Searched refs:algo (Results 1 - 20 of 20) sorted by relevance

/freebsd-9.3-release/sbin/hastd/
H A Dhast_checksum.c129 const char *algo; local
131 algo = nv_get_string(nv, "checksum");
132 if (algo == NULL)
139 if (strcmp(algo, "crc32") == 0)
142 else if (strcmp(algo, "sha256") == 0)
146 pjdlog_error("Unknown checksum algorithm '%s'.", algo);
151 rhsize, algo, chsize);
H A Dhast_compression.c255 const char *algo; local
258 algo = nv_get_string(nv, "compression");
259 if (algo == NULL)
265 if (strcmp(algo, "hole") == 0)
267 else if (strcmp(algo, "lzf") == 0)
270 pjdlog_error("Unknown compression algorithm '%s'.", algo);
/freebsd-9.3-release/sys/netinet/cc/
H A Dcc.c106 /* Find algo with specified name and set it to default. */
130 struct cc_algo *algo; local
138 STAILQ_FOREACH(algo, &cc_list, entries) {
156 STAILQ_FOREACH(algo, &cc_list, entries) {
157 err = sbuf_printf(s, first ? "%s" : ", %s", algo->name);
177 * Reset the default CC algo to NewReno for any netstack which is using the algo
223 /* Remove algo from cc_list so that new connections can't use it. */
283 struct cc_algo *algo; local
287 algo
[all...]
/freebsd-9.3-release/sys/geom/eli/
H A Dg_eli_crypto.c60 g_eli_crypto_cipher(u_int algo, int enc, u_char *data, size_t datasize, argument
72 KASSERT(algo != CRYPTO_AES_XTS,
76 cri.cri_alg = algo;
106 crd->crd_alg = algo;
134 g_eli_crypto_cipher(u_int algo, int enc, u_char *data, size_t datasize, argument
142 assert(algo != CRYPTO_AES_XTS);
144 switch (algo) {
216 g_eli_crypto_encrypt(u_int algo, u_char *data, size_t datasize, argument
221 if (algo == CRYPTO_AES_XTS)
222 algo
228 g_eli_crypto_decrypt(u_int algo, u_char *data, size_t datasize, const u_char *key, size_t keysize) argument
[all...]
H A Dg_eli.h368 g_eli_algo2str(u_int algo) argument
371 switch (algo) {
439 g_eli_keylen(u_int algo, u_int keylen) argument
442 switch (algo) {
491 g_eli_hashlen(u_int algo) argument
494 switch (algo) {
538 int g_eli_mkey_encrypt(unsigned algo, const unsigned char *key, unsigned keylen,
544 int g_eli_crypto_encrypt(u_int algo, u_char *data, size_t datasize,
546 int g_eli_crypto_decrypt(u_int algo, u_char *data, size_t datasize,
H A Dg_eli_key.c157 g_eli_mkey_encrypt(unsigned algo, const unsigned char *key, unsigned keylen, argument
176 error = g_eli_crypto_encrypt(algo, mkey, G_ELI_MKEYLEN, enckey, keylen);
/freebsd-9.3-release/sys/crypto/aesni/
H A Daesni_wrap.c178 switch (ses->algo) {
212 if (ses->algo == CRYPTO_AES_CBC)
214 else /* if (ses->algo == CRYPTO_AES_XTS) */ {
281 if (ses->algo == CRYPTO_AES_CBC) {
284 } else /* if (ses->algo == CRYPTO_AES_XTS) */ {
295 if (ses->algo == CRYPTO_AES_CBC) {
298 } else /* if (ses->algo == CRYPTO_AES_XTS) */ {
H A Daesni.h60 int algo; member in struct:aesni_session
H A Daesni.c183 ses->algo = encini->cri_alg;
/freebsd-9.3-release/crypto/openssl/fips/aes/
H A Dfips_aesavs.c495 char algo[8] = ""; local
543 if ((*algo == '\0') || (*amode == '\0') || (akeysz == 0)) {
545 algo, amode, akeysz);
563 strcpy(algo, "AES");
/freebsd-9.3-release/lib/libfetch/
H A Dhttp.c634 char *algo; member in struct:__anon5216
643 b->realm = b->qop = b->nonce = b->opaque = b->algo = NULL;
658 if (b->algo)
659 free(b->algo);
822 cs->challenges[cs->count]->algo =
1258 if (!c->algo)
1259 c->algo = strdup("");
1262 *c->algo? ",algorithm=" : "", c->algo,
1278 DigestCalcHA1(c->algo, parm
[all...]
/freebsd-9.3-release/sys/net80211/
H A Dieee80211_hostap.c1640 int algo, int seq, int status)
1645 wh, NULL, "unsupported alg %d", algo);
1848 uint16_t algo, seq, status; local
1868 algo = le16toh(*(uint16_t *)frm);
1872 "recv auth frame with algorithm %d seq %d", algo, seq);
1896 if (algo == IEEE80211_AUTH_ALG_SHARED)
1899 else if (algo == IEEE80211_AUTH_ALG_OPEN)
1901 else if (algo == IEEE80211_AUTH_ALG_LEAP) {
1902 authalgreject(ni, wh, algo,
1915 authalgreject(ni, wh, algo,
1639 authalgreject(struct ieee80211_node *ni, const struct ieee80211_frame *wh, int algo, int seq, int status) argument
[all...]
H A Dieee80211_sta.c1436 uint16_t algo, seq, status; local
1445 algo = le16toh(*(uint16_t *)frm);
1449 "recv auth frame with algorithm %d seq %d", algo, seq);
1463 if (algo == IEEE80211_AUTH_ALG_SHARED)
1466 else if (algo == IEEE80211_AUTH_ALG_OPEN)
1470 wh, "auth", "unsupported alg %d", algo);
/freebsd-9.3-release/sys/netinet/
H A Dtcp_usrreq.c1313 struct cc_algo *algo; local
1441 * Return EINVAL if we can't find the requested cc algo.
1445 STAILQ_FOREACH(algo, &cc_list, entries) {
1446 if (strncmp(buf, algo->name, TCP_CA_NAME_MAX)
1448 /* We've found the requested algo. */
1457 CC_ALGO(tp) = algo;
1460 * initialising the new algo,
1464 if (algo->cb_init != NULL)
1465 if (algo->cb_init(tp->ccv) > 0) {
/freebsd-9.3-release/crypto/openssl/util/
H A Dmk1mf.pl1365 my $algo, $ALGO;
1366 ($algo = $_) =~ s/^experimental-//;
1367 ($ALGO = $algo) =~ tr/[a-z]/[A-Z]/;
/freebsd-9.3-release/sys/netipsec/
H A Dkey.c6009 struct enc_xform *algo; local
6018 algo = esp_algorithm_lookup(i);
6019 if (algo == NULL)
6023 if (_BITS(algo->maxkey) < V_ipsec_esp_keymin)
6025 if (_BITS(algo->minkey) < V_ipsec_esp_keymin)
6028 encmin = _BITS(algo->minkey);
6062 comb->sadb_comb_encrypt_maxbits = _BITS(algo->maxkey);
6115 struct auth_hash *algo; local
6132 algo = ah_algorithm_lookup(i);
6133 if (!algo)
6173 struct comp_algo *algo; local
[all...]
/freebsd-9.3-release/sys/dev/ubsec/
H A Dubsec.c827 ubsec_setup_enckey(struct ubsec_session *ses, int algo, caddr_t key) argument
831 if (algo == CRYPTO_DES_CBC) {
847 ubsec_setup_mackey(struct ubsec_session *ses, int algo, caddr_t key, int klen) argument
856 if (algo == CRYPTO_MD5_HMAC) {
872 if (algo == CRYPTO_MD5_HMAC) {
/freebsd-9.3-release/sys/dev/safe/
H A Dsafe.c642 safe_setup_mackey(struct safe_session *ses, int algo, caddr_t key, int klen) argument
652 if (algo == CRYPTO_MD5_HMAC) {
668 if (algo == CRYPTO_MD5_HMAC) {
/freebsd-9.3-release/gnu/lib/libstdc++/
H A DMakefile134 algo.h algobase.h alloc.h bvector.h defalloc.h deque.h \
/freebsd-9.3-release/contrib/libstdc++/include/
H A DMakefile.am168 ${backward_srcdir}/algo.h \

Completed in 280 milliseconds