/freebsd/crypto/openssl/test/recipes/30-test_evp_data/ |
H A D | evpkdf_ss.txt | 10 # Cipher Decrypt Derive Digest Encoding KDF MAC PBE 20 Ctrl.digest = digest:SHA1 26 Ctrl.digest = digest:SHA1 32 Ctrl.digest = digest:SHA1 38 Ctrl.digest = digest:SHA1 44 Ctrl.digest = digest:SHA1 50 Ctrl.digest = digest:SHA1 56 Ctrl.digest = digest:SHA1 62 Ctrl.digest = digest:SHA1 68 Ctrl.digest = digest:SHA1 [all …]
|
H A D | evpkdf_ssh.txt | 10 # Cipher Decrypt Derive Digest Encoding KDF MAC PBE 15 # The first one uses md instead of digest to test alias works 18 Ctrl.digest = digest:SHA1 26 Ctrl.digest = digest:SHA1 34 Ctrl.digest = digest:SHA1 42 Ctrl.digest = digest:SHA1 50 Ctrl.digest = digest:SHA1 58 Ctrl.digest = digest:SHA1 66 Ctrl.digest = digest:SHA1 74 Ctrl.digest = digest:SHA1 [all …]
|
H A D | evpkdf_tls13_kdf.txt | 10 # Cipher Decrypt Derive Digest Encoding KDF MAC PBE 23 Ctrl.digest = digest:SHA2-256 29 Ctrl.digest = digest:SHA2-256 38 Ctrl.digest = digest:SHA2-256 47 Ctrl.digest = digest:SHA2-256 56 Ctrl.digest = digest:SHA2-256 65 Ctrl.digest = digest:SHA2-256 74 Ctrl.digest = digest:SHA2-256 82 Ctrl.digest = digest:SHA2-256 91 Ctrl.digest = digest:SHA2-256 [all …]
|
H A D | evpmd_sha.txt | 10 # Cipher Decrypt Derive Digest Encoding KDF MAC PBE 17 Digest = SHA1 21 Digest = SHA1 25 Digest = SHA1 31 Digest = SHA224 35 Digest = SHA224 39 Digest = SHA224 45 Digest = SHA256 49 Digest = SHA256 53 Digest = SHA256 [all …]
|
H A D | evpkdf_hkdf.txt | 10 # Cipher Decrypt Derive Digest Encoding KDF MAC PBE 17 Ctrl.digest = digest:SHA256 25 Ctrl.digest = digest:SHA256 32 Ctrl.digest = digest:SHA256 38 Ctrl.digest = digest:SHA256 46 Ctrl.digest = digest:SHA256 53 Ctrl.digest = digest:SHA256 59 Ctrl.digest = digest:SHA256 67 Ctrl.digest = digest:SHA256 75 Ctrl.digest = digest:SHA256 [all …]
|
H A D | evpkdf_pbkdf2.txt | 10 # Cipher Decrypt Derive Digest Encoding KDF MAC PBE 21 Ctrl.digest = digest:sha1 29 Ctrl.digest = digest:sha256 37 Ctrl.digest = digest:sha512 45 Ctrl.digest = digest:sha1 53 Ctrl.digest = digest:sha256 61 Ctrl.digest = digest:sha512 69 Ctrl.digest = digest:sha1 77 Ctrl.digest = digest:sha256 85 Ctrl.digest = digest:sha512 [all …]
|
H A D | evpkdf_x963.txt | 10 # Cipher Decrypt Derive Digest Encoding KDF MAC PBE 21 Ctrl.digest = digest:SHA1 27 Ctrl.digest = digest:SHA224 33 Ctrl.digest = digest:SHA256 39 Ctrl.digest = digest:SHA384 44 Ctrl.digest = digest:SHA384 50 Ctrl.digest = digest:SHA512 55 Ctrl.digest = digest:SHA512 61 Ctrl.digest = digest:SHA512 67 Ctrl.digest = digest:SHA512 [all …]
|
H A D | evpmd_md.txt | 12 Digest = MD2 17 Digest = MD2 22 Digest = MD2 27 Digest = MD2 28 Input = "message digest" 32 Digest = MD2 37 Digest = MD2 42 Digest = MD2 49 Digest = MD4 54 Digest = MD4 [all …]
|
H A D | evpkdf_pbkdf1.txt | 10 # Cipher Decrypt Derive Digest Encoding KDF MAC PBE 21 Ctrl.digest = digest:md2 29 Ctrl.digest = digest:md5 37 Ctrl.digest = digest:sha1 45 Ctrl.digest = digest:md2 53 Ctrl.digest = digest:md5 61 Ctrl.digest = digest:sha1 69 Ctrl.digest = digest:md2 77 Ctrl.digest = digest:md5 85 Ctrl.digest = digest:sha1 [all …]
|
H A D | evpmd_blake.txt | 10 # Cipher Decrypt Derive Digest Encoding KDF MAC PBE 21 Digest = BLAKE2s256 25 Digest = BLAKE2s256 29 Digest = BLAKE2s256 33 Digest = BLAKE2s256 37 Digest = BLAKE2s256 41 Digest = BLAKE2s256 45 Digest = BLAKE2s256 49 Digest = BLAKE2s256 53 Digest = BLAKE2s256 [all …]
|
H A D | evpkdf_x942.txt | 10 # Cipher Decrypt Derive Digest Encoding KDF MAC PBE 17 Ctrl.digest = digest:SHA1 23 Ctrl.digest = digest:SHA1 32 Ctrl.digest = digest:SHA1 39 Ctrl.digest = digest:SHA1 47 Ctrl.digest = digest:SHA1 55 Ctrl.digest = digest:SHA1 62 Ctrl.digest = digest:SHA1 69 Ctrl.digest = digest:SHA1 81 Ctrl.digest = digest:SHA256 [all …]
|
/freebsd/crypto/heimdal/lib/krb5/ |
H A D | digest.c | 50 krb5_digest_alloc(krb5_context context, krb5_digest *digest) in krb5_digest_alloc() argument 56 *digest = NULL; in krb5_digest_alloc() 60 *digest = d; in krb5_digest_alloc() 66 krb5_digest_free(krb5_digest digest) in krb5_digest_free() argument 68 if (digest == NULL) in krb5_digest_free() 70 free_DigestInit(&digest->init); in krb5_digest_free() 71 free_DigestInitReply(&digest->initReply); in krb5_digest_free() 72 free_DigestRequest(&digest->request); in krb5_digest_free() 73 free_DigestResponse(&digest->response); in krb5_digest_free() 74 memset(digest, 0, sizeof(*digest)); in krb5_digest_free() [all …]
|
H A D | krb5_digest.3 | 67 .Nd remote digest (HTTP-DIGEST, SASL, CHAP) suppport 78 .Fa "krb5_digest *digest" 82 .Fa "krb5_digest digest" 87 .Fa "krb5_digest digest" 93 .Fa "krb5_digest digest" 100 .Fa "krb5_digest digest" 106 .Fa "krb5_digest digest" 111 .Fa "krb5_digest digest" 117 .Fa "krb5_digest digest" 122 .Fa "krb5_digest digest" [all …]
|
/freebsd/secure/lib/libcrypto/man/man7/ |
H A D | provider-digest.7 | 133 .IX Title "PROVIDER-DIGEST 7ossl" 134 .TH PROVIDER-DIGEST 7ossl "2023-09-19" "3.0.11" "OpenSSL" 140 provider\-digest \- The digest library <\-> provider functions 157 \& /* Digest generation */ 165 \& /* Digest parameter descriptors */ 168 \& /* Digest operation parameter descriptors */ 174 \& /* Digest parameters */ 177 \& /* Digest operation parameters */ 186 The \s-1DIGEST\s0 operation enables providers to implement digest algorithms and make 230 A digest algorithm implementation may not implement all of these functions. [all …]
|
/freebsd/crypto/openssl/doc/man7/ |
H A D | provider-digest.pod | 5 provider-digest - The digest library E<lt>-E<gt> provider functions 24 /* Digest generation */ 32 /* Digest parameter descriptors */ 35 /* Digest operation parameter descriptors */ 41 /* Digest parameters */ 44 /* Digest operation parameters */ 53 The DIGEST operation enables providers to implement digest algorithms and make 93 A digest algorithm implementation may not implement all of these functions. 101 structure for holding context information during a digest operation. 102 A pointer to this context will be passed back in a number of the other digest [all …]
|
/freebsd/crypto/heimdal/doc/doxyout/hcrypto/man/man3/ |
H A D | hcrypto_evp.3 | 329 \fImd\fP message digest to use 727 \fImd\fP message digest to use 740 Complete the message digest. 746 \fIhash\fP the output of the message digest function. At least \fBEVP_MD_size()\fP. 759 Init a EVP_MD_CTX for use a specific message digest and engine. 763 \fIctx\fP the message digest context to init. 765 \fImd\fP the message digest to use. 778 Update the digest with some data. 932 The message digest MD2 - hcrypto 936 the message digest type. [all …]
|
/freebsd/crypto/openssl/crypto/evp/ |
H A D | digest.c | 30 if (ctx->digest != NULL) { in cleanup_old_md_data() 31 if (ctx->digest->cleanup != NULL in cleanup_old_md_data() 33 ctx->digest->cleanup(ctx); in cleanup_old_md_data() 34 if (ctx->md_data != NULL && ctx->digest->ctx_size > 0 in cleanup_old_md_data() 37 OPENSSL_clear_free(ctx->md_data, ctx->digest->ctx_size); in cleanup_old_md_data() 46 if (ctx->digest != NULL && ctx->digest->freectx != NULL) in evp_md_ctx_clear_digest() 47 ctx->digest->freectx(ctx->algctx); in evp_md_ctx_clear_digest() 60 ctx->digest = NULL; in evp_md_ctx_clear_digest() 67 /* Non legacy code, this has to be later than the ctx->digest cleaning */ in evp_md_ctx_clear_digest() 173 if (!ossl_assert(ctx->digest != NULL)) { in evp_md_init_internal() [all …]
|
/freebsd/sys/contrib/openzfs/module/icp/io/ |
H A D | sha2_mod.c | 42 /* to extract the digest length passed as mechanism parameter */ 53 #define PROV_SHA2_DIGEST_KEY(mech, ctx, key, len, digest) { \ argument 56 SHA2Final(digest, ctx); \ 148 * Helper SHA2 digest update function for uio data. 193 * The caller requested to digest more data than it provided. in sha2_digest_update_uio() 202 * Helper SHA2 digest final function for uio data. 203 * digest_len is the length of the desired digest. If digest_len 204 * is smaller than the default SHA2 digest length, the caller 206 * be at least the algorithm's digest length bytes. 209 sha2_digest_final_uio(SHA2_CTX *sha2_ctx, crypto_data_t *digest, in sha2_digest_final_uio() argument [all …]
|
/freebsd/crypto/openssh/ |
H A D | digest-libc.c | 1 /* $OpenBSD: digest-libc.c,v 1.7 2020/02/26 13:40:09 jsg Exp $ */ 51 #include "digest.h" 152 const struct ssh_digest *digest = ssh_digest_by_alg(alg); in ssh_digest_alg_name() local 154 return digest == NULL ? NULL : digest->name; in ssh_digest_alg_name() 160 const struct ssh_digest *digest = ssh_digest_by_alg(alg); in ssh_digest_bytes() local 162 return digest == NULL ? 0 : digest->digest_len; in ssh_digest_bytes() 168 const struct ssh_digest *digest = ssh_digest_by_alg(ctx->alg); in ssh_digest_blocksize() local 170 return digest == NULL ? 0 : digest->block_len; in ssh_digest_blocksize() 176 const struct ssh_digest *digest = ssh_digest_by_alg(alg); in ssh_digest_start() local 179 if (digest == NULL || (ret = calloc(1, sizeof(*ret))) == NULL) in ssh_digest_start() [all …]
|
/freebsd/secure/lib/libcrypto/man/man3/ |
H A D | EVP_DigestInit.3 | 163 \&\- EVP digest routines 173 \& int EVP_MD_get_params(const EVP_MD *digest, OSSL_PARAM params[]); 174 \& const OSSL_PARAM *EVP_MD_gettable_params(const EVP_MD *digest); 272 The \s-1EVP\s0 digest routines are a high-level interface to message digests, 273 and should be used instead of the digest-specific functions. 275 The \fB\s-1EVP_MD\s0\fR type is a structure for digest method implementation. 278 Fetches the digest implementation for the given \fIalgorithm\fR from any 294 Allocates and returns a digest context. 297 Resets the digest context \fIctx\fR. This can be used to reuse an already 301 Cleans up digest context \fIctx\fR and frees up the space allocated to it. [all …]
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | EVP_DigestInit.pod | 28 - EVP digest routines 38 int EVP_MD_get_params(const EVP_MD *digest, OSSL_PARAM params[]); 39 const OSSL_PARAM *EVP_MD_gettable_params(const EVP_MD *digest); 135 The EVP digest routines are a high-level interface to message digests, 136 and should be used instead of the digest-specific functions. 138 The B<EVP_MD> type is a structure for digest method implementation. 144 Fetches the digest implementation for the given I<algorithm> from any 164 Allocates and returns a digest context. 168 Resets the digest context I<ctx>. This can be used to reuse an already 173 Cleans up digest context I<ctx> and frees up the space allocated to it. [all …]
|
H A D | BIO_f_md.pod | 5 BIO_f_md, BIO_set_md, BIO_get_md, BIO_get_md_ctx - message digest BIO filter 21 BIO_f_md() returns the message digest BIO method. This is a filter 23 for the digest routines EVP_DigestInit(), EVP_DigestUpdate() 26 Any data written or read through a digest BIO using BIO_read_ex() and 30 digest calculation and returns the digest value. BIO_puts() is 33 BIO_reset() reinitialises a digest BIO. 35 BIO_set_md() sets the message digest of BIO B<b> to B<md>: this 36 must be called to initialize a digest BIO before any data is 39 BIO_get_md() places a pointer to the digest BIOs digest method 42 BIO_get_md_ctx() returns the digest BIOs context into B<mdcp>. [all …]
|
/freebsd/contrib/ntp/libntp/ |
H A D | a_md5encrypt.c | 2 * digest support for NTP, MD5 and with OpenSSL more 43 * Allocate and initialize a digest context. As a speed optimization, 75 const rwbuffT * digest, in make_mac() 82 * Compute digest of key concatenated with packet. Note: the in make_mac() 83 * key type and digest type have been verified when the key in make_mac() 115 if (cmac_ctx_size(ctx) > digest->len) { in make_mac() 123 if (!CMAC_Final(ctx, digest->buf, &retlen)) { in make_mac() 141 if ((size_t)EVP_MD_CTX_size(ctx) > digest->len) { in make_mac() 147 msyslog(LOG_ERR, "MAC encrypt: MAC %s Digest Update key failed.", in make_mac() 152 msyslog(LOG_ERR, "MAC encrypt: MAC %s Digest Updat in make_mac() 45 make_mac(const rwbuffT * digest,int ktype,const robuffT * key,const robuffT * msg) make_mac() argument 201 u_char digest[EVP_MAX_MD_SIZE]; MD5authencrypt() local 232 u_char digest[EVP_MAX_MD_SIZE]; MD5authdecrypt() local 262 u_char digest[EVP_MAX_MD_SIZE]; addr2refid() local [all...] |
/freebsd/crypto/openssl/demos/digest/ |
H A D | EVP_MD_xof.c | 52 unsigned char *digest = NULL; in main() local 54 /* Allow digest length to be changed for demonstration purposes. */ in main() 58 fprintf(stderr, "Specify a non-negative digest length\n"); in main() 78 fprintf(stderr, "Failed to create digest context\n"); in main() 82 /* Initialize digest context. */ in main() 84 fprintf(stderr, "Failed to initialize digest\n"); in main() 89 * Feed our message into the digest function. in main() 97 /* Allocate enough memory for our digest length. */ in main() 98 digest = OPENSSL_malloc(digest_len); in main() 99 if (digest == NULL) { in main() [all …]
|
/freebsd/secure/usr.bin/openssl/man/ |
H A D | openssl-pkeyutl.1 | 147 [\fB\-digest\fR \fIalgorithm\fR] 194 message digest algorithm. The user can specify a digest algorithm by using 195 the \fB\-digest\fR option. This option can only be used with \fB\-sign\fR and 197 .IP "\fB\-digest\fR \fIalgorithm\fR" 4 198 .IX Item "-digest algorithm" 199 This specifies the digest algorithm which is used to hash the input data before 204 default digest algorithm. For \s-1SM2,\s0 it will be \s-1SM3.\s0 If this option is present, 316 Unless otherwise mentioned all algorithms support the \fBdigest:\fR\fIalg\fR option 317 which specifies the digest in use for sign, verify and verifyrecover operations. 318 The value \fIalg\fR should represent a digest name as used in the [all …]
|