| /netbsd-src/crypto/external/bsd/openssl/dist/test/ |
| H A D | algorithmid_test.c | 140 if (!TEST_true(EVP_PKEY_is_a(pkey, OBJ_nid2sn(pkey_nid)))) { in test_x509_sig_aid() 144 OBJ_nid2sn(sig_nid), OBJ_nid2sn(pkey_nid), OBJ_nid2sn(dig_nid)); in test_x509_sig_aid() 154 OBJ_nid2sn(dig_nid), in test_x509_sig_aid() 158 OBJ_nid2sn(pkey_nid), OBJ_nid2sn(dig_nid)); in test_x509_sig_aid() 166 OBJ_nid2sn(pkey_nid)); in test_x509_sig_aid()
|
| H A D | ssl_cert_table_internal_test.c | 35 TEST_note("Expected %s, got %s\n", OBJ_nid2sn(nid), in do_test_cert_table() 36 OBJ_nid2sn(clu->nid)); in do_test_cert_table()
|
| H A D | ecdsatest.c | 97 TEST_info("ECDSA KATs for curve %s", OBJ_nid2sn(nid)); in x9_62_tests() 203 TEST_info("skipped: ECDSA unsupported for curve %s", OBJ_nid2sn(nid)); in test_builtin() 213 OBJ_nid2sn(nid)); in test_builtin() 217 OBJ_nid2sn(nid)); in test_builtin() 221 TEST_info("testing ECDSA for curve %s as %s key type", OBJ_nid2sn(nid), in test_builtin()
|
| H A D | asn1_internal_test.c | 97 i, (*tmp)->pkey_id, OBJ_nid2sn((*tmp)->pkey_id)); in test_standard_methods() 111 i, (*tmp)->pkey_id, OBJ_nid2sn((*tmp)->pkey_id)); in test_standard_methods()
|
| H A D | pbelutest.c | 39 OBJ_nid2sn(pbe_nid), failed ? "ERROR" : "OK"); in test_pbelu()
|
| H A D | x509_internal_test.c | 46 TEST_note("%d : %s", (*tmp)->ext_nid, OBJ_nid2sn((*tmp)->ext_nid)); in test_standard_exts()
|
| H A D | pkcs12_format_test.c | 361 sprintf(fname, "1key_ciph-%s_iter-%d.p12", OBJ_nid2sn(enc->nid), enc->iter); in test_single_key() 460 sprintf(fname, "1cert_mac-%s_iter-%d.p12", OBJ_nid2sn(mac->nid), mac->iter); in test_single_cert_mac() 620 sprintf(fname, "1secret_ciph-%s_iter-%d.p12", OBJ_nid2sn(enc->nid), enc->iter); in test_single_secret()
|
| /netbsd-src/crypto/external/bsd/openssl.old/dist/crypto/evp/ |
| H A D | names.c | 24 r = OBJ_NAME_add(OBJ_nid2sn(c->nid), OBJ_NAME_TYPE_CIPHER_METH, in EVP_add_cipher() 38 name = OBJ_nid2sn(md->type); in EVP_add_digest() 48 r = OBJ_NAME_add(OBJ_nid2sn(md->pkey_type), in EVP_add_digest()
|
| /netbsd-src/crypto/external/bsd/openssl.old/dist/test/ |
| H A D | ssl_cert_table_internal_test.c | 45 TEST_note("Expected %s, got %s\n", OBJ_nid2sn(nid), in do_test_cert_table() 46 OBJ_nid2sn(clu->nid)); in do_test_cert_table()
|
| H A D | asn1_internal_test.c | 91 i, (*tmp)->pkey_id, OBJ_nid2sn((*tmp)->pkey_id)); in test_standard_methods() 105 i, (*tmp)->pkey_id, OBJ_nid2sn((*tmp)->pkey_id)); in test_standard_methods()
|
| H A D | ecdsatest.c | 119 TEST_info("ECDSA KATs for curve %s", OBJ_nid2sn(nid)); in x9_62_tests() 213 TEST_info("skipped: ECDSA unsupported for curve %s", OBJ_nid2sn(nid)); in test_builtin() 217 TEST_info("testing ECDSA for curve %s", OBJ_nid2sn(nid)); in test_builtin()
|
| H A D | pbelutest.c | 39 OBJ_nid2sn(pbe_nid), failed ? "ERROR" : "OK"); in test_pbelu()
|
| H A D | ectest.c | 1185 OBJ_nid2sn(nid)); in internal_curve_test() 1189 TEST_info("EC_GROUP_check() failed with curve %s\n", OBJ_nid2sn(nid)); in internal_curve_test() 1203 TEST_info("Curve %s failed\n", OBJ_nid2sn(nid)); in internal_curve_test_method() 1665 TEST_note("Curve %s", OBJ_nid2sn(nid)); in check_named_curve_from_ecparameters() 1721 TEST_info("nid = %s, tnid = %s", OBJ_nid2sn(nid), OBJ_nid2sn(tnid)); in check_named_curve_from_ecparameters() 1742 TEST_info("nid = %s, tnid = %s", OBJ_nid2sn(nid), OBJ_nid2sn(tnid)); in check_named_curve_from_ecparameters() 1759 TEST_info("nid = %s, tnid = %s", OBJ_nid2sn(nid), OBJ_nid2sn(tnid)); in check_named_curve_from_ecparameters() 1985 TEST_info("Curve %s cardinality test", OBJ_nid2sn(nid)); in cardinality_test() 2165 TEST_note("Curve %s", OBJ_nid2sn(nid)); in custom_generator_test()
|
| H A D | x509_internal_test.c | 55 TEST_note("%d : %s", (*tmp)->ext_nid, OBJ_nid2sn((*tmp)->ext_nid)); in test_standard_exts()
|
| /netbsd-src/crypto/external/bsd/openssl/dist/crypto/ec/ |
| H A D | eck_prn.c | 107 if (BIO_printf(bp, "ASN1 OID: %s", OBJ_nid2sn(nid)) <= 0) in ECPKParameters_print() 165 if (BIO_printf(bp, "Field Type: %s\n", OBJ_nid2sn(tmp_nid)) in ECPKParameters_print() 179 OBJ_nid2sn(basis_type)) <= 0) in ECPKParameters_print()
|
| /netbsd-src/crypto/external/bsd/openssl.old/dist/crypto/ec/ |
| H A D | eck_prn.c | 103 if (BIO_printf(bp, "ASN1 OID: %s", OBJ_nid2sn(nid)) <= 0) in ECPKParameters_print() 159 if (BIO_printf(bp, "Field Type: %s\n", OBJ_nid2sn(tmp_nid)) in ECPKParameters_print() 173 OBJ_nid2sn(basis_type)) <= 0) in ECPKParameters_print()
|
| /netbsd-src/crypto/external/bsd/openssl.old/dist/apps/ |
| H A D | s_cb.c | 292 BIO_printf(out, "+%s", OBJ_nid2sn(hash_nid)); in do_print_sigalgs() 308 BIO_printf(out, "Peer signing digest: %s\n", OBJ_nid2sn(nid)); in ssl_print_sigalgs() 373 gname = OBJ_nid2sn(nid); in ssl_print_groups() 391 gname = OBJ_nid2sn(nid); in ssl_print_groups() 426 cname = OBJ_nid2sn(nid); in ssl_print_tmp_key() 432 BIO_printf(out, "%s, %d bits\n", OBJ_nid2sn(EVP_PKEY_id(key)), in ssl_print_tmp_key() 1222 BIO_printf(bio_err, "Hash used: %s\n", OBJ_nid2sn(nid)); in print_ssl_summary() 1409 cname = OBJ_nid2sn(nid); in security_callback_debug() 1426 BIO_puts(sdb->out, OBJ_nid2sn(sig_nid)); in security_callback_debug()
|
| H A D | engine.c | 414 if (!append_buf(&cap_buf, &cap_size, OBJ_nid2sn(nids[k]))) in engine_main() 423 if (!append_buf(&cap_buf, &cap_size, OBJ_nid2sn(nids[k]))) in engine_main() 432 if (!append_buf(&cap_buf, &cap_size, OBJ_nid2sn(nids[k]))) in engine_main()
|
| /netbsd-src/crypto/external/bsd/openssl/dist/crypto/evp/ |
| H A D | evp_pbe.c | 121 cipher = cipher_fetch = EVP_CIPHER_fetch(libctx, OBJ_nid2sn(cipher_nid), propq); in EVP_PBE_CipherInit_ex() 128 OBJ_nid2sn(cipher_nid)); in EVP_PBE_CipherInit_ex() 136 md = md_fetch = EVP_MD_fetch(libctx, OBJ_nid2sn(md_nid), propq); in EVP_PBE_CipherInit_ex()
|
| /netbsd-src/crypto/external/bsd/openssl.old/dist/doc/man3/ |
| H A D | OBJ_nid2obj.pod | 7 OBJ_nid2sn, OBJ_obj2nid, OBJ_txt2nid, OBJ_ln2nid, OBJ_sn2nid, OBJ_cmp, 17 const char *OBJ_nid2sn(int n); 55 OBJ_nid2obj(), OBJ_nid2ln() and OBJ_nid2sn() convert the NID I<n> to 140 OBJ_nid2ln() and OBJ_nid2sn() returns a valid string or B<NULL>
|
| /netbsd-src/external/ibm-public/postfix/dist/src/tls/ |
| H A D | tls_misc.c | 1008 tmp = OBJ_nid2sn(nid); in ec_curve_name() 1046 kex_name = OBJ_nid2sn(EVP_PKEY_type(nid)); in tls_get_signature_params() 1086 locl_sig_name = OBJ_nid2sn(nid); in tls_get_signature_params() 1110 locl_sig_dgst = OBJ_nid2sn(nid); in tls_get_signature_params() 1124 peer_sig_name = OBJ_nid2sn(nid); in tls_get_signature_params() 1147 peer_sig_dgst = OBJ_nid2sn(nid); in tls_get_signature_params()
|
| /netbsd-src/crypto/external/bsd/openssl/dist/doc/man3/ |
| H A D | OBJ_nid2obj.pod | 7 OBJ_nid2sn, OBJ_obj2nid, OBJ_txt2nid, OBJ_ln2nid, OBJ_sn2nid, OBJ_cmp, 17 const char *OBJ_nid2sn(int n); 57 OBJ_nid2obj(), OBJ_nid2ln() and OBJ_nid2sn() convert the NID I<n> to 150 OBJ_nid2ln() and OBJ_nid2sn() returns a valid string or B<NULL>
|
| /netbsd-src/crypto/external/bsd/openssl/dist/apps/ |
| H A D | engine.c | 423 if (!append_buf(&cap_buf, &cap_size, OBJ_nid2sn(nids[k]))) in engine_main() 432 if (!append_buf(&cap_buf, &cap_size, OBJ_nid2sn(nids[k]))) in engine_main() 441 if (!append_buf(&cap_buf, &cap_size, OBJ_nid2sn(nids[k]))) in engine_main()
|
| /netbsd-src/crypto/external/bsd/openssl.old/dist/crypto/x509v3/ |
| H A D | v3_conf.c | 62 return v3_generic_extension(OBJ_nid2sn(ext_nid), in X509V3_EXT_nconf_nid() 94 ERR_add_error_data(4, "name=", OBJ_nid2sn(ext_nid), ",section=", in do_ext_nconf() 118 ERR_add_error_data(2, "name=", OBJ_nid2sn(ext_nid)); in do_ext_nconf()
|
| /netbsd-src/crypto/external/bsd/openssl.old/dist/crypto/pem/ |
| H A D | pem_info.c | 258 objstr = OBJ_nid2sn(EVP_CIPHER_nid(enc)); in PEM_X509_INFO_write_bio() 293 objstr = OBJ_nid2sn(EVP_CIPHER_nid(xi->enc_cipher.cipher)); in PEM_X509_INFO_write_bio()
|