/freebsd-11-stable/crypto/openssl/crypto/asn1/ |
H A D | x_algor.c | 81 int X509_ALGOR_set0(X509_ALGOR *alg, ASN1_OBJECT *aobj, int ptype, void *pval) 83 if (!alg) 86 if (alg->parameter == NULL) 87 alg->parameter = ASN1_TYPE_new(); 88 if (alg->parameter == NULL) 91 if (alg) { 92 if (alg->algorithm) 93 ASN1_OBJECT_free(alg->algorithm); 94 alg->algorithm = aobj; 99 if (alg [all...] |
H A D | p5_pbe.c | 77 int PKCS5_pbe_set0_algor(X509_ALGOR *algor, int alg, int iter, 115 if (X509_ALGOR_set0(algor, OBJ_nid2obj(alg), V_ASN1_SEQUENCE, pbe_str)) 128 X509_ALGOR *PKCS5_pbe_set(int alg, int iter, 138 if (PKCS5_pbe_set0_algor(ret, alg, iter, salt, saltlen))
|
/freebsd-11-stable/crypto/openssh/ |
H A D | digest-openssl.c | 45 int alg; member in struct:ssh_digest_ctx 68 ssh_digest_by_alg(int alg) argument 70 if (alg < 0 || alg >= SSH_DIGEST_MAX) 72 if (digests[alg].id != alg) /* sanity */ 74 if (digests[alg].mdfunc == NULL) 76 return &(digests[alg]); 82 int alg; local 84 for (alg 92 ssh_digest_alg_name(int alg) argument 100 ssh_digest_bytes(int alg) argument 114 ssh_digest_start(int alg) argument 183 ssh_digest_memory(int alg, const void *m, size_t mlen, u_char *d, size_t dlen) argument 201 ssh_digest_buffer(int alg, const struct sshbuf *b, u_char *d, size_t dlen) argument [all...] |
H A D | digest-libc.c | 44 int alg; member in struct:ssh_digest_ctx 124 ssh_digest_by_alg(int alg) argument 126 if (alg < 0 || alg >= SSH_DIGEST_MAX) 128 if (digests[alg].id != alg) /* sanity */ 130 return &(digests[alg]); 136 int alg; local 138 for (alg = 0; alg < SSH_DIGEST_MA 146 ssh_digest_alg_name(int alg) argument 154 ssh_digest_bytes(int alg) argument 170 ssh_digest_start(int alg) argument 246 ssh_digest_memory(int alg, const void *m, size_t mlen, u_char *d, size_t dlen) argument 260 ssh_digest_buffer(int alg, const struct sshbuf *b, u_char *d, size_t dlen) argument [all...] |
H A D | digest.h | 40 const char *ssh_digest_alg_name(int alg); 43 size_t ssh_digest_bytes(int alg); 53 int ssh_digest_memory(int alg, const void *m, size_t mlen, 57 int ssh_digest_buffer(int alg, const struct sshbuf *b, u_char *d, size_t dlen) 61 struct ssh_digest_ctx *ssh_digest_start(int alg);
|
H A D | hmac.h | 22 size_t ssh_hmac_bytes(int alg); 26 struct ssh_hmac_ctx *ssh_hmac_start(int alg);
|
H A D | hmac.c | 28 int alg; member in struct:ssh_hmac_ctx 37 ssh_hmac_bytes(int alg) argument 39 return ssh_digest_bytes(alg); 43 ssh_hmac_start(int alg) argument 49 ret->alg = alg; 50 if ((ret->ictx = ssh_digest_start(alg)) == NULL || 51 (ret->octx = ssh_digest_start(alg)) == NULL || 52 (ret->digest = ssh_digest_start(alg)) == NULL) 73 else if (ssh_digest_memory(ctx->alg, ke [all...] |
/freebsd-11-stable/crypto/openssl/crypto/engine/ |
H A D | eng_fat.c | 103 static int int_def_cb(const char *alg, int len, void *arg) argument 106 if (alg == NULL) 108 if (!strncmp(alg, "ALL", len)) 110 else if (!strncmp(alg, "RSA", len)) 112 else if (!strncmp(alg, "DSA", len)) 114 else if (!strncmp(alg, "ECDH", len)) 116 else if (!strncmp(alg, "ECDSA", len)) 118 else if (!strncmp(alg, "DH", len)) 120 else if (!strncmp(alg, "RAND", len)) 122 else if (!strncmp(alg, "CIPHER [all...] |
/freebsd-11-stable/contrib/blacklist/etc/ |
H A D | npf.conf | 6 alg "icmp"
|
/freebsd-11-stable/tools/tools/crypto/ |
H A D | cryptocheck.c | 127 struct alg { struct 182 static struct alg * 193 static struct alg * 194 build_authenc(struct alg *cipher, struct alg *hmac) 196 static struct alg authenc; 212 static struct alg * 215 struct alg *cipher, *hmac; 312 generate_iv(size_t len, struct alg *alg) argument 344 ocf_hmac(struct alg *alg, const char *buffer, size_t size, const char *key, size_t key_len, char *digest, int *cridp) argument 389 run_hmac_test(struct alg *alg, size_t size) argument 440 openssl_cipher(struct alg *alg, const EVP_CIPHER *cipher, const char *key, const char *iv, const char *input, char *output, size_t size, int enc) argument 471 ocf_cipher(struct alg *alg, const char *key, size_t key_len, const char *iv, const char *input, char *output, size_t size, int enc, int *cridp) argument 517 run_blkcipher_test(struct alg *alg, size_t size) argument 597 ocf_authenc(struct alg *alg, const char *cipher_key, size_t cipher_key_len, const char *iv, size_t iv_len, const char *auth_key, size_t auth_key_len, const char *aad, size_t aad_len, const char *input, char *output, size_t size, char *digest, int enc, int *cridp) argument 673 run_authenc_test(struct alg *alg, size_t size) argument 793 openssl_gcm_encrypt(struct alg *alg, const EVP_CIPHER *cipher, const char *key, const char *iv, const char *aad, size_t aad_len, const char *input, char *output, size_t size, char *tag) argument 836 ocf_gcm(struct alg *alg, const char *key, size_t key_len, const char *iv, size_t iv_len, const char *aad, size_t aad_len, const char *input, char *output, size_t size, char *tag, int enc, int *cridp) argument 889 openssl_gcm_decrypt(struct alg *alg, const EVP_CIPHER *cipher, const char *key, const char *iv, const char *aad, size_t aad_len, const char *input, char *output, size_t size, char *tag) argument 933 run_gcm_test(struct alg *alg, size_t size) argument 1019 run_test(struct alg *alg, size_t size) argument 1039 run_test_sizes(struct alg *alg, size_t *sizes, u_int nsizes) argument 1102 struct alg *alg; local [all...] |
H A D | cryptotest.c | 115 struct alg { struct 164 struct alg* 175 struct alg* 251 runtest(struct alg *alg, int count, int size, u_long cmd, struct timeval *tv) argument 261 if (!alg->ishash) { 262 sop.keylen = (alg->minkeylen + alg->maxkeylen)/2; 269 sop.cipher = alg->code; 271 sop.mackeylen = (alg 435 runtests(struct alg *alg, int count, int size, u_long cmd, int threads, int profile) argument 522 struct alg *alg = NULL; local [all...] |
/freebsd-11-stable/etc/rc.d/ |
H A D | sshd | 32 local alg=$1 33 local ALG="$(echo $alg | tr a-z A-Z)" 36 if ! checkyesno "sshd_${alg}_enable" ; then 40 case $alg in 45 keyfile="/etc/ssh/ssh_host_${alg}_key" 61 /usr/bin/ssh-keygen -q -t $alg -f "$keyfile" -N ""
|
/freebsd-11-stable/crypto/openssl/crypto/pkcs7/ |
H A D | pk7_attr.c | 101 X509_ALGOR *alg; local 103 if (!(alg = X509_ALGOR_new())) { 107 ASN1_OBJECT_free(alg->algorithm); 108 alg->algorithm = OBJ_nid2obj(nid); 111 if (!(alg->parameter = ASN1_TYPE_new())) { 123 alg->parameter->value.integer = nbit; 124 alg->parameter->type = V_ASN1_INTEGER; 126 sk_X509_ALGOR_push(sk, alg);
|
/freebsd-11-stable/sys/crypto/rijndael/ |
H A D | Makefile | 5 SRCS= ${PROG}.c rijndael-alg-fst.c rijndael-api-fst.c
|
/freebsd-11-stable/sys/dev/random/ |
H A D | build.sh | 44 ../../crypto/rijndael/rijndael-alg-fst.c \ 54 ../../crypto/rijndael/rijndael-alg-fst.c \
|
/freebsd-11-stable/sys/modules/wlan_ccmp/ |
H A D | Makefile | 8 SRCS+= rijndael-alg-fst.c rijndael-api.c
|
/freebsd-11-stable/sbin/md5/ |
H A D | md5.c | 246 MDString(const Algorithm_t *alg, const char *string) argument 251 alg->Data(string,len,buf); 257 printf("%s (\"%s\") = %s", alg->name, string, buf); 270 MDTimeTrial(const Algorithm_t *alg) argument 281 alg->name, TEST_BLOCK_COUNT, TEST_BLOCK_LEN); 292 alg->Init(&context); 294 alg->Update(&context, block, TEST_BLOCK_LEN); 295 p = alg->End(&context, buf); 435 MDTestSuite(const Algorithm_t *alg) argument 440 printf("%s test suite:\n", alg 455 MDFilter(const Algorithm_t *alg, int tee) argument 472 usage(const Algorithm_t *alg) argument [all...] |
/freebsd-11-stable/crypto/openssl/crypto/ocsp/ |
H A D | ocsp_lib.c | 106 X509_ALGOR *alg; local 113 alg = cid->hashAlgorithm; 114 if (alg->algorithm != NULL) 115 ASN1_OBJECT_free(alg->algorithm); 120 if (!(alg->algorithm = OBJ_nid2obj(nid))) 122 if ((alg->parameter = ASN1_TYPE_new()) == NULL) 124 alg->parameter->type = V_ASN1_NULL;
|
/freebsd-11-stable/crypto/openssl/crypto/rsa/ |
H A D | rsa_ameth.c | 269 static X509_ALGOR *rsa_mgf1_decode(X509_ALGOR *alg) argument 273 if (alg == NULL || alg->parameter == NULL) 275 if (OBJ_obj2nid(alg->algorithm) != NID_mgf1) 277 if (alg->parameter->type != V_ASN1_SEQUENCE) 280 p = alg->parameter->value.sequence->data; 281 plen = alg->parameter->value.sequence->length; 285 static RSA_PSS_PARAMS *rsa_pss_decode(const X509_ALGOR *alg, argument 294 if (!alg->parameter || alg 405 X509_ALGOR *alg = NULL; local 494 rsa_algor_to_md(X509_ALGOR *alg) argument 506 rsa_mgf1_to_md(X509_ALGOR *alg, X509_ALGOR *maskHash) argument 674 X509_ALGOR *alg; local 716 X509_ALGOR *alg; local 772 rsa_oaep_decode(const X509_ALGOR *alg, X509_ALGOR **pmaskHash) argument 873 X509_ALGOR *alg; local [all...] |
/freebsd-11-stable/sys/modules/geom/geom_bde/ |
H A D | Makefile | 9 SRCS+= rijndael-alg-fst.c rijndael-api-fst.c sha256c.c sha512c.c
|
/freebsd-11-stable/contrib/wpa/src/crypto/ |
H A D | crypto_internal-cipher.c | 18 enum crypto_cipher_alg alg; member in struct:crypto_cipher 43 struct crypto_cipher * crypto_cipher_init(enum crypto_cipher_alg alg, argument 53 ctx->alg = alg; 55 switch (alg) { 108 switch (ctx->alg) { 172 switch (ctx->alg) { 232 switch (ctx->alg) {
|
H A D | crypto_nettle.c | 51 static int nettle_digest_vector(const struct nettle_hash *alg, size_t num_elem, argument 60 ctx = os_malloc(alg->context_size); 63 alg->init(ctx); 65 alg->update(ctx, len[i], addr[i]); 66 alg->digest(ctx, alg->digest_size, mac); 67 bin_clear_free(ctx, alg->context_size); 404 enum crypto_cipher_alg alg; member in struct:crypto_cipher 411 struct crypto_cipher * crypto_cipher_init(enum crypto_cipher_alg alg, argument 421 ctx->alg [all...] |
/freebsd-11-stable/usr.bin/ssh-copy-id/ |
H A D | ssh-copy-id.sh | 45 while read alg key comment ; do \ 48 printf "$alg $key $comment\n" >> "$keyfile" ; \
|
/freebsd-11-stable/crypto/openssl/crypto/pkcs12/ |
H A D | p12_npas.c | 74 static int alg_get(X509_ALGOR *alg, int *pnid, int *piter, int *psaltlen); 216 static int alg_get(X509_ALGOR *alg, int *pnid, int *piter, int *psaltlen) argument 221 p = alg->parameter->value.sequence->data; 222 pbe = d2i_PBEPARAM(NULL, &p, alg->parameter->value.sequence->length); 225 *pnid = OBJ_obj2nid(alg->algorithm);
|
/freebsd-11-stable/contrib/sendmail/src/ |
H A D | tlsh.c | 186 int alg; local 198 alg = (int)rr[2]; 199 if ((int)rr[0] == 3 && (int)rr[1] == 1 && (alg >= 0 || alg <= 2)) 200 return alg;
|