Searched refs:keymgmt (Results 1 - 25 of 29) sorted by relevance

12

/freebsd-current/crypto/openssl/crypto/evp/
H A Dkeymgmt_meth.c22 EVP_KEYMGMT *keymgmt = NULL; local
24 if ((keymgmt = OPENSSL_zalloc(sizeof(*keymgmt))) == NULL
25 || (keymgmt->lock = CRYPTO_THREAD_lock_new()) == NULL) {
26 EVP_KEYMGMT_free(keymgmt);
31 keymgmt->refcnt = 1;
33 return keymgmt;
41 EVP_KEYMGMT *keymgmt = NULL; local
46 if ((keymgmt = keymgmt_new()) == NULL)
49 keymgmt
236 EVP_KEYMGMT_up_ref(EVP_KEYMGMT *keymgmt) argument
244 EVP_KEYMGMT_free(EVP_KEYMGMT *keymgmt) argument
260 EVP_KEYMGMT_get0_provider(const EVP_KEYMGMT *keymgmt) argument
265 evp_keymgmt_get_number(const EVP_KEYMGMT *keymgmt) argument
270 EVP_KEYMGMT_get0_description(const EVP_KEYMGMT *keymgmt) argument
275 EVP_KEYMGMT_get0_name(const EVP_KEYMGMT *keymgmt) argument
280 EVP_KEYMGMT_is_a(const EVP_KEYMGMT *keymgmt, const char *name) argument
286 EVP_KEYMGMT_do_all_provided(OSSL_LIB_CTX *libctx, void (*fn)(EVP_KEYMGMT *keymgmt, void *arg), void *arg) argument
297 EVP_KEYMGMT_names_do_all(const EVP_KEYMGMT *keymgmt, void (*fn)(const char *name, void *data), void *data) argument
310 evp_keymgmt_newdata(const EVP_KEYMGMT *keymgmt) argument
324 evp_keymgmt_freedata(const EVP_KEYMGMT *keymgmt, void *keydata) argument
330 evp_keymgmt_gen_init(const EVP_KEYMGMT *keymgmt, int selection, const OSSL_PARAM params[]) argument
340 evp_keymgmt_gen_set_template(const EVP_KEYMGMT *keymgmt, void *genctx, void *template) argument
354 evp_keymgmt_gen_set_params(const EVP_KEYMGMT *keymgmt, void *genctx, const OSSL_PARAM params[]) argument
362 EVP_KEYMGMT_gen_settable_params(const EVP_KEYMGMT *keymgmt) argument
371 evp_keymgmt_gen(const EVP_KEYMGMT *keymgmt, void *genctx, OSSL_CALLBACK *cb, void *cbarg) argument
379 evp_keymgmt_gen_cleanup(const EVP_KEYMGMT *keymgmt, void *genctx) argument
385 evp_keymgmt_has_load(const EVP_KEYMGMT *keymgmt) argument
390 evp_keymgmt_load(const EVP_KEYMGMT *keymgmt, const void *objref, size_t objref_sz) argument
398 evp_keymgmt_get_params(const EVP_KEYMGMT *keymgmt, void *keydata, OSSL_PARAM params[]) argument
406 EVP_KEYMGMT_gettable_params(const EVP_KEYMGMT *keymgmt) argument
415 evp_keymgmt_set_params(const EVP_KEYMGMT *keymgmt, void *keydata, const OSSL_PARAM params[]) argument
423 EVP_KEYMGMT_settable_params(const EVP_KEYMGMT *keymgmt) argument
432 evp_keymgmt_has(const EVP_KEYMGMT *keymgmt, void *keydata, int selection) argument
438 evp_keymgmt_validate(const EVP_KEYMGMT *keymgmt, void *keydata, int selection, int checktype) argument
447 evp_keymgmt_match(const EVP_KEYMGMT *keymgmt, const void *keydata1, const void *keydata2, int selection) argument
457 evp_keymgmt_import(const EVP_KEYMGMT *keymgmt, void *keydata, int selection, const OSSL_PARAM params[]) argument
465 evp_keymgmt_import_types(const EVP_KEYMGMT *keymgmt, int selection) argument
473 evp_keymgmt_export(const EVP_KEYMGMT *keymgmt, void *keydata, int selection, OSSL_CALLBACK *param_cb, void *cbarg) argument
481 evp_keymgmt_export_types(const EVP_KEYMGMT *keymgmt, int selection) argument
489 evp_keymgmt_dup(const EVP_KEYMGMT *keymgmt, const void *keydata_from, int selection) argument
[all...]
H A Dkeymgmt_lib.c36 if ((data->keydata = evp_keymgmt_newdata(data->keymgmt)) == NULL) {
50 if (evp_keymgmt_import(data->keymgmt, data->keydata, data->selection,
54 evp_keymgmt_freedata(data->keymgmt, data->keydata);
60 int evp_keymgmt_util_assign_pkey(EVP_PKEY *pkey, EVP_KEYMGMT *keymgmt, argument
63 if (pkey == NULL || keymgmt == NULL || keydata == NULL
64 || !EVP_PKEY_set_type_by_keymgmt(pkey, keymgmt)) {
73 EVP_PKEY *evp_keymgmt_util_make_pkey(EVP_KEYMGMT *keymgmt, void *keydata) argument
77 if (keymgmt == NULL
80 || !evp_keymgmt_util_assign_pkey(pkey, keymgmt, keydata)) {
92 return evp_keymgmt_export(pk->keymgmt, p
96 evp_keymgmt_util_export_to_provider(EVP_PKEY *pk, EVP_KEYMGMT *keymgmt, int selection) argument
236 evp_keymgmt_util_find_operation_cache(EVP_PKEY *pk, EVP_KEYMGMT *keymgmt, int selection) argument
255 evp_keymgmt_util_cache_keydata(EVP_PKEY *pk, EVP_KEYMGMT *keymgmt, void *keydata, int selection) argument
314 evp_keymgmt_util_fromdata(EVP_PKEY *target, EVP_KEYMGMT *keymgmt, int selection, const OSSL_PARAM params[]) argument
512 evp_keymgmt_util_gen(EVP_PKEY *target, EVP_KEYMGMT *keymgmt, void *genctx, OSSL_CALLBACK *cb, void *cbarg) argument
532 evp_keymgmt_util_get_deflt_digest_name(EVP_KEYMGMT *keymgmt, void *keydata, char *mdname, size_t mdname_sz) argument
577 evp_keymgmt_util_query_operation_name(EVP_KEYMGMT *keymgmt, int op_id) argument
[all...]
H A Dpmeth_gn.c35 if (ctx->keymgmt == NULL || ctx->keymgmt->gen_init == NULL)
40 ctx->op.keymgmt.genctx =
41 evp_keymgmt_gen_init(ctx->keymgmt,
45 ctx->op.keymgmt.genctx =
46 evp_keymgmt_gen_init(ctx->keymgmt, OSSL_KEYMGMT_SELECT_KEYPAIR,
51 if (ctx->op.keymgmt.genctx == NULL)
152 if (ctx->op.keymgmt.genctx == NULL)
169 EVP_KEYMGMT *tmp_keymgmt = ctx->keymgmt;
180 ret = evp_keymgmt_gen_set_template(ctx->keymgmt,
[all...]
H A Dp_lib.c54 int len, EVP_KEYMGMT *keymgmt);
155 if (EVP_PKEY_set_type_by_keymgmt(to, from->keymgmt) == 0)
178 /* For purely provided keys, we just call the keymgmt utility */
179 if (to->keymgmt != NULL && from->keymgmt != NULL) {
186 * Try exporting |from| to |to|'s keymgmt, then use evp_keymgmt_dup()
191 if (to->keymgmt != NULL && to->keydata == NULL) {
192 EVP_KEYMGMT *to_keymgmt = to->keymgmt;
204 ok = (to->keydata = evp_keymgmt_dup(to->keymgmt,
221 if (pkey->keymgmt !
1492 pkey_set_type(EVP_PKEY *pkey, ENGINE *e, int type, const char *str, int len, EVP_KEYMGMT *keymgmt) argument
1630 EVP_PKEY_set_type_by_keymgmt(EVP_PKEY *pkey, EVP_KEYMGMT *keymgmt) argument
1830 evp_pkey_export_to_provider(EVP_PKEY *pk, OSSL_LIB_CTX *libctx, EVP_KEYMGMT **keymgmt, const char *propquery) argument
2010 EVP_KEYMGMT *keymgmt = src->keymgmt; local
[all...]
H A Dpmeth_check.c30 EVP_KEYMGMT *keymgmt; local
36 keymgmt = ctx->keymgmt;
38 &keymgmt, ctx->propquery);
44 return evp_keymgmt_validate(keymgmt, keydata, selection, checktype);
H A Dexchange.c231 || !EVP_PKEY_set_type_by_keymgmt(pkey, ctx->keymgmt)
232 || (pkey->keydata = evp_keymgmt_newdata(ctx->keymgmt)) == NULL) {
242 * Try to derive the supported exch from |ctx->keymgmt|.
244 if (!ossl_assert(ctx->pkey->keymgmt == NULL
245 || ctx->pkey->keymgmt == ctx->keymgmt)) {
250 supported_exch = evp_keymgmt_util_query_operation_name(ctx->keymgmt,
265 * as |ctx->keymgmt|
267 * We then try to fetch the keymgmt from the same provider as the
268 * exchange, and try to export |ctx->pkey| to that keymgmt (whe
[all...]
H A Dpmeth_lib.c150 static int get_legacy_alg_type_from_keymgmt(const EVP_KEYMGMT *keymgmt) argument
154 EVP_KEYMGMT_names_do_all(keymgmt, help_get_legacy_alg_type_from_keymgmt,
172 && ctx->op.keymgmt.genctx != NULL)
188 EVP_KEYMGMT *keymgmt = NULL; local
198 keytype = EVP_KEYMGMT_get0_name(pkey->keymgmt);
209 /* If no ID was found here, we can only resort to find a keymgmt */
271 * keymgmt. Otherwise, we fetch one for the keytype we got. This
275 if (pkey != NULL && pkey->keymgmt != NULL) {
276 if (!EVP_KEYMGMT_up_ref(pkey->keymgmt))
279 keymgmt
[all...]
H A Dasymcipher.c51 * Try to derive the supported asym cipher from |ctx->keymgmt|.
53 if (!ossl_assert(ctx->pkey->keymgmt == NULL
54 || ctx->pkey->keymgmt == ctx->keymgmt)) {
60 = evp_keymgmt_util_query_operation_name(ctx->keymgmt,
74 * as |ctx->keymgmt|
76 * We then try to fetch the keymgmt from the same provider as the
77 * asym cipher, and try to export |ctx->pkey| to that keymgmt (when
78 * this keymgmt happens to be the same as |ctx->keymgmt|, th
[all...]
H A Dkem.c45 * Try to derive the supported kem from |ctx->keymgmt|.
47 if (!ossl_assert(ctx->pkey->keymgmt == NULL
48 || ctx->pkey->keymgmt == ctx->keymgmt)) {
52 supported_kem = evp_keymgmt_util_query_operation_name(ctx->keymgmt,
67 * as |ctx->keymgmt|
69 * We then try to fetch the keymgmt from the same provider as the
70 * kem, and try to export |ctx->pkey| to that keymgmt (when this
71 * keymgmt happens to be the same as |ctx->keymgmt|, th
[all...]
H A Devp_pkey.c229 if (key->keymgmt != NULL)
230 return EVP_KEYMGMT_get0_name(key->keymgmt);
244 return EVP_KEYMGMT_get0_provider(key->keymgmt);
H A Dm_sigver.c107 * Try to derive the supported signature from |locpctx->keymgmt|.
109 if (!ossl_assert(locpctx->pkey->keymgmt == NULL
110 || locpctx->pkey->keymgmt == locpctx->keymgmt)) {
115 supported_sig = evp_keymgmt_util_query_operation_name(locpctx->keymgmt,
129 * as |ctx->keymgmt|
131 * We then try to fetch the keymgmt from the same provider as the
132 * signature, and try to export |ctx->pkey| to that keymgmt (when
133 * this keymgmt happens to be the same as |ctx->keymgmt|, th
[all...]
H A Dsignature.c425 * Try to derive the supported signature from |ctx->keymgmt|.
427 if (!ossl_assert(ctx->pkey->keymgmt == NULL
428 || ctx->pkey->keymgmt == ctx->keymgmt)) {
433 supported_sig = evp_keymgmt_util_query_operation_name(ctx->keymgmt,
447 * as |ctx->keymgmt|
449 * We then try to fetch the keymgmt from the same provider as the
450 * signature, and try to export |ctx->pkey| to that keymgmt (when
451 * this keymgmt happens to be the same as |ctx->keymgmt|, th
[all...]
/freebsd-current/crypto/openssl/crypto/encode_decode/
H A Ddecoder_pkey.c51 * The construct data, and collecting keymgmt information for it
74 EVP_KEYMGMT *keymgmt = NULL; local
111 * First, we try to find a keymgmt that comes from the same provider as
116 keymgmt = sk_EVP_KEYMGMT_value(data->keymgmts, i);
117 keymgmt_prov = EVP_KEYMGMT_get0_provider(keymgmt);
120 && evp_keymgmt_has_load(keymgmt)
121 && EVP_KEYMGMT_is_a(keymgmt, data->object_type))
126 if (!EVP_KEYMGMT_up_ref(keymgmt))
128 } else if ((keymgmt = EVP_KEYMGMT_fetch(data->libctx,
131 keymgmt_prov = EVP_KEYMGMT_get0_provider(keymgmt);
209 collect_keymgmt(EVP_KEYMGMT *keymgmt, void *arg) argument
356 EVP_KEYMGMT *keymgmt = sk_EVP_KEYMGMT_value(process_data->keymgmts, i); local
[all...]
H A Dencoder_pkey.c106 * from the same provider as the keymgmt are looked up, and one where
185 const OSSL_PROVIDER *k_prov = EVP_KEYMGMT_get0_provider(pk->keymgmt);
191 if (!evp_keymgmt_export(pk->keymgmt, pk->keydata, data->selection,
238 prov = EVP_KEYMGMT_get0_provider(pkey->keymgmt);
242 if (pkey->keymgmt != NULL) {
253 * First, collect the keymgmt names, then the encoders that match.
262 EVP_KEYMGMT_names_do_all(pkey->keymgmt, collect_name, &keymgmt_data);
276 * Place the encoders with the a different provider as the keymgmt
283 * Place the encoders with the same provider as the keymgmt first
343 const OSSL_PROVIDER *prov = EVP_KEYMGMT_get0_provider(pkey->keymgmt);
[all...]
/freebsd-current/crypto/openssl/include/crypto/
H A Devp.h26 ((ctx)->keymgmt == NULL)
35 * Library context, property query, keytype and keymgmt associated with
41 /* If |pkey| below is set, this field is always a reference to its keymgmt */
42 EVP_KEYMGMT *keymgmt; member in struct:evp_pkey_ctx_st
47 } keymgmt; member in union:evp_pkey_ctx_st::__anon4036
590 EVP_KEYMGMT *keymgmt; member in struct:__anon4044
602 * type == EVP_PKEY_NONE && keymgmt == NULL
607 * || (keymgmt != NULL && keydata == NULL) ## provider side
612 * || (keymgmt != NULL && keydata != NULL) ## provider side
616 * keymgmt
691 EVP_KEYMGMT *keymgmt; member in struct:evp_pkey_st
770 EVP_KEYMGMT *keymgmt; member in struct:evp_keymgmt_util_try_import_data_st
[all...]
/freebsd-current/crypto/openssl/test/
H A Dalgorithmid_test.c28 EVP_KEYMGMT *keymgmt = NULL; local
57 * The |keymgmt|, however, should, as its reference count is incremented
61 &keymgmt, NULL)) == NULL) {
69 if (!TEST_true(EVP_KEYMGMT_is_a(keymgmt, name))) {
78 if (!TEST_ptr(gettable_params = EVP_KEYMGMT_gettable_params(keymgmt))
80 TEST_info("The %s provider keymgmt appears to lack support for algorithm-id."
88 if (!TEST_true(evp_keymgmt_get_params(keymgmt, keydata, params)))
98 EVP_KEYMGMT_free(keymgmt);
164 TEST_info("The %s provider keymgmt appears to lack support for algorithm-id"
H A Dkeymgmt_internal_test.c299 EVP_KEYMGMT *keymgmt = NULL; local
330 &keymgmt, NULL)))
333 keymgmt = EVP_KEYMGMT_fetch(libctx, "RSA", NULL);
336 &keymgmt, NULL)))
344 EVP_KEYMGMT_free(keymgmt);
/freebsd-current/crypto/openssl/crypto/store/
H A Dstore_result.c192 EVP_KEYMGMT *keymgmt = NULL; local
200 keymgmt = EVP_KEYMGMT_fetch(libctx, data->data_type, propq);
202 while (keymgmt != NULL && keydata == NULL && try_fallback-- > 0) {
206 * 1. The keymgmt is from the same provider as the loader,
208 * 2. The keymgmt is from another provider, then we must
211 if (EVP_KEYMGMT_get0_provider(keymgmt) == provider) {
214 keydata = evp_keymgmt_load(keymgmt, data->ref, data->ref_size);
220 import_data.keymgmt = keymgmt;
239 EVP_KEYMGMT_free(keymgmt);
[all...]
/freebsd-current/contrib/wpa/src/drivers/
H A Ddriver_wext.h75 int wpa_driver_wext_keymgmt2wext(int keymgmt);
/freebsd-current/crypto/openssl/include/openssl/
H A Devp.h1321 int EVP_PKEY_set_type_by_keymgmt(EVP_PKEY *pkey, EVP_KEYMGMT *keymgmt);
1760 int EVP_KEYMGMT_up_ref(EVP_KEYMGMT *keymgmt);
1761 void EVP_KEYMGMT_free(EVP_KEYMGMT *keymgmt);
1762 const OSSL_PROVIDER *EVP_KEYMGMT_get0_provider(const EVP_KEYMGMT *keymgmt);
1763 const char *EVP_KEYMGMT_get0_name(const EVP_KEYMGMT *keymgmt);
1764 const char *EVP_KEYMGMT_get0_description(const EVP_KEYMGMT *keymgmt);
1765 int EVP_KEYMGMT_is_a(const EVP_KEYMGMT *keymgmt, const char *name);
1767 void (*fn)(EVP_KEYMGMT *keymgmt, void *arg),
1769 int EVP_KEYMGMT_names_do_all(const EVP_KEYMGMT *keymgmt,
1772 const OSSL_PARAM *EVP_KEYMGMT_gettable_params(const EVP_KEYMGMT *keymgmt);
[all...]
/freebsd-current/secure/lib/libcrypto/man/man7/
H A DMakefile117 MAN+= provider-keymgmt.7
/freebsd-current/crypto/openssl/crypto/ec/
H A Decx_meth.c267 if (pkey->keymgmt != NULL)
268 libctx = ossl_provider_libctx(EVP_KEYMGMT_get0_provider(pkey->keymgmt));
285 if (pkey->keymgmt != NULL)
286 libctx = ossl_provider_libctx(EVP_KEYMGMT_get0_provider(pkey->keymgmt));
/freebsd-current/crypto/openssl/ssl/
H A Dt1_lib.c235 EVP_KEYMGMT *keymgmt; local
348 keymgmt = EVP_KEYMGMT_fetch(ctx->libctx, ginf->algorithm, ctx->propq);
349 if (keymgmt != NULL) {
362 if (EVP_KEYMGMT_get0_provider(keymgmt) == provider) {
367 EVP_KEYMGMT_free(keymgmt);
/freebsd-current/crypto/openssl/crypto/x509/
H A Dx_pubkey.c566 } else if (a->keymgmt != NULL) {
/freebsd-current/secure/lib/libcrypto/modules/fips/
H A DMakefile271 # keymgmt
337 ${LCRYPTO_SRC}/providers/implementations/keymgmt \

Completed in 244 milliseconds

12