Home
last modified time | relevance | path

Searched refs:algorithm (Results 1 – 25 of 413) sorted by relevance

12345678910>>...17

/openbsd-src/regress/lib/libcrypto/sha/
H A Dsha_test.c25 const int algorithm; member
34 .algorithm = NID_sha1,
44 .algorithm = NID_sha1,
54 .algorithm = NID_sha1,
66 .algorithm = NID_sha1,
81 .algorithm = NID_sha224,
92 .algorithm = NID_sha224,
103 .algorithm = NID_sha224,
116 .algorithm = NID_sha224,
132 .algorithm = NID_sha256,
[all …]
/openbsd-src/usr.bin/file/magdir/
H A Dmcrypt7 >4 string >\0 algorithm: %s,
12 >3 byte 0 algorithm: blowfish-448,
13 >3 byte 1 algorithm: DES,
14 >3 byte 2 algorithm: 3DES,
15 >3 byte 3 algorithm: 3-WAY,
16 >3 byte 4 algorithm: GOST,
17 >3 byte 6 algorithm: SAFER-SK64,
18 >3 byte 7 algorithm: SAFER-SK128,
19 >3 byte 8 algorithm: CAST-128,
20 >3 byte 9 algorithm: xTEA,
[all …]
/openbsd-src/regress/lib/libcrypto/md/
H A Dmd_test.c26 const int algorithm; member
35 .algorithm = NID_md4,
44 .algorithm = NID_md4,
53 .algorithm = NID_md4,
62 .algorithm = NID_md4,
71 .algorithm = NID_md4,
80 .algorithm = NID_md4,
91 .algorithm = NID_md4,
104 .algorithm = NID_md5,
113 .algorithm
178 md_hash_from_algorithm(int algorithm,const char ** out_label,md_hash_func * out_func,const EVP_MD ** out_md,size_t * out_len) md_hash_from_algorithm() argument
[all...]
/openbsd-src/usr.sbin/nsd/
H A Dtsig-openssl.c23 tsig_algorithm_type *algorithm,
56 tsig_algorithm_type* algorithm; in tsig_openssl_init_algorithm() local
104 algorithm = (tsig_algorithm_type *) region_alloc( in tsig_openssl_init_algorithm()
106 algorithm->short_name = name; in tsig_openssl_init_algorithm()
107 algorithm->wireformat_name in tsig_openssl_init_algorithm()
109 if (!algorithm->wireformat_name) { in tsig_openssl_init_algorithm()
118 algorithm->maximum_digest_size = EVP_MAC_CTX_get_mac_size(hmac_ctx); in tsig_openssl_init_algorithm()
120 algorithm->maximum_digest_size = EVP_MD_size(hmac_algorithm); in tsig_openssl_init_algorithm()
122 algorithm->maximum_digest_size = EVP_MAC_size(hmac_ctx); in tsig_openssl_init_algorithm()
124 if(algorithm->maximum_digest_size < 20) in tsig_openssl_init_algorithm()
[all …]
H A Dtsig.c90 tsig_algorithm_type *algorithm; member
108 tsig->algorithm->hmac_update(tsig->context, in tsig_digest_variables()
111 tsig->algorithm->hmac_update(tsig->context, in tsig_digest_variables()
114 tsig->algorithm->hmac_update(tsig->context, in tsig_digest_variables()
117 tsig->algorithm->hmac_update(tsig->context, in tsig_digest_variables()
121 tsig->algorithm->hmac_update(tsig->context, in tsig_digest_variables()
124 tsig->algorithm->hmac_update(tsig->context, in tsig_digest_variables()
127 tsig->algorithm->hmac_update(tsig->context, in tsig_digest_variables()
131 tsig->algorithm->hmac_update(tsig->context, in tsig_digest_variables()
134 tsig->algorithm->hmac_update(tsig->context, in tsig_digest_variables()
[all …]
H A Dtsig.h80 tsig_algorithm_type *algorithm,
112 tsig_algorithm_type *algorithm; member
148 void tsig_add_algorithm(tsig_algorithm_type *algorithm);
196 tsig_algorithm_type *algorithm,
/openbsd-src/lib/libkeynote/
H A DHOWTO.add.crypto6 For a signature algorithm:
9 - Create one or more strings describing the signature algorithm
11 - Add a definition for the algorithm in keynote.h (the
13 - Define the algorithm public key prefixes, and add them to
17 a case handling the new algorithm; the return value is an integer,
21 storing a key for the new algorithm.
24 algorithm that were defined in keynote.h
28 the new algorithm's structure for storing a key (use the DSA
34 signature for the new algorithm.
37 support the new algorithm.
[all …]
H A Dauxil.c93 keynote_in_action_authorizers(void *key, int algorithm) in keynote_in_action_authorizers() argument
99 if (algorithm == KEYNOTE_ALGORITHM_UNSPEC) in keynote_in_action_authorizers()
111 alg = algorithm; in keynote_in_action_authorizers()
301 keynote_find_assertion(void *authorizer, int num, int algorithm) in keynote_find_assertion() argument
309 h = keynote_keyhash(authorizer, algorithm); in keynote_find_assertion()
314 ((as->as_signeralgorithm == algorithm) || in keynote_find_assertion()
316 (algorithm == KEYNOTE_ALGORITHM_X509)) || in keynote_find_assertion()
318 (algorithm == KEYNOTE_ALGORITHM_RSA)))) in keynote_find_assertion()
319 if (kn_keycompare(authorizer, as->as_authorizer, algorithm) == in keynote_find_assertion()
/openbsd-src/gnu/usr.bin/perl/cpan/Digest/lib/
H A DDigest.pm28 my $algorithm = shift;
29 my $impl = $MMAP{$algorithm} || do {
30 $algorithm =~ s/\W+//g;
31 "Digest::$algorithm";
63 my $algorithm = substr( $AUTOLOAD, rindex( $AUTOLOAD, '::' ) + 2 );
64 $class->new( $algorithm, @_ );
/openbsd-src/usr.bin/ssh/
H A Ddns.c79 dns_read_key(u_int8_t *algorithm, u_int8_t *digest_type, in dns_read_key() argument
87 *algorithm = SSHFP_KEY_RSA; in dns_read_key()
90 *algorithm = SSHFP_KEY_DSA; in dns_read_key()
93 *algorithm = SSHFP_KEY_ECDSA; in dns_read_key()
96 *algorithm = SSHFP_KEY_ED25519; in dns_read_key()
99 *algorithm = SSHFP_KEY_XMSS; in dns_read_key()
102 *algorithm = SSHFP_KEY_RESERVED; /* 0 */ in dns_read_key()
116 if (*algorithm && *digest_type) { in dns_read_key()
133 dns_read_rdata(u_int8_t *algorithm, u_int8_t *digest_type, in dns_read_rdata() argument
138 *algorithm = SSHFP_KEY_RESERVED; in dns_read_rdata()
[all …]
/openbsd-src/usr.bin/dig/lib/dns/rdata/generic/
H A Dkey_25.c35 unsigned char algorithm; in generic_totext_key() local
65 algorithm = sr.base[0]; in generic_totext_key()
66 snprintf(buf, sizeof(buf), "%u", algorithm); in generic_totext_key()
75 algorithm == DNS_KEYALG_PRIVATEDNS) { in generic_totext_key()
81 dns_secalg_format((dns_secalg_t) algorithm, algbuf, in generic_totext_key()
99 dst_region_computeid(&tmpr, algorithm)); in generic_totext_key()
123 dst_region_computeid(&tmpr, algorithm)); in generic_totext_key()
131 unsigned char algorithm; in generic_fromwire_key() local
143 algorithm = sr.base[3]; in generic_fromwire_key()
148 if (algorithm == DNS_KEYALG_PRIVATEDNS) { in generic_fromwire_key()
[all …]
H A Dkeydata_65533.c48 unsigned char algorithm; in totext_keydata() local
99 algorithm = sr.base[0]; in totext_keydata()
100 snprintf(buf, sizeof(buf), "%u", algorithm); in totext_keydata()
135 dns_secalg_format((dns_secalg_t) algorithm, algbuf, in totext_keydata()
144 dst_region_computeid(&tmpr, algorithm)); in totext_keydata()
H A Dhip_55.c31 unsigned char algorithm; in totext_hip() local
42 algorithm = uint8_fromregion(&region); in totext_hip()
54 snprintf(buf, sizeof(buf), "%u ", algorithm); in totext_hip()
/openbsd-src/usr.bin/dig/lib/dns/
H A Dtsig.c128 dns_tsigkey_createfromkey(dns_name_t *name, dns_name_t *algorithm, in dns_tsigkey_createfromkey() argument
140 REQUIRE(algorithm != NULL); in dns_tsigkey_createfromkey()
153 if (dns_name_equal(algorithm, DNS_TSIG_HMACSHA1_NAME)) { in dns_tsigkey_createfromkey()
154 tkey->algorithm = DNS_TSIG_HMACSHA1_NAME; in dns_tsigkey_createfromkey()
159 } else if (dns_name_equal(algorithm, DNS_TSIG_HMACSHA224_NAME)) { in dns_tsigkey_createfromkey()
160 tkey->algorithm = DNS_TSIG_HMACSHA224_NAME; in dns_tsigkey_createfromkey()
166 } else if (dns_name_equal(algorithm, DNS_TSIG_HMACSHA256_NAME)) { in dns_tsigkey_createfromkey()
167 tkey->algorithm = DNS_TSIG_HMACSHA256_NAME; in dns_tsigkey_createfromkey()
173 } else if (dns_name_equal(algorithm, DNS_TSIG_HMACSHA384_NAME)) { in dns_tsigkey_createfromkey()
174 tkey->algorithm = DNS_TSIG_HMACSHA384_NAME; in dns_tsigkey_createfromkey()
[all …]
/openbsd-src/gnu/llvm/clang/include/clang/Tooling/Inclusions/
H A DStdSymbolMap.inc62 SYMBOL(adjacent_find, std::, <algorithm>)
75 SYMBOL(all_of, std::, <algorithm>)
82 SYMBOL(any_of, std::, <algorithm>)
166 SYMBOL(binary_search, std::, <algorithm>)
198 SYMBOL(clamp, std::, <algorithm>)
219 SYMBOL(compare_3way, std::, <algorithm>)
230 SYMBOL(copy, std::, <algorithm>)
231 SYMBOL(copy_backward, std::, <algorithm>)
232 SYMBOL(copy_if, std::, <algorithm>)
233 SYMBOL(copy_n, std::, <algorithm>)
[all …]
/openbsd-src/lib/libcrypto/asn1/
H A Dx_algor.c69 .offset = offsetof(X509_ALGOR, algorithm),
164 ASN1_OBJECT_free(alg->algorithm); in X509_ALGOR_set0_obj()
165 alg->algorithm = aobj; in X509_ALGOR_set0_obj()
247 *out_aobj = alg->algorithm; in X509_ALGOR_get0()
287 if ((cmp = OBJ_cmp(a->algorithm, b->algorithm)) != 0) in X509_ALGOR_cmp()
/openbsd-src/sbin/isakmpd/
H A Ddnssec.c58 u_int8_t algorithm; member
71 u_int8_t algorithm, *id, *umark; in dns_get_key() local
77 algorithm = DNS_KEYALG_RSA; in dns_get_key()
197 key_rr.algorithm = *(rr->rri_rdatas[i].rdi_data + 3); in dns_get_key()
204 if (key_rr.algorithm != algorithm) { in dns_get_key()
/openbsd-src/regress/lib/libcrypto/wycheproof/
H A Dwycheproof.go582 Algorithm string `json:"algorithm"`
698 func cipherAes(algorithm string, size int) (*C.EVP_CIPHER, error) {
699 cipher, ok := aeses[algorithm][size]
817 func (wtg *wycheproofTestGroupAesCbcPkcs5) run(algorithm string, variant testVariant) bool {
818 fmt.Printf("Running %v test group %v with IV size %d and key size %d...\n", algorithm, wtg.Type, wtg.IVSize, wtg.KeySize)
845 func checkAesAead(algorithm string, ctx *C.EVP_CIPHER_CTX, doEncrypt int, key []byte, keyLen int, iv []byte, ivLen int, aad []byte, aadLen int, in []byte, inLen int, out []byte, outLen int, tag []byte, tagLen int, wt *wycheproofTestAead) bool {
851 switch algorithm {
979 func runAesAeadTest(algorithm string, ctx *C.EVP_CIPHER_CTX, aead *C.EVP_AEAD, wt *wycheproofTestAead) bool {
987 openEvp := checkAesAead(algorithm, ctx, 0, key, keyLen, iv, ivLen, aad, aadLen, ct, ctLen, msg, msgLen, tag, tagLen, wt)
988 sealEvp := checkAesAead(algorithm, ct
[all...]
/openbsd-src/lib/libcrypto/ocsp/
H A Docsp_lib.c165 ret = OBJ_cmp(a->hashAlgorithm->algorithm, b->hashAlgorithm->algorithm); in OCSP_id_issuer_cmp()
/openbsd-src/regress/lib/libcrypto/asn1/
H A Dx509_algor.c41 if (alg->algorithm != aobj) { in x509_algor_new_test()
83 if (alg->algorithm != NULL) { in x509_algor_set0_test()
111 if (alg->algorithm != NULL) { in x509_algor_set0_test()
128 if (alg->algorithm != NULL) { in x509_algor_set0_test()
159 if (alg->algorithm != NULL) { in x509_algor_set0_test()
176 if (alg->algorithm != NULL) { in x509_algor_set0_test()
203 if (alg->algorithm != oid) { in x509_algor_set0_test()
/openbsd-src/usr.bin/dig/lib/dns/include/dns/
H A Dtsig.h54 dns_name_t *algorithm; /*%< Algorithm name */ member
69 dns_tsigkey_create(dns_name_t *name, dns_name_t *algorithm,
76 dns_tsigkey_createfromkey(dns_name_t *name, dns_name_t *algorithm,
/openbsd-src/gnu/llvm/libcxx/include/experimental/
H A Dalgorithm14 experimental/algorithm synopsis
16 #include <algorithm>
36 #include <algorithm>
/openbsd-src/usr.bin/dig/lib/dns/rdata/any_255/
H A Dtsig_250.c239 RETERR(name_tobuffer(&tsig->algorithm, target)); in fromstruct_any_tsig()
315 dns_name_init(&tsig->algorithm, NULL); in tostruct_any_tsig()
316 RETERR(name_duporclone(&alg, &tsig->algorithm)); in tostruct_any_tsig()
318 isc_region_consume(&sr, name_length(&tsig->algorithm)); in tostruct_any_tsig()
382 dns_name_free(&tsig->algorithm); in tostruct_any_tsig()
395 dns_name_free(&tsig->algorithm); in freestruct_any_tsig()
/openbsd-src/lib/libcrypto/cms/
H A Dcms_pwri.c161 encalg->algorithm = OBJ_nid2obj(EVP_CIPHER_CTX_type(ctx)); in CMS_add0_recipient_password()
182 pwri->keyEncryptionAlgorithm->algorithm = OBJ_nid2obj(wrap_nid); in CMS_add0_recipient_password()
352 if (!algtmp || OBJ_obj2nid(algtmp->algorithm) != NID_id_alg_PWRI_KEK) { in cms_RecipientInfo_pwri_crypt()
368 kekcipher = EVP_get_cipherbyobj(kekalg->algorithm); in cms_RecipientInfo_pwri_crypt()
392 if (EVP_PBE_CipherInit(algtmp->algorithm, (char *)pwri->pass, in cms_RecipientInfo_pwri_crypt()
/openbsd-src/bin/md5/
H A Dmd5.c552 const char *algorithm; in digest_filelist() local
606 algorithm = tmpline; in digest_filelist()
607 len = strlen(algorithm); in digest_filelist()
626 if (strcasecmp(algorithm, hf->name) == 0) in digest_filelist()
635 algorithm = hf->name; in digest_filelist()
696 (void)printf("(%s) %s: %s\n", algorithm, filename, in digest_filelist()
720 (void)printf("(%s) %s: OK\n", algorithm, in digest_filelist()
723 (void)printf("(%s) %s: FAILED\n", algorithm, filename); in digest_filelist()

12345678910>>...17