Searched refs:alg (Results 1 - 25 of 123) sorted by relevance

12345

/freebsd-10.1-release/crypto/openssl/crypto/asn1/
H A Dx_algor.c81 int X509_ALGOR_set0(X509_ALGOR *alg, ASN1_OBJECT *aobj, int ptype, void *pval)
83 if (!alg)
86 if (alg->parameter == NULL)
87 alg->parameter = ASN1_TYPE_new();
88 if (alg->parameter == NULL)
91 if (alg) {
92 if (alg->algorithm)
93 ASN1_OBJECT_free(alg->algorithm);
94 alg->algorithm = aobj;
99 if (alg
[all...]
H A Dp5_pbe.c77 int PKCS5_pbe_set0_algor(X509_ALGOR *algor, int alg, int iter,
115 if (X509_ALGOR_set0(algor, OBJ_nid2obj(alg), V_ASN1_SEQUENCE, pbe_str))
128 X509_ALGOR *PKCS5_pbe_set(int alg, int iter,
138 if (PKCS5_pbe_set0_algor(ret, alg, iter, salt, saltlen))
/freebsd-10.1-release/crypto/openssh/
H A Ddigest-openssl.c33 int alg; member in struct:ssh_digest_ctx
58 ssh_digest_by_alg(int alg) argument
60 if (alg < 0 || alg >= SSH_DIGEST_MAX)
62 if (digests[alg].id != alg) /* sanity */
64 return &(digests[alg]);
68 ssh_digest_bytes(int alg) argument
70 const struct ssh_digest *digest = ssh_digest_by_alg(alg);
82 ssh_digest_start(int alg) argument
149 ssh_digest_memory(int alg, const void *m, size_t mlen, u_char *d, size_t dlen) argument
163 ssh_digest_buffer(int alg, const Buffer *b, u_char *d, size_t dlen) argument
[all...]
H A Ddigest-libc.c39 int alg; member in struct:ssh_digest_ctx
119 ssh_digest_by_alg(int alg) argument
121 if (alg < 0 || alg >= SSH_DIGEST_MAX)
123 if (digests[alg].id != alg) /* sanity */
125 return &(digests[alg]);
129 ssh_digest_bytes(int alg) argument
131 const struct ssh_digest *digest = ssh_digest_by_alg(alg);
139 const struct ssh_digest *digest = ssh_digest_by_alg(ctx->alg);
145 ssh_digest_start(int alg) argument
221 ssh_digest_memory(int alg, const void *m, size_t mlen, u_char *d, size_t dlen) argument
235 ssh_digest_buffer(int alg, const Buffer *b, u_char *d, size_t dlen) argument
[all...]
H A Ddigest.h36 size_t ssh_digest_bytes(int alg);
46 int ssh_digest_memory(int alg, const void *m, size_t mlen,
50 int ssh_digest_buffer(int alg, const Buffer *b, u_char *d, size_t dlen)
54 struct ssh_digest_ctx *ssh_digest_start(int alg);
H A Dhmac.h22 size_t ssh_hmac_bytes(int alg);
25 struct ssh_hmac_ctx *ssh_hmac_start(int alg);
H A Dhmac.c28 int alg; member in struct:ssh_hmac_ctx
37 ssh_hmac_bytes(int alg) argument
39 return ssh_digest_bytes(alg);
43 ssh_hmac_start(int alg) argument
49 ret->alg = alg;
50 if ((ret->ictx = ssh_digest_start(alg)) == NULL ||
51 (ret->octx = ssh_digest_start(alg)) == NULL ||
52 (ret->digest = ssh_digest_start(alg)) == NULL)
73 else if (ssh_digest_memory(ctx->alg, ke
[all...]
/freebsd-10.1-release/crypto/openssl/crypto/engine/
H A Deng_fat.c103 static int int_def_cb(const char *alg, int len, void *arg) argument
106 if (alg == NULL)
108 if (!strncmp(alg, "ALL", len))
110 else if (!strncmp(alg, "RSA", len))
112 else if (!strncmp(alg, "DSA", len))
114 else if (!strncmp(alg, "ECDH", len))
116 else if (!strncmp(alg, "ECDSA", len))
118 else if (!strncmp(alg, "DH", len))
120 else if (!strncmp(alg, "RAND", len))
122 else if (!strncmp(alg, "CIPHER
[all...]
/freebsd-10.1-release/etc/rc.d/
H A Dsshd31 local alg=$1
32 local ALG="$(echo $alg | tr a-z A-Z)"
35 if ! checkyesno "sshd_${alg}_enable" ; then
39 case $alg in
44 keyfile="/etc/ssh/ssh_host_${alg}_key"
60 /usr/bin/ssh-keygen -q -t $alg -f "$keyfile" -N ""
/freebsd-10.1-release/sbin/md5/
H A Dmd5.c219 MDString(Algorithm_t *alg, const char *string) argument
224 alg->Data(string,len,buf);
230 printf("%s (\"%s\") = %s", alg->name, string, buf);
243 MDTimeTrial(Algorithm_t *alg) argument
254 alg->name, TEST_BLOCK_COUNT, TEST_BLOCK_LEN);
265 alg->Init(&context);
267 alg->Update(&context, block, TEST_BLOCK_LEN);
268 p = alg->End(&context, buf);
353 MDTestSuite(Algorithm_t *alg) argument
358 printf("%s test suite:\n", alg
373 MDFilter(Algorithm_t *alg, int tee) argument
390 usage(Algorithm_t *alg) argument
[all...]
/freebsd-10.1-release/crypto/openssl/crypto/pkcs7/
H A Dpk7_attr.c101 X509_ALGOR *alg; local
103 if (!(alg = X509_ALGOR_new())) {
107 ASN1_OBJECT_free(alg->algorithm);
108 alg->algorithm = OBJ_nid2obj(nid);
111 if (!(alg->parameter = ASN1_TYPE_new())) {
123 alg->parameter->value.integer = nbit;
124 alg->parameter->type = V_ASN1_INTEGER;
126 sk_X509_ALGOR_push(sk, alg);
/freebsd-10.1-release/sys/crypto/rijndael/
H A DMakefile5 SRCS= ${PROG}.c rijndael-alg-fst.c rijndael-api-fst.c
/freebsd-10.1-release/tools/tools/crypto/
H A Dcryptotest.c113 struct alg { struct
162 static struct alg*
173 static struct alg*
246 runtest(struct alg *alg, int count, int size, u_long cmd, struct timeval *tv) argument
256 if (!alg->ishash) {
257 sop.keylen = (alg->minkeylen + alg->maxkeylen)/2;
263 sop.cipher = alg->code;
265 sop.mackeylen = (alg
428 runtests(struct alg *alg, int count, int size, u_long cmd, int threads, int profile) argument
517 struct alg *alg = NULL; local
[all...]
/freebsd-10.1-release/sys/modules/geom/geom_bde/
H A DMakefile9 SRCS+= rijndael-alg-fst.c rijndael-api-fst.c sha2.c
/freebsd-10.1-release/sys/modules/wlan_ccmp/
H A DMakefile8 SRCS+= rijndael-alg-fst.c rijndael-api.c
/freebsd-10.1-release/sys/netipsec/
H A Dxform.h120 extern struct auth_hash *ah_algorithm_lookup(int alg);
124 extern struct enc_xform *esp_algorithm_lookup(int alg);
128 extern struct comp_algo *ipcomp_algorithm_lookup(int alg);
/freebsd-10.1-release/crypto/openssl/crypto/ocsp/
H A Docsp_lib.c106 X509_ALGOR *alg; local
113 alg = cid->hashAlgorithm;
114 if (alg->algorithm != NULL)
115 ASN1_OBJECT_free(alg->algorithm);
120 if (!(alg->algorithm = OBJ_nid2obj(nid)))
122 if ((alg->parameter = ASN1_TYPE_new()) == NULL)
124 alg->parameter->type = V_ASN1_NULL;
/freebsd-10.1-release/contrib/unbound/ldns/
H A Dkeyraw.h35 * \param[in] alg the cryptographic algorithm this is a key for
39 const size_t len, int alg);
/freebsd-10.1-release/contrib/wpa/src/crypto/
H A Dcrypto_internal-cipher.c18 enum crypto_cipher_alg alg; member in struct:crypto_cipher
43 struct crypto_cipher * crypto_cipher_init(enum crypto_cipher_alg alg, argument
53 ctx->alg = alg;
55 switch (alg) {
108 switch (ctx->alg) {
172 switch (ctx->alg) {
232 switch (ctx->alg) {
H A Dcrypto_internal.c18 enum crypto_hash_alg alg; member in struct:crypto_hash
31 struct crypto_hash * crypto_hash_init(enum crypto_hash_alg alg, const u8 *key, argument
43 ctx->alg = alg;
45 switch (alg) {
130 switch (ctx->alg) {
164 switch (ctx->alg) {
/freebsd-10.1-release/usr.bin/ssh-copy-id/
H A Dssh-copy-id.sh43 while read alg key comment ; do \
46 printf "$alg $key $comment\n" >> "$keyfile" ; \
/freebsd-10.1-release/crypto/openssl/crypto/pkcs12/
H A Dp12_npas.c73 static int alg_get(X509_ALGOR *alg, int *pnid, int *piter, int *psaltlen);
221 static int alg_get(X509_ALGOR *alg, int *pnid, int *piter, int *psaltlen) argument
226 p = alg->parameter->value.sequence->data;
227 pbe = d2i_PBEPARAM(NULL, &p, alg->parameter->value.sequence->length);
230 *pnid = OBJ_obj2nid(alg->algorithm);
/freebsd-10.1-release/crypto/openssl/crypto/
H A Dcrypto.h602 # define fips_md_init(alg) fips_md_init_ctx(alg, alg)
605 # define fips_md_init_ctx(alg, cx) \
606 int alg##_Init(cx##_CTX *c) \
609 "Low level API call to digest " #alg " forbidden in FIPS mode!"); \
610 return private_##alg##_Init(c); \
612 int private_##alg##_Init(cx##_CTX *c)
614 # define fips_cipher_abort(alg) \
616 "Low level API call to cipher " #alg " forbidde
[all...]
/freebsd-10.1-release/sys/net80211/
H A Dieee80211_freebsd.h402 #define IEEE80211_SCANNER_ALG(name, alg, v) \
407 ieee80211_scanner_register(alg, &v); \
409 ieee80211_scanner_unregister(alg, &v); \
416 #define IEEE80211_ACL_MODULE(name, alg, version) \
419 alg##_modevent(int type) \
422 ieee80211_aclator_register(&alg); \
424 ieee80211_aclator_unregister(&alg); \
426 TEXT_SET(acl_set, alg##_modevent); \
434 #define IEEE80211_AUTH_ALG(name, alg, v) \
439 ieee80211_authenticator_register(alg,
[all...]
/freebsd-10.1-release/contrib/ldns/
H A Dkeys.c40 { LDNS_SIGN_HMACMD5, "hmac-md5.sig-alg.reg.int" },
93 ldns_key_new_frm_engine(ldns_key **key, ENGINE *e, char *key_id, ldns_algorithm alg) argument
105 ldns_key_set_algorithm(k, (ldns_signing_algorithm) alg);
239 ldns_key_new_frm_fp_ecdsa_l(FILE* fp, ldns_algorithm alg, int* line_nr) argument
254 if(alg == LDNS_ECDSAP256SHA256)
256 else if(alg == LDNS_ECDSAP384SHA384)
295 ldns_signing_algorithm alg; local
313 alg = 0;
339 /* no alg information */
346 alg
819 ldns_key_new_frm_algorithm(ldns_signing_algorithm alg, uint16_t size) argument
[all...]

Completed in 293 milliseconds

12345