| /dflybsd-src/crypto/openssh/ |
| H A D | digest-libc.c | 58 int alg; member 128 ssh_digest_by_alg(int alg) in ssh_digest_by_alg() argument 130 if (alg < 0 || alg >= SSH_DIGEST_MAX) in ssh_digest_by_alg() 132 if (digests[alg].id != alg) /* sanity */ in ssh_digest_by_alg() 134 return &(digests[alg]); in ssh_digest_by_alg() 140 int alg; in ssh_digest_alg_by_name() local 142 for (alg = 0; alg < SSH_DIGEST_MAX; alg++) { in ssh_digest_alg_by_name() 143 if (strcasecmp(name, digests[alg].name) == 0) in ssh_digest_alg_by_name() 144 return digests[alg].id; in ssh_digest_alg_by_name() 150 ssh_digest_alg_name(int alg) in ssh_digest_alg_name() argument [all …]
|
| H A D | digest-openssl.c | 46 int alg; member 68 ssh_digest_by_alg(int alg) in ssh_digest_by_alg() argument 70 if (alg < 0 || alg >= SSH_DIGEST_MAX) in ssh_digest_by_alg() 72 if (digests[alg].id != alg) /* sanity */ in ssh_digest_by_alg() 74 if (digests[alg].mdfunc == NULL) in ssh_digest_by_alg() 76 return &(digests[alg]); in ssh_digest_by_alg() 82 int alg; in ssh_digest_alg_by_name() local 84 for (alg = 0; digests[alg].id != -1; alg++) { in ssh_digest_alg_by_name() 85 if (strcasecmp(name, digests[alg].name) == 0) in ssh_digest_alg_by_name() 86 return digests[alg].id; in ssh_digest_alg_by_name() [all …]
|
| H A D | hmac.c | 30 int alg; member 39 ssh_hmac_bytes(int alg) in ssh_hmac_bytes() argument 41 return ssh_digest_bytes(alg); in ssh_hmac_bytes() 45 ssh_hmac_start(int alg) in ssh_hmac_start() argument 51 ret->alg = alg; in ssh_hmac_start() 52 if ((ret->ictx = ssh_digest_start(alg)) == NULL || in ssh_hmac_start() 53 (ret->octx = ssh_digest_start(alg)) == NULL || in ssh_hmac_start() 54 (ret->digest = ssh_digest_start(alg)) == NULL) in ssh_hmac_start() 75 else if (ssh_digest_memory(ctx->alg, key, klen, ctx->buf, in ssh_hmac_init() 111 len = ssh_digest_bytes(ctx->alg); in ssh_hmac_final()
|
| H A D | digest.h | 39 const char *ssh_digest_alg_name(int alg); 42 size_t ssh_digest_bytes(int alg); 52 int ssh_digest_memory(int alg, const void *m, size_t mlen, 56 int ssh_digest_buffer(int alg, const struct sshbuf *b, u_char *d, size_t dlen) 60 struct ssh_digest_ctx *ssh_digest_start(int alg);
|
| H A D | ssh-rsa.c | 305 rsa_hash_id_from_keyname(const char *alg) in rsa_hash_id_from_keyname() argument 309 if ((r = rsa_hash_id_from_ident(alg)) != -1) in rsa_hash_id_from_keyname() 311 if (strcmp(alg, "ssh-rsa-cert-v01@openssh.com") == 0) in rsa_hash_id_from_keyname() 313 if (strcmp(alg, "rsa-sha2-256-cert-v01@openssh.com") == 0) in rsa_hash_id_from_keyname() 315 if (strcmp(alg, "rsa-sha2-512-cert-v01@openssh.com") == 0) in rsa_hash_id_from_keyname() 394 const char *alg, const char *sk_provider, const char *sk_pin, u_int compat) in ssh_rsa_sign() argument 408 if (alg == NULL || strlen(alg) == 0) in ssh_rsa_sign() 411 hash_alg = rsa_hash_id_from_keyname(alg); in ssh_rsa_sign() 476 const u_char *data, size_t dlen, const char *alg, u_int compat, in ssh_rsa_verify() argument 508 if (alg != NULL && strcmp(alg, "ssh-rsa-cert-v01@openssh.com") != 0) { in ssh_rsa_verify() [all …]
|
| /dflybsd-src/sbin/md5/ |
| H A D | md5.c | 134 digestend(const Algorithm_t *alg, DIGEST_CTX *context, char * const buf) in digestend() argument 140 alg->Final(digest, context); in digestend() 141 for (i = 0; i < alg->Digest_length; i++) { in digestend() 151 digestdata(const Algorithm_t *alg, const void *data, unsigned int len, in digestdata() argument 156 alg->Init(&context); in digestdata() 157 alg->Update(&context, data, len); in digestdata() 158 return (digestend(alg, &context, buf)); in digestdata() 167 digestbig(const char *fname, char * const buf, const Algorithm_t *alg) in digestbig() argument 181 alg->Init(&context); in digestbig() 184 alg->Update(&context, buffer, (size_t)bytes); in digestbig() [all …]
|
| /dflybsd-src/tools/tools/crypto/ |
| H A D | cryptotest.c | 113 struct alg { struct 162 static struct alg* 173 static struct alg* 246 runtest(struct alg *alg, int count, int size, u_long cmd, struct timeval *tv) in runtest() argument 256 if (!alg->ishash) { in runtest() 257 sop.keylen = (alg->minkeylen + alg->maxkeylen)/2; in runtest() 263 sop.cipher = alg->code; in runtest() 265 sop.mackeylen = (alg->minkeylen + alg->maxkeylen)/2; in runtest() 271 sop.mac = alg->code; in runtest() 278 printf("cipher %s", alg->name); in runtest() [all …]
|
| /dflybsd-src/crypto/libressl/crypto/asn1/ |
| H A D | x_algor.c | 151 X509_ALGOR_set0(X509_ALGOR *alg, ASN1_OBJECT *aobj, int ptype, void *pval) in X509_ALGOR_set0() argument 153 if (!alg) in X509_ALGOR_set0() 156 if (alg->parameter == NULL) in X509_ALGOR_set0() 157 alg->parameter = ASN1_TYPE_new(); in X509_ALGOR_set0() 158 if (alg->parameter == NULL) in X509_ALGOR_set0() 161 if (alg) { in X509_ALGOR_set0() 162 if (alg->algorithm) in X509_ALGOR_set0() 163 ASN1_OBJECT_free(alg->algorithm); in X509_ALGOR_set0() 164 alg->algorithm = aobj; in X509_ALGOR_set0() 169 if (alg->parameter) { in X509_ALGOR_set0() [all …]
|
| H A D | p5_pbe.c | 121 PKCS5_pbe_set0_algor(X509_ALGOR *algor, int alg, int iter, in PKCS5_pbe_set0_algor() argument 159 if (X509_ALGOR_set0(algor, OBJ_nid2obj(alg), V_ASN1_SEQUENCE, pbe_str)) in PKCS5_pbe_set0_algor() 172 PKCS5_pbe_set(int alg, int iter, const unsigned char *salt, int saltlen) in PKCS5_pbe_set() argument 181 if (PKCS5_pbe_set0_algor(ret, alg, iter, salt, saltlen)) in PKCS5_pbe_set()
|
| /dflybsd-src/crypto/libressl/crypto/engine/ |
| H A D | eng_fat.c | 114 int_def_cb(const char *alg, int len, void *arg) in int_def_cb() argument 118 if (!strncmp(alg, "ALL", len)) in int_def_cb() 120 else if (!strncmp(alg, "RSA", len)) in int_def_cb() 122 else if (!strncmp(alg, "DSA", len)) in int_def_cb() 124 else if (!strncmp(alg, "ECDH", len)) in int_def_cb() 126 else if (!strncmp(alg, "ECDSA", len)) in int_def_cb() 128 else if (!strncmp(alg, "DH", len)) in int_def_cb() 130 else if (strncmp(alg, "EC", len) == 0) in int_def_cb() 132 else if (!strncmp(alg, "RAND", len)) in int_def_cb() 134 else if (!strncmp(alg, "CIPHERS", len)) in int_def_cb() [all …]
|
| /dflybsd-src/crypto/libressl/crypto/rsa/ |
| H A D | rsa_ameth.c | 81 static RSA_PSS_PARAMS *rsa_pss_decode(const X509_ALGOR *alg); 113 rsa_param_decode(RSA *rsa, const X509_ALGOR *alg) in rsa_param_decode() argument 119 X509_ALGOR_get0(&algoid, &algptype, &algp, alg); in rsa_param_decode() 128 rsa->pss = rsa_pss_decode(alg); in rsa_param_decode() 161 X509_ALGOR *alg; in rsa_pub_decode() local 164 if (!X509_PUBKEY_get0_param(NULL, &p, &pklen, &alg, pubkey)) in rsa_pub_decode() 170 if (!rsa_param_decode(rsa, alg)) { in rsa_pub_decode() 244 const X509_ALGOR *alg; in rsa_priv_decode() local 246 if (!PKCS8_pkey_get0(NULL, &p, &pklen, &alg, p8)) in rsa_priv_decode() 253 if (!rsa_param_decode(rsa, alg)) { in rsa_priv_decode() [all …]
|
| /dflybsd-src/crypto/libressl/crypto/pkcs7/ |
| H A D | pk7_attr.c | 102 X509_ALGOR *alg; in PKCS7_simple_smimecap() local 104 if (!(alg = X509_ALGOR_new())) { in PKCS7_simple_smimecap() 108 ASN1_OBJECT_free(alg->algorithm); in PKCS7_simple_smimecap() 109 alg->algorithm = OBJ_nid2obj(nid); in PKCS7_simple_smimecap() 113 if (!(alg->parameter = ASN1_TYPE_new())) in PKCS7_simple_smimecap() 121 alg->parameter->value.integer = nbit; in PKCS7_simple_smimecap() 122 alg->parameter->type = V_ASN1_INTEGER; in PKCS7_simple_smimecap() 124 if (sk_X509_ALGOR_push(sk, alg) == 0) in PKCS7_simple_smimecap() 130 X509_ALGOR_free(alg); in PKCS7_simple_smimecap()
|
| H A D | pk7_lib.c | 243 X509_ALGOR *alg; in PKCS7_add_signer() local 267 alg = sk_X509_ALGOR_value(md_sk, i); in PKCS7_add_signer() 268 if (OBJ_obj2nid(alg->algorithm) == nid) { in PKCS7_add_signer() 275 if (!(alg = X509_ALGOR_new()) || in PKCS7_add_signer() 276 !(alg->parameter = ASN1_TYPE_new())) { in PKCS7_add_signer() 277 X509_ALGOR_free(alg); in PKCS7_add_signer() 281 alg->algorithm = OBJ_nid2obj(nid); in PKCS7_add_signer() 282 alg->parameter->type = V_ASN1_NULL; in PKCS7_add_signer() 283 if (!sk_X509_ALGOR_push(md_sk, alg)) { in PKCS7_add_signer() 284 X509_ALGOR_free(alg); in PKCS7_add_signer()
|
| /dflybsd-src/contrib/gmp/ |
| H A D | rand.c | 36 gmp_randalg_t alg, in gmp_randinit() argument 45 va_start (ap, alg); in gmp_randinit() 48 gmp_randalg_t alg; in gmp_randinit() local 51 alg = va_arg (ap, gmp_randalg_t); in gmp_randinit() 54 switch (alg) { in gmp_randinit()
|
| /dflybsd-src/contrib/ldns/ |
| H A D | keys.c | 112 ldns_key_new_frm_engine(ldns_key **key, ENGINE *e, char *key_id, ldns_algorithm alg) in ldns_key_new_frm_engine() argument 124 ldns_key_set_algorithm(k, (ldns_signing_algorithm) alg); in ldns_key_new_frm_engine() 258 ldns_key_new_frm_fp_ecdsa_l(FILE* fp, ldns_algorithm alg, int* line_nr) in ldns_key_new_frm_fp_ecdsa_l() argument 273 if(alg == LDNS_ECDSAP256SHA256) in ldns_key_new_frm_fp_ecdsa_l() 275 else if(alg == LDNS_ECDSAP384SHA384) in ldns_key_new_frm_fp_ecdsa_l() 421 ldns_signing_algorithm alg; in ldns_key_new_frm_fp_l() local 441 alg = 0; in ldns_key_new_frm_fp_l() 474 alg = LDNS_SIGN_RSAMD5; in ldns_key_new_frm_fp_l() 477 alg = (ldns_signing_algorithm)LDNS_DH; in ldns_key_new_frm_fp_l() 481 alg = LDNS_SIGN_DSA; in ldns_key_new_frm_fp_l() [all …]
|
| /dflybsd-src/contrib/wpa_supplicant/src/crypto/ |
| H A D | crypto_nettle.c | 51 static int nettle_digest_vector(const struct nettle_hash *alg, size_t num_elem, in nettle_digest_vector() argument 60 ctx = os_malloc(alg->context_size); in nettle_digest_vector() 63 alg->init(ctx); in nettle_digest_vector() 65 alg->update(ctx, len[i], addr[i]); in nettle_digest_vector() 66 alg->digest(ctx, alg->digest_size, mac); in nettle_digest_vector() 67 bin_clear_free(ctx, alg->context_size); in nettle_digest_vector() 404 enum crypto_cipher_alg alg; member 411 struct crypto_cipher * crypto_cipher_init(enum crypto_cipher_alg alg, in crypto_cipher_init() argument 421 ctx->alg = alg; in crypto_cipher_init() 423 switch (alg) { in crypto_cipher_init() [all …]
|
| H A D | crypto_internal-cipher.c | 18 enum crypto_cipher_alg alg; member 43 struct crypto_cipher * crypto_cipher_init(enum crypto_cipher_alg alg, in crypto_cipher_init() argument 53 ctx->alg = alg; in crypto_cipher_init() 55 switch (alg) { in crypto_cipher_init() 108 switch (ctx->alg) { in crypto_cipher_encrypt() 172 switch (ctx->alg) { in crypto_cipher_decrypt() 232 switch (ctx->alg) { in crypto_cipher_deinit()
|
| H A D | crypto_internal.c | 20 enum crypto_hash_alg alg; member 39 struct crypto_hash * crypto_hash_init(enum crypto_hash_alg alg, const u8 *key, in crypto_hash_init() argument 51 ctx->alg = alg; in crypto_hash_init() 53 switch (alg) { in crypto_hash_init() 148 switch (ctx->alg) { in crypto_hash_update() 192 switch (ctx->alg) { in crypto_hash_finish()
|
| /dflybsd-src/crypto/libressl/crypto/ocsp/ |
| H A D | ocsp_lib.c | 111 X509_ALGOR *alg; in OCSP_cert_id_new() local 118 alg = cid->hashAlgorithm; in OCSP_cert_id_new() 119 if (alg->algorithm != NULL) in OCSP_cert_id_new() 120 ASN1_OBJECT_free(alg->algorithm); in OCSP_cert_id_new() 125 if (!(alg->algorithm = OBJ_nid2obj(nid))) in OCSP_cert_id_new() 127 if ((alg->parameter = ASN1_TYPE_new()) == NULL) in OCSP_cert_id_new() 129 alg->parameter->type = V_ASN1_NULL; in OCSP_cert_id_new()
|
| /dflybsd-src/sys/netproto/802_11/ |
| H A D | ieee80211_dragonfly.h | 302 #define IEEE80211_SCANNER_ALG(name, alg, v) \ argument 308 ieee80211_scanner_register(alg, &v); \ 310 ieee80211_scanner_unregister(alg, &v); \ 317 #define IEEE80211_ACL_MODULE(name, alg, version) \ argument 320 alg##_modevent(int type) \ 324 ieee80211_aclator_register(&alg); \ 326 ieee80211_aclator_unregister(&alg); \ 328 TEXT_SET(acl_set, alg##_modevent); \ 336 #define IEEE80211_AUTH_ALG(name, alg, v) \ argument 342 ieee80211_authenticator_register(alg, &v); \ [all …]
|
| /dflybsd-src/contrib/wpa_supplicant/src/tls/ |
| H A D | pkcs5.c | 25 } alg; member 48 static int pkcs5_is_oid(struct asn1_oid *oid, unsigned long alg) in pkcs5_is_oid() argument 54 oid->oid[6] == alg; in pkcs5_is_oid() 58 static int enc_alg_is_oid(struct asn1_oid *oid, unsigned long alg) in enc_alg_is_oid() argument 63 oid->oid[5] == alg; in enc_alg_is_oid() 67 static int pkcs12_is_pbe_oid(struct asn1_oid *oid, unsigned long alg) in pkcs12_is_pbe_oid() argument 74 oid->oid[7] == alg; in pkcs12_is_pbe_oid() 299 params->alg = pkcs5_get_alg(&oid); in pkcs5_get_params() 300 if (params->alg == PKCS5_ALG_UNKNOWN) { in pkcs5_get_params() 306 if (params->alg == PKCS5_ALG_PBES2) in pkcs5_get_params() [all …]
|
| H A D | tlsv1_client_ocsp.c | 67 static unsigned int ocsp_hash_data(struct asn1_oid *alg, const u8 *data, in ocsp_hash_data() argument 74 if (x509_sha1_oid(alg)) { in ocsp_hash_data() 81 if (x509_sha256_oid(alg)) { in ocsp_hash_data() 88 if (x509_sha384_oid(alg)) { in ocsp_hash_data() 95 if (x509_sha512_oid(alg)) { in ocsp_hash_data() 103 asn1_oid_to_str(alg, buf, sizeof(buf)); in ocsp_hash_data() 118 struct x509_algorithm_identifier alg; in tls_process_ocsp_single_response() local 161 if (x509_parse_algorithm_identifier(pos, end - pos, &alg, &pos)) in tls_process_ocsp_single_response() 181 hash_len = ocsp_hash_data(&alg.oid, issuer->subject_dn, in tls_process_ocsp_single_response() 205 hash_len = ocsp_hash_data(&alg.oid, issuer->public_key, in tls_process_ocsp_single_response() [all …]
|
| /dflybsd-src/contrib/wpa_supplicant/src/eap_common/ |
| H A D | ikev2_common.c | 56 int ikev2_integ_hash(int alg, const u8 *key, size_t key_len, const u8 *data, in ikev2_integ_hash() argument 61 switch (alg) { in ikev2_integ_hash() 97 int ikev2_prf_hash(int alg, const u8 *key, size_t key_len, in ikev2_prf_hash() argument 101 switch (alg) { in ikev2_prf_hash() 113 int ikev2_prf_plus(int alg, const u8 *key, size_t key_len, in ikev2_prf_plus() argument 125 prf = ikev2_get_prf(alg); in ikev2_prf_plus() 143 res = ikev2_prf_hash(alg, key, key_len, 2, &addr[1], in ikev2_prf_plus() 146 res = ikev2_prf_hash(alg, key, key_len, 3, addr, len, in ikev2_prf_plus() 175 int ikev2_encr_encrypt(int alg, const u8 *key, size_t key_len, const u8 *iv, in ikev2_encr_encrypt() argument 181 switch (alg) { in ikev2_encr_encrypt() [all …]
|
| H A D | ikev2_common.h | 271 int ikev2_integ_hash(int alg, const u8 *key, size_t key_len, const u8 *data, 274 int ikev2_prf_hash(int alg, const u8 *key, size_t key_len, 277 int ikev2_prf_plus(int alg, const u8 *key, size_t key_len, 281 int ikev2_encr_encrypt(int alg, const u8 *key, size_t key_len, const u8 *iv, 283 int ikev2_encr_decrypt(int alg, const u8 *key, size_t key_len, const u8 *iv,
|
| /dflybsd-src/crypto/libressl/crypto/cms/ |
| H A D | cms_sd.c | 281 X509_ALGOR *alg; in CMS_add1_signer() local 344 alg = sk_X509_ALGOR_value(sd->digestAlgorithms, i); in CMS_add1_signer() 345 X509_ALGOR_get0(&aoid, NULL, NULL, alg); in CMS_add1_signer() 351 alg = X509_ALGOR_new(); in CMS_add1_signer() 352 if (alg == NULL) in CMS_add1_signer() 354 X509_ALGOR_set_md(alg, md); in CMS_add1_signer() 355 if (!sk_X509_ALGOR_push(sd->digestAlgorithms, alg)) { in CMS_add1_signer() 356 X509_ALGOR_free(alg); in CMS_add1_signer() 954 X509_ALGOR *alg; in CMS_add_simple_smimecap() local 965 alg = X509_ALGOR_new(); in CMS_add_simple_smimecap() [all …]
|