/openbsd/regress/lib/libskey/ |
H A D | skeytest.c | 41 char *algo, *zero, *one, *nine; member 89 for(rr = rp->res; rr->algo; rr++) { in main() 90 if (skey_set_algorithm(rr->algo) == NULL) { in main() 93 i, rr->algo); in main() 97 if (strcmp(skey_get_algorithm(), rr->algo) != 0) { in main() 100 i, rr->algo); in main() 110 i, rr->algo, rr->zero, prn); in main() 119 i, rr->algo, rr->one, prn); in main() 129 i, rr->algo, rr->nine, prn); in main()
|
/openbsd/sbin/unwind/libunbound/validator/ |
H A D | val_secalgo.c | 134 switch(algo) { in secalgo_nsec3_hash() 232 switch(algo) { in ds_digest_size_supported() 323 algo); in secalgo_ds_digest() 684 algo); in setup_key_digest() 749 …if(fake_sha1 && (algo == LDNS_DSA || algo == LDNS_DSA_NSEC3 || algo == LDNS_RSASHA1 || algo == LDN… in verify_canonrrset() 761 if((algo == LDNS_DSA || algo == LDNS_DSA_NSEC3) && in verify_canonrrset() 997 algo); in secalgo_ds_digest() 1358 algo); in nss_setup_key_digest() 1405 if((algo == LDNS_DSA || algo == LDNS_DSA_NSEC3)) { in verify_canonrrset() 1706 algo); in secalgo_ds_digest() [all …]
|
H A D | val_kentry.c | 62 if(kd->algo) in key_entry_sizefunc() 97 free(kd->algo); in key_entry_deldatafunc() 143 if(d->algo) { in key_entry_copy_toregion() 145 (char*)d->algo); in key_entry_copy_toregion() 146 if(!newd->algo) in key_entry_copy_toregion() 205 if(d->algo) { in key_entry_copy() 206 newd->algo = (uint8_t*)strdup((char*)d->algo); in key_entry_copy() 298 d->algo = NULL; in key_entry_create_null() 328 if(!d->algo) in key_entry_create_rrset() 353 d->algo = NULL; in key_entry_create_bad() [all …]
|
H A D | val_secalgo.h | 60 int secalgo_nsec3_hash(int algo, unsigned char* buf, size_t len, 118 size_t ds_digest_size_supported(int algo); 127 int secalgo_ds_digest(int algo, unsigned char* buf, size_t len, 146 enum sec_status verify_canonrrset(struct sldns_buffer* buf, int algo,
|
H A D | val_sigcrypt.c | 439 uint8_t algo; in algo_needs_init_dnskey_add() local 448 n->needs[algo] = 1; in algo_needs_init_dnskey_add() 449 sigalg[total] = algo; in algo_needs_init_dnskey_add() 459 uint8_t algo; in algo_needs_init_list() local 466 n->needs[algo] = 1; in algo_needs_init_list() 475 uint8_t algo; in algo_needs_init_ds() local 488 n->needs[algo] = 1; in algo_needs_init_ds() 489 sigalg[total] = algo; in algo_needs_init_ds() 499 if(n->needs[algo]) { in algo_needs_set_secure() 500 n->needs[algo] = 0; in algo_needs_set_secure() [all …]
|
H A D | val_nsec3.c | 223 int* algo, size_t* iter, uint8_t** salt, size_t* saltlen) in nsec3_get_params() argument 229 *algo = nsec3_get_algo(rrset, r); in nsec3_get_params() 570 hash_len = nsec3_hash_algo_size_supported(algo); in nsec3_get_hashed() 572 log_err("nsec3 hash of unknown algo %d", algo); in nsec3_get_hashed() 577 if(!secalgo_nsec3_hash(algo, (unsigned char*)sldns_buffer_begin(buf), in nsec3_get_hashed() 585 if(!secalgo_nsec3_hash(algo, in nsec3_get_hashed() 598 int algo = nsec3_get_algo(c->nsec3, c->rr); in nsec3_calc_hash() local 610 c->hash_len = nsec3_hash_algo_size_supported(algo); in nsec3_calc_hash() 612 log_err("nsec3 hash of unknown algo %d", algo); in nsec3_calc_hash() 618 (void)secalgo_nsec3_hash(algo, (unsigned char*)sldns_buffer_begin(buf), in nsec3_calc_hash() [all …]
|
H A D | val_sigcrypt.h | 109 int algo_needs_set_secure(struct algo_needs* n, uint8_t algo); 117 void algo_needs_set_bogus(struct algo_needs* n, uint8_t algo);
|
H A D | val_nsec3.h | 360 int* algo, size_t* iter, uint8_t** salt, size_t* saltlen); 376 int algo, size_t iter, uint8_t* salt, size_t saltlen, uint8_t* res,
|
/openbsd/usr.sbin/unbound/validator/ |
H A D | val_secalgo.c | 134 switch(algo) { in secalgo_nsec3_hash() 232 switch(algo) { in ds_digest_size_supported() 323 algo); in secalgo_ds_digest() 684 algo); in setup_key_digest() 749 …if(fake_sha1 && (algo == LDNS_DSA || algo == LDNS_DSA_NSEC3 || algo == LDNS_RSASHA1 || algo == LDN… in verify_canonrrset() 761 if((algo == LDNS_DSA || algo == LDNS_DSA_NSEC3) && in verify_canonrrset() 997 algo); in secalgo_ds_digest() 1358 algo); in nss_setup_key_digest() 1405 if((algo == LDNS_DSA || algo == LDNS_DSA_NSEC3)) { in verify_canonrrset() 1706 algo); in secalgo_ds_digest() [all …]
|
H A D | val_kentry.c | 62 if(kd->algo) in key_entry_sizefunc() 97 free(kd->algo); in key_entry_deldatafunc() 143 if(d->algo) { in key_entry_copy_toregion() 145 (char*)d->algo); in key_entry_copy_toregion() 146 if(!newd->algo) in key_entry_copy_toregion() 205 if(d->algo) { in key_entry_copy() 206 newd->algo = (uint8_t*)strdup((char*)d->algo); in key_entry_copy() 298 d->algo = NULL; in key_entry_create_null() 328 if(!d->algo) in key_entry_create_rrset() 353 d->algo = NULL; in key_entry_create_bad() [all …]
|
H A D | val_secalgo.h | 60 int secalgo_nsec3_hash(int algo, unsigned char* buf, size_t len, 118 size_t ds_digest_size_supported(int algo); 127 int secalgo_ds_digest(int algo, unsigned char* buf, size_t len, 146 enum sec_status verify_canonrrset(struct sldns_buffer* buf, int algo,
|
H A D | val_sigcrypt.c | 439 uint8_t algo; in algo_needs_init_dnskey_add() local 448 n->needs[algo] = 1; in algo_needs_init_dnskey_add() 449 sigalg[total] = algo; in algo_needs_init_dnskey_add() 459 uint8_t algo; in algo_needs_init_list() local 466 n->needs[algo] = 1; in algo_needs_init_list() 475 uint8_t algo; in algo_needs_init_ds() local 488 n->needs[algo] = 1; in algo_needs_init_ds() 489 sigalg[total] = algo; in algo_needs_init_ds() 499 if(n->needs[algo]) { in algo_needs_set_secure() 500 n->needs[algo] = 0; in algo_needs_set_secure() [all …]
|
H A D | val_nsec3.c | 223 int* algo, size_t* iter, uint8_t** salt, size_t* saltlen) in nsec3_get_params() argument 229 *algo = nsec3_get_algo(rrset, r); in nsec3_get_params() 570 hash_len = nsec3_hash_algo_size_supported(algo); in nsec3_get_hashed() 572 log_err("nsec3 hash of unknown algo %d", algo); in nsec3_get_hashed() 577 if(!secalgo_nsec3_hash(algo, (unsigned char*)sldns_buffer_begin(buf), in nsec3_get_hashed() 585 if(!secalgo_nsec3_hash(algo, in nsec3_get_hashed() 598 int algo = nsec3_get_algo(c->nsec3, c->rr); in nsec3_calc_hash() local 610 c->hash_len = nsec3_hash_algo_size_supported(algo); in nsec3_calc_hash() 612 log_err("nsec3 hash of unknown algo %d", algo); in nsec3_calc_hash() 618 (void)secalgo_nsec3_hash(algo, (unsigned char*)sldns_buffer_begin(buf), in nsec3_calc_hash() [all …]
|
H A D | val_sigcrypt.h | 109 int algo_needs_set_secure(struct algo_needs* n, uint8_t algo); 117 void algo_needs_set_bogus(struct algo_needs* n, uint8_t algo);
|
H A D | val_nsec3.h | 360 int* algo, size_t* iter, uint8_t** salt, size_t* saltlen); 376 int algo, size_t iter, uint8_t* salt, size_t saltlen, uint8_t* res,
|
/openbsd/regress/usr.bin/ssh/ |
H A D | hostbased.sh | 51 for algo in $algos; do 52 trace "hostbased algo $algo" 54 if [ "x$algo" != "xdefault" ]; then 55 opts="$opts -oHostbasedAcceptedAlgorithms=$algo" 59 fail "connect failed, hostbased algo $algo" 61 fail "hostbased algo $algo bad SSH_CONNECTION" \ 64 verbose "ok hostbased algo $algo"
|
/openbsd/sys/dev/pci/drm/i915/display/ |
H A D | intel_gmbus.c | 438 struct i2c_algo_bit_data *algo; in intel_gpio_setup() local 440 algo = &bus->bit_algo; in intel_gpio_setup() 443 bus->adapter.algo_data = algo; in intel_gpio_setup() 445 algo->setsda = set_data; in intel_gpio_setup() 446 algo->setscl = set_clock; in intel_gpio_setup() 447 algo->getsda = get_data; in intel_gpio_setup() 448 algo->getscl = get_clock; in intel_gpio_setup() 449 algo->pre_xfer = intel_gpio_pre_xfer; in intel_gpio_setup() 451 algo->udelay = I2C_RISEFALL_TIME; in intel_gpio_setup() 453 algo->data = bus; in intel_gpio_setup() [all …]
|
/openbsd/usr.bin/skey/ |
H A D | skey.c | 43 char buf[33], *seed, *slash, *algo; in main() local 51 algo = __progname + 4; in main() 52 if (skey_set_algorithm(algo) == NULL) in main() 53 errx(1, "Unknown hash algorithm %s", algo); in main()
|
/openbsd/sbin/unwind/libunbound/sldns/ |
H A D | keyraw.c | 560 sldns_ecdsa2pkey_raw(unsigned char* key, size_t keylen, uint8_t algo) in sldns_ecdsa2pkey_raw() argument 571 if(algo == LDNS_ECDSAP256SHA256) { in sldns_ecdsa2pkey_raw() 574 } else if(algo == LDNS_ECDSAP384SHA384) { in sldns_ecdsa2pkey_raw() 623 if(algo == LDNS_ECDSAP256SHA256) { in sldns_ecdsa2pkey_raw() 626 } else if(algo == LDNS_ECDSAP384SHA384) { in sldns_ecdsa2pkey_raw()
|
H A D | keyraw.h | 95 EVP_PKEY* sldns_ecdsa2pkey_raw(unsigned char* key, size_t keylen, uint8_t algo);
|
/openbsd/usr.sbin/unbound/sldns/ |
H A D | keyraw.c | 560 sldns_ecdsa2pkey_raw(unsigned char* key, size_t keylen, uint8_t algo) in sldns_ecdsa2pkey_raw() argument 571 if(algo == LDNS_ECDSAP256SHA256) { in sldns_ecdsa2pkey_raw() 574 } else if(algo == LDNS_ECDSAP384SHA384) { in sldns_ecdsa2pkey_raw() 623 if(algo == LDNS_ECDSAP256SHA256) { in sldns_ecdsa2pkey_raw() 626 } else if(algo == LDNS_ECDSAP384SHA384) { in sldns_ecdsa2pkey_raw()
|
H A D | keyraw.h | 95 EVP_PKEY* sldns_ecdsa2pkey_raw(unsigned char* key, size_t keylen, uint8_t algo);
|
/openbsd/usr.sbin/unbound/testcode/ |
H A D | unitverify.c | 165 uint8_t algo = (uint8_t)dnskey_get_algo(dnskey, i); in setup_sigalg() local 166 if(a[algo] == 0) { in setup_sigalg() 167 a[algo] = 1; in setup_sigalg() 168 sigalg[n++] = algo; in setup_sigalg()
|
/openbsd/sys/dev/pci/drm/include/linux/ |
H A D | i2c.h | 65 const struct i2c_algorithm *algo; member
|
/openbsd/usr.bin/signify/ |
H A D | signify.c | 597 char algo[32]; member 635 if (strcmp(c->algo, "SHA256") == 0) { in verifychecksum() 639 } else if (strcmp(c->algo, "SHA512") == 0) { in verifychecksum() 644 errx(1, "can't handle algorithm %s", c->algo); in verifychecksum() 682 c.algo, c.file, c.hash); in verifychecksums()
|