OBJ_nid2sn
OBJ_nid2sn(k1->ecdsa_nid));
name = OBJ_nid2sn(nid);
const char *sname = OBJ_nid2sn(curves[n].nid);
if (!append_buf(&cap_buf, &cap_size, OBJ_nid2sn(nids[k])))
if (!append_buf(&cap_buf, &cap_size, OBJ_nid2sn(nids[k])))
if (!append_buf(&cap_buf, &cap_size, OBJ_nid2sn(nids[k])))
BIO_printf(bio_err, "Hash used: %s\n", OBJ_nid2sn(nid));
cname = OBJ_nid2sn(nid);
BIO_puts(sdb->out, OBJ_nid2sn(sig_nid));
return OBJ_nid2sn(nid);
BIO_printf(out, "+%s", OBJ_nid2sn(hash_nid));
BIO_printf(out, "Peer signing digest: %s\n", OBJ_nid2sn(nid));
BIO_printf(out, "%s, %d bits\n", OBJ_nid2sn(EVP_PKEY_get_id(key)),
const char *sn = OBJ_nid2sn(i);
OBJ_nid2sn(encnid));
ASN1_INTEGER_get(kdf->iter), OBJ_nid2sn(prfnid));
BIO_printf(bio_err, "PBKDF2 PRF: %s\n", OBJ_nid2sn(prfnid));
sn = OBJ_nid2sn(OBJ_obj2nid(obj));
const char *sn = OBJ_nid2sn(OBJ_obj2nid(excluded));
const char *sn = OBJ_nid2sn(OBJ_obj2nid(X509_EXTENSION_get_object(ex)));
objbuf = OBJ_nid2sn(fn_nid);
if (!EVP_PKEY_is_a(pkey, OBJ_nid2sn(pknid))) {
type = EVP_get_digestbyname(OBJ_nid2sn(i));
name = OBJ_nid2sn(nid);
EVP_MD *md = EVP_MD_fetch(ctx->libctx, OBJ_nid2sn(nid), ctx->propq);
num = ossl_namemap_add_name(arg, num, OBJ_nid2sn(base_nid));
num = ossl_namemap_add_name(arg, num, OBJ_nid2sn(nid));
"name=%s", OBJ_nid2sn(nid));
if (BIO_printf(bp, "ASN1 OID: %s", OBJ_nid2sn(nid)) <= 0)
if (BIO_printf(bp, "Field Type: %s\n", OBJ_nid2sn(tmp_nid))
OBJ_nid2sn(basis_type))
ctx->p2 = (char *)OBJ_nid2sn(ctx->p1);
? OBJ_nid2sn(ctx->p1)
type->type != NID_undef ? OBJ_nid2sn(type->type)
: OBJ_nid2sn(cipher->nid),
return OBJ_nid2sn(EVP_CIPHER_get_nid(cipher));
return OBJ_nid2sn(EVP_MD_nid(md));
cipher = cipher_fetch = EVP_CIPHER_fetch(libctx, OBJ_nid2sn(cipher_nid), propq);
OBJ_nid2sn(cipher_nid));
md = md_fetch = EVP_MD_fetch(libctx, OBJ_nid2sn(md_nid), propq);
r = OBJ_NAME_add(OBJ_nid2sn(c->nid), OBJ_NAME_TYPE_CIPHER_METH,
name = OBJ_nid2sn(md->type);
r = OBJ_NAME_add(OBJ_nid2sn(md->pkey_type),
prfmd = prfmd_fetch = EVP_MD_fetch(libctx, OBJ_nid2sn(hmac_md_nid), propq);
return OBJ_nid2sn(type);
const char *name = OBJ_nid2sn(EVP_PKEY_get_id(pkey));
const char *name = rv > 0 ? OBJ_nid2sn(nid) : NULL;
if (!EVP_KEYMGMT_is_a(tmp_keymgmt, OBJ_nid2sn(pk->type)))
keytype = OBJ_nid2sn(type);
&& !EVP_KEYMGMT_is_a(b->keymgmt, OBJ_nid2sn(a->type)))
&& !EVP_KEYMGMT_is_a(a->keymgmt, OBJ_nid2sn(b->type)))
: OBJ_nid2sn(nidtype),
keytype = OBJ_nid2sn(id);
s = OBJ_nid2sn(nid);
pbe_ciph = pbe_ciph_fetch = EVP_CIPHER_fetch(ctx, OBJ_nid2sn(pbe_nid), propq);
kdf_md = EVP_MD_fetch(ctx, OBJ_nid2sn(ossl_hmac2mdnid(kdf_hmac_nid)), propq);
cipher = EVP_CIPHER_fetch(libctx, OBJ_nid2sn(cipherid), propq);
pbe_ciph = pbe_ciph_fetch = EVP_CIPHER_fetch(ctx, OBJ_nid2sn(pbe_nid), propq);
fetched_md = EVP_MD_fetch(libctx, OBJ_nid2sn(md_type), propq);
"name=%s,section=%s", OBJ_nid2sn(ext_nid), value);
"name=%s", OBJ_nid2sn(ext_nid));
return v3_generic_extension(OBJ_nid2sn(ext_nid),
if (EVP_PKEY_is_a(issuer_key, OBJ_nid2sn(subj_sig_nid))
"name=%s", OBJ_nid2sn(OBJ_obj2nid(attr->object)));
"name=%s", OBJ_nid2sn(OBJ_obj2nid(obj)));
"name=%s", OBJ_nid2sn(nid));
if ((n == NID_undef) || ((s = OBJ_nid2sn(n)) == NULL)) {
} else if ((md = EVP_MD_fetch(cert->libctx, OBJ_nid2sn(mdnid),
name = OBJ_nid2sn(digest_data[i].nid);
name = OBJ_nid2sn(cipher_data[i].nid);
#define EVP_get_digestbynid(a) EVP_get_digestbyname(OBJ_nid2sn(a))
#define EVP_get_cipherbynid(a) EVP_get_cipherbyname(OBJ_nid2sn(a))
const char *OBJ_nid2sn(int n);
|| BIO_printf(out, "Basis Type: %s\n", OBJ_nid2sn(basis_type)) <= 0)
if (BIO_printf(out, "Field Type: %s\n", OBJ_nid2sn(tmp_nid)) <= 0
if (BIO_printf(out, "%s: %s\n", "ASN1 OID", OBJ_nid2sn(curve_nid)) <= 0)
if (EVP_PKEY_is_a(pk, OBJ_nid2sn(tmp_lu->pkey_nid))
if (EVP_PKEY_is_a(pk, OBJ_nid2sn(tmp_lu->pkey_nid))
ciph = EVP_CIPHER_fetch(libctx, OBJ_nid2sn(nid), properties);
md = EVP_MD_fetch(libctx, OBJ_nid2sn(nid), properties);
mdname = OBJ_nid2sn(sig->hash);
if (!TEST_true(EVP_PKEY_is_a(pkey, OBJ_nid2sn(pkey_nid)))) {
OBJ_nid2sn(sig_nid), OBJ_nid2sn(pkey_nid), OBJ_nid2sn(dig_nid));
OBJ_nid2sn(dig_nid),
OBJ_nid2sn(pkey_nid), OBJ_nid2sn(dig_nid));
OBJ_nid2sn(pkey_nid));
i, (*tmp)->pkey_id, OBJ_nid2sn((*tmp)->pkey_id));
|| !TEST_ptr(OBJ_nid2sn(NID_undef))
i, (*tmp)->pkey_id, OBJ_nid2sn((*tmp)->pkey_id));
TEST_info("Testing curve %s\n", OBJ_nid2sn(nid));
TEST_info("skipped: ECDSA unsupported for curve %s", OBJ_nid2sn(nid));
OBJ_nid2sn(nid));
OBJ_nid2sn(nid));
TEST_info("testing ECDSA for curve %s as %s key type", OBJ_nid2sn(nid),
TEST_info("ECDSA KATs for curve %s", OBJ_nid2sn(nid));
OBJ_nid2sn(nid));
TEST_info("EC_GROUP_check() failed with curve %s\n", OBJ_nid2sn(nid));
TEST_info("Curve %s failed\n", OBJ_nid2sn(nid));
TEST_note("Curve %s", OBJ_nid2sn(nid));
TEST_info("nid = %s, tnid = %s", OBJ_nid2sn(nid), OBJ_nid2sn(tnid));
TEST_info("nid = %s, tnid = %s", OBJ_nid2sn(nid), OBJ_nid2sn(tnid));
TEST_info("nid = %s, tnid = %s", OBJ_nid2sn(nid), OBJ_nid2sn(tnid));
TEST_info("Curve %s cardinality test", OBJ_nid2sn(nid));
TEST_note("Curve %s", OBJ_nid2sn(nid));
curve_name = OBJ_nid2sn(nid);
name = keys[tst].name ? keys[tst].name : OBJ_nid2sn(keys[tst].type);
pkey = EVP_PKEY_new_raw_private_key_ex(testctx, OBJ_nid2sn(ecxnids[tst]),
pkey = EVP_PKEY_new_raw_public_key_ex(testctx, OBJ_nid2sn(keys[tst].type),
|| !TEST_ptr(kdf2 = EVP_KDF_fetch(NULL, OBJ_nid2sn(OBJ_obj2nid(obj)),
if (!TEST_ptr(kdf2 = EVP_KDF_fetch(NULL, OBJ_nid2sn(NID_tls1_prf), NULL))
TEST_info("Trying the EVP_PKEY %s test", OBJ_nid2sn(expected->type));
OBJ_nid2sn(expected->type), expected->alg);
OBJ_nid2sn(expected->type), NULL,
md = EVP_MD_fetch(test_ctx, OBJ_nid2sn(mac->nid), test_propq);
OBJ_nid2sn(pbe_nid), failed ? "ERROR" : "OK");
OBJ_nid2sn(enc->nid), enc->iter);
OBJ_nid2sn(mac->nid), mac->iter);
OBJ_nid2sn(enc->nid), enc->iter);
TEST_note("Expected %s, got %s\n", OBJ_nid2sn(nid),
OBJ_nid2sn(clu->pkey_nid));
algname = OBJ_nid2sn(keyid);
BIO_printf(bio_stdout, ", digest=%s", OBJ_nid2sn(mdnid));
key->tls_name = OPENSSL_strdup(OBJ_nid2sn(nid));
TEST_note("%d : %s", (*tmp)->ext_nid, OBJ_nid2sn((*tmp)->ext_nid));