Home
last modified time | relevance | path

Searched refs:alg (Results 1 – 25 of 116) sorted by relevance

12345

/dragonfly/sbin/md5/
H A Dmd5.c156 alg->Init(&context); in digestdata()
181 alg->Init(&context); in digestbig()
246 alg->Init(&context); in digestfile()
339 for (alg = Algorithm; alg->progname != NULL; alg++) in main()
343 alg = Algorithm; in main()
357 MDFilter(alg, 1); in main()
370 MDTimeTrial(alg); in main()
373 MDTestSuite(alg); in main()
421 MDFilter(alg, 0); in main()
474 alg->Init(&context); in MDTimeTrial()
[all …]
/dragonfly/crypto/openssh/
H A Ddigest-openssl.c46 int alg; member
68 ssh_digest_by_alg(int alg) in ssh_digest_by_alg() argument
70 if (alg < 0 || alg >= SSH_DIGEST_MAX) in ssh_digest_by_alg()
72 if (digests[alg].id != alg) /* sanity */ in ssh_digest_by_alg()
76 return &(digests[alg]); in ssh_digest_by_alg()
82 int alg; in ssh_digest_alg_by_name() local
84 for (alg = 0; digests[alg].id != -1; alg++) { in ssh_digest_alg_by_name()
100 ssh_digest_bytes(int alg) in ssh_digest_bytes() argument
114 ssh_digest_start(int alg) in ssh_digest_start() argument
121 ret->alg = alg; in ssh_digest_start()
[all …]
H A Dhmac.c30 int alg; member
39 ssh_hmac_bytes(int alg) in ssh_hmac_bytes() argument
41 return ssh_digest_bytes(alg); in ssh_hmac_bytes()
45 ssh_hmac_start(int alg) in ssh_hmac_start() argument
51 ret->alg = alg; in ssh_hmac_start()
52 if ((ret->ictx = ssh_digest_start(alg)) == NULL || in ssh_hmac_start()
53 (ret->octx = ssh_digest_start(alg)) == NULL || in ssh_hmac_start()
54 (ret->digest = ssh_digest_start(alg)) == NULL) in ssh_hmac_start()
75 else if (ssh_digest_memory(ctx->alg, key, klen, ctx->buf, in ssh_hmac_init()
111 len = ssh_digest_bytes(ctx->alg); in ssh_hmac_final()
H A Ddigest.h39 const char *ssh_digest_alg_name(int alg);
42 size_t ssh_digest_bytes(int alg);
52 int ssh_digest_memory(int alg, const void *m, size_t mlen,
56 int ssh_digest_buffer(int alg, const struct sshbuf *b, u_char *d, size_t dlen)
60 struct ssh_digest_ctx *ssh_digest_start(int alg);
H A Dssh-rsa.c78 rsa_hash_id_from_keyname(const char *alg) in rsa_hash_id_from_keyname() argument
82 if ((r = rsa_hash_id_from_ident(alg)) != -1) in rsa_hash_id_from_keyname()
84 if (strcmp(alg, "ssh-rsa-cert-v01@openssh.com") == 0) in rsa_hash_id_from_keyname()
86 if (strcmp(alg, "rsa-sha2-256-cert-v01@openssh.com") == 0) in rsa_hash_id_from_keyname()
88 if (strcmp(alg, "rsa-sha2-512-cert-v01@openssh.com") == 0) in rsa_hash_id_from_keyname()
247 const char *alg) in ssh_rsa_verify() argument
278 if (alg != NULL && strcmp(alg, "ssh-rsa-cert-v01@openssh.com") != 0) { in ssh_rsa_verify()
279 if ((want_alg = rsa_hash_id_from_keyname(alg)) == -1) { in ssh_rsa_verify()
H A Dsk-api.h67 uint32_t alg; member
89 int sk_enroll(uint32_t alg, const uint8_t *challenge, size_t challenge_len,
94 int sk_sign(uint32_t alg, const uint8_t *data, size_t data_len,
/dragonfly/tools/tools/crypto/
H A Dcryptotest.c113 struct alg { struct
162 static struct alg*
173 static struct alg*
256 if (!alg->ishash) { in runtest()
257 sop.keylen = (alg->minkeylen + alg->maxkeylen)/2; in runtest()
265 sop.mackeylen = (alg->minkeylen + alg->maxkeylen)/2; in runtest()
279 if (alg->ishash) in runtest()
441 size, alg->name, alg->blocksize); in runtests()
517 struct alg *alg = NULL; in main() local
580 if (alg) in main()
[all …]
/dragonfly/crypto/libressl/crypto/asn1/
H A Dx_algor.c153 if (!alg) in X509_ALGOR_set0()
156 if (alg->parameter == NULL) in X509_ALGOR_set0()
157 alg->parameter = ASN1_TYPE_new(); in X509_ALGOR_set0()
158 if (alg->parameter == NULL) in X509_ALGOR_set0()
161 if (alg) { in X509_ALGOR_set0()
162 if (alg->algorithm) in X509_ALGOR_set0()
163 ASN1_OBJECT_free(alg->algorithm); in X509_ALGOR_set0()
164 alg->algorithm = aobj; in X509_ALGOR_set0()
169 if (alg->parameter) { in X509_ALGOR_set0()
170 ASN1_TYPE_free(alg->parameter); in X509_ALGOR_set0()
[all …]
H A Dp5_pbe.c121 PKCS5_pbe_set0_algor(X509_ALGOR *algor, int alg, int iter, in PKCS5_pbe_set0_algor() argument
159 if (X509_ALGOR_set0(algor, OBJ_nid2obj(alg), V_ASN1_SEQUENCE, pbe_str)) in PKCS5_pbe_set0_algor()
172 PKCS5_pbe_set(int alg, int iter, const unsigned char *salt, int saltlen) in PKCS5_pbe_set() argument
181 if (PKCS5_pbe_set0_algor(ret, alg, iter, salt, saltlen)) in PKCS5_pbe_set()
/dragonfly/crypto/libressl/crypto/engine/
H A Deng_fat.c118 if (!strncmp(alg, "ALL", len)) in int_def_cb()
120 else if (!strncmp(alg, "RSA", len)) in int_def_cb()
122 else if (!strncmp(alg, "DSA", len)) in int_def_cb()
124 else if (!strncmp(alg, "ECDH", len)) in int_def_cb()
126 else if (!strncmp(alg, "ECDSA", len)) in int_def_cb()
128 else if (!strncmp(alg, "DH", len)) in int_def_cb()
130 else if (strncmp(alg, "EC", len) == 0) in int_def_cb()
132 else if (!strncmp(alg, "RAND", len)) in int_def_cb()
134 else if (!strncmp(alg, "CIPHERS", len)) in int_def_cb()
136 else if (!strncmp(alg, "DIGESTS", len)) in int_def_cb()
[all …]
/dragonfly/crypto/libressl/crypto/rsa/
H A Drsa_ameth.c128 rsa->pss = rsa_pss_decode(alg); in rsa_param_decode()
161 X509_ALGOR *alg; in rsa_pub_decode() local
244 const X509_ALGOR *alg; in rsa_priv_decode() local
287 rsa_mgf1_decode(X509_ALGOR *alg) in rsa_mgf1_decode() argument
530 X509_ALGOR *alg = NULL; in rsa_pkey_ctrl() local
589 if (alg) in rsa_pkey_ctrl()
639 rsa_algor_to_md(X509_ALGOR *alg) in rsa_algor_to_md() argument
643 if (!alg) in rsa_algor_to_md()
820 X509_ALGOR *alg; in rsa_cms_verify() local
868 X509_ALGOR *alg; in rsa_cms_sign() local
[all …]
/dragonfly/crypto/libressl/crypto/pkcs7/
H A Dpk7_attr.c102 X509_ALGOR *alg; in PKCS7_simple_smimecap() local
104 if (!(alg = X509_ALGOR_new())) { in PKCS7_simple_smimecap()
108 ASN1_OBJECT_free(alg->algorithm); in PKCS7_simple_smimecap()
109 alg->algorithm = OBJ_nid2obj(nid); in PKCS7_simple_smimecap()
113 if (!(alg->parameter = ASN1_TYPE_new())) in PKCS7_simple_smimecap()
121 alg->parameter->value.integer = nbit; in PKCS7_simple_smimecap()
122 alg->parameter->type = V_ASN1_INTEGER; in PKCS7_simple_smimecap()
124 if (sk_X509_ALGOR_push(sk, alg) == 0) in PKCS7_simple_smimecap()
130 X509_ALGOR_free(alg); in PKCS7_simple_smimecap()
H A Dpk7_lib.c243 X509_ALGOR *alg; in PKCS7_add_signer() local
267 alg = sk_X509_ALGOR_value(md_sk, i); in PKCS7_add_signer()
268 if (OBJ_obj2nid(alg->algorithm) == nid) { in PKCS7_add_signer()
275 if (!(alg = X509_ALGOR_new()) || in PKCS7_add_signer()
276 !(alg->parameter = ASN1_TYPE_new())) { in PKCS7_add_signer()
277 X509_ALGOR_free(alg); in PKCS7_add_signer()
281 alg->algorithm = OBJ_nid2obj(nid); in PKCS7_add_signer()
282 alg->parameter->type = V_ASN1_NULL; in PKCS7_add_signer()
283 if (!sk_X509_ALGOR_push(md_sk, alg)) { in PKCS7_add_signer()
284 X509_ALGOR_free(alg); in PKCS7_add_signer()
/dragonfly/contrib/gmp/
H A Drand.c36 gmp_randalg_t alg, in gmp_randinit() argument
45 va_start (ap, alg); in gmp_randinit()
48 gmp_randalg_t alg; in gmp_randinit() local
51 alg = va_arg (ap, gmp_randalg_t); in gmp_randinit()
54 switch (alg) { in gmp_randinit()
/dragonfly/contrib/ldns/
H A Dkeys.c421 ldns_signing_algorithm alg; in ldns_key_new_frm_fp_l() local
441 alg = 0; in ldns_key_new_frm_fp_l()
474 alg = LDNS_SIGN_RSAMD5; in ldns_key_new_frm_fp_l()
481 alg = LDNS_SIGN_DSA; in ldns_key_new_frm_fp_l()
493 alg = LDNS_SIGN_RSASHA1; in ldns_key_new_frm_fp_l()
531 alg = LDNS_SIGN_ECC_GOST; in ldns_key_new_frm_fp_l()
580 alg = LDNS_SIGN_HMACMD5; in ldns_key_new_frm_fp_l()
583 alg = LDNS_SIGN_HMACSHA1; in ldns_key_new_frm_fp_l()
590 alg = LDNS_SIGN_HMACSHA1; in ldns_key_new_frm_fp_l()
607 switch(alg) { in ldns_key_new_frm_fp_l()
[all …]
/dragonfly/contrib/wpa_supplicant/src/crypto/
H A Dcrypto_nettle.c60 ctx = os_malloc(alg->context_size); in nettle_digest_vector()
63 alg->init(ctx); in nettle_digest_vector()
65 alg->update(ctx, len[i], addr[i]); in nettle_digest_vector()
66 alg->digest(ctx, alg->digest_size, mac); in nettle_digest_vector()
67 bin_clear_free(ctx, alg->context_size); in nettle_digest_vector()
404 enum crypto_cipher_alg alg; member
411 struct crypto_cipher * crypto_cipher_init(enum crypto_cipher_alg alg, in crypto_cipher_init() argument
421 ctx->alg = alg; in crypto_cipher_init()
423 switch (alg) { in crypto_cipher_init()
439 switch (ctx->alg) { in crypto_cipher_encrypt()
[all …]
H A Dcrypto_internal-cipher.c18 enum crypto_cipher_alg alg; member
43 struct crypto_cipher * crypto_cipher_init(enum crypto_cipher_alg alg, in crypto_cipher_init() argument
53 ctx->alg = alg; in crypto_cipher_init()
55 switch (alg) { in crypto_cipher_init()
108 switch (ctx->alg) { in crypto_cipher_encrypt()
172 switch (ctx->alg) { in crypto_cipher_decrypt()
232 switch (ctx->alg) { in crypto_cipher_deinit()
H A Dcrypto_internal.c20 enum crypto_hash_alg alg; member
39 struct crypto_hash * crypto_hash_init(enum crypto_hash_alg alg, const u8 *key, in crypto_hash_init() argument
51 ctx->alg = alg; in crypto_hash_init()
53 switch (alg) { in crypto_hash_init()
148 switch (ctx->alg) { in crypto_hash_update()
192 switch (ctx->alg) { in crypto_hash_finish()
/dragonfly/crypto/libressl/crypto/ocsp/
H A Docsp_lib.c111 X509_ALGOR *alg; in OCSP_cert_id_new() local
118 alg = cid->hashAlgorithm; in OCSP_cert_id_new()
119 if (alg->algorithm != NULL) in OCSP_cert_id_new()
120 ASN1_OBJECT_free(alg->algorithm); in OCSP_cert_id_new()
125 if (!(alg->algorithm = OBJ_nid2obj(nid))) in OCSP_cert_id_new()
127 if ((alg->parameter = ASN1_TYPE_new()) == NULL) in OCSP_cert_id_new()
129 alg->parameter->type = V_ASN1_NULL; in OCSP_cert_id_new()
/dragonfly/sys/netproto/802_11/
H A Dieee80211_dragonfly.h308 ieee80211_scanner_register(alg, &v); \
310 ieee80211_scanner_unregister(alg, &v); \
320 alg##_modevent(int type) \
324 ieee80211_aclator_register(&alg); \
326 ieee80211_aclator_unregister(&alg); \
328 TEXT_SET(acl_set, alg##_modevent); \
336 #define IEEE80211_AUTH_ALG(name, alg, v) \ argument
356 alg##_modevent(int type) \
360 ieee80211_ratectl_register(alg, &v); \
362 ieee80211_ratectl_unregister(alg); \
[all …]
/dragonfly/contrib/wpa_supplicant/src/tls/
H A Dpkcs5.c25 } alg; member
54 oid->oid[6] == alg; in pkcs5_is_oid()
63 oid->oid[5] == alg; in enc_alg_is_oid()
74 oid->oid[7] == alg; in pkcs12_is_pbe_oid()
299 params->alg = pkcs5_get_alg(&oid); in pkcs5_get_params()
300 if (params->alg == PKCS5_ALG_UNKNOWN) { in pkcs5_get_params()
306 if (params->alg == PKCS5_ALG_PBES2) in pkcs5_get_params()
519 if (params->alg != PKCS5_ALG_SHA1_3DES_CBC) in pkcs12_crypto_init_sha1()
559 if (params->alg == PKCS5_ALG_PBES2) in pkcs5_crypto_init()
562 if (params->alg == PKCS5_ALG_SHA1_3DES_CBC) in pkcs5_crypto_init()
[all …]
H A Dtlsv1_client_ocsp.c74 if (x509_sha1_oid(alg)) { in ocsp_hash_data()
81 if (x509_sha256_oid(alg)) { in ocsp_hash_data()
88 if (x509_sha384_oid(alg)) { in ocsp_hash_data()
95 if (x509_sha512_oid(alg)) { in ocsp_hash_data()
103 asn1_oid_to_str(alg, buf, sizeof(buf)); in ocsp_hash_data()
118 struct x509_algorithm_identifier alg; in tls_process_ocsp_single_response() local
161 if (x509_parse_algorithm_identifier(pos, end - pos, &alg, &pos)) in tls_process_ocsp_single_response()
181 hash_len = ocsp_hash_data(&alg.oid, issuer->subject_dn, in tls_process_ocsp_single_response()
205 hash_len = ocsp_hash_data(&alg.oid, issuer->public_key, in tls_process_ocsp_single_response()
363 struct x509_algorithm_identifier alg; in tls_process_basic_ocsp_response() local
[all …]
/dragonfly/contrib/wpa_supplicant/src/eap_common/
H A Dikev2_common.c61 switch (alg) { in ikev2_integ_hash()
97 int ikev2_prf_hash(int alg, const u8 *key, size_t key_len, in ikev2_prf_hash() argument
101 switch (alg) { in ikev2_prf_hash()
113 int ikev2_prf_plus(int alg, const u8 *key, size_t key_len, in ikev2_prf_plus() argument
125 prf = ikev2_get_prf(alg); in ikev2_prf_plus()
143 res = ikev2_prf_hash(alg, key, key_len, 2, &addr[1], in ikev2_prf_plus()
146 res = ikev2_prf_hash(alg, key, key_len, 3, addr, len, in ikev2_prf_plus()
181 switch (alg) { in ikev2_encr_encrypt()
189 wpa_printf(MSG_DEBUG, "IKEV2: Unsupported encr alg %d", alg); in ikev2_encr_encrypt()
216 switch (alg) { in ikev2_encr_decrypt()
[all …]
H A Dikev2_common.h271 int ikev2_integ_hash(int alg, const u8 *key, size_t key_len, const u8 *data,
274 int ikev2_prf_hash(int alg, const u8 *key, size_t key_len,
277 int ikev2_prf_plus(int alg, const u8 *key, size_t key_len,
281 int ikev2_encr_encrypt(int alg, const u8 *key, size_t key_len, const u8 *iv,
283 int ikev2_encr_decrypt(int alg, const u8 *key, size_t key_len, const u8 *iv,
/dragonfly/crypto/libressl/crypto/cms/
H A Dcms_sd.c281 X509_ALGOR *alg; in CMS_add1_signer() local
345 X509_ALGOR_get0(&aoid, NULL, NULL, alg); in CMS_add1_signer()
351 alg = X509_ALGOR_new(); in CMS_add1_signer()
352 if (alg == NULL) in CMS_add1_signer()
354 X509_ALGOR_set_md(alg, md); in CMS_add1_signer()
356 X509_ALGOR_free(alg); in CMS_add1_signer()
954 X509_ALGOR *alg; in CMS_add_simple_smimecap() local
965 alg = X509_ALGOR_new(); in CMS_add_simple_smimecap()
966 if (alg == NULL) { in CMS_add_simple_smimecap()
971 X509_ALGOR_set0(alg, OBJ_nid2obj(algnid), in CMS_add_simple_smimecap()
[all …]

12345