Searched refs:mdname (Results 1 - 25 of 39) sorted by relevance

12

/freebsd-current/crypto/openssl/providers/implementations/signature/
H A Ddsa_sig.c78 char mdname[OSSL_MAX_NAME_SIZE]; member in struct:__anon4186
121 const char *mdname, const char *mdprops)
126 if (mdname != NULL) {
129 EVP_MD *md = EVP_MD_fetch(ctx->libctx, mdname, mdprops);
132 size_t mdname_len = strlen(mdname);
137 "%s could not be fetched", mdname);
140 "digest=%s", mdname);
141 if (mdname_len >= sizeof(ctx->mdname))
143 "%s exceeds name buffer length", mdname);
149 if (ctx->mdname[
120 dsa_setup_md(PROV_DSA_CTX *ctx, const char *mdname, const char *mdprops) argument
274 dsa_digest_signverify_init(void *vpdsactx, const char *mdname, void *vdsa, const OSSL_PARAM params[], int operation) argument
308 dsa_digest_sign_init(void *vpdsactx, const char *mdname, void *vdsa, const OSSL_PARAM params[]) argument
315 dsa_digest_verify_init(void *vpdsactx, const char *mdname, void *vdsa, const OSSL_PARAM params[]) argument
488 char mdname[OSSL_MAX_NAME_SIZE] = "", *pmdname = mdname; local
[all...]
H A Dsm2_sig.c76 char mdname[OSSL_MAX_NAME_SIZE]; member in struct:__anon68
93 static int sm2sig_set_mdname(PROV_SM2_CTX *psm2ctx, const char *mdname) argument
96 psm2ctx->md = EVP_MD_fetch(psm2ctx->libctx, psm2ctx->mdname,
101 if (mdname == NULL)
104 if (strlen(mdname) >= sizeof(psm2ctx->mdname)
105 || !EVP_MD_is_a(psm2ctx->md, mdname)) {
107 mdname);
111 OPENSSL_strlcpy(psm2ctx->mdname, mdname, sizeo
204 sm2sig_digest_signverify_init(void *vpsm2ctx, const char *mdname, void *ec, const OSSL_PARAM params[]) argument
471 char *mdname = NULL; local
[all...]
H A Decdsa_sig.c67 char mdname[OSSL_MAX_NAME_SIZE]; member in struct:__anon4187
215 static int ecdsa_setup_md(PROV_ECDSA_CTX *ctx, const char *mdname, argument
223 if (mdname == NULL)
226 mdname_len = strlen(mdname);
227 if (mdname_len >= sizeof(ctx->mdname)) {
229 "%s exceeds name buffer length", mdname);
234 md = EVP_MD_fetch(ctx->libctx, mdname, mdprops);
237 "%s could not be fetched", mdname);
245 "digest=%s", mdname);
251 if (ctx->mdname[
281 ecdsa_digest_signverify_init(void *vctx, const char *mdname, void *ec, const OSSL_PARAM params[], int operation) argument
311 ecdsa_digest_sign_init(void *vctx, const char *mdname, void *ec, const OSSL_PARAM params[]) argument
318 ecdsa_digest_verify_init(void *vctx, const char *mdname, void *ec, const OSSL_PARAM params[]) argument
495 char mdname[OSSL_MAX_NAME_SIZE] = "", *pmdname = mdname; local
[all...]
H A Drsa_sig.c94 char mdname[OSSL_MAX_NAME_SIZE]; /* Purely informational */ member in struct:__anon67
123 const char *mdname, const char *mgf1_mdname,
128 if (mdname != NULL || mdnid != NID_undef) {
141 if ((mdname != NULL && !EVP_MD_is_a(prsactx->md, mdname))
283 static int rsa_setup_md(PROV_RSA_CTX *ctx, const char *mdname, argument
289 if (mdname != NULL) {
290 EVP_MD *md = EVP_MD_fetch(ctx->libctx, mdname, mdprops);
294 size_t mdname_len = strlen(mdname);
298 || !rsa_check_padding(ctx, mdname, NUL
122 rsa_check_padding(const PROV_RSA_CTX *prsactx, const char *mdname, const char *mgf1_mdname, int mdnid) argument
347 rsa_setup_mgf1_md(PROV_RSA_CTX *ctx, const char *mdname, const char *mdprops) argument
430 const char *mdname, *mgf1mdname; local
845 rsa_digest_signverify_init(void *vprsactx, const char *mdname, void *vrsa, const OSSL_PARAM params[], int operation) argument
894 rsa_digest_sign_init(void *vprsactx, const char *mdname, void *vrsa, const OSSL_PARAM params[]) argument
931 rsa_digest_verify_init(void *vprsactx, const char *mdname, void *vrsa, const OSSL_PARAM params[]) argument
1155 char mdname[OSSL_MAX_NAME_SIZE] = "", *pmdname = NULL; local
[all...]
H A Dmac_legacy_sig.c98 static int mac_digest_sign_init(void *vpmacctx, const char *mdname, void *vkey, argument
129 (char *)mdname,
H A Deddsa_sig.c86 static int eddsa_digest_signverify_init(void *vpeddsactx, const char *mdname, argument
98 if (mdname != NULL && mdname[0] != '\0') {
/freebsd-current/crypto/openssl/providers/common/include/prov/
H A Dprovider_util.h63 * Fetch a digest from the specified libctx using the provided mdname and
67 const char *mdname, const char *propquery);
92 * If any of the supplied ciphername/mdname etc are NULL then the values
98 const char *mdname,
125 const char *mdname,
/freebsd-current/sbin/devd/tests/
H A Dclient_test.c50 char mdname[80]; local
56 error = fgets(mdname, sizeof(mdname), create_stdout);
61 snprintf(destroy_cmd, nitems(destroy_cmd), "mdconfig -d -u %s", mdname);
/freebsd-current/crypto/openssl/crypto/evp/
H A Dm_sigver.c31 static const char *canon_mdname(const char *mdname) argument
33 if (mdname != NULL && strcmp(mdname, "UNDEF") == 0)
36 return mdname;
40 const EVP_MD *type, const char *mdname,
101 if (mdname == NULL && type == NULL)
102 mdname = canon_mdname(EVP_MD_get0_name(ctx->reqdigest));
218 if (mdname == NULL)
219 mdname = canon_mdname(EVP_MD_get0_name(type));
221 if (mdname
39 do_sigver_init(EVP_MD_CTX *ctx, EVP_PKEY_CTX **pctx, const EVP_MD *type, const char *mdname, OSSL_LIB_CTX *libctx, const char *props, ENGINE *e, EVP_PKEY *pkey, int ver, const OSSL_PARAM params[]) argument
374 EVP_DigestSignInit_ex(EVP_MD_CTX *ctx, EVP_PKEY_CTX **pctx, const char *mdname, OSSL_LIB_CTX *libctx, const char *props, EVP_PKEY *pkey, const OSSL_PARAM params[]) argument
390 EVP_DigestVerifyInit_ex(EVP_MD_CTX *ctx, EVP_PKEY_CTX **pctx, const char *mdname, OSSL_LIB_CTX *libctx, const char *props, EVP_PKEY *pkey, const OSSL_PARAM params[]) argument
[all...]
H A Dp5_crpt.c42 const char *mdname = EVP_MD_name(md); local
95 (char *)mdname, 0);
H A Dp_lib.c1258 static void mdname2nid(const char *mdname, void *data) argument
1265 *nid = OBJ_sn2nid(mdname);
1267 *nid = OBJ_ln2nid(mdname);
1278 char mdname[80] = ""; local
1279 int rv = EVP_PKEY_get_default_digest_name(pkey, mdname,
1280 sizeof(mdname));
1291 md = EVP_MD_fetch(libctx, mdname, NULL);
1300 mdnum = ossl_namemap_name2num(namemap, mdname);
1336 char *mdname, size_t mdname_sz)
1341 mdname, mdname_s
1335 EVP_PKEY_get_default_digest_name(EVP_PKEY *pkey, char *mdname, size_t mdname_sz) argument
[all...]
H A Dp5_crpt2.c31 const char *mdname = EVP_MD_get0_name(digest); local
58 (char *)mdname, 0);
/freebsd-current/crypto/openssl/crypto/ec/
H A Decdh_kdf.c33 const char *mdname = EVP_MD_get0_name(md); local
38 (char *)mdname, 0);
/freebsd-current/crypto/openssl/providers/common/
H A Dprovider_util.c168 const char *mdname, const char *propquery)
171 pd->md = pd->alloc_md = EVP_MD_fetch(libctx, mdname, propquery);
227 const char *mdname,
237 if (mdname == NULL) {
242 mdname = p->data;
263 if (mdname != NULL)
265 (char *)mdname, 0);
294 const char *mdname,
332 if (ossl_prov_set_macctx(*macctx, params, ciphername, mdname, NULL,
167 ossl_prov_digest_fetch(PROV_DIGEST *pd, OSSL_LIB_CTX *libctx, const char *mdname, const char *propquery) argument
224 ossl_prov_set_macctx(EVP_MAC_CTX *macctx, const OSSL_PARAM params[], const char *ciphername, const char *mdname, const char *engine, const char *properties, const unsigned char *key, size_t keylen) argument
290 ossl_prov_macctx_load_from_params(EVP_MAC_CTX **macctx, const OSSL_PARAM params[], const char *macname, const char *ciphername, const char *mdname, OSSL_LIB_CTX *libctx) argument
/freebsd-current/crypto/openssl/crypto/crmf/
H A Dcrmf_pbm.c135 char mdname[OSSL_MAX_NAME_SIZE]; local
158 OBJ_obj2txt(mdname, sizeof(mdname), pbmp->owf->algorithm, 0);
159 if ((owf = EVP_MD_fetch(libctx, mdname, propq)) == NULL) {
/freebsd-current/crypto/openssl/crypto/dh/
H A Ddh_kdf.c39 const char *mdname = EVP_MD_get0_name(md); local
49 (char *)mdname, 0);
/freebsd-current/crypto/openssl/providers/implementations/asymciphers/
H A Drsa_enc.c428 char mdname[OSSL_MAX_NAME_SIZE]; local
439 str = mdname;
440 if (!OSSL_PARAM_get_utf8_string(p, &str, sizeof(mdname)))
452 prsactx->oaep_md = EVP_MD_fetch(prsactx->libctx, mdname, mdprops);
502 str = mdname;
503 if (!OSSL_PARAM_get_utf8_string(p, &str, sizeof(mdname)))
517 prsactx->mgf1_md = EVP_MD_fetch(prsactx->libctx, mdname, str);
/freebsd-current/crypto/openssl/crypto/ffc/
H A Dffc_params.c130 params->mdname = alg;
185 dst->mdname = src->mdname;
270 if (ffc->mdname != NULL
273 ffc->mdname))
/freebsd-current/sbin/mdmfs/
H A Dmdmfs.c74 static const char *mdname; /* Name of memory disk device (e.g., "md"). */ variable
76 static size_t mdnamelen; /* Length of mdname. */
121 mdname = MD_NAME;
122 mdnamelen = strlen(mdname);
330 if (strncmp(unitstr, mdname, mdnamelen) == 0)
439 mdname, unit);
491 strncmp(linep, mdname, mdnamelen) != 0)
514 rv = run(NULL, "%s -d -u %s%d", path_mdconfig, mdname, unit);
529 mdname, unit, mdsuffix, mtpoint);
616 rv = run(NULL, "%s%s /dev/%s%d", _PATH_NEWFS, args, mdname, uni
[all...]
/freebsd-current/crypto/openssl/crypto/rsa/
H A Drsa_lib.c886 const char *mdkey, const char *mdname,
891 if (ctx == NULL || mdname == NULL || (ctx->operation & optype) == 0) {
911 *p++ = OSSL_PARAM_construct_utf8_string(mdkey, (char *)mdname, 0);
927 char *mdname, size_t mdnamesize)
931 if (ctx == NULL || mdname == NULL || (ctx->operation & optype) == 0) {
951 *p++ = OSSL_PARAM_construct_utf8_string(mdkey, (char *)mdname, mdnamesize);
988 const char *mdname,
992 OSSL_PKEY_PARAM_RSA_DIGEST, mdname,
1010 int EVP_PKEY_CTX_set_rsa_oaep_md_name(EVP_PKEY_CTX *ctx, const char *mdname, argument
1015 OSSL_ASYM_CIPHER_PARAM_OAEP_DIGEST, mdname,
882 int_set_rsa_md_name(EVP_PKEY_CTX *ctx, int keytype, int optype, const char *mdkey, const char *mdname, const char *propkey, const char *mdprops) argument
922 int_get_rsa_md_name(EVP_PKEY_CTX *ctx, int keytype, int optype, const char *mdkey, char *mdname, size_t mdnamesize) argument
987 EVP_PKEY_CTX_set_rsa_pss_keygen_md_name(EVP_PKEY_CTX *ctx, const char *mdname, const char *mdprops) argument
1051 EVP_PKEY_CTX_set_rsa_mgf1_md_name(EVP_PKEY_CTX *ctx, const char *mdname, const char *mdprops) argument
1078 EVP_PKEY_CTX_set_rsa_pss_keygen_mgf1_md_name(EVP_PKEY_CTX *ctx, const char *mdname) argument
[all...]
H A Drsa_backend.c183 const char *mdname = local
202 if ((mdname != NULL
203 && !ossl_param_build_set_utf8_string(bld, params, key_md, mdname))
278 const char *mdname = NULL; local
281 mdname = param_md->data;
282 else if (!OSSL_PARAM_get_utf8_ptr(param_mgf, &mdname))
285 if ((md = EVP_MD_fetch(libctx, mdname, propq)) == NULL
/freebsd-current/crypto/openssl/providers/implementations/keymgmt/
H A Ddsa_kmgmt.c66 char *mdname; member in struct:dsa_gen_ctx
507 OPENSSL_free(gctx->mdname);
508 gctx->mdname = OPENSSL_strdup(p->data);
509 if (gctx->mdname == NULL)
593 if (gctx->mdname != NULL) {
594 if (!ossl_ffc_set_digest(ffc, gctx->mdname, gctx->mdprops))
631 OPENSSL_free(gctx->mdname);
H A Ddh_kmgmt.c72 char *mdname; member in struct:dh_gen_ctx
462 gctx->mdname = NULL;
628 OPENSSL_free(gctx->mdname);
629 gctx->mdname = OPENSSL_strdup(p->data);
630 if (gctx->mdname == NULL)
741 if (gctx->mdname != NULL) {
742 if (!ossl_ffc_set_digest(ffc, gctx->mdname, gctx->mdprops))
799 OPENSSL_free(gctx->mdname);
/freebsd-current/usr.sbin/fstyp/tests/
H A Dfstyp_test.sh241 mdconfig -a -t swap -s 64m > mdname
242 md=$(cat mdname)
251 md=$(cat mdname)
/freebsd-current/crypto/openssl/include/openssl/
H A Drsa.h144 int EVP_PKEY_CTX_set_rsa_mgf1_md_name(EVP_PKEY_CTX *ctx, const char *mdname,
151 const char *mdname);
155 const char *mdname,
159 int EVP_PKEY_CTX_set_rsa_oaep_md_name(EVP_PKEY_CTX *ctx, const char *mdname,

Completed in 169 milliseconds

12