/dragonfly/sbin/md5/ |
H A D | md5.c | 156 alg->Init(&context); in digestdata() 181 alg->Init(&context); in digestbig() 246 alg->Init(&context); in digestfile() 339 for (alg = Algorithm; alg->progname != NULL; alg++) in main() 343 alg = Algorithm; in main() 357 MDFilter(alg, 1); in main() 370 MDTimeTrial(alg); in main() 373 MDTestSuite(alg); in main() 421 MDFilter(alg, 0); in main() 474 alg->Init(&context); in MDTimeTrial() [all …]
|
/dragonfly/crypto/openssh/ |
H A D | digest-openssl.c | 46 int alg; member 68 ssh_digest_by_alg(int alg) in ssh_digest_by_alg() argument 70 if (alg < 0 || alg >= SSH_DIGEST_MAX) in ssh_digest_by_alg() 72 if (digests[alg].id != alg) /* sanity */ in ssh_digest_by_alg() 76 return &(digests[alg]); in ssh_digest_by_alg() 82 int alg; in ssh_digest_alg_by_name() local 84 for (alg = 0; digests[alg].id != -1; alg++) { in ssh_digest_alg_by_name() 100 ssh_digest_bytes(int alg) in ssh_digest_bytes() argument 114 ssh_digest_start(int alg) in ssh_digest_start() argument 121 ret->alg = alg; in ssh_digest_start() [all …]
|
H A D | hmac.c | 30 int alg; member 39 ssh_hmac_bytes(int alg) in ssh_hmac_bytes() argument 41 return ssh_digest_bytes(alg); in ssh_hmac_bytes() 45 ssh_hmac_start(int alg) in ssh_hmac_start() argument 51 ret->alg = alg; in ssh_hmac_start() 52 if ((ret->ictx = ssh_digest_start(alg)) == NULL || in ssh_hmac_start() 53 (ret->octx = ssh_digest_start(alg)) == NULL || in ssh_hmac_start() 54 (ret->digest = ssh_digest_start(alg)) == NULL) in ssh_hmac_start() 75 else if (ssh_digest_memory(ctx->alg, key, klen, ctx->buf, in ssh_hmac_init() 111 len = ssh_digest_bytes(ctx->alg); in ssh_hmac_final()
|
H A D | digest.h | 39 const char *ssh_digest_alg_name(int alg); 42 size_t ssh_digest_bytes(int alg); 52 int ssh_digest_memory(int alg, const void *m, size_t mlen, 56 int ssh_digest_buffer(int alg, const struct sshbuf *b, u_char *d, size_t dlen) 60 struct ssh_digest_ctx *ssh_digest_start(int alg);
|
H A D | ssh-rsa.c | 78 rsa_hash_id_from_keyname(const char *alg) in rsa_hash_id_from_keyname() argument 82 if ((r = rsa_hash_id_from_ident(alg)) != -1) in rsa_hash_id_from_keyname() 84 if (strcmp(alg, "ssh-rsa-cert-v01@openssh.com") == 0) in rsa_hash_id_from_keyname() 86 if (strcmp(alg, "rsa-sha2-256-cert-v01@openssh.com") == 0) in rsa_hash_id_from_keyname() 88 if (strcmp(alg, "rsa-sha2-512-cert-v01@openssh.com") == 0) in rsa_hash_id_from_keyname() 247 const char *alg) in ssh_rsa_verify() argument 278 if (alg != NULL && strcmp(alg, "ssh-rsa-cert-v01@openssh.com") != 0) { in ssh_rsa_verify() 279 if ((want_alg = rsa_hash_id_from_keyname(alg)) == -1) { in ssh_rsa_verify()
|
H A D | sk-api.h | 67 uint32_t alg; member 89 int sk_enroll(uint32_t alg, const uint8_t *challenge, size_t challenge_len, 94 int sk_sign(uint32_t alg, const uint8_t *data, size_t data_len,
|
/dragonfly/tools/tools/crypto/ |
H A D | cryptotest.c | 113 struct alg { struct 162 static struct alg* 173 static struct alg* 256 if (!alg->ishash) { in runtest() 257 sop.keylen = (alg->minkeylen + alg->maxkeylen)/2; in runtest() 265 sop.mackeylen = (alg->minkeylen + alg->maxkeylen)/2; in runtest() 279 if (alg->ishash) in runtest() 441 size, alg->name, alg->blocksize); in runtests() 517 struct alg *alg = NULL; in main() local 580 if (alg) in main() [all …]
|
/dragonfly/crypto/libressl/crypto/asn1/ |
H A D | x_algor.c | 153 if (!alg) in X509_ALGOR_set0() 156 if (alg->parameter == NULL) in X509_ALGOR_set0() 157 alg->parameter = ASN1_TYPE_new(); in X509_ALGOR_set0() 158 if (alg->parameter == NULL) in X509_ALGOR_set0() 161 if (alg) { in X509_ALGOR_set0() 162 if (alg->algorithm) in X509_ALGOR_set0() 163 ASN1_OBJECT_free(alg->algorithm); in X509_ALGOR_set0() 164 alg->algorithm = aobj; in X509_ALGOR_set0() 169 if (alg->parameter) { in X509_ALGOR_set0() 170 ASN1_TYPE_free(alg->parameter); in X509_ALGOR_set0() [all …]
|
H A D | p5_pbe.c | 121 PKCS5_pbe_set0_algor(X509_ALGOR *algor, int alg, int iter, in PKCS5_pbe_set0_algor() argument 159 if (X509_ALGOR_set0(algor, OBJ_nid2obj(alg), V_ASN1_SEQUENCE, pbe_str)) in PKCS5_pbe_set0_algor() 172 PKCS5_pbe_set(int alg, int iter, const unsigned char *salt, int saltlen) in PKCS5_pbe_set() argument 181 if (PKCS5_pbe_set0_algor(ret, alg, iter, salt, saltlen)) in PKCS5_pbe_set()
|
/dragonfly/crypto/libressl/crypto/engine/ |
H A D | eng_fat.c | 118 if (!strncmp(alg, "ALL", len)) in int_def_cb() 120 else if (!strncmp(alg, "RSA", len)) in int_def_cb() 122 else if (!strncmp(alg, "DSA", len)) in int_def_cb() 124 else if (!strncmp(alg, "ECDH", len)) in int_def_cb() 126 else if (!strncmp(alg, "ECDSA", len)) in int_def_cb() 128 else if (!strncmp(alg, "DH", len)) in int_def_cb() 130 else if (strncmp(alg, "EC", len) == 0) in int_def_cb() 132 else if (!strncmp(alg, "RAND", len)) in int_def_cb() 134 else if (!strncmp(alg, "CIPHERS", len)) in int_def_cb() 136 else if (!strncmp(alg, "DIGESTS", len)) in int_def_cb() [all …]
|
/dragonfly/crypto/libressl/crypto/rsa/ |
H A D | rsa_ameth.c | 128 rsa->pss = rsa_pss_decode(alg); in rsa_param_decode() 161 X509_ALGOR *alg; in rsa_pub_decode() local 244 const X509_ALGOR *alg; in rsa_priv_decode() local 287 rsa_mgf1_decode(X509_ALGOR *alg) in rsa_mgf1_decode() argument 530 X509_ALGOR *alg = NULL; in rsa_pkey_ctrl() local 589 if (alg) in rsa_pkey_ctrl() 639 rsa_algor_to_md(X509_ALGOR *alg) in rsa_algor_to_md() argument 643 if (!alg) in rsa_algor_to_md() 820 X509_ALGOR *alg; in rsa_cms_verify() local 868 X509_ALGOR *alg; in rsa_cms_sign() local [all …]
|
/dragonfly/crypto/libressl/crypto/pkcs7/ |
H A D | pk7_attr.c | 102 X509_ALGOR *alg; in PKCS7_simple_smimecap() local 104 if (!(alg = X509_ALGOR_new())) { in PKCS7_simple_smimecap() 108 ASN1_OBJECT_free(alg->algorithm); in PKCS7_simple_smimecap() 109 alg->algorithm = OBJ_nid2obj(nid); in PKCS7_simple_smimecap() 113 if (!(alg->parameter = ASN1_TYPE_new())) in PKCS7_simple_smimecap() 121 alg->parameter->value.integer = nbit; in PKCS7_simple_smimecap() 122 alg->parameter->type = V_ASN1_INTEGER; in PKCS7_simple_smimecap() 124 if (sk_X509_ALGOR_push(sk, alg) == 0) in PKCS7_simple_smimecap() 130 X509_ALGOR_free(alg); in PKCS7_simple_smimecap()
|
H A D | pk7_lib.c | 243 X509_ALGOR *alg; in PKCS7_add_signer() local 267 alg = sk_X509_ALGOR_value(md_sk, i); in PKCS7_add_signer() 268 if (OBJ_obj2nid(alg->algorithm) == nid) { in PKCS7_add_signer() 275 if (!(alg = X509_ALGOR_new()) || in PKCS7_add_signer() 276 !(alg->parameter = ASN1_TYPE_new())) { in PKCS7_add_signer() 277 X509_ALGOR_free(alg); in PKCS7_add_signer() 281 alg->algorithm = OBJ_nid2obj(nid); in PKCS7_add_signer() 282 alg->parameter->type = V_ASN1_NULL; in PKCS7_add_signer() 283 if (!sk_X509_ALGOR_push(md_sk, alg)) { in PKCS7_add_signer() 284 X509_ALGOR_free(alg); in PKCS7_add_signer()
|
/dragonfly/contrib/gmp/ |
H A D | rand.c | 36 gmp_randalg_t alg, in gmp_randinit() argument 45 va_start (ap, alg); in gmp_randinit() 48 gmp_randalg_t alg; in gmp_randinit() local 51 alg = va_arg (ap, gmp_randalg_t); in gmp_randinit() 54 switch (alg) { in gmp_randinit()
|
/dragonfly/contrib/ldns/ |
H A D | keys.c | 421 ldns_signing_algorithm alg; in ldns_key_new_frm_fp_l() local 441 alg = 0; in ldns_key_new_frm_fp_l() 474 alg = LDNS_SIGN_RSAMD5; in ldns_key_new_frm_fp_l() 481 alg = LDNS_SIGN_DSA; in ldns_key_new_frm_fp_l() 493 alg = LDNS_SIGN_RSASHA1; in ldns_key_new_frm_fp_l() 531 alg = LDNS_SIGN_ECC_GOST; in ldns_key_new_frm_fp_l() 580 alg = LDNS_SIGN_HMACMD5; in ldns_key_new_frm_fp_l() 583 alg = LDNS_SIGN_HMACSHA1; in ldns_key_new_frm_fp_l() 590 alg = LDNS_SIGN_HMACSHA1; in ldns_key_new_frm_fp_l() 607 switch(alg) { in ldns_key_new_frm_fp_l() [all …]
|
/dragonfly/contrib/wpa_supplicant/src/crypto/ |
H A D | crypto_nettle.c | 60 ctx = os_malloc(alg->context_size); in nettle_digest_vector() 63 alg->init(ctx); in nettle_digest_vector() 65 alg->update(ctx, len[i], addr[i]); in nettle_digest_vector() 66 alg->digest(ctx, alg->digest_size, mac); in nettle_digest_vector() 67 bin_clear_free(ctx, alg->context_size); in nettle_digest_vector() 404 enum crypto_cipher_alg alg; member 411 struct crypto_cipher * crypto_cipher_init(enum crypto_cipher_alg alg, in crypto_cipher_init() argument 421 ctx->alg = alg; in crypto_cipher_init() 423 switch (alg) { in crypto_cipher_init() 439 switch (ctx->alg) { in crypto_cipher_encrypt() [all …]
|
H A D | crypto_internal-cipher.c | 18 enum crypto_cipher_alg alg; member 43 struct crypto_cipher * crypto_cipher_init(enum crypto_cipher_alg alg, in crypto_cipher_init() argument 53 ctx->alg = alg; in crypto_cipher_init() 55 switch (alg) { in crypto_cipher_init() 108 switch (ctx->alg) { in crypto_cipher_encrypt() 172 switch (ctx->alg) { in crypto_cipher_decrypt() 232 switch (ctx->alg) { in crypto_cipher_deinit()
|
H A D | crypto_internal.c | 20 enum crypto_hash_alg alg; member 39 struct crypto_hash * crypto_hash_init(enum crypto_hash_alg alg, const u8 *key, in crypto_hash_init() argument 51 ctx->alg = alg; in crypto_hash_init() 53 switch (alg) { in crypto_hash_init() 148 switch (ctx->alg) { in crypto_hash_update() 192 switch (ctx->alg) { in crypto_hash_finish()
|
/dragonfly/crypto/libressl/crypto/ocsp/ |
H A D | ocsp_lib.c | 111 X509_ALGOR *alg; in OCSP_cert_id_new() local 118 alg = cid->hashAlgorithm; in OCSP_cert_id_new() 119 if (alg->algorithm != NULL) in OCSP_cert_id_new() 120 ASN1_OBJECT_free(alg->algorithm); in OCSP_cert_id_new() 125 if (!(alg->algorithm = OBJ_nid2obj(nid))) in OCSP_cert_id_new() 127 if ((alg->parameter = ASN1_TYPE_new()) == NULL) in OCSP_cert_id_new() 129 alg->parameter->type = V_ASN1_NULL; in OCSP_cert_id_new()
|
/dragonfly/sys/netproto/802_11/ |
H A D | ieee80211_dragonfly.h | 308 ieee80211_scanner_register(alg, &v); \ 310 ieee80211_scanner_unregister(alg, &v); \ 320 alg##_modevent(int type) \ 324 ieee80211_aclator_register(&alg); \ 326 ieee80211_aclator_unregister(&alg); \ 328 TEXT_SET(acl_set, alg##_modevent); \ 336 #define IEEE80211_AUTH_ALG(name, alg, v) \ argument 356 alg##_modevent(int type) \ 360 ieee80211_ratectl_register(alg, &v); \ 362 ieee80211_ratectl_unregister(alg); \ [all …]
|
/dragonfly/contrib/wpa_supplicant/src/tls/ |
H A D | pkcs5.c | 25 } alg; member 54 oid->oid[6] == alg; in pkcs5_is_oid() 63 oid->oid[5] == alg; in enc_alg_is_oid() 74 oid->oid[7] == alg; in pkcs12_is_pbe_oid() 299 params->alg = pkcs5_get_alg(&oid); in pkcs5_get_params() 300 if (params->alg == PKCS5_ALG_UNKNOWN) { in pkcs5_get_params() 306 if (params->alg == PKCS5_ALG_PBES2) in pkcs5_get_params() 519 if (params->alg != PKCS5_ALG_SHA1_3DES_CBC) in pkcs12_crypto_init_sha1() 559 if (params->alg == PKCS5_ALG_PBES2) in pkcs5_crypto_init() 562 if (params->alg == PKCS5_ALG_SHA1_3DES_CBC) in pkcs5_crypto_init() [all …]
|
H A D | tlsv1_client_ocsp.c | 74 if (x509_sha1_oid(alg)) { in ocsp_hash_data() 81 if (x509_sha256_oid(alg)) { in ocsp_hash_data() 88 if (x509_sha384_oid(alg)) { in ocsp_hash_data() 95 if (x509_sha512_oid(alg)) { in ocsp_hash_data() 103 asn1_oid_to_str(alg, buf, sizeof(buf)); in ocsp_hash_data() 118 struct x509_algorithm_identifier alg; in tls_process_ocsp_single_response() local 161 if (x509_parse_algorithm_identifier(pos, end - pos, &alg, &pos)) in tls_process_ocsp_single_response() 181 hash_len = ocsp_hash_data(&alg.oid, issuer->subject_dn, in tls_process_ocsp_single_response() 205 hash_len = ocsp_hash_data(&alg.oid, issuer->public_key, in tls_process_ocsp_single_response() 363 struct x509_algorithm_identifier alg; in tls_process_basic_ocsp_response() local [all …]
|
/dragonfly/contrib/wpa_supplicant/src/eap_common/ |
H A D | ikev2_common.c | 61 switch (alg) { in ikev2_integ_hash() 97 int ikev2_prf_hash(int alg, const u8 *key, size_t key_len, in ikev2_prf_hash() argument 101 switch (alg) { in ikev2_prf_hash() 113 int ikev2_prf_plus(int alg, const u8 *key, size_t key_len, in ikev2_prf_plus() argument 125 prf = ikev2_get_prf(alg); in ikev2_prf_plus() 143 res = ikev2_prf_hash(alg, key, key_len, 2, &addr[1], in ikev2_prf_plus() 146 res = ikev2_prf_hash(alg, key, key_len, 3, addr, len, in ikev2_prf_plus() 181 switch (alg) { in ikev2_encr_encrypt() 189 wpa_printf(MSG_DEBUG, "IKEV2: Unsupported encr alg %d", alg); in ikev2_encr_encrypt() 216 switch (alg) { in ikev2_encr_decrypt() [all …]
|
H A D | ikev2_common.h | 271 int ikev2_integ_hash(int alg, const u8 *key, size_t key_len, const u8 *data, 274 int ikev2_prf_hash(int alg, const u8 *key, size_t key_len, 277 int ikev2_prf_plus(int alg, const u8 *key, size_t key_len, 281 int ikev2_encr_encrypt(int alg, const u8 *key, size_t key_len, const u8 *iv, 283 int ikev2_encr_decrypt(int alg, const u8 *key, size_t key_len, const u8 *iv,
|
/dragonfly/crypto/libressl/crypto/cms/ |
H A D | cms_sd.c | 281 X509_ALGOR *alg; in CMS_add1_signer() local 345 X509_ALGOR_get0(&aoid, NULL, NULL, alg); in CMS_add1_signer() 351 alg = X509_ALGOR_new(); in CMS_add1_signer() 352 if (alg == NULL) in CMS_add1_signer() 354 X509_ALGOR_set_md(alg, md); in CMS_add1_signer() 356 X509_ALGOR_free(alg); in CMS_add1_signer() 954 X509_ALGOR *alg; in CMS_add_simple_smimecap() local 965 alg = X509_ALGOR_new(); in CMS_add_simple_smimecap() 966 if (alg == NULL) { in CMS_add_simple_smimecap() 971 X509_ALGOR_set0(alg, OBJ_nid2obj(algnid), in CMS_add_simple_smimecap() [all …]
|