| /freebsd/lib/libsecureboot/efi/ |
| H A D | efi_variables.c | 172 hash_data *digests; in efi_get_forbidden_digests() local 182 digests = NULL; in efi_get_forbidden_digests() 228 digests = realloc(digests, in efi_get_forbidden_digests() 230 if (digests == NULL) { in efi_get_forbidden_digests() 235 digests[digest_count].data = malloc(hash_size); in efi_get_forbidden_digests() 236 if (digests[digest_count].data == NULL) in efi_get_forbidden_digests() 239 memcpy(digests[digest_count].data, in efi_get_forbidden_digests() 242 digests[digest_count].hash_size = hash_size; in efi_get_forbidden_digests() 252 return (digests); in efi_get_forbidden_digests() 256 xfree(digests[digest_count].data); in efi_get_forbidden_digests() [all …]
|
| H A D | efi_init.c | 37 hash_data *digests; in ve_efi_init() local 61 digests = efi_get_forbidden_digests(&num); in ve_efi_init() 62 if (num > 0 && digests != NULL) { in ve_efi_init() 63 ve_forbidden_digest_add(digests, num); in ve_efi_init() 68 xfree(digests); in ve_efi_init()
|
| /freebsd/crypto/openssl/crypto/engine/ |
| H A D | tb_digest.c | 29 if (e->digests) { in ENGINE_register_digests() 31 int num_nids = e->digests(e, NULL, &nids, 0); in ENGINE_register_digests() 50 if (e->digests) { in ENGINE_set_default_digests() 52 int num_nids = e->digests(e, NULL, &nids, 0); in ENGINE_set_default_digests() 87 return e->digests; in ENGINE_get_digests() 93 e->digests = f; in ENGINE_set_digests()
|
| /freebsd/crypto/openssh/ |
| H A D | digest-openssl.c | 58 const struct ssh_digest digests[] = { variable 72 if (digests[alg].id != alg) /* sanity */ in ssh_digest_by_alg() 74 if (digests[alg].mdfunc == NULL) in ssh_digest_by_alg() 76 return &(digests[alg]); in ssh_digest_by_alg() 84 for (alg = 0; digests[alg].id != -1; alg++) { in ssh_digest_alg_by_name() 85 if (strcasecmp(name, digests[alg].name) == 0) in ssh_digest_alg_by_name() 86 return digests[alg].id; in ssh_digest_alg_by_name()
|
| H A D | digest-libc.c | 74 const struct ssh_digest digests[SSH_DIGEST_MAX] = { variable 132 if (digests[alg].id != alg) /* sanity */ in ssh_digest_by_alg() 134 return &(digests[alg]); in ssh_digest_by_alg() 143 if (strcasecmp(name, digests[alg].name) == 0) in ssh_digest_alg_by_name() 144 return digests[alg].id; in ssh_digest_alg_by_name()
|
| /freebsd/crypto/heimdal/kdc/ |
| H A D | default_config.c | 80 const char *digests; in krb5_kdc_get_config() local 82 digests = krb5_config_get_string(context, NULL, in krb5_kdc_get_config() 85 if (digests == NULL) in krb5_kdc_get_config() 86 digests = "ntlm-v2"; in krb5_kdc_get_config() 87 c->digests_allowed = parse_flags(digests,_kdc_digestunits, 0); in krb5_kdc_get_config() 91 digests); in krb5_kdc_get_config() 96 digests); in krb5_kdc_get_config()
|
| /freebsd/sbin/md5/tests/ |
| H A D | md5_test.sh | 351 done >digests 365 sha256sum -c digests 367 sha256sum --ignore-missing -c digests 384 cat >digests <<EOF 391 atf_check sha1sum --quiet --check digests
|
| /freebsd/crypto/openssl/doc/man3/ |
| H A D | EVP_DigestVerifyInit.pod | 43 The OpenSSL default and legacy providers support fetching digests and can fetch 44 those digests from any available provider. The OpenSSL FIPS provider also 45 supports fetching digests but will only fetch digests that are themselves 64 Not all digests can be used for all key types. The following combinations apply. 78 Supports no digests (the digest B<type> must be NULL) 91 Support no digests (the digest B<type> must be NULL) 147 and public key algorithms. This meant that "clone" digests such as EVP_dss1()
|
| H A D | EVP_DigestSignInit.pod | 44 The OpenSSL default and legacy providers support fetching digests and can fetch 45 those digests from any available provider. The OpenSSL FIPS provider also 46 supports fetching digests but will only fetch digests that are themselves 73 Not all digests can be used for all key types. The following combinations apply. 87 Supports no digests (the digest I<type> must be NULL) 100 Support no digests (the digest I<type> must be NULL) 157 and public key algorithms. This meant that "clone" digests such as EVP_dss1()
|
| H A D | SSL_library_init.pod | 18 SSL_library_init() registers the available SSL/TLS ciphers and digests. 30 SSL_library_init() adds ciphers and digests used directly and indirectly by
|
| H A D | BIO_f_md.pod | 22 BIO that digests any data passed through it. It is a BIO wrapper 97 The next example digests data by reading through a chain instead: 115 This next example retrieves the message digests from a BIO chain and 145 the data passed through and that digests should be retrieved using a
|
| H A D | OpenSSL_add_all_algorithms.pod | 29 OpenSSL_add_all_algorithms() adds all algorithms to the table (digests and 35 In versions prior to 1.1.0 EVP_cleanup() removed all ciphers and digests from
|
| H A D | EVP_PKEY_get_default_digest_nid.pod | 40 both return 1 if the message digest is advisory (that is other digests 41 can be used) and 2 if it is mandatory (other digests can not be used).
|
| /freebsd/crypto/openssl/test/ |
| H A D | CAtsa.cnf | 138 digests = sha1, sha256, sha384, sha512 # Acceptable message digests (mandatory) 164 digests = sha1, sha256, sha384, sha512 # Acceptable message digests (mandatory)
|
| /freebsd/crypto/openssl/crypto/objects/ |
| H A D | obj_xref.txt | 3 # and digests. 74 # ECDH KDFs and their corresponding message digests and schemes
|
| /freebsd/crypto/openssl/doc/man7/ |
| H A D | evp.pod | 26 functions. The L<B<EVP_Digest>I<XXX>|EVP_DigestInit(3)> functions provide message digests. 69 All the symmetric algorithms (ciphers), digests and asymmetric algorithms 71 implementations. If ENGINE implementations of ciphers or digests are registered
|
| H A D | EVP_RAND-HMAC-DRBG.pod | 65 When using the FIPS provider, only these digests are permitted (as per 128 fipsinstall which restricts the permitted digests when using the FIPS
|
| H A D | EVP_RAND-HASH-DRBG.pod | 64 option to fipsinstall, only these digests are permitted (as per 125 fipsinstall which restricts the permitted digests when using the FIPS
|
| H A D | EVP_MD-SM3.pod | 9 Support for computing SM3 digests through the B<EVP_MD> API.
|
| H A D | EVP_MD-MD4.pod | 9 Support for computing MD4 digests through the B<EVP_MD> API.
|
| H A D | EVP_MD-MD2.pod | 9 Support for computing MD2 digests through the B<EVP_MD> API.
|
| /freebsd/crypto/openssl/providers/implementations/ |
| H A D | build.info | 1 SUBDIRS=digests ciphers rands macs kdfs exchange keymgmt signature asymciphers \
|
| /freebsd/usr.sbin/bsdconfig/examples/ |
| H A D | browse_packages_http.sh | 18 for file in digests.txz packagesite.txz; do
|
| /freebsd/contrib/libarchive/libarchive/ |
| H A D | archive_read_support_format_7zip.c | 168 uint32_t *digests; member 217 uint32_t *digests; member 1145 zip->si.ss.digests[zip->entry->ssIndex] != in archive_read_format_7zip_read_data() 1150 (unsigned long)zip->si.ss.digests[ in archive_read_format_7zip_read_data() 2083 free(d->digests); in free_Digest() 2111 d->digests = calloc(num, sizeof(*d->digests)); in read_Digests() 2112 if (d->digests == NULL) in read_Digests() 2118 d->digests[i] = archive_le32dec(p); in read_Digests() 2186 pi->digest.digests = in read_PackInfo() 2187 calloc((size_t)pi->numPackStreams, sizeof(*pi->digest.digests)); in read_PackInfo() [all …]
|
| /freebsd/crypto/openssl/crypto/ts/ |
| H A D | ts_conf.c | 363 char *digests = NCONF_get_string(conf, section, ENV_DIGESTS); in TS_CONF_set_digests() local 365 if (digests == NULL) { in TS_CONF_set_digests() 369 if ((list = X509V3_parse_list(digests)) == NULL) { in TS_CONF_set_digests()
|