/src/tests/crypto/opencrypto/ |
h_sha2hmac.c | 42 int alg; member in struct:__anon05d99ce00108 241 cs.mac = tests[i].alg;
|
/src/lib/libresolv/ |
ns_sign.c | 100 u_char *alg; local in function:ns_sign2 137 /* Alg. */ 148 alg = cp; 195 nn = ns_name_ntol(alg, buf, sizeof(buf)); 338 /* Alg. */
|
ns_verify.c | 143 char name[MAXDNAME], alg[MAXDNAME]; local in function:ns_verify 183 n = dn_expand(msg, eom, cp, alg, MAXDNAME); 186 if (ns_samename(alg, NS_TSIG_ALG_HMAC_MD5) != 1) 268 n = ns_name_pton(alg, buf2, sizeof(buf2)); 349 char name[MAXDNAME], alg[MAXDNAME]; local in function:ns_verify_tcp 410 n = dn_expand(msg, eom, cp, alg, MAXDNAME); 413 if (ns_samename(alg, NS_TSIG_ALG_HMAC_MD5) != 1)
|
dst_api.c | 24 * int dst_check_algorithm() Function to determines if alg is supported. 81 static DST_KEY *dst_s_get_key_struct(const char *name, const int alg, 138 * alg 1 KEY_RSA 147 dst_check_algorithm(const int alg) 149 return (dst_t_func[alg] != NULL); 158 * alg: the algorithm number 167 dst_s_get_key_struct(const char *name, const int alg, const int flags, 172 if (dst_check_algorithm(alg)) /*%< make sure alg is available */ 183 new_key->dk_alg = alg; 473 int flags, proto, alg, dlen; local in function:dst_s_read_public_key 655 int alg ; local in function:dst_dnskey_to_key 831 int alg, major, minor, file_major, file_minor; local in function:dst_s_read_private_key_file [all...] |
/src/usr.bin/netstat/ |
fast_ipsec.c | 70 struct alg { struct 86 snprintf(buf, sizeof(buf), "alg#%zu", a);
|
/src/sys/net/npf/ |
npf_alg.c | 48 * NAT ALG description structure. For more compact use of cache, 95 npf_alg_t *alg = &aset->alg_list[i]; local in function:npf_alg_lookup 96 const char *aname = alg->na_name; 99 return alg; 107 npf_alg_t *alg; local in function:npf_alg_construct 110 if ((alg = npf_alg_lookup(npf, name)) == NULL) { 120 alg = npf_alg_lookup(npf, name); 123 return alg; 134 npf_alg_t *alg; local in function:npf_alg_register 145 alg = &aset->alg_list[i] 343 const npf_alg_t *alg = &aset->alg_list[i]; local in function:npf_alg_export [all...] |
npf_ctl.c | 306 const nvlist_t *alg = algs[i]; local in function:npf_mk_algs 309 name = dnvlist_get_string(alg, "name", NULL);
|
npf_nat.c | 147 /* ALG (if any) associated with this NAT entry. */ 329 npf_nat_freealg(npf_natpolicy_t *np, npf_alg_t *alg) 335 if (nt->nt_alg == alg) { 336 npf_alg_destroy(np->n_npfctx, alg, nt, nt->nt_conn); 605 /* Execute ALG translation first. */ 788 /* Determine whether any ALG matches. */ 841 * npf_nat_setalg: associate an ALG with the NAT entry. 844 npf_nat_setalg(npf_nat_t *nt, npf_alg_t *alg, uintptr_t arg) 846 nt->nt_alg = alg; 870 npf_alg_t *alg; local in function:npf_nat_destroy [all...] |
/src/sys/dev/marvell/ |
mvcesa.c | 379 uint32_t alg, mode, dir, *iv, ivbuf[2]; local in function:mvcesa_process 383 alg = MVCESA_DESE_C_ALGORITHM_DES; 385 alg = MVCESA_DESE_C_ALGORITHM_3DES; 420 alg, mode, dir, iv, crd->crd_skip, crd->crd_len, 431 uint32_t alg, *iv = NULL, digest[512 / 8 / 4], dlen; local in function:mvcesa_process 435 alg = MVCESA_SHA1MD5I_AC_ALGORITHM_SHA1; 438 alg = MVCESA_SHA1MD5I_AC_ALGORITHM_MD5; 449 alg, iv, digest, bits, crd->crd_skip, crd->crd_len, 457 ses, alg, ses->ses_hmouter, digest, 486 uint32_t alg, uint32_t *iv, uint32_t *digest [all...] |
/src/sys/netipsec/ |
key_debug.c | 259 const struct sadb_alg *alg; local in function:kdebug_sadb_supported 267 / sizeof(*alg); 268 alg = (const void *)(sup + 1); 272 alg->sadb_alg_id, alg->sadb_alg_ivlen, 273 alg->sadb_alg_minbits, alg->sadb_alg_maxbits); 274 alg++;
|
key.c | 6583 key_getsizes_ah(const struct auth_hash *ah, int alg, 6592 switch (alg) { 6597 IPSECLOG(LOG_DEBUG, "unknown AH algorithm %u\n", alg); 7300 struct sadb_alg *alg; local in function:key_api_register 7348 alg = (struct sadb_alg *)(mtod(n, char *) + off); 7349 alg->sadb_alg_id = i; 7350 alg->sadb_alg_ivlen = 0; 7352 alg->sadb_alg_minbits = _BITS(minkeysize); 7353 alg->sadb_alg_maxbits = _BITS(maxkeysize); 7354 alg->sadb_alg_reserved = 0 [all...] |
/src/lib/libc/nameser/ |
ns_print.c | 586 u_int c_type, key_tag, alg; local in function:ns_sprintrrf 594 alg = (u_int) *rdata++; 596 len = SPRINTF((tmp1, "%d %d %d ", c_type, key_tag, alg));
|
/src/usr.bin/bdes/ |
bdes.c | 151 } alg = ALG_CBC; variable in typeref:enum:__anon7e630d990203 219 alg = ALG_ECB; 225 alg = ALG_CFBA; 234 alg = ALG_CFB; 253 alg = ALG_OFB; 287 inverse = (alg == ALG_CBC || alg == ALG_ECB) && mode == MODE_DECRYPT; 289 switch(alg) {
|
/src/sbin/cgdconfig/ |
params.c | 77 char alg[32]; member in struct:crypto_defaults 812 keygen_shared(string_t *id, string_t *alg, bits_t *info) 815 const char *algname = string_tocharstar(alg); 1101 crypt_defaults_lookup(const char *alg) 1106 if (!strcmp(alg, crypto_defaults[i].alg))
|
cgdconfig.c | 128 int alg; member in struct:sharedkey 201 "[-P paramsfile] [-o outfile] alg [keylen]\n", getprogname()); 203 (void)fprintf(stderr, " %s -s [-nv] [-i ivmeth] cgd dev alg " 433 getsubkey(int alg, bits_t *key, bits_t *info, size_t subkeylen) 436 switch (alg) { 440 warnx("unrecognised shared key derivation method %d", alg); 466 if (kg->kg_sharedalg == sk->alg && 516 sk->alg = kg->kg_sharedalg; 993 VPRINTF(1, (" with alg %s keylen %zu blocksize %zu ivmethod %s\n",
|
/src/usr.sbin/npf/npfctl/ |
npf_parse.y | 100 %token ALG 251 | alg 256 alg label 257 : ALG STRING
|
/src/sys/dev/ |
cgd.c | 66 const char *alg; member in struct:selftest_params 310 .alg = "aes-xts", 321 .alg = "aes-xts", 332 .alg = "aes-cbc", 343 .alg = "aes-cbc", 354 .alg = "3des-cbc", 365 .alg = "blowfish-cbc", 376 .alg = "aes-cbc", 1668 const char *alg = selftests[i].alg; local in function:cgd_selftest [all...] |
/src/usr.sbin/syslogd/ |
tls.c | 356 DPRINTF(D_TLS, "get_fingerprint(cert@%p, return@%p, alg \"%s\")\n", 529 char alg[MAX_ALG_NAME_LENGTH]; local in function:match_fingerprint 540 p = alg; 542 while (*q != ':' && *q != '\0' && p < alg + MAX_ALG_NAME_LENGTH) 546 if (!get_fingerprint(cert, &certfingerprint, alg)) { 547 DPRINTF(D_TLS, "cannot get %s digest\n", alg);
|
/src/sys/dev/ic/ |
arn9003.c | 398 ar9003_restore_rom_block(struct athn_softc *sc, uint8_t alg, uint8_t ref, 405 if (alg == AR_EEP_COMPRESS_BLOCK) { 437 else if (alg == AR_EEP_COMPRESS_NONE) { 453 uint8_t *buf, *ptr, alg, ref; local in function:ar9003_read_rom 478 alg = (ptr[0] & 0xe0) >> 5; 482 "ROM block %zd: alg=%d ref=%d len=%zd\n", 483 i, alg, ref, len); 509 ar9003_restore_rom_block(sc, alg, ref, buf, len);
|
/src/include/arpa/ |
nameser.h | 267 char name[NS_MAXDNAME], alg[NS_MAXDNAME]; member in struct:ns_tsig_key 287 #define NS_TSIG_ALG_HMAC_MD5 "HMAC-MD5.SIG-ALG.REG.INT" 443 #define NS_ALG_EXPIRE_ONLY 253 /*%< No alg, no security */ 444 #define NS_ALG_PRIVATE_OID 254 /*%< Key begins with OID giving alg */
|