/openbsd/regress/lib/libcrypto/asn1/ |
H A D | x509_algor.c | 31 X509_ALGOR *alg = NULL; in x509_algor_new_test() local 41 if (alg->algorithm != aobj) { in x509_algor_new_test() 45 if (alg->parameter != NULL) { in x509_algor_new_test() 53 X509_ALGOR_free(alg); in x509_algor_new_test() 61 X509_ALGOR *alg = NULL; in x509_algor_set0_test() local 83 if (alg->algorithm != NULL) { in x509_algor_set0_test() 230 X509_ALGOR_free(alg); in x509_algor_set0_test() 239 X509_ALGOR *alg; in x509_algor_get0_test() local 317 X509_ALGOR_free(alg); in x509_algor_get0_test() 326 X509_ALGOR *alg = NULL; in x509_algor_set_evp_md_test() local [all …]
|
/openbsd/usr.bin/ssh/ |
H A D | digest-libc.c | 38 int alg; member 108 ssh_digest_by_alg(int alg) in ssh_digest_by_alg() argument 110 if (alg < 0 || alg >= SSH_DIGEST_MAX) in ssh_digest_by_alg() 112 if (digests[alg].id != alg) /* sanity */ in ssh_digest_by_alg() 114 return &(digests[alg]); in ssh_digest_by_alg() 120 int alg; in ssh_digest_alg_by_name() local 122 for (alg = 0; alg < SSH_DIGEST_MAX; alg++) { in ssh_digest_alg_by_name() 138 ssh_digest_bytes(int alg) in ssh_digest_bytes() argument 154 ssh_digest_start(int alg) in ssh_digest_start() argument 165 ret->alg = alg; in ssh_digest_start() [all …]
|
H A D | digest-openssl.c | 30 int alg; member 52 ssh_digest_by_alg(int alg) in ssh_digest_by_alg() argument 54 if (alg < 0 || alg >= SSH_DIGEST_MAX) in ssh_digest_by_alg() 56 if (digests[alg].id != alg) /* sanity */ in ssh_digest_by_alg() 58 return &(digests[alg]); in ssh_digest_by_alg() 64 int alg; in ssh_digest_alg_by_name() local 66 for (alg = 0; digests[alg].id != -1; alg++) { in ssh_digest_alg_by_name() 82 ssh_digest_bytes(int alg) in ssh_digest_bytes() argument 96 ssh_digest_start(int alg) in ssh_digest_start() argument 103 ret->alg = alg; in ssh_digest_start() [all …]
|
H A D | hmac.c | 27 int alg; member 36 ssh_hmac_bytes(int alg) in ssh_hmac_bytes() argument 38 return ssh_digest_bytes(alg); in ssh_hmac_bytes() 42 ssh_hmac_start(int alg) in ssh_hmac_start() argument 48 ret->alg = alg; in ssh_hmac_start() 49 if ((ret->ictx = ssh_digest_start(alg)) == NULL || in ssh_hmac_start() 50 (ret->octx = ssh_digest_start(alg)) == NULL || in ssh_hmac_start() 51 (ret->digest = ssh_digest_start(alg)) == NULL) in ssh_hmac_start() 72 else if (ssh_digest_memory(ctx->alg, key, klen, ctx->buf, in ssh_hmac_init() 108 len = ssh_digest_bytes(ctx->alg); in ssh_hmac_final()
|
H A D | digest.h | 39 const char *ssh_digest_alg_name(int alg); 42 size_t ssh_digest_bytes(int alg); 52 int ssh_digest_memory(int alg, const void *m, size_t mlen, 56 int ssh_digest_buffer(int alg, const struct sshbuf *b, u_char *d, size_t dlen) 60 struct ssh_digest_ctx *ssh_digest_start(int alg);
|
H A D | ssh-sk.c | 51 int (*sk_enroll)(int alg, const uint8_t *challenge, 303 switch (alg) { in sshsk_key_from_response() 315 error_f("unsupported algorithm %d", alg); in sshsk_key_from_response() 472 int alg; in sshsk_enroll() local 490 alg = SSH_SK_ECDSA; in sshsk_enroll() 494 alg = SSH_SK_ED25519; in sshsk_enroll() 639 int type, alg; in sshsk_sign() local 656 alg = SSH_SK_ECDSA; in sshsk_sign() 660 alg = SSH_SK_ED25519; in sshsk_sign() 821 switch (rks[i]->alg) { in sshsk_load_resident() [all …]
|
H A D | ssh-rsa.c | 341 rsa_hash_id_from_keyname(const char *alg) in rsa_hash_id_from_keyname() argument 345 if ((r = rsa_hash_id_from_ident(alg)) != -1) in rsa_hash_id_from_keyname() 347 if (strcmp(alg, "ssh-rsa-cert-v01@openssh.com") == 0) in rsa_hash_id_from_keyname() 349 if (strcmp(alg, "rsa-sha2-256-cert-v01@openssh.com") == 0) in rsa_hash_id_from_keyname() 351 if (strcmp(alg, "rsa-sha2-512-cert-v01@openssh.com") == 0) in rsa_hash_id_from_keyname() 400 const char *alg, const char *sk_provider, const char *sk_pin, u_int compat) in ssh_rsa_sign() argument 413 if (alg == NULL || strlen(alg) == 0) in ssh_rsa_sign() 416 hash_alg = rsa_hash_id_from_keyname(alg); in ssh_rsa_sign() 467 const u_char *data, size_t dlen, const char *alg, u_int compat, in ssh_rsa_verify() argument 497 if (alg != NULL && strcmp(alg, "ssh-rsa-cert-v01@openssh.com") != 0) { in ssh_rsa_verify() [all …]
|
/openbsd/lib/libcrypto/asn1/ |
H A D | x_algor.c | 164 ASN1_OBJECT_free(alg->algorithm); in X509_ALGOR_set0_obj() 165 alg->algorithm = aobj; in X509_ALGOR_set0_obj() 188 ASN1_TYPE_free(alg->parameter); in X509_ALGOR_set0_parameter() 189 alg->parameter = NULL; in X509_ALGOR_set0_parameter() 194 if (alg->parameter == NULL) in X509_ALGOR_set0_parameter() 196 if (alg->parameter == NULL) in X509_ALGOR_set0_parameter() 209 if (alg == NULL) in X509_ALGOR_set0_by_nid() 225 if (alg == NULL) in X509_ALGOR_set0() 247 *out_aobj = alg->algorithm; in X509_ALGOR_get0() 256 if (alg->parameter != NULL) { in X509_ALGOR_get0() [all …]
|
H A D | p5_pbe.c | 124 PKCS5_pbe_set0_algor(X509_ALGOR *algor, int alg, int iter, in PKCS5_pbe_set0_algor() argument 161 if (X509_ALGOR_set0(algor, OBJ_nid2obj(alg), V_ASN1_SEQUENCE, pbe_str)) in PKCS5_pbe_set0_algor() 174 PKCS5_pbe_set(int alg, int iter, const unsigned char *salt, int saltlen) in PKCS5_pbe_set() argument 183 if (PKCS5_pbe_set0_algor(ret, alg, iter, salt, saltlen)) in PKCS5_pbe_set()
|
/openbsd/gnu/usr.bin/perl/t/op/ |
H A D | crypt.t | 34 my $alg = ''; # Use default algorithm 35 if ( !defined(crypt("ab", $alg."cd")) ) { 36 $alg = '$5$'; # Try SHA-256 38 if ( !defined(crypt("ab", $alg."cd")) ) { 39 $alg = '$2b$12$FPWWO2RJ3CK4FINTw0Hi'; # Try Blowfish 41 if ( !defined(crypt("ab", $alg."cd")) ) { 42 $alg = ''; # Nothing worked. Back to default 47 ok(substr(crypt("ab", $alg."cd"), length($alg)+2) ne 48 substr(crypt("ab", $alg."ce"), length($alg)+2), 54 eval {$b = crypt($a, $alg."cd")}; [all …]
|
/openbsd/lib/libssl/test/ |
H A D | test_padlock | 28 for alg in $ACE_ALGS; do 29 echo $alg 31 $PROG enc -e -k "$HASH" -$alg -bufsize 999 -engine padlock | \ 32 $PROG enc -d -k "$HASH" -$alg | \ 35 echo "-$alg encrypt test failed" 39 $PROG enc -e -k "$HASH" -$alg | \ 40 $PROG enc -d -k "$HASH" -$alg -bufsize 999 -engine padlock | \ 43 echo "-$alg decrypt test failed" 47 $PROG enc -e -k "$HASH" -$alg -engine padlock | \ 48 $PROG enc -d -k "$HASH" -$alg -engine padlock | \ [all …]
|
H A D | test_aesni | 29 for alg in $AES_ALGS; do 30 echo $alg 33 $PROG enc -e -k "$HASH" -$alg -bufsize $bufsize -engine aesni | \ 34 $PROG enc -d -k "$HASH" -$alg | \ 37 echo "-$alg/$bufsize encrypt test failed" 43 $PROG enc -e -k "$HASH" -$alg | \ 44 $PROG enc -d -k "$HASH" -$alg -bufsize $bufsize -engine aesni | \ 47 echo "-$alg/$bufsize decrypt test failed" 52 $PROG enc -e -k "$HASH" -$alg -engine aesni | \ 53 $PROG enc -d -k "$HASH" -$alg -engine aesni | \ [all …]
|
/openbsd/lib/libcrypto/rsa/ |
H A D | rsa_ameth.c | 179 X509_ALGOR *alg; in rsa_pub_decode() local 275 const X509_ALGOR *alg; in rsa_priv_decode() local 593 if (alg != NULL) in rsa_pkey_ctrl() 622 *out_alg = alg; in rsa_md_to_algor() 623 alg = NULL; in rsa_md_to_algor() 669 *out_alg = alg; in rsa_mgf1md_to_maskGenAlgorithm() 670 alg = NULL; in rsa_mgf1md_to_maskGenAlgorithm() 688 if (!alg) in rsa_algor_to_md() 911 X509_ALGOR *alg; in rsa_cms_verify() local 1050 X509_ALGOR *alg; in rsa_cms_sign() local [all …]
|
/openbsd/gnu/usr.bin/perl/cpan/Digest-SHA/ |
H A D | shasum | 137 my ($alg, $binary, $check, $text, $status, $quiet, $warn, $help); 143 't|text' => \$text, 'a|algorithm=i' => \$alg, 183 $alg = 1 unless defined $alg; 230 $len2alg{56} = 512224 if $alg == 512224; 231 $len2alg{64} = 512256 if $alg == 512256; 262 ($bslash, $alg, $fname, $sum) = 264 $alg =~ tr{/}{}d if defined $alg; 269 $alg = defined $sum ? $len2alg{length($sum)} : undef; 271 if (grep { ! defined $_ } ($alg, $sum, $modesym, $fname) or 272 ! $isAlg{$alg}) { [all …]
|
H A D | SHA.xs | 60 shainit(s, alg) 62 int alg 75 newSHA(classname, alg) 77 int alg 82 if (!shainit(state, alg)) { 242 RETVAL = ix ? state->alg : (int) (state->digestlen << 3); 307 Copy(digcpy(state), ptr, state->alg <= SHA256 ? 32 : 64, UCHR); 308 ptr += state->alg <= SHA256 ? 32 : 64; 310 ptr += state->alg <= SHA256 ? 64 : 128; 333 if (len != (state->alg <= SHA256 ? 116U : 212U)) [all …]
|
/openbsd/gnu/usr.bin/perl/cpan/Digest-SHA/lib/Digest/ |
H A D | SHA.pm | 43 my($class, $alg) = @_; 44 $alg =~ s/\D+//g if defined $alg; 46 if (!defined($alg) || ($alg == $class->algorithm)) { 50 return shainit($class, $alg) ? $class : undef; 52 $alg = 1 unless defined $alg; 53 return $class->newSHA($alg); 161 my $alg = $self->algorithm or return; 163 my $nD = $alg <= 256 ? 8 : 16; 164 my $nH = $alg <= 256 ? 32 : 64; 165 my $nB = $alg <= 256 ? 64 : 128; [all …]
|
/openbsd/usr.bin/dig/lib/dns/ |
H A D | dst_api.c | 64 static isc_result_t frombuffer(unsigned int alg, 79 #define CHECKALG(alg) \ argument 82 _r = algorithm_status(alg); \ 121 dst_algorithm_supported(unsigned int alg) { in dst_algorithm_supported() argument 124 if (alg >= DST_MAX_ALGS || dst_t_func[alg] == NULL) in dst_algorithm_supported() 315 get_key_struct(unsigned int alg, in get_key_struct() argument 333 key->key_alg = alg; in get_key_struct() 337 key->func = dst_t_func[alg]; in get_key_struct() 372 ret = algorithm_status(alg); in frombuffer() 390 algorithm_status(unsigned int alg) { in algorithm_status() argument [all …]
|
H A D | tsig.c | 719 unsigned int alg; in dns_tsig_verify() local 813 alg = dst_key_alg(key); in dns_tsig_verify() 819 alg == DST_ALG_HMACSHA224 || alg == DST_ALG_HMACSHA256 || in dns_tsig_verify() 820 alg == DST_ALG_HMACSHA384 || alg == DST_ALG_HMACSHA512) in dns_tsig_verify() 986 alg == DST_ALG_HMACSHA224 || alg == DST_ALG_HMACSHA256 || in dns_tsig_verify() 987 alg == DST_ALG_HMACSHA384 || alg == DST_ALG_HMACSHA512) in dns_tsig_verify() 1055 unsigned int alg; in tsig_verify_tcp() local 1115 alg = dst_key_alg(key); in tsig_verify_tcp() 1120 alg == DST_ALG_HMACSHA1 || in tsig_verify_tcp() 1124 alg == DST_ALG_HMACSHA512) in tsig_verify_tcp() [all …]
|
/openbsd/lib/libcrypto/pkcs7/ |
H A D | pk7_attr.c | 102 X509_ALGOR *alg; in PKCS7_simple_smimecap() local 104 if (!(alg = X509_ALGOR_new())) { in PKCS7_simple_smimecap() 108 ASN1_OBJECT_free(alg->algorithm); in PKCS7_simple_smimecap() 109 alg->algorithm = OBJ_nid2obj(nid); in PKCS7_simple_smimecap() 113 if (!(alg->parameter = ASN1_TYPE_new())) in PKCS7_simple_smimecap() 121 alg->parameter->value.integer = nbit; in PKCS7_simple_smimecap() 122 alg->parameter->type = V_ASN1_INTEGER; in PKCS7_simple_smimecap() 124 if (sk_X509_ALGOR_push(sk, alg) == 0) in PKCS7_simple_smimecap() 130 X509_ALGOR_free(alg); in PKCS7_simple_smimecap()
|
/openbsd/gnu/usr.bin/perl/cpan/Digest-SHA/t/ |
H A D | state.t | 21 my @alg = (1, 256, 384, 512); 27 my $alg = shift @alg; 29 if ($alg == 384) { $skip = sha384_hex("") ? 0 : 1 } 30 if ($alg == 512) { $skip = sha512_hex("") ? 0 : 1 } 49 alg:1 57 alg:256 65 alg:384 73 alg:512
|
/openbsd/lib/libfido2/src/ |
H A D | tpm.c | 58 uint16_t alg; /* TPM_ALG_SHA256 */ 126 uint16_t alg; /* TPM_ALG_RSA */ 137 uint16_t alg; /* TPM_ALG_ECC */ 174 name->alg = TPM_ALG_SHA256; in get_signed_name() 188 x->alg = htobe16(x->alg); in bswap_rs256_pubarea() 201 x->alg = htobe16(x->alg); in bswap_es256_pubarea() 220 x->name.alg = htobe16(x->name.alg); in bswap_sha1_certinfo() 238 expected.alg = TPM_ALG_RSA; in check_rs256_pubarea() 273 expected.alg = TPM_ALG_ECC; in check_es256_pubarea() 351 if (attstmt->alg != COSE_RS1) { in fido_get_signed_hash_tpm() [all …]
|
/openbsd/lib/libkeynote/ |
H A D | signature.c | 649 if (alg == KEYNOTE_ALGORITHM_NONE) in keynote_sigverify_assertion() 654 !((alg == KEYNOTE_ALGORITHM_RSA) && in keynote_sigverify_assertion() 656 !((alg == KEYNOTE_ALGORITHM_X509) && in keynote_sigverify_assertion() 814 !((alg == KEYNOTE_ALGORITHM_RSA) && in keynote_sign_assertion() 816 !((alg == KEYNOTE_ALGORITHM_X509) && in keynote_sign_assertion() 818 ((alg != keyalg) && in keynote_sign_assertion() 819 !((alg == KEYNOTE_ALGORITHM_RSA) && in keynote_sign_assertion() 821 !((alg == KEYNOTE_ALGORITHM_X509) && in keynote_sign_assertion() 1079 if (alg != KEYNOTE_ALGORITHM_X509) in kn_sign_assertion() 1097 dc.dec_algorithm = alg; in kn_sign_assertion() [all …]
|
H A D | auxil.c | 42 keynote_keyhash(void *key, int alg) in keynote_keyhash() argument 52 switch (alg) in keynote_keyhash() 97 int alg; in keynote_in_action_authorizers() local 106 alg = kl2->key_alg; in keynote_in_action_authorizers() 111 alg = algorithm; in keynote_in_action_authorizers() 117 if ((kl->key_alg == alg) || in keynote_in_action_authorizers() 119 (alg == KEYNOTE_ALGORITHM_X509)) || in keynote_in_action_authorizers() 121 (alg == KEYNOTE_ALGORITHM_RSA))) in keynote_in_action_authorizers() 122 if (kn_keycompare(kl->key_key, s, alg) == RESULT_TRUE) in keynote_in_action_authorizers()
|
/openbsd/sys/crypto/ |
H A D | crypto.c | 287 crypto_register(u_int32_t driverid, int *alg, in crypto_register() argument 293 if (driverid >= crypto_drivers_num || alg == NULL || in crypto_register() 309 crypto_drivers[driverid].cc_alg[i] = alg[i]; in crypto_register() 330 crypto_unregister(u_int32_t driverid, int alg) in crypto_unregister() argument 342 alg <= 0 || alg > (CRYPTO_ALGORITHM_MAX + 1)) { in crypto_unregister() 347 if (alg != CRYPTO_ALGORITHM_MAX + 1) { in crypto_unregister() 348 if (crypto_drivers[driverid].cc_alg[alg] == 0) { in crypto_unregister() 352 crypto_drivers[driverid].cc_alg[alg] = 0; in crypto_unregister() 364 if (i == CRYPTO_ALGORITHM_MAX + 1 || alg == CRYPTO_ALGORITHM_MAX + 1) { in crypto_unregister()
|
/openbsd/gnu/usr.bin/perl/cpan/Digest-SHA/src/ |
H A D | sha.c | 254 if (s->alg <= SHA256) in digcpy() 272 if (s->alg <= SHA256) in statecpy() 304 static int shainit(SHA *s, int alg) in shainit() argument 306 if (alg >= SHA384 && !sha_384_512) in shainit() 308 if (alg != SHA1 && alg != SHA224 && alg != SHA256 && in shainit() 309 alg != SHA384 && alg != SHA512 && in shainit() 310 alg != SHA512224 && alg != SHA512256) in shainit() 312 s->alg = alg; in shainit() 487 if (!shainit(&h->isha, alg)) in hmacinit() 489 if (!shainit(&h->osha, alg)) in hmacinit() [all …]
|