| /src/external/bsd/unbound/dist/validator/ |
| val_kentry.h | 87 uint8_t* algo; member in struct:key_entry_data
|
| val_kentry.c | 62 if(kd->algo) 63 s += strlen((char*)kd->algo)+1; 97 free(kd->algo); 143 if(d->algo) { 144 newd->algo = (uint8_t*)regional_strdup(region, 145 (char*)d->algo); 146 if(!newd->algo) 205 if(d->algo) { 206 newd->algo = (uint8_t*)strdup((char*)d->algo); 391 int algo; local [all...] |
| val_nsec3.c | 223 int* algo, size_t* iter, uint8_t** salt, size_t* saltlen) 229 *algo = nsec3_get_algo(rrset, r); 364 /* skip unknown flags, algo */ 393 /** see if at least one RR is known (flags, algo) */ 408 * (skips the unknown flag and unknown algo NSEC3s). 435 /* skip unknown flags, algo */ 560 nsec3_get_hashed(sldns_buffer* buf, uint8_t* nm, size_t nmlen, int algo, 571 hash_len = nsec3_hash_algo_size_supported(algo); 573 log_err("nsec3 hash of unknown algo %d", algo); 600 int algo = nsec3_get_algo(c->nsec3, c->rr); local [all...] |
| val_sigcrypt.c | 128 * @return algo or 0 if malformed rrsig. 341 verbose(VERB_QUERY, "DS fail: DS RR algo and digest do not " 354 return 0; /* digest algo failed */ 440 uint8_t algo; local 445 algo = (uint8_t)dnskey_get_algo(dnskey, i); 446 if(!dnskey_algo_id_is_supported((int)algo)) 448 if(n->needs[algo] == 0) { 449 n->needs[algo] = 1; 450 sigalg[total] = algo; 460 uint8_t algo; local 476 uint8_t algo; local 567 int algo = rrset_get_sig_algo(rrset, sig_idx); local 717 int algo = dnskey_get_algo(dnskey, dnskey_idx); local [all...] |
| /src/sys/external/bsd/drm2/dist/drm/nouveau/nvkm/subdev/i2c/ |
| nouveau_nvkm_subdev_i2c_bus.c | 37 * i2c-algo-bit 82 * !i2c-algo-bit (off-chip i2c bus / hw i2c / internal bit-banging algo) 175 if ((bus->i2c.algo == &i2c_bit_algo) && (info[i].udelay != 0)) { 176 struct i2c_algo_bit_data *algo = bus->i2c.algo_data; local 178 info[i].udelay, algo->udelay); 179 orig_udelay = algo->udelay; 180 algo->udelay = info[i].udelay; 191 struct i2c_algo_bit_data *algo = bus->i2c.algo_data; local 192 algo->udelay = orig_udelay [all...] |
| /src/crypto/external/bsd/openssl/dist/crypto/cmp/ |
| cmp_protect.c | 229 ASN1_OBJECT *algo = NULL; local 236 if ((algo = OBJ_nid2obj(nid)) == NULL) 241 if (X509_ALGOR_set0(*alg, algo, V_ASN1_UNDEF, NULL)) 243 ASN1_OBJECT_free(algo);
|
| /src/sys/external/bsd/drm2/include/linux/ |
| i2c.h | 92 const struct i2c_algorithm *algo; member in struct:i2c_adapter
|
| /src/external/bsd/unbound/dist/testcode/ |
| unitverify.c | 171 uint8_t algo = (uint8_t)dnskey_get_algo(dnskey, i); local 172 if(a[algo] == 0) { 173 a[algo] = 1; 174 sigalg[n++] = algo; 426 /** Test hash algo - NSEC3 hash it and compare result */ 474 /** Read file to test NSEC3 hash algo */
|
| /src/sys/external/bsd/drm2/dist/drm/i915/display/ |
| intel_gmbus.c | 36 #include <linux/i2c-algo-bit.h> 316 struct i2c_algo_bit_data *algo; local 318 algo = &bus->bit_algo; 321 bus->adapter.algo_data = algo; 322 algo->setsda = set_data; 323 algo->setscl = set_clock; 324 algo->getsda = get_data; 325 algo->getscl = get_clock; 326 algo->pre_xfer = intel_gpio_pre_xfer; 327 algo->post_xfer = intel_gpio_post_xfer [all...] |
| /src/sys/netinet/ |
| portalgo.c | 155 uint16_t *mymin, uint16_t *mymax, uint16_t **pnext_ephemeral, int algo) 227 [portalgo_af][portalgo_range][algo]; 374 algo_bsd(int algo, uint16_t *port, struct inpcb *inp, kauth_cred_t cred) 383 &next_ephemeral, algo); 410 algo_random_start(int algo, uint16_t *port, struct inpcb *inp, 421 &next_ephemeral, algo); 464 algo_random_pick(int algo, uint16_t *port, struct inpcb *inp, 475 &next_ephemeral, algo); 602 algo_hash(int algo, uint16_t *port, struct inpcb *inp, 614 &next_ephemeral, algo); 749 int algo, error; local [all...] |
| /src/sys/net80211/ |
| ieee80211_input.c | 2459 u_int16_t algo, seq, status; local 2473 algo = le16toh(*(u_int16_t *)frm); 2479 ether_snprintf(ebuf, sizeof(ebuf), wh->i_addr2), algo, seq); 2511 if (algo == IEEE80211_AUTH_ALG_SHARED) { 2514 } else if (algo == IEEE80211_AUTH_ALG_OPEN) { 2518 wh, "auth", "unsupported alg %d", algo);
|
| /src/usr.sbin/npf/npfctl/ |
| npf_show.c | 701 const char *ifname, *algo, *seg1, *seg2, *arrow; local 759 algo = "algo netmap "; 762 algo = "algo ip-hash "; 765 algo = "algo round-robin "; 768 algo = "algo npt66 "; 771 algo = "" [all...] |
| /src/crypto/external/apache2/openssl/dist/apps/ |
| ts.c | 471 X509_ALGOR *algo = NULL; local 484 if ((algo = X509_ALGOR_new()) == NULL) 486 if ((algo->algorithm = OBJ_nid2obj(EVP_MD_get_type(md))) == NULL) 488 if ((algo->parameter = ASN1_TYPE_new()) == NULL) 490 algo->parameter->type = V_ASN1_NULL; 491 if (!TS_MSG_IMPRINT_set_algo(msg_imprint, algo)) 521 X509_ALGOR_free(algo);
|
| /src/crypto/external/bsd/openssl/dist/apps/ |
| ts.c | 448 X509_ALGOR *algo = NULL; local 461 if ((algo = X509_ALGOR_new()) == NULL) 463 if ((algo->algorithm = OBJ_nid2obj(EVP_MD_get_type(md))) == NULL) 465 if ((algo->parameter = ASN1_TYPE_new()) == NULL) 467 algo->parameter->type = V_ASN1_NULL; 468 if (!TS_MSG_IMPRINT_set_algo(msg_imprint, algo)) 498 X509_ALGOR_free(algo);
|
| speed.c | 1736 const char *algo = *argv; local 1738 if (opt_found(algo, doit_choices, &i)) { 1742 if (strcmp(algo, "des") == 0) { 1746 if (strcmp(algo, "sha") == 0) { 1751 if (strcmp(algo, "openssl") == 0) /* just for compatibility */ 1754 if (strncmp(algo, "rsa", 3) == 0) { 1755 if (algo[3] == '\0') { 1759 if (opt_found(algo, rsa_choices, &i)) { 1765 if (strncmp(algo, "ffdh", 4) == 0) { 1766 if (algo[4] == '\0') [all...] |
| /src/crypto/external/bsd/openssl.old/dist/apps/ |
| ts.c | 421 X509_ALGOR *algo = NULL; local 434 if ((algo = X509_ALGOR_new()) == NULL) 436 if ((algo->algorithm = OBJ_nid2obj(EVP_MD_type(md))) == NULL) 438 if ((algo->parameter = ASN1_TYPE_new()) == NULL) 440 algo->parameter->type = V_ASN1_NULL; 441 if (!TS_MSG_IMPRINT_set_algo(msg_imprint, algo)) 471 X509_ALGOR_free(algo);
|
| /src/external/apache2/mDNSResponder/dist/mDNSCore/ |
| DNSDigest.c | 1713 domainname * algo; local 1718 algo = (domainname*) ptr; 1721 const DNSDigest_HMACAlgorithm algorithm = DNSDigest_GetHMACAlgorithmFromName(algo); 1726 if (!SameDomainName(algo, kHMAC_MD5_AlgName)) 1730 "algorithm name: " PUB_DM_NAME, DM_NAME_PARAM(algo)); 1737 ptr += DomainNameLength(algo); 1832 CCHmacUpdate(&hmacContext, algo->c, DomainNameLength(algo)); 1834 MD5_Update(&c, algo->c, DomainNameLength(algo)); [all...] |
| /src/external/mpl/bind/dist/bin/dnssec/ |
| dnssec-cds.c | 114 * The key algorithm and ID are saved in keyinfo->algo and 121 dns_secalg_t algo; member in struct:keyinfo 490 if (ki->tag != ds.key_tag || ki->algo != ds.algorithm) { 499 "keytag=%d, algo=%d, digest=%d): %s\n", 525 ki->tag, ki->algo); 561 ki->algo = dnskey.algorithm; 576 "keytag=%d, algo=%d): %s\n", 577 ki->tag, ki->algo, isc_result_totext(result)); 615 dns_secalg_t *algo; local 620 algo = isc_mem_cget(mctx, nkey, sizeof(algo[0])) [all...] |
| /src/external/mpl/dhcp/bind/dist/lib/dns/ |
| keymgr.c | 441 uint32_t algo = dns_kasp_key_algorithm(kkey); local 447 RETERR(dst_key_generate(origin, algo, size, 0, keyflags,
|
| /src/sys/dev/pci/qat/ |
| qat.c | 1407 enum hw_cipher_algo algo = HW_CIPHER_ALGO_NULL; local 1413 algo = HW_CIPHER_ALGO_DES; 1417 algo = HW_CIPHER_ALGO_3DES; 1423 algo = HW_CIPHER_ALGO_AES128; 1426 algo = HW_CIPHER_ALGO_AES192; 1429 algo = HW_CIPHER_ALGO_AES256; 1451 return HW_CIPHER_CONFIG_BUILD(mode, algo, key_convert, 1461 enum qat_sym_hash_algorithm algo = 0; local 1465 algo = QAT_SYM_HASH_MD5; 1468 algo = QAT_SYM_HASH_SHA1 [all...] |
| /src/external/bsd/nsd/dist/ |
| remote.c | 2298 log_msg(LOG_INFO, "changing secret provided with the key: %s with old secret %s and algo: %s\n", arg, key_opt->secret, key_opt->algorithm); 2320 /** do the add tsig command, add new key with name, secret and algo given */ 2328 char algo[256]; local 2337 strlcpy(algo, "hmac-sha256", sizeof(algo)); 2339 strlcpy(algo, arg3, sizeof(algo)); 2362 if(tsig_get_algorithm_by_name(algo) == NULL) { 2363 (void)ssl_printf(ssl, "error: unknown algorithm: %s\n", algo); 2367 log_msg(LOG_INFO, "adding key with name: %s and secret: %s with algo: %s\n", arg, arg2, algo) [all...] |
| xfrd.c | 1904 tsig_algorithm_type* algo; local 1906 algo = tsig_get_algorithm_by_name(acl->key_options->algorithm); 1907 if(!algo) { 1912 assert(algo); 1913 tsig_init_record(tsig, algo, acl->key_options->tsig_key); 2602 buffer_printf(packet, " cert-algo:%s", cert_algorithm);
|
| /src/external/bsd/unbound/dist/sldns/ |
| wire2str.c | 1967 uint8_t algo, hitlen; local 1974 algo = (*d)[1]; 1979 /* write: algo hit pubkey */ 1980 w = sldns_str_print(s, sl, "%u ", (unsigned)algo);
|
| /src/sys/netipsec/ |
| key.c | 1268 u_int8_t algo = 0; local 1291 algo = (u_int8_t) cpi; 1292 hash_key = algo; 1301 must_check_alg, algo, 1336 if (must_check_alg && algo != sav->alg_comp) { 1338 "algo fail %d != %d\n", 1339 algo, sav->alg_comp); 3830 /* check algo */ 6513 const struct enc_xform *algo; local 6522 algo = esp_algorithm_lookup(i) 6610 const struct auth_hash *algo; local 6674 const struct comp_algo *algo; local [all...] |
| /src/external/bsd/tcpdump/dist/ |
| print-isoclns.c | 1902 uint8_t algo, flags; local 1906 algo = GET_U_1(tptr+1); 1922 ND_PRINT(", Flags [%s], Algo %s (%u), %s %u", 1924 tok2str(prefix_sid_algo_values, "Unknown", algo), algo,
|