Searched refs:algo (Results 1 - 25 of 42) sorted by relevance

12

/freebsd-10-stable/contrib/unbound/validator/
H A Dval_secalgo.h53 * @param algo: nsec3 hash algorithm.
59 int secalgo_nsec3_hash(int algo, unsigned char* buf, size_t len,
64 * @param algo: DS digest algo.
67 size_t ds_digest_size_supported(int algo);
70 * @param algo: the DS digest algo
76 int secalgo_ds_digest(int algo, unsigned char* buf, size_t len,
86 * @param algo: DNSKEY algorithm.
95 enum sec_status verify_canonrrset(struct sldns_buffer* buf, int algo,
[all...]
H A Dval_secalgo.c89 secalgo_nsec3_hash(int algo, unsigned char* buf, size_t len, argument
92 switch(algo) {
103 * @param algo: DS digest algo.
107 ds_digest_size_supported(int algo) argument
109 switch(algo) {
146 secalgo_ds_digest(int algo, unsigned char* buf, size_t len, argument
149 switch(algo) {
173 algo);
315 * @param algo
323 setup_key_digest(int algo, EVP_PKEY** evp_key, const EVP_MD** digest_type, unsigned char* key, size_t keylen) argument
504 verify_canonrrset(sldns_buffer* buf, int algo, unsigned char* sigblock, unsigned int sigblock_len, unsigned char* key, unsigned int keylen, char** reason) argument
609 secalgo_nsec3_hash(int algo, unsigned char* buf, size_t len, unsigned char* res) argument
622 ds_digest_size_supported(int algo) argument
644 secalgo_ds_digest(int algo, unsigned char* buf, size_t len, unsigned char* res) argument
723 nss_buf2ecdsa(unsigned char* key, size_t len, int algo) argument
897 nss_setup_key_digest(int algo, SECKEYPublicKey** pubkey, HASH_HashType* htype, unsigned char* key, size_t keylen, unsigned char** prefix, size_t* prefixlen) argument
1022 verify_canonrrset(sldns_buffer* buf, int algo, unsigned char* sigblock, unsigned int sigblock_len, unsigned char* key, unsigned int keylen, char** reason) argument
1139 _digest_nettle(int algo, uint8_t* buf, size_t len, unsigned char* res) argument
1195 secalgo_nsec3_hash(int algo, unsigned char* buf, size_t len, unsigned char* res) argument
1213 ds_digest_size_supported(int algo) argument
1235 secalgo_ds_digest(int algo, unsigned char* buf, size_t len, unsigned char* res) argument
1530 verify_canonrrset(sldns_buffer* buf, int algo, unsigned char* sigblock, unsigned int sigblock_len, unsigned char* key, unsigned int keylen, char** reason) argument
[all...]
H A Dval_kentry.c62 if(kd->algo)
63 s += strlen((char*)kd->algo)+1;
97 free(kd->algo);
143 if(d->algo) {
144 newd->algo = (uint8_t*)regional_strdup(region,
145 (char*)d->algo);
146 if(!newd->algo)
203 if(d->algo) {
204 newd->algo = (uint8_t*)strdup((char*)d->algo);
375 int algo; local
[all...]
H A Dval_sigcrypt.c122 * @return algo or 0 if malformed rrsig.
330 verbose(VERB_QUERY, "DS fail: DS RR algo and digest do not "
343 return 0; /* digest algo failed */
386 uint8_t algo; local
391 algo = (uint8_t)dnskey_get_algo(dnskey, i);
392 if(!dnskey_algo_id_is_supported((int)algo))
394 if(n->needs[algo] == 0) {
395 n->needs[algo] = 1;
396 sigalg[total] = algo;
406 uint8_t algo; local
422 uint8_t algo; local
444 algo_needs_set_secure(struct algo_needs* n, uint8_t algo) argument
455 algo_needs_set_bogus(struct algo_needs* n, uint8_t algo) argument
557 int algo = dnskey_get_algo(dnskey, dnskey_idx); local
593 int algo = rrset_get_sig_algo(rrset, sig_idx); local
[all...]
H A Dval_sigcrypt.h73 * Initialize algo needs structure, set algos from rrset as needed.
83 * Initialize algo needs structure from a signalled algo list.
90 * Initialize algo needs structure, set algos from rrset as needed.
93 * @param fav_ds_algo: filter to use only this DS algo.
103 * @param algo: the algorithm processed to be secure.
106 int algo_needs_set_secure(struct algo_needs* n, uint8_t algo);
112 * @param algo: the algorithm processed to be bogus.
114 void algo_needs_set_bogus(struct algo_needs* n, uint8_t algo);
124 * See which algo i
[all...]
H A Dval_nsec3.h310 * @param algo: nsec3 hash algo.
314 * @return 0 if bad formatted, unknown nsec3 hash algo, or unknown flags set.
317 int* algo, size_t* iter, uint8_t** salt, size_t* saltlen);
324 * @param algo: algo to use, must be known.
333 int algo, size_t iter, uint8_t* salt, size_t saltlen, uint8_t* res,
H A Dval_kentry.h84 uint8_t* algo; member in struct:key_entry_data
H A Dval_nsec3.c210 int* algo, size_t* iter, uint8_t** salt, size_t* saltlen)
216 *algo = nsec3_get_algo(rrset, r);
351 /* skip unknown flags, algo */
380 /** see if at least one RR is known (flags, algo) */
395 * (skips the unknown flag and unknown algo NSEC3s).
422 /* skip unknown flags, algo */
532 nsec3_get_hashed(sldns_buffer* buf, uint8_t* nm, size_t nmlen, int algo, argument
542 hash_len = nsec3_hash_algo_size_supported(algo);
544 log_err("nsec3 hash of unknown algo %d", algo);
209 nsec3_get_params(struct ub_packed_rrset_key* rrset, int r, int* algo, size_t* iter, uint8_t** salt, size_t* saltlen) argument
570 int algo = nsec3_get_algo(c->nsec3, c->rr); local
[all...]
/freebsd-10-stable/sbin/hastd/
H A Dhast_checksum.c129 const char *algo; local
131 algo = nv_get_string(nv, "checksum");
132 if (algo == NULL)
139 if (strcmp(algo, "crc32") == 0)
142 else if (strcmp(algo, "sha256") == 0)
146 pjdlog_error("Unknown checksum algorithm '%s'.", algo);
151 rhsize, algo, chsize);
H A Dhast_compression.c255 const char *algo; local
258 algo = nv_get_string(nv, "compression");
259 if (algo == NULL)
265 if (strcmp(algo, "hole") == 0)
267 else if (strcmp(algo, "lzf") == 0)
270 pjdlog_error("Unknown compression algorithm '%s'.", algo);
/freebsd-10-stable/sys/netinet/cc/
H A Dcc.c110 /* Find algo with specified name and set it to default. */
130 struct cc_algo *algo; local
138 STAILQ_FOREACH(algo, &cc_list, entries) {
156 STAILQ_FOREACH(algo, &cc_list, entries) {
157 err = sbuf_printf(s, first ? "%s" : ", %s", algo->name);
177 * Reset the default CC algo to NewReno for any netstack which is using the algo
223 /* Remove algo from cc_list so that new connections can't use it. */
283 struct cc_algo *algo; local
287 algo
[all...]
/freebsd-10-stable/sys/geom/eli/
H A Dg_eli_crypto.c60 g_eli_crypto_cipher(u_int algo, int enc, u_char *data, size_t datasize, argument
72 KASSERT(algo != CRYPTO_AES_XTS,
76 cri.cri_alg = algo;
106 crd->crd_alg = algo;
134 g_eli_crypto_cipher(u_int algo, int enc, u_char *data, size_t datasize, argument
142 assert(algo != CRYPTO_AES_XTS);
144 switch (algo) {
216 g_eli_crypto_encrypt(u_int algo, u_char *data, size_t datasize, argument
221 if (algo == CRYPTO_AES_XTS)
222 algo
228 g_eli_crypto_decrypt(u_int algo, u_char *data, size_t datasize, const u_char *key, size_t keysize) argument
[all...]
H A Dg_eli.h427 g_eli_algo2str(u_int algo) argument
430 switch (algo) {
498 g_eli_keylen(u_int algo, u_int keylen) argument
501 switch (algo) {
550 g_eli_hashlen(u_int algo) argument
553 switch (algo) {
597 int g_eli_mkey_encrypt(unsigned algo, const unsigned char *key, unsigned keylen,
603 int g_eli_crypto_encrypt(u_int algo, u_char *data, size_t datasize,
605 int g_eli_crypto_decrypt(u_int algo, u_char *data, size_t datasize,
H A Dg_eli_key.c157 g_eli_mkey_encrypt(unsigned algo, const unsigned char *key, unsigned keylen, argument
176 error = g_eli_crypto_encrypt(algo, mkey, G_ELI_MKEYLEN, enckey, keylen);
/freebsd-10-stable/contrib/unbound/sldns/
H A Dkeyraw.h82 * \param[in] algo precise algorithm to initialize ECC group values.
85 EVP_PKEY* sldns_ecdsa2pkey_raw(unsigned char* key, size_t keylen, uint8_t algo);
H A Dkeyraw.c154 /* algo not found */
312 sldns_ecdsa2pkey_raw(unsigned char* key, size_t keylen, uint8_t algo) argument
319 if(algo == LDNS_ECDSAP256SHA256) {
322 } else if(algo == LDNS_ECDSAP384SHA384) {
/freebsd-10-stable/contrib/netbsd-tests/lib/libskey/
H A Dt_algorithms.c45 const char *algo, const char *zero,
52 skey_set_algorithm(algo);
44 h_check(const char *pass, const char *seed, const char *algo, const char *zero, const char *one, const char *nine) argument
/freebsd-10-stable/sys/crypto/aesni/
H A Daesni.h60 int algo; member in struct:aesni_session
H A Daesni.c249 ses->algo = encini->cri_alg;
479 if (ses->algo == CRYPTO_AES_CBC) {
482 } else /* if (ses->algo == CRYPTO_AES_XTS) */ {
493 if (ses->algo == CRYPTO_AES_CBC) {
496 } else /* if (ses->algo == CRYPTO_AES_XTS) */ {
H A Daesni_wrap.c337 switch (ses->algo) {
371 if (ses->algo == CRYPTO_AES_CBC)
373 else /* if (ses->algo == CRYPTO_AES_XTS) */ {
/freebsd-10-stable/crypto/openssl/apps/
H A Dts.c500 X509_ALGOR *algo = NULL; local
522 if (!(algo = X509_ALGOR_new()))
524 if (!(algo->algorithm = OBJ_nid2obj(EVP_MD_type(md))))
526 if (!(algo->parameter = ASN1_TYPE_new()))
528 algo->parameter->type = V_ASN1_NULL;
529 if (!TS_MSG_IMPRINT_set_algo(msg_imprint, algo))
565 X509_ALGOR_free(algo);
/freebsd-10-stable/contrib/ldns/ldns/
H A Ddnssec_verify.h614 * \param[in] algo Signing algorithm
620 uint8_t algo);
630 * \param[in] algo Signing algorithm
638 uint8_t algo);
/freebsd-10-stable/sys/net80211/
H A Dieee80211_hostap.c1645 int algo, int seq, int status)
1650 wh, NULL, "unsupported alg %d", algo);
1862 uint16_t algo, seq, status; local
1882 algo = le16toh(*(uint16_t *)frm);
1886 "recv auth frame with algorithm %d seq %d", algo, seq);
1909 if (algo == IEEE80211_AUTH_ALG_SHARED)
1912 else if (algo == IEEE80211_AUTH_ALG_OPEN)
1914 else if (algo == IEEE80211_AUTH_ALG_LEAP) {
1915 authalgreject(ni, wh, algo,
1928 authalgreject(ni, wh, algo,
1644 authalgreject(struct ieee80211_node *ni, const struct ieee80211_frame *wh, int algo, int seq, int status) argument
[all...]
H A Dieee80211_sta.c1479 uint16_t algo, seq, status; local
1488 algo = le16toh(*(uint16_t *)frm);
1492 "recv auth frame with algorithm %d seq %d", algo, seq);
1506 if (algo == IEEE80211_AUTH_ALG_SHARED)
1509 else if (algo == IEEE80211_AUTH_ALG_OPEN)
1513 wh, "auth", "unsupported alg %d", algo);
/freebsd-10-stable/lib/libfetch/
H A Dhttp.c637 char *algo; member in struct:__anon595
646 b->realm = b->qop = b->nonce = b->opaque = b->algo = NULL;
661 if (b->algo)
662 free(b->algo);
825 cs->challenges[cs->count]->algo =
1261 if (!c->algo)
1262 c->algo = strdup("");
1265 *c->algo? ",algorithm=" : "", c->algo,
1281 DigestCalcHA1(c->algo, parm
[all...]

Completed in 237 milliseconds

12