Searched refs:algo (Results 1 - 25 of 50) sorted by relevance

12

/freebsd-13-stable/contrib/unbound/validator/
H A Dval_secalgo.h53 * @param algo: nsec3 hash algorithm.
59 int secalgo_nsec3_hash(int algo, unsigned char* buf, size_t len,
72 * @param algo: DS digest algo.
75 size_t ds_digest_size_supported(int algo);
78 * @param algo: the DS digest algo
84 int secalgo_ds_digest(int algo, unsigned char* buf, size_t len,
94 * @param algo: DNSKEY algorithm.
103 enum sec_status verify_canonrrset(struct sldns_buffer* buf, int algo,
[all...]
H A Dval_secalgo.c114 secalgo_nsec3_hash(int algo, unsigned char* buf, size_t len, argument
117 switch(algo) {
146 * @param algo: DS digest algo.
150 ds_digest_size_supported(int algo) argument
152 switch(algo) {
194 secalgo_ds_digest(int algo, unsigned char* buf, size_t len, argument
197 switch(algo) {
239 algo);
442 * @param algo
450 setup_key_digest(int algo, EVP_PKEY** evp_key, const EVP_MD** digest_type, unsigned char* key, size_t keylen) argument
644 verify_canonrrset(sldns_buffer* buf, int algo, unsigned char* sigblock, unsigned int sigblock_len, unsigned char* key, unsigned int keylen, char** reason) argument
808 secalgo_nsec3_hash(int algo, unsigned char* buf, size_t len, unsigned char* res) argument
827 ds_digest_size_supported(int algo) argument
851 secalgo_ds_digest(int algo, unsigned char* buf, size_t len, unsigned char* res) argument
939 nss_buf2ecdsa(unsigned char* key, size_t len, int algo) argument
1115 nss_setup_key_digest(int algo, SECKEYPublicKey** pubkey, HASH_HashType* htype, unsigned char* key, size_t keylen, unsigned char** prefix, size_t* prefixlen) argument
1255 verify_canonrrset(sldns_buffer* buf, int algo, unsigned char* sigblock, unsigned int sigblock_len, unsigned char* key, unsigned int keylen, char** reason) argument
1380 _digest_nettle(int algo, uint8_t* buf, size_t len, unsigned char* res) argument
1436 secalgo_nsec3_hash(int algo, unsigned char* buf, size_t len, unsigned char* res) argument
1460 ds_digest_size_supported(int algo) argument
1487 secalgo_ds_digest(int algo, unsigned char* buf, size_t len, unsigned char* res) argument
1827 verify_canonrrset(sldns_buffer* buf, int algo, unsigned char* sigblock, unsigned int sigblock_len, unsigned char* key, unsigned int keylen, char** reason) argument
[all...]
H A Dval_kentry.c62 if(kd->algo)
63 s += strlen((char*)kd->algo)+1;
97 free(kd->algo);
143 if(d->algo) {
144 newd->algo = (uint8_t*)regional_strdup(region,
145 (char*)d->algo);
146 if(!newd->algo)
203 if(d->algo) {
204 newd->algo = (uint8_t*)strdup((char*)d->algo);
375 int algo; local
[all...]
H A Dval_sigcrypt.c123 * @return algo or 0 if malformed rrsig.
336 verbose(VERB_QUERY, "DS fail: DS RR algo and digest do not "
349 return 0; /* digest algo failed */
392 uint8_t algo; local
397 algo = (uint8_t)dnskey_get_algo(dnskey, i);
398 if(!dnskey_algo_id_is_supported((int)algo))
400 if(n->needs[algo] == 0) {
401 n->needs[algo] = 1;
402 sigalg[total] = algo;
412 uint8_t algo; local
428 uint8_t algo; local
450 algo_needs_set_secure(struct algo_needs* n, uint8_t algo) argument
461 algo_needs_set_bogus(struct algo_needs* n, uint8_t algo) argument
565 int algo = dnskey_get_algo(dnskey, dnskey_idx); local
603 int algo = rrset_get_sig_algo(rrset, sig_idx); local
[all...]
H A Dval_nsec3.h313 * @param algo: nsec3 hash algo.
317 * @return 0 if bad formatted, unknown nsec3 hash algo, or unknown flags set.
320 int* algo, size_t* iter, uint8_t** salt, size_t* saltlen);
327 * @param algo: algo to use, must be known.
336 int algo, size_t iter, uint8_t* salt, size_t saltlen, uint8_t* res,
H A Dval_sigcrypt.h75 * Initialize algo needs structure, set algos from rrset as needed.
85 * Initialize algo needs structure from a signalled algo list.
92 * Initialize algo needs structure, set algos from rrset as needed.
95 * @param fav_ds_algo: filter to use only this DS algo.
105 * @param algo: the algorithm processed to be secure.
108 int algo_needs_set_secure(struct algo_needs* n, uint8_t algo);
114 * @param algo: the algorithm processed to be bogus.
116 void algo_needs_set_bogus(struct algo_needs* n, uint8_t algo);
126 * See which algo i
[all...]
H A Dval_kentry.h84 uint8_t* algo; member in struct:key_entry_data
H A Dval_nsec3.c210 int* algo, size_t* iter, uint8_t** salt, size_t* saltlen)
216 *algo = nsec3_get_algo(rrset, r);
351 /* skip unknown flags, algo */
380 /** see if at least one RR is known (flags, algo) */
395 * (skips the unknown flag and unknown algo NSEC3s).
422 /* skip unknown flags, algo */
536 nsec3_get_hashed(sldns_buffer* buf, uint8_t* nm, size_t nmlen, int algo, argument
546 hash_len = nsec3_hash_algo_size_supported(algo);
548 log_err("nsec3 hash of unknown algo %d", algo);
209 nsec3_get_params(struct ub_packed_rrset_key* rrset, int r, int* algo, size_t* iter, uint8_t** salt, size_t* saltlen) argument
574 int algo = nsec3_get_algo(c->nsec3, c->rr); local
[all...]
/freebsd-13-stable/stand/libsa/geli/
H A Dgeliboot_crypto.c38 geliboot_crypt(u_int algo, geli_op_t enc, u_char *data, size_t datasize, argument
47 switch (algo) {
102 printf("Unsupported crypto algorithm #%d\n", algo);
110 g_eli_crypto_cipher(u_int algo, geli_op_t enc, u_char *data, size_t datasize, argument
116 return (geliboot_crypt(algo, enc, data, datasize, key, keysize, iv));
120 g_eli_crypto_encrypt(u_int algo, u_char *data, size_t datasize, argument
125 if (algo == CRYPTO_AES_XTS)
126 algo = CRYPTO_AES_CBC;
128 return (g_eli_crypto_cipher(algo, GELI_ENCRYPT, data, datasize, key,
133 g_eli_crypto_decrypt(u_int algo, u_cha argument
[all...]
H A Dgeliboot_internal.h70 int geliboot_crypt(u_int algo, geli_op_t enc, u_char *data, size_t datasize,
/freebsd-13-stable/sys/geom/eli/
H A Dg_eli_crypto.c61 g_eli_crypto_cipher(u_int algo, int enc, u_char *data, size_t datasize, argument
69 KASSERT(algo != CRYPTO_AES_XTS,
74 csp.csp_cipher_alg = algo;
75 csp.csp_ivlen = g_eli_ivlen(algo);
110 g_eli_crypto_cipher(u_int algo, int enc, u_char *data, size_t datasize, argument
118 assert(algo != CRYPTO_AES_XTS);
120 switch (algo) {
188 g_eli_crypto_encrypt(u_int algo, u_char *data, size_t datasize, argument
193 if (algo == CRYPTO_AES_XTS)
194 algo
200 g_eli_crypto_decrypt(u_int algo, u_char *data, size_t datasize, const u_char *key, size_t keysize) argument
[all...]
H A Dg_eli_key.c184 g_eli_mkey_encrypt(unsigned algo, const unsigned char *key, unsigned keylen, argument
203 error = g_eli_crypto_encrypt(algo, mkey, G_ELI_MKEYLEN, enckey, keylen);
H A Dg_eli.h448 g_eli_algo2str(u_int algo) argument
451 switch (algo) {
543 g_eli_keylen(u_int algo, u_int keylen) argument
546 switch (algo) {
583 g_eli_ivlen(u_int algo) argument
586 switch (algo) {
598 g_eli_hashlen(u_int algo) argument
601 switch (algo) {
709 int g_eli_mkey_encrypt(unsigned algo, const unsigned char *key, unsigned keylen,
715 int g_eli_crypto_encrypt(u_int algo, u_cha
[all...]
/freebsd-13-stable/sbin/hastd/
H A Dhast_checksum.c120 const char *algo; local
122 algo = nv_get_string(nv, "checksum");
123 if (algo == NULL)
130 if (strcmp(algo, "crc32") == 0)
132 else if (strcmp(algo, "sha256") == 0)
135 pjdlog_error("Unknown checksum algorithm '%s'.", algo);
140 rhsize, algo, chsize);
H A Dhast_compression.c257 const char *algo; local
260 algo = nv_get_string(nv, "compression");
261 if (algo == NULL)
267 if (strcmp(algo, "hole") == 0)
269 else if (strcmp(algo, "lzf") == 0)
272 pjdlog_error("Unknown compression algorithm '%s'.", algo);
/freebsd-13-stable/sys/netinet/cc/
H A Dcc.c112 /* Find algo with specified name and set it to default. */
132 struct cc_algo *algo; local
140 STAILQ_FOREACH(algo, &cc_list, entries) {
158 STAILQ_FOREACH(algo, &cc_list, entries) {
159 err = sbuf_printf(s, first ? "%s" : ", %s", algo->name);
179 * Reset the default CC algo to NewReno for any netstack which is using the algo
225 /* Remove algo from cc_list so that new connections can't use it. */
285 struct cc_algo *algo; local
289 algo
[all...]
/freebsd-13-stable/contrib/netbsd-tests/lib/libskey/
H A Dt_algorithms.c45 const char *algo, const char *zero,
52 skey_set_algorithm(algo);
44 h_check(const char *pass, const char *seed, const char *algo, const char *zero, const char *one, const char *nine) argument
/freebsd-13-stable/crypto/openssl/apps/
H A Dprogs.pl168 (my $algo = $cmd) =~ s/-.*//g;
171 } elsif (grep { $algo eq $_ } @disablables) {
172 print "#ifndef OPENSSL_NO_" . uc($algo) . "\n${str}#endif\n";
173 } elsif (my $disabler = $cipher_disabler{$algo}) {
H A Dts.c421 X509_ALGOR *algo = NULL; local
434 if ((algo = X509_ALGOR_new()) == NULL)
436 if ((algo->algorithm = OBJ_nid2obj(EVP_MD_type(md))) == NULL)
438 if ((algo->parameter = ASN1_TYPE_new()) == NULL)
440 algo->parameter->type = V_ASN1_NULL;
441 if (!TS_MSG_IMPRINT_set_algo(msg_imprint, algo))
471 X509_ALGOR_free(algo);
/freebsd-13-stable/contrib/unbound/sldns/
H A Dkeyraw.h82 * \param[in] algo precise algorithm to initialize ECC group values.
85 EVP_PKEY* sldns_ecdsa2pkey_raw(unsigned char* key, size_t keylen, uint8_t algo);
H A Dkeyraw.c171 /* algo not found */
358 sldns_ecdsa2pkey_raw(unsigned char* key, size_t keylen, uint8_t algo) argument
365 if(algo == LDNS_ECDSAP256SHA256) {
368 } else if(algo == LDNS_ECDSAP384SHA384) {
/freebsd-13-stable/sys/dev/rtwn/
H A Dif_rtwn_cam.c198 uint8_t algo, keyid; local
211 algo = R92C_CAM_ALGO_WEP40;
213 algo = R92C_CAM_ALGO_WEP104;
216 algo = R92C_CAM_ALGO_TKIP;
219 algo = R92C_CAM_ALGO_AES;
228 "%s: keyix %u, keyid %u, algo %u/%u, flags %04X, len %u, "
230 k->wk_cipher->ic_cipher, algo, k->wk_flags, k->wk_keylen,
251 SM(R92C_CAM_ALGO, algo) |
/freebsd-13-stable/contrib/wpa/src/crypto/
H A Dcrypto_gnutls.c20 static int gnutls_digest_vector(int algo, size_t num_elem, argument
30 if (gcry_md_open(&hd, algo, 0) != GPG_ERR_NO_ERROR)
34 p = gcry_md_read(hd, algo);
36 memcpy(mac, p, gcry_md_get_algo_dlen(algo));
101 static int gnutls_hmac_vector(int algo, const u8 *key, size_t key_len, argument
112 if (gcry_md_open(&hd, algo, GCRY_MD_FLAG_HMAC) != GPG_ERR_NO_ERROR)
120 p = gcry_md_read(hd, algo);
122 memcpy(mac, p, gcry_md_get_algo_dlen(algo));
/freebsd-13-stable/contrib/ldns/ldns/
H A Ddnssec_verify.h614 * \param[in] algo Signing algorithm
620 uint8_t algo);
630 * \param[in] algo Signing algorithm
638 uint8_t algo);
/freebsd-13-stable/lib/libfetch/
H A Dhttp.c640 char *algo; member in struct:__anon7614
649 b->realm = b->qop = b->nonce = b->opaque = b->algo = NULL;
664 if (b->algo)
665 free(b->algo);
828 cs->challenges[cs->count]->algo =
1264 if (!c->algo)
1265 c->algo = strdup("");
1268 *c->algo? ",algorithm=" : "", c->algo,
1284 DigestCalcHA1(c->algo, parm
[all...]

Completed in 254 milliseconds

12