| /freebsd/crypto/openssl/providers/implementations/signature/ |
| H A D | ecdsa_sig.c | 101 char mdname[OSSL_MAX_NAME_SIZE]; member 167 const char *mdname, const char *mdprops, argument 176 if (mdname == NULL) 179 mdname_len = strlen(mdname); 180 if (mdname_len >= sizeof(ctx->mdname)) { 182 "%s exceeds name buffer length", mdname); 187 md = EVP_MD_fetch(ctx->libctx, mdname, mdprops); 190 "%s could not be fetched", mdname); 196 "%s has invalid md size %d", mdname, md_size); 203 "digest=%s", mdname); [all …]
|
| H A D | dsa_sig.c | 104 char mdname[OSSL_MAX_NAME_SIZE]; member 150 const char *mdname, const char *mdprops, in dsa_setup_md() argument 158 if (mdname != NULL) { in dsa_setup_md() 161 size_t mdname_len = strlen(mdname); in dsa_setup_md() 164 md = EVP_MD_fetch(ctx->libctx, mdname, mdprops); in dsa_setup_md() 169 "%s could not be fetched", mdname); in dsa_setup_md() 174 "digest=%s", mdname); in dsa_setup_md() 177 if (mdname_len >= sizeof(ctx->mdname)) { in dsa_setup_md() 179 "%s exceeds name buffer length", mdname); in dsa_setup_md() 204 if (ctx->mdname[0] != '\0' in dsa_setup_md() [all …]
|
| H A D | sm2_sig.c | 76 char mdname[OSSL_MAX_NAME_SIZE]; member 92 static int sm2sig_set_mdname(PROV_SM2_CTX *psm2ctx, const char *mdname) in sm2sig_set_mdname() argument 95 psm2ctx->md = EVP_MD_fetch(psm2ctx->libctx, psm2ctx->mdname, in sm2sig_set_mdname() 106 if (mdname == NULL) in sm2sig_set_mdname() 109 if (strlen(mdname) >= sizeof(psm2ctx->mdname) in sm2sig_set_mdname() 110 || !EVP_MD_is_a(psm2ctx->md, mdname)) { in sm2sig_set_mdname() 112 mdname); in sm2sig_set_mdname() 116 OPENSSL_strlcpy(psm2ctx->mdname, mdname, sizeof(psm2ctx->mdname)); in sm2sig_set_mdname() 133 strcpy(ctx->mdname, OSSL_DIGEST_NAME_SM3); in sm2sig_newctx() 208 static int sm2sig_digest_signverify_init(void *vpsm2ctx, const char *mdname, in sm2sig_digest_signverify_init() argument [all …]
|
| H A D | rsa_sig.c | 128 char mdname[OSSL_MAX_NAME_SIZE]; /* Purely informational */ member 177 const char *mdname, const char *mgf1_mdname, in rsa_check_padding() argument 182 if (mdname != NULL || mdnid != NID_undef) { in rsa_check_padding() 195 if ((mdname != NULL && !EVP_MD_is_a(prsactx->md, mdname)) in rsa_check_padding() 370 static int rsa_setup_md(PROV_RSA_CTX *ctx, const char *mdname, in rsa_setup_md() argument 378 if (mdname != NULL) { in rsa_setup_md() 380 size_t mdname_len = strlen(mdname); in rsa_setup_md() 382 md = EVP_MD_fetch(ctx->libctx, mdname, mdprops); in rsa_setup_md() 386 "%s could not be fetched", mdname); in rsa_setup_md() 392 "digest=%s", mdname); in rsa_setup_md() [all …]
|
| H A D | ml_dsa_sig.c | 157 static int ml_dsa_digest_signverify_init(void *vctx, const char *mdname, in ml_dsa_digest_signverify_init() argument 162 if (mdname != NULL && mdname[0] != '\0') { in ml_dsa_digest_signverify_init()
|
| /freebsd/crypto/openssl/crypto/evp/ |
| H A D | m_sigver.c | 29 static const char *canon_mdname(const char *mdname) in canon_mdname() argument 31 if (mdname != NULL && strcmp(mdname, "UNDEF") == 0) in canon_mdname() 34 return mdname; in canon_mdname() 38 const EVP_MD *type, const char *mdname, in do_sigver_init() argument 94 if (mdname == NULL && type == NULL) in do_sigver_init() 95 mdname = canon_mdname(EVP_MD_get0_name(ctx->reqdigest)); in do_sigver_init() 209 if (mdname == NULL) in do_sigver_init() 210 mdname = canon_mdname(EVP_MD_get0_name(type)); in do_sigver_init() 212 if (mdname == NULL && !reinit) { in do_sigver_init() 217 mdname = canon_mdname(locmdname); in do_sigver_init() [all …]
|
| H A D | p5_crpt.c | 42 const char *mdname = EVP_MD_name(md); in PKCS5_PBE_keyivgen_ex() local 94 (char *)mdname, 0); in PKCS5_PBE_keyivgen_ex()
|
| /freebsd/crypto/openssl/providers/common/ |
| H A D | provider_util.c | 168 const char *mdname, const char *propquery) in ossl_prov_digest_fetch() argument 171 pd->md = pd->alloc_md = EVP_MD_fetch(libctx, mdname, propquery); in ossl_prov_digest_fetch() 233 const char *mdname, in ossl_prov_set_macctx() argument 243 if (mdname == NULL) { in ossl_prov_set_macctx() 249 mdname = p->data; in ossl_prov_set_macctx() 271 if (mdname != NULL) in ossl_prov_set_macctx() 273 (char *)mdname, 0); in ossl_prov_set_macctx() 301 const char *mdname, in ossl_prov_macctx_load_from_params() argument 340 if (ossl_prov_set_macctx(*macctx, params, ciphername, mdname, NULL, in ossl_prov_macctx_load_from_params()
|
| /freebsd/sbin/devd/tests/ |
| H A D | client_test.c | 49 char mdname[80]; in create_two_events() local 55 error = fgets(mdname, sizeof(mdname), create_stdout); in create_two_events() 60 snprintf(destroy_cmd, nitems(destroy_cmd), "mdconfig -d -u %s", mdname); in create_two_events()
|
| /freebsd/crypto/openssl/providers/common/include/prov/ |
| H A D | provider_util.h | 67 const char *mdname, const char *propquery); 100 const char *mdname, 127 const char *mdname,
|
| /freebsd/sbin/mdmfs/ |
| H A D | mdmfs.c | 74 static const char *mdname; /* Name of memory disk device (e.g., "md"). */ variable 121 mdname = MD_NAME; in main() 122 mdnamelen = strlen(mdname); in main() 330 if (strncmp(unitstr, mdname, mdnamelen) == 0) in main() 438 mdname, unit); in do_mdconfig_attach() 490 strncmp(linep, mdname, mdnamelen) != 0) in do_mdconfig_attach_au() 513 rv = run(NULL, "%s -d -u %s%d", path_mdconfig, mdname, unit); in do_mdconfig_detach() 528 mdname, unit, mdsuffix, mtpoint); in do_mount_md() 615 rv = run(NULL, "%s%s /dev/%s%d", _PATH_NEWFS, args, mdname, unit); in do_newfs()
|
| /freebsd/crypto/openssl/include/internal/ |
| H A D | hpke_util.h | 35 const char *mdname; /* hash alg name for the HKDF */ member 48 const char *mdname; /* hash alg name for the HKDF */ member 96 EVP_KDF_CTX *ossl_kdf_ctx_create(const char *kdfname, const char *mdname,
|
| /freebsd/crypto/openssl/crypto/crmf/ |
| H A D | crmf_pbm.c | 134 char mdname[OSSL_MAX_NAME_SIZE]; in OSSL_CRMF_pbm_new() local 157 OBJ_obj2txt(mdname, sizeof(mdname), pbmp->owf->algorithm, 0); in OSSL_CRMF_pbm_new() 158 if ((owf = EVP_MD_fetch(libctx, mdname, propq)) == NULL) { in OSSL_CRMF_pbm_new()
|
| /freebsd/crypto/openssl/crypto/rsa/ |
| H A D | rsa_lib.c | 963 const char *mdkey, const char *mdname, in int_set_rsa_md_name() argument 968 if (ctx == NULL || mdname == NULL || (ctx->operation & optype) == 0) { in int_set_rsa_md_name() 988 *p++ = OSSL_PARAM_construct_utf8_string(mdkey, (char *)mdname, 0); in int_set_rsa_md_name() 1004 char *mdname, size_t mdnamesize) in int_get_rsa_md_name() argument 1008 if (ctx == NULL || mdname == NULL || (ctx->operation & optype) == 0) { in int_get_rsa_md_name() 1028 *p++ = OSSL_PARAM_construct_utf8_string(mdkey, (char *)mdname, mdnamesize); in int_get_rsa_md_name() 1065 const char *mdname, in EVP_PKEY_CTX_set_rsa_pss_keygen_md_name() argument 1069 OSSL_PKEY_PARAM_RSA_DIGEST, mdname, in EVP_PKEY_CTX_set_rsa_pss_keygen_md_name() 1087 int EVP_PKEY_CTX_set_rsa_oaep_md_name(EVP_PKEY_CTX *ctx, const char *mdname, in EVP_PKEY_CTX_set_rsa_oaep_md_name() argument 1091 OSSL_ASYM_CIPHER_PARAM_OAEP_DIGEST, mdname, in EVP_PKEY_CTX_set_rsa_oaep_md_name() [all …]
|
| H A D | rsa_backend.c | 319 const char *mdname = (hashalg_nid == default_hashalg_nid in ossl_rsa_pss_params_30_todata() local 338 if ((mdname != NULL in ossl_rsa_pss_params_30_todata() 339 && !ossl_param_build_set_utf8_string(bld, params, key_md, mdname)) in ossl_rsa_pss_params_30_todata() 410 const char *mdname = NULL; in ossl_rsa_pss_params_30_fromdata() local 413 mdname = param_md->data; in ossl_rsa_pss_params_30_fromdata() 414 else if (!OSSL_PARAM_get_utf8_ptr(param_mgf, &mdname)) in ossl_rsa_pss_params_30_fromdata() 417 if ((md = EVP_MD_fetch(libctx, mdname, propq)) == NULL in ossl_rsa_pss_params_30_fromdata()
|
| /freebsd/crypto/openssl/crypto/ec/ |
| H A D | ecdh_kdf.c | 33 const char *mdname = EVP_MD_get0_name(md); in ossl_ecdh_kdf_X9_63() local 38 (char *)mdname, 0); in ossl_ecdh_kdf_X9_63()
|
| /freebsd/crypto/openssl/providers/implementations/asymciphers/ |
| H A D | rsa_enc.c | 464 char mdname[OSSL_MAX_NAME_SIZE]; in rsa_set_ctx_params() local 482 str = mdname; in rsa_set_ctx_params() 483 if (!OSSL_PARAM_get_utf8_string(p, &str, sizeof(mdname))) in rsa_set_ctx_params() 495 prsactx->oaep_md = EVP_MD_fetch(prsactx->libctx, mdname, mdprops); in rsa_set_ctx_params() 543 str = mdname; in rsa_set_ctx_params() 544 if (!OSSL_PARAM_get_utf8_string(p, &str, sizeof(mdname))) in rsa_set_ctx_params() 558 prsactx->mgf1_md = EVP_MD_fetch(prsactx->libctx, mdname, str); in rsa_set_ctx_params()
|
| /freebsd/crypto/openssl/crypto/ffc/ |
| H A D | ffc_params.c | 134 params->mdname = alg; in ossl_ffc_set_digest() 188 dst->mdname = src->mdname; in ossl_ffc_params_copy() 270 if (ffc->mdname != NULL in ossl_ffc_params_todata() 273 ffc->mdname)) in ossl_ffc_params_todata()
|
| /freebsd/crypto/openssl/crypto/dh/ |
| H A D | dh_kdf.c | 38 const char *mdname = EVP_MD_get0_name(md); in ossl_dh_kdf_X9_42_asn1() local 48 (char *)mdname, 0); in ossl_dh_kdf_X9_42_asn1()
|
| /freebsd/crypto/openssl/providers/implementations/keymgmt/ |
| H A D | dsa_kmgmt.c | 69 char *mdname; member 521 OPENSSL_free(gctx->mdname); in dsa_gen_set_params() 522 gctx->mdname = OPENSSL_strdup(p->data); in dsa_gen_set_params() 523 if (gctx->mdname == NULL) in dsa_gen_set_params() 656 if (gctx->mdname != NULL) in dsa_gen() 657 ossl_ffc_set_digest(ffc, gctx->mdname, gctx->mdprops); in dsa_gen() 694 OPENSSL_free(gctx->mdname); in dsa_gen_cleanup()
|
| H A D | dh_kmgmt.c | 75 char *mdname; member 464 gctx->mdname = NULL; in dh_gen_init_base() 631 OPENSSL_free(gctx->mdname); in dhx_gen_set_params() 632 gctx->mdname = OPENSSL_strdup(p->data); in dhx_gen_set_params() 633 if (gctx->mdname == NULL) in dhx_gen_set_params() 758 if (gctx->mdname != NULL) in dh_gen() 759 ossl_ffc_set_digest(ffc, gctx->mdname, gctx->mdprops); in dh_gen() 823 OPENSSL_free(gctx->mdname); in dh_gen_cleanup()
|
| /freebsd/crypto/openssl/crypto/hpke/ |
| H A D | hpke_util.c | 393 EVP_KDF_CTX *ossl_kdf_ctx_create(const char *kdfname, const char *mdname, in ossl_kdf_ctx_create() argument 406 if (kctx != NULL && mdname != NULL) { in ossl_kdf_ctx_create() 409 if (mdname != NULL) in ossl_kdf_ctx_create() 411 (char *)mdname, 0); in ossl_kdf_ctx_create()
|
| /freebsd/usr.sbin/fstyp/tests/ |
| H A D | fstyp_test.sh | 241 mdconfig -a -t swap -s 64m > mdname 242 md=$(cat mdname) 251 md=$(cat mdname)
|
| /freebsd/crypto/openssl/doc/man3/ |
| H A D | EVP_PKEY_get_default_digest_nid.pod | 13 char *mdname, size_t mdname_sz); 20 I<pkey> into I<mdname>, up to at most I<mdname_sz> bytes including the
|
| /freebsd/crypto/openssl/test/ |
| H A D | tls-provider.c | 2619 char mdname[OSSL_MAX_NAME_SIZE]; member 2650 const char *mdname, const char *mdprops) in xor_sig_setup_md() argument 2657 md = EVP_MD_fetch(ctx->libctx, mdname, mdprops); in xor_sig_setup_md() 2662 "%s could not be fetched", mdname); in xor_sig_setup_md() 2682 OPENSSL_strlcpy(ctx->mdname, mdname, sizeof(ctx->mdname)); in xor_sig_setup_md() 2799 static int xor_sig_digest_signverify_init(void *vpxor_sigctx, const char *mdname, in xor_sig_digest_signverify_init() argument 2803 char *rmdname = (char *)mdname; in xor_sig_digest_signverify_init() 2832 static int xor_sig_digest_sign_init(void *vpxor_sigctx, const char *mdname, in xor_sig_digest_sign_init() argument 2835 return xor_sig_digest_signverify_init(vpxor_sigctx, mdname, vxorsig, in xor_sig_digest_sign_init() 2839 static int xor_sig_digest_verify_init(void *vpxor_sigctx, const char *mdname, void *vxorsig, const … in xor_sig_digest_verify_init() argument [all …]
|