/freebsd-10-stable/contrib/unbound/validator/ |
H A D | val_secalgo.h | 53 * @param algo: nsec3 hash algorithm. 59 int secalgo_nsec3_hash(int algo, unsigned char* buf, size_t len, 64 * @param algo: DS digest algo. 67 size_t ds_digest_size_supported(int algo); 70 * @param algo: the DS digest algo 76 int secalgo_ds_digest(int algo, unsigned char* buf, size_t len, 86 * @param algo: DNSKEY algorithm. 95 enum sec_status verify_canonrrset(struct sldns_buffer* buf, int algo, [all...] |
H A D | val_secalgo.c | 89 secalgo_nsec3_hash(int algo, unsigned char* buf, size_t len, argument 92 switch(algo) { 103 * @param algo: DS digest algo. 107 ds_digest_size_supported(int algo) argument 109 switch(algo) { 146 secalgo_ds_digest(int algo, unsigned char* buf, size_t len, argument 149 switch(algo) { 173 algo); 315 * @param algo 323 setup_key_digest(int algo, EVP_PKEY** evp_key, const EVP_MD** digest_type, unsigned char* key, size_t keylen) argument 504 verify_canonrrset(sldns_buffer* buf, int algo, unsigned char* sigblock, unsigned int sigblock_len, unsigned char* key, unsigned int keylen, char** reason) argument 609 secalgo_nsec3_hash(int algo, unsigned char* buf, size_t len, unsigned char* res) argument 622 ds_digest_size_supported(int algo) argument 644 secalgo_ds_digest(int algo, unsigned char* buf, size_t len, unsigned char* res) argument 723 nss_buf2ecdsa(unsigned char* key, size_t len, int algo) argument 897 nss_setup_key_digest(int algo, SECKEYPublicKey** pubkey, HASH_HashType* htype, unsigned char* key, size_t keylen, unsigned char** prefix, size_t* prefixlen) argument 1022 verify_canonrrset(sldns_buffer* buf, int algo, unsigned char* sigblock, unsigned int sigblock_len, unsigned char* key, unsigned int keylen, char** reason) argument 1139 _digest_nettle(int algo, uint8_t* buf, size_t len, unsigned char* res) argument 1195 secalgo_nsec3_hash(int algo, unsigned char* buf, size_t len, unsigned char* res) argument 1213 ds_digest_size_supported(int algo) argument 1235 secalgo_ds_digest(int algo, unsigned char* buf, size_t len, unsigned char* res) argument 1530 verify_canonrrset(sldns_buffer* buf, int algo, unsigned char* sigblock, unsigned int sigblock_len, unsigned char* key, unsigned int keylen, char** reason) argument [all...] |
H A D | val_kentry.c | 62 if(kd->algo) 63 s += strlen((char*)kd->algo)+1; 97 free(kd->algo); 143 if(d->algo) { 144 newd->algo = (uint8_t*)regional_strdup(region, 145 (char*)d->algo); 146 if(!newd->algo) 203 if(d->algo) { 204 newd->algo = (uint8_t*)strdup((char*)d->algo); 375 int algo; local [all...] |
H A D | val_sigcrypt.c | 122 * @return algo or 0 if malformed rrsig. 330 verbose(VERB_QUERY, "DS fail: DS RR algo and digest do not " 343 return 0; /* digest algo failed */ 386 uint8_t algo; local 391 algo = (uint8_t)dnskey_get_algo(dnskey, i); 392 if(!dnskey_algo_id_is_supported((int)algo)) 394 if(n->needs[algo] == 0) { 395 n->needs[algo] = 1; 396 sigalg[total] = algo; 406 uint8_t algo; local 422 uint8_t algo; local 444 algo_needs_set_secure(struct algo_needs* n, uint8_t algo) argument 455 algo_needs_set_bogus(struct algo_needs* n, uint8_t algo) argument 557 int algo = dnskey_get_algo(dnskey, dnskey_idx); local 593 int algo = rrset_get_sig_algo(rrset, sig_idx); local [all...] |
H A D | val_sigcrypt.h | 73 * Initialize algo needs structure, set algos from rrset as needed. 83 * Initialize algo needs structure from a signalled algo list. 90 * Initialize algo needs structure, set algos from rrset as needed. 93 * @param fav_ds_algo: filter to use only this DS algo. 103 * @param algo: the algorithm processed to be secure. 106 int algo_needs_set_secure(struct algo_needs* n, uint8_t algo); 112 * @param algo: the algorithm processed to be bogus. 114 void algo_needs_set_bogus(struct algo_needs* n, uint8_t algo); 124 * See which algo i [all...] |
H A D | val_nsec3.h | 310 * @param algo: nsec3 hash algo. 314 * @return 0 if bad formatted, unknown nsec3 hash algo, or unknown flags set. 317 int* algo, size_t* iter, uint8_t** salt, size_t* saltlen); 324 * @param algo: algo to use, must be known. 333 int algo, size_t iter, uint8_t* salt, size_t saltlen, uint8_t* res,
|
H A D | val_kentry.h | 84 uint8_t* algo; member in struct:key_entry_data
|
H A D | val_nsec3.c | 210 int* algo, size_t* iter, uint8_t** salt, size_t* saltlen) 216 *algo = nsec3_get_algo(rrset, r); 351 /* skip unknown flags, algo */ 380 /** see if at least one RR is known (flags, algo) */ 395 * (skips the unknown flag and unknown algo NSEC3s). 422 /* skip unknown flags, algo */ 532 nsec3_get_hashed(sldns_buffer* buf, uint8_t* nm, size_t nmlen, int algo, argument 542 hash_len = nsec3_hash_algo_size_supported(algo); 544 log_err("nsec3 hash of unknown algo %d", algo); 209 nsec3_get_params(struct ub_packed_rrset_key* rrset, int r, int* algo, size_t* iter, uint8_t** salt, size_t* saltlen) argument 570 int algo = nsec3_get_algo(c->nsec3, c->rr); local [all...] |
/freebsd-10-stable/sbin/hastd/ |
H A D | hast_checksum.c | 129 const char *algo; local 131 algo = nv_get_string(nv, "checksum"); 132 if (algo == NULL) 139 if (strcmp(algo, "crc32") == 0) 142 else if (strcmp(algo, "sha256") == 0) 146 pjdlog_error("Unknown checksum algorithm '%s'.", algo); 151 rhsize, algo, chsize);
|
H A D | hast_compression.c | 255 const char *algo; local 258 algo = nv_get_string(nv, "compression"); 259 if (algo == NULL) 265 if (strcmp(algo, "hole") == 0) 267 else if (strcmp(algo, "lzf") == 0) 270 pjdlog_error("Unknown compression algorithm '%s'.", algo);
|
/freebsd-10-stable/sys/netinet/cc/ |
H A D | cc.c | 110 /* Find algo with specified name and set it to default. */ 130 struct cc_algo *algo; local 138 STAILQ_FOREACH(algo, &cc_list, entries) { 156 STAILQ_FOREACH(algo, &cc_list, entries) { 157 err = sbuf_printf(s, first ? "%s" : ", %s", algo->name); 177 * Reset the default CC algo to NewReno for any netstack which is using the algo 223 /* Remove algo from cc_list so that new connections can't use it. */ 283 struct cc_algo *algo; local 287 algo [all...] |
/freebsd-10-stable/sys/geom/eli/ |
H A D | g_eli_crypto.c | 60 g_eli_crypto_cipher(u_int algo, int enc, u_char *data, size_t datasize, argument 72 KASSERT(algo != CRYPTO_AES_XTS, 76 cri.cri_alg = algo; 106 crd->crd_alg = algo; 134 g_eli_crypto_cipher(u_int algo, int enc, u_char *data, size_t datasize, argument 142 assert(algo != CRYPTO_AES_XTS); 144 switch (algo) { 216 g_eli_crypto_encrypt(u_int algo, u_char *data, size_t datasize, argument 221 if (algo == CRYPTO_AES_XTS) 222 algo 228 g_eli_crypto_decrypt(u_int algo, u_char *data, size_t datasize, const u_char *key, size_t keysize) argument [all...] |
H A D | g_eli.h | 427 g_eli_algo2str(u_int algo) argument 430 switch (algo) { 498 g_eli_keylen(u_int algo, u_int keylen) argument 501 switch (algo) { 550 g_eli_hashlen(u_int algo) argument 553 switch (algo) { 597 int g_eli_mkey_encrypt(unsigned algo, const unsigned char *key, unsigned keylen, 603 int g_eli_crypto_encrypt(u_int algo, u_char *data, size_t datasize, 605 int g_eli_crypto_decrypt(u_int algo, u_char *data, size_t datasize,
|
H A D | g_eli_key.c | 157 g_eli_mkey_encrypt(unsigned algo, const unsigned char *key, unsigned keylen, argument 176 error = g_eli_crypto_encrypt(algo, mkey, G_ELI_MKEYLEN, enckey, keylen);
|
/freebsd-10-stable/contrib/unbound/sldns/ |
H A D | keyraw.h | 82 * \param[in] algo precise algorithm to initialize ECC group values. 85 EVP_PKEY* sldns_ecdsa2pkey_raw(unsigned char* key, size_t keylen, uint8_t algo);
|
H A D | keyraw.c | 154 /* algo not found */ 312 sldns_ecdsa2pkey_raw(unsigned char* key, size_t keylen, uint8_t algo) argument 319 if(algo == LDNS_ECDSAP256SHA256) { 322 } else if(algo == LDNS_ECDSAP384SHA384) {
|
/freebsd-10-stable/contrib/netbsd-tests/lib/libskey/ |
H A D | t_algorithms.c | 45 const char *algo, const char *zero, 52 skey_set_algorithm(algo); 44 h_check(const char *pass, const char *seed, const char *algo, const char *zero, const char *one, const char *nine) argument
|
/freebsd-10-stable/sys/crypto/aesni/ |
H A D | aesni.h | 60 int algo; member in struct:aesni_session
|
H A D | aesni.c | 249 ses->algo = encini->cri_alg; 479 if (ses->algo == CRYPTO_AES_CBC) { 482 } else /* if (ses->algo == CRYPTO_AES_XTS) */ { 493 if (ses->algo == CRYPTO_AES_CBC) { 496 } else /* if (ses->algo == CRYPTO_AES_XTS) */ {
|
H A D | aesni_wrap.c | 337 switch (ses->algo) { 371 if (ses->algo == CRYPTO_AES_CBC) 373 else /* if (ses->algo == CRYPTO_AES_XTS) */ {
|
/freebsd-10-stable/crypto/openssl/apps/ |
H A D | ts.c | 500 X509_ALGOR *algo = NULL; local 522 if (!(algo = X509_ALGOR_new())) 524 if (!(algo->algorithm = OBJ_nid2obj(EVP_MD_type(md)))) 526 if (!(algo->parameter = ASN1_TYPE_new())) 528 algo->parameter->type = V_ASN1_NULL; 529 if (!TS_MSG_IMPRINT_set_algo(msg_imprint, algo)) 565 X509_ALGOR_free(algo);
|
/freebsd-10-stable/contrib/ldns/ldns/ |
H A D | dnssec_verify.h | 614 * \param[in] algo Signing algorithm 620 uint8_t algo); 630 * \param[in] algo Signing algorithm 638 uint8_t algo);
|
/freebsd-10-stable/sys/net80211/ |
H A D | ieee80211_hostap.c | 1645 int algo, int seq, int status) 1650 wh, NULL, "unsupported alg %d", algo); 1862 uint16_t algo, seq, status; local 1882 algo = le16toh(*(uint16_t *)frm); 1886 "recv auth frame with algorithm %d seq %d", algo, seq); 1909 if (algo == IEEE80211_AUTH_ALG_SHARED) 1912 else if (algo == IEEE80211_AUTH_ALG_OPEN) 1914 else if (algo == IEEE80211_AUTH_ALG_LEAP) { 1915 authalgreject(ni, wh, algo, 1928 authalgreject(ni, wh, algo, 1644 authalgreject(struct ieee80211_node *ni, const struct ieee80211_frame *wh, int algo, int seq, int status) argument [all...] |
H A D | ieee80211_sta.c | 1479 uint16_t algo, seq, status; local 1488 algo = le16toh(*(uint16_t *)frm); 1492 "recv auth frame with algorithm %d seq %d", algo, seq); 1506 if (algo == IEEE80211_AUTH_ALG_SHARED) 1509 else if (algo == IEEE80211_AUTH_ALG_OPEN) 1513 wh, "auth", "unsupported alg %d", algo);
|
/freebsd-10-stable/lib/libfetch/ |
H A D | http.c | 637 char *algo; member in struct:__anon595 646 b->realm = b->qop = b->nonce = b->opaque = b->algo = NULL; 661 if (b->algo) 662 free(b->algo); 825 cs->challenges[cs->count]->algo = 1261 if (!c->algo) 1262 c->algo = strdup(""); 1265 *c->algo? ",algorithm=" : "", c->algo, 1281 DigestCalcHA1(c->algo, parm [all...] |