Searched refs:algo (Results 1 - 25 of 70) sorted by relevance

123

/openbsd-current/regress/usr.bin/ssh/
H A Dhostbased.sh51 for algo in $algos; do
52 trace "hostbased algo $algo"
54 if [ "x$algo" != "xdefault" ]; then
55 opts="$opts -oHostbasedAcceptedAlgorithms=$algo"
59 fail "connect failed, hostbased algo $algo"
61 fail "hostbased algo $algo bad SSH_CONNECTION" \
64 verbose "ok hostbased algo
[all...]
/openbsd-current/regress/lib/libskey/
H A Dskeytest.c41 char *algo, *zero, *one, *nine; member in struct:regRes
89 for(rr = rp->res; rr->algo; rr++) {
90 if (skey_set_algorithm(rr->algo) == NULL) {
93 i, rr->algo);
97 if (strcmp(skey_get_algorithm(), rr->algo) != 0) {
100 i, rr->algo);
110 i, rr->algo, rr->zero, prn);
119 i, rr->algo, rr->one, prn);
129 i, rr->algo, rr->nine, prn);
/openbsd-current/usr.sbin/unbound/validator/
H A Dval_secalgo.h54 * @param algo: nsec3 hash algorithm.
60 int secalgo_nsec3_hash(int algo, unsigned char* buf, size_t len,
115 * @param algo: DS digest algo.
118 size_t ds_digest_size_supported(int algo);
121 * @param algo: the DS digest algo
127 int secalgo_ds_digest(int algo, unsigned char* buf, size_t len,
137 * @param algo: DNSKEY algorithm.
146 enum sec_status verify_canonrrset(struct sldns_buffer* buf, int algo,
[all...]
H A Dval_secalgo.c131 secalgo_nsec3_hash(int algo, unsigned char* buf, size_t len, argument
134 switch(algo) {
226 * @param algo: DS digest algo.
230 ds_digest_size_supported(int algo) argument
232 switch(algo) {
278 secalgo_ds_digest(int algo, unsigned char* buf, size_t len, argument
281 switch(algo) {
323 algo);
537 * @param algo
545 setup_key_digest(int algo, EVP_PKEY** evp_key, const EVP_MD** digest_type, unsigned char* key, size_t keylen) argument
732 verify_canonrrset(sldns_buffer* buf, int algo, unsigned char* sigblock, unsigned int sigblock_len, unsigned char* key, unsigned int keylen, char** reason) argument
870 secalgo_nsec3_hash(int algo, unsigned char* buf, size_t len, unsigned char* res) argument
947 ds_digest_size_supported(int algo) argument
971 secalgo_ds_digest(int algo, unsigned char* buf, size_t len, unsigned char* res) argument
1059 nss_buf2ecdsa(unsigned char* key, size_t len, int algo) argument
1235 nss_setup_key_digest(int algo, SECKEYPublicKey** pubkey, HASH_HashType* htype, unsigned char* key, size_t keylen, unsigned char** prefix, size_t* prefixlen) argument
1375 verify_canonrrset(sldns_buffer* buf, int algo, unsigned char* sigblock, unsigned int sigblock_len, unsigned char* key, unsigned int keylen, char** reason) argument
1500 _digest_nettle(int algo, uint8_t* buf, size_t len, unsigned char* res) argument
1556 secalgo_nsec3_hash(int algo, unsigned char* buf, size_t len, unsigned char* res) argument
1656 ds_digest_size_supported(int algo) argument
1683 secalgo_ds_digest(int algo, unsigned char* buf, size_t len, unsigned char* res) argument
2023 verify_canonrrset(sldns_buffer* buf, int algo, unsigned char* sigblock, unsigned int sigblock_len, unsigned char* key, unsigned int keylen, char** reason) argument
[all...]
H A Dval_kentry.c62 if(kd->algo)
63 s += strlen((char*)kd->algo)+1;
97 free(kd->algo);
143 if(d->algo) {
144 newd->algo = (uint8_t*)regional_strdup(region,
145 (char*)d->algo);
146 if(!newd->algo)
205 if(d->algo) {
206 newd->algo = (uint8_t*)strdup((char*)d->algo);
391 int algo; local
[all...]
H A Dval_sigcrypt.c127 * @return algo or 0 if malformed rrsig.
340 verbose(VERB_QUERY, "DS fail: DS RR algo and digest do not "
353 return 0; /* digest algo failed */
439 uint8_t algo; local
444 algo = (uint8_t)dnskey_get_algo(dnskey, i);
445 if(!dnskey_algo_id_is_supported((int)algo))
447 if(n->needs[algo] == 0) {
448 n->needs[algo] = 1;
449 sigalg[total] = algo;
459 uint8_t algo; local
475 uint8_t algo; local
497 algo_needs_set_secure(struct algo_needs* n, uint8_t algo) argument
508 algo_needs_set_bogus(struct algo_needs* n, uint8_t algo) argument
566 int algo = rrset_get_sig_algo(rrset, sig_idx); local
715 int algo = dnskey_get_algo(dnskey, dnskey_idx); local
[all...]
H A Dval_sigcrypt.h76 * Initialize algo needs structure, set algos from rrset as needed.
86 * Initialize algo needs structure from a signalled algo list.
93 * Initialize algo needs structure, set algos from rrset as needed.
96 * @param fav_ds_algo: filter to use only this DS algo.
106 * @param algo: the algorithm processed to be secure.
109 int algo_needs_set_secure(struct algo_needs* n, uint8_t algo);
115 * @param algo: the algorithm processed to be bogus.
117 void algo_needs_set_bogus(struct algo_needs* n, uint8_t algo);
127 * See which algo i
[all...]
H A Dval_nsec3.h351 * @param algo: nsec3 hash algo.
355 * @return 0 if bad formatted, unknown nsec3 hash algo, or unknown flags set.
358 int* algo, size_t* iter, uint8_t** salt, size_t* saltlen);
365 * @param algo: algo to use, must be known.
374 int algo, size_t iter, uint8_t* salt, size_t saltlen, uint8_t* res,
H A Dval_kentry.h87 uint8_t* algo; member in struct:key_entry_data
H A Dval_nsec3.c223 int* algo, size_t* iter, uint8_t** salt, size_t* saltlen)
229 *algo = nsec3_get_algo(rrset, r);
364 /* skip unknown flags, algo */
393 /** see if at least one RR is known (flags, algo) */
408 * (skips the unknown flag and unknown algo NSEC3s).
435 /* skip unknown flags, algo */
560 nsec3_get_hashed(sldns_buffer* buf, uint8_t* nm, size_t nmlen, int algo, argument
570 hash_len = nsec3_hash_algo_size_supported(algo);
572 log_err("nsec3 hash of unknown algo %d", algo);
222 nsec3_get_params(struct ub_packed_rrset_key* rrset, int r, int* algo, size_t* iter, uint8_t** salt, size_t* saltlen) argument
598 int algo = nsec3_get_algo(c->nsec3, c->rr); local
[all...]
/openbsd-current/sbin/unwind/libunbound/validator/
H A Dval_secalgo.h54 * @param algo: nsec3 hash algorithm.
60 int secalgo_nsec3_hash(int algo, unsigned char* buf, size_t len,
115 * @param algo: DS digest algo.
118 size_t ds_digest_size_supported(int algo);
121 * @param algo: the DS digest algo
127 int secalgo_ds_digest(int algo, unsigned char* buf, size_t len,
137 * @param algo: DNSKEY algorithm.
146 enum sec_status verify_canonrrset(struct sldns_buffer* buf, int algo,
[all...]
H A Dval_secalgo.c131 secalgo_nsec3_hash(int algo, unsigned char* buf, size_t len, argument
134 switch(algo) {
226 * @param algo: DS digest algo.
230 ds_digest_size_supported(int algo) argument
232 switch(algo) {
278 secalgo_ds_digest(int algo, unsigned char* buf, size_t len, argument
281 switch(algo) {
323 algo);
537 * @param algo
545 setup_key_digest(int algo, EVP_PKEY** evp_key, const EVP_MD** digest_type, unsigned char* key, size_t keylen) argument
732 verify_canonrrset(sldns_buffer* buf, int algo, unsigned char* sigblock, unsigned int sigblock_len, unsigned char* key, unsigned int keylen, char** reason) argument
870 secalgo_nsec3_hash(int algo, unsigned char* buf, size_t len, unsigned char* res) argument
947 ds_digest_size_supported(int algo) argument
971 secalgo_ds_digest(int algo, unsigned char* buf, size_t len, unsigned char* res) argument
1059 nss_buf2ecdsa(unsigned char* key, size_t len, int algo) argument
1235 nss_setup_key_digest(int algo, SECKEYPublicKey** pubkey, HASH_HashType* htype, unsigned char* key, size_t keylen, unsigned char** prefix, size_t* prefixlen) argument
1375 verify_canonrrset(sldns_buffer* buf, int algo, unsigned char* sigblock, unsigned int sigblock_len, unsigned char* key, unsigned int keylen, char** reason) argument
1500 _digest_nettle(int algo, uint8_t* buf, size_t len, unsigned char* res) argument
1556 secalgo_nsec3_hash(int algo, unsigned char* buf, size_t len, unsigned char* res) argument
1656 ds_digest_size_supported(int algo) argument
1683 secalgo_ds_digest(int algo, unsigned char* buf, size_t len, unsigned char* res) argument
2023 verify_canonrrset(sldns_buffer* buf, int algo, unsigned char* sigblock, unsigned int sigblock_len, unsigned char* key, unsigned int keylen, char** reason) argument
[all...]
H A Dval_kentry.c62 if(kd->algo)
63 s += strlen((char*)kd->algo)+1;
97 free(kd->algo);
143 if(d->algo) {
144 newd->algo = (uint8_t*)regional_strdup(region,
145 (char*)d->algo);
146 if(!newd->algo)
205 if(d->algo) {
206 newd->algo = (uint8_t*)strdup((char*)d->algo);
391 int algo; local
[all...]
H A Dval_sigcrypt.c127 * @return algo or 0 if malformed rrsig.
340 verbose(VERB_QUERY, "DS fail: DS RR algo and digest do not "
353 return 0; /* digest algo failed */
439 uint8_t algo; local
444 algo = (uint8_t)dnskey_get_algo(dnskey, i);
445 if(!dnskey_algo_id_is_supported((int)algo))
447 if(n->needs[algo] == 0) {
448 n->needs[algo] = 1;
449 sigalg[total] = algo;
459 uint8_t algo; local
475 uint8_t algo; local
497 algo_needs_set_secure(struct algo_needs* n, uint8_t algo) argument
508 algo_needs_set_bogus(struct algo_needs* n, uint8_t algo) argument
566 int algo = rrset_get_sig_algo(rrset, sig_idx); local
715 int algo = dnskey_get_algo(dnskey, dnskey_idx); local
[all...]
H A Dval_sigcrypt.h76 * Initialize algo needs structure, set algos from rrset as needed.
86 * Initialize algo needs structure from a signalled algo list.
93 * Initialize algo needs structure, set algos from rrset as needed.
96 * @param fav_ds_algo: filter to use only this DS algo.
106 * @param algo: the algorithm processed to be secure.
109 int algo_needs_set_secure(struct algo_needs* n, uint8_t algo);
115 * @param algo: the algorithm processed to be bogus.
117 void algo_needs_set_bogus(struct algo_needs* n, uint8_t algo);
127 * See which algo i
[all...]
H A Dval_nsec3.h351 * @param algo: nsec3 hash algo.
355 * @return 0 if bad formatted, unknown nsec3 hash algo, or unknown flags set.
358 int* algo, size_t* iter, uint8_t** salt, size_t* saltlen);
365 * @param algo: algo to use, must be known.
374 int algo, size_t iter, uint8_t* salt, size_t saltlen, uint8_t* res,
H A Dval_kentry.h87 uint8_t* algo; member in struct:key_entry_data
H A Dval_nsec3.c223 int* algo, size_t* iter, uint8_t** salt, size_t* saltlen)
229 *algo = nsec3_get_algo(rrset, r);
364 /* skip unknown flags, algo */
393 /** see if at least one RR is known (flags, algo) */
408 * (skips the unknown flag and unknown algo NSEC3s).
435 /* skip unknown flags, algo */
560 nsec3_get_hashed(sldns_buffer* buf, uint8_t* nm, size_t nmlen, int algo, argument
570 hash_len = nsec3_hash_algo_size_supported(algo);
572 log_err("nsec3 hash of unknown algo %d", algo);
222 nsec3_get_params(struct ub_packed_rrset_key* rrset, int r, int* algo, size_t* iter, uint8_t** salt, size_t* saltlen) argument
598 int algo = nsec3_get_algo(c->nsec3, c->rr); local
[all...]
/openbsd-current/usr.bin/skey/
H A Dskey.c43 char buf[33], *seed, *slash, *algo; local
51 algo = __progname + 4;
52 if (skey_set_algorithm(algo) == NULL)
53 errx(1, "Unknown hash algorithm %s", algo);
/openbsd-current/usr.sbin/unbound/sldns/
H A Dkeyraw.h92 * \param[in] algo precise algorithm to initialize ECC group values.
95 EVP_PKEY* sldns_ecdsa2pkey_raw(unsigned char* key, size_t keylen, uint8_t algo);
H A Dkeyraw.c175 /* algo not found */
560 sldns_ecdsa2pkey_raw(unsigned char* key, size_t keylen, uint8_t algo) argument
571 if(algo == LDNS_ECDSAP256SHA256) {
574 } else if(algo == LDNS_ECDSAP384SHA384) {
623 if(algo == LDNS_ECDSAP256SHA256) {
626 } else if(algo == LDNS_ECDSAP384SHA384) {
/openbsd-current/sbin/unwind/libunbound/sldns/
H A Dkeyraw.h92 * \param[in] algo precise algorithm to initialize ECC group values.
95 EVP_PKEY* sldns_ecdsa2pkey_raw(unsigned char* key, size_t keylen, uint8_t algo);
H A Dkeyraw.c175 /* algo not found */
560 sldns_ecdsa2pkey_raw(unsigned char* key, size_t keylen, uint8_t algo) argument
571 if(algo == LDNS_ECDSAP256SHA256) {
574 } else if(algo == LDNS_ECDSAP384SHA384) {
623 if(algo == LDNS_ECDSAP256SHA256) {
626 } else if(algo == LDNS_ECDSAP384SHA384) {
/openbsd-current/sys/dev/pci/drm/i915/display/
H A Dintel_gmbus.c31 #include <linux/i2c-algo-bit.h>
438 struct i2c_algo_bit_data *algo; local
440 algo = &bus->bit_algo;
443 bus->adapter.algo_data = algo;
445 algo->setsda = set_data;
446 algo->setscl = set_clock;
447 algo->getsda = get_data;
448 algo->getscl = get_clock;
449 algo->pre_xfer = intel_gpio_pre_xfer;
450 algo
[all...]
/openbsd-current/sys/dev/pci/drm/include/linux/
H A Di2c.h65 const struct i2c_algorithm *algo; member in struct:i2c_adapter

Completed in 247 milliseconds

123