/minix3/external/bsd/file/dist/magic/magdir/ |
H A D | mcrypt | 7 >4 string >\0 algorithm: %s, 12 >3 byte 0 algorithm: blowfish-448, 13 >3 byte 1 algorithm: DES, 14 >3 byte 2 algorithm: 3DES, 15 >3 byte 3 algorithm: 3-WAY, 16 >3 byte 4 algorithm: GOST, 17 >3 byte 6 algorithm: SAFER-SK64, 18 >3 byte 7 algorithm: SAFER-SK128, 19 >3 byte 8 algorithm: CAST-128, 20 >3 byte 9 algorithm: xTEA, [all …]
|
/minix3/external/bsd/bind/dist/bin/tests/system/tsig/ns1/ |
H A D | named.conf | 35 algorithm hmac-md5; 40 algorithm hmac-sha1; 45 algorithm hmac-sha224; 50 algorithm hmac-sha256; 55 algorithm hmac-sha384; 60 algorithm hmac-sha512; 65 algorithm hmac-md5-80; 70 algorithm hmac-sha1-80; 75 algorithm hmac-sha224-112; 80 algorithm hmac-sha256-128; [all …]
|
/minix3/external/bsd/dhcp/dist/omapip/ |
H A D | auth.c | 67 if (a->algorithm != NULL) in omapi_auth_key_destroy() 68 dfree(a->algorithm, MDL); in omapi_auth_key_destroy() 110 status = isclib_make_dst_key(a->name, a->algorithm, in omapi_auth_key_enter() 141 omapi_value_t *algorithm = (omapi_value_t *)0; in omapi_auth_key_lookup() local 159 status = omapi_get_value_str (ref, id, "algorithm", &algorithm); in omapi_auth_key_lookup() 165 if ((algorithm -> value -> type != omapi_datatype_string) && in omapi_auth_key_lookup() 166 (algorithm -> value -> type != omapi_datatype_data)) { in omapi_auth_key_lookup() 168 omapi_value_dereference (&algorithm, MDL); in omapi_auth_key_lookup() 178 omapi_value_dereference (&algorithm, MDL); in omapi_auth_key_lookup() 182 if (omapi_td_strcasecmp (algorithm -> value, in omapi_auth_key_lookup() [all …]
|
/minix3/crypto/external/bsd/openssl/dist/crypto/asn1/ |
H A D | x_algor.c | 66 ASN1_SIMPLE(X509_ALGOR, algorithm, ASN1_OBJECT), 92 if (alg->algorithm) 93 ASN1_OBJECT_free(alg->algorithm); 94 alg->algorithm = aobj; 112 *paobj = algor->algorithm; in X509_ALGOR_get0() 142 rv = OBJ_cmp(a->algorithm, b->algorithm); in X509_ALGOR_cmp()
|
/minix3/crypto/external/bsd/openssl/dist/doc/apps/ |
H A D | genpkey.pod | 16 [B<-algorithm alg>] 45 This option encrypts the private key with the supplied cipher. Any algorithm 56 =item B<-algorithm alg> 58 public key algorithm to use such as RSA, DSA or DH. If used this option must 59 precede any B<-pkeyopt> options. The options B<-paramfile> and B<-algorithm> 64 set the public key algorithm option B<opt> to B<value>. The precise set of 65 options supported depends on the public key algorithm used and its 71 precede and B<-algorithm>, B<-paramfile> or B<-pkeyopt> options. 77 algorithm used is determined by the parameters. If used this option must 78 precede and B<-pkeyopt> options. The options B<-paramfile> and B<-algorithm> [all …]
|
H A D | passwd.pod | 27 The Unix standard algorithm B<crypt> and the MD5-based BSD password 28 algorithm B<1> and its Apache variant B<apr1> are available. 36 Use the B<crypt> algorithm (default). 40 Use the MD5 based BSD password algorithm B<1>. 44 Use the B<apr1> algorithm (Apache variant of the BSD algorithm).
|
/minix3/external/bsd/bind/dist/lib/dns/ |
H A D | tsig.c | 295 dns_tsigkey_createfromkey(dns_name_t *name, dns_name_t *algorithm, in dns_tsigkey_createfromkey() argument 307 REQUIRE(algorithm != NULL); in dns_tsigkey_createfromkey() 321 if (dns_name_equal(algorithm, DNS_TSIG_HMACMD5_NAME)) { in dns_tsigkey_createfromkey() 322 tkey->algorithm = DNS_TSIG_HMACMD5_NAME; in dns_tsigkey_createfromkey() 327 } else if (dns_name_equal(algorithm, DNS_TSIG_HMACSHA1_NAME)) { in dns_tsigkey_createfromkey() 328 tkey->algorithm = DNS_TSIG_HMACSHA1_NAME; in dns_tsigkey_createfromkey() 333 } else if (dns_name_equal(algorithm, DNS_TSIG_HMACSHA224_NAME)) { in dns_tsigkey_createfromkey() 334 tkey->algorithm = DNS_TSIG_HMACSHA224_NAME; in dns_tsigkey_createfromkey() 340 } else if (dns_name_equal(algorithm, DNS_TSIG_HMACSHA256_NAME)) { in dns_tsigkey_createfromkey() 341 tkey->algorithm = DNS_TSIG_HMACSHA256_NAME; in dns_tsigkey_createfromkey() [all …]
|
H A D | keydata.c | 46 dnskey->algorithm = keydata->algorithm; in dns_keydata_todnskey() 78 keydata->algorithm = dnskey->algorithm; in dns_keydata_fromdnskey()
|
H A D | tkey.c | 302 if (!dns_name_equal(&tkeyin->algorithm, DNS_TSIG_HMACMD5_NAME)) { in process_dhtkey() 407 RETERR(dns_tsigkey_create(name, &tkeyin->algorithm, in process_dhtkey() 460 if (!dns_name_equal(&tkeyin->algorithm, DNS_TSIG_GSSAPI_NAME) && in process_gsstkey() 461 !dns_name_equal(&tkeyin->algorithm, DNS_TSIG_GSSAPIMS_NAME)) { in process_gsstkey() 475 result = dns_tsigkey_find(&tsigkey, name, &tkeyin->algorithm, ring); in process_gsstkey() 522 RETERR(dns_tsigkey_createfromkey(name, &tkeyin->algorithm, in process_gsstkey() 588 result = dns_tsigkey_find(&tsigkey, name, &tkeyin->algorithm, ring); in process_deletetkey() 710 dns_name_init(&tkeyout.algorithm, NULL); in dns_tkey_processquery() 711 dns_name_clone(&tkeyin.algorithm, &tkeyout.algorithm); in dns_tkey_processquery() 949 dns_name_t *algorithm, isc_buffer_t *nonce, in dns_tkey_builddhquery() argument [all …]
|
/minix3/external/bsd/dhcp/dist/dhcpctl/ |
H A D | remote.c | 49 const char *algorithm, in dhcpctl_new_authenticator() argument 69 if (strchr (algorithm, '.') == 0) { in dhcpctl_new_authenticator() 71 key -> algorithm = dmalloc (strlen (algorithm) + in dhcpctl_new_authenticator() 73 if (!key -> algorithm) { in dhcpctl_new_authenticator() 77 strcpy (key -> algorithm, algorithm); in dhcpctl_new_authenticator() 78 strcat (key -> algorithm, add); in dhcpctl_new_authenticator() 80 key -> algorithm = dmalloc (strlen (algorithm) + 1, MDL); in dhcpctl_new_authenticator() 81 if (!key -> algorithm) { in dhcpctl_new_authenticator() 85 strcpy (key -> algorithm, algorithm); in dhcpctl_new_authenticator()
|
/minix3/external/bsd/bind/dist/lib/dns/rdata/generic/ |
H A D | key_25.c | 89 unsigned char algorithm; in totext_key() local 111 algorithm = sr.base[0]; in totext_key() 112 sprintf(buf, "%u", algorithm); in totext_key() 121 algorithm == DNS_KEYALG_PRIVATEDNS) { in totext_key() 152 sprintf(buf, "%u", dst_region_computeid(&tmpr, algorithm)); in totext_key() 154 if (algorithm == DNS_KEYALG_PRIVATEDNS) { in totext_key() 165 unsigned char algorithm; in fromwire_key() local 179 algorithm = sr.base[3]; in fromwire_key() 184 if (algorithm == DNS_KEYALG_PRIVATEDNS) { in fromwire_key() 196 if (algorithm == DST_ALG_RSAMD5 && sr.length < 3) in fromwire_key() [all …]
|
H A D | cdnskey_60.c | 82 unsigned char algorithm; in totext_cdnskey() local 113 algorithm = sr.base[0]; in totext_cdnskey() 114 sprintf(buf, "%u", algorithm); in totext_cdnskey() 123 algorithm == DNS_KEYALG_PRIVATEDNS) { in totext_cdnskey() 129 dns_secalg_format((dns_secalg_t) algorithm, algbuf, in totext_cdnskey() 147 dst_region_computeid(&tmpr, algorithm)); in totext_cdnskey() 167 sprintf(buf, "%u", dst_region_computeid(&tmpr, algorithm)); in totext_cdnskey() 175 unsigned char algorithm; in fromwire_cdnskey() local 189 algorithm = sr.base[3]; in fromwire_cdnskey() 194 if (algorithm == DNS_KEYALG_PRIVATEDNS) { in fromwire_cdnskey() [all …]
|
H A D | dnskey_48.c | 89 unsigned char algorithm; in totext_dnskey() local 120 algorithm = sr.base[0]; in totext_dnskey() 121 sprintf(buf, "%u", algorithm); in totext_dnskey() 130 algorithm == DNS_KEYALG_PRIVATEDNS) { in totext_dnskey() 136 dns_secalg_format((dns_secalg_t) algorithm, algbuf, in totext_dnskey() 154 dst_region_computeid(&tmpr, algorithm)); in totext_dnskey() 174 sprintf(buf, "%u", dst_region_computeid(&tmpr, algorithm)); in totext_dnskey() 182 unsigned char algorithm; in fromwire_dnskey() local 196 algorithm = sr.base[3]; in fromwire_dnskey() 201 if (algorithm == DNS_KEYALG_PRIVATEDNS) { in fromwire_dnskey() [all …]
|
/minix3/crypto/external/bsd/openssl/dist/doc/crypto/ |
H A D | EVP_PKEY_CTX_new.pod | 5 EVP_PKEY_CTX_new, EVP_PKEY_CTX_new_id, EVP_PKEY_CTX_dup, EVP_PKEY_CTX_free - public key algorithm c… 18 The EVP_PKEY_CTX_new() function allocates public key algorithm context using 19 the algorithm specified in B<pkey> and ENGINE B<e>. 21 The EVP_PKEY_CTX_new_id() function allocates public key algorithm context 22 using the algorithm specified by B<id> and ENGINE B<e>. It is normally used 32 The B<EVP_PKEY_CTX> structure is an opaque public key algorithm context used
|
/minix3/crypto/external/bsd/heimdal/dist/lib/roken/ |
H A D | resolve.h | 144 unsigned algorithm; member 151 unsigned algorithm; member 165 unsigned algorithm; member 171 unsigned algorithm; member 179 unsigned algorithm; member
|
H A D | resolve-test.c | 141 sig->algorithm, sig->labels, sig->orig_ttl, in main() 150 key->flags, key->protocol, key->algorithm); in main() 157 printf ("alg %u type %u length %lu data ", sshfp->algorithm, in main() 170 ds->key_tag, ds->algorithm, ds->digest_type, in main()
|
/minix3/crypto/external/bsd/openssl/dist/engines/ |
H A D | e_4758cca.c | 628 X509_ALGOR algorithm; in cca_rsa_verify() local 635 sig.algor = &algorithm; in cca_rsa_verify() 636 algorithm.algorithm = OBJ_nid2obj(type); in cca_rsa_verify() 638 if (!algorithm.algorithm) { in cca_rsa_verify() 644 if (!algorithm.algorithm->length) { in cca_rsa_verify() 652 algorithm.parameter = ¶meter; in cca_rsa_verify() 741 X509_ALGOR algorithm; in cca_rsa_sign() local 748 sig.algor = &algorithm; in cca_rsa_sign() 749 algorithm.algorithm = OBJ_nid2obj(type); in cca_rsa_sign() 751 if (!algorithm.algorithm) { in cca_rsa_sign() [all …]
|
/minix3/external/bsd/bind/include/dns/ |
H A D | rdatastruct.h | 912 dns_secalg_t algorithm; member 955 isc_uint8_t algorithm; member 1279 isc_uint8_t algorithm; member 1490 isc_uint8_t algorithm; member 1525 isc_uint8_t algorithm; member 1558 isc_uint8_t algorithm; member 1595 dns_secalg_t algorithm; member 1672 isc_uint8_t algorithm; member 1929 isc_uint8_t algorithm; member 1971 isc_uint8_t algorithm; member [all …]
|
/minix3/crypto/external/bsd/openssl/dist/crypto/ocsp/ |
H A D | ocsp_lib.c | 114 if (alg->algorithm != NULL) in OCSP_cert_id_new() 115 ASN1_OBJECT_free(alg->algorithm); in OCSP_cert_id_new() 120 if (!(alg->algorithm = OBJ_nid2obj(nid))) in OCSP_cert_id_new() 155 ret = OBJ_cmp(a->hashAlgorithm->algorithm, b->hashAlgorithm->algorithm); in OCSP_id_issuer_cmp()
|
/minix3/external/bsd/bind/dist/lib/dns/include/dns/ |
H A D | tsig.h | 84 dns_name_t *algorithm; /*%< Algorithm name */ member 102 dns_tsigkey_create(dns_name_t *name, dns_name_t *algorithm, 109 dns_tsigkey_createfromkey(dns_name_t *name, dns_name_t *algorithm, 228 dns_name_t *algorithm, dns_tsig_keyring_t *ring);
|
/minix3/external/bsd/bind/dist/lib/isccc/ |
H A D | cc.c | 240 isc_uint32_t algorithm, isccc_region_t *secret) in sign() argument 257 switch (algorithm) { in sign() 321 if (algorithm == ISCCC_ALG_HMACMD5) in sign() 330 isc_uint32_t algorithm, isccc_region_t *secret) in isccc_cc_towire() argument 335 if (algorithm == ISCCC_ALG_HMACMD5) { in isccc_cc_towire() 353 if (algorithm == ISCCC_ALG_HMACMD5) { in isccc_cc_towire() 362 PUT8(algorithm, hmac_alg); in isccc_cc_towire() 381 hmac_rstart, algorithm, secret)); in isccc_cc_towire() 387 isc_uint32_t algorithm, isccc_region_t *secret) in verify() argument 410 if (algorithm == ISCCC_ALG_HMACMD5) in verify() [all …]
|
/minix3/external/bsd/bind/dist/contrib/scripts/ |
H A D | check5011.pl | 22 $k->{algorithm} = $3; 101 $t->{algorithm} eq $k->{algorithm}) {
|
/minix3/crypto/external/bsd/heimdal/dist/lib/hcrypto/libtommath/ |
H A D | tommath.tex | 209 rendering any protocol based on the algorithm insecure. Multiple precision algorithms solve this v… 213 primitives. Faster modular reduction and exponentiation algorithms such as Barrett's algorithm, wh… 235 precision algorithm would augment the precision of the destination to accomodate the result while a… 259 In most cases how an algorithm is explained and how it is actually implemented are two very differe… 260 example, the Handbook of Applied Cryptography (\textit{HAC}), algorithm 14.7 on page 594, gives a r… 261 algorithm for performing multiple precision integer addition. However, the description lacks any d… 263 as the text would lead people to believe. Similarly the division routine (\textit{algorithm 14.20,… 277 by the actual C source code that implements the algorithm. The pseudo-code can be used to implemen… 278 algorithm in other programming languages as the reader sees fit. 294 synonymous. When an algorithm is specified to accept an mp\_int variable it is assumed the various… [all …]
|
H A D | tommath.src | 209 rendering any protocol based on the algorithm insecure. Multiple precision algorithms solve this v… 213 primitives. Faster modular reduction and exponentiation algorithms such as Barrett's algorithm, wh… 235 precision algorithm would augment the precision of the destination to accomodate the result while a… 259 In most cases how an algorithm is explained and how it is actually implemented are two very differe… 260 example, the Handbook of Applied Cryptography (\textit{HAC}), algorithm 14.7 on page 594, gives a r… 261 algorithm for performing multiple precision integer addition. However, the description lacks any d… 263 as the text would lead people to believe. Similarly the division routine (\textit{algorithm 14.20,… 277 by the actual C source code that implements the algorithm. The pseudo-code can be used to implemen… 278 algorithm in other programming languages as the reader sees fit. 294 synonymous. When an algorithm is specified to accept an mp\_int variable it is assumed the various… [all …]
|
/minix3/external/bsd/bind/dist/bin/tests/system/coverage/11-cutoff/ |
H A D | README | 4 Checking KSK events for zone example.com, algorithm 7: 9 Checking ZSK events for zone example.com, algorithm 7:
|