static XKEY_KEYDATA *
keydata_new()
{
- xkey_dmsg(D_LOW, "entry");
+ xkey_dmsg(D_XKEY, "entry");
XKEY_KEYDATA *key = OPENSSL_zalloc(sizeof(*key));
if (!key)
static void
keydata_free(XKEY_KEYDATA *key)
{
- xkey_dmsg(D_LOW, "entry");
+ xkey_dmsg(D_XKEY, "entry");
if (!key || key->refcount-- > 0) /* free when refcount goes to zero */
{
static void *
keymgmt_new(void *provctx)
{
- xkey_dmsg(D_LOW, "entry");
+ xkey_dmsg(D_XKEY, "entry");
XKEY_KEYDATA *key = keydata_new();
if (key)
static void *
keymgmt_load(const void *reference, size_t reference_sz)
{
- xkey_dmsg(D_LOW, "entry");
+ xkey_dmsg(D_XKEY, "entry");
return NULL;
}
static int
keymgmt_import(void *keydata, int selection, const OSSL_PARAM params[], const char *name)
{
- xkey_dmsg(D_LOW, "entry");
+ xkey_dmsg(D_XKEY, "entry");
XKEY_KEYDATA *key = keydata;
ASSERT(key);
if (p && p->data_type == OSSL_PARAM_UTF8_STRING)
{
key->origin = EXTERNAL_KEY;
- xkey_dmsg(D_LOW, "importing external key");
+ xkey_dmsg(D_XKEY, "importing external key");
return keymgmt_import_helper(key, params);
}
- xkey_dmsg(D_LOW, "importing native key");
+ xkey_dmsg(D_XKEY, "importing native key");
/* create a native public key and assign it to key->pubkey */
EVP_PKEY *pkey = NULL;
}
EVP_PKEY_CTX_free(ctx);
- xkey_dmsg(D_LOW, "imported native %s key", EVP_PKEY_get0_type_name(pkey));
+ xkey_dmsg(D_XKEY, "imported native %s key", EVP_PKEY_get0_type_name(pkey));
return 1;
}
static int
rsa_keymgmt_import(void *keydata, int selection, const OSSL_PARAM params[])
{
- xkey_dmsg(D_LOW, "entry");
+ xkey_dmsg(D_XKEY, "entry");
return keymgmt_import(keydata, selection, params, "RSA");
}
static int
ec_keymgmt_import(void *keydata, int selection, const OSSL_PARAM params[])
{
- xkey_dmsg(D_LOW, "entry");
+ xkey_dmsg(D_XKEY, "entry");
return keymgmt_import(keydata, selection, params, "EC");
}
static const OSSL_PARAM *
keymgmt_import_types(int selection)
{
- xkey_dmsg(D_LOW, "entry");
+ xkey_dmsg(D_XKEY, "entry");
static const OSSL_PARAM key_types[] = { OSSL_PARAM_END };
static void
keymgmt_free(void *keydata)
{
- xkey_dmsg(D_LOW, "entry");
+ xkey_dmsg(D_XKEY, "entry");
keydata_free(keydata);
}
static int
keymgmt_has(const void *keydata, int selection)
{
- xkey_dmsg(D_LOW, "selection = %d", selection);
+ xkey_dmsg(D_XKEY, "selection = %d", selection);
const XKEY_KEYDATA *key = keydata;
int ok = (key != NULL);
const XKEY_KEYDATA *key1 = keydata1;
const XKEY_KEYDATA *key2 = keydata2;
- xkey_dmsg(D_LOW, "entry");
+ xkey_dmsg(D_XKEY, "entry");
int ret = key1 && key2 && key1->pubkey && key2->pubkey;
if (selection & OSSL_KEYMGMT_SELECT_KEYPAIR)
{
ret = ret && EVP_PKEY_eq(key1->pubkey, key2->pubkey);
- xkey_dmsg(D_LOW, "checking key pair match: res = %d", ret);
+ xkey_dmsg(D_XKEY, "checking key pair match: res = %d", ret);
}
if (selection & OSSL_KEYMGMT_SELECT_DOMAIN_PARAMETERS)
{
ret = ret && EVP_PKEY_parameters_eq(key1->pubkey, key2->pubkey);
- xkey_dmsg(D_LOW, "checking parameter match: res = %d", ret);
+ xkey_dmsg(D_XKEY, "checking parameter match: res = %d", ret);
}
return ret;
static const OSSL_PARAM *
keymgmt_gettable_params(void *provctx)
{
- xkey_dmsg(D_LOW, "entry");
+ xkey_dmsg(D_XKEY, "entry");
static OSSL_PARAM gettable[] = {
OSSL_PARAM_int(OSSL_PKEY_PARAM_BITS, NULL),
static int
keymgmt_get_params(void *keydata, OSSL_PARAM *params)
{
- xkey_dmsg(D_LOW, "entry");
+ xkey_dmsg(D_XKEY, "entry");
XKEY_KEYDATA *key = keydata;
if (!key || !key->pubkey)
static int
keymgmt_import_helper(XKEY_KEYDATA *key, const OSSL_PARAM *params)
{
- xkey_dmsg(D_LOW, "entry");
+ xkey_dmsg(D_XKEY, "entry");
const OSSL_PARAM *p;
EVP_PKEY *pkey = NULL;
{
key->free = *(void **)p->data;
}
- xkey_dmsg(D_LOW, "imported external %s key", EVP_PKEY_get0_type_name(key->pubkey));
+ xkey_dmsg(D_XKEY, "imported external %s key", EVP_PKEY_get0_type_name(key->pubkey));
return 1;
}
XKEY_KEYDATA *key = keydata;
ASSERT(key);
- xkey_dmsg(D_LOW, "entry");
+ xkey_dmsg(D_XKEY, "entry");
if (key->origin != OPENSSL_NATIVE)
{
static const char *
rsa_keymgmt_name(int id)
{
- xkey_dmsg(D_LOW, "entry");
+ xkey_dmsg(D_XKEY, "entry");
return "RSA";
}
static const char *
ec_keymgmt_name(int id)
{
- xkey_dmsg(D_LOW, "entry");
+ xkey_dmsg(D_XKEY, "entry");
if (id == OSSL_OP_SIGNATURE)
{
return "ECDH";
}
- msg(D_LOW, "xkey ec_keymgmt_name called with op_id != SIGNATURE or KEYEXCH id=%d", id);
+ msg(D_XKEY, "xkey ec_keymgmt_name called with op_id != SIGNATURE or KEYEXCH id=%d", id);
return "EC";
}
static void *
signature_newctx(void *provctx, const char *propq)
{
- xkey_dmsg(D_LOW, "entry");
+ xkey_dmsg(D_XKEY, "entry");
(void) propq; /* unused */
static void
signature_freectx(void *ctx)
{
- xkey_dmsg(D_LOW, "entry");
+ xkey_dmsg(D_XKEY, "entry");
XKEY_SIGNATURE_CTX *sctx = ctx;
static const OSSL_PARAM *
signature_settable_ctx_params(void *ctx, void *provctx)
{
- xkey_dmsg(D_LOW, "entry");
+ xkey_dmsg(D_XKEY, "entry");
static OSSL_PARAM settable[] = {
OSSL_PARAM_utf8_string(OSSL_SIGNATURE_PARAM_PAD_MODE, NULL, 0),
static int
signature_set_ctx_params(void *ctx, const OSSL_PARAM params[])
{
- xkey_dmsg(D_LOW, "entry");
+ xkey_dmsg(D_XKEY, "entry");
XKEY_SIGNATURE_CTX *sctx = ctx;
const OSSL_PARAM *p;
(char *)p->data);
sctx->sigalg.padmode = "none";
}
- xkey_dmsg(D_LOW, "setting padmode as %s", sctx->sigalg.padmode);
+ xkey_dmsg(D_XKEY, "setting padmode as %s", sctx->sigalg.padmode);
}
else if (p && p->data_type == OSSL_PARAM_INTEGER)
{
msg(M_WARN, "xkey signature_ctx: padmode <%d>, treating as <none>", padmode);
sctx->sigalg.padmode = "none";
}
- xkey_dmsg(D_LOW, "setting padmode <%s>", sctx->sigalg.padmode);
+ xkey_dmsg(D_XKEY, "setting padmode <%s>", sctx->sigalg.padmode);
}
else if (p)
{
if (p && p->data_type == OSSL_PARAM_UTF8_STRING)
{
sctx->sigalg.mdname = xkey_mdname(p->data);
- xkey_dmsg(D_LOW, "setting hashalg as %s", sctx->sigalg.mdname);
+ xkey_dmsg(D_XKEY, "setting hashalg as %s", sctx->sigalg.mdname);
}
else if (p)
{
(char *)p->data);
sctx->sigalg.saltlen = "digest"; /* most common */
}
- xkey_dmsg(D_LOW, "setting saltlen to %s", sctx->sigalg.saltlen);
+ xkey_dmsg(D_XKEY, "setting saltlen to %s", sctx->sigalg.saltlen);
}
else if (p)
{
static const OSSL_PARAM *
signature_gettable_ctx_params(void *ctx, void *provctx)
{
- xkey_dmsg(D_LOW,"entry");
+ xkey_dmsg(D_XKEY,"entry");
static OSSL_PARAM gettable[] = { OSSL_PARAM_END }; /* Empty list */
static int
signature_get_ctx_params(void *ctx, OSSL_PARAM params[])
{
- xkey_dmsg(D_LOW, "not implemented");
+ xkey_dmsg(D_XKEY, "not implemented");
return 0;
}
static int
signature_sign_init(void *ctx, void *provkey, const OSSL_PARAM params[])
{
- xkey_dmsg(D_LOW, "entry");
+ xkey_dmsg(D_XKEY, "entry");
XKEY_SIGNATURE_CTX *sctx = ctx;
else if (sign)
{
ret = sign(sctx->keydata->handle, sig, siglen, tbs, tbslen, sctx->sigalg);
- xkey_dmsg(D_LOW, "xkey_provider: external sign op returned ret = %d siglen = %d", ret, (int) *siglen);
+ xkey_dmsg(D_XKEY, "xkey_provider: external sign op returned ret = %d siglen = %d", ret, (int) *siglen);
}
else
{
signature_sign(void *ctx, unsigned char *sig, size_t *siglen, size_t sigsize,
const unsigned char *tbs, size_t tbslen)
{
- xkey_dmsg(D_LOW, "entry with siglen = %zu\n", *siglen);
+ xkey_dmsg(D_XKEY, "entry with siglen = %zu\n", *siglen);
XKEY_SIGNATURE_CTX *sctx = ctx;
ASSERT(sctx);
signature_digest_verify_init(void *ctx, const char *mdname, void *provkey,
const OSSL_PARAM params[])
{
- xkey_dmsg(D_LOW, "mdname <%s>", mdname);
+ xkey_dmsg(D_XKEY, "mdname <%s>", mdname);
msg(M_WARN, "xkey_provider: DigestVerifyInit is not implemented");
return 0;
signature_digest_verify(void *ctx, const unsigned char *sig, size_t siglen,
const unsigned char *tbs, size_t tbslen)
{
- xkey_dmsg(D_LOW, "entry");
+ xkey_dmsg(D_XKEY, "entry");
msg(M_WARN, "xkey_provider: DigestVerify is not implemented");
return 0;
signature_digest_sign_init(void *ctx, const char *mdname,
void *provkey, const OSSL_PARAM params[])
{
- xkey_dmsg(D_LOW, "mdname = <%s>", mdname);
+ xkey_dmsg(D_XKEY, "mdname = <%s>", mdname);
XKEY_SIGNATURE_CTX *sctx = ctx;
signature_digest_sign(void *ctx, unsigned char *sig, size_t *siglen,
size_t sigsize, const unsigned char *tbs, size_t tbslen)
{
- xkey_dmsg(D_LOW, "entry");
+ xkey_dmsg(D_XKEY, "entry");
XKEY_SIGNATURE_CTX *sctx = ctx;
xkey_native_sign(XKEY_KEYDATA *key, unsigned char *sig, size_t *siglen,
const unsigned char *tbs, size_t tbslen, XKEY_SIGALG sigalg)
{
- xkey_dmsg(D_LOW, "entry");
+ xkey_dmsg(D_XKEY, "entry");
ASSERT(key);
const char *mdname = sigalg.mdname;
const char *padmode = sigalg.padmode;
- xkey_dmsg(D_LOW, "digest=<%s>, padmode=<%s>, saltlen=<%s>", mdname, padmode, saltlen);
+ xkey_dmsg(D_XKEY, "digest=<%s>, padmode=<%s>, saltlen=<%s>", mdname, padmode, saltlen);
int i = 0;
OSSL_PARAM params[6];
static const OSSL_ALGORITHM *
query_operation(void *provctx, int op, int *no_store)
{
- xkey_dmsg(D_LOW, "op = %d", op);
+ xkey_dmsg(D_XKEY, "op = %d", op);
*no_store = 0;
return keymgmts;
default:
- xkey_dmsg(D_LOW, "op not supported");
+ xkey_dmsg(D_XKEY, "op not supported");
break;
}
return NULL;
static const OSSL_PARAM *
gettable_params(void *provctx)
{
- xkey_dmsg(D_LOW, "entry");
+ xkey_dmsg(D_XKEY, "entry");
static const OSSL_PARAM param_types[] = {
OSSL_PARAM_DEFN(OSSL_PROV_PARAM_NAME, OSSL_PARAM_UTF8_PTR, NULL, 0),
{
OSSL_PARAM *p;
- xkey_dmsg(D_LOW, "entry");
+ xkey_dmsg(D_XKEY, "entry");
p = OSSL_PARAM_locate(params, OSSL_PROV_PARAM_NAME);
if (p)
static void
teardown(void *provctx)
{
- xkey_dmsg(D_LOW, "entry");
+ xkey_dmsg(D_XKEY, "entry");
XKEY_PROVIDER_CTX *prov = provctx;
if (prov && prov->libctx)
{
XKEY_PROVIDER_CTX *prov;
- xkey_dmsg(D_LOW, "entry");
+ xkey_dmsg(D_XKEY, "entry");
prov = OPENSSL_zalloc(sizeof(*prov));
if (!prov)