| /src/tests/crypto/opencrypto/ |
| h_sha2hmac.c | 42 int alg; member in struct:__anon7792 241 cs.mac = tests[i].alg;
|
| h_sha2hmac.c | 42 int alg; member in struct:__anon7792 241 cs.mac = tests[i].alg;
|
| /src/lib/libresolv/ |
| ns_sign.c | 100 u_char *alg; local 137 /* Alg. */ 148 alg = cp; 195 nn = ns_name_ntol(alg, buf, sizeof(buf)); 338 /* Alg. */
|
| ns_sign.c | 100 u_char *alg; local 137 /* Alg. */ 148 alg = cp; 195 nn = ns_name_ntol(alg, buf, sizeof(buf)); 338 /* Alg. */
|
| ns_verify.c | 143 char name[MAXDNAME], alg[MAXDNAME]; local 183 n = dn_expand(msg, eom, cp, alg, MAXDNAME); 186 if (ns_samename(alg, NS_TSIG_ALG_HMAC_MD5) != 1) 268 n = ns_name_pton(alg, buf2, sizeof(buf2)); 349 char name[MAXDNAME], alg[MAXDNAME]; local 410 n = dn_expand(msg, eom, cp, alg, MAXDNAME); 413 if (ns_samename(alg, NS_TSIG_ALG_HMAC_MD5) != 1)
|
| ns_verify.c | 143 char name[MAXDNAME], alg[MAXDNAME]; local 183 n = dn_expand(msg, eom, cp, alg, MAXDNAME); 186 if (ns_samename(alg, NS_TSIG_ALG_HMAC_MD5) != 1) 268 n = ns_name_pton(alg, buf2, sizeof(buf2)); 349 char name[MAXDNAME], alg[MAXDNAME]; local 410 n = dn_expand(msg, eom, cp, alg, MAXDNAME); 413 if (ns_samename(alg, NS_TSIG_ALG_HMAC_MD5) != 1)
|
| /src/usr.bin/netstat/ |
| fast_ipsec.c | 70 struct alg { struct 86 snprintf(buf, sizeof(buf), "alg#%zu", a);
|
| fast_ipsec.c | 70 struct alg { struct 86 snprintf(buf, sizeof(buf), "alg#%zu", a);
|
| /src/external/bsd/libbind/dist/nameser/ |
| ns_sign.c | 98 u_char *alg; local 135 /* Alg. */ 145 alg = cp; 192 n = ns_name_ntol(alg, buf, sizeof(buf)); 334 /* Alg. */
|
| ns_sign.c | 98 u_char *alg; local 135 /* Alg. */ 145 alg = cp; 192 n = ns_name_ntol(alg, buf, sizeof(buf)); 334 /* Alg. */
|
| ns_verify.c | 144 char name[MAXDNAME], alg[MAXDNAME]; local 184 n = dn_expand(msg, eom, cp, alg, MAXDNAME); 187 if (ns_samename(alg, NS_TSIG_ALG_HMAC_MD5) != 1) 269 n = ns_name_pton(alg, buf2, sizeof(buf2)); 350 char name[MAXDNAME], alg[MAXDNAME]; local 411 n = dn_expand(msg, eom, cp, alg, MAXDNAME); 414 if (ns_samename(alg, NS_TSIG_ALG_HMAC_MD5) != 1)
|
| ns_verify.c | 144 char name[MAXDNAME], alg[MAXDNAME]; local 184 n = dn_expand(msg, eom, cp, alg, MAXDNAME); 187 if (ns_samename(alg, NS_TSIG_ALG_HMAC_MD5) != 1) 269 n = ns_name_pton(alg, buf2, sizeof(buf2)); 350 char name[MAXDNAME], alg[MAXDNAME]; local 411 n = dn_expand(msg, eom, cp, alg, MAXDNAME); 414 if (ns_samename(alg, NS_TSIG_ALG_HMAC_MD5) != 1)
|
| /src/sys/net/npf/ |
| npf_alg.c | 48 * NAT ALG description structure. For more compact use of cache, 95 npf_alg_t *alg = &aset->alg_list[i]; local 96 const char *aname = alg->na_name; 99 return alg; 107 npf_alg_t *alg; local 110 if ((alg = npf_alg_lookup(npf, name)) == NULL) { 120 alg = npf_alg_lookup(npf, name); 123 return alg; 134 npf_alg_t *alg; local 145 alg = &aset->alg_list[i] 198 npf_ruleset_freealg(npf_config_natset(npf), alg); local 343 const npf_alg_t *alg = &aset->alg_list[i]; local [all...] |
| npf_alg.c | 48 * NAT ALG description structure. For more compact use of cache, 95 npf_alg_t *alg = &aset->alg_list[i]; local 96 const char *aname = alg->na_name; 99 return alg; 107 npf_alg_t *alg; local 110 if ((alg = npf_alg_lookup(npf, name)) == NULL) { 120 alg = npf_alg_lookup(npf, name); 123 return alg; 134 npf_alg_t *alg; local 145 alg = &aset->alg_list[i] 198 npf_ruleset_freealg(npf_config_natset(npf), alg); local 343 const npf_alg_t *alg = &aset->alg_list[i]; local [all...] |
| /src/external/bsd/wpa/dist/src/tls/ |
| tlsv1_common.c | 346 enum crypto_hash_alg alg; local 350 alg = CRYPTO_HASH_ALG_SHA256; 354 alg = CRYPTO_HASH_ALG_SHA384; 358 alg = CRYPTO_HASH_ALG_SHA512; 364 ctx = crypto_hash_init(alg, NULL, 0);
|
| tlsv1_common.c | 346 enum crypto_hash_alg alg; local 350 alg = CRYPTO_HASH_ALG_SHA256; 354 alg = CRYPTO_HASH_ALG_SHA384; 358 alg = CRYPTO_HASH_ALG_SHA512; 364 ctx = crypto_hash_init(alg, NULL, 0);
|
| pkcs5.c | 25 } alg; member in struct:pkcs5_params 48 static int pkcs5_is_oid(struct asn1_oid *oid, unsigned long alg) 54 oid->oid[6] == alg; 58 static int enc_alg_is_oid(struct asn1_oid *oid, unsigned long alg) 63 oid->oid[5] == alg; 67 static int pkcs12_is_pbe_oid(struct asn1_oid *oid, unsigned long alg) 74 oid->oid[7] == alg; 283 params->alg = pkcs5_get_alg(&oid); 284 if (params->alg == PKCS5_ALG_UNKNOWN) { 290 if (params->alg == PKCS5_ALG_PBES2 [all...] |
| tlsv1_client_ocsp.c | 67 static unsigned int ocsp_hash_data(struct asn1_oid *alg, const u8 *data, 74 if (x509_sha1_oid(alg)) { 81 if (x509_sha256_oid(alg)) { 88 if (x509_sha384_oid(alg)) { 95 if (x509_sha512_oid(alg)) { 103 asn1_oid_to_str(alg, buf, sizeof(buf)); 104 wpa_printf(MSG_DEBUG, "OCSP: Could not calculate hash with alg %s", 118 struct x509_algorithm_identifier alg; local 157 if (x509_parse_algorithm_identifier(pos, end - pos, &alg, &pos)) 175 hash_len = ocsp_hash_data(&alg.oid, issuer->subject_dn 354 struct x509_algorithm_identifier alg; local [all...] |
| /src/sys/dev/marvell/ |
| mvcesa.c | 379 uint32_t alg, mode, dir, *iv, ivbuf[2]; local 383 alg = MVCESA_DESE_C_ALGORITHM_DES; 385 alg = MVCESA_DESE_C_ALGORITHM_3DES; 420 alg, mode, dir, iv, crd->crd_skip, crd->crd_len, 431 uint32_t alg, *iv = NULL, digest[512 / 8 / 4], dlen; local 435 alg = MVCESA_SHA1MD5I_AC_ALGORITHM_SHA1; 438 alg = MVCESA_SHA1MD5I_AC_ALGORITHM_MD5; 449 alg, iv, digest, bits, crd->crd_skip, crd->crd_len, 457 ses, alg, ses->ses_hmouter, digest, 486 uint32_t alg, uint32_t *iv, uint32_t *digest [all...] |
| mvcesa.c | 379 uint32_t alg, mode, dir, *iv, ivbuf[2]; local 383 alg = MVCESA_DESE_C_ALGORITHM_DES; 385 alg = MVCESA_DESE_C_ALGORITHM_3DES; 420 alg, mode, dir, iv, crd->crd_skip, crd->crd_len, 431 uint32_t alg, *iv = NULL, digest[512 / 8 / 4], dlen; local 435 alg = MVCESA_SHA1MD5I_AC_ALGORITHM_SHA1; 438 alg = MVCESA_SHA1MD5I_AC_ALGORITHM_MD5; 449 alg, iv, digest, bits, crd->crd_skip, crd->crd_len, 457 ses, alg, ses->ses_hmouter, digest, 486 uint32_t alg, uint32_t *iv, uint32_t *digest [all...] |
| /src/sys/netipsec/ |
| key_debug.c | 259 const struct sadb_alg *alg; local 267 / sizeof(*alg); 268 alg = (const void *)(sup + 1); 272 alg->sadb_alg_id, alg->sadb_alg_ivlen, 273 alg->sadb_alg_minbits, alg->sadb_alg_maxbits); 274 alg++;
|
| key_debug.c | 259 const struct sadb_alg *alg; local 267 / sizeof(*alg); 268 alg = (const void *)(sup + 1); 272 alg->sadb_alg_id, alg->sadb_alg_ivlen, 273 alg->sadb_alg_minbits, alg->sadb_alg_maxbits); 274 alg++;
|
| /src/external/bsd/libfido2/dist/src/ |
| es256.c | 75 int alg; local 96 alg = COSE_ECDH_ES256; 98 alg = COSE_ES256; 100 /* alg */ 102 (argv[1].value = cbor_build_negint8((uint8_t)(-alg - 1))) == NULL ||
|
| /src/external/bsd/wpa/dist/src/pasn/ |
| pasn_initiator.c | 80 u16 len, res, alg, seq, status; local 105 alg = WPA_GET_LE16(data); 109 wpa_printf(MSG_DEBUG, "PASN: SAE: commit: alg=%u, seq=%u, status=%u", 110 alg, seq, status); 112 if (alg != WLAN_AUTH_SAE || seq != 1 || 150 alg = WPA_GET_LE16(data); 154 wpa_printf(MSG_DEBUG, "PASN: SAE confirm: alg=%u, seq=%u, status=%u", 155 alg, seq, status); 157 if (alg != WLAN_AUTH_SAE || seq != 2 || status != WLAN_STATUS_SUCCESS) { 311 u16 alg, seq, status local [all...] |
| pasn_responder.c | 46 u16 res, alg, seq, status; local 62 alg = WPA_GET_LE16(data); 66 wpa_printf(MSG_DEBUG, "PASN: SAE commit: alg=%u, seq=%u, status=%u", 67 alg, seq, status); 69 if (alg != WLAN_AUTH_SAE || seq != 1 || 121 u16 res, alg, seq, status; local 135 alg = WPA_GET_LE16(data); 139 wpa_printf(MSG_DEBUG, "PASN: SAE confirm: alg=%u, seq=%u, status=%u", 140 alg, seq, status); 142 if (alg != WLAN_AUTH_SAE || seq != 2 || status != WLAN_STATUS_SUCCESS) [all...] |