/freebsd-current/crypto/openssl/crypto/evp/ |
H A D | keymgmt_meth.c | 22 EVP_KEYMGMT *keymgmt = NULL; local 24 if ((keymgmt = OPENSSL_zalloc(sizeof(*keymgmt))) == NULL 25 || (keymgmt->lock = CRYPTO_THREAD_lock_new()) == NULL) { 26 EVP_KEYMGMT_free(keymgmt); 31 keymgmt->refcnt = 1; 33 return keymgmt; 41 EVP_KEYMGMT *keymgmt = NULL; local 46 if ((keymgmt = keymgmt_new()) == NULL) 49 keymgmt 236 EVP_KEYMGMT_up_ref(EVP_KEYMGMT *keymgmt) argument 244 EVP_KEYMGMT_free(EVP_KEYMGMT *keymgmt) argument 260 EVP_KEYMGMT_get0_provider(const EVP_KEYMGMT *keymgmt) argument 265 evp_keymgmt_get_number(const EVP_KEYMGMT *keymgmt) argument 270 EVP_KEYMGMT_get0_description(const EVP_KEYMGMT *keymgmt) argument 275 EVP_KEYMGMT_get0_name(const EVP_KEYMGMT *keymgmt) argument 280 EVP_KEYMGMT_is_a(const EVP_KEYMGMT *keymgmt, const char *name) argument 286 EVP_KEYMGMT_do_all_provided(OSSL_LIB_CTX *libctx, void (*fn)(EVP_KEYMGMT *keymgmt, void *arg), void *arg) argument 297 EVP_KEYMGMT_names_do_all(const EVP_KEYMGMT *keymgmt, void (*fn)(const char *name, void *data), void *data) argument 310 evp_keymgmt_newdata(const EVP_KEYMGMT *keymgmt) argument 324 evp_keymgmt_freedata(const EVP_KEYMGMT *keymgmt, void *keydata) argument 330 evp_keymgmt_gen_init(const EVP_KEYMGMT *keymgmt, int selection, const OSSL_PARAM params[]) argument 340 evp_keymgmt_gen_set_template(const EVP_KEYMGMT *keymgmt, void *genctx, void *template) argument 354 evp_keymgmt_gen_set_params(const EVP_KEYMGMT *keymgmt, void *genctx, const OSSL_PARAM params[]) argument 362 EVP_KEYMGMT_gen_settable_params(const EVP_KEYMGMT *keymgmt) argument 371 evp_keymgmt_gen(const EVP_KEYMGMT *keymgmt, void *genctx, OSSL_CALLBACK *cb, void *cbarg) argument 379 evp_keymgmt_gen_cleanup(const EVP_KEYMGMT *keymgmt, void *genctx) argument 385 evp_keymgmt_has_load(const EVP_KEYMGMT *keymgmt) argument 390 evp_keymgmt_load(const EVP_KEYMGMT *keymgmt, const void *objref, size_t objref_sz) argument 398 evp_keymgmt_get_params(const EVP_KEYMGMT *keymgmt, void *keydata, OSSL_PARAM params[]) argument 406 EVP_KEYMGMT_gettable_params(const EVP_KEYMGMT *keymgmt) argument 415 evp_keymgmt_set_params(const EVP_KEYMGMT *keymgmt, void *keydata, const OSSL_PARAM params[]) argument 423 EVP_KEYMGMT_settable_params(const EVP_KEYMGMT *keymgmt) argument 432 evp_keymgmt_has(const EVP_KEYMGMT *keymgmt, void *keydata, int selection) argument 438 evp_keymgmt_validate(const EVP_KEYMGMT *keymgmt, void *keydata, int selection, int checktype) argument 447 evp_keymgmt_match(const EVP_KEYMGMT *keymgmt, const void *keydata1, const void *keydata2, int selection) argument 457 evp_keymgmt_import(const EVP_KEYMGMT *keymgmt, void *keydata, int selection, const OSSL_PARAM params[]) argument 465 evp_keymgmt_import_types(const EVP_KEYMGMT *keymgmt, int selection) argument 473 evp_keymgmt_export(const EVP_KEYMGMT *keymgmt, void *keydata, int selection, OSSL_CALLBACK *param_cb, void *cbarg) argument 481 evp_keymgmt_export_types(const EVP_KEYMGMT *keymgmt, int selection) argument 489 evp_keymgmt_dup(const EVP_KEYMGMT *keymgmt, const void *keydata_from, int selection) argument [all...] |
H A D | keymgmt_lib.c | 36 if ((data->keydata = evp_keymgmt_newdata(data->keymgmt)) == NULL) { 50 if (evp_keymgmt_import(data->keymgmt, data->keydata, data->selection, 54 evp_keymgmt_freedata(data->keymgmt, data->keydata); 60 int evp_keymgmt_util_assign_pkey(EVP_PKEY *pkey, EVP_KEYMGMT *keymgmt, argument 63 if (pkey == NULL || keymgmt == NULL || keydata == NULL 64 || !EVP_PKEY_set_type_by_keymgmt(pkey, keymgmt)) { 73 EVP_PKEY *evp_keymgmt_util_make_pkey(EVP_KEYMGMT *keymgmt, void *keydata) argument 77 if (keymgmt == NULL 80 || !evp_keymgmt_util_assign_pkey(pkey, keymgmt, keydata)) { 92 return evp_keymgmt_export(pk->keymgmt, p 96 evp_keymgmt_util_export_to_provider(EVP_PKEY *pk, EVP_KEYMGMT *keymgmt, int selection) argument 236 evp_keymgmt_util_find_operation_cache(EVP_PKEY *pk, EVP_KEYMGMT *keymgmt, int selection) argument 255 evp_keymgmt_util_cache_keydata(EVP_PKEY *pk, EVP_KEYMGMT *keymgmt, void *keydata, int selection) argument 314 evp_keymgmt_util_fromdata(EVP_PKEY *target, EVP_KEYMGMT *keymgmt, int selection, const OSSL_PARAM params[]) argument 512 evp_keymgmt_util_gen(EVP_PKEY *target, EVP_KEYMGMT *keymgmt, void *genctx, OSSL_CALLBACK *cb, void *cbarg) argument 532 evp_keymgmt_util_get_deflt_digest_name(EVP_KEYMGMT *keymgmt, void *keydata, char *mdname, size_t mdname_sz) argument 577 evp_keymgmt_util_query_operation_name(EVP_KEYMGMT *keymgmt, int op_id) argument [all...] |
H A D | pmeth_gn.c | 35 if (ctx->keymgmt == NULL || ctx->keymgmt->gen_init == NULL) 40 ctx->op.keymgmt.genctx = 41 evp_keymgmt_gen_init(ctx->keymgmt, 45 ctx->op.keymgmt.genctx = 46 evp_keymgmt_gen_init(ctx->keymgmt, OSSL_KEYMGMT_SELECT_KEYPAIR, 51 if (ctx->op.keymgmt.genctx == NULL) 152 if (ctx->op.keymgmt.genctx == NULL) 169 EVP_KEYMGMT *tmp_keymgmt = ctx->keymgmt; 180 ret = evp_keymgmt_gen_set_template(ctx->keymgmt, [all...] |
H A D | p_lib.c | 54 int len, EVP_KEYMGMT *keymgmt); 155 if (EVP_PKEY_set_type_by_keymgmt(to, from->keymgmt) == 0) 178 /* For purely provided keys, we just call the keymgmt utility */ 179 if (to->keymgmt != NULL && from->keymgmt != NULL) { 186 * Try exporting |from| to |to|'s keymgmt, then use evp_keymgmt_dup() 191 if (to->keymgmt != NULL && to->keydata == NULL) { 192 EVP_KEYMGMT *to_keymgmt = to->keymgmt; 204 ok = (to->keydata = evp_keymgmt_dup(to->keymgmt, 221 if (pkey->keymgmt ! 1492 pkey_set_type(EVP_PKEY *pkey, ENGINE *e, int type, const char *str, int len, EVP_KEYMGMT *keymgmt) argument 1630 EVP_PKEY_set_type_by_keymgmt(EVP_PKEY *pkey, EVP_KEYMGMT *keymgmt) argument 1830 evp_pkey_export_to_provider(EVP_PKEY *pk, OSSL_LIB_CTX *libctx, EVP_KEYMGMT **keymgmt, const char *propquery) argument 2010 EVP_KEYMGMT *keymgmt = src->keymgmt; local [all...] |
H A D | pmeth_check.c | 30 EVP_KEYMGMT *keymgmt; local 36 keymgmt = ctx->keymgmt; 38 &keymgmt, ctx->propquery); 44 return evp_keymgmt_validate(keymgmt, keydata, selection, checktype);
|
H A D | exchange.c | 231 || !EVP_PKEY_set_type_by_keymgmt(pkey, ctx->keymgmt) 232 || (pkey->keydata = evp_keymgmt_newdata(ctx->keymgmt)) == NULL) { 242 * Try to derive the supported exch from |ctx->keymgmt|. 244 if (!ossl_assert(ctx->pkey->keymgmt == NULL 245 || ctx->pkey->keymgmt == ctx->keymgmt)) { 250 supported_exch = evp_keymgmt_util_query_operation_name(ctx->keymgmt, 265 * as |ctx->keymgmt| 267 * We then try to fetch the keymgmt from the same provider as the 268 * exchange, and try to export |ctx->pkey| to that keymgmt (whe [all...] |
H A D | pmeth_lib.c | 150 static int get_legacy_alg_type_from_keymgmt(const EVP_KEYMGMT *keymgmt) argument 154 EVP_KEYMGMT_names_do_all(keymgmt, help_get_legacy_alg_type_from_keymgmt, 172 && ctx->op.keymgmt.genctx != NULL) 188 EVP_KEYMGMT *keymgmt = NULL; local 198 keytype = EVP_KEYMGMT_get0_name(pkey->keymgmt); 209 /* If no ID was found here, we can only resort to find a keymgmt */ 271 * keymgmt. Otherwise, we fetch one for the keytype we got. This 275 if (pkey != NULL && pkey->keymgmt != NULL) { 276 if (!EVP_KEYMGMT_up_ref(pkey->keymgmt)) 279 keymgmt [all...] |
H A D | asymcipher.c | 51 * Try to derive the supported asym cipher from |ctx->keymgmt|. 53 if (!ossl_assert(ctx->pkey->keymgmt == NULL 54 || ctx->pkey->keymgmt == ctx->keymgmt)) { 60 = evp_keymgmt_util_query_operation_name(ctx->keymgmt, 74 * as |ctx->keymgmt| 76 * We then try to fetch the keymgmt from the same provider as the 77 * asym cipher, and try to export |ctx->pkey| to that keymgmt (when 78 * this keymgmt happens to be the same as |ctx->keymgmt|, th [all...] |
H A D | kem.c | 45 * Try to derive the supported kem from |ctx->keymgmt|. 47 if (!ossl_assert(ctx->pkey->keymgmt == NULL 48 || ctx->pkey->keymgmt == ctx->keymgmt)) { 52 supported_kem = evp_keymgmt_util_query_operation_name(ctx->keymgmt, 67 * as |ctx->keymgmt| 69 * We then try to fetch the keymgmt from the same provider as the 70 * kem, and try to export |ctx->pkey| to that keymgmt (when this 71 * keymgmt happens to be the same as |ctx->keymgmt|, th [all...] |
H A D | evp_pkey.c | 229 if (key->keymgmt != NULL) 230 return EVP_KEYMGMT_get0_name(key->keymgmt); 244 return EVP_KEYMGMT_get0_provider(key->keymgmt);
|
H A D | m_sigver.c | 107 * Try to derive the supported signature from |locpctx->keymgmt|. 109 if (!ossl_assert(locpctx->pkey->keymgmt == NULL 110 || locpctx->pkey->keymgmt == locpctx->keymgmt)) { 115 supported_sig = evp_keymgmt_util_query_operation_name(locpctx->keymgmt, 129 * as |ctx->keymgmt| 131 * We then try to fetch the keymgmt from the same provider as the 132 * signature, and try to export |ctx->pkey| to that keymgmt (when 133 * this keymgmt happens to be the same as |ctx->keymgmt|, th [all...] |
H A D | signature.c | 425 * Try to derive the supported signature from |ctx->keymgmt|. 427 if (!ossl_assert(ctx->pkey->keymgmt == NULL 428 || ctx->pkey->keymgmt == ctx->keymgmt)) { 433 supported_sig = evp_keymgmt_util_query_operation_name(ctx->keymgmt, 447 * as |ctx->keymgmt| 449 * We then try to fetch the keymgmt from the same provider as the 450 * signature, and try to export |ctx->pkey| to that keymgmt (when 451 * this keymgmt happens to be the same as |ctx->keymgmt|, th [all...] |
/freebsd-current/crypto/openssl/crypto/encode_decode/ |
H A D | decoder_pkey.c | 51 * The construct data, and collecting keymgmt information for it 74 EVP_KEYMGMT *keymgmt = NULL; local 111 * First, we try to find a keymgmt that comes from the same provider as 116 keymgmt = sk_EVP_KEYMGMT_value(data->keymgmts, i); 117 keymgmt_prov = EVP_KEYMGMT_get0_provider(keymgmt); 120 && evp_keymgmt_has_load(keymgmt) 121 && EVP_KEYMGMT_is_a(keymgmt, data->object_type)) 126 if (!EVP_KEYMGMT_up_ref(keymgmt)) 128 } else if ((keymgmt = EVP_KEYMGMT_fetch(data->libctx, 131 keymgmt_prov = EVP_KEYMGMT_get0_provider(keymgmt); 209 collect_keymgmt(EVP_KEYMGMT *keymgmt, void *arg) argument 356 EVP_KEYMGMT *keymgmt = sk_EVP_KEYMGMT_value(process_data->keymgmts, i); local [all...] |
H A D | encoder_pkey.c | 106 * from the same provider as the keymgmt are looked up, and one where 185 const OSSL_PROVIDER *k_prov = EVP_KEYMGMT_get0_provider(pk->keymgmt); 191 if (!evp_keymgmt_export(pk->keymgmt, pk->keydata, data->selection, 238 prov = EVP_KEYMGMT_get0_provider(pkey->keymgmt); 242 if (pkey->keymgmt != NULL) { 253 * First, collect the keymgmt names, then the encoders that match. 262 EVP_KEYMGMT_names_do_all(pkey->keymgmt, collect_name, &keymgmt_data); 276 * Place the encoders with the a different provider as the keymgmt 283 * Place the encoders with the same provider as the keymgmt first 343 const OSSL_PROVIDER *prov = EVP_KEYMGMT_get0_provider(pkey->keymgmt); [all...] |
/freebsd-current/crypto/openssl/include/crypto/ |
H A D | evp.h | 26 ((ctx)->keymgmt == NULL) 35 * Library context, property query, keytype and keymgmt associated with 41 /* If |pkey| below is set, this field is always a reference to its keymgmt */ 42 EVP_KEYMGMT *keymgmt; member in struct:evp_pkey_ctx_st 47 } keymgmt; member in union:evp_pkey_ctx_st::__anon4036 590 EVP_KEYMGMT *keymgmt; member in struct:__anon4044 602 * type == EVP_PKEY_NONE && keymgmt == NULL 607 * || (keymgmt != NULL && keydata == NULL) ## provider side 612 * || (keymgmt != NULL && keydata != NULL) ## provider side 616 * keymgmt 691 EVP_KEYMGMT *keymgmt; member in struct:evp_pkey_st 770 EVP_KEYMGMT *keymgmt; member in struct:evp_keymgmt_util_try_import_data_st [all...] |
/freebsd-current/crypto/openssl/test/ |
H A D | algorithmid_test.c | 28 EVP_KEYMGMT *keymgmt = NULL; local 57 * The |keymgmt|, however, should, as its reference count is incremented 61 &keymgmt, NULL)) == NULL) { 69 if (!TEST_true(EVP_KEYMGMT_is_a(keymgmt, name))) { 78 if (!TEST_ptr(gettable_params = EVP_KEYMGMT_gettable_params(keymgmt)) 80 TEST_info("The %s provider keymgmt appears to lack support for algorithm-id." 88 if (!TEST_true(evp_keymgmt_get_params(keymgmt, keydata, params))) 98 EVP_KEYMGMT_free(keymgmt); 164 TEST_info("The %s provider keymgmt appears to lack support for algorithm-id"
|
H A D | keymgmt_internal_test.c | 299 EVP_KEYMGMT *keymgmt = NULL; local 330 &keymgmt, NULL))) 333 keymgmt = EVP_KEYMGMT_fetch(libctx, "RSA", NULL); 336 &keymgmt, NULL))) 344 EVP_KEYMGMT_free(keymgmt);
|
/freebsd-current/crypto/openssl/crypto/store/ |
H A D | store_result.c | 192 EVP_KEYMGMT *keymgmt = NULL; local 200 keymgmt = EVP_KEYMGMT_fetch(libctx, data->data_type, propq); 202 while (keymgmt != NULL && keydata == NULL && try_fallback-- > 0) { 206 * 1. The keymgmt is from the same provider as the loader, 208 * 2. The keymgmt is from another provider, then we must 211 if (EVP_KEYMGMT_get0_provider(keymgmt) == provider) { 214 keydata = evp_keymgmt_load(keymgmt, data->ref, data->ref_size); 220 import_data.keymgmt = keymgmt; 239 EVP_KEYMGMT_free(keymgmt); [all...] |
/freebsd-current/contrib/wpa/src/drivers/ |
H A D | driver_wext.h | 75 int wpa_driver_wext_keymgmt2wext(int keymgmt);
|
/freebsd-current/crypto/openssl/include/openssl/ |
H A D | evp.h | 1321 int EVP_PKEY_set_type_by_keymgmt(EVP_PKEY *pkey, EVP_KEYMGMT *keymgmt); 1760 int EVP_KEYMGMT_up_ref(EVP_KEYMGMT *keymgmt); 1761 void EVP_KEYMGMT_free(EVP_KEYMGMT *keymgmt); 1762 const OSSL_PROVIDER *EVP_KEYMGMT_get0_provider(const EVP_KEYMGMT *keymgmt); 1763 const char *EVP_KEYMGMT_get0_name(const EVP_KEYMGMT *keymgmt); 1764 const char *EVP_KEYMGMT_get0_description(const EVP_KEYMGMT *keymgmt); 1765 int EVP_KEYMGMT_is_a(const EVP_KEYMGMT *keymgmt, const char *name); 1767 void (*fn)(EVP_KEYMGMT *keymgmt, void *arg), 1769 int EVP_KEYMGMT_names_do_all(const EVP_KEYMGMT *keymgmt, 1772 const OSSL_PARAM *EVP_KEYMGMT_gettable_params(const EVP_KEYMGMT *keymgmt); [all...] |
/freebsd-current/secure/lib/libcrypto/man/man7/ |
H A D | Makefile | 117 MAN+= provider-keymgmt.7
|
/freebsd-current/crypto/openssl/crypto/ec/ |
H A D | ecx_meth.c | 267 if (pkey->keymgmt != NULL) 268 libctx = ossl_provider_libctx(EVP_KEYMGMT_get0_provider(pkey->keymgmt)); 285 if (pkey->keymgmt != NULL) 286 libctx = ossl_provider_libctx(EVP_KEYMGMT_get0_provider(pkey->keymgmt));
|
/freebsd-current/crypto/openssl/ssl/ |
H A D | t1_lib.c | 235 EVP_KEYMGMT *keymgmt; local 348 keymgmt = EVP_KEYMGMT_fetch(ctx->libctx, ginf->algorithm, ctx->propq); 349 if (keymgmt != NULL) { 362 if (EVP_KEYMGMT_get0_provider(keymgmt) == provider) { 367 EVP_KEYMGMT_free(keymgmt);
|
/freebsd-current/crypto/openssl/crypto/x509/ |
H A D | x_pubkey.c | 566 } else if (a->keymgmt != NULL) {
|
/freebsd-current/secure/lib/libcrypto/modules/fips/ |
H A D | Makefile | 271 # keymgmt 337 ${LCRYPTO_SRC}/providers/implementations/keymgmt \
|