/freebsd-10.3-release/crypto/openssl/crypto/asn1/ |
H A D | x_algor.c | 81 int X509_ALGOR_set0(X509_ALGOR *alg, ASN1_OBJECT *aobj, int ptype, void *pval) 83 if (!alg) 86 if (alg->parameter == NULL) 87 alg->parameter = ASN1_TYPE_new(); 88 if (alg->parameter == NULL) 91 if (alg) { 92 if (alg->algorithm) 93 ASN1_OBJECT_free(alg->algorithm); 94 alg->algorithm = aobj; 99 if (alg [all...] |
H A D | p5_pbe.c | 77 int PKCS5_pbe_set0_algor(X509_ALGOR *algor, int alg, int iter, 115 if (X509_ALGOR_set0(algor, OBJ_nid2obj(alg), V_ASN1_SEQUENCE, pbe_str)) 128 X509_ALGOR *PKCS5_pbe_set(int alg, int iter, 138 if (PKCS5_pbe_set0_algor(ret, alg, iter, salt, saltlen))
|
/freebsd-10.3-release/crypto/openssh/ |
H A D | digest-openssl.c | 45 int alg; member in struct:ssh_digest_ctx 68 ssh_digest_by_alg(int alg) argument 70 if (alg < 0 || alg >= SSH_DIGEST_MAX) 72 if (digests[alg].id != alg) /* sanity */ 74 if (digests[alg].mdfunc == NULL) 76 return &(digests[alg]); 82 int alg; local 84 for (alg 92 ssh_digest_alg_name(int alg) argument 100 ssh_digest_bytes(int alg) argument 114 ssh_digest_start(int alg) argument 183 ssh_digest_memory(int alg, const void *m, size_t mlen, u_char *d, size_t dlen) argument 201 ssh_digest_buffer(int alg, const struct sshbuf *b, u_char *d, size_t dlen) argument [all...] |
H A D | digest-libc.c | 44 int alg; member in struct:ssh_digest_ctx 124 ssh_digest_by_alg(int alg) argument 126 if (alg < 0 || alg >= SSH_DIGEST_MAX) 128 if (digests[alg].id != alg) /* sanity */ 130 return &(digests[alg]); 136 int alg; local 138 for (alg = 0; alg < SSH_DIGEST_MA 146 ssh_digest_alg_name(int alg) argument 154 ssh_digest_bytes(int alg) argument 170 ssh_digest_start(int alg) argument 246 ssh_digest_memory(int alg, const void *m, size_t mlen, u_char *d, size_t dlen) argument 260 ssh_digest_buffer(int alg, const struct sshbuf *b, u_char *d, size_t dlen) argument [all...] |
H A D | digest.h | 40 const char *ssh_digest_alg_name(int alg); 43 size_t ssh_digest_bytes(int alg); 53 int ssh_digest_memory(int alg, const void *m, size_t mlen, 57 int ssh_digest_buffer(int alg, const struct sshbuf *b, u_char *d, size_t dlen) 61 struct ssh_digest_ctx *ssh_digest_start(int alg);
|
H A D | hmac.h | 22 size_t ssh_hmac_bytes(int alg); 26 struct ssh_hmac_ctx *ssh_hmac_start(int alg);
|
H A D | hmac.c | 28 int alg; member in struct:ssh_hmac_ctx 37 ssh_hmac_bytes(int alg) argument 39 return ssh_digest_bytes(alg); 43 ssh_hmac_start(int alg) argument 49 ret->alg = alg; 50 if ((ret->ictx = ssh_digest_start(alg)) == NULL || 51 (ret->octx = ssh_digest_start(alg)) == NULL || 52 (ret->digest = ssh_digest_start(alg)) == NULL) 73 else if (ssh_digest_memory(ctx->alg, ke [all...] |
/freebsd-10.3-release/crypto/openssl/crypto/engine/ |
H A D | eng_fat.c | 103 static int int_def_cb(const char *alg, int len, void *arg) argument 106 if (alg == NULL) 108 if (!strncmp(alg, "ALL", len)) 110 else if (!strncmp(alg, "RSA", len)) 112 else if (!strncmp(alg, "DSA", len)) 114 else if (!strncmp(alg, "ECDH", len)) 116 else if (!strncmp(alg, "ECDSA", len)) 118 else if (!strncmp(alg, "DH", len)) 120 else if (!strncmp(alg, "RAND", len)) 122 else if (!strncmp(alg, "CIPHER [all...] |
/freebsd-10.3-release/etc/rc.d/ |
H A D | sshd | 31 local alg=$1 32 local ALG="$(echo $alg | tr a-z A-Z)" 35 if ! checkyesno "sshd_${alg}_enable" ; then 39 case $alg in 44 keyfile="/etc/ssh/ssh_host_${alg}_key" 60 /usr/bin/ssh-keygen -q -t $alg -f "$keyfile" -N ""
|
/freebsd-10.3-release/sbin/md5/ |
H A D | md5.c | 219 MDString(const Algorithm_t *alg, const char *string) argument 224 alg->Data(string,len,buf); 230 printf("%s (\"%s\") = %s", alg->name, string, buf); 243 MDTimeTrial(const Algorithm_t *alg) argument 254 alg->name, TEST_BLOCK_COUNT, TEST_BLOCK_LEN); 265 alg->Init(&context); 267 alg->Update(&context, block, TEST_BLOCK_LEN); 268 p = alg->End(&context, buf); 353 MDTestSuite(const Algorithm_t *alg) argument 358 printf("%s test suite:\n", alg 373 MDFilter(const Algorithm_t *alg, int tee) argument 390 usage(const Algorithm_t *alg) argument [all...] |
/freebsd-10.3-release/crypto/openssl/crypto/pkcs7/ |
H A D | pk7_attr.c | 101 X509_ALGOR *alg; local 103 if (!(alg = X509_ALGOR_new())) { 107 ASN1_OBJECT_free(alg->algorithm); 108 alg->algorithm = OBJ_nid2obj(nid); 111 if (!(alg->parameter = ASN1_TYPE_new())) { 123 alg->parameter->value.integer = nbit; 124 alg->parameter->type = V_ASN1_INTEGER; 126 sk_X509_ALGOR_push(sk, alg);
|
/freebsd-10.3-release/sys/crypto/rijndael/ |
H A D | Makefile | 5 SRCS= ${PROG}.c rijndael-alg-fst.c rijndael-api-fst.c
|
/freebsd-10.3-release/tools/tools/crypto/ |
H A D | cryptotest.c | 113 struct alg { struct 162 static struct alg* 173 static struct alg* 246 runtest(struct alg *alg, int count, int size, u_long cmd, struct timeval *tv) argument 256 if (!alg->ishash) { 257 sop.keylen = (alg->minkeylen + alg->maxkeylen)/2; 263 sop.cipher = alg->code; 265 sop.mackeylen = (alg 428 runtests(struct alg *alg, int count, int size, u_long cmd, int threads, int profile) argument 517 struct alg *alg = NULL; local [all...] |
/freebsd-10.3-release/sys/modules/geom/geom_bde/ |
H A D | Makefile | 9 SRCS+= rijndael-alg-fst.c rijndael-api-fst.c sha2.c
|
/freebsd-10.3-release/sys/modules/wlan_ccmp/ |
H A D | Makefile | 8 SRCS+= rijndael-alg-fst.c rijndael-api.c
|
/freebsd-10.3-release/sys/netipsec/ |
H A D | xform.h | 120 extern struct auth_hash *ah_algorithm_lookup(int alg); 124 extern struct enc_xform *esp_algorithm_lookup(int alg); 128 extern struct comp_algo *ipcomp_algorithm_lookup(int alg);
|
/freebsd-10.3-release/crypto/openssl/crypto/ocsp/ |
H A D | ocsp_lib.c | 106 X509_ALGOR *alg; local 113 alg = cid->hashAlgorithm; 114 if (alg->algorithm != NULL) 115 ASN1_OBJECT_free(alg->algorithm); 120 if (!(alg->algorithm = OBJ_nid2obj(nid))) 122 if ((alg->parameter = ASN1_TYPE_new()) == NULL) 124 alg->parameter->type = V_ASN1_NULL;
|
/freebsd-10.3-release/contrib/unbound/sldns/ |
H A D | keyraw.h | 35 * \param[in] alg the cryptographic algorithm this is a key for 39 const size_t len, int alg);
|
/freebsd-10.3-release/contrib/wpa/src/crypto/ |
H A D | crypto_internal-cipher.c | 18 enum crypto_cipher_alg alg; member in struct:crypto_cipher 43 struct crypto_cipher * crypto_cipher_init(enum crypto_cipher_alg alg, argument 53 ctx->alg = alg; 55 switch (alg) { 108 switch (ctx->alg) { 172 switch (ctx->alg) { 232 switch (ctx->alg) {
|
H A D | crypto_internal.c | 18 enum crypto_hash_alg alg; member in struct:crypto_hash 31 struct crypto_hash * crypto_hash_init(enum crypto_hash_alg alg, const u8 *key, argument 43 ctx->alg = alg; 45 switch (alg) { 130 switch (ctx->alg) { 164 switch (ctx->alg) {
|
/freebsd-10.3-release/usr.bin/ssh-copy-id/ |
H A D | ssh-copy-id.sh | 43 while read alg key comment ; do \ 46 printf "$alg $key $comment\n" >> "$keyfile" ; \
|
/freebsd-10.3-release/crypto/openssl/crypto/pkcs12/ |
H A D | p12_npas.c | 73 static int alg_get(X509_ALGOR *alg, int *pnid, int *piter, int *psaltlen); 221 static int alg_get(X509_ALGOR *alg, int *pnid, int *piter, int *psaltlen) argument 226 p = alg->parameter->value.sequence->data; 227 pbe = d2i_PBEPARAM(NULL, &p, alg->parameter->value.sequence->length); 230 *pnid = OBJ_obj2nid(alg->algorithm);
|
/freebsd-10.3-release/crypto/openssl/crypto/ |
H A D | crypto.h | 602 # define fips_md_init(alg) fips_md_init_ctx(alg, alg) 605 # define fips_md_init_ctx(alg, cx) \ 606 int alg##_Init(cx##_CTX *c) \ 609 "Low level API call to digest " #alg " forbidden in FIPS mode!"); \ 610 return private_##alg##_Init(c); \ 612 int private_##alg##_Init(cx##_CTX *c) 614 # define fips_cipher_abort(alg) \ 616 "Low level API call to cipher " #alg " forbidde [all...] |
/freebsd-10.3-release/sys/net80211/ |
H A D | ieee80211_freebsd.h | 402 #define IEEE80211_SCANNER_ALG(name, alg, v) \ 407 ieee80211_scanner_register(alg, &v); \ 409 ieee80211_scanner_unregister(alg, &v); \ 416 #define IEEE80211_ACL_MODULE(name, alg, version) \ 419 alg##_modevent(int type) \ 422 ieee80211_aclator_register(&alg); \ 424 ieee80211_aclator_unregister(&alg); \ 426 TEXT_SET(acl_set, alg##_modevent); \ 434 #define IEEE80211_AUTH_ALG(name, alg, v) \ 439 ieee80211_authenticator_register(alg, [all...] |
/freebsd-10.3-release/contrib/ldns/ |
H A D | keys.c | 40 { LDNS_SIGN_HMACMD5, "hmac-md5.sig-alg.reg.int" }, 93 ldns_key_new_frm_engine(ldns_key **key, ENGINE *e, char *key_id, ldns_algorithm alg) argument 105 ldns_key_set_algorithm(k, (ldns_signing_algorithm) alg); 239 ldns_key_new_frm_fp_ecdsa_l(FILE* fp, ldns_algorithm alg, int* line_nr) argument 254 if(alg == LDNS_ECDSAP256SHA256) 256 else if(alg == LDNS_ECDSAP384SHA384) 295 ldns_signing_algorithm alg; local 313 alg = 0; 339 /* no alg information */ 346 alg 819 ldns_key_new_frm_algorithm(ldns_signing_algorithm alg, uint16_t size) argument [all...] |