HomeSort by: relevance | last modified time | path
    Searched defs:algo (Results 1 - 25 of 28) sorted by relevancy

1 2

  /src/external/bsd/unbound/dist/validator/
val_kentry.h 87 uint8_t* algo; member in struct:key_entry_data
val_kentry.c 62 if(kd->algo)
63 s += strlen((char*)kd->algo)+1;
97 free(kd->algo);
143 if(d->algo) {
144 newd->algo = (uint8_t*)regional_strdup(region,
145 (char*)d->algo);
146 if(!newd->algo)
205 if(d->algo) {
206 newd->algo = (uint8_t*)strdup((char*)d->algo);
391 int algo; local
    [all...]
val_nsec3.c 223 int* algo, size_t* iter, uint8_t** salt, size_t* saltlen)
229 *algo = nsec3_get_algo(rrset, r);
364 /* skip unknown flags, algo */
393 /** see if at least one RR is known (flags, algo) */
408 * (skips the unknown flag and unknown algo NSEC3s).
435 /* skip unknown flags, algo */
560 nsec3_get_hashed(sldns_buffer* buf, uint8_t* nm, size_t nmlen, int algo,
571 hash_len = nsec3_hash_algo_size_supported(algo);
573 log_err("nsec3 hash of unknown algo %d", algo);
600 int algo = nsec3_get_algo(c->nsec3, c->rr); local
    [all...]
val_sigcrypt.c 128 * @return algo or 0 if malformed rrsig.
341 verbose(VERB_QUERY, "DS fail: DS RR algo and digest do not "
354 return 0; /* digest algo failed */
440 uint8_t algo; local
445 algo = (uint8_t)dnskey_get_algo(dnskey, i);
446 if(!dnskey_algo_id_is_supported((int)algo))
448 if(n->needs[algo] == 0) {
449 n->needs[algo] = 1;
450 sigalg[total] = algo;
460 uint8_t algo; local
476 uint8_t algo; local
567 int algo = rrset_get_sig_algo(rrset, sig_idx); local
717 int algo = dnskey_get_algo(dnskey, dnskey_idx); local
    [all...]
  /src/sys/external/bsd/drm2/dist/drm/nouveau/nvkm/subdev/i2c/
nouveau_nvkm_subdev_i2c_bus.c 37 * i2c-algo-bit
82 * !i2c-algo-bit (off-chip i2c bus / hw i2c / internal bit-banging algo)
175 if ((bus->i2c.algo == &i2c_bit_algo) && (info[i].udelay != 0)) {
176 struct i2c_algo_bit_data *algo = bus->i2c.algo_data; local
178 info[i].udelay, algo->udelay);
179 orig_udelay = algo->udelay;
180 algo->udelay = info[i].udelay;
191 struct i2c_algo_bit_data *algo = bus->i2c.algo_data; local
192 algo->udelay = orig_udelay
    [all...]
  /src/crypto/external/bsd/openssl/dist/crypto/cmp/
cmp_protect.c 229 ASN1_OBJECT *algo = NULL; local
236 if ((algo = OBJ_nid2obj(nid)) == NULL)
241 if (X509_ALGOR_set0(*alg, algo, V_ASN1_UNDEF, NULL))
243 ASN1_OBJECT_free(algo);
  /src/sys/external/bsd/drm2/include/linux/
i2c.h 92 const struct i2c_algorithm *algo; member in struct:i2c_adapter
  /src/external/bsd/unbound/dist/testcode/
unitverify.c 171 uint8_t algo = (uint8_t)dnskey_get_algo(dnskey, i); local
172 if(a[algo] == 0) {
173 a[algo] = 1;
174 sigalg[n++] = algo;
426 /** Test hash algo - NSEC3 hash it and compare result */
474 /** Read file to test NSEC3 hash algo */
  /src/sys/external/bsd/drm2/dist/drm/i915/display/
intel_gmbus.c 36 #include <linux/i2c-algo-bit.h>
316 struct i2c_algo_bit_data *algo; local
318 algo = &bus->bit_algo;
321 bus->adapter.algo_data = algo;
322 algo->setsda = set_data;
323 algo->setscl = set_clock;
324 algo->getsda = get_data;
325 algo->getscl = get_clock;
326 algo->pre_xfer = intel_gpio_pre_xfer;
327 algo->post_xfer = intel_gpio_post_xfer
    [all...]
  /src/sys/netinet/
portalgo.c 155 uint16_t *mymin, uint16_t *mymax, uint16_t **pnext_ephemeral, int algo)
227 [portalgo_af][portalgo_range][algo];
374 algo_bsd(int algo, uint16_t *port, struct inpcb *inp, kauth_cred_t cred)
383 &next_ephemeral, algo);
410 algo_random_start(int algo, uint16_t *port, struct inpcb *inp,
421 &next_ephemeral, algo);
464 algo_random_pick(int algo, uint16_t *port, struct inpcb *inp,
475 &next_ephemeral, algo);
602 algo_hash(int algo, uint16_t *port, struct inpcb *inp,
614 &next_ephemeral, algo);
749 int algo, error; local
    [all...]
  /src/sys/net80211/
ieee80211_input.c 2459 u_int16_t algo, seq, status; local
2473 algo = le16toh(*(u_int16_t *)frm);
2479 ether_snprintf(ebuf, sizeof(ebuf), wh->i_addr2), algo, seq);
2511 if (algo == IEEE80211_AUTH_ALG_SHARED) {
2514 } else if (algo == IEEE80211_AUTH_ALG_OPEN) {
2518 wh, "auth", "unsupported alg %d", algo);
  /src/usr.sbin/npf/npfctl/
npf_show.c 701 const char *ifname, *algo, *seg1, *seg2, *arrow; local
759 algo = "algo netmap ";
762 algo = "algo ip-hash ";
765 algo = "algo round-robin ";
768 algo = "algo npt66 ";
771 algo = ""
    [all...]
  /src/crypto/external/apache2/openssl/dist/apps/
ts.c 471 X509_ALGOR *algo = NULL; local
484 if ((algo = X509_ALGOR_new()) == NULL)
486 if ((algo->algorithm = OBJ_nid2obj(EVP_MD_get_type(md))) == NULL)
488 if ((algo->parameter = ASN1_TYPE_new()) == NULL)
490 algo->parameter->type = V_ASN1_NULL;
491 if (!TS_MSG_IMPRINT_set_algo(msg_imprint, algo))
521 X509_ALGOR_free(algo);
  /src/crypto/external/bsd/openssl/dist/apps/
ts.c 448 X509_ALGOR *algo = NULL; local
461 if ((algo = X509_ALGOR_new()) == NULL)
463 if ((algo->algorithm = OBJ_nid2obj(EVP_MD_get_type(md))) == NULL)
465 if ((algo->parameter = ASN1_TYPE_new()) == NULL)
467 algo->parameter->type = V_ASN1_NULL;
468 if (!TS_MSG_IMPRINT_set_algo(msg_imprint, algo))
498 X509_ALGOR_free(algo);
speed.c 1736 const char *algo = *argv; local
1738 if (opt_found(algo, doit_choices, &i)) {
1742 if (strcmp(algo, "des") == 0) {
1746 if (strcmp(algo, "sha") == 0) {
1751 if (strcmp(algo, "openssl") == 0) /* just for compatibility */
1754 if (strncmp(algo, "rsa", 3) == 0) {
1755 if (algo[3] == '\0') {
1759 if (opt_found(algo, rsa_choices, &i)) {
1765 if (strncmp(algo, "ffdh", 4) == 0) {
1766 if (algo[4] == '\0')
    [all...]
  /src/crypto/external/bsd/openssl.old/dist/apps/
ts.c 421 X509_ALGOR *algo = NULL; local
434 if ((algo = X509_ALGOR_new()) == NULL)
436 if ((algo->algorithm = OBJ_nid2obj(EVP_MD_type(md))) == NULL)
438 if ((algo->parameter = ASN1_TYPE_new()) == NULL)
440 algo->parameter->type = V_ASN1_NULL;
441 if (!TS_MSG_IMPRINT_set_algo(msg_imprint, algo))
471 X509_ALGOR_free(algo);
  /src/external/apache2/mDNSResponder/dist/mDNSCore/
DNSDigest.c 1713 domainname * algo; local
1718 algo = (domainname*) ptr;
1721 const DNSDigest_HMACAlgorithm algorithm = DNSDigest_GetHMACAlgorithmFromName(algo);
1726 if (!SameDomainName(algo, kHMAC_MD5_AlgName))
1730 "algorithm name: " PUB_DM_NAME, DM_NAME_PARAM(algo));
1737 ptr += DomainNameLength(algo);
1832 CCHmacUpdate(&hmacContext, algo->c, DomainNameLength(algo));
1834 MD5_Update(&c, algo->c, DomainNameLength(algo));
    [all...]
  /src/external/mpl/bind/dist/bin/dnssec/
dnssec-cds.c 114 * The key algorithm and ID are saved in keyinfo->algo and
121 dns_secalg_t algo; member in struct:keyinfo
490 if (ki->tag != ds.key_tag || ki->algo != ds.algorithm) {
499 "keytag=%d, algo=%d, digest=%d): %s\n",
525 ki->tag, ki->algo);
561 ki->algo = dnskey.algorithm;
576 "keytag=%d, algo=%d): %s\n",
577 ki->tag, ki->algo, isc_result_totext(result));
615 dns_secalg_t *algo; local
620 algo = isc_mem_cget(mctx, nkey, sizeof(algo[0]))
    [all...]
  /src/external/mpl/dhcp/bind/dist/lib/dns/
keymgr.c 441 uint32_t algo = dns_kasp_key_algorithm(kkey); local
447 RETERR(dst_key_generate(origin, algo, size, 0, keyflags,
  /src/sys/dev/pci/qat/
qat.c 1407 enum hw_cipher_algo algo = HW_CIPHER_ALGO_NULL; local
1413 algo = HW_CIPHER_ALGO_DES;
1417 algo = HW_CIPHER_ALGO_3DES;
1423 algo = HW_CIPHER_ALGO_AES128;
1426 algo = HW_CIPHER_ALGO_AES192;
1429 algo = HW_CIPHER_ALGO_AES256;
1451 return HW_CIPHER_CONFIG_BUILD(mode, algo, key_convert,
1461 enum qat_sym_hash_algorithm algo = 0; local
1465 algo = QAT_SYM_HASH_MD5;
1468 algo = QAT_SYM_HASH_SHA1
    [all...]
  /src/external/bsd/nsd/dist/
remote.c 2298 log_msg(LOG_INFO, "changing secret provided with the key: %s with old secret %s and algo: %s\n", arg, key_opt->secret, key_opt->algorithm);
2320 /** do the add tsig command, add new key with name, secret and algo given */
2328 char algo[256]; local
2337 strlcpy(algo, "hmac-sha256", sizeof(algo));
2339 strlcpy(algo, arg3, sizeof(algo));
2362 if(tsig_get_algorithm_by_name(algo) == NULL) {
2363 (void)ssl_printf(ssl, "error: unknown algorithm: %s\n", algo);
2367 log_msg(LOG_INFO, "adding key with name: %s and secret: %s with algo: %s\n", arg, arg2, algo)
    [all...]
xfrd.c 1904 tsig_algorithm_type* algo; local
1906 algo = tsig_get_algorithm_by_name(acl->key_options->algorithm);
1907 if(!algo) {
1912 assert(algo);
1913 tsig_init_record(tsig, algo, acl->key_options->tsig_key);
2602 buffer_printf(packet, " cert-algo:%s", cert_algorithm);
  /src/external/bsd/unbound/dist/sldns/
wire2str.c 1967 uint8_t algo, hitlen; local
1974 algo = (*d)[1];
1979 /* write: algo hit pubkey */
1980 w = sldns_str_print(s, sl, "%u ", (unsigned)algo);
  /src/sys/netipsec/
key.c 1268 u_int8_t algo = 0; local
1291 algo = (u_int8_t) cpi;
1292 hash_key = algo;
1301 must_check_alg, algo,
1336 if (must_check_alg && algo != sav->alg_comp) {
1338 "algo fail %d != %d\n",
1339 algo, sav->alg_comp);
3830 /* check algo */
6513 const struct enc_xform *algo; local
6522 algo = esp_algorithm_lookup(i)
6610 const struct auth_hash *algo; local
6674 const struct comp_algo *algo; local
    [all...]
  /src/external/bsd/tcpdump/dist/
print-isoclns.c 1902 uint8_t algo, flags; local
1906 algo = GET_U_1(tptr+1);
1922 ND_PRINT(", Flags [%s], Algo %s (%u), %s %u",
1924 tok2str(prefix_sid_algo_values, "Unknown", algo), algo,

Completed in 59 milliseconds

1 2