HomeSort by: relevance | last modified time | path
    Searched defs:alg (Results 1 - 20 of 20) sorted by relevancy

  /src/tests/crypto/opencrypto/
h_sha2hmac.c 42 int alg; member in struct:__anon05d99ce00108
241 cs.mac = tests[i].alg;
  /src/lib/libresolv/
ns_sign.c 100 u_char *alg; local in function:ns_sign2
137 /* Alg. */
148 alg = cp;
195 nn = ns_name_ntol(alg, buf, sizeof(buf));
338 /* Alg. */
ns_verify.c 143 char name[MAXDNAME], alg[MAXDNAME]; local in function:ns_verify
183 n = dn_expand(msg, eom, cp, alg, MAXDNAME);
186 if (ns_samename(alg, NS_TSIG_ALG_HMAC_MD5) != 1)
268 n = ns_name_pton(alg, buf2, sizeof(buf2));
349 char name[MAXDNAME], alg[MAXDNAME]; local in function:ns_verify_tcp
410 n = dn_expand(msg, eom, cp, alg, MAXDNAME);
413 if (ns_samename(alg, NS_TSIG_ALG_HMAC_MD5) != 1)
dst_api.c 24 * int dst_check_algorithm() Function to determines if alg is supported.
81 static DST_KEY *dst_s_get_key_struct(const char *name, const int alg,
138 * alg 1 KEY_RSA
147 dst_check_algorithm(const int alg)
149 return (dst_t_func[alg] != NULL);
158 * alg: the algorithm number
167 dst_s_get_key_struct(const char *name, const int alg, const int flags,
172 if (dst_check_algorithm(alg)) /*%< make sure alg is available */
183 new_key->dk_alg = alg;
473 int flags, proto, alg, dlen; local in function:dst_s_read_public_key
655 int alg ; local in function:dst_dnskey_to_key
831 int alg, major, minor, file_major, file_minor; local in function:dst_s_read_private_key_file
    [all...]
  /src/usr.bin/netstat/
fast_ipsec.c 70 struct alg { struct
86 snprintf(buf, sizeof(buf), "alg#%zu", a);
  /src/sys/net/npf/
npf_alg.c 48 * NAT ALG description structure. For more compact use of cache,
95 npf_alg_t *alg = &aset->alg_list[i]; local in function:npf_alg_lookup
96 const char *aname = alg->na_name;
99 return alg;
107 npf_alg_t *alg; local in function:npf_alg_construct
110 if ((alg = npf_alg_lookup(npf, name)) == NULL) {
120 alg = npf_alg_lookup(npf, name);
123 return alg;
134 npf_alg_t *alg; local in function:npf_alg_register
145 alg = &aset->alg_list[i]
343 const npf_alg_t *alg = &aset->alg_list[i]; local in function:npf_alg_export
    [all...]
npf_ctl.c 306 const nvlist_t *alg = algs[i]; local in function:npf_mk_algs
309 name = dnvlist_get_string(alg, "name", NULL);
npf_nat.c 147 /* ALG (if any) associated with this NAT entry. */
329 npf_nat_freealg(npf_natpolicy_t *np, npf_alg_t *alg)
335 if (nt->nt_alg == alg) {
336 npf_alg_destroy(np->n_npfctx, alg, nt, nt->nt_conn);
605 /* Execute ALG translation first. */
788 /* Determine whether any ALG matches. */
841 * npf_nat_setalg: associate an ALG with the NAT entry.
844 npf_nat_setalg(npf_nat_t *nt, npf_alg_t *alg, uintptr_t arg)
846 nt->nt_alg = alg;
870 npf_alg_t *alg; local in function:npf_nat_destroy
    [all...]
  /src/sys/dev/marvell/
mvcesa.c 379 uint32_t alg, mode, dir, *iv, ivbuf[2]; local in function:mvcesa_process
383 alg = MVCESA_DESE_C_ALGORITHM_DES;
385 alg = MVCESA_DESE_C_ALGORITHM_3DES;
420 alg, mode, dir, iv, crd->crd_skip, crd->crd_len,
431 uint32_t alg, *iv = NULL, digest[512 / 8 / 4], dlen; local in function:mvcesa_process
435 alg = MVCESA_SHA1MD5I_AC_ALGORITHM_SHA1;
438 alg = MVCESA_SHA1MD5I_AC_ALGORITHM_MD5;
449 alg, iv, digest, bits, crd->crd_skip, crd->crd_len,
457 ses, alg, ses->ses_hmouter, digest,
486 uint32_t alg, uint32_t *iv, uint32_t *digest
    [all...]
  /src/sys/netipsec/
key_debug.c 259 const struct sadb_alg *alg; local in function:kdebug_sadb_supported
267 / sizeof(*alg);
268 alg = (const void *)(sup + 1);
272 alg->sadb_alg_id, alg->sadb_alg_ivlen,
273 alg->sadb_alg_minbits, alg->sadb_alg_maxbits);
274 alg++;
key.c 6583 key_getsizes_ah(const struct auth_hash *ah, int alg,
6592 switch (alg) {
6597 IPSECLOG(LOG_DEBUG, "unknown AH algorithm %u\n", alg);
7300 struct sadb_alg *alg; local in function:key_api_register
7348 alg = (struct sadb_alg *)(mtod(n, char *) + off);
7349 alg->sadb_alg_id = i;
7350 alg->sadb_alg_ivlen = 0;
7352 alg->sadb_alg_minbits = _BITS(minkeysize);
7353 alg->sadb_alg_maxbits = _BITS(maxkeysize);
7354 alg->sadb_alg_reserved = 0
    [all...]
  /src/lib/libc/nameser/
ns_print.c 586 u_int c_type, key_tag, alg; local in function:ns_sprintrrf
594 alg = (u_int) *rdata++;
596 len = SPRINTF((tmp1, "%d %d %d ", c_type, key_tag, alg));
  /src/usr.bin/bdes/
bdes.c 151 } alg = ALG_CBC; variable in typeref:enum:__anon7e630d990203
219 alg = ALG_ECB;
225 alg = ALG_CFBA;
234 alg = ALG_CFB;
253 alg = ALG_OFB;
287 inverse = (alg == ALG_CBC || alg == ALG_ECB) && mode == MODE_DECRYPT;
289 switch(alg) {
  /src/sbin/cgdconfig/
params.c 77 char alg[32]; member in struct:crypto_defaults
812 keygen_shared(string_t *id, string_t *alg, bits_t *info)
815 const char *algname = string_tocharstar(alg);
1101 crypt_defaults_lookup(const char *alg)
1106 if (!strcmp(alg, crypto_defaults[i].alg))
cgdconfig.c 128 int alg; member in struct:sharedkey
201 "[-P paramsfile] [-o outfile] alg [keylen]\n", getprogname());
203 (void)fprintf(stderr, " %s -s [-nv] [-i ivmeth] cgd dev alg "
433 getsubkey(int alg, bits_t *key, bits_t *info, size_t subkeylen)
436 switch (alg) {
440 warnx("unrecognised shared key derivation method %d", alg);
466 if (kg->kg_sharedalg == sk->alg &&
516 sk->alg = kg->kg_sharedalg;
993 VPRINTF(1, (" with alg %s keylen %zu blocksize %zu ivmethod %s\n",
  /src/usr.sbin/npf/npfctl/
npf_parse.y 100 %token ALG
251 | alg
256 alg label
257 : ALG STRING
  /src/sys/dev/
cgd.c 66 const char *alg; member in struct:selftest_params
310 .alg = "aes-xts",
321 .alg = "aes-xts",
332 .alg = "aes-cbc",
343 .alg = "aes-cbc",
354 .alg = "3des-cbc",
365 .alg = "blowfish-cbc",
376 .alg = "aes-cbc",
1668 const char *alg = selftests[i].alg; local in function:cgd_selftest
    [all...]
  /src/usr.sbin/syslogd/
tls.c 356 DPRINTF(D_TLS, "get_fingerprint(cert@%p, return@%p, alg \"%s\")\n",
529 char alg[MAX_ALG_NAME_LENGTH]; local in function:match_fingerprint
540 p = alg;
542 while (*q != ':' && *q != '\0' && p < alg + MAX_ALG_NAME_LENGTH)
546 if (!get_fingerprint(cert, &certfingerprint, alg)) {
547 DPRINTF(D_TLS, "cannot get %s digest\n", alg);
  /src/sys/dev/ic/
arn9003.c 398 ar9003_restore_rom_block(struct athn_softc *sc, uint8_t alg, uint8_t ref,
405 if (alg == AR_EEP_COMPRESS_BLOCK) {
437 else if (alg == AR_EEP_COMPRESS_NONE) {
453 uint8_t *buf, *ptr, alg, ref; local in function:ar9003_read_rom
478 alg = (ptr[0] & 0xe0) >> 5;
482 "ROM block %zd: alg=%d ref=%d len=%zd\n",
483 i, alg, ref, len);
509 ar9003_restore_rom_block(sc, alg, ref, buf, len);
  /src/include/arpa/
nameser.h 267 char name[NS_MAXDNAME], alg[NS_MAXDNAME]; member in struct:ns_tsig_key
287 #define NS_TSIG_ALG_HMAC_MD5 "HMAC-MD5.SIG-ALG.REG.INT"
443 #define NS_ALG_EXPIRE_ONLY 253 /*%< No alg, no security */
444 #define NS_ALG_PRIVATE_OID 254 /*%< Key begins with OID giving alg */

Completed in 33 milliseconds