/freebsd/lib/libsecureboot/efi/ |
H A D | efi_variables.c | 171 hash_data *digests; in efi_get_forbidden_digests() local 181 digests = NULL; in efi_get_forbidden_digests() 227 digests = realloc(digests, in efi_get_forbidden_digests() 229 if (digests == NULL) { in efi_get_forbidden_digests() 234 digests[digest_count].data = malloc(hash_size); in efi_get_forbidden_digests() 235 if (digests[digest_count].data == NULL) in efi_get_forbidden_digests() 238 memcpy(digests[digest_count].data, in efi_get_forbidden_digests() 241 digests[digest_count].hash_size = hash_size; in efi_get_forbidden_digests() 251 return (digests); in efi_get_forbidden_digests() 255 xfree(digests[digest_count].data); in efi_get_forbidden_digests() [all …]
|
H A D | efi_init.c | 37 hash_data *digests; in ve_efi_init() local 61 digests = efi_get_forbidden_digests(&num); in ve_efi_init() 62 if (num > 0 && digests != NULL) { in ve_efi_init() 63 ve_forbidden_digest_add(digests, num); in ve_efi_init() 68 xfree(digests); in ve_efi_init()
|
/freebsd/crypto/openssl/crypto/engine/ |
H A D | tb_digest.c | 29 if (e->digests) { in ENGINE_register_digests() 31 int num_nids = e->digests(e, NULL, &nids, 0); in ENGINE_register_digests() 50 if (e->digests) { in ENGINE_set_default_digests() 52 int num_nids = e->digests(e, NULL, &nids, 0); in ENGINE_set_default_digests() 87 return e->digests; in ENGINE_get_digests() 93 e->digests = f; in ENGINE_set_digests()
|
/freebsd/crypto/openssh/ |
H A D | digest-openssl.c | 58 const struct ssh_digest digests[] = { variable 72 if (digests[alg].id != alg) /* sanity */ in ssh_digest_by_alg() 74 if (digests[alg].mdfunc == NULL) in ssh_digest_by_alg() 76 return &(digests[alg]); in ssh_digest_by_alg() 84 for (alg = 0; digests[alg].id != -1; alg++) { in ssh_digest_alg_by_name() 85 if (strcasecmp(name, digests[alg].name) == 0) in ssh_digest_alg_by_name() 86 return digests[alg].id; in ssh_digest_alg_by_name()
|
H A D | digest-libc.c | 74 const struct ssh_digest digests[SSH_DIGEST_MAX] = { variable 132 if (digests[alg].id != alg) /* sanity */ in ssh_digest_by_alg() 134 return &(digests[alg]); in ssh_digest_by_alg() 143 if (strcasecmp(name, digests[alg].name) == 0) in ssh_digest_alg_by_name() 144 return digests[alg].id; in ssh_digest_alg_by_name()
|
/freebsd/crypto/heimdal/kdc/ |
H A D | default_config.c | 80 const char *digests; in krb5_kdc_get_config() local 82 digests = krb5_config_get_string(context, NULL, in krb5_kdc_get_config() 85 if (digests == NULL) in krb5_kdc_get_config() 86 digests = "ntlm-v2"; in krb5_kdc_get_config() 87 c->digests_allowed = parse_flags(digests,_kdc_digestunits, 0); in krb5_kdc_get_config() 91 digests); in krb5_kdc_get_config() 96 digests); in krb5_kdc_get_config()
|
/freebsd/sbin/md5/tests/ |
H A D | md5_test.sh | 351 done >digests 365 sha256sum -c digests 367 sha256sum --ignore-missing -c digests 384 cat >digests <<EOF 391 atf_check sha1sum --quiet --check digests
|
/freebsd/crypto/openssl/doc/man3/ |
H A D | EVP_DigestVerifyInit.pod | 43 The OpenSSL default and legacy providers support fetching digests and can fetch 44 those digests from any available provider. The OpenSSL FIPS provider also 45 supports fetching digests but will only fetch digests that are themselves 64 Not all digests can be used for all key types. The following combinations apply. 78 Supports no digests (the digest B<type> must be NULL) 91 Support no digests (the digest B<type> must be NULL) 147 and public key algorithms. This meant that "clone" digests such as EVP_dss1()
|
H A D | EVP_DigestSignInit.pod | 44 The OpenSSL default and legacy providers support fetching digests and can fetch 45 those digests from any available provider. The OpenSSL FIPS provider also 46 supports fetching digests but will only fetch digests that are themselves 73 Not all digests can be used for all key types. The following combinations apply. 87 Supports no digests (the digest I<type> must be NULL) 100 Support no digests (the digest I<type> must be NULL) 158 and public key algorithms. This meant that "clone" digests such as EVP_dss1()
|
H A D | SSL_library_init.pod | 18 SSL_library_init() registers the available SSL/TLS ciphers and digests. 30 SSL_library_init() adds ciphers and digests used directly and indirectly by
|
H A D | BIO_f_md.pod | 22 BIO that digests any data passed through it. It is a BIO wrapper 97 The next example digests data by reading through a chain instead: 115 This next example retrieves the message digests from a BIO chain and 145 the data passed through and that digests should be retrieved using a
|
H A D | OpenSSL_add_all_algorithms.pod | 29 OpenSSL_add_all_algorithms() adds all algorithms to the table (digests and 35 In versions prior to 1.1.0 EVP_cleanup() removed all ciphers and digests from
|
H A D | EVP_PKEY_get_default_digest_nid.pod | 40 both return 1 if the message digest is advisory (that is other digests 41 can be used) and 2 if it is mandatory (other digests can not be used).
|
H A D | EVP_DigestInit.pod | 135 The EVP digest routines are a high-level interface to message digests, 333 digests with multiple names, only one of them is returned; it's 407 B<NID_sha1WithRSAEncryption>. Since digests and signature algorithms are no 425 Additionally, it only knows about digests that are built-in to OpenSSL and have 456 Traverses all messages digests implemented by all activated providers 639 The B<EVP> interface to message digests should almost always be used in 662 implementations of digests to be specified. 671 EVP_MD_CTX_ctrl() sends commands to message digests for additional configuration 676 This example digests the data "Test Message\n" and "Hello World\n", using the 765 The link between digests and signing algorithms was fixed in OpenSSL 1.0 and
|
/freebsd/crypto/openssl/test/ |
H A D | CAtsa.cnf | 138 digests = sha1, sha256, sha384, sha512 # Acceptable message digests (mandatory) 164 digests = sha1, sha256, sha384, sha512 # Acceptable message digests (mandatory)
|
/freebsd/crypto/openssl/crypto/objects/ |
H A D | obj_xref.txt | 3 # and digests. 55 # ECDH KDFs and their corresponding message digests and schemes
|
/freebsd/crypto/openssl/doc/man7/ |
H A D | evp.pod | 26 functions. The L<B<EVP_Digest>I<XXX>|EVP_DigestInit(3)> functions provide message digests. 69 All the symmetric algorithms (ciphers), digests and asymmetric algorithms 71 implementations. If ENGINE implementations of ciphers or digests are registered
|
H A D | EVP_MD-SM3.pod | 9 Support for computing SM3 digests through the B<EVP_MD> API.
|
H A D | EVP_MD-MD4.pod | 9 Support for computing MD4 digests through the B<EVP_MD> API.
|
/freebsd/crypto/openssl/providers/implementations/ |
H A D | build.info | 1 SUBDIRS=digests ciphers rands macs kdfs exchange keymgmt signature asymciphers \
|
/freebsd/contrib/libarchive/libarchive/ |
H A D | archive_read_support_format_7zip.c | 144 uint32_t *digests; member 194 uint32_t *digests; member 915 zip->si.ss.digests[zip->entry->ssIndex] != in archive_read_format_7zip_read_data() 920 (unsigned long)zip->si.ss.digests[ in archive_read_format_7zip_read_data() 1839 free(d->digests); in free_Digest() 1867 d->digests = calloc(num, sizeof(*d->digests)); in read_Digests() 1868 if (d->digests == NULL) in read_Digests() 1874 d->digests[i] = archive_le32dec(p); in read_Digests() 1942 pi->digest.digests = in read_PackInfo() 1943 calloc((size_t)pi->numPackStreams, sizeof(*pi->digest.digests)); in read_PackInfo() [all …]
|
/freebsd/usr.sbin/bsdconfig/examples/ |
H A D | browse_packages_http.sh | 18 for file in digests.txz packagesite.txz; do
|
/freebsd/crypto/openssl/crypto/ts/ |
H A D | ts_conf.c | 349 char *digests = NCONF_get_string(conf, section, ENV_DIGESTS); in TS_CONF_set_digests() local 351 if (digests == NULL) { in TS_CONF_set_digests() 355 if ((list = X509V3_parse_list(digests)) == NULL) { in TS_CONF_set_digests()
|
/freebsd/secure/lib/libcrypto/modules/legacy/ |
H A D | Makefile | 32 ${LCRYPTO_SRC}/providers/implementations/digests \
|
/freebsd/crypto/openssl/apps/ |
H A D | list.c | 191 STACK_OF(EVP_MD) *digests = sk_EVP_MD_new(md_cmp); in list_digests() 194 if (digests == NULL) { in list_digests() 206 EVP_MD_do_all_provided(app_get0_libctx(), collect_digests, digests); in list_digests() 207 sk_EVP_MD_sort(digests); in list_digests() 208 for (i = 0; i < sk_EVP_MD_num(digests); i++) { in list_digests() 209 const EVP_MD *m = sk_EVP_MD_value(digests, i); in list_digests() 238 sk_EVP_MD_pop_free(digests, EVP_MD_free); in list_digests() 1019 /* Look through providers' digests */ in is_md_available()
|