openssl/crypto/evp
Richard Levitte 3204083820 Rework cipher / digest fetching for legacy nids with multiple name support
With multiple names, it's no longer viable to just grab the "first" in
the set and use that to find the legacy NID.  Instead, all names for
an algorithm must be checked, and if we encounter more than one NID
asssociated with those names, we consider it an error and make that
method unloadable.

This ensures that all methods that do have an internal NID associated
will get that NID in their structure, thereby ensuring that other
parts of libcrypto that haven't gone away from using NIDs for
comparison will continue to work as expected.

Reviewed-by: Paul Dale <paul.dale@oracle.com>
(Merged from https://github.com/openssl/openssl/pull/9969)
2019-09-23 09:13:25 +02:00
..
bio_b64.c
bio_enc.c
bio_md.c
bio_ok.c
build.info
c_allc.c
c_alld.c
cmeth_lib.c
digest.c Rework cipher / digest fetching for legacy nids with multiple name support 2019-09-23 09:13:25 +02:00
e_aes_cbc_hmac_sha1.c
e_aes_cbc_hmac_sha256.c
e_aes.c
e_aria.c
e_bf.c
e_camellia.c
e_cast.c
e_chacha20_poly1305.c
e_des3.c
e_des.c
e_idea.c
e_null.c
e_old.c
e_rc2.c
e_rc4_hmac_md5.c
e_rc4.c
e_rc5.c
e_seed.c
e_sm4.c
e_xcbc_d.c
encode.c
evp_cnf.c
evp_enc.c Rework cipher / digest fetching for legacy nids with multiple name support 2019-09-23 09:13:25 +02:00
evp_err.c util/mkerr.pl: make it not depend on the function code 2019-09-12 17:59:52 +02:00
evp_fetch.c Rework cipher / digest fetching for legacy nids with multiple name support 2019-09-23 09:13:25 +02:00
evp_key.c
evp_lib.c Avoid ?: construct in XXXerr calls 2019-09-19 09:27:38 -04:00
evp_locl.h Rework cipher / digest fetching for legacy nids with multiple name support 2019-09-23 09:13:25 +02:00
evp_pbe.c
evp_pkey.c
evp_utils.c Add EVP_CIPHER_CTX_tag_length() 2019-09-11 17:52:30 +10:00
exchange.c In provider implemented methods, save the name number, not the name string 2019-09-19 14:58:17 +02:00
kdf_lib.c In provider implemented methods, save the name number, not the name string 2019-09-19 14:58:17 +02:00
kdf_meth.c In provider implemented methods, save the name number, not the name string 2019-09-19 14:58:17 +02:00
keymgmt_lib.c
keymgmt_meth.c In provider implemented methods, save the name number, not the name string 2019-09-19 14:58:17 +02:00
m_md2.c
m_md4.c
m_md5_sha1.c
m_md5.c
m_mdc2.c
m_null.c
m_ripemd.c
m_sha1.c
m_sha3.c
m_sigver.c
m_wp.c
mac_lib.c
mac_meth.c Modify providers that keep track of underlying algorithms 2019-09-19 14:58:17 +02:00
names.c
p5_crpt2.c Usages of KDFs converted to use the name macros 2019-09-11 10:22:49 +10:00
p5_crpt.c
p_dec.c
p_enc.c
p_lib.c
p_open.c
p_seal.c
p_sign.c
p_verify.c
pbe_scrypt.c Usages of KDFs converted to use the name macros 2019-09-11 10:22:49 +10:00
pkey_kdf.c Avoid passing NULL to memcpy 2019-09-12 10:30:48 +01:00
pkey_mac.c Modify providers that keep track of underlying algorithms 2019-09-19 14:58:17 +02:00
pmeth_fn.c In provider implemented methods, save the name number, not the name string 2019-09-19 14:58:17 +02:00
pmeth_gn.c
pmeth_lib.c Move EVP_PKEY algorithm implementations into a union 2019-09-09 14:00:00 +01:00