| /freebsd/crypto/openssl/crypto/http/ |
| H A D | http_client.c | 100 OSSL_HTTP_REQ_CTX *rctx; in OSSL_HTTP_REQ_CTX_new() local 107 if ((rctx = OPENSSL_zalloc(sizeof(*rctx))) == NULL) in OSSL_HTTP_REQ_CTX_new() 109 rctx->state = OHS_ERROR; in OSSL_HTTP_REQ_CTX_new() 110 rctx->buf_size = buf_size > 0 ? buf_size : OSSL_HTTP_DEFAULT_MAX_LINE_LEN; in OSSL_HTTP_REQ_CTX_new() 111 rctx->buf = OPENSSL_malloc(rctx->buf_size); in OSSL_HTTP_REQ_CTX_new() 112 rctx->wbio = wbio; in OSSL_HTTP_REQ_CTX_new() 113 rctx->rbio = rbio; in OSSL_HTTP_REQ_CTX_new() 114 rctx->max_hdr_lines = OSSL_HTTP_DEFAULT_MAX_RESP_HDR_LINES; in OSSL_HTTP_REQ_CTX_new() 115 if (rctx->buf == NULL) { in OSSL_HTTP_REQ_CTX_new() 116 OPENSSL_free(rctx); in OSSL_HTTP_REQ_CTX_new() [all …]
|
| /freebsd/crypto/openssl/crypto/rsa/ |
| H A D | rsa_pmeth.c | 60 #define rsa_pss_restricted(rctx) (rctx->min_saltlen != -1) argument 64 RSA_PKEY_CTX *rctx = OPENSSL_zalloc(sizeof(*rctx)); in pkey_rsa_init() local 66 if (rctx == NULL) in pkey_rsa_init() 68 rctx->nbits = 2048; in pkey_rsa_init() 69 rctx->primes = RSA_DEFAULT_PRIME_NUM; in pkey_rsa_init() 71 rctx->pad_mode = RSA_PKCS1_PSS_PADDING; in pkey_rsa_init() 73 rctx->pad_mode = RSA_PKCS1_PADDING; in pkey_rsa_init() 75 rctx->saltlen = RSA_PSS_SALTLEN_AUTO; in pkey_rsa_init() 76 rctx->min_saltlen = -1; in pkey_rsa_init() 77 rctx->implicit_rejection = 1; in pkey_rsa_init() [all …]
|
| /freebsd/crypto/openssl/include/openssl/ |
| H A D | http.h | 49 void OSSL_HTTP_REQ_CTX_free(OSSL_HTTP_REQ_CTX *rctx); 50 int OSSL_HTTP_REQ_CTX_set_request_line(OSSL_HTTP_REQ_CTX *rctx, int method_POST, 53 int OSSL_HTTP_REQ_CTX_add1_header(OSSL_HTTP_REQ_CTX *rctx, 55 int OSSL_HTTP_REQ_CTX_set_expected(OSSL_HTTP_REQ_CTX *rctx, 58 int OSSL_HTTP_REQ_CTX_set1_req(OSSL_HTTP_REQ_CTX *rctx, const char *content_type, 60 int OSSL_HTTP_REQ_CTX_nbio(OSSL_HTTP_REQ_CTX *rctx); 61 int OSSL_HTTP_REQ_CTX_nbio_d2i(OSSL_HTTP_REQ_CTX *rctx, 63 BIO *OSSL_HTTP_REQ_CTX_exchange(OSSL_HTTP_REQ_CTX *rctx); 64 BIO *OSSL_HTTP_REQ_CTX_get0_mem_bio(const OSSL_HTTP_REQ_CTX *rctx); 65 size_t OSSL_HTTP_REQ_CTX_get_resp_len(const OSSL_HTTP_REQ_CTX *rctx); [all …]
|
| /freebsd/crypto/openssl/crypto/ocsp/ |
| H A D | ocsp_http.c | 18 OSSL_HTTP_REQ_CTX *rctx = OSSL_HTTP_REQ_CTX_new(io, io, buf_size); in OCSP_sendreq_new() local 20 if (rctx == NULL) in OCSP_sendreq_new() 31 if (!OSSL_HTTP_REQ_CTX_set_request_line(rctx, 1 /* POST */, in OCSP_sendreq_new() 35 if (!OSSL_HTTP_REQ_CTX_set_expected(rctx, in OCSP_sendreq_new() 40 && !OSSL_HTTP_REQ_CTX_set1_req(rctx, "application/ocsp-request", in OCSP_sendreq_new() 44 return rctx; in OCSP_sendreq_new() 47 OSSL_HTTP_REQ_CTX_free(rctx); in OCSP_sendreq_new()
|
| /freebsd/crypto/openssl/test/ |
| H A D | hpke_test.c | 1020 OSSL_HPKE_CTX *rctx = NULL; in test_hpke_modes_suites() local 1136 rctx = OSSL_HPKE_CTX_new(hpke_mode, hpke_suite, in test_hpke_modes_suites() 1139 if (!TEST_ptr(rctx)) in test_hpke_modes_suites() 1143 if (!TEST_true(OSSL_HPKE_CTX_set1_psk(rctx, pskidp, in test_hpke_modes_suites() 1152 if (!TEST_false(OSSL_HPKE_CTX_set1_authpub(rctx, in test_hpke_modes_suites() 1157 if (!TEST_true(OSSL_HPKE_CTX_set1_authpub(rctx, in test_hpke_modes_suites() 1162 if (!TEST_true(OSSL_HPKE_decap(rctx, senderpub, in test_hpke_modes_suites() 1168 if (!TEST_false(OSSL_HPKE_open(rctx, clear, &clearlen, in test_hpke_modes_suites() 1174 if (!TEST_true(OSSL_HPKE_open(rctx, clear, &clearlen, in test_hpke_modes_suites() 1178 OSSL_HPKE_CTX_free(rctx); in test_hpke_modes_suites() [all …]
|
| H A D | http_test.c | 249 OSSL_HTTP_REQ_CTX *rctx = NULL; in test_http_keep_alive() local 262 rsp = OSSL_HTTP_transfer(&rctx, NULL /* server */, NULL /* port */, in test_http_keep_alive() 273 && TEST_int_eq(OSSL_HTTP_is_alive(rctx), 0); in test_http_keep_alive() 276 && TEST_int_eq(OSSL_HTTP_is_alive(rctx), keep_alive > 0); in test_http_keep_alive() 281 OSSL_HTTP_close(rctx, res); in test_http_keep_alive() 522 OSSL_HTTP_REQ_CTX *rctx = NULL; in test_http_resp_hdr_limit() local 535 rctx = OSSL_HTTP_REQ_CTX_new(wbio, rbio, 8192); in test_http_resp_hdr_limit() 536 if (TEST_ptr(rctx) == 0) in test_http_resp_hdr_limit() 539 if (!TEST_true(OSSL_HTTP_REQ_CTX_set_request_line(rctx, 0 /* GET */, in test_http_resp_hdr_limit() 543 OSSL_HTTP_REQ_CTX_set_max_response_hdr_lines(rctx, limit); in test_http_resp_hdr_limit() [all …]
|
| H A D | evp_pkey_dhkem_test.c | 34 static EVP_PKEY_CTX *rctx[TEST_KEYTYPES_P256_X25519] = { NULL, NULL }; variable 90 EVP_PKEY_CTX *ctx = rctx[tstid]; in test_settables() 107 EVP_PKEY_CTX *ctx = rctx[tstid]; in test_init_multiple() 170 EVP_PKEY_CTX *ctx = rctx[tstid]; in test_no_operation_set() 192 EVP_PKEY_CTX *ctx = rctx[tstid]; in test_ikm_small() 215 EVP_PKEY_CTX *ctx = rctx[tstid]; in test_input_size_small() 257 ret = TEST_int_eq(EVP_PKEY_auth_encapsulate_init(rctx[0], auth, opparam), 0); in test_ec_auth_key_curve_mismatch() 268 return TEST_int_eq(EVP_PKEY_auth_encapsulate_init(rctx[id1], in test_auth_key_type_mismatch() 304 EVP_PKEY_CTX *ctx = rctx[0]; in test_ec_public_key_infinity() 331 EVP_PKEY_CTX *ctx = rctx[tstid]; in test_null_params() [all …]
|
| H A D | evp_libctx_test.c | 717 EVP_PKEY_CTX *sctx = NULL, *rctx = NULL, *dctx = NULL; in kem_rsa_gen_recover() local 745 && TEST_ptr(rctx = EVP_PKEY_CTX_new_from_pkey(libctx, priv, NULL)) in kem_rsa_gen_recover() 746 && TEST_int_eq(EVP_PKEY_decapsulate_init(rctx, NULL), 1) in kem_rsa_gen_recover() 747 && TEST_int_eq(EVP_PKEY_CTX_set_kem_op(rctx, "RSASVE"), 1) in kem_rsa_gen_recover() 749 && TEST_int_eq(EVP_PKEY_decapsulate(rctx, NULL, NULL, ct, ctlen), 0) in kem_rsa_gen_recover() 750 && TEST_int_eq(EVP_PKEY_decapsulate(rctx, NULL, &unwraplen, in kem_rsa_gen_recover() 753 && TEST_int_eq(EVP_PKEY_decapsulate(rctx, unwrap, &unwraplen, in kem_rsa_gen_recover() 766 if (!TEST_int_eq(EVP_PKEY_decapsulate(rctx, unwrap, &unwraplen, ct, in kem_rsa_gen_recover() 774 EVP_PKEY_CTX_free(rctx); in kem_rsa_gen_recover()
|
| /freebsd/crypto/openssl/doc/man3/ |
| H A D | OCSP_sendreq_new.pod | 29 int OCSP_sendreq_nbio(OCSP_RESPONSE **presp, OSSL_HTTP_REQ_CTX *rctx); 30 int OCSP_REQ_CTX_i2d(OCSP_REQ_CT *rctx, const ASN1_ITEM *it, ASN1_VALUE *req); 31 int OCSP_REQ_CTX_add1_header(OCSP_REQ_CT *rctx, 33 void OCSP_REQ_CTX_free(OCSP_REQ_CTX *rctx); 34 void OCSP_set_max_response_length(OCSP_REQ_CT *rctx, unsigned long len); 35 int OCSP_REQ_CTX_set1_req(OCSP_REQ_CTX *rctx, const OCSP_REQUEST *req); 54 OCSP_sendreq_nbio() attempts to send the request prepared in I<rctx> 69 OCSP_REQ_CTX_i2d(rctx, it, req) is equivalent to the following: 71 OSSL_HTTP_REQ_CTX_set1_req(rctx, "application/ocsp-request", it, req) 73 OCSP_REQ_CTX_set1_req(rctx, req) is equivalent to the following: [all …]
|
| H A D | OSSL_HTTP_REQ_CTX.pod | 29 void OSSL_HTTP_REQ_CTX_free(OSSL_HTTP_REQ_CTX *rctx); 31 int OSSL_HTTP_REQ_CTX_set_request_line(OSSL_HTTP_REQ_CTX *rctx, int method_POST, 34 int OSSL_HTTP_REQ_CTX_add1_header(OSSL_HTTP_REQ_CTX *rctx, 37 int OSSL_HTTP_REQ_CTX_set_expected(OSSL_HTTP_REQ_CTX *rctx, 40 int OSSL_HTTP_REQ_CTX_set1_req(OSSL_HTTP_REQ_CTX *rctx, const char *content_type, 42 int OSSL_HTTP_REQ_CTX_nbio(OSSL_HTTP_REQ_CTX *rctx); 43 int OSSL_HTTP_REQ_CTX_nbio_d2i(OSSL_HTTP_REQ_CTX *rctx, 45 BIO *OSSL_HTTP_REQ_CTX_exchange(OSSL_HTTP_REQ_CTX *rctx); 47 BIO *OSSL_HTTP_REQ_CTX_get0_mem_bio(const OSSL_HTTP_REQ_CTX *rctx); 48 size_t OSSL_HTTP_REQ_CTX_get_resp_len(const OSSL_HTTP_REQ_CTX *rctx); [all …]
|
| /freebsd/crypto/openssl/crypto/evp/ |
| H A D | pmeth_lib.c | 454 EVP_PKEY_CTX *rctx; in EVP_PKEY_CTX_dup() local 463 rctx = OPENSSL_zalloc(sizeof(*rctx)); in EVP_PKEY_CTX_dup() 464 if (rctx == NULL) in EVP_PKEY_CTX_dup() 470 rctx->pkey = pctx->pkey; in EVP_PKEY_CTX_dup() 471 rctx->operation = pctx->operation; in EVP_PKEY_CTX_dup() 472 rctx->libctx = pctx->libctx; in EVP_PKEY_CTX_dup() 473 rctx->keytype = pctx->keytype; in EVP_PKEY_CTX_dup() 474 rctx->propquery = NULL; in EVP_PKEY_CTX_dup() 476 rctx->propquery = OPENSSL_strdup(pctx->propquery); in EVP_PKEY_CTX_dup() 477 if (rctx->propquery == NULL) in EVP_PKEY_CTX_dup() [all …]
|
| /freebsd/crypto/openssl/providers/implementations/ciphers/ |
| H A D | cipher_rc4_hw.c | 21 PROV_RC4_CTX *rctx = (PROV_RC4_CTX *)ctx; in cipher_hw_rc4_initkey() local 23 RC4_set_key(&rctx->ks.ks, keylen, key); in cipher_hw_rc4_initkey() 30 PROV_RC4_CTX *rctx = (PROV_RC4_CTX *)ctx; in cipher_hw_rc4_cipher() local 32 RC4(&rctx->ks.ks, len, in, out); in cipher_hw_rc4_cipher()
|
| H A D | cipher_rc5_hw.c | 21 PROV_RC5_CTX *rctx = (PROV_RC5_CTX *)ctx; in cipher_hw_rc5_initkey() local 23 return RC5_32_set_key(&rctx->ks.ks, keylen, key, rctx->rounds); in cipher_hw_rc5_initkey()
|
| H A D | cipher_rc2_hw.c | 21 PROV_RC2_CTX *rctx = (PROV_RC2_CTX *)ctx; in cipher_hw_rc2_initkey() local 22 RC2_KEY *ks = &(rctx->ks.ks); in cipher_hw_rc2_initkey() 24 RC2_set_key(ks, (int)ctx->keylen, key, (int)rctx->key_bits); in cipher_hw_rc2_initkey()
|
| /freebsd/crypto/krb5/src/lib/krb5/krb/ |
| H A D | preauth_pkinit.c | 79 krb5_responder_context rctx, in krb5_responder_pkinit_get_challenge() argument 90 challenge = krb5_responder_get_challenge(ctx, rctx, in krb5_responder_pkinit_get_challenge() 126 krb5_responder_pkinit_challenge_free(ctx, rctx, chl); in krb5_responder_pkinit_get_challenge() 131 krb5_responder_pkinit_set_answer(krb5_context ctx, krb5_responder_context rctx, in krb5_responder_pkinit_set_answer() argument 141 old_answer = k5_response_items_get_answer(rctx->items, in krb5_responder_pkinit_set_answer() 179 ret = krb5_responder_set_answer(ctx, rctx, KRB5_RESPONDER_QUESTION_PKINIT, in krb5_responder_pkinit_set_answer() 191 krb5_responder_context rctx, in krb5_responder_pkinit_challenge_free() argument
|
| H A D | preauth2.c | 451 ctx->rctx.items); in get_as_key() 487 return k5_response_items_ask_question(ctx->rctx.items, question, in responder_ask_question() 500 return k5_response_items_get_answer(ctx->rctx.items, question); in responder_get_answer() 510 NULL, NULL, ctx->gak_data, ctx->rctx.items); in need_as_key() 599 krb5_responder_list_questions(krb5_context ctx, krb5_responder_context rctx) in krb5_responder_list_questions() argument 601 return k5_response_items_list_questions(rctx->items); in krb5_responder_list_questions() 605 krb5_responder_get_challenge(krb5_context ctx, krb5_responder_context rctx, in krb5_responder_get_challenge() argument 608 if (rctx == NULL) in krb5_responder_get_challenge() 611 return k5_response_items_get_challenge(rctx->items, question); in krb5_responder_get_challenge() 615 krb5_responder_set_answer(krb5_context ctx, krb5_responder_context rctx, in krb5_responder_set_answer() argument [all …]
|
| /freebsd/crypto/openssl/doc/man7/ |
| H A D | EVP_RAND-SEED-SRC.pod | 42 EVP_RAND_CTX *rctx = EVP_RAND_CTX_new(rand, NULL); 47 EVP_RAND_CTX *seed, *rctx; 60 rctx = EVP_RAND_CTX_new(rand, seed); 67 EVP_RAND_instantiate(rctx, strength, 0, NULL, 0, params); 69 EVP_RAND_generate(rctx, bytes, sizeof(bytes), strength, 0, NULL, 0); 71 EVP_RAND_CTX_free(rctx);
|
| H A D | EVP_RAND-CTR-DRBG.pod | 66 EVP_RAND_CTX *rctx = EVP_RAND_CTX_new(rand, NULL); 77 EVP_RAND_CTX *rctx; 83 rctx = EVP_RAND_CTX_new(rand, NULL); 89 EVP_RAND_instantiate(rctx, strength, 0, NULL, 0, params); 91 EVP_RAND_generate(rctx, bytes, sizeof(bytes), strength, 0, NULL, 0); 93 EVP_RAND_CTX_free(rctx);
|
| H A D | EVP_RAND-JITTER.pod | 45 EVP_RAND_CTX *rctx = EVP_RAND_CTX_new(rand, NULL); 61 EVP_RAND_CTX *seed, *rctx; 74 rctx = EVP_RAND_CTX_new(rand, seed); 81 EVP_RAND_instantiate(rctx, strength, 0, NULL, 0, params); 83 EVP_RAND_generate(rctx, bytes, sizeof(bytes), strength, 0, NULL, 0); 85 EVP_RAND_CTX_free(rctx);
|
| H A D | EVP_RAND-TEST-RAND.pod | 79 EVP_RAND_CTX *rctx = EVP_RAND_CTX_new(rand, NULL); 84 EVP_RAND_CTX *rctx; 92 rctx = EVP_RAND_CTX_new(rand, NULL); 101 EVP_RAND_instantiate(rctx, strength, 0, NULL, 0, params); 103 EVP_RAND_generate(rctx, bytes, sizeof(bytes), strength, 0, NULL, 0); 105 EVP_RAND_CTX_free(rctx);
|
| H A D | EVP_RAND-HMAC-DRBG.pod | 91 EVP_RAND_CTX *rctx = EVP_RAND_CTX_new(rand, NULL); 96 EVP_RAND_CTX *rctx; 102 rctx = EVP_RAND_CTX_new(rand, NULL); 108 EVP_RAND_instantiate(rctx, strength, 0, NULL, 0, params); 110 EVP_RAND_generate(rctx, bytes, sizeof(bytes), strength, 0, NULL, 0); 112 EVP_RAND_CTX_free(rctx);
|
| H A D | EVP_RAND-HASH-DRBG.pod | 90 EVP_RAND_CTX *rctx = EVP_RAND_CTX_new(rand, NULL); 95 EVP_RAND_CTX *rctx; 101 rctx = EVP_RAND_CTX_new(rand, NULL); 106 EVP_RAND_instantiate(rctx, strength, 0, NULL, 0, params); 108 EVP_RAND_generate(rctx, bytes, sizeof(bytes), strength, 0, NULL, 0); 110 EVP_RAND_CTX_free(rctx);
|
| /freebsd/sys/dev/ixl/ |
| H A D | ixl_pf_iflib.c | 568 struct i40e_hmc_obj_rxq rctx; in ixl_initialize_vsi() local 576 memset(&rctx, 0, sizeof(struct i40e_hmc_obj_rxq)); in ixl_initialize_vsi() 577 rctx.dbuff = rxr->mbuf_sz >> I40E_RXQ_CTX_DBUFF_SHIFT; in ixl_initialize_vsi() 579 rctx.hbuff = 0 >> I40E_RXQ_CTX_HBUFF_SHIFT; in ixl_initialize_vsi() 580 rctx.rxmax = (scctx->isc_max_frame_size < max_rxmax) ? in ixl_initialize_vsi() 582 rctx.dtype = 0; in ixl_initialize_vsi() 583 rctx.dsize = 1; /* do 32byte descriptors */ in ixl_initialize_vsi() 584 rctx.hsplit_0 = 0; /* no header split */ in ixl_initialize_vsi() 585 rctx.base = (rxr->rx_paddr/IXL_RX_CTX_BASE_UNITS); in ixl_initialize_vsi() 586 rctx.qlen = scctx->isc_nrxd[0]; in ixl_initialize_vsi() [all …]
|
| /freebsd/contrib/llvm-project/lldb/source/Plugins/Process/Utility/ |
| H A D | HistoryUnwind.cpp | 42 RegisterContextSP rctx; in DoCreateRegisterContextForFrame() local 47 rctx = std::make_shared<RegisterContextHistory>( in DoCreateRegisterContextForFrame() 52 return rctx; in DoCreateRegisterContextForFrame()
|
| H A D | HistoryThread.cpp | 51 RegisterContextSP rctx; in GetRegisterContext() local 53 rctx = std::make_shared<RegisterContextHistory>( in GetRegisterContext() 56 return rctx; in GetRegisterContext()
|