/freebsd-9.3-release/contrib/wpa/wpa_supplicant/ |
H A D | ibss_rsn.c | 103 static int supp_set_key(void *ctx, enum wpa_alg alg, argument 110 wpa_printf(MSG_DEBUG, "SUPP: %s(alg=%d addr=" MACSTR " key_idx=%d " 112 __func__, alg, MAC2STR(addr), key_idx, set_tx); 128 return wpa_drv_set_key(peer->ibss_rsn->wpa_s, alg, addr, key_idx, 241 static int auth_set_key(void *ctx, int vlan_id, enum wpa_alg alg, argument 250 wpa_printf(MSG_DEBUG, "AUTH: %s(alg=%d addr=" MACSTR 252 __func__, alg, MAC2STR(addr), idx); 254 wpa_printf(MSG_DEBUG, "AUTH: %s(alg=%d key_idx=%d)", 255 __func__, alg, idx); 271 return wpa_drv_set_key(ibss_rsn->wpa_s, alg, add [all...] |
/freebsd-9.3-release/crypto/openssl/fips/ |
H A D | fipsalgtest.pl | 564 --enable-<alg> Enable algorithm set <alg>. 565 --disable-<alg> Disable algorithm set <alg>. 566 Where <alg> can be one of:
|
/freebsd-9.3-release/contrib/wpa/src/crypto/ |
H A D | crypto_libtomcrypt.c | 150 enum crypto_hash_alg alg; member in struct:crypto_hash 159 struct crypto_hash * crypto_hash_init(enum crypto_hash_alg alg, const u8 *key, argument 168 ctx->alg = alg; 170 switch (alg) { 205 switch (ctx->alg) { 238 switch (ctx->alg) { 303 struct crypto_cipher * crypto_cipher_init(enum crypto_cipher_alg alg, argument 310 switch (alg) {
|
H A D | crypto.h | 165 * @alg: Hash algorithm 175 struct crypto_hash * crypto_hash_init(enum crypto_hash_alg alg, const u8 *key, 219 * @alg: Cipher algorithm 230 struct crypto_cipher * crypto_cipher_init(enum crypto_cipher_alg alg,
|
/freebsd-9.3-release/crypto/openssl/crypto/cms/ |
H A D | cms_sd.c | 282 X509_ALGOR *alg; local 332 alg = sk_X509_ALGOR_value(sd->digestAlgorithms, i); 333 X509_ALGOR_get0(&aoid, NULL, NULL, alg); 339 alg = X509_ALGOR_new(); 340 if (!alg) 342 cms_DigestAlgorithm_set(alg, md); 343 if (!sk_X509_ALGOR_push(sd->digestAlgorithms, alg)) { 344 X509_ALGOR_free(alg); 880 X509_ALGOR *alg; local 887 alg [all...] |
/freebsd-9.3-release/secure/usr.bin/bdes/ |
H A D | bdes.c | 130 } alg = ALG_CBC; variable in typeref:enum:__anon5506 188 alg = ALG_ECB; 194 alg = ALG_CFBA; 201 alg = ALG_CFB; 217 alg = ALG_OFB; 249 inverse = (alg == ALG_CBC || alg == ALG_ECB) && mode == MODE_DECRYPT; 251 switch(alg) {
|
/freebsd-9.3-release/sys/netipsec/ |
H A D | key_debug.c | 273 struct sadb_alg *alg; local 281 / sizeof(*alg); 282 alg = (struct sadb_alg *)(sup + 1); 286 alg->sadb_alg_id, alg->sadb_alg_ivlen, 287 alg->sadb_alg_minbits, alg->sadb_alg_maxbits); 288 alg++;
|
H A D | xform_ah.c | 134 ah_algorithm_lookup(int alg) argument 136 if (alg > SADB_AALG_MAX) 138 switch (alg) { 271 ah_massage_headers(struct mbuf **m0, int proto, int skip, int alg, int out) argument 315 if (alg == CRYPTO_MD5_KPDK || alg == CRYPTO_SHA1_KPDK) 320 if (alg == CRYPTO_MD5_KPDK || alg == CRYPTO_SHA1_KPDK)
|
/freebsd-9.3-release/crypto/openssl/fips/hmac/ |
H A D | fips_hmac_selftest.c | 57 const EVP_MD *(*alg) (void); member in struct:__anon145 123 md = (*t->alg) ();
|
/freebsd-9.3-release/contrib/bind9/lib/dns/rdata/generic/ |
H A D | dnskey_48.c | 37 dns_secalg_t alg; local 64 RETTOK(dns_secalg_fromtext(&alg, &token.value.as_textregion)); 65 RETERR(mem_tobuffer(target, &alg, 1)); 76 if (alg == DST_ALG_RSAMD5 && isc_buffer_usedlength(target) < 7) 160 RETERR(str_totext("; alg = ", target));
|
H A D | key_25.c | 37 dns_secalg_t alg; local 64 RETTOK(dns_secalg_fromtext(&alg, &token.value.as_textregion)); 65 RETERR(mem_tobuffer(target, &alg, 1)); 76 if (alg == DST_ALG_RSAMD5 && isc_buffer_usedlength(target) < 7) 154 RETERR(str_totext("; alg = ", target));
|
H A D | keydata_65533.c | 30 dns_secalg_t alg; local 76 RETTOK(dns_secalg_fromtext(&alg, &token.value.as_textregion)); 77 RETERR(mem_tobuffer(target, &alg, 1)); 88 if (alg == DST_ALG_RSAMD5 && isc_buffer_usedlength(target) < 19) 184 RETERR(str_totext("; alg = ", target));
|
H A D | tkey_249.c | 413 dns_name_t alg; local 429 dns_name_init(&alg, NULL); 430 dns_name_fromregion(&alg, &sr); 432 RETERR(name_duporclone(&alg, mctx, &tkey->algorithm));
|
/freebsd-9.3-release/contrib/bind9/lib/export/samples/ |
H A D | sample.c | 110 dns_secalg_t alg; local 121 result = dns_secalg_fromtext(&alg, &tr); 127 alg = DNS_KEYALG_RSASHA1; 135 keystruct.algorithm = alg;
|
/freebsd-9.3-release/sys/opencrypto/ |
H A D | crypto.c | 615 printf("crypto: %s registers key alg %u flags %u\n" 633 crypto_register(u_int32_t driverid, int alg, u_int16_t maxoplen, argument 644 (CRYPTO_ALGORITHM_MIN <= alg && alg <= CRYPTO_ALGORITHM_MAX)) { 651 cap->cc_alg[alg] = flags | CRYPTO_ALG_FLAG_SUPPORTED; 652 cap->cc_max_op_len[alg] = maxoplen; 654 printf("crypto: %s registers alg %u flags %u maxoplen %u\n" 656 , alg 697 crypto_unregister(u_int32_t driverid, int alg) argument 705 (CRYPTO_ALGORITHM_MIN <= alg [all...] |
H A D | cryptodev.h | 391 extern int crypto_register(u_int32_t driverid, int alg, u_int16_t maxoplen, 394 extern int crypto_unregister(u_int32_t driverid, int alg);
|
/freebsd-9.3-release/contrib/wpa/src/rsn_supp/ |
H A D | wpa_ft.c | 501 enum wpa_alg alg; local 508 alg = WPA_ALG_CCMP; 512 alg = WPA_ALG_TKIP; 521 if (wpa_sm_set_key(sm, alg, bssid, 0, 1, null_rsc, 730 enum wpa_alg alg; local 758 alg = WPA_ALG_CCMP; 763 alg = WPA_ALG_TKIP; 768 alg = WPA_ALG_WEP; 773 alg = WPA_ALG_WEP; 798 if (wpa_sm_set_key(sm, alg, (u [all...] |
H A D | wpa.c | 498 enum wpa_alg alg; local 506 alg = WPA_ALG_CCMP; 511 alg = WPA_ALG_TKIP; 532 if (wpa_sm_set_key(sm, alg, sm->bssid, 0, 1, key_rsc, rsclen, 535 "driver (alg=%d keylen=%d bssid=" MACSTR ")", 536 alg, keylen, MAC2STR(sm->bssid)); 553 enum wpa_alg *alg) 564 *alg = WPA_ALG_CCMP; 572 *alg = WPA_ALG_TKIP; 580 *alg 550 wpa_supplicant_check_group_cipher(int group_cipher, int keylen, int maxkeylen, int *key_rsc_len, enum wpa_alg *alg) argument 607 enum wpa_alg alg; member in struct:wpa_gtk_data [all...] |
H A D | wpa_i.h | 142 static inline int wpa_sm_set_key(struct wpa_sm *sm, enum wpa_alg alg, argument 148 return sm->ctx->set_key(sm->ctx->ctx, alg, addr, key_idx, set_tx,
|
/freebsd-9.3-release/crypto/openssl/ssl/ |
H A D | ssl_ciph.c | 1108 unsigned long alg, alg2; local 1117 alg = cipher->algorithms; 1125 if (alg & SSL_SSLV2) 1127 else if (alg & SSL_SSLV3) 1132 switch (alg & SSL_MKEY_MASK) { 1160 switch (alg & SSL_AUTH_MASK) { 1186 switch (alg & SSL_ENC_MASK) { 1247 switch (alg & SSL_MAC_MASK) { 1269 exp_str, alg);
|
H A D | s3_lib.c | 2301 unsigned long alg, mask, emask; local 2346 printf("ssl3_choose_cipher %d alg= %lx\n", i, c->algorithms); 2349 alg = c->algorithms & (SSL_MKEY_MASK | SSL_AUTH_MASK); 2351 if (alg & SSL_KRB5) { 2357 ok = ((alg & emask) == alg) ? 1 : 0; 2359 printf("%d:[%08lX:%08lX]%p:%s (export)\n", ok, alg, emask, 2363 ok = ((alg & mask) == alg) ? 1 : 0; 2365 printf("%d:[%08lX:%08lX]%p:%s\n", ok, alg, mas 2391 unsigned long alg; local [all...] |
/freebsd-9.3-release/crypto/heimdal/lib/hx509/ |
H A D | crypto.c | 195 const AlgorithmIdentifier *alg, 316 const AlgorithmIdentifier *alg, 327 if (alg) 328 sig_oid = &alg->algorithm; 577 const AlgorithmIdentifier *alg, 686 const AlgorithmIdentifier *alg, 716 const AlgorithmIdentifier *alg, 752 const AlgorithmIdentifier *alg, 782 const AlgorithmIdentifier *alg, 818 const AlgorithmIdentifier *alg, 192 rsa_verify_signature(hx509_context context, const struct signature_alg *sig_alg, const Certificate *signer, const AlgorithmIdentifier *alg, const heim_octet_string *data, const heim_octet_string *sig) argument 313 rsa_create_signature(hx509_context context, const struct signature_alg *sig_alg, const hx509_private_key signer, const AlgorithmIdentifier *alg, const heim_octet_string *data, AlgorithmIdentifier *signatureAlgorithm, heim_octet_string *sig) argument 574 dsa_verify_signature(hx509_context context, const struct signature_alg *sig_alg, const Certificate *signer, const AlgorithmIdentifier *alg, const heim_octet_string *data, const heim_octet_string *sig) argument 683 sha1_verify_signature(hx509_context context, const struct signature_alg *sig_alg, const Certificate *signer, const AlgorithmIdentifier *alg, const heim_octet_string *data, const heim_octet_string *sig) argument 713 sha256_create_signature(hx509_context context, const struct signature_alg *sig_alg, const hx509_private_key signer, const AlgorithmIdentifier *alg, const heim_octet_string *data, AlgorithmIdentifier *signatureAlgorithm, heim_octet_string *sig) argument 749 sha256_verify_signature(hx509_context context, const struct signature_alg *sig_alg, const Certificate *signer, const AlgorithmIdentifier *alg, const heim_octet_string *data, const heim_octet_string *sig) argument 779 sha1_create_signature(hx509_context context, const struct signature_alg *sig_alg, const hx509_private_key signer, const AlgorithmIdentifier *alg, const heim_octet_string *data, AlgorithmIdentifier *signatureAlgorithm, heim_octet_string *sig) argument 815 md5_verify_signature(hx509_context context, const struct signature_alg *sig_alg, const Certificate *signer, const AlgorithmIdentifier *alg, const heim_octet_string *data, const heim_octet_string *sig) argument 845 md2_verify_signature(hx509_context context, const struct signature_alg *sig_alg, const Certificate *signer, const AlgorithmIdentifier *alg, const heim_octet_string *data, const heim_octet_string *sig) argument 1047 _hx509_verify_signature(hx509_context context, const Certificate *signer, const AlgorithmIdentifier *alg, const heim_octet_string *data, const heim_octet_string *sig) argument 1081 _hx509_verify_signature_bitstring(hx509_context context, const Certificate *signer, const AlgorithmIdentifier *alg, const heim_octet_string *data, const heim_bit_string *sig) argument 1102 _hx509_create_signature(hx509_context context, const hx509_private_key signer, const AlgorithmIdentifier *alg, const heim_octet_string *data, AlgorithmIdentifier *signatureAlgorithm, heim_octet_string *sig) argument 1136 _hx509_create_signature_bitstring(hx509_context context, const hx509_private_key signer, const AlgorithmIdentifier *alg, const heim_octet_string *data, AlgorithmIdentifier *signatureAlgorithm, heim_bit_string *sig) argument [all...] |
/freebsd-9.3-release/contrib/bind9/lib/dns/include/dns/ |
H A D | resolver.h | 474 unsigned int alg); 487 unsigned int alg);
|
/freebsd-9.3-release/usr.sbin/wpa/hostapd/ |
H A D | driver_freebsd.c | 206 bsd_set_key(const char *ifname, void *priv, enum wpa_alg alg, argument 212 wpa_printf(MSG_DEBUG, "%s: alg=%d addr=%p key_idx=%d set_tx=%d " 213 "seq_len=%zu key_len=%zu", __func__, alg, addr, key_idx, 216 if (alg == WPA_ALG_NONE) { 221 switch (alg) { 232 wpa_printf(MSG_ERROR, "%s: unknown alg=%d", __func__, alg);
|
/freebsd-9.3-release/contrib/bind9/bin/dnssec/ |
H A D | dnssec-settime.c | 89 fprintf(stderr, " K<name>+<alg>+<new id>.key, " 90 "K<name>+<alg>+<new id>.private\n"); 137 dns_secalg_t alg = 0; local 377 alg = dst_key_alg(prevkey); 473 if (alg != dst_key_alg(key))
|