/freebsd/crypto/openssl/crypto/rsa/ |
H A D | rsa_backend.c | 171 int ossl_rsa_pss_params_30_todata(const RSA_PSS_PARAMS_30 *pss, in ossl_rsa_pss_params_30_todata() argument 174 if (!ossl_rsa_pss_params_30_is_unrestricted(pss)) { in ossl_rsa_pss_params_30_todata() 175 int hashalg_nid = ossl_rsa_pss_params_30_hashalg(pss); in ossl_rsa_pss_params_30_todata() 176 int maskgenalg_nid = ossl_rsa_pss_params_30_maskgenalg(pss); in ossl_rsa_pss_params_30_todata() 177 int maskgenhashalg_nid = ossl_rsa_pss_params_30_maskgenhashalg(pss); in ossl_rsa_pss_params_30_todata() 178 int saltlen = ossl_rsa_pss_params_30_saltlen(pss); in ossl_rsa_pss_params_30_todata() 411 if (rsa->pss != NULL) { in ossl_rsa_dup() 412 dupkey->pss = RSA_PSS_PARAMS_dup(rsa->pss); in ossl_rsa_dup() 413 if (rsa->pss->maskGenAlgorithm != NULL in ossl_rsa_dup() 414 && dupkey->pss->maskGenAlgorithm == NULL) { in ossl_rsa_dup() [all …]
|
H A D | rsa_ameth.c | 41 if (rsa->pss == NULL) { in rsa_param_encode() 46 if (ASN1_item_pack(rsa->pss, ASN1_ITEM_rptr(RSA_PSS_PARAMS), pstr) == NULL) in rsa_param_encode() 205 static int rsa_pss_param_print(BIO *bp, int pss_key, RSA_PSS_PARAMS *pss, in rsa_pss_param_print() argument 214 if (pss == NULL) { in rsa_pss_param_print() 222 } else if (pss == NULL) { in rsa_pss_param_print() 236 if (pss->hashAlgorithm) { in rsa_pss_param_print() 237 if (i2a_ASN1_OBJECT(bp, pss->hashAlgorithm->algorithm) <= 0) in rsa_pss_param_print() 251 if (pss->maskGenAlgorithm) { in rsa_pss_param_print() 252 if (i2a_ASN1_OBJECT(bp, pss->maskGenAlgorithm->algorithm) <= 0) in rsa_pss_param_print() 256 maskHash = ossl_x509_algor_mgf1_decode(pss->maskGenAlgorithm); in rsa_pss_param_print() [all …]
|
H A D | rsa_asn1.c | 81 RSA_PSS_PARAMS *pss = (RSA_PSS_PARAMS *)*pval; variable 82 X509_ALGOR_free(pss->maskHash);
|
H A D | rsa_local.h | 84 RSA_PSS_PARAMS *pss; member 156 int ossl_rsa_pss_get_param(const RSA_PSS_PARAMS *pss, const EVP_MD **pmd,
|
H A D | rsa_lib.c | 172 RSA_PSS_PARAMS_free(r->pss); in RSA_free() 681 return r->pss; in RSA_get0_pss_params() 686 int ossl_rsa_set0_pss_params(RSA *r, RSA_PSS_PARAMS *pss) in ossl_rsa_set0_pss_params() argument 691 RSA_PSS_PARAMS_free(r->pss); in ossl_rsa_set0_pss_params() 692 r->pss = pss; in ossl_rsa_set0_pss_params()
|
H A D | rsa_pmeth.c | 739 rsa->pss = ossl_rsa_pss_params_create(rctx->md, rctx->mgf1md, in rsa_set_pss_param() 742 if (rsa->pss == NULL) in rsa_set_pss_param() 844 if (rsa->pss == NULL) in pkey_pss_init() 847 if (!ossl_rsa_pss_get_param(rsa->pss, &md, &mgf1md, &min_saltlen)) in pkey_pss_init()
|
/freebsd/crypto/openssl/test/recipes/30-test_evp_data/ |
H A D | evppkey_rsa.txt | 256 Ctrl = rsa_padding_mode:pss 289 Ctrl = rsa_padding_mode:pss 295 Ctrl = rsa_padding_mode:pss 301 Ctrl = rsa_padding_mode:pss 307 Ctrl = rsa_padding_mode:pss 313 Ctrl = rsa_padding_mode:pss 319 Ctrl = rsa_padding_mode:pss 334 Ctrl = rsa_padding_mode:pss 340 Ctrl = rsa_padding_mode:pss 346 Ctrl = rsa_padding_mode:pss [all …]
|
H A D | evppkey_rsa_common.txt | 360 Ctrl = rsa_padding_mode:pss 367 Ctrl = rsa_padding_mode:pss 375 Ctrl = rsa_padding_mode:pss 382 Ctrl = rsa_padding_mode:pss 391 Ctrl = rsa_padding_mode:pss 400 Ctrl = rsa_padding_mode:pss 409 Ctrl = rsa_padding_mode:pss 417 Ctrl = rsa_padding_mode:pss 477 Ctrl = rsa_padding_mode:pss 483 Ctrl = rsa_padding_mode:pss [all …]
|
/freebsd/crypto/openssl/providers/common/der/ |
H A D | der_rsa_key.c | 248 const RSA_PSS_PARAMS_30 *pss) in DER_w_MaskGenAlgorithm() argument 250 if (pss != NULL && ossl_rsa_pss_params_30_maskgenalg(pss) == NID_mgf1) { in DER_w_MaskGenAlgorithm() 251 int maskgenhashalg_nid = ossl_rsa_pss_params_30_maskgenhashalg(pss); in DER_w_MaskGenAlgorithm() 284 const RSA_PSS_PARAMS_30 *pss) in ossl_DER_w_RSASSA_PSS_params() argument 300 if (!ossl_assert(pss != NULL in ossl_DER_w_RSASSA_PSS_params() 301 && !ossl_rsa_pss_params_30_is_unrestricted(pss))) in ossl_DER_w_RSASSA_PSS_params() 304 hashalg_nid = ossl_rsa_pss_params_30_hashalg(pss); in ossl_DER_w_RSASSA_PSS_params() 305 saltlen = ossl_rsa_pss_params_30_saltlen(pss); in ossl_DER_w_RSASSA_PSS_params() 306 trailerfield = ossl_rsa_pss_params_30_trailerfield(pss); in ossl_DER_w_RSASSA_PSS_params() 352 && DER_w_MaskGenAlgorithm(pkt, 1, pss) in ossl_DER_w_RSASSA_PSS_params() [all …]
|
/freebsd/lib/libprocstat/ |
H A D | core.c | 343 struct ps_strings pss; in get_args() local 353 if (core_read_mem(core, &pss, sizeof(pss), psstrings, true) == -1) in get_args() 356 addr = (vm_offset_t)pss.ps_argvstr; in get_args() 357 nstr = pss.ps_nargvstr; in get_args() 359 addr = (vm_offset_t)pss.ps_envstr; in get_args() 360 nstr = pss.ps_nenvstr; in get_args()
|
/freebsd/crypto/openssl/test/certs/ |
H A D | setup.sh | 404 ./mkcert.sh genee PSS-SHA1 ee-key ee-pss-sha1-cert ca-key ca-cert \ 405 -sha1 -sigopt rsa_padding_mode:pss -sigopt rsa_pss_saltlen:digest 407 ./mkcert.sh genee PSS-SHA256 ee-key ee-pss-sha256-cert ca-key ca-cert \ 408 -sha256 -sigopt rsa_padding_mode:pss -sigopt rsa_pss_saltlen:digest 410 ./mkcert.sh genca "CA-PSS" ca-pss-key ca-pss-cert root-key root-cert \ 411 -sha256 -sigopt rsa_padding_mode:pss -sigopt rsa_pss_saltlen:-1 412 ./mkcert.sh genee "EE-PSS" ee-key ee-pss-cert ca-pss-key ca-pss-cert \ 413 -sha256 -sigopt rsa_padding_mode:pss -sigopt rsa_pss_saltlen:-1 422 -newkey rsa-pss -keyout server-pss-restrict-key.pem \ 425 server-pss-restrict-cert rootkey rootcert
|
/freebsd/crypto/openssl/include/crypto/ |
H A D | rsa.h | 71 int ossl_rsa_pss_params_30_todata(const RSA_PSS_PARAMS_30 *pss, 77 int ossl_rsa_set0_pss_params(RSA *r, RSA_PSS_PARAMS *pss); 78 int ossl_rsa_pss_get_param_unverified(const RSA_PSS_PARAMS *pss,
|
/freebsd/crypto/openssl/providers/common/include/prov/ |
H A D | der_rsa.h.in | 25 const RSA_PSS_PARAMS_30 *pss); 30 const RSA_PSS_PARAMS_30 *pss);
|
H A D | der_rsa.h | 179 const RSA_PSS_PARAMS_30 *pss); 184 const RSA_PSS_PARAMS_30 *pss);
|
/freebsd/crypto/openssl/doc/man7/ |
H A D | EVP_SIGNATURE-RSA.pod | 39 =item "pss" (B<OSSL_PKEY_RSA_PAD_MODE_PSS>) 45 The digest algorithm name to use for the maskGenAlgorithm used by "pss" mode. 54 The "pss" mode minimum salt length. The value can either be an integer,
|
/freebsd/crypto/openssl/test/ssl-tests/ |
H A D | 20-cert-select.cnf | 456 PSS.Certificate = ${ENV::TEST_CERTS_DIR}/server-pss-cert.pem 457 PSS.PrivateKey = ${ENV::TEST_CERTS_DIR}/server-pss-key.pem 818 PSS.Certificate = ${ENV::TEST_CERTS_DIR}/server-pss-cert.pem 819 PSS.PrivateKey = ${ENV::TEST_CERTS_DIR}/server-pss-key.pem 853 PSS.Certificate = ${ENV::TEST_CERTS_DIR}/server-pss-cert.pem 854 PSS.PrivateKey = ${ENV::TEST_CERTS_DIR}/server-pss-key.pem 889 PSS.Certificate = ${ENV::TEST_CERTS_DIR}/server-pss-cert.pem 890 PSS.PrivateKey = ${ENV::TEST_CERTS_DIR}/server-pss-key.pem 916 Certificate = ${ENV::TEST_CERTS_DIR}/server-pss-cert.pem 918 PrivateKey = ${ENV::TEST_CERTS_DIR}/server-pss [all...] |
H A D | 20-cert-select.cnf.in | 26 "PSS.Certificate" => test_pem("server-pss-cert.pem"), 27 "PSS.PrivateKey" => test_pem("server-pss-key.pem"), 38 "Certificate" => test_pem("server-pss-cert.pem"), 39 "PrivateKey" => test_pem("server-pss-key.pem"), 43 "Certificate" => test_pem("server-pss-restrict-cert.pem"), 44 "PrivateKey" => test_pem("server-pss-restrict-key.pem"), 56 "PSS.Certificate" => test_pem("server-pss-cert.pem"), 57 "PSS.PrivateKey" => test_pem("server-pss-key.pem"),
|
/freebsd/sys/cam/ctl/ |
H A D | ctl_backend_block.c | 2218 off_t ps, pss, po, pos, us, uss, uo, uos; in ctl_be_block_open_file() local 2283 pss = ps / cbe_lun->blocksize; in ctl_be_block_open_file() 2285 if ((pss > 0) && (pss * cbe_lun->blocksize == ps) && (pss >= pos) && in ctl_be_block_open_file() 2286 ((pss & (pss - 1)) == 0) && (pos * cbe_lun->blocksize == po)) { in ctl_be_block_open_file() 2287 cbe_lun->pblockexp = fls(pss) - 1; in ctl_be_block_open_file() 2288 cbe_lun->pblockoff = (pss - pos) % pss; in ctl_be_block_open_file() 2329 off_t ps, pss, po, pos, us, uss, uo, uos, otmp; in ctl_be_block_open_dev() local 2449 pss = ps / cbe_lun->blocksize; in ctl_be_block_open_dev() 2451 if ((pss > 0) && (pss * cbe_lun->blocksize == ps) && (pss >= pos) && in ctl_be_block_open_dev() 2452 ((pss & (pss - 1)) == 0) && (pos * cbe_lun->blocksize == po)) { in ctl_be_block_open_dev() [all …]
|
/freebsd/sys/kern/ |
H A D | kern_proc.c | 1858 struct freebsd32_ps_strings pss; in get_proc_vector32() local 1867 if (proc_readmem(td, p, PROC_PS_STRINGS(p), &pss, sizeof(pss)) != in get_proc_vector32() 1868 sizeof(pss)) in get_proc_vector32() 1872 vptr = (vm_offset_t)PTRIN(pss.ps_argvstr); in get_proc_vector32() 1873 vsize = pss.ps_nargvstr; in get_proc_vector32() 1879 vptr = (vm_offset_t)PTRIN(pss.ps_envstr); in get_proc_vector32() 1880 vsize = pss.ps_nenvstr; in get_proc_vector32() 1886 vptr = (vm_offset_t)PTRIN(pss.ps_envstr) + in get_proc_vector32() 1887 (pss.ps_nenvstr + 1) * sizeof(int32_t); in get_proc_vector32() 1932 struct ps_strings pss; in get_proc_vector() local [all …]
|
/freebsd/crypto/openssl/crypto/x509/ |
H A D | x_all.c | 500 RSA_PSS_PARAMS *pss = ossl_rsa_pss_decode(&cert->sig_alg); in X509_digest_sig() local 504 if (pss == NULL in X509_digest_sig() 505 || !ossl_rsa_pss_get_param_unverified(pss, &mmd, &mgf1md, in X509_digest_sig() 509 RSA_PSS_PARAMS_free(pss); in X509_digest_sig() 513 RSA_PSS_PARAMS_free(pss); in X509_digest_sig()
|
/freebsd/sys/cam/ata/ |
H A D | ata_all.c | 585 if ((ident_data->pss & ATA_PSS_VALID_MASK) == ATA_PSS_VALID_VALUE && in ata_logical_sector_size() 586 (ident_data->pss & ATA_PSS_LSSABOVE512)) { in ata_logical_sector_size() 596 if ((ident_data->pss & ATA_PSS_VALID_MASK) == ATA_PSS_VALID_VALUE) { in ata_physical_sector_size() 597 if (ident_data->pss & ATA_PSS_MULTLS) { in ata_physical_sector_size() 599 (1 << (ident_data->pss & ATA_PSS_LSPPS))); in ata_physical_sector_size()
|
/freebsd/crypto/openssl/providers/implementations/signature/ |
H A D | rsa_sig.c | 423 const RSA_PSS_PARAMS_30 *pss = in rsa_signverify_init() local 426 if (!ossl_rsa_pss_params_30_is_unrestricted(pss)) { in rsa_signverify_init() 427 int md_nid = ossl_rsa_pss_params_30_hashalg(pss); in rsa_signverify_init() 428 int mgf1md_nid = ossl_rsa_pss_params_30_maskgenhashalg(pss); in rsa_signverify_init() 429 int min_saltlen = ossl_rsa_pss_params_30_saltlen(pss); in rsa_signverify_init()
|
/freebsd/contrib/llvm-project/lld/ELF/ |
H A D | LinkerScript.cpp | 599 PotentialSpillSection *pss = make<PotentialSpillSection>( in computeInputSections() local 602 potentialSpillLists.try_emplace(sec, PotentialSpillList{pss, pss}); in computeInputSections() 605 tail = tail->next = pss; in computeInputSections() 607 sec = pss; in computeInputSections()
|
/freebsd/crypto/openssl/doc/man1/ |
H A D | openssl-pkeyutl.pod.in | 269 for B<OAEP> mode, B<x931> for X9.31 mode and B<pss> for PSS. 282 For B<pss> mode only sign and verify are supported and the digest type must be 287 For B<pss> mode only this option specifies the salt length. Three special 317 restrictions. The padding mode can only be set to B<pss> which is the
|
/freebsd/contrib/sqlite3/ |
H A D | shell.c | 5772 static void setupSequence( SequenceSpec *pss ){ in setupSequence() argument 5774 pss->uSeqIndexMax = 0; in setupSequence() 5775 pss->isNotEOF = 0; in setupSequence() 5776 bSameSigns = (pss->iBase < 0)==(pss->iTerm < 0); in setupSequence() 5777 if( pss->iTerm < pss->iBase ){ in setupSequence() 5780 nuspan = (sqlite3_uint64)(pss->iBase - pss->iTerm); in setupSequence() 5785 nuspan += pss->iBase; in setupSequence() 5786 nuspan += -(pss->iTerm+1); in setupSequence() 5788 if( pss->iStep<0 ){ in setupSequence() 5789 pss->isNotEOF = 1; in setupSequence() [all …]
|