Searched refs:alg (Results 1 - 25 of 243) sorted by relevance

12345678910

/netbsd-6-1-5-RELEASE/sys/net/npf/
H A Dnpf_alg.c87 npf_alg_t *alg; local
89 alg = kmem_zalloc(sizeof(npf_alg_t), KM_SLEEP);
90 alg->na_bptr = alg;
91 alg->na_match_func = mfunc;
92 alg->na_tr_func = tfunc;
93 alg->na_se_func = sfunc;
96 LIST_INSERT_HEAD(&nat_alg_list, alg, na_entry);
99 return alg;
106 npf_alg_unregister(npf_alg_t *alg) argument
114 npf_ruleset_freealg(npf_config_natset(), alg); local
127 npf_alg_t *alg; local
150 npf_alg_t *alg; local
168 npf_alg_t *alg; local
[all...]
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/bin/confgen/
H A Dkeygen.h30 void generate_key(isc_mem_t *mctx, const char *randomfile, dns_secalg_t alg,
35 dns_secalg_t alg);
37 const char *alg_totext(dns_secalg_t alg);
39 int alg_bits(dns_secalg_t alg);
H A Dkeygen.c50 alg_totext(dns_secalg_t alg) { argument
51 switch (alg) {
93 alg_bits(dns_secalg_t alg) { argument
94 switch (alg) {
117 generate_key(isc_mem_t *mctx, const char *randomfile, dns_secalg_t alg, argument
129 switch (alg) {
141 fatal("unsupported algorithm %d\n", alg);
160 DO("generate key", dst_key_generate(dns_rootname, alg,
196 dns_secalg_t alg) {
198 const char *algname = alg_totext(alg);
194 write_key_file(const char *keyfile, const char *user, const char *keyname, isc_buffer_t *secret, dns_secalg_t alg) argument
[all...]
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/otp/
H A Dotptest.c45 OtpAlgorithm *alg)
56 if (otp_parse (key2, buf, alg)) {
71 char *alg; member in struct:test
118 for(t = tests; t->alg; ++t) {
120 OtpAlgorithm *alg = otp_find_alg (t->alg); local
123 if (alg == NULL) {
124 printf ("Could not find alg %s\n", t->alg);
127 if(alg
43 test_one(OtpKey key1, char *name, char *val, void (*print)(OtpKey,char*, size_t), OtpAlgorithm *alg) argument
[all...]
H A Dotp_parse.c92 OtpAlgorithm *alg = (OtpAlgorithm *)a; local
94 unsigned char *res = malloc(alg->hashsize);
98 alg->hash (s, strlen(s), res);
99 ret = (unsigned)(res[alg->hashsize - 1]) |
100 ((res[alg->hashsize - 2] & 0x03) << 8);
143 OtpAlgorithm *alg,
148 if (parse_words (wn, str, convert, alg))
163 otp_parse_altdict (OtpKey key, const char *str, OtpAlgorithm *alg) argument
165 return otp_parse_internal (key, str, alg, get_altword);
196 otp_parse (OtpKey key, const char *s, OtpAlgorithm *alg) argument
142 otp_parse_internal(OtpKey key, const char *str, OtpAlgorithm *alg, int (*convert)(const char *, void *)) argument
[all...]
H A Dotp_verify.c48 if (otp_parse (key1, passwd, ctx->alg)) {
53 ctx->alg->next (key2);
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/crypto/asn1/
H A Dx_algor.c80 int X509_ALGOR_set0(X509_ALGOR *alg, ASN1_OBJECT *aobj, int ptype, void *pval)
82 if (!alg)
86 if (alg->parameter == NULL)
87 alg->parameter = ASN1_TYPE_new();
88 if (alg->parameter == NULL)
91 if (alg)
93 if (alg->algorithm)
94 ASN1_OBJECT_free(alg->algorithm);
95 alg->algorithm = aobj;
101 if (alg
[all...]
H A Dp5_pbe.c77 int PKCS5_pbe_set0_algor(X509_ALGOR *algor, int alg, int iter,
119 if (X509_ALGOR_set0(algor, OBJ_nid2obj(alg), V_ASN1_SEQUENCE, pbe_str))
132 X509_ALGOR *PKCS5_pbe_set(int alg, int iter,
143 if (PKCS5_pbe_set0_algor(ret, alg, iter, salt, saltlen))
/netbsd-6-1-5-RELEASE/external/lgpl3/gmp/dist/
H A Drand.c36 gmp_randalg_t alg,
45 va_start (ap, alg);
48 gmp_randalg_t alg; local
51 alg = va_arg (ap, gmp_randalg_t);
54 switch (alg) {
35 gmp_randinit(gmp_randstate_t rstate, gmp_randalg_t alg, ...) argument
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/test/
H A Dtest_padlock28 for alg in $ACE_ALGS; do
29 echo $alg
31 $PROG enc -e -k "$HASH" -$alg -bufsize 999 -engine padlock | \
32 $PROG enc -d -k "$HASH" -$alg | \
35 echo "-$alg encrypt test failed"
39 $PROG enc -e -k "$HASH" -$alg | \
40 $PROG enc -d -k "$HASH" -$alg -bufsize 999 -engine padlock | \
43 echo "-$alg decrypt test failed"
47 $PROG enc -e -k "$HASH" -$alg -engine padlock | \
48 $PROG enc -d -k "$HASH" -$alg
[all...]
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/crypto/engine/
H A Deng_fat.c103 static int int_def_cb(const char *alg, int len, void *arg) argument
106 if (!strncmp(alg, "ALL", len))
108 else if (!strncmp(alg, "RSA", len))
110 else if (!strncmp(alg, "DSA", len))
112 else if (!strncmp(alg, "ECDH", len))
114 else if (!strncmp(alg, "ECDSA", len))
116 else if (!strncmp(alg, "DH", len))
118 else if (!strncmp(alg, "RAND", len))
120 else if (!strncmp(alg, "CIPHERS", len))
122 else if (!strncmp(alg, "DIGEST
[all...]
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/contrib/
H A Dcheck-secure-delegation.pl.in101 foreach $alg ( keys %dnskeyalg ) {
102 print "Missing $zone DNSKEY RRSIG for algorithm $alg\n"
103 if (!exists($dnskeygood{$alg}));
109 foreach $alg ( keys %algorithms ) {
110 if (exists($dsgood{$alg})) {
111 print "$zone algorithm $alg good " .
114 print "$zone algorithm $alg bad " .
/netbsd-6-1-5-RELEASE/external/lgpl3/gmp/dist/tests/cxx/
H A Dt-rand.cc63 gmp_randalg_t alg = GMP_RAND_ALG_LC; local
65 gmp_randclass r(alg, m2exp);
68 gmp_randalg_t alg = GMP_RAND_ALG_DEFAULT; local
70 gmp_randclass r(alg, m2exp);
73 gmp_randalg_t alg = (gmp_randalg_t) 0; local
75 gmp_randclass r(alg, m2exp);
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/crypto/pkcs7/
H A Dpk7_attr.c99 X509_ALGOR *alg; local
101 if(!(alg = X509_ALGOR_new())) {
105 ASN1_OBJECT_free(alg->algorithm);
106 alg->algorithm = OBJ_nid2obj (nid);
109 if(!(alg->parameter = ASN1_TYPE_new())) {
121 alg->parameter->value.integer = nbit;
122 alg->parameter->type = V_ASN1_INTEGER;
124 sk_X509_ALGOR_push (sk, alg);
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/lib/dns/include/dns/
H A Dsecalg.h73 dns_secalg_format(dns_secalg_t alg, char *cp, unsigned int size);
/netbsd-6-1-5-RELEASE/sys/crypto/rijndael/
H A Drijndael.h5 * rijndael-alg-fst.h
33 #include <crypto/rijndael/rijndael-alg-fst.h>
/netbsd-6-1-5-RELEASE/regress/sys/crypto/rijndael/
H A DMakefile7 SRCS= rijndaeltest.c rijndael-alg-fst.c rijndael-api-fst.c
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/gssapi/netlogon/
H A Dacquire_cred.c135 uint16_t alg; local
151 alg = (p[0] << 0) | (p[1] << 8);
153 if (alg != NL_SIGN_ALG_HMAC_MD5 && alg != NL_SIGN_ALG_SHA256) {
158 cred->SignatureAlgorithm = alg;
159 if (alg == NL_SIGN_ALG_SHA256)
/netbsd-6-1-5-RELEASE/sys/netipsec/
H A Dxform.h116 extern const struct auth_hash *ah_algorithm_lookup(int alg);
120 extern const struct enc_xform *esp_algorithm_lookup(int alg);
124 extern const struct comp_algo *ipcomp_algorithm_lookup(int alg);
/netbsd-6-1-5-RELEASE/sys/dev/pci/n8/common/api/
H A Dn8_hash.h67 * 09/08/01 spm IKE APIs: Swapped order of alg and hashInfo args.
137 const N8_HashAlgorithm_t alg,
140 const N8_HashAlgorithm_t alg,
143 const N8_HashAlgorithm_t alg,
/netbsd-6-1-5-RELEASE/external/bsd/bind/dist/bin/tests/dst/
H A Ddst_test.c140 io(dns_name_t *name, int id, int alg, int type, isc_mem_t *mctx) { argument
144 ret = dst_key_fromfile(name, id, alg, type, current, mctx, &key);
145 printf("read(%d) returned: %s\n", alg, isc_result_totext(ret));
149 printf("write(%d) returned: %s\n", alg, isc_result_totext(ret));
164 int alg = DST_ALG_DH; local
167 ret = dst_key_fromfile(name1, id1, alg, type, current, mctx, &key1);
168 printf("read(%d) returned: %s\n", alg, isc_result_totext(ret));
171 ret = dst_key_fromfile(name2, id2, alg, type, current, mctx, &key2);
172 printf("read(%d) returned: %s\n", alg, isc_result_totext(ret));
177 printf("write(%d) returned: %s\n", alg, isc_result_totex
218 generate(int alg, isc_mem_t *mctx) argument
[all...]
/netbsd-6-1-5-RELEASE/sys/dev/pci/n8/include_public/
H A Dn8_pub_hash.h114 const N8_HashAlgorithm_t alg,
162 N8_Status_t N8_IKEPrf(const N8_HashAlgorithm_t alg,
169 N8_Status_t N8_IKESKEYIDExpand (const N8_HashAlgorithm_t alg,
178 N8_Status_t N8_IKEKeyMaterialExpand(const N8_HashAlgorithm_t alg,
186 N8_Status_t N8_IKEEncryptKeyExpand(const N8_HashAlgorithm_t alg,
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/crypto/ocsp/
H A Docsp_lib.c106 X509_ALGOR *alg; local
112 alg = cid->hashAlgorithm;
113 if (alg->algorithm != NULL) ASN1_OBJECT_free(alg->algorithm);
119 if (!(alg->algorithm=OBJ_nid2obj(nid))) goto err;
120 if ((alg->parameter=ASN1_TYPE_new()) == NULL) goto err;
121 alg->parameter->type=V_ASN1_NULL;
/netbsd-6-1-5-RELEASE/dist/dhcp/dst/
H A Ddst_api.c26 * int dst_check_algorithm() Function to determines if alg is suppored.
76 static DST_KEY *dst_s_get_key_struct(const char *name, const int alg,
140 * alg 1 KEY_RSA
149 dst_check_algorithm(const int alg) argument
151 return (dst_t_func[alg] != NULL);
160 * alg: the algorithm number
169 dst_s_get_key_struct(const char *name, const int alg, const u_int32_t flags, argument
174 if (dst_check_algorithm(alg)) /* make sure alg is available */
181 new_key->dk_alg = alg;
471 int proto, alg, dlen; local
655 int alg ; local
767 dst_buffer_to_key(const char *key_name, const int alg, const unsigned flags, const int protocol, const u_char *key_buf, const unsigned key_len) argument
831 int cnt, alg, len, major, minor, file_major, file_minor; local
954 dst_generate_key(const char *name, const int bits, const int exp, const unsigned flags, const int protocol, const int alg) argument
[all...]
/netbsd-6-1-5-RELEASE/external/bsd/libbind/dist/dst/
H A Ddst_api.c28 * int dst_check_algorithm() Function to determines if alg is suppored.
79 static DST_KEY *dst_s_get_key_struct(const char *name, const int alg,
134 * alg 1 KEY_RSA
143 dst_check_algorithm(const int alg) argument
145 return (dst_t_func[alg] != NULL);
154 * alg: the algorithm number
163 dst_s_get_key_struct(const char *name, const int alg, const int flags, argument
168 if (dst_check_algorithm(alg)) /*%< make sure alg is available */
179 new_key->dk_alg = alg;
467 int flags, proto, alg, len, dlen; local
648 int alg ; local
759 dst_buffer_to_key(const char *key_name, const int alg, const int flags, const int protocol, const u_char *key_buf, const int key_len) argument
825 int cnt, alg, len, major, minor, file_major, file_minor; local
953 dst_generate_key(const char *name, const int bits, const int exp, const int flags, const int protocol, const int alg) argument
[all...]

Completed in 580 milliseconds

12345678910