/freebsd-10.0-release/contrib/unbound/validator/ |
H A D | val_secalgo.h | 48 * @param algo: DS digest algo. 51 size_t ds_digest_size_supported(int algo); 54 * @param algo: the DS digest algo 60 int secalgo_ds_digest(int algo, unsigned char* buf, size_t len, 70 * @param algo: DNSKEY algorithm. 79 enum sec_status verify_canonrrset(ldns_buffer* buf, int algo,
|
H A D | val_secalgo.c | 73 * @param algo: DS digest algo. 77 ds_digest_size_supported(int algo) argument 79 switch(algo) { 116 secalgo_ds_digest(int algo, unsigned char* buf, size_t len, argument 119 switch(algo) { 143 algo); 285 * @param algo: key algorithm 293 setup_key_digest(int algo, EVP_PKEY** evp_key, const EVP_MD** digest_type, argument 299 switch(algo) { 474 verify_canonrrset(ldns_buffer* buf, int algo, unsigned char* sigblock, unsigned int sigblock_len, unsigned char* key, unsigned int keylen, char** reason) argument 566 ds_digest_size_supported(int algo) argument 588 secalgo_ds_digest(int algo, unsigned char* buf, size_t len, unsigned char* res) argument 667 nss_buf2ecdsa(unsigned char* key, size_t len, int algo) argument 841 nss_setup_key_digest(int algo, SECKEYPublicKey** pubkey, HASH_HashType* htype, unsigned char* key, size_t keylen, unsigned char** prefix, size_t* prefixlen) argument 966 verify_canonrrset(ldns_buffer* buf, int algo, unsigned char* sigblock, unsigned int sigblock_len, unsigned char* key, unsigned int keylen, char** reason) argument [all...] |
H A D | val_kentry.c | 61 if(kd->algo) 62 s += strlen((char*)kd->algo)+1; 96 free(kd->algo); 142 if(d->algo) { 143 newd->algo = (uint8_t*)regional_strdup(region, 144 (char*)d->algo); 145 if(!newd->algo) 202 if(d->algo) { 203 newd->algo = (uint8_t*)strdup((char*)d->algo); 374 int algo; local [all...] |
H A D | val_sigcrypt.c | 118 * @return algo or 0 if malformed rrsig. 326 verbose(VERB_QUERY, "DS fail: DS RR algo and digest do not " 339 return 0; /* digest algo failed */ 382 uint8_t algo; local 387 algo = (uint8_t)dnskey_get_algo(dnskey, i); 388 if(!dnskey_algo_id_is_supported((int)algo)) 390 if(n->needs[algo] == 0) { 391 n->needs[algo] = 1; 392 sigalg[total] = algo; 402 uint8_t algo; local 418 uint8_t algo; local 440 algo_needs_set_secure(struct algo_needs* n, uint8_t algo) argument 451 algo_needs_set_bogus(struct algo_needs* n, uint8_t algo) argument 553 int algo = dnskey_get_algo(dnskey, dnskey_idx); local 589 int algo = rrset_get_sig_algo(rrset, sig_idx); local [all...] |
H A D | val_nsec3.h | 309 * @param algo: nsec3 hash algo. 313 * @return 0 if bad formatted, unknown nsec3 hash algo, or unknown flags set. 316 int* algo, size_t* iter, uint8_t** salt, size_t* saltlen); 323 * @param algo: algo to use, must be known. 331 size_t nsec3_get_hashed(ldns_buffer* buf, uint8_t* nm, size_t nmlen, int algo,
|
H A D | val_sigcrypt.h | 72 * Initialize algo needs structure, set algos from rrset as needed. 82 * Initialize algo needs structure from a signalled algo list. 89 * Initialize algo needs structure, set algos from rrset as needed. 92 * @param fav_ds_algo: filter to use only this DS algo. 102 * @param algo: the algorithm processed to be secure. 105 int algo_needs_set_secure(struct algo_needs* n, uint8_t algo); 111 * @param algo: the algorithm processed to be bogus. 113 void algo_needs_set_bogus(struct algo_needs* n, uint8_t algo); 123 * See which algo i [all...] |
H A D | val_kentry.h | 84 uint8_t* algo; member in struct:key_entry_data
|
H A D | val_nsec3.c | 215 int* algo, size_t* iter, uint8_t** salt, size_t* saltlen) 221 *algo = nsec3_get_algo(rrset, r); 356 /* skip unknown flags, algo */ 385 /** see if at least one RR is known (flags, algo) */ 400 * (skips the unknown flag and unknown algo NSEC3s). 427 /* skip unknown flags, algo */ 537 nsec3_get_hashed(ldns_buffer* buf, uint8_t* nm, size_t nmlen, int algo, argument 547 switch(algo) { 586 log_err("nsec3 hash of unknown algo %d", algo); 214 nsec3_get_params(struct ub_packed_rrset_key* rrset, int r, int* algo, size_t* iter, uint8_t** salt, size_t* saltlen) argument 597 int algo = nsec3_get_algo(c->nsec3, c->rr); local [all...] |
/freebsd-10.0-release/sbin/hastd/ |
H A D | hast_checksum.c | 129 const char *algo; local 131 algo = nv_get_string(nv, "checksum"); 132 if (algo == NULL) 139 if (strcmp(algo, "crc32") == 0) 142 else if (strcmp(algo, "sha256") == 0) 146 pjdlog_error("Unknown checksum algorithm '%s'.", algo); 151 rhsize, algo, chsize);
|
H A D | hast_compression.c | 255 const char *algo; local 258 algo = nv_get_string(nv, "compression"); 259 if (algo == NULL) 265 if (strcmp(algo, "hole") == 0) 267 else if (strcmp(algo, "lzf") == 0) 270 pjdlog_error("Unknown compression algorithm '%s'.", algo);
|
/freebsd-10.0-release/sys/geom/eli/ |
H A D | g_eli_crypto.c | 60 g_eli_crypto_cipher(u_int algo, int enc, u_char *data, size_t datasize, argument 72 KASSERT(algo != CRYPTO_AES_XTS, 76 cri.cri_alg = algo; 106 crd->crd_alg = algo; 134 g_eli_crypto_cipher(u_int algo, int enc, u_char *data, size_t datasize, argument 142 assert(algo != CRYPTO_AES_XTS); 144 switch (algo) { 216 g_eli_crypto_encrypt(u_int algo, u_char *data, size_t datasize, argument 221 if (algo == CRYPTO_AES_XTS) 222 algo 228 g_eli_crypto_decrypt(u_int algo, u_char *data, size_t datasize, const u_char *key, size_t keysize) argument [all...] |
H A D | g_eli.h | 426 g_eli_algo2str(u_int algo) argument 429 switch (algo) { 497 g_eli_keylen(u_int algo, u_int keylen) argument 500 switch (algo) { 549 g_eli_hashlen(u_int algo) argument 552 switch (algo) { 596 int g_eli_mkey_encrypt(unsigned algo, const unsigned char *key, unsigned keylen, 602 int g_eli_crypto_encrypt(u_int algo, u_char *data, size_t datasize, 604 int g_eli_crypto_decrypt(u_int algo, u_char *data, size_t datasize,
|
H A D | g_eli_key.c | 157 g_eli_mkey_encrypt(unsigned algo, const unsigned char *key, unsigned keylen, argument 176 error = g_eli_crypto_encrypt(algo, mkey, G_ELI_MKEYLEN, enckey, keylen);
|
/freebsd-10.0-release/sys/netinet/cc/ |
H A D | cc.c | 106 /* Find algo with specified name and set it to default. */ 130 struct cc_algo *algo; local 138 STAILQ_FOREACH(algo, &cc_list, entries) { 156 STAILQ_FOREACH(algo, &cc_list, entries) { 157 err = sbuf_printf(s, first ? "%s" : ", %s", algo->name); 177 * Reset the default CC algo to NewReno for any netstack which is using the algo 223 /* Remove algo from cc_list so that new connections can't use it. */ 283 struct cc_algo *algo; local 287 algo [all...] |
/freebsd-10.0-release/sys/crypto/aesni/ |
H A D | aesni.h | 60 int algo; member in struct:aesni_session
|
H A D | aesni_wrap.c | 337 switch (ses->algo) { 371 if (ses->algo == CRYPTO_AES_CBC) 373 else /* if (ses->algo == CRYPTO_AES_XTS) */ { 440 if (ses->algo == CRYPTO_AES_CBC) { 443 } else /* if (ses->algo == CRYPTO_AES_XTS) */ { 454 if (ses->algo == CRYPTO_AES_CBC) { 457 } else /* if (ses->algo == CRYPTO_AES_XTS) */ {
|
/freebsd-10.0-release/crypto/openssl/apps/ |
H A D | ts.c | 540 X509_ALGOR *algo = NULL; local 558 if (!(algo = X509_ALGOR_new())) goto err; 559 if (!(algo->algorithm = OBJ_nid2obj(EVP_MD_type(md)))) goto err; 560 if (!(algo->parameter = ASN1_TYPE_new())) goto err; 561 algo->parameter->type = V_ASN1_NULL; 562 if (!TS_MSG_IMPRINT_set_algo(msg_imprint, algo)) goto err; 591 X509_ALGOR_free(algo);
|
/freebsd-10.0-release/contrib/ldns/ldns/ |
H A D | dnssec_verify.h | 614 * \param[in] algo Signing algorithm 620 uint8_t algo); 630 * \param[in] algo Signing algorithm 638 uint8_t algo);
|
H A D | dnssec.h | 171 * \param[in] algo precise algorithm to initialize ECC group values. 174 EVP_PKEY* ldns_ecdsa2pkey_raw(unsigned char* key, size_t keylen, uint8_t algo);
|
H A D | keys.h | 605 * \param[in] algo the signing algorithm number. 608 int ldns_key_algo_supported(int algo);
|
/freebsd-10.0-release/lib/libfetch/ |
H A D | http.c | 636 char *algo; member in struct:__anon5552 645 b->realm = b->qop = b->nonce = b->opaque = b->algo = NULL; 660 if (b->algo) 661 free(b->algo); 824 cs->challenges[cs->count]->algo = 1254 if (!c->algo) 1255 c->algo = strdup(""); 1258 *c->algo? ",algorithm=" : "", c->algo, 1274 DigestCalcHA1(c->algo, parm [all...] |
/freebsd-10.0-release/sys/net80211/ |
H A D | ieee80211_hostap.c | 1645 int algo, int seq, int status) 1650 wh, NULL, "unsupported alg %d", algo); 1862 uint16_t algo, seq, status; local 1882 algo = le16toh(*(uint16_t *)frm); 1886 "recv auth frame with algorithm %d seq %d", algo, seq); 1909 if (algo == IEEE80211_AUTH_ALG_SHARED) 1912 else if (algo == IEEE80211_AUTH_ALG_OPEN) 1914 else if (algo == IEEE80211_AUTH_ALG_LEAP) { 1915 authalgreject(ni, wh, algo, 1928 authalgreject(ni, wh, algo, 1644 authalgreject(struct ieee80211_node *ni, const struct ieee80211_frame *wh, int algo, int seq, int status) argument [all...] |
H A D | ieee80211_sta.c | 1479 uint16_t algo, seq, status; local 1488 algo = le16toh(*(uint16_t *)frm); 1492 "recv auth frame with algorithm %d seq %d", algo, seq); 1506 if (algo == IEEE80211_AUTH_ALG_SHARED) 1509 else if (algo == IEEE80211_AUTH_ALG_OPEN) 1513 wh, "auth", "unsupported alg %d", algo);
|
/freebsd-10.0-release/contrib/ldns/ |
H A D | dnssec_verify.c | 1859 ldns_ecdsa2pkey_raw(unsigned char* key, size_t keylen, uint8_t algo) argument 1866 if(algo == LDNS_ECDSAP256SHA256) { 1869 } else if(algo == LDNS_ECDSAP384SHA384) { 1899 ldns_buffer* rrset, unsigned char* key, size_t keylen, uint8_t algo) 1905 evp_key = ldns_ecdsa2pkey_raw(key, keylen, algo); 1910 if(algo == LDNS_ECDSAP256SHA256) 1921 ldns_buffer *key_buf, uint8_t algo) 1928 ldns_buffer_position(key_buf), algo); 1934 uint8_t algo) 1937 switch(algo) { 1898 ldns_verify_rrsig_ecdsa_raw(unsigned char* sig, size_t siglen, ldns_buffer* rrset, unsigned char* key, size_t keylen, uint8_t algo) argument 1920 ldns_verify_rrsig_buffers(ldns_buffer *rawsig_buf, ldns_buffer *verify_buf, ldns_buffer *key_buf, uint8_t algo) argument 1932 ldns_verify_rrsig_buffers_raw(unsigned char* sig, size_t siglen, ldns_buffer *verify_buf, unsigned char* key, size_t keylen, uint8_t algo) argument [all...] |
/freebsd-10.0-release/sys/netinet/ |
H A D | tcp_usrreq.c | 1313 struct cc_algo *algo; local 1441 * Return EINVAL if we can't find the requested cc algo. 1445 STAILQ_FOREACH(algo, &cc_list, entries) { 1446 if (strncmp(buf, algo->name, TCP_CA_NAME_MAX) 1448 /* We've found the requested algo. */ 1457 CC_ALGO(tp) = algo; 1460 * initialising the new algo, 1464 if (algo->cb_init != NULL) 1465 if (algo->cb_init(tp->ccv) > 0) {
|