/netbsd-src/external/mpl/bind/dist/lib/dns/ |
H A D | tsec.c |
|
/netbsd-src/external/mpl/dhcp/bind/dist/lib/dns/ |
H A D | tsec.c | 50 const dns_name_t *algname; in dns_tsec_create() local 64 algname = dns_tsig_hmacmd5_name; in dns_tsec_create() 67 algname = dns_tsig_hmacsha1_name; in dns_tsec_create() 70 algname = dns_tsig_hmacsha224_name; in dns_tsec_create() 73 algname = dns_tsig_hmacsha256_name; in dns_tsec_create() 76 algname = dns_tsig_hmacsha384_name; in dns_tsec_create() 79 algname = dns_tsig_hmacsha512_name; in dns_tsec_create() 85 result = dns_tsigkey_createfromkey(dst_key_name(key), algname, in dns_tsec_create()
|
/netbsd-src/crypto/external/bsd/openssl/dist/apps/ |
H A D | genpkey.c | 69 const char *ciphername = NULL, *paramfile = NULL, *algname = NULL; in genpkey_main() local 111 algname = opt_arg(); in genpkey_main() 151 if (algname != NULL) { in genpkey_main() 152 if (!init_gen_str(&ctx, algname, e, do_param, libctx, app_get0_propq())) in genpkey_main() 184 pkey = do_param ? app_paramgen(ctx, algname) in genpkey_main() 185 : app_keygen(ctx, algname, 0, 0 /* not verbose */); in genpkey_main() 283 const char *algname, ENGINE *e, int do_param, in init_gen_str() argument 294 pkey_id = get_legacy_pkey_id(libctx, algname, e); in init_gen_str() 298 ctx = EVP_PKEY_CTX_new_from_name(libctx, algname, propq); in init_gen_str() 314 BIO_printf(bio_err, "Error initializing %s context\n", algname); in init_gen_str()
|
/netbsd-src/sys/stand/efiboot/ |
H A D | efirng.c | 52 } algname[] = { variable 100 for (j = 0; j < __arraycount(algname); j++) { in efi_rng_show() 101 if (memcmp(&alglist[i], &algname[j].guid, in efi_rng_show() 103 name = algname[j].name; in efi_rng_show()
|
/netbsd-src/external/ibm-public/postfix/dist/src/tls/ |
H A D | tls_dane.c | 833 char *algname; in tls_dane_digest_init() local 855 while ((algname = mystrtok(&cp, CHARS_COMMA_SP)) != 0) { in tls_dane_digest_init() 856 char *algcode = split_at(algname, '='); in tls_dane_digest_init() 872 VAR_TLS_DANE_DIGESTS, algname, algcode); in tls_dane_digest_init() 877 VAR_TLS_DANE_DIGESTS, algname, algcode); in tls_dane_digest_init() 889 if (*algname == 0) { in tls_dane_digest_init() 898 if (strcasecmp(algname, LN_sha256) == 0) in tls_dane_digest_init() 900 else if (strcasecmp(algname, LN_sha512) == 0) in tls_dane_digest_init() 904 VAR_TLS_DANE_DIGESTS, algname); in tls_dane_digest_init() 909 if (strcasecmp(algname, LN_sha256) != 0) { in tls_dane_digest_init() [all …]
|
/netbsd-src/crypto/external/bsd/openssl.old/dist/apps/ |
H A D | genpkey.c | 254 const char *algname, ENGINE *e, int do_param) in init_gen_str() argument 266 ameth = EVP_PKEY_asn1_find_str(&tmpeng, algname, -1); in init_gen_str() 270 ameth = ENGINE_get_pkey_asn1_meth_str(e, algname, -1); in init_gen_str() 274 BIO_printf(bio_err, "Algorithm %s not found\n", algname); in init_gen_str() 300 BIO_printf(bio_err, "Error initializing %s context\n", algname); in init_gen_str()
|
H A D | s_cb.c | 1429 const char *algname = ""; in security_callback_debug() local 1431 &algname, EVP_PKEY_get0_asn1(pkey)); in security_callback_debug() 1433 algname, EVP_PKEY_bits(pkey)); in security_callback_debug()
|
H A D | apps.h | 556 const char *algname, ENGINE *e, int do_param);
|
/netbsd-src/usr.bin/netstat/ |
H A D | fast_ipsec.c | 80 algname(size_t a, const char *algs[], size_t nalgs) in algname() function 202 algname(i, ahalgs, __arraycount(ahalgs)), in fast_ipsec_stats() 236 algname(i, espalgs, __arraycount(espalgs)), in fast_ipsec_stats() 285 algname(i, ipcompalgs, __arraycount(ipcompalgs)), in fast_ipsec_stats()
|
/netbsd-src/crypto/external/bsd/openssl/dist/apps/lib/ |
H A D | engine.c | 138 int get_legacy_pkey_id(OSSL_LIB_CTX *libctx, const char *algname, ENGINE *e) in get_legacy_pkey_id() argument 145 ameth = EVP_PKEY_asn1_find_str(&tmpeng, algname, -1); in get_legacy_pkey_id() 151 ameth = ENGINE_get_pkey_asn1_meth_str(e, algname, -1); in get_legacy_pkey_id()
|
/netbsd-src/crypto/external/bsd/openssl.old/dist/ssl/ |
H A D | t1_trce.c | 1087 const char *algname; in ssl_print_client_keyex() local 1088 int id = ssl_get_keyex(&algname, ssl); in ssl_print_client_keyex() 1091 BIO_printf(bio, "KeyExchangeAlgorithm=%s\n", algname); in ssl_print_client_keyex() 1131 const char *algname; in ssl_print_server_keyex() local 1132 int id = ssl_get_keyex(&algname, ssl); in ssl_print_server_keyex() 1135 BIO_printf(bio, "KeyExchangeAlgorithm=%s\n", algname); in ssl_print_server_keyex()
|
/netbsd-src/crypto/external/bsd/openssl/dist/ssl/ |
H A D | t1_trce.c | 1102 const char *algname; in ssl_print_client_keyex() local 1103 int id = ssl_get_keyex(&algname, ssl); in ssl_print_client_keyex() 1106 BIO_printf(bio, "KeyExchangeAlgorithm=%s\n", algname); in ssl_print_client_keyex() 1154 const char *algname; in ssl_print_server_keyex() local 1155 int id = ssl_get_keyex(&algname, ssl); in ssl_print_server_keyex() 1158 BIO_printf(bio, "KeyExchangeAlgorithm=%s\n", algname); in ssl_print_server_keyex()
|
/netbsd-src/crypto/external/bsd/openssl/dist/apps/include/ |
H A D | apps.h | 179 int get_legacy_pkey_id(OSSL_LIB_CTX *libctx, const char *algname, ENGINE *e); 253 const char *algname, ENGINE *e, int do_param,
|
/netbsd-src/sbin/cgdconfig/ |
H A D | params.c | 815 const char *algname = string_tocharstar(alg); in keygen_shared() local 817 if (!strcmp("hkdf-hmac-sha256", algname)) { in keygen_shared() 824 algname); in keygen_shared()
|
/netbsd-src/crypto/external/bsd/openssl/dist/providers/implementations/kdfs/ |
H A D | x942kdf.c | 76 static int find_alg_id(OSSL_LIB_CTX *libctx, const char *algname, in find_alg_id() argument 83 cipher = EVP_CIPHER_fetch(libctx, algname, propq); in find_alg_id()
|
/netbsd-src/crypto/external/bsd/openssl/dist/test/ |
H A D | ssl_old_test.c | 748 const char *algname; in print_key_details() local 751 algname = "RSA"; in print_key_details() 754 algname = "DSA"; in print_key_details() 757 algname = "DH"; in print_key_details() 760 algname = OBJ_nid2sn(keyid); in print_key_details() 763 BIO_printf(out, "%d bits %s", EVP_PKEY_get_bits(key), algname); in print_key_details()
|
/netbsd-src/crypto/external/bsd/openssl.old/dist/test/ |
H A D | ssltest_old.c | 753 const char *algname; in print_key_details() local 756 algname = "RSA"; in print_key_details() 759 algname = "DSA"; in print_key_details() 762 algname = "DH"; in print_key_details() 765 algname = OBJ_nid2sn(keyid); in print_key_details() 768 BIO_printf(out, "%d bits %s", EVP_PKEY_bits(key), algname); in print_key_details()
|
/netbsd-src/external/mpl/dhcp/dist/doc/devel/ |
H A D | qa.dox | 38 bind/bind-9.8.1/bin/dnssec/dnssec-keygen.c:522: check_fail: Memory leak: algname (error,memleak)
|
/netbsd-src/crypto/external/bsd/openssl.old/dist/doc/man1/ |
H A D | req.pod | 168 the algorithm is determined by the parameters. B<algname:file> use algorithm 169 B<algname> and parameter file B<file>: the two algorithms must match or an 170 error occurs. B<algname> just uses algorithm B<algname>, and parameters,
|
/netbsd-src/crypto/external/bsd/openssl/dist/doc/man1/ |
H A D | openssl-req.pod.in | 173 All other algorithms support the B<-newkey> I<algname>:I<file> form, where 180 I<algname>[:I<file>] generates a key using the given algorithm I<algname>. 182 are used, where the algorithm parameters must match I<algname>.
|