsa->meth->sign(hash_nid, in, in_len, out, out_len, rsa); in RSA_sign() 441 &signed_msg_is_alloced, hash_nid, in, in_len)) { in RSA_sign() 464 int RSA_verify(int hash_nid, const uint8_t *msg, size_t msg_len, in RSA_verify() argument 478 if (hash_nid == NID_md5_sha1 && msg_len != SSL_SIG_LENGTH) { in RSA_verify() 495 &signed_msg_is_alloced, hash_nid, msg, msg_len)) { in RSA_verify()
|
/dports/www/qt5-webengine/qtwebengine-everywhere-src-5.15.2/src/3rdparty/chromium/third_party/boringssl/src/crypto/fipsmodule/rsa/ |
H A D | rsa.c | 461 int *is_alloced, int hash_nid, const uint8_t *msg, in RSA_add_pkcs1_prefix() argument 465 if (hash_nid == NID_md5_sha1) { in RSA_add_pkcs1_prefix() 480 if (sig_prefix->nid != hash_nid) { in RSA_add_pkcs1_prefix() 520 int RSA_sign(int hash_nid, const uint8_t *in, unsigned in_len, uint8_t *out, in RSA_sign() argument 530 return rsa->meth->sign(hash_nid, in, in_len, out, out_len, rsa); in RSA_sign() 534 &signed_msg_is_alloced, hash_nid, in, in_len) || in RSA_sign() 573 int RSA_verify(int hash_nid, const uint8_t *msg, size_t msg_len, in RSA_verify() argument 587 if (hash_nid == NID_md5_sha1 && msg_len != SSL_SIG_LENGTH) { in RSA_verify() 604 &signed_msg_is_alloced, hash_nid, msg, msg_len)) { in RSA_verify()
|
/dports/www/chromium-legacy/chromium-88.0.4324.182/third_party/boringssl/src/crypto/fipsmodule/rsa/ |
H A D | rsa.c | 461 int *is_alloced, int hash_nid, const uint8_t *msg, in RSA_add_pkcs1_prefix() argument 465 if (hash_nid == NID_md5_sha1) { in RSA_add_pkcs1_prefix() 480 if (sig_prefix->nid != hash_nid) { in RSA_add_pkcs1_prefix() 520 int RSA_sign(int hash_nid, const uint8_t *in, unsigned in_len, uint8_t *out, in RSA_sign() argument 530 return rsa->meth->sign(hash_nid, in, in_len, out, out_len, rsa); in RSA_sign() 534 &signed_msg_is_alloced, hash_nid, in, in_len) || in RSA_sign() 573 int RSA_verify(int hash_nid, const uint8_t *msg, size_t msg_len, in RSA_verify() argument 587 if (hash_nid == NID_md5_sha1 && msg_len != SSL_SIG_LENGTH) { in RSA_verify() 604 &signed_msg_is_alloced, hash_nid, msg, msg_len)) { in RSA_verify()
|
/dports/net/quiche/quiche-0.9.0/deps/boringssl/src/crypto/fipsmodule/rsa/ |
H A D | rsa.c | 461 int *is_alloced, int hash_nid, const uint8_t *msg, in RSA_add_pkcs1_prefix() argument 465 if (hash_nid == NID_md5_sha1) { in RSA_add_pkcs1_prefix() 480 if (sig_prefix->nid != hash_nid) { in RSA_add_pkcs1_prefix() 520 int RSA_sign(int hash_nid, const uint8_t *in, unsigned in_len, uint8_t *out, in RSA_sign() argument 530 return rsa->meth->sign(hash_nid, in, in_len, out, out_len, rsa); in RSA_sign() 534 &signed_msg_is_alloced, hash_nid, in, in_len) || in RSA_sign() 573 int RSA_verify(int hash_nid, const uint8_t *msg, size_t msg_len, in RSA_verify() argument 587 if (hash_nid == NID_md5_sha1 && msg_len != SSL_SIG_LENGTH) { in RSA_verify() 604 &signed_msg_is_alloced, hash_nid, msg, msg_len)) { in RSA_verify()
|
/dports/net/quiche/quiche-0.9.0/cargo-crates/boring-sys-1.1.1/deps/boringssl/src/crypto/fipsmodule/rsa/ |
H A D | rsa.c | 461 int *is_alloced, int hash_nid, const uint8_t *msg, in RSA_add_pkcs1_prefix() argument 465 if (hash_nid == NID_md5_sha1) { in RSA_add_pkcs1_prefix() 480 if (sig_prefix->nid != hash_nid) { in RSA_add_pkcs1_prefix() 520 int RSA_sign(int hash_nid, const uint8_t *in, unsigned in_len, uint8_t *out, in RSA_sign() argument 530 return rsa->meth->sign(hash_nid, in, in_len, out, out_len, rsa); in RSA_sign() 534 &signed_msg_is_alloced, hash_nid, in, in_len) || in RSA_sign() 573 int RSA_verify(int hash_nid, const uint8_t *msg, size_t msg_len, in RSA_verify() argument 587 if (hash_nid == NID_md5_sha1 && msg_len != SSL_SIG_LENGTH) { in RSA_verify() 604 &signed_msg_is_alloced, hash_nid, msg, msg_len)) { in RSA_verify()
|
/dports/security/boringssl/boringssl-6a71840/crypto/fipsmodule/rsa/ |
H A D | rsa.c | 461 int *is_alloced, int hash_nid, const uint8_t *msg, in RSA_add_pkcs1_prefix() argument 465 if (hash_nid == NID_md5_sha1) { in RSA_add_pkcs1_prefix() 480 if (sig_prefix->nid != hash_nid) { in RSA_add_pkcs1_prefix() 520 int RSA_sign(int hash_nid, const uint8_t *in, unsigned in_len, uint8_t *out, in RSA_sign() argument 530 return rsa->meth->sign(hash_nid, in, in_len, out, out_len, rsa); in RSA_sign() 534 &signed_msg_is_alloced, hash_nid, in, in_len) || in RSA_sign() 573 int RSA_verify(int hash_nid, const uint8_t *msg, size_t msg_len, in RSA_verify() argument 587 if (hash_nid == NID_md5_sha1 && msg_len != SSL_SIG_LENGTH) { in RSA_verify() 604 &signed_msg_is_alloced, hash_nid, msg, msg_len)) { in RSA_verify()
|
/dports/devel/pecl-grpc/grpc-1.42.0/third_party/boringssl-with-bazel/src/crypto/fipsmodule/rsa/ |
H A D | rsa.c | 467 int *is_alloced, int hash_nid, const uint8_t *digest, in RSA_add_pkcs1_prefix() argument 471 if (hash_nid == NID_md5_sha1) { in RSA_add_pkcs1_prefix() 486 if (sig_prefix->nid != hash_nid) { in RSA_add_pkcs1_prefix() 526 int RSA_sign(int hash_nid, const uint8_t *digest, unsigned digest_len, in RSA_sign() argument 536 return rsa->meth->sign(hash_nid, digest, digest_len, out, out_len, rsa); in RSA_sign() 540 &signed_msg_is_alloced, hash_nid, digest, in RSA_sign() 580 int RSA_verify(int hash_nid, const uint8_t *digest, size_t digest_len, in RSA_verify() argument 594 if (hash_nid == NID_md5_sha1 && digest_len != SSL_SIG_LENGTH) { in RSA_verify() 611 &signed_msg_is_alloced, hash_nid, digest, in RSA_verify()
|
/dports/devel/py-grpcio/grpcio-1.43.0/third_party/boringssl-with-bazel/src/crypto/fipsmodule/rsa/ |
H A D | rsa.c | 467 int *is_alloced, int hash_nid, const uint8_t *digest, in RSA_add_pkcs1_prefix() argument 471 if (hash_nid == NID_md5_sha1) { in RSA_add_pkcs1_prefix() 486 if (sig_prefix->nid != hash_nid) { in RSA_add_pkcs1_prefix() 526 int RSA_sign(int hash_nid, const uint8_t *digest, unsigned digest_len, in RSA_sign() argument 536 return rsa->meth->sign(hash_nid, digest, digest_len, out, out_len, rsa); in RSA_sign() 540 &signed_msg_is_alloced, hash_nid, digest, in RSA_sign() 580 int RSA_verify(int hash_nid, const uint8_t *digest, size_t digest_len, in RSA_verify() argument 594 if (hash_nid == NID_md5_sha1 && digest_len != SSL_SIG_LENGTH) { in RSA_verify() 611 &signed_msg_is_alloced, hash_nid, digest, in RSA_verify()
|
/dports/lang/mono/mono-5.10.1.57/external/boringssl/include/openssl/ |
H A D | rsa.h | 189 OPENSSL_EXPORT int RSA_sign(int hash_nid, const uint8_t *in, 217 OPENSSL_EXPORT int RSA_verify(int hash_nid, const uint8_t *msg, size_t msg_len, 340 int *is_alloced, int hash_nid,
|
/dports/www/qt5-webengine/qtwebengine-everywhere-src-5.15.2/src/3rdparty/chromium/net/ssl/ |
H A D | ssl_platform_key_nss.cc | 118 int hash_nid = EVP_MD_type(SSL_get_signature_algorithm_digest(algorithm)); in Sign() local 122 hash_nid, digest_item.data, digest_item.len)) { in Sign()
|
/dports/www/chromium-legacy/chromium-88.0.4324.182/net/ssl/ |
H A D | ssl_platform_key_nss.cc | 118 int hash_nid = EVP_MD_type(SSL_get_signature_algorithm_digest(algorithm)); in Sign() local 122 hash_nid, digest_item.data, digest_item.len)) { in Sign()
|
/dports/www/chromium-legacy/chromium-88.0.4324.182/third_party/boringssl/src/include/openssl/ |
H A D | rsa.h | 296 OPENSSL_EXPORT int RSA_sign(int hash_nid, const uint8_t *in, 343 OPENSSL_EXPORT int RSA_verify(int hash_nid, const uint8_t *msg, size_t msg_len, 487 int *is_alloced, int hash_nid,
|
/dports/www/qt5-webengine/qtwebengine-everywhere-src-5.15.2/src/3rdparty/chromium/third_party/boringssl/src/include/openssl/ |
H A D | rsa.h | 296 OPENSSL_EXPORT int RSA_sign(int hash_nid, const uint8_t *in, 343 OPENSSL_EXPORT int RSA_verify(int hash_nid, const uint8_t *msg, size_t msg_len, 487 int *is_alloced, int hash_nid,
|
/dports/net/quiche/quiche-0.9.0/cargo-crates/boring-sys-1.1.1/deps/boringssl/src/include/openssl/ |
H A D | rsa.h | 296 OPENSSL_EXPORT int RSA_sign(int hash_nid, const uint8_t *in, 343 OPENSSL_EXPORT int RSA_verify(int hash_nid, const uint8_t *msg, size_t msg_len, 487 int *is_alloced, int hash_nid,
|
/dports/net/quiche/quiche-0.9.0/deps/boringssl/src/include/openssl/ |
H A D | rsa.h | 296 OPENSSL_EXPORT int RSA_sign(int hash_nid, const uint8_t *in, 343 OPENSSL_EXPORT int RSA_verify(int hash_nid, const uint8_t *msg, size_t msg_len, 487 int *is_alloced, int hash_nid,
|