/freebsd-current/crypto/openssl/providers/implementations/signature/ |
H A D | dsa_sig.c | 78 char mdname[OSSL_MAX_NAME_SIZE]; member in struct:__anon4186 121 const char *mdname, const char *mdprops) 126 if (mdname != NULL) { 129 EVP_MD *md = EVP_MD_fetch(ctx->libctx, mdname, mdprops); 132 size_t mdname_len = strlen(mdname); 137 "%s could not be fetched", mdname); 140 "digest=%s", mdname); 141 if (mdname_len >= sizeof(ctx->mdname)) 143 "%s exceeds name buffer length", mdname); 149 if (ctx->mdname[ 120 dsa_setup_md(PROV_DSA_CTX *ctx, const char *mdname, const char *mdprops) argument 274 dsa_digest_signverify_init(void *vpdsactx, const char *mdname, void *vdsa, const OSSL_PARAM params[], int operation) argument 308 dsa_digest_sign_init(void *vpdsactx, const char *mdname, void *vdsa, const OSSL_PARAM params[]) argument 315 dsa_digest_verify_init(void *vpdsactx, const char *mdname, void *vdsa, const OSSL_PARAM params[]) argument 488 char mdname[OSSL_MAX_NAME_SIZE] = "", *pmdname = mdname; local [all...] |
H A D | sm2_sig.c | 76 char mdname[OSSL_MAX_NAME_SIZE]; member in struct:__anon68 93 static int sm2sig_set_mdname(PROV_SM2_CTX *psm2ctx, const char *mdname) argument 96 psm2ctx->md = EVP_MD_fetch(psm2ctx->libctx, psm2ctx->mdname, 101 if (mdname == NULL) 104 if (strlen(mdname) >= sizeof(psm2ctx->mdname) 105 || !EVP_MD_is_a(psm2ctx->md, mdname)) { 107 mdname); 111 OPENSSL_strlcpy(psm2ctx->mdname, mdname, sizeo 204 sm2sig_digest_signverify_init(void *vpsm2ctx, const char *mdname, void *ec, const OSSL_PARAM params[]) argument 471 char *mdname = NULL; local [all...] |
H A D | ecdsa_sig.c | 67 char mdname[OSSL_MAX_NAME_SIZE]; member in struct:__anon4187 215 static int ecdsa_setup_md(PROV_ECDSA_CTX *ctx, const char *mdname, argument 223 if (mdname == NULL) 226 mdname_len = strlen(mdname); 227 if (mdname_len >= sizeof(ctx->mdname)) { 229 "%s exceeds name buffer length", mdname); 234 md = EVP_MD_fetch(ctx->libctx, mdname, mdprops); 237 "%s could not be fetched", mdname); 245 "digest=%s", mdname); 251 if (ctx->mdname[ 281 ecdsa_digest_signverify_init(void *vctx, const char *mdname, void *ec, const OSSL_PARAM params[], int operation) argument 311 ecdsa_digest_sign_init(void *vctx, const char *mdname, void *ec, const OSSL_PARAM params[]) argument 318 ecdsa_digest_verify_init(void *vctx, const char *mdname, void *ec, const OSSL_PARAM params[]) argument 495 char mdname[OSSL_MAX_NAME_SIZE] = "", *pmdname = mdname; local [all...] |
H A D | rsa_sig.c | 94 char mdname[OSSL_MAX_NAME_SIZE]; /* Purely informational */ member in struct:__anon67 123 const char *mdname, const char *mgf1_mdname, 128 if (mdname != NULL || mdnid != NID_undef) { 141 if ((mdname != NULL && !EVP_MD_is_a(prsactx->md, mdname)) 283 static int rsa_setup_md(PROV_RSA_CTX *ctx, const char *mdname, argument 289 if (mdname != NULL) { 290 EVP_MD *md = EVP_MD_fetch(ctx->libctx, mdname, mdprops); 294 size_t mdname_len = strlen(mdname); 298 || !rsa_check_padding(ctx, mdname, NUL 122 rsa_check_padding(const PROV_RSA_CTX *prsactx, const char *mdname, const char *mgf1_mdname, int mdnid) argument 347 rsa_setup_mgf1_md(PROV_RSA_CTX *ctx, const char *mdname, const char *mdprops) argument 430 const char *mdname, *mgf1mdname; local 845 rsa_digest_signverify_init(void *vprsactx, const char *mdname, void *vrsa, const OSSL_PARAM params[], int operation) argument 894 rsa_digest_sign_init(void *vprsactx, const char *mdname, void *vrsa, const OSSL_PARAM params[]) argument 931 rsa_digest_verify_init(void *vprsactx, const char *mdname, void *vrsa, const OSSL_PARAM params[]) argument 1155 char mdname[OSSL_MAX_NAME_SIZE] = "", *pmdname = NULL; local [all...] |
H A D | mac_legacy_sig.c | 98 static int mac_digest_sign_init(void *vpmacctx, const char *mdname, void *vkey, argument 129 (char *)mdname,
|
H A D | eddsa_sig.c | 86 static int eddsa_digest_signverify_init(void *vpeddsactx, const char *mdname, argument 98 if (mdname != NULL && mdname[0] != '\0') {
|
/freebsd-current/crypto/openssl/providers/common/include/prov/ |
H A D | provider_util.h | 63 * Fetch a digest from the specified libctx using the provided mdname and 67 const char *mdname, const char *propquery); 92 * If any of the supplied ciphername/mdname etc are NULL then the values 98 const char *mdname, 125 const char *mdname,
|
/freebsd-current/sbin/devd/tests/ |
H A D | client_test.c | 50 char mdname[80]; local 56 error = fgets(mdname, sizeof(mdname), create_stdout); 61 snprintf(destroy_cmd, nitems(destroy_cmd), "mdconfig -d -u %s", mdname);
|
/freebsd-current/crypto/openssl/crypto/evp/ |
H A D | m_sigver.c | 31 static const char *canon_mdname(const char *mdname) argument 33 if (mdname != NULL && strcmp(mdname, "UNDEF") == 0) 36 return mdname; 40 const EVP_MD *type, const char *mdname, 101 if (mdname == NULL && type == NULL) 102 mdname = canon_mdname(EVP_MD_get0_name(ctx->reqdigest)); 218 if (mdname == NULL) 219 mdname = canon_mdname(EVP_MD_get0_name(type)); 221 if (mdname 39 do_sigver_init(EVP_MD_CTX *ctx, EVP_PKEY_CTX **pctx, const EVP_MD *type, const char *mdname, OSSL_LIB_CTX *libctx, const char *props, ENGINE *e, EVP_PKEY *pkey, int ver, const OSSL_PARAM params[]) argument 374 EVP_DigestSignInit_ex(EVP_MD_CTX *ctx, EVP_PKEY_CTX **pctx, const char *mdname, OSSL_LIB_CTX *libctx, const char *props, EVP_PKEY *pkey, const OSSL_PARAM params[]) argument 390 EVP_DigestVerifyInit_ex(EVP_MD_CTX *ctx, EVP_PKEY_CTX **pctx, const char *mdname, OSSL_LIB_CTX *libctx, const char *props, EVP_PKEY *pkey, const OSSL_PARAM params[]) argument [all...] |
H A D | p5_crpt.c | 42 const char *mdname = EVP_MD_name(md); local 95 (char *)mdname, 0);
|
H A D | p_lib.c | 1258 static void mdname2nid(const char *mdname, void *data) argument 1265 *nid = OBJ_sn2nid(mdname); 1267 *nid = OBJ_ln2nid(mdname); 1278 char mdname[80] = ""; local 1279 int rv = EVP_PKEY_get_default_digest_name(pkey, mdname, 1280 sizeof(mdname)); 1291 md = EVP_MD_fetch(libctx, mdname, NULL); 1300 mdnum = ossl_namemap_name2num(namemap, mdname); 1336 char *mdname, size_t mdname_sz) 1341 mdname, mdname_s 1335 EVP_PKEY_get_default_digest_name(EVP_PKEY *pkey, char *mdname, size_t mdname_sz) argument [all...] |
H A D | p5_crpt2.c | 31 const char *mdname = EVP_MD_get0_name(digest); local 58 (char *)mdname, 0);
|
/freebsd-current/crypto/openssl/crypto/ec/ |
H A D | ecdh_kdf.c | 33 const char *mdname = EVP_MD_get0_name(md); local 38 (char *)mdname, 0);
|
/freebsd-current/crypto/openssl/providers/common/ |
H A D | provider_util.c | 168 const char *mdname, const char *propquery) 171 pd->md = pd->alloc_md = EVP_MD_fetch(libctx, mdname, propquery); 227 const char *mdname, 237 if (mdname == NULL) { 242 mdname = p->data; 263 if (mdname != NULL) 265 (char *)mdname, 0); 294 const char *mdname, 332 if (ossl_prov_set_macctx(*macctx, params, ciphername, mdname, NULL, 167 ossl_prov_digest_fetch(PROV_DIGEST *pd, OSSL_LIB_CTX *libctx, const char *mdname, const char *propquery) argument 224 ossl_prov_set_macctx(EVP_MAC_CTX *macctx, const OSSL_PARAM params[], const char *ciphername, const char *mdname, const char *engine, const char *properties, const unsigned char *key, size_t keylen) argument 290 ossl_prov_macctx_load_from_params(EVP_MAC_CTX **macctx, const OSSL_PARAM params[], const char *macname, const char *ciphername, const char *mdname, OSSL_LIB_CTX *libctx) argument
|
/freebsd-current/crypto/openssl/crypto/crmf/ |
H A D | crmf_pbm.c | 135 char mdname[OSSL_MAX_NAME_SIZE]; local 158 OBJ_obj2txt(mdname, sizeof(mdname), pbmp->owf->algorithm, 0); 159 if ((owf = EVP_MD_fetch(libctx, mdname, propq)) == NULL) {
|
/freebsd-current/crypto/openssl/crypto/dh/ |
H A D | dh_kdf.c | 39 const char *mdname = EVP_MD_get0_name(md); local 49 (char *)mdname, 0);
|
/freebsd-current/crypto/openssl/providers/implementations/asymciphers/ |
H A D | rsa_enc.c | 428 char mdname[OSSL_MAX_NAME_SIZE]; local 439 str = mdname; 440 if (!OSSL_PARAM_get_utf8_string(p, &str, sizeof(mdname))) 452 prsactx->oaep_md = EVP_MD_fetch(prsactx->libctx, mdname, mdprops); 502 str = mdname; 503 if (!OSSL_PARAM_get_utf8_string(p, &str, sizeof(mdname))) 517 prsactx->mgf1_md = EVP_MD_fetch(prsactx->libctx, mdname, str);
|
/freebsd-current/crypto/openssl/crypto/ffc/ |
H A D | ffc_params.c | 130 params->mdname = alg; 185 dst->mdname = src->mdname; 270 if (ffc->mdname != NULL 273 ffc->mdname))
|
/freebsd-current/sbin/mdmfs/ |
H A D | mdmfs.c | 74 static const char *mdname; /* Name of memory disk device (e.g., "md"). */ variable 76 static size_t mdnamelen; /* Length of mdname. */ 121 mdname = MD_NAME; 122 mdnamelen = strlen(mdname); 330 if (strncmp(unitstr, mdname, mdnamelen) == 0) 439 mdname, unit); 491 strncmp(linep, mdname, mdnamelen) != 0) 514 rv = run(NULL, "%s -d -u %s%d", path_mdconfig, mdname, unit); 529 mdname, unit, mdsuffix, mtpoint); 616 rv = run(NULL, "%s%s /dev/%s%d", _PATH_NEWFS, args, mdname, uni [all...] |
/freebsd-current/crypto/openssl/crypto/rsa/ |
H A D | rsa_lib.c | 886 const char *mdkey, const char *mdname, 891 if (ctx == NULL || mdname == NULL || (ctx->operation & optype) == 0) { 911 *p++ = OSSL_PARAM_construct_utf8_string(mdkey, (char *)mdname, 0); 927 char *mdname, size_t mdnamesize) 931 if (ctx == NULL || mdname == NULL || (ctx->operation & optype) == 0) { 951 *p++ = OSSL_PARAM_construct_utf8_string(mdkey, (char *)mdname, mdnamesize); 988 const char *mdname, 992 OSSL_PKEY_PARAM_RSA_DIGEST, mdname, 1010 int EVP_PKEY_CTX_set_rsa_oaep_md_name(EVP_PKEY_CTX *ctx, const char *mdname, argument 1015 OSSL_ASYM_CIPHER_PARAM_OAEP_DIGEST, mdname, 882 int_set_rsa_md_name(EVP_PKEY_CTX *ctx, int keytype, int optype, const char *mdkey, const char *mdname, const char *propkey, const char *mdprops) argument 922 int_get_rsa_md_name(EVP_PKEY_CTX *ctx, int keytype, int optype, const char *mdkey, char *mdname, size_t mdnamesize) argument 987 EVP_PKEY_CTX_set_rsa_pss_keygen_md_name(EVP_PKEY_CTX *ctx, const char *mdname, const char *mdprops) argument 1051 EVP_PKEY_CTX_set_rsa_mgf1_md_name(EVP_PKEY_CTX *ctx, const char *mdname, const char *mdprops) argument 1078 EVP_PKEY_CTX_set_rsa_pss_keygen_mgf1_md_name(EVP_PKEY_CTX *ctx, const char *mdname) argument [all...] |
H A D | rsa_backend.c | 183 const char *mdname = local 202 if ((mdname != NULL 203 && !ossl_param_build_set_utf8_string(bld, params, key_md, mdname)) 278 const char *mdname = NULL; local 281 mdname = param_md->data; 282 else if (!OSSL_PARAM_get_utf8_ptr(param_mgf, &mdname)) 285 if ((md = EVP_MD_fetch(libctx, mdname, propq)) == NULL
|
/freebsd-current/crypto/openssl/providers/implementations/keymgmt/ |
H A D | dsa_kmgmt.c | 66 char *mdname; member in struct:dsa_gen_ctx 507 OPENSSL_free(gctx->mdname); 508 gctx->mdname = OPENSSL_strdup(p->data); 509 if (gctx->mdname == NULL) 593 if (gctx->mdname != NULL) { 594 if (!ossl_ffc_set_digest(ffc, gctx->mdname, gctx->mdprops)) 631 OPENSSL_free(gctx->mdname);
|
H A D | dh_kmgmt.c | 72 char *mdname; member in struct:dh_gen_ctx 462 gctx->mdname = NULL; 628 OPENSSL_free(gctx->mdname); 629 gctx->mdname = OPENSSL_strdup(p->data); 630 if (gctx->mdname == NULL) 741 if (gctx->mdname != NULL) { 742 if (!ossl_ffc_set_digest(ffc, gctx->mdname, gctx->mdprops)) 799 OPENSSL_free(gctx->mdname);
|
/freebsd-current/usr.sbin/fstyp/tests/ |
H A D | fstyp_test.sh | 241 mdconfig -a -t swap -s 64m > mdname 242 md=$(cat mdname) 251 md=$(cat mdname)
|
/freebsd-current/crypto/openssl/include/openssl/ |
H A D | rsa.h | 144 int EVP_PKEY_CTX_set_rsa_mgf1_md_name(EVP_PKEY_CTX *ctx, const char *mdname, 151 const char *mdname); 155 const char *mdname, 159 int EVP_PKEY_CTX_set_rsa_oaep_md_name(EVP_PKEY_CTX *ctx, const char *mdname,
|