/netbsd/external/mpl/dhcp/dist/includes/omapip/ |
H A D | hash.h | 78 #define HASH_FUNCTIONS_DECL(name, bufarg, type, hashtype) \ argument 79 void name##_hash_add (hashtype *, bufarg, unsigned, type *, \ 81 void name##_hash_delete (hashtype *, bufarg, unsigned, \ 83 int name##_hash_lookup (type **, hashtype *, bufarg, unsigned, \ 85 unsigned char * name##_hash_report(hashtype *); \ 86 int name##_hash_foreach (hashtype *, hash_foreach_func); \ 87 int name##_new_hash (hashtype **, unsigned, const char *, int); \ 88 void name##_free_hash_table (hashtype **, const char *, int); 92 void name##_hash_add (hashtype *table, \ 107 int name##_hash_lookup (type **ptr, hashtype *table, \ [all …]
|
/netbsd/crypto/external/bsd/netpgp/dist/src/lib/ |
H A D | ssh2pgp.c | 205 pgp_ssh2pubkey(pgp_io_t *io, const char *f, pgp_key_t *key, pgp_hash_alg_t hashtype) in pgp_ssh2pubkey() argument 328 pgp_keyid(key->sigid, sizeof(key->sigid), pubkey, hashtype); in pgp_ssh2pubkey() 330 pgp_fingerprint(&key->sigfingerprint, pubkey, hashtype); in pgp_ssh2pubkey() 345 …2seckey(pgp_io_t *io, const char *f, pgp_key_t *key, pgp_pubkey_t *pubkey, pgp_hash_alg_t hashtype) in pgp_ssh2seckey() argument 426 pgp_fingerprint(&key->sigfingerprint, pubkey, hashtype); in pgp_ssh2seckey() 427 pgp_keyid(key->sigid, sizeof(key->sigid), pubkey, hashtype); in pgp_ssh2seckey() 435 const char *secfile, unsigned hashtype) in pgp_ssh2_readkeys() argument 447 if (!pgp_ssh2pubkey(io, pubfile, &key, (pgp_hash_alg_t)hashtype)) { in pgp_ssh2_readkeys() 463 if (!pgp_ssh2seckey(io, secfile, &key, &pubkey->key.pubkey, (pgp_hash_alg_t)hashtype)) { in pgp_ssh2_readkeys()
|
H A D | keyring.c | 1185 pgp_keyid(key->sigid, PGP_KEY_ID_SIZE, pubkey, keyring->hashtype); in pgp_add_to_pubring() 1186 pgp_fingerprint(&key->sigfingerprint, pubkey, keyring->hashtype); in pgp_add_to_pubring() 1193 pgp_keyid(key->encid, PGP_KEY_ID_SIZE, pubkey, keyring->hashtype); in pgp_add_to_pubring() 1225 pgp_keyid(key->sigid, PGP_KEY_ID_SIZE, pubkey, keyring->hashtype); in pgp_add_to_secring() 1226 pgp_fingerprint(&key->sigfingerprint, pubkey, keyring->hashtype); in pgp_add_to_secring()
|
H A D | keyring.h | 73 pgp_hash_alg_t hashtype; member
|
H A D | misc.c | 485 pgp_fingerprint(pgp_fingerprint_t *fp, const pgp_pubkey_t *key, pgp_hash_alg_t hashtype) in pgp_fingerprint() argument 513 } else if (hashtype == PGP_HASH_MD5) { in pgp_fingerprint() 569 pgp_keyid(uint8_t *keyid, const size_t idlen, const pgp_pubkey_t *key, pgp_hash_alg_t hashtype) in pgp_keyid() argument 591 pgp_fingerprint(&finger, key, hashtype); in pgp_keyid()
|
H A D | netpgp.c | 351 unsigned hashtype; in readsshkeys() local 375 hashtype = PGP_HASH_MD5; in readsshkeys() 379 hashtype = PGP_HASH_MD5; in readsshkeys() 381 hashtype = PGP_HASH_SHA1; in readsshkeys() 383 hashtype = PGP_HASH_SHA256; in readsshkeys() 386 if (!pgp_ssh2_readkeys(netpgp->io, pubring, NULL, filename, NULL, hashtype)) { in readsshkeys() 412 if (!pgp_ssh2_readkeys(netpgp->io, pubring, secring, NULL, filename, hashtype)) { in readsshkeys()
|
H A D | packet.h | 910 pgp_hash_alg_t hashtype; member
|
/netbsd/sys/kern/ |
H A D | subr_hash.c | 53 hash_list_size(enum hashtype htype) in hash_list_size() 87 hashinit(u_int elements, enum hashtype htype, bool waitok, u_long *hashmask) in hashinit() 140 hashdone(void *hashtbl, enum hashtype htype, u_long hashmask) in hashdone()
|
/netbsd/crypto/dist/ipsec-tools/src/racoon/ |
H A D | pfkey.c | 513 ipsecdoi2pfkey_aalg(hashtype) in ipsecdoi2pfkey_aalg() argument 514 u_int hashtype; in ipsecdoi2pfkey_aalg() 516 switch (hashtype) { 553 "Invalid hash type: %u\n", hashtype); 747 keylen_aalg(hashtype) in keylen_aalg() argument 748 u_int hashtype; in keylen_aalg() 752 if (hashtype == 0) 755 res = alg_ipsec_hmacdef_hashlen(hashtype); 758 "invalid hmac algorithm %u.\n", hashtype); 809 u_int hashtype; [all …]
|
H A D | remoteconf.h | 63 int hashtype; member
|
H A D | remoteconf.c | 1061 alg_oakley_hashdef_name(prop->hashtype)); in dump_rmconf_single() 1205 proposal->hashtype != p->hashtype)
|
H A D | nattraversal.c | 136 saddr2str(addr), iph1->approval->hashtype, in natt_hash_addr()
|
H A D | oakley.c | 434 type = iph1->approval->hashtype; 464 type = iph1->approval->hashtype; 2652 prflen = alg_oakley_hashdef_hashlen(iph1->approval->hashtype); 2655 "invalid hash type %d.\n", iph1->approval->hashtype);
|
H A D | ipsec_doi.c | 223 s_oakley_attr_v(OAKLEY_ATTR_HASH_ALG, s->hashtype)); in print_ph1proposal() 463 sa->hashtype = (u_int16_t)ntohs(d->lorv); 2781 if (sa->hashtype) { 2784 p = isakmp_set_attr_l(p, OAKLEY_ATTR_HASH_ALG, sa->hashtype);
|
H A D | cfparse.y | 2877 new->hashtype = types[algclass_isakmp_hash];
|
/netbsd/sys/sys/ |
H A D | systm.h | 186 enum hashtype { enum 239 void *hashinit(u_int, enum hashtype, bool, u_long *); 240 void hashdone(void *, enum hashtype, u_long);
|
/netbsd/crypto/external/bsd/netpgp/dist/src/netpgpverify/ |
H A D | libverify.c | 800 pgpv_calc_fingerprint(pgpv_fingerprint_t *fingerprint, pgpv_pubkey_t *pubkey, const char *hashtype) in pgpv_calc_fingerprint() argument 811 fingerprint->hashalg = digest_get_alg(hashtype); in pgpv_calc_fingerprint() 873 calc_keyid(pgpv_pubkey_t *key, const char *hashtype) in calc_keyid() argument 875 pgpv_calc_fingerprint(&key->fingerprint, key, hashtype); in calc_keyid() 2890 fixup_ssh_keyid(pgpv_t *pgp, pgpv_signature_t *signature, const char *hashtype) in fixup_ssh_keyid() argument 2898 calc_keyid(pubkey, hashtype); in fixup_ssh_keyid()
|
/netbsd/usr.bin/vmstat/ |
H A D | vmstat.c | 1875 enum hashtype { /* from <sys/systm.h> */ enum 1892 enum hashtype type; /* type of hash table */
|