/freebsd-current/crypto/openssl/crypto/evp/ |
H A D | keymgmt_lib.c | 34 /* Just in time creation of keydata */ 35 if (data->keydata == NULL) { 36 if ((data->keydata = evp_keymgmt_newdata(data->keymgmt)) == NULL) { 50 if (evp_keymgmt_import(data->keymgmt, data->keydata, data->selection, 54 evp_keymgmt_freedata(data->keymgmt, data->keydata); 55 data->keydata = NULL; 61 void *keydata) 63 if (pkey == NULL || keymgmt == NULL || keydata == NULL 68 pkey->keydata = keydata; 60 evp_keymgmt_util_assign_pkey(EVP_PKEY *pkey, EVP_KEYMGMT *keymgmt, void *keydata) argument 73 evp_keymgmt_util_make_pkey(EVP_KEYMGMT *keymgmt, void *keydata) argument 255 evp_keymgmt_util_cache_keydata(EVP_PKEY *pk, EVP_KEYMGMT *keymgmt, void *keydata, int selection) argument 317 void *keydata = NULL; local 515 void *keydata = NULL; local 532 evp_keymgmt_util_get_deflt_digest_name(EVP_KEYMGMT *keymgmt, void *keydata, char *mdname, size_t mdname_sz) argument [all...] |
H A D | keymgmt_meth.c | 324 void evp_keymgmt_freedata(const EVP_KEYMGMT *keymgmt, void *keydata) argument 327 keymgmt->free(keydata); 398 int evp_keymgmt_get_params(const EVP_KEYMGMT *keymgmt, void *keydata, argument 403 return keymgmt->get_params(keydata, params); 415 int evp_keymgmt_set_params(const EVP_KEYMGMT *keymgmt, void *keydata, argument 420 return keymgmt->set_params(keydata, params); 432 int evp_keymgmt_has(const EVP_KEYMGMT *keymgmt, void *keydata, int selection) argument 435 return keymgmt->has(keydata, selection); 438 int evp_keymgmt_validate(const EVP_KEYMGMT *keymgmt, void *keydata, argument 444 return keymgmt->validate(keydata, selectio 457 evp_keymgmt_import(const EVP_KEYMGMT *keymgmt, void *keydata, int selection, const OSSL_PARAM params[]) argument 473 evp_keymgmt_export(const EVP_KEYMGMT *keymgmt, void *keydata, int selection, OSSL_CALLBACK *param_cb, void *cbarg) argument [all...] |
H A D | pmeth_check.c | 31 void *keydata; local 37 keydata = evp_pkey_export_to_provider(ctx->pkey, ctx->libctx, 39 if (keydata == NULL) { 44 return evp_keymgmt_validate(keymgmt, keydata, selection, checktype);
|
H A D | p_lib.c | 187 * to copy the appropriate data to |to|'s keydata. 188 * We cannot override existing data so do it only if there is no keydata 191 if (to->keymgmt != NULL && to->keydata == NULL) { 204 ok = (to->keydata = evp_keymgmt_dup(to->keymgmt, 261 * step is to do a bit of cross export to ensure we have keydata for 265 keydata1 = a->keydata; 267 keydata2 = b->keydata; 1340 pkey->keydata, 1516 free_it = free_it || pkey->keydata != NULL; 1771 evp_keymgmt_freedata(x->keymgmt, x->keydata); 1837 void *keydata = NULL; local 2011 void *keydata = src->keydata; local [all...] |
H A D | pmeth_gn.c | 170 void *keydata = local 177 * It's ok if keydata is NULL here. The backend is expected to deal 181 ctx->op.keymgmt.genctx, keydata); 366 void *keydata = NULL; local 385 keydata = evp_keymgmt_util_fromdata(*ppkey, ctx->keymgmt, selection, params); 386 if (keydata == NULL) { 393 /* keydata is cached in *ppkey, so we need not bother with it further */
|
/freebsd-current/crypto/heimdal/lib/krb5/ |
H A D | crypto-pk.c | 50 void *keydata; local 63 keydata = malloc(keylen); 64 if (keydata == NULL) { 71 free(keydata); 91 memcpy((unsigned char *)keydata + offset, 102 ret = krb5_random_to_key(context, type, keydata, keylen, key); 103 memset(keydata, 0, sizeof(keylen)); 104 free(keydata); 215 unsigned char *keydata; local 250 keydata [all...] |
/freebsd-current/crypto/openssl/test/ |
H A D | keymgmt_internal_test.c | 103 unsigned long *keydata = arg; local 106 if (keydata == NULL) 110 || !TEST_true(get_ulong_via_BN(p, &keydata[N])) 112 || !TEST_true(get_ulong_via_BN(p, &keydata[E])) 114 || !TEST_true(get_ulong_via_BN(p, &keydata[D]))) 118 || !TEST_true(get_ulong_via_BN(p, &keydata[P])) 120 || !TEST_true(get_ulong_via_BN(p, &keydata[Q])) 122 || !TEST_true(get_ulong_via_BN(p, &keydata[F3]))) 126 || !TEST_true(get_ulong_via_BN(p, &keydata[DP])) 128 || !TEST_true(get_ulong_via_BN(p, &keydata[D 175 static unsigned long keydata[OSSL_NELEM(expected)] = { 0, }; local 301 void *keydata = NULL; local [all...] |
H A D | fake_rsaprov.c | 55 static void fake_rsa_keymgmt_free(void *keydata) argument 57 OPENSSL_free(keydata); 77 static int fake_rsa_keymgmt_import(void *keydata, int selection, argument 80 struct fake_rsa_keydata *fake_rsa_key = keydata; 161 static int fake_rsa_keymgmt_export(void *keydata, int selection, argument 246 struct fake_rsa_keydata *keydata; local 252 if (!TEST_ptr(keydata = fake_rsa_keymgmt_new(NULL))) 255 keydata->status = 2; 256 return keydata; 311 struct fake_rsa_keydata *keydata local [all...] |
/freebsd-current/sys/kgssapi/krb5/ |
H A D | kcrypto.h | 100 krb5_set_key(struct krb5_key_state *ks, const void *keydata) argument 103 ks->ks_class->ec_set_key(ks, keydata); 107 krb5_random_to_key(struct krb5_key_state *ks, const void *keydata) argument 110 ks->ks_class->ec_random_to_key(ks, keydata);
|
/freebsd-current/contrib/ldns/ldns/ |
H A D | tsig.h | 30 const char *keydata; member in struct:ldns_tsig_credentials_struct
|
/freebsd-current/contrib/unbound/sldns/ |
H A D | keyraw.h | 32 * get the length of the keydata in bits 33 * \param[in] keydata the raw key data 34 * \param[in] len the length of the keydata 38 size_t sldns_rr_dnskey_key_size_raw(const unsigned char *keydata,
|
/freebsd-current/crypto/openssl/crypto/encode_decode/ |
H A D | decoder_pkey.c | 136 void *keydata = NULL; local 147 keydata = evp_keymgmt_load(keymgmt, object_ref, object_ref_sz); 152 import_data.keydata = NULL; 161 * |import_data.keydata| is as much an indicator. 167 keydata = import_data.keydata; 168 import_data.keydata = NULL; 171 if (keydata != NULL 172 && (pkey = evp_keymgmt_util_make_pkey(keymgmt, keydata)) == NULL) 173 evp_keymgmt_freedata(keymgmt, keydata); [all...] |
/freebsd-current/crypto/openssl/providers/implementations/keymgmt/ |
H A D | mac_legacy_kmgmt.c | 138 static int mac_has(const void *keydata, int selection) argument 140 const MAC_KEY *key = keydata; 231 static int mac_import(void *keydata, int selection, const OSSL_PARAM params[]) argument 233 MAC_KEY *key = keydata; 273 static int mac_export(void *keydata, int selection, OSSL_CALLBACK *param_cb, argument 276 MAC_KEY *key = keydata; 357 static int mac_set_params(void *keydata, const OSSL_PARAM params[]) argument 359 MAC_KEY *key = keydata;
|
H A D | kdf_legacy_kmgmt.c | 94 static int kdf_has(const void *keydata, int selection) argument
|
H A D | ecx_kmgmt.c | 122 static int ecx_has(const void *keydata, int selection) argument 124 const ECX_KEY *key = keydata; 191 static int ecx_import(void *keydata, int selection, const OSSL_PARAM params[]) argument 193 ECX_KEY *key = keydata; 230 static int ecx_export(void *keydata, int selection, OSSL_CALLBACK *param_cb, argument 233 ECX_KEY *key = keydata; 749 static int ecx_validate(const void *keydata, int selection, int type, size_t keylen) argument 751 const ECX_KEY *ecx = keydata; 777 static int x25519_validate(const void *keydata, int selection, int checktype) argument 779 return ecx_validate(keydata, selectio 782 x448_validate(const void *keydata, int selection, int checktype) argument 787 ed25519_validate(const void *keydata, int selection, int checktype) argument 792 ed448_validate(const void *keydata, int selection, int checktype) argument [all...] |
H A D | rsa_kmgmt.c | 110 static void rsa_freedata(void *keydata) argument 112 RSA_free(keydata); 115 static int rsa_has(const void *keydata, int selection) argument 117 const RSA *rsa = keydata; 173 static int rsa_import(void *keydata, int selection, const OSSL_PARAM params[]) argument 175 RSA *rsa = keydata; 203 static int rsa_export(void *keydata, int selection, argument 206 RSA *rsa = keydata; 392 static int rsa_validate(const void *keydata, int selection, int checktype) argument 394 const RSA *rsa = keydata; [all...] |
H A D | dsa_kmgmt.c | 125 static void dsa_freedata(void *keydata) argument 127 DSA_free(keydata); 130 static int dsa_has(const void *keydata, int selection) argument 132 const DSA *dsa = keydata; 191 static int dsa_import(void *keydata, int selection, const OSSL_PARAM params[]) argument 193 DSA *dsa = keydata; 215 static int dsa_export(void *keydata, int selection, OSSL_CALLBACK *param_cb, argument 218 DSA *dsa = keydata; 378 static int dsa_validate(const void *keydata, int selection, int checktype) argument 380 const DSA *dsa = keydata; [all...] |
/freebsd-current/crypto/openssl/providers/implementations/encode_decode/ |
H A D | decode_pvk2key.c | 190 void *keydata; local 192 if (reference_sz == sizeof(keydata) && export != NULL) { 198 keydata = *(void **)reference; 200 return export(keydata, selection, export_cb, export_cbarg);
|
H A D | decode_msblob2key.c | 223 void *keydata; local 225 if (reference_sz == sizeof(keydata) && export != NULL) { 231 keydata = *(void **)reference; 233 return export(keydata, selection, export_cb, export_cbarg);
|
/freebsd-current/contrib/ldns/ |
H A D | rr_functions.c | 268 ldns_rr_dnskey_key_size_raw(const unsigned char* keydata, argument 286 t = keydata[0]; 301 if (keydata[0] == 0) { 304 memmove(&int16, keydata + 1, 2); 311 exp = keydata[0];
|
/freebsd-current/usr.sbin/sa/ |
H A D | pdb.c | 113 char keydata[sizeof ci->ci_comm]; local 116 bcopy(ci->ci_comm, &keydata, sizeof keydata); 117 key.data = &keydata; 118 key.size = strlen(keydata);
|
/freebsd-current/crypto/openssl/crypto/store/ |
H A D | store_result.c | 193 void *keydata = NULL; local 202 while (keymgmt != NULL && keydata == NULL && try_fallback-- > 0) { 214 keydata = evp_keymgmt_load(keymgmt, data->ref, data->ref_size); 221 import_data.keydata = NULL; 227 * |import_data.keydata| is as much an indicator. 235 keydata = import_data.keydata; 238 if (keydata == NULL && try_fallback > 0) { 248 if (keydata != NULL) { 250 pk = evp_keymgmt_util_make_pkey(keymgmt, keydata); [all...] |
/freebsd-current/crypto/openssl/include/crypto/ |
H A D | evp.h | 582 * those providers, and maintain a cache of the imported keydata, 591 void *keydata; member in struct:__anon4044 607 * || (keymgmt != NULL && keydata == NULL) ## provider side 612 * || (keymgmt != NULL && keydata != NULL) ## provider side 628 ((pk)->pkey.ptr != NULL || (pk)->keydata != NULL) 631 ((pk)->keydata != NULL) 687 * Provider keydata "origin" is composed of a pointer to an EVP_KEYMGMT 692 void *keydata; member in struct:evp_pkey_st 694 * If any libcrypto code does anything that may modify the keydata 702 * those providers, and maintain a cache of the imported keydata, 771 void *keydata; member in struct:evp_keymgmt_util_try_import_data_st [all...] |
/freebsd-current/crypto/heimdal/lib/hx509/ |
H A D | ks_file.c | 147 heim_octet_string keydata; local 155 keydata.data = rk_UNCONST(data); 156 keydata.length = length; 163 &keydata); 302 heim_octet_string keydata; local 304 keydata.data = rk_UNCONST(data); 305 keydata.length = len; 308 &keydata, NULL);
|
/freebsd-current/lib/libc/db/test/btree.tests/ |
H A D | main.c | 69 void keydata(DBT *, DBT *); 318 keydata(&key, &data); 389 keydata(&key, &data); 418 keydata(&key, &data); 572 keydata(&key, &data); 673 keydata(&key, &data); 696 keydata(&key, &data); 742 keydata(key, data) function
|