/freebsd-11.0-release/crypto/openssl/crypto/asn1/ |
H A D | x_algor.c | 81 int X509_ALGOR_set0(X509_ALGOR *alg, ASN1_OBJECT *aobj, int ptype, void *pval) 83 if (!alg) 86 if (alg->parameter == NULL) 87 alg->parameter = ASN1_TYPE_new(); 88 if (alg->parameter == NULL) 91 if (alg) { 92 if (alg->algorithm) 93 ASN1_OBJECT_free(alg->algorithm); 94 alg->algorithm = aobj; 99 if (alg [all...] |
H A D | p5_pbe.c | 77 int PKCS5_pbe_set0_algor(X509_ALGOR *algor, int alg, int iter, 115 if (X509_ALGOR_set0(algor, OBJ_nid2obj(alg), V_ASN1_SEQUENCE, pbe_str)) 128 X509_ALGOR *PKCS5_pbe_set(int alg, int iter, 138 if (PKCS5_pbe_set0_algor(ret, alg, iter, salt, saltlen))
|
/freebsd-11.0-release/crypto/openssh/ |
H A D | digest-openssl.c | 45 int alg; member in struct:ssh_digest_ctx 68 ssh_digest_by_alg(int alg) argument 70 if (alg < 0 || alg >= SSH_DIGEST_MAX) 72 if (digests[alg].id != alg) /* sanity */ 74 if (digests[alg].mdfunc == NULL) 76 return &(digests[alg]); 82 int alg; local 84 for (alg 92 ssh_digest_alg_name(int alg) argument 100 ssh_digest_bytes(int alg) argument 114 ssh_digest_start(int alg) argument 183 ssh_digest_memory(int alg, const void *m, size_t mlen, u_char *d, size_t dlen) argument 201 ssh_digest_buffer(int alg, const struct sshbuf *b, u_char *d, size_t dlen) argument [all...] |
H A D | digest-libc.c | 44 int alg; member in struct:ssh_digest_ctx 124 ssh_digest_by_alg(int alg) argument 126 if (alg < 0 || alg >= SSH_DIGEST_MAX) 128 if (digests[alg].id != alg) /* sanity */ 130 return &(digests[alg]); 136 int alg; local 138 for (alg = 0; alg < SSH_DIGEST_MA 146 ssh_digest_alg_name(int alg) argument 154 ssh_digest_bytes(int alg) argument 170 ssh_digest_start(int alg) argument 246 ssh_digest_memory(int alg, const void *m, size_t mlen, u_char *d, size_t dlen) argument 260 ssh_digest_buffer(int alg, const struct sshbuf *b, u_char *d, size_t dlen) argument [all...] |
H A D | digest.h | 40 const char *ssh_digest_alg_name(int alg); 43 size_t ssh_digest_bytes(int alg); 53 int ssh_digest_memory(int alg, const void *m, size_t mlen, 57 int ssh_digest_buffer(int alg, const struct sshbuf *b, u_char *d, size_t dlen) 61 struct ssh_digest_ctx *ssh_digest_start(int alg);
|
H A D | hmac.h | 22 size_t ssh_hmac_bytes(int alg); 26 struct ssh_hmac_ctx *ssh_hmac_start(int alg);
|
H A D | hmac.c | 28 int alg; member in struct:ssh_hmac_ctx 37 ssh_hmac_bytes(int alg) argument 39 return ssh_digest_bytes(alg); 43 ssh_hmac_start(int alg) argument 49 ret->alg = alg; 50 if ((ret->ictx = ssh_digest_start(alg)) == NULL || 51 (ret->octx = ssh_digest_start(alg)) == NULL || 52 (ret->digest = ssh_digest_start(alg)) == NULL) 73 else if (ssh_digest_memory(ctx->alg, ke [all...] |
/freebsd-11.0-release/crypto/openssl/crypto/engine/ |
H A D | eng_fat.c | 103 static int int_def_cb(const char *alg, int len, void *arg) argument 106 if (alg == NULL) 108 if (!strncmp(alg, "ALL", len)) 110 else if (!strncmp(alg, "RSA", len)) 112 else if (!strncmp(alg, "DSA", len)) 114 else if (!strncmp(alg, "ECDH", len)) 116 else if (!strncmp(alg, "ECDSA", len)) 118 else if (!strncmp(alg, "DH", len)) 120 else if (!strncmp(alg, "RAND", len)) 122 else if (!strncmp(alg, "CIPHER [all...] |
/freebsd-11.0-release/contrib/blacklist/etc/ |
H A D | npf.conf | 6 alg "icmp"
|
/freebsd-11.0-release/etc/rc.d/ |
H A D | sshd | 32 local alg=$1 33 local ALG="$(echo $alg | tr a-z A-Z)" 36 if ! checkyesno "sshd_${alg}_enable" ; then 40 case $alg in 45 keyfile="/etc/ssh/ssh_host_${alg}_key" 61 /usr/bin/ssh-keygen -q -t $alg -f "$keyfile" -N ""
|
/freebsd-11.0-release/crypto/openssl/crypto/pkcs7/ |
H A D | pk7_attr.c | 101 X509_ALGOR *alg; local 103 if (!(alg = X509_ALGOR_new())) { 107 ASN1_OBJECT_free(alg->algorithm); 108 alg->algorithm = OBJ_nid2obj(nid); 111 if (!(alg->parameter = ASN1_TYPE_new())) { 123 alg->parameter->value.integer = nbit; 124 alg->parameter->type = V_ASN1_INTEGER; 126 sk_X509_ALGOR_push(sk, alg);
|
/freebsd-11.0-release/sys/modules/wlan_ccmp/ |
H A D | Makefile | 8 SRCS+= rijndael-alg-fst.c rijndael-api.c
|
/freebsd-11.0-release/sys/dev/random/ |
H A D | build.sh | 44 ../../crypto/rijndael/rijndael-alg-fst.c \ 54 ../../crypto/rijndael/rijndael-alg-fst.c \
|
/freebsd-11.0-release/sys/crypto/rijndael/ |
H A D | Makefile | 5 SRCS= ${PROG}.c rijndael-alg-fst.c rijndael-api-fst.c
|
/freebsd-11.0-release/tools/tools/crypto/ |
H A D | cryptotest.c | 113 struct alg { struct 162 static struct alg* 173 static struct alg* 246 runtest(struct alg *alg, int count, int size, u_long cmd, struct timeval *tv) argument 256 if (!alg->ishash) { 257 sop.keylen = (alg->minkeylen + alg->maxkeylen)/2; 263 sop.cipher = alg->code; 265 sop.mackeylen = (alg 428 runtests(struct alg *alg, int count, int size, u_long cmd, int threads, int profile) argument 517 struct alg *alg = NULL; local [all...] |
/freebsd-11.0-release/sbin/md5/ |
H A D | md5.c | 246 MDString(const Algorithm_t *alg, const char *string) argument 251 alg->Data(string,len,buf); 257 printf("%s (\"%s\") = %s", alg->name, string, buf); 270 MDTimeTrial(const Algorithm_t *alg) argument 281 alg->name, TEST_BLOCK_COUNT, TEST_BLOCK_LEN); 292 alg->Init(&context); 294 alg->Update(&context, block, TEST_BLOCK_LEN); 295 p = alg->End(&context, buf); 435 MDTestSuite(const Algorithm_t *alg) argument 440 printf("%s test suite:\n", alg 455 MDFilter(const Algorithm_t *alg, int tee) argument 472 usage(const Algorithm_t *alg) argument [all...] |
/freebsd-11.0-release/sys/modules/geom/geom_bde/ |
H A D | Makefile | 9 SRCS+= rijndael-alg-fst.c rijndael-api-fst.c sha256c.c sha512c.c
|
/freebsd-11.0-release/sys/netipsec/ |
H A D | xform.h | 115 extern struct auth_hash *ah_algorithm_lookup(int alg); 119 extern struct enc_xform *esp_algorithm_lookup(int alg); 123 extern struct comp_algo *ipcomp_algorithm_lookup(int alg);
|
/freebsd-11.0-release/crypto/openssl/crypto/ocsp/ |
H A D | ocsp_lib.c | 106 X509_ALGOR *alg; local 113 alg = cid->hashAlgorithm; 114 if (alg->algorithm != NULL) 115 ASN1_OBJECT_free(alg->algorithm); 120 if (!(alg->algorithm = OBJ_nid2obj(nid))) 122 if ((alg->parameter = ASN1_TYPE_new()) == NULL) 124 alg->parameter->type = V_ASN1_NULL;
|
/freebsd-11.0-release/crypto/openssl/crypto/rsa/ |
H A D | rsa_ameth.c | 269 static X509_ALGOR *rsa_mgf1_decode(X509_ALGOR *alg) argument 273 if (alg == NULL || alg->parameter == NULL) 275 if (OBJ_obj2nid(alg->algorithm) != NID_mgf1) 277 if (alg->parameter->type != V_ASN1_SEQUENCE) 280 p = alg->parameter->value.sequence->data; 281 plen = alg->parameter->value.sequence->length; 285 static RSA_PSS_PARAMS *rsa_pss_decode(const X509_ALGOR *alg, argument 294 if (!alg->parameter || alg 405 X509_ALGOR *alg = NULL; local 494 rsa_algor_to_md(X509_ALGOR *alg) argument 506 rsa_mgf1_to_md(X509_ALGOR *alg, X509_ALGOR *maskHash) argument 674 X509_ALGOR *alg; local 716 X509_ALGOR *alg; local 771 rsa_oaep_decode(const X509_ALGOR *alg, X509_ALGOR **pmaskHash) argument 873 X509_ALGOR *alg; local [all...] |
/freebsd-11.0-release/contrib/unbound/sldns/ |
H A D | keyraw.h | 35 * \param[in] alg the cryptographic algorithm this is a key for 39 const size_t len, int alg);
|
/freebsd-11.0-release/contrib/wpa/src/crypto/ |
H A D | crypto_internal-cipher.c | 18 enum crypto_cipher_alg alg; member in struct:crypto_cipher 43 struct crypto_cipher * crypto_cipher_init(enum crypto_cipher_alg alg, argument 53 ctx->alg = alg; 55 switch (alg) { 108 switch (ctx->alg) { 172 switch (ctx->alg) { 232 switch (ctx->alg) {
|
/freebsd-11.0-release/usr.bin/ssh-copy-id/ |
H A D | ssh-copy-id.sh | 43 while read alg key comment ; do \ 46 printf "$alg $key $comment\n" >> "$keyfile" ; \
|
/freebsd-11.0-release/crypto/openssl/crypto/pkcs12/ |
H A D | p12_npas.c | 74 static int alg_get(X509_ALGOR *alg, int *pnid, int *piter, int *psaltlen); 216 static int alg_get(X509_ALGOR *alg, int *pnid, int *piter, int *psaltlen) argument 221 p = alg->parameter->value.sequence->data; 222 pbe = d2i_PBEPARAM(NULL, &p, alg->parameter->value.sequence->length); 225 *pnid = OBJ_obj2nid(alg->algorithm);
|
/freebsd-11.0-release/crypto/openssl/crypto/ |
H A D | crypto.h | 602 # define fips_md_init(alg) fips_md_init_ctx(alg, alg) 605 # define fips_md_init_ctx(alg, cx) \ 606 int alg##_Init(cx##_CTX *c) \ 609 "Low level API call to digest " #alg " forbidden in FIPS mode!"); \ 610 return private_##alg##_Init(c); \ 612 int private_##alg##_Init(cx##_CTX *c) 614 # define fips_cipher_abort(alg) \ 616 "Low level API call to cipher " #alg " forbidde [all...] |