/freebsd-11-stable/contrib/unbound/validator/ |
H A D | val_secalgo.h | 53 * @param algo: nsec3 hash algorithm. 59 int secalgo_nsec3_hash(int algo, unsigned char* buf, size_t len, 72 * @param algo: DS digest algo. 75 size_t ds_digest_size_supported(int algo); 78 * @param algo: the DS digest algo 84 int secalgo_ds_digest(int algo, unsigned char* buf, size_t len, 94 * @param algo: DNSKEY algorithm. 103 enum sec_status verify_canonrrset(struct sldns_buffer* buf, int algo, [all...] |
H A D | val_secalgo.c | 114 secalgo_nsec3_hash(int algo, unsigned char* buf, size_t len, argument 117 switch(algo) { 146 * @param algo: DS digest algo. 150 ds_digest_size_supported(int algo) argument 152 switch(algo) { 194 secalgo_ds_digest(int algo, unsigned char* buf, size_t len, argument 197 switch(algo) { 239 algo); 442 * @param algo 450 setup_key_digest(int algo, EVP_PKEY** evp_key, const EVP_MD** digest_type, unsigned char* key, size_t keylen) argument 644 verify_canonrrset(sldns_buffer* buf, int algo, unsigned char* sigblock, unsigned int sigblock_len, unsigned char* key, unsigned int keylen, char** reason) argument 808 secalgo_nsec3_hash(int algo, unsigned char* buf, size_t len, unsigned char* res) argument 827 ds_digest_size_supported(int algo) argument 851 secalgo_ds_digest(int algo, unsigned char* buf, size_t len, unsigned char* res) argument 939 nss_buf2ecdsa(unsigned char* key, size_t len, int algo) argument 1115 nss_setup_key_digest(int algo, SECKEYPublicKey** pubkey, HASH_HashType* htype, unsigned char* key, size_t keylen, unsigned char** prefix, size_t* prefixlen) argument 1255 verify_canonrrset(sldns_buffer* buf, int algo, unsigned char* sigblock, unsigned int sigblock_len, unsigned char* key, unsigned int keylen, char** reason) argument 1380 _digest_nettle(int algo, uint8_t* buf, size_t len, unsigned char* res) argument 1436 secalgo_nsec3_hash(int algo, unsigned char* buf, size_t len, unsigned char* res) argument 1460 ds_digest_size_supported(int algo) argument 1487 secalgo_ds_digest(int algo, unsigned char* buf, size_t len, unsigned char* res) argument 1827 verify_canonrrset(sldns_buffer* buf, int algo, unsigned char* sigblock, unsigned int sigblock_len, unsigned char* key, unsigned int keylen, char** reason) argument [all...] |
H A D | val_kentry.c | 62 if(kd->algo) 63 s += strlen((char*)kd->algo)+1; 97 free(kd->algo); 143 if(d->algo) { 144 newd->algo = (uint8_t*)regional_strdup(region, 145 (char*)d->algo); 146 if(!newd->algo) 203 if(d->algo) { 204 newd->algo = (uint8_t*)strdup((char*)d->algo); 375 int algo; local [all...] |
H A D | val_sigcrypt.c | 123 * @return algo or 0 if malformed rrsig. 336 verbose(VERB_QUERY, "DS fail: DS RR algo and digest do not " 349 return 0; /* digest algo failed */ 392 uint8_t algo; local 397 algo = (uint8_t)dnskey_get_algo(dnskey, i); 398 if(!dnskey_algo_id_is_supported((int)algo)) 400 if(n->needs[algo] == 0) { 401 n->needs[algo] = 1; 402 sigalg[total] = algo; 412 uint8_t algo; local 428 uint8_t algo; local 450 algo_needs_set_secure(struct algo_needs* n, uint8_t algo) argument 461 algo_needs_set_bogus(struct algo_needs* n, uint8_t algo) argument 565 int algo = dnskey_get_algo(dnskey, dnskey_idx); local 603 int algo = rrset_get_sig_algo(rrset, sig_idx); local [all...] |
H A D | val_nsec3.h | 313 * @param algo: nsec3 hash algo. 317 * @return 0 if bad formatted, unknown nsec3 hash algo, or unknown flags set. 320 int* algo, size_t* iter, uint8_t** salt, size_t* saltlen); 327 * @param algo: algo to use, must be known. 336 int algo, size_t iter, uint8_t* salt, size_t saltlen, uint8_t* res,
|
H A D | val_sigcrypt.h | 75 * Initialize algo needs structure, set algos from rrset as needed. 85 * Initialize algo needs structure from a signalled algo list. 92 * Initialize algo needs structure, set algos from rrset as needed. 95 * @param fav_ds_algo: filter to use only this DS algo. 105 * @param algo: the algorithm processed to be secure. 108 int algo_needs_set_secure(struct algo_needs* n, uint8_t algo); 114 * @param algo: the algorithm processed to be bogus. 116 void algo_needs_set_bogus(struct algo_needs* n, uint8_t algo); 126 * See which algo i [all...] |
H A D | val_kentry.h | 84 uint8_t* algo; member in struct:key_entry_data
|
H A D | val_nsec3.c | 210 int* algo, size_t* iter, uint8_t** salt, size_t* saltlen) 216 *algo = nsec3_get_algo(rrset, r); 351 /* skip unknown flags, algo */ 380 /** see if at least one RR is known (flags, algo) */ 395 * (skips the unknown flag and unknown algo NSEC3s). 422 /* skip unknown flags, algo */ 536 nsec3_get_hashed(sldns_buffer* buf, uint8_t* nm, size_t nmlen, int algo, argument 546 hash_len = nsec3_hash_algo_size_supported(algo); 548 log_err("nsec3 hash of unknown algo %d", algo); 209 nsec3_get_params(struct ub_packed_rrset_key* rrset, int r, int* algo, size_t* iter, uint8_t** salt, size_t* saltlen) argument 574 int algo = nsec3_get_algo(c->nsec3, c->rr); local [all...] |
/freebsd-11-stable/stand/libsa/geli/ |
H A D | geliboot_crypto.c | 38 geliboot_crypt(u_int algo, int enc, u_char *data, size_t datasize, argument 47 switch (algo) { 100 printf("Unsupported crypto algorithm #%d\n", algo); 108 g_eli_crypto_cipher(u_int algo, int enc, u_char *data, size_t datasize, argument 114 return (geliboot_crypt(algo, enc, data, datasize, key, keysize, iv)); 118 g_eli_crypto_encrypt(u_int algo, u_char *data, size_t datasize, argument 123 if (algo == CRYPTO_AES_XTS) 124 algo = CRYPTO_AES_CBC; 126 return (g_eli_crypto_cipher(algo, 1, data, datasize, key, keysize)); 130 g_eli_crypto_decrypt(u_int algo, u_cha argument [all...] |
H A D | geliboot_internal.h | 68 int geliboot_crypt(u_int algo, int enc, u_char *data, size_t datasize,
|
/freebsd-11-stable/sbin/hastd/ |
H A D | hast_checksum.c | 131 const char *algo; local 133 algo = nv_get_string(nv, "checksum"); 134 if (algo == NULL) 141 if (strcmp(algo, "crc32") == 0) 144 else if (strcmp(algo, "sha256") == 0) 148 pjdlog_error("Unknown checksum algorithm '%s'.", algo); 153 rhsize, algo, chsize);
|
H A D | hast_compression.c | 257 const char *algo; local 260 algo = nv_get_string(nv, "compression"); 261 if (algo == NULL) 267 if (strcmp(algo, "hole") == 0) 269 else if (strcmp(algo, "lzf") == 0) 272 pjdlog_error("Unknown compression algorithm '%s'.", algo);
|
/freebsd-11-stable/sys/geom/eli/ |
H A D | g_eli_crypto.c | 59 g_eli_crypto_cipher(u_int algo, int enc, u_char *data, size_t datasize, argument 69 KASSERT(algo != CRYPTO_AES_XTS, 73 cri.cri_alg = algo; 92 crd->crd_alg = algo; 120 g_eli_crypto_cipher(u_int algo, int enc, u_char *data, size_t datasize, argument 128 assert(algo != CRYPTO_AES_XTS); 130 switch (algo) { 202 g_eli_crypto_encrypt(u_int algo, u_char *data, size_t datasize, argument 207 if (algo == CRYPTO_AES_XTS) 208 algo 214 g_eli_crypto_decrypt(u_int algo, u_char *data, size_t datasize, const u_char *key, size_t keysize) argument [all...] |
H A D | g_eli_key.c | 182 g_eli_mkey_encrypt(unsigned algo, const unsigned char *key, unsigned keylen, argument 201 error = g_eli_crypto_encrypt(algo, mkey, G_ELI_MKEYLEN, enckey, keylen);
|
H A D | g_eli.h | 466 g_eli_algo2str(u_int algo) argument 469 switch (algo) { 537 g_eli_keylen(u_int algo, u_int keylen) argument 540 switch (algo) { 589 g_eli_hashlen(u_int algo) argument 592 switch (algo) { 692 int g_eli_mkey_encrypt(unsigned algo, const unsigned char *key, unsigned keylen, 698 int g_eli_crypto_encrypt(u_int algo, u_char *data, size_t datasize, 700 int g_eli_crypto_decrypt(u_int algo, u_char *data, size_t datasize,
|
/freebsd-11-stable/sys/netinet/cc/ |
H A D | cc.c | 110 /* Find algo with specified name and set it to default. */ 130 struct cc_algo *algo; local 138 STAILQ_FOREACH(algo, &cc_list, entries) { 156 STAILQ_FOREACH(algo, &cc_list, entries) { 157 err = sbuf_printf(s, first ? "%s" : ", %s", algo->name); 177 * Reset the default CC algo to NewReno for any netstack which is using the algo 223 /* Remove algo from cc_list so that new connections can't use it. */ 283 struct cc_algo *algo; local 287 algo [all...] |
/freebsd-11-stable/contrib/netbsd-tests/lib/libskey/ |
H A D | t_algorithms.c | 45 const char *algo, const char *zero, 52 skey_set_algorithm(algo); 44 h_check(const char *pass, const char *seed, const char *algo, const char *zero, const char *one, const char *nine) argument
|
/freebsd-11-stable/contrib/unbound/sldns/ |
H A D | keyraw.h | 82 * \param[in] algo precise algorithm to initialize ECC group values. 85 EVP_PKEY* sldns_ecdsa2pkey_raw(unsigned char* key, size_t keylen, uint8_t algo);
|
H A D | keyraw.c | 171 /* algo not found */ 358 sldns_ecdsa2pkey_raw(unsigned char* key, size_t keylen, uint8_t algo) argument 365 if(algo == LDNS_ECDSAP256SHA256) { 368 } else if(algo == LDNS_ECDSAP384SHA384) {
|
/freebsd-11-stable/contrib/wpa/src/crypto/ |
H A D | crypto_gnutls.c | 20 static int gnutls_digest_vector(int algo, size_t num_elem, argument 30 if (gcry_md_open(&hd, algo, 0) != GPG_ERR_NO_ERROR) 34 p = gcry_md_read(hd, algo); 36 memcpy(mac, p, gcry_md_get_algo_dlen(algo)); 101 static int gnutls_hmac_vector(int algo, const u8 *key, size_t key_len, argument 112 if (gcry_md_open(&hd, algo, GCRY_MD_FLAG_HMAC) != GPG_ERR_NO_ERROR) 120 p = gcry_md_read(hd, algo); 122 memcpy(mac, p, gcry_md_get_algo_dlen(algo));
|
/freebsd-11-stable/sys/crypto/aesni/ |
H A D | aesni.h | 59 int algo; member in struct:aesni_session
|
/freebsd-11-stable/crypto/openssl/apps/ |
H A D | ts.c | 500 X509_ALGOR *algo = NULL; local 522 if (!(algo = X509_ALGOR_new())) 524 if (!(algo->algorithm = OBJ_nid2obj(EVP_MD_type(md)))) 526 if (!(algo->parameter = ASN1_TYPE_new())) 528 algo->parameter->type = V_ASN1_NULL; 529 if (!TS_MSG_IMPRINT_set_algo(msg_imprint, algo)) 565 X509_ALGOR_free(algo);
|
/freebsd-11-stable/contrib/ldns/ldns/ |
H A D | dnssec_verify.h | 614 * \param[in] algo Signing algorithm 620 uint8_t algo); 630 * \param[in] algo Signing algorithm 638 uint8_t algo);
|
/freebsd-11-stable/lib/libfetch/ |
H A D | http.c | 637 char *algo; member in struct:__anon4700 646 b->realm = b->qop = b->nonce = b->opaque = b->algo = NULL; 661 if (b->algo) 662 free(b->algo); 825 cs->challenges[cs->count]->algo = 1261 if (!c->algo) 1262 c->algo = strdup(""); 1265 *c->algo? ",algorithm=" : "", c->algo, 1281 DigestCalcHA1(c->algo, parm [all...] |
/freebsd-11-stable/sys/net80211/ |
H A D | ieee80211_hostap.c | 1615 int algo, int seq, int status) 1620 wh, NULL, "unsupported alg %d", algo); 1834 uint16_t algo, seq, status; local 1854 algo = le16toh(*(uint16_t *)frm); 1858 "recv auth frame with algorithm %d seq %d", algo, seq); 1881 if (algo == IEEE80211_AUTH_ALG_SHARED) 1884 else if (algo == IEEE80211_AUTH_ALG_OPEN) 1886 else if (algo == IEEE80211_AUTH_ALG_LEAP) { 1887 authalgreject(ni, wh, algo, 1900 authalgreject(ni, wh, algo, 1614 authalgreject(struct ieee80211_node *ni, const struct ieee80211_frame *wh, int algo, int seq, int status) argument [all...] |