/netbsd-src/crypto/external/bsd/openssl.old/dist/crypto/ocsp/ |
H A D | ocsp_ht.c | 66 OCSP_REQ_CTX *rctx = OPENSSL_zalloc(sizeof(*rctx)); in OCSP_REQ_CTX_new() local 68 if (rctx == NULL) in OCSP_REQ_CTX_new() 70 rctx->state = OHS_ERROR; in OCSP_REQ_CTX_new() 71 rctx->max_resp_len = OCSP_MAX_RESP_LENGTH; in OCSP_REQ_CTX_new() 72 rctx->mem = BIO_new(BIO_s_mem()); in OCSP_REQ_CTX_new() 73 rctx->io = io; in OCSP_REQ_CTX_new() 75 rctx->iobuflen = maxline; in OCSP_REQ_CTX_new() 77 rctx->iobuflen = OCSP_MAX_LINE_LEN; in OCSP_REQ_CTX_new() 78 rctx->iobuf = OPENSSL_malloc(rctx->iobuflen); in OCSP_REQ_CTX_new() 79 if (rctx->iobuf == NULL || rctx->mem == NULL) { in OCSP_REQ_CTX_new() [all …]
|
/netbsd-src/crypto/external/bsd/openssl/dist/crypto/http/ |
H A D | http_client.c | 92 OSSL_HTTP_REQ_CTX *rctx; in OSSL_HTTP_REQ_CTX_new() local 99 if ((rctx = OPENSSL_zalloc(sizeof(*rctx))) == NULL) in OSSL_HTTP_REQ_CTX_new() 101 rctx->state = OHS_ERROR; in OSSL_HTTP_REQ_CTX_new() 102 rctx->buf_size = buf_size > 0 ? buf_size : OSSL_HTTP_DEFAULT_MAX_LINE_LEN; in OSSL_HTTP_REQ_CTX_new() 103 rctx->buf = OPENSSL_malloc(rctx->buf_size); in OSSL_HTTP_REQ_CTX_new() 104 rctx->wbio = wbio; in OSSL_HTTP_REQ_CTX_new() 105 rctx->rbio = rbio; in OSSL_HTTP_REQ_CTX_new() 106 if (rctx->buf == NULL) { in OSSL_HTTP_REQ_CTX_new() 107 OPENSSL_free(rctx); in OSSL_HTTP_REQ_CTX_new() 110 rctx->max_resp_len = OSSL_HTTP_DEFAULT_MAX_RESP_LEN; in OSSL_HTTP_REQ_CTX_new() [all …]
|
/netbsd-src/crypto/external/bsd/openssl/dist/crypto/rsa/ |
H A D | rsa_pmeth.c | 58 #define rsa_pss_restricted(rctx) (rctx->min_saltlen != -1) argument 62 RSA_PKEY_CTX *rctx = OPENSSL_zalloc(sizeof(*rctx)); in pkey_rsa_init() local 64 if (rctx == NULL) in pkey_rsa_init() 66 rctx->nbits = 2048; in pkey_rsa_init() 67 rctx->primes = RSA_DEFAULT_PRIME_NUM; in pkey_rsa_init() 69 rctx->pad_mode = RSA_PKCS1_PSS_PADDING; in pkey_rsa_init() 71 rctx->pad_mode = RSA_PKCS1_PADDING; in pkey_rsa_init() 73 rctx->saltlen = RSA_PSS_SALTLEN_AUTO; in pkey_rsa_init() 74 rctx->min_saltlen = -1; in pkey_rsa_init() 75 ctx->data = rctx; in pkey_rsa_init() [all …]
|
/netbsd-src/crypto/external/bsd/openssl.old/dist/crypto/rsa/ |
H A D | rsa_pmeth.c | 51 #define rsa_pss_restricted(rctx) (rctx->min_saltlen != -1) argument 55 RSA_PKEY_CTX *rctx = OPENSSL_zalloc(sizeof(*rctx)); in pkey_rsa_init() local 57 if (rctx == NULL) in pkey_rsa_init() 59 rctx->nbits = 2048; in pkey_rsa_init() 60 rctx->primes = RSA_DEFAULT_PRIME_NUM; in pkey_rsa_init() 62 rctx->pad_mode = RSA_PKCS1_PSS_PADDING; in pkey_rsa_init() 64 rctx->pad_mode = RSA_PKCS1_PADDING; in pkey_rsa_init() 66 rctx->saltlen = RSA_PSS_SALTLEN_AUTO; in pkey_rsa_init() 67 rctx->min_saltlen = -1; in pkey_rsa_init() 68 ctx->data = rctx; in pkey_rsa_init() [all …]
|
/netbsd-src/external/mpl/bind/dist/lib/dns/ |
H A D | client.c | 137 client_resfind(resctx_t *rctx, dns_fetchresponse_t *event); 435 resctx_t *rctx = resp->arg; in dns_client_setservers() 437 REQUIRE(RCTX_VALID(rctx)); in dns_client_setservers() 439 client_resfind(rctx, resp); in dns_client_setservers() 443 start_fetch(resctx_t *rctx) { in dns_client_setservers() 447 REQUIRE(rctx->fetch == NULL); in dns_client_setservers() 449 if (!rctx->want_cdflag) { in dns_client_setservers() 452 if (!rctx->want_validation) { in dns_client_clearservers() 455 if (rctx->want_tcp) { in dns_client_clearservers() 460 rctx in dns_client_clearservers() 513 resctx_t *rctx = event->ev_arg; fetch_done() local 525 start_fetch(resctx_t * rctx) start_fetch() argument 555 view_find(resctx_t * rctx,dns_db_t ** dbp,dns_dbnode_t ** nodep,dns_name_t * foundname) view_find() argument 575 client_resfind(resctx_t * rctx,dns_fetchevent_t * event) client_resfind() argument 1075 resctx_t *rctx = NULL; dns_client_startresolve() local 1184 resctx_t *rctx = NULL; cancelresolve() local 1229 resctx_t *rctx = NULL; destroyrestrans() local [all...] |
H A D | resolver.c | 855 isc_region_t *region, respctx_t *rctx); 858 rctx_answer_init(respctx_t *rctx); 861 rctx_answer_scan(respctx_t *rctx); 864 rctx_authority_positive(respctx_t *rctx); 867 rctx_answer_any(respctx_t *rctx); 870 rctx_answer_match(respctx_t *rctx); 873 rctx_answer_cname(respctx_t *rctx); 876 rctx_answer_dname(respctx_t *rctx); 879 rctx_answer_positive(respctx_t *rctx); 882 rctx_authority_negative(respctx_t *rctx); 7010 respctx_t *rctx = arg; check_section() local 7635 betterreferral(respctx_t * rctx) betterreferral() argument 7673 respctx_t rctx; resquery_response() local 8082 rctx_respinit(resquery_t * query,fetchctx_t * fctx,isc_result_t result,isc_region_t * region,respctx_t * rctx) rctx_respinit() argument 8108 rctx_answer_init(respctx_t * rctx) rctx_answer_init() argument 8159 rctx_dispfail(respctx_t * rctx) rctx_dispfail() argument 8206 rctx_timedout(respctx_t * rctx) rctx_timedout() argument 8242 rctx_parse(respctx_t * rctx) rctx_parse() argument 8328 rctx_opt(respctx_t * rctx) rctx_opt() argument 8414 rctx_edns(respctx_t * rctx) rctx_edns() argument 8491 rctx_answer(respctx_t * rctx) rctx_answer() argument 8607 rctx_answer_positive(respctx_t * rctx) rctx_answer_positive() argument 8695 rctx_answer_scan(respctx_t * rctx) rctx_answer_scan() argument 8805 rctx_answer_any(respctx_t * rctx) rctx_answer_any() argument 8863 rctx_answer_match(respctx_t * rctx) rctx_answer_match() argument 8929 rctx_answer_cname(respctx_t * rctx) rctx_answer_cname() argument 8993 rctx_answer_dname(respctx_t * rctx) rctx_answer_dname() argument 9053 rctx_authority_positive(respctx_t * rctx) rctx_authority_positive() argument 9123 rctx_answer_none(respctx_t * rctx) rctx_answer_none() argument 9264 rctx_authority_negative(respctx_t * rctx) rctx_authority_negative() argument 9392 rctx_ncache(respctx_t * rctx) rctx_ncache() argument 9429 rctx_authority_dnssec(respctx_t * rctx) rctx_authority_dnssec() argument 9572 rctx_referral(respctx_t * rctx) rctx_referral() argument 9701 rctx_additional(respctx_t * rctx) rctx_additional() argument 9743 rctx_nextserver(respctx_t * rctx,dns_message_t * message,dns_adbaddrinfo_t * addrinfo,isc_result_t result) rctx_nextserver() argument 9830 rctx_resend(respctx_t * rctx,dns_adbaddrinfo_t * addrinfo) rctx_resend() argument 9850 rctx_next(respctx_t * rctx) rctx_next() argument 9868 rctx_chaseds(respctx_t * rctx,dns_message_t * message,dns_adbaddrinfo_t * addrinfo,isc_result_t result) rctx_chaseds() argument 9907 rctx_done(respctx_t * rctx,isc_result_t result) rctx_done() argument 9987 rctx_logpacket(respctx_t * rctx) rctx_logpacket() argument 10045 rctx_badserver(respctx_t * rctx,isc_result_t result) rctx_badserver() argument 10165 rctx_lameserver(respctx_t * rctx) rctx_lameserver() argument 10200 rctx_delonly_zone(respctx_t * rctx) rctx_delonly_zone() argument [all...] |
/netbsd-src/external/mpl/dhcp/bind/dist/lib/dns/ |
H A D | client.c | 265 client_resfind(resctx_t *rctx, dns_fetchevent_t *event); 671 resctx_t *rctx = event->ev_arg; in fetch_done() local 675 REQUIRE(RCTX_VALID(rctx)); in fetch_done() 676 REQUIRE(rctx->task == task); in fetch_done() 679 client_resfind(rctx, fevent); in fetch_done() 683 start_fetch(resctx_t *rctx) { in start_fetch() argument 691 REQUIRE(rctx->fetch == NULL); in start_fetch() 693 if (!rctx->want_cdflag) { in start_fetch() 696 if (!rctx->want_validation) { in start_fetch() 699 if (rctx->want_tcp) { in start_fetch() [all …]
|
H A D | resolver.c | 807 fetchctx_t *fctx, respctx_t *rctx); 810 rctx_answer_init(respctx_t *rctx); 813 rctx_answer_scan(respctx_t *rctx); 816 rctx_authority_positive(respctx_t *rctx); 819 rctx_answer_any(respctx_t *rctx); 822 rctx_answer_match(respctx_t *rctx); 825 rctx_answer_cname(respctx_t *rctx); 828 rctx_answer_dname(respctx_t *rctx); 831 rctx_answer_positive(respctx_t *rctx); 834 rctx_authority_negative(respctx_t *rctx); [all …]
|
/netbsd-src/crypto/external/bsd/openssl/dist/include/openssl/ |
H A D | http.h | 41 void OSSL_HTTP_REQ_CTX_free(OSSL_HTTP_REQ_CTX *rctx); 42 int OSSL_HTTP_REQ_CTX_set_request_line(OSSL_HTTP_REQ_CTX *rctx, int method_POST, 45 int OSSL_HTTP_REQ_CTX_add1_header(OSSL_HTTP_REQ_CTX *rctx, 47 int OSSL_HTTP_REQ_CTX_set_expected(OSSL_HTTP_REQ_CTX *rctx, 50 int OSSL_HTTP_REQ_CTX_set1_req(OSSL_HTTP_REQ_CTX *rctx, const char *content_type, 52 int OSSL_HTTP_REQ_CTX_nbio(OSSL_HTTP_REQ_CTX *rctx); 53 int OSSL_HTTP_REQ_CTX_nbio_d2i(OSSL_HTTP_REQ_CTX *rctx, 55 BIO *OSSL_HTTP_REQ_CTX_exchange(OSSL_HTTP_REQ_CTX *rctx); 56 BIO *OSSL_HTTP_REQ_CTX_get0_mem_bio(const OSSL_HTTP_REQ_CTX *rctx); 57 size_t OSSL_HTTP_REQ_CTX_get_resp_len(const OSSL_HTTP_REQ_CTX *rctx); [all …]
|
/netbsd-src/crypto/external/bsd/openssl/dist/crypto/ocsp/ |
H A D | ocsp_http.c | 18 OSSL_HTTP_REQ_CTX *rctx = OSSL_HTTP_REQ_CTX_new(io, io, buf_size); in OCSP_sendreq_new() local 20 if (rctx == NULL) in OCSP_sendreq_new() 31 if (!OSSL_HTTP_REQ_CTX_set_request_line(rctx, 1 /* POST */, in OCSP_sendreq_new() 35 if (!OSSL_HTTP_REQ_CTX_set_expected(rctx, in OCSP_sendreq_new() 40 && !OSSL_HTTP_REQ_CTX_set1_req(rctx, "application/ocsp-request", in OCSP_sendreq_new() 44 return rctx; in OCSP_sendreq_new() 47 OSSL_HTTP_REQ_CTX_free(rctx); in OCSP_sendreq_new()
|
/netbsd-src/crypto/external/bsd/openssl.old/dist/doc/man3/ |
H A D | OCSP_sendreq_new.pod | 22 int OCSP_sendreq_nbio(OCSP_RESPONSE **presp, OCSP_REQ_CTX *rctx); 24 void OCSP_REQ_CTX_free(OCSP_REQ_CTX *rctx); 26 void OCSP_set_max_response_length(OCSP_REQ_CTX *rctx, unsigned long len); 28 int OCSP_REQ_CTX_add1_header(OCSP_REQ_CTX *rctx, 31 int OCSP_REQ_CTX_set1_req(OCSP_REQ_CTX *rctx, OCSP_REQUEST *req); 35 int OCSP_REQ_CTX_i2d(OCSP_REQ_CTX *rctx, const char *content_type, 47 B<rctx>. When the operation is complete it returns the response in B<*presp>. 49 OCSP_REQ_CTX_free() frees up the OCSP context B<rctx>. 51 OCSP_set_max_response_length() sets the maximum response length for B<rctx> 56 context B<rctx>. It can be called more than once to add multiple headers. [all …]
|
/netbsd-src/crypto/external/bsd/openssl/dist/doc/man3/ |
H A D | OCSP_sendreq_new.pod | 29 int OCSP_sendreq_nbio(OCSP_RESPONSE **presp, OSSL_HTTP_REQ_CTX *rctx); 30 int OCSP_REQ_CTX_i2d(OCSP_REQ_CT *rctx, const ASN1_ITEM *it, ASN1_VALUE *req); 31 int OCSP_REQ_CTX_add1_header(OCSP_REQ_CT *rctx, 33 void OCSP_REQ_CTX_free(OCSP_REQ_CTX *rctx); 34 void OCSP_set_max_response_length(OCSP_REQ_CT *rctx, unsigned long len); 35 int OCSP_REQ_CTX_set1_req(OCSP_REQ_CTX *rctx, const OCSP_REQUEST *req); 54 OCSP_sendreq_nbio() attempts to send the request prepared in I<rctx> 69 OCSP_REQ_CTX_i2d(rctx, it, req) is equivalent to the following: 71 OSSL_HTTP_REQ_CTX_set1_req(rctx, "application/ocsp-request", it, req) 73 OCSP_REQ_CTX_set1_req(rctx, req) is equivalent to the following: [all …]
|
H A D | OSSL_HTTP_transfer.pod | 29 int OSSL_HTTP_set1_request(OSSL_HTTP_REQ_CTX *rctx, const char *path, 34 BIO *OSSL_HTTP_exchange(OSSL_HTTP_REQ_CTX *rctx, char **redirection_url); 51 int OSSL_HTTP_close(OSSL_HTTP_REQ_CTX *rctx, int ok); 162 OSSL_HTTP_set1_request() sets up in I<rctx> the request header and content data 164 If <rctx> indicates using a proxy for HTTP (but not HTTPS), the server host 166 in I<rctx>. 195 as specified by I<rctx>, which must include both connection and request data, 239 OSSL_HTTP_close() closes the connection and releases I<rctx>.
|
/netbsd-src/crypto/external/bsd/openssl/dist/providers/implementations/ciphers/ |
H A D | cipher_rc4_hw.c | 21 PROV_RC4_CTX *rctx = (PROV_RC4_CTX *)ctx; in cipher_hw_rc4_initkey() local 23 RC4_set_key(&rctx->ks.ks, keylen, key); in cipher_hw_rc4_initkey() 30 PROV_RC4_CTX *rctx = (PROV_RC4_CTX *)ctx; in cipher_hw_rc4_cipher() local 32 RC4(&rctx->ks.ks, len, in, out); in cipher_hw_rc4_cipher()
|
H A D | cipher_rc5_hw.c | 21 PROV_RC5_CTX *rctx = (PROV_RC5_CTX *)ctx; in cipher_hw_rc5_initkey() local 23 return RC5_32_set_key(&rctx->ks.ks, keylen, key, rctx->rounds); in cipher_hw_rc5_initkey()
|
H A D | cipher_rc2_hw.c | 21 PROV_RC2_CTX *rctx = (PROV_RC2_CTX *)ctx; in cipher_hw_rc2_initkey() local 22 RC2_KEY *ks = &(rctx->ks.ks); in cipher_hw_rc2_initkey() 24 RC2_set_key(ks, (int)ctx->keylen, key, (int)rctx->key_bits); in cipher_hw_rc2_initkey()
|
/netbsd-src/crypto/external/bsd/openssl/dist/doc/man7/ |
H A D | EVP_RAND-SEED-SRC.pod | 42 EVP_RAND_CTX *rctx = EVP_RAND_CTX_new(rand); 47 EVP_RAND_CTX *seed, *rctx; 60 rctx = EVP_RAND_CTX_new(rand, seed); 67 EVP_RAND_instantiate(rctx, strength, 0, NULL, 0, params); 69 EVP_RAND_generate(rctx, bytes, sizeof(bytes), strength, 0, NULL, 0); 71 EVP_RAND_CTX_free(rctx);
|
H A D | EVP_RAND-HASH-DRBG.pod | 60 EVP_RAND_CTX *rctx = EVP_RAND_CTX_new(rand); 65 EVP_RAND_CTX *rctx; 71 rctx = EVP_RAND_CTX_new(rand, NULL); 76 EVP_RAND_instantiate(rctx, strength, 0, NULL, 0, params); 78 EVP_RAND_generate(rctx, bytes, sizeof(bytes), strength, 0, NULL, 0); 80 EVP_RAND_CTX_free(rctx);
|
H A D | EVP_RAND-HMAC-DRBG.pod | 62 EVP_RAND_CTX *rctx = EVP_RAND_CTX_new(rand); 67 EVP_RAND_CTX *rctx; 73 rctx = EVP_RAND_CTX_new(rand, NULL); 79 EVP_RAND_instantiate(rctx, strength, 0, NULL, 0, params); 81 EVP_RAND_generate(rctx, bytes, sizeof(bytes), strength, 0, NULL, 0); 83 EVP_RAND_CTX_free(rctx);
|
H A D | EVP_RAND-CTR-DRBG.pod | 66 EVP_RAND_CTX *rctx = EVP_RAND_CTX_new(rand); 71 EVP_RAND_CTX *rctx; 77 rctx = EVP_RAND_CTX_new(rand, NULL); 83 EVP_RAND_instantiate(rctx, strength, 0, NULL, 0, params); 85 EVP_RAND_generate(rctx, bytes, sizeof(bytes), strength, 0, NULL, 0); 87 EVP_RAND_CTX_free(rctx);
|
H A D | EVP_RAND-TEST-RAND.pod | 70 EVP_RAND_CTX *rctx = EVP_RAND_CTX_new(rand); 75 EVP_RAND_CTX *rctx; 83 rctx = EVP_RAND_CTX_new(rand, NULL); 92 EVP_RAND_instantiate(rctx, strength, 0, NULL, 0, params); 94 EVP_RAND_generate(rctx, bytes, sizeof(bytes), strength, 0, NULL, 0); 96 EVP_RAND_CTX_free(rctx);
|
/netbsd-src/crypto/external/bsd/openssl.old/dist/include/openssl/ |
H A D | ocsp.h | 154 int OCSP_REQ_CTX_nbio(OCSP_REQ_CTX *rctx); 155 int OCSP_sendreq_nbio(OCSP_RESPONSE **presp, OCSP_REQ_CTX *rctx); 157 void OCSP_REQ_CTX_free(OCSP_REQ_CTX *rctx); 158 void OCSP_set_max_response_length(OCSP_REQ_CTX *rctx, unsigned long len); 159 int OCSP_REQ_CTX_i2d(OCSP_REQ_CTX *rctx, const ASN1_ITEM *it, 161 int OCSP_REQ_CTX_nbio_d2i(OCSP_REQ_CTX *rctx, ASN1_VALUE **pval, 163 BIO *OCSP_REQ_CTX_get0_mem_bio(OCSP_REQ_CTX *rctx); 164 int OCSP_REQ_CTX_http(OCSP_REQ_CTX *rctx, const char *op, const char *path); 165 int OCSP_REQ_CTX_set1_req(OCSP_REQ_CTX *rctx, OCSP_REQUEST *req); 166 int OCSP_REQ_CTX_add1_header(OCSP_REQ_CTX *rctx,
|
/netbsd-src/crypto/external/bsd/openssl.old/dist/crypto/evp/ |
H A D | pmeth_lib.c | 255 EVP_PKEY_CTX *rctx; in EVP_PKEY_CTX_dup() local 265 rctx = OPENSSL_malloc(sizeof(*rctx)); in EVP_PKEY_CTX_dup() 266 if (rctx == NULL) { in EVP_PKEY_CTX_dup() 271 rctx->pmeth = pctx->pmeth; in EVP_PKEY_CTX_dup() 273 rctx->engine = pctx->engine; in EVP_PKEY_CTX_dup() 279 rctx->pkey = pctx->pkey; in EVP_PKEY_CTX_dup() 284 rctx->peerkey = pctx->peerkey; in EVP_PKEY_CTX_dup() 286 rctx->data = NULL; in EVP_PKEY_CTX_dup() 287 rctx->app_data = NULL; in EVP_PKEY_CTX_dup() 288 rctx->operation = pctx->operation; in EVP_PKEY_CTX_dup() [all …]
|
/netbsd-src/crypto/external/bsd/openssl/dist/test/ |
H A D | http_test.c | 164 OSSL_HTTP_REQ_CTX *rctx = NULL; in test_http_keep_alive() local 176 rsp = OSSL_HTTP_transfer(&rctx, NULL /* server */, NULL /* port */, in test_http_keep_alive() 187 && TEST_int_eq(OSSL_HTTP_is_alive(rctx), 0); in test_http_keep_alive() 190 && TEST_int_eq(OSSL_HTTP_is_alive(rctx), keep_alive > 0); in test_http_keep_alive() 195 OSSL_HTTP_close(rctx, res); in test_http_keep_alive()
|
H A D | evp_libctx_test.c | 527 EVP_PKEY_CTX *sctx = NULL, *rctx = NULL, *dctx = NULL; in kem_rsa_gen_recover() local 545 && TEST_ptr(rctx = EVP_PKEY_CTX_new_from_pkey(libctx, priv, NULL)) in kem_rsa_gen_recover() 546 && TEST_int_eq(EVP_PKEY_decapsulate_init(rctx, NULL), 1) in kem_rsa_gen_recover() 547 && TEST_int_eq(EVP_PKEY_CTX_set_kem_op(rctx, "RSASVE"), 1) in kem_rsa_gen_recover() 548 && TEST_int_eq(EVP_PKEY_decapsulate(rctx, NULL, &unwraplen, in kem_rsa_gen_recover() 550 && TEST_int_eq(EVP_PKEY_decapsulate(rctx, unwrap, &unwraplen, in kem_rsa_gen_recover() 555 EVP_PKEY_CTX_free(rctx); in kem_rsa_gen_recover()
|