/freebsd-9.3-release/crypto/openssl/ssl/ |
H A D | s3_clnt.c | 1014 printf("cipher, alg, nc = %s, %lx, %d\n", s->s3->tmp.new_cipher->name, 1083 long i, param_len, n, alg; local 1111 alg = s->s3->tmp.new_cipher->algorithms; 1119 if (alg & (SSL_kEDH | SSL_kECDHE)) { 1158 if (alg & SSL_kRSA) { 1211 if (alg & SSL_aRSA) 1226 else if (alg & SSL_kEDH) { 1293 if (alg & SSL_aRSA) 1301 else if (alg & SSL_aDSS) 1311 } else if ((alg [all...] |
H A D | ssl_lib.c | 1925 unsigned long alg = cs->algorithms; local 1945 if (alg & SSL_kECDH) { 1950 if (alg & SSL_aECDSA) { 1951 /* signature alg must be ECDSA */ 1956 if (alg & SSL_aRSA) { 1957 /* signature alg must be RSA */ 1964 } else if (alg & SSL_aECDSA) { 1977 unsigned long alg, kalg; local 1983 alg = s->s3->tmp.new_cipher->algorithms; 1984 kalg = alg 2032 unsigned long alg; local [all...] |
H A D | ssl_ciph.c | 1108 unsigned long alg, alg2; local 1117 alg = cipher->algorithms; 1125 if (alg & SSL_SSLV2) 1127 else if (alg & SSL_SSLV3) 1132 switch (alg & SSL_MKEY_MASK) { 1160 switch (alg & SSL_AUTH_MASK) { 1186 switch (alg & SSL_ENC_MASK) { 1247 switch (alg & SSL_MAC_MASK) { 1269 exp_str, alg);
|
H A D | s3_lib.c | 2301 unsigned long alg, mask, emask; local 2346 printf("ssl3_choose_cipher %d alg= %lx\n", i, c->algorithms); 2349 alg = c->algorithms & (SSL_MKEY_MASK | SSL_AUTH_MASK); 2351 if (alg & SSL_KRB5) { 2357 ok = ((alg & emask) == alg) ? 1 : 0; 2359 printf("%d:[%08lX:%08lX]%p:%s (export)\n", ok, alg, emask, 2363 ok = ((alg & mask) == alg) ? 1 : 0; 2365 printf("%d:[%08lX:%08lX]%p:%s\n", ok, alg, mas 2391 unsigned long alg; local [all...] |
/freebsd-9.3-release/contrib/bind9/lib/dns/ |
H A D | resolver.c | 8903 unsigned int alg) 8912 if (alg > 255) 8925 len = alg/8 + 2; 8926 mask = 1 << (alg%8); 8960 unsigned int alg) 8973 if ((alg == DST_ALG_DH) || (alg == DST_ALG_INDIRECT)) 8983 len = alg/8 + 2; 8984 mask = 1 << (alg%8); 8996 return (dst_algorithm_supported(alg)); 8902 dns_resolver_disable_algorithm(dns_resolver_t *resolver, dns_name_t *name, unsigned int alg) argument 8959 dns_resolver_algorithm_supported(dns_resolver_t *resolver, dns_name_t *name, unsigned int alg) argument [all...] |
/freebsd-9.3-release/crypto/openssl/fips/hmac/ |
H A D | fips_hmac_selftest.c | 57 const EVP_MD *(*alg) (void); member in struct:__anon145 123 md = (*t->alg) ();
|
/freebsd-9.3-release/crypto/openssl/crypto/ |
H A D | crypto.h | 588 # define FIPS_ERROR_IGNORED(alg) OpenSSLDie(__FILE__, __LINE__, \ 589 alg " previous FIPS forbidden algorithm error ignored"); 591 # define FIPS_BAD_ABORT(alg) OpenSSLDie(__FILE__, __LINE__, \ 592 #alg " Algorithm forbidden in FIPS mode"); 595 # define FIPS_BAD_ALGORITHM(alg) FIPS_BAD_ABORT(alg) 597 # define FIPS_BAD_ALGORITHM(alg) \ 600 ERR_add_error_data(2, "Algorithm=", #alg); \ 607 # define FIPS_NON_FIPS_MD_Init(alg) \ 608 int alg##_Ini [all...] |
/freebsd-9.3-release/crypto/openssl/crypto/x509/ |
H A D | x509.h | 748 int X509_signature_print(BIO *bp, X509_ALGOR *alg, ASN1_STRING *sig); 851 int X509_ALGOR_set0(X509_ALGOR *alg, ASN1_OBJECT *aobj, int ptype, 1253 X509_ALGOR *PKCS5_pbe_set(int alg, int iter, unsigned char *salt,
|
/freebsd-9.3-release/crypto/openssl/engines/ |
H A D | e_capi.c | 756 ALG_ID alg; local 776 alg = CALG_SHA1; 780 alg = CALG_MD5; 784 alg = CALG_SSL3_SHAMD5; 797 if (!CryptCreateHash(capi_key->hprov, alg, 0, 0, &hash)) {
|
/freebsd-9.3-release/crypto/openssl/crypto/pkcs7/ |
H A D | pk7_doit.c | 104 static int PKCS7_bio_add_digest(BIO **pbio, X509_ALGOR *alg) argument 113 md = EVP_get_digestbyobj(alg->algorithm);
|
H A D | pk7_lib.c | 239 X509_ALGOR *alg; local 263 alg = sk_X509_ALGOR_value(md_sk, i); 264 if (OBJ_obj2nid(alg->algorithm) == nid) { 270 if (!(alg = X509_ALGOR_new()) 271 || !(alg->parameter = ASN1_TYPE_new())) { 272 X509_ALGOR_free(alg); 276 alg->algorithm = OBJ_nid2obj(nid); 277 alg->parameter->type = V_ASN1_NULL; 278 if (!sk_X509_ALGOR_push(md_sk, alg)) { 279 X509_ALGOR_free(alg); [all...] |
H A D | pk7_attr.c | 116 X509_ALGOR *alg; local 118 if (!(alg = X509_ALGOR_new())) { 122 ASN1_OBJECT_free(alg->algorithm); 123 alg->algorithm = OBJ_nid2obj(nid); 126 if (!(alg->parameter = ASN1_TYPE_new())) { 138 alg->parameter->value.integer = nbit; 139 alg->parameter->type = V_ASN1_INTEGER; 141 sk_X509_ALGOR_push(sk, alg);
|
/freebsd-9.3-release/crypto/openssl/crypto/ocsp/ |
H A D | ocsp_lib.c | 105 X509_ALGOR *alg; local 112 alg = cid->hashAlgorithm; 113 if (alg->algorithm != NULL) 114 ASN1_OBJECT_free(alg->algorithm); 119 if (!(alg->algorithm = OBJ_nid2obj(nid))) 121 if ((alg->parameter = ASN1_TYPE_new()) == NULL) 123 alg->parameter->type = V_ASN1_NULL;
|
/freebsd-9.3-release/crypto/openssl/crypto/pkcs12/ |
H A D | p12_npas.c | 73 static int alg_get(X509_ALGOR *alg, int *pnid, int *piter, int *psaltlen); 221 static int alg_get(X509_ALGOR *alg, int *pnid, int *piter, int *psaltlen) argument 226 p = alg->parameter->value.sequence->data; 227 pbe = d2i_PBEPARAM(NULL, &p, alg->parameter->value.sequence->length); 230 *pnid = OBJ_obj2nid(alg->algorithm);
|
/freebsd-9.3-release/crypto/openssl/crypto/engine/ |
H A D | eng_fat.c | 97 static int int_def_cb(const char *alg, int len, void *arg) argument 100 if (!strncmp(alg, "ALL", len)) 102 else if (!strncmp(alg, "RSA", len)) 104 else if (!strncmp(alg, "DSA", len)) 106 else if (!strncmp(alg, "ECDH", len)) 108 else if (!strncmp(alg, "ECDSA", len)) 110 else if (!strncmp(alg, "DH", len)) 112 else if (!strncmp(alg, "RAND", len)) 114 else if (!strncmp(alg, "CIPHERS", len)) 116 else if (!strncmp(alg, "DIGEST [all...] |
/freebsd-9.3-release/crypto/openssl/crypto/asn1/ |
H A D | p5_pbe.c | 77 X509_ALGOR *PKCS5_pbe_set(int alg, int iter, unsigned char *salt, int saltlen) 120 al = OBJ_nid2obj(alg); /* never need to free al */
|
H A D | x_algor.c | 81 int X509_ALGOR_set0(X509_ALGOR *alg, ASN1_OBJECT *aobj, int ptype, void *pval) 83 if (!alg) 86 if (alg->parameter == NULL) 87 alg->parameter = ASN1_TYPE_new(); 88 if (alg->parameter == NULL) 91 if (alg) { 92 if (alg->algorithm) 93 ASN1_OBJECT_free(alg->algorithm); 94 alg->algorithm = aobj; 99 if (alg [all...] |
/freebsd-9.3-release/crypto/openssl/crypto/cms/ |
H A D | cms_lcl.h | 412 void cms_DigestAlgorithm_set(X509_ALGOR *alg, const EVP_MD *md);
|
H A D | cms_sd.c | 282 X509_ALGOR *alg; local 332 alg = sk_X509_ALGOR_value(sd->digestAlgorithms, i); 333 X509_ALGOR_get0(&aoid, NULL, NULL, alg); 339 alg = X509_ALGOR_new(); 340 if (!alg) 342 cms_DigestAlgorithm_set(alg, md); 343 if (!sk_X509_ALGOR_push(sd->digestAlgorithms, alg)) { 344 X509_ALGOR_free(alg); 880 X509_ALGOR *alg; local 887 alg [all...] |
H A D | cms_lib.c | 337 void cms_DigestAlgorithm_set(X509_ALGOR *alg, const EVP_MD *md) argument 355 X509_ALGOR_set0(alg, OBJ_nid2obj(EVP_MD_type(md)), param_type, NULL);
|
/freebsd-9.3-release/crypto/openssl/apps/ |
H A D | speed.c | 287 static void print_result(int alg, int run_no, int count, double time_used); 2646 static void print_result(int alg, int run_no, int count, double time_used) argument 2650 : "%d %s's in %.2fs\n", count, names[alg], time_used); 2651 results[alg][run_no] = ((double)count) / time_used * lengths[run_no]; 2734 int alg; local 2738 alg = atoi(sstrsep(&p, sep)); 2741 results[alg][j] += atof(sstrsep(&p, sep));
|
H A D | pkcs12.c | 99 int alg_print(BIO *x, X509_ALGOR *alg); 401 "-certpbe alg specify certificate PBE algorithm (default RC2-40)\n"); 403 "-keypbe alg specify private key PBE algorithm (default 3DES)\n"); 950 int alg_print(BIO *x, X509_ALGOR *alg) argument 954 p = alg->parameter->value.sequence->data; 955 pbe = d2i_PBEPARAM(NULL, &p, alg->parameter->value.sequence->length); 959 OBJ_nid2ln(OBJ_obj2nid(alg->algorithm)),
|
/freebsd-9.3-release/contrib/bind9/lib/dns/include/dst/ |
H A D | dst.h | 163 dst_algorithm_supported(unsigned int alg); 285 dst_key_fromfile(dns_name_t *name, dns_keytag_t id, unsigned int alg, int type, 296 * \li "alg" is a supported key algorithm. 416 dst_key_frombuffer(dns_name_t *name, unsigned int alg, 425 *\li "alg" is a supported key algorithm. 511 dst_key_buildinternal(dns_name_t *name, unsigned int alg, 518 dst_key_fromlabel(dns_name_t *name, int alg, unsigned int flags, 524 dst_key_generate(dns_name_t *name, unsigned int alg, 531 dst_key_generate2(dns_name_t *name, unsigned int alg, 736 dst_region_computeid(const isc_region_t *source, unsigned int alg); [all...] |
/freebsd-9.3-release/lib/libipsec/ |
H A D | pfkey.c | 219 struct sadb_alg *alg; local 221 alg = findsupportedalg(satype, alg_id); 222 if (!alg) 225 if (keylen < alg->sadb_alg_minbits || keylen > alg->sadb_alg_maxbits) { 247 struct sadb_alg *alg; local 268 alg = findsupportedalg(satype, alg_id); 269 if (!alg) 272 memcpy(alg0, alg, sizeof(*alg0));
|
/freebsd-9.3-release/lib/libc/nameser/ |
H A D | ns_print.c | 577 u_int c_type, key_tag, alg; local 585 alg = (u_int) *rdata++; 587 len = SPRINTF((tmp, "%d %d %d ", c_type, key_tag, alg));
|