diff options
author | Pauli <pauli@openssl.org> | 2021-04-16 09:13:43 +1000 |
---|---|---|
committer | Pauli <pauli@openssl.org> | 2021-04-17 18:22:13 +1000 |
commit | e494fac705057c91017b41fa761f9406c87f4cc5 (patch) | |
tree | 133c928c393002291a2f0ef61de870ddc2cbe8ef /providers/fips | |
parent | 7b9f02798f68d9108623f5879f3fc73c06f9a2c7 (diff) |
Fix naming for EVP_RAND_CTX_gettable functions.
Change:
EVP_RAND_gettable_ctx_params -> EVP_RAND_CTX_gettable_params
EVP_RAND_settable_ctx_params -> EVP_RAND_CTX_settable_params
Which brings them in line with the other similar functions for other algorithm
types.
Fixes #14880
Reviewed-by: Tim Hudson <tjh@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/14893)
Diffstat (limited to 'providers/fips')
-rw-r--r-- | providers/fips/self_test_kats.c | 8 |
1 files changed, 4 insertions, 4 deletions
diff --git a/providers/fips/self_test_kats.c b/providers/fips/self_test_kats.c index 0041a88842..1b89cc82ae 100644 --- a/providers/fips/self_test_kats.c +++ b/providers/fips/self_test_kats.c @@ -273,7 +273,7 @@ static int self_test_drbg(const ST_KAT_DRBG *t, OSSL_SELF_TEST *st, drbg_params[0] = OSSL_PARAM_construct_uint(OSSL_RAND_PARAM_STRENGTH, &strength); - if (!EVP_RAND_set_ctx_params(test, drbg_params)) + if (!EVP_RAND_CTX_set_params(test, drbg_params)) goto err; rand = EVP_RAND_fetch(libctx, t->algorithm, NULL); @@ -292,7 +292,7 @@ static int self_test_drbg(const ST_KAT_DRBG *t, OSSL_SELF_TEST *st, /* This is only used by HMAC-DRBG but it is ignored by the others */ drbg_params[1] = OSSL_PARAM_construct_utf8_string(OSSL_DRBG_PARAM_MAC, "HMAC", 0); - if (!EVP_RAND_set_ctx_params(drbg, drbg_params)) + if (!EVP_RAND_CTX_set_params(drbg, drbg_params)) goto err; drbg_params[0] = @@ -312,7 +312,7 @@ static int self_test_drbg(const ST_KAT_DRBG *t, OSSL_SELF_TEST *st, OSSL_PARAM_construct_octet_string(OSSL_RAND_PARAM_TEST_ENTROPY, (void *)t->entropyinpr1, t->entropyinpr1len); - if (!EVP_RAND_set_ctx_params(test, drbg_params)) + if (!EVP_RAND_CTX_set_params(test, drbg_params)) goto err; if (!EVP_RAND_generate(drbg, out, t->expectedlen, strength, @@ -324,7 +324,7 @@ static int self_test_drbg(const ST_KAT_DRBG *t, OSSL_SELF_TEST *st, OSSL_PARAM_construct_octet_string(OSSL_RAND_PARAM_TEST_ENTROPY, (void *)t->entropyinpr2, t->entropyinpr2len); - if (!EVP_RAND_set_ctx_params(test, drbg_params)) + if (!EVP_RAND_CTX_set_params(test, drbg_params)) goto err; /* |