| /openbsd-src/regress/lib/libcrypto/asn1/ |
| H A D | x509_algor.c | 26 int X509_ALGOR_set_evp_md(X509_ALGOR *alg, const EVP_MD *md); 31 X509_ALGOR *alg = NULL; in x509_algor_new_test() local 35 if ((alg = X509_ALGOR_new()) == NULL) in x509_algor_new_test() 41 if (alg->algorithm != aobj) { in x509_algor_new_test() 45 if (alg->parameter != NULL) { in x509_algor_new_test() 53 X509_ALGOR_free(alg); in x509_algor_new_test() 61 X509_ALGOR *alg = NULL; in x509_algor_set0_test() local 74 if ((alg = X509_ALGOR_new()) == NULL) in x509_algor_set0_test() 78 if ((ret = X509_ALGOR_set0(alg, NULL, 0, NULL)) != 1) { in x509_algor_set0_test() 83 if (alg->algorithm != NULL) { in x509_algor_set0_test() [all …]
|
| /openbsd-src/usr.bin/ssh/ |
| H A D | digest-libc.c | 38 int alg; member 108 ssh_digest_by_alg(int alg) in ssh_digest_by_alg() argument 110 if (alg < 0 || alg >= SSH_DIGEST_MAX) in ssh_digest_by_alg() 112 if (digests[alg].id != alg) /* sanity */ in ssh_digest_by_alg() 114 return &(digests[alg]); in ssh_digest_by_alg() 120 int alg; in ssh_digest_alg_by_name() local 122 for (alg = 0; alg < SSH_DIGEST_MAX; alg++) { in ssh_digest_alg_by_name() 123 if (strcasecmp(name, digests[alg].name) == 0) in ssh_digest_alg_by_name() 124 return digests[alg].id; in ssh_digest_alg_by_name() 130 ssh_digest_alg_name(int alg) in ssh_digest_alg_name() argument [all …]
|
| H A D | digest-openssl.c | 30 int alg; member 52 ssh_digest_by_alg(int alg) in ssh_digest_by_alg() argument 54 if (alg < 0 || alg >= SSH_DIGEST_MAX) in ssh_digest_by_alg() 56 if (digests[alg].id != alg) /* sanity */ in ssh_digest_by_alg() 58 return &(digests[alg]); in ssh_digest_by_alg() 64 int alg; in ssh_digest_alg_by_name() local 66 for (alg = 0; digests[alg].id != -1; alg++) { in ssh_digest_alg_by_name() 67 if (strcasecmp(name, digests[alg].name) == 0) in ssh_digest_alg_by_name() 68 return digests[alg].id; in ssh_digest_alg_by_name() 74 ssh_digest_alg_name(int alg) in ssh_digest_alg_name() argument [all …]
|
| H A D | hmac.c | 27 int alg; member 36 ssh_hmac_bytes(int alg) in ssh_hmac_bytes() argument 38 return ssh_digest_bytes(alg); in ssh_hmac_bytes() 42 ssh_hmac_start(int alg) in ssh_hmac_start() argument 48 ret->alg = alg; in ssh_hmac_start() 49 if ((ret->ictx = ssh_digest_start(alg)) == NULL || in ssh_hmac_start() 50 (ret->octx = ssh_digest_start(alg)) == NULL || in ssh_hmac_start() 51 (ret->digest = ssh_digest_start(alg)) == NULL) in ssh_hmac_start() 72 else if (ssh_digest_memory(ctx->alg, key, klen, ctx->buf, in ssh_hmac_init() 108 len = ssh_digest_bytes(ctx->alg); in ssh_hmac_final()
|
| H A D | digest.h | 39 const char *ssh_digest_alg_name(int alg); 42 size_t ssh_digest_bytes(int alg); 52 int ssh_digest_memory(int alg, const void *m, size_t mlen, 56 int ssh_digest_buffer(int alg, const struct sshbuf *b, u_char *d, size_t dlen) 60 struct ssh_digest_ctx *ssh_digest_start(int alg);
|
| H A D | ssh-sk.c | 51 int (*sk_enroll)(int alg, const uint8_t *challenge, 57 int (*sk_sign)(int alg, const uint8_t *message, size_t message_len, 69 int ssh_sk_enroll(int alg, const uint8_t *challenge, 73 int ssh_sk_sign(int alg, const uint8_t *message, size_t message_len, 289 sshsk_key_from_response(int alg, const char *application, uint8_t flags, in sshsk_key_from_response() 303 switch (alg) { in sshsk_key_from_response() 315 error_f("unsupported algorithm %d", alg); in sshsk_key_from_response() 472 int alg; in sshsk_enroll() 490 alg = SSH_SK_ECDSA; in sshsk_enroll() 494 alg in sshsk_enroll() 274 sshsk_key_from_response(int alg,const char * application,uint8_t flags,struct sk_enroll_response * resp,struct sshkey ** keyp) sshsk_key_from_response() argument 457 int alg; sshsk_enroll() local 624 int type, alg; sshsk_sign() local [all...] |
| /openbsd-src/lib/libcrypto/asn1/ |
| H A D | x_algor.c | 162 X509_ALGOR_set0_obj(X509_ALGOR *alg, ASN1_OBJECT *aobj) in X509_ALGOR_set0_obj() argument 164 ASN1_OBJECT_free(alg->algorithm); in X509_ALGOR_set0_obj() 165 alg->algorithm = aobj; in X509_ALGOR_set0_obj() 171 X509_ALGOR_set_obj_by_nid(X509_ALGOR *alg, int nid) in X509_ALGOR_set_obj_by_nid() argument 177 if (!X509_ALGOR_set0_obj(alg, aobj)) in X509_ALGOR_set_obj_by_nid() 184 X509_ALGOR_set0_parameter(X509_ALGOR *alg, int parameter_type, in X509_ALGOR_set0_parameter() argument 188 ASN1_TYPE_free(alg->parameter); in X509_ALGOR_set0_parameter() 189 alg->parameter = NULL; in X509_ALGOR_set0_parameter() 194 if (alg->parameter == NULL) in X509_ALGOR_set0_parameter() 195 alg->parameter = ASN1_TYPE_new(); in X509_ALGOR_set0_parameter() [all …]
|
| H A D | p5_pbe.c | 124 PKCS5_pbe_set0_algor(X509_ALGOR *algor, int alg, int iter, in PKCS5_pbe_set0_algor() argument 161 if (X509_ALGOR_set0(algor, OBJ_nid2obj(alg), V_ASN1_SEQUENCE, pbe_str)) in PKCS5_pbe_set0_algor() 174 PKCS5_pbe_set(int alg, int iter, const unsigned char *salt, int saltlen) in PKCS5_pbe_set() argument 183 if (PKCS5_pbe_set0_algor(ret, alg, iter, salt, saltlen)) in PKCS5_pbe_set()
|
| /openbsd-src/gnu/usr.bin/perl/t/op/ |
| H A D | crypt.t | 34 my $alg = ''; # Use default algorithm 35 if ( !defined(crypt("ab", $alg."cd")) ) { 36 $alg = '$5$'; # Try SHA-256 38 if ( !defined(crypt("ab", $alg."cd")) ) { 39 $alg = '$2b$12$FPWWO2RJ3CK4FINTw0Hi'; # Try Blowfish 41 if ( !defined(crypt("ab", $alg."cd")) ) { 42 $alg = ''; # Nothing worked. Back to default 47 ok(substr(crypt("ab", $alg."cd"), length($alg)+2) ne 48 substr(crypt("ab", $alg."ce"), length($alg)+2), 54 eval {$b = crypt($a, $alg."cd")}; [all …]
|
| /openbsd-src/lib/libssl/test/ |
| H A D | test_padlock | 28 for alg in $ACE_ALGS; do 29 echo $alg 31 $PROG enc -e -k "$HASH" -$alg -bufsize 999 -engine padlock | \ 32 $PROG enc -d -k "$HASH" -$alg | \ 35 echo "-$alg encrypt test failed" 39 $PROG enc -e -k "$HASH" -$alg | \ 40 $PROG enc -d -k "$HASH" -$alg -bufsize 999 -engine padlock | \ 43 echo "-$alg decrypt test failed" 47 $PROG enc -e -k "$HASH" -$alg -engine padlock | \ 48 $PROG enc -d -k "$HASH" -$alg -engine padlock | \ [all …]
|
| H A D | test_aesni | 29 for alg in $AES_ALGS; do 30 echo $alg 33 $PROG enc -e -k "$HASH" -$alg -bufsize $bufsize -engine aesni | \ 34 $PROG enc -d -k "$HASH" -$alg | \ 37 echo "-$alg/$bufsize encrypt test failed" 43 $PROG enc -e -k "$HASH" -$alg | \ 44 $PROG enc -d -k "$HASH" -$alg -bufsize $bufsize -engine aesni | \ 47 echo "-$alg/$bufsize decrypt test failed" 52 $PROG enc -e -k "$HASH" -$alg -engine aesni | \ 53 $PROG enc -d -k "$HASH" -$alg -engine aesni | \ [all …]
|
| /openbsd-src/lib/libcrypto/rsa/ |
| H A D | rsa_ameth.c | 90 static RSA_PSS_PARAMS *rsa_pss_decode(const X509_ALGOR *alg); in rsa_param_encode() 92 static int rsa_alg_set_pkcs1_padding(X509_ALGOR *alg); in rsa_param_encode() 124 rsa_param_decode(RSA *rsa, const X509_ALGOR *alg) in rsa_param_decode() 130 X509_ALGOR_get0(&algoid, &algptype, &algp, alg); in rsa_param_decode() 139 rsa->pss = rsa_pss_decode(alg); 179 X509_ALGOR *alg; in rsa_pub_decode() 182 if (!X509_PUBKEY_get0_param(NULL, &p, &pklen, &alg, pubkey)) in rsa_pub_decode() 188 if (!rsa_param_decode(rsa, alg)) { in rsa_pub_decode() 275 const X509_ALGOR *alg; in rsa_priv_decode() 278 if (!PKCS8_pkey_get0(NULL, &p, &pklen, &alg, p in rsa_priv_decode() 118 rsa_param_decode(RSA * rsa,const X509_ALGOR * alg) rsa_param_decode() argument 173 X509_ALGOR *alg; rsa_pub_decode() local 269 const X509_ALGOR *alg; rsa_priv_decode() local 315 rsa_mgf1_decode(X509_ALGOR * alg) rsa_mgf1_decode() argument 324 rsa_pss_decode(const X509_ALGOR * alg) rsa_pss_decode() argument 528 X509_ALGOR *alg = NULL; rsa_pkey_ctrl() local 596 X509_ALGOR *alg = NULL; rsa_md_to_algor() local 634 X509_ALGOR *alg = NULL; rsa_mgf1md_to_maskGenAlgorithm() local 678 rsa_algor_to_md(X509_ALGOR * alg) rsa_algor_to_md() argument 853 X509_ALGOR *alg; rsa_cms_verify() local 897 rsa_alg_set_pkcs1_padding(X509_ALGOR * alg) rsa_alg_set_pkcs1_padding() argument 903 rsa_alg_set_pss_padding(X509_ALGOR * alg,EVP_PKEY_CTX * pkey_ctx) rsa_alg_set_pss_padding() argument 931 rsa_alg_set_oaep_padding(X509_ALGOR * alg,EVP_PKEY_CTX * pkey_ctx) rsa_alg_set_oaep_padding() argument 992 X509_ALGOR *alg; rsa_cms_sign() local 1041 rsa_oaep_decode(const X509_ALGOR * alg) rsa_oaep_decode() argument 1137 X509_ALGOR *alg; rsa_cms_encrypt() local [all...] |
| /openbsd-src/gnu/usr.bin/perl/cpan/Digest-SHA/ |
| H A D | shasum | 137 my ($alg, $binary, $check, $text, $status, $quiet, $warn, $help); 143 't|text' => \$text, 'a|algorithm=i' => \$alg, 183 $alg = 1 unless defined $alg; 184 usage(1, "shasum: Unrecognized algorithm\n") unless $isAlg{$alg}; 221 my $digest = eval { Digest::SHA->new($alg)->addfile($file, $mode) }; 230 $len2alg{56} = 512224 if $alg == 512224; 231 $len2alg{64} = 512256 if $alg == 512256; 262 ($bslash, $alg, $fname, $sum) = 264 $alg =~ tr{/}{}d if defined $alg; 269 $alg = defined $sum ? $len2alg{length($sum)} : undef; [all …]
|
| H A D | SHA.xs | 60 shainit(s, alg) 62 int alg 75 newSHA(classname, alg) 77 int alg 82 if (!shainit(state, alg)) { 242 RETVAL = ix ? state->alg : (int) (state->digestlen << 3); 307 Copy(digcpy(state), ptr, state->alg <= SHA256 ? 32 : 64, UCHR); 308 ptr += state->alg <= SHA256 ? 32 : 64; 309 Copy(state->block, ptr, state->alg <= SHA256 ? 64 : 128, UCHR); 310 ptr += state->alg <= SHA256 ? 64 : 128; [all …]
|
| /openbsd-src/gnu/usr.bin/perl/cpan/Digest-SHA/lib/Digest/ |
| H A D | SHA.pm | 43 my($class, $alg) = @_; 44 $alg =~ s/\D+//g if defined $alg; 46 if (!defined($alg) || ($alg == $class->algorithm)) { 50 return shainit($class, $alg) ? $class : undef; 52 $alg = 1 unless defined $alg; 53 return $class->newSHA($alg); 161 my $alg = $self->algorithm or return; 163 my $nD = $alg <= 256 ? 8 : 16; 164 my $nH = $alg <= 256 ? 32 : 64; 165 my $nB = $alg <= 256 ? 64 : 128; [all …]
|
| /openbsd-src/usr.bin/dig/lib/dns/ |
| H A D | dst_api.c | 59 static dst_key_t * get_key_struct(unsigned int alg, 64 static isc_result_t frombuffer(unsigned int alg, 70 static isc_result_t algorithm_status(unsigned int alg); 79 #define CHECKALG(alg) \ argument 82 _r = algorithm_status(alg); \ 121 dst_algorithm_supported(unsigned int alg) { in dst_algorithm_supported() argument 124 if (alg >= DST_MAX_ALGS || dst_t_func[alg] == NULL) in dst_algorithm_supported() 227 dst_key_frombuffer(unsigned int alg, unsigned int flags, unsigned int protocol, in dst_key_frombuffer() argument 235 result = frombuffer(alg, flags, protocol, source, &key); in dst_key_frombuffer() 315 get_key_struct(unsigned int alg, in get_key_struct() argument [all …]
|
| H A D | tsig.c | 719 unsigned int alg; in dns_tsig_verify() local 813 alg = dst_key_alg(key); in dns_tsig_verify() 818 alg == DST_ALG_HMACSHA1 || in dns_tsig_verify() 819 alg == DST_ALG_HMACSHA224 || alg == DST_ALG_HMACSHA256 || in dns_tsig_verify() 820 alg == DST_ALG_HMACSHA384 || alg == DST_ALG_HMACSHA512) in dns_tsig_verify() 985 alg == DST_ALG_HMACSHA1 || in dns_tsig_verify() 986 alg == DST_ALG_HMACSHA224 || alg == DST_ALG_HMACSHA256 || in dns_tsig_verify() 987 alg == DST_ALG_HMACSHA384 || alg == DST_ALG_HMACSHA512) in dns_tsig_verify() 1055 unsigned int alg; in tsig_verify_tcp() local 1115 alg = dst_key_alg(key); in tsig_verify_tcp() [all …]
|
| /openbsd-src/lib/libcrypto/pkcs7/ |
| H A D | pk7_attr.c | 102 X509_ALGOR *alg; in PKCS7_simple_smimecap() local 104 if (!(alg = X509_ALGOR_new())) { in PKCS7_simple_smimecap() 108 ASN1_OBJECT_free(alg->algorithm); in PKCS7_simple_smimecap() 109 alg->algorithm = OBJ_nid2obj(nid); in PKCS7_simple_smimecap() 113 if (!(alg->parameter = ASN1_TYPE_new())) in PKCS7_simple_smimecap() 121 alg->parameter->value.integer = nbit; in PKCS7_simple_smimecap() 122 alg->parameter->type = V_ASN1_INTEGER; in PKCS7_simple_smimecap() 124 if (sk_X509_ALGOR_push(sk, alg) == 0) in PKCS7_simple_smimecap() 130 X509_ALGOR_free(alg); in PKCS7_simple_smimecap()
|
| /openbsd-src/gnu/usr.bin/perl/cpan/Digest-SHA/t/ |
| H A D | state.t | 21 my @alg = (1, 256, 384, 512); 27 my $alg = shift @alg; 29 if ($alg == 384) { $skip = sha384_hex("") ? 0 : 1 } 30 if ($alg == 512) { $skip = sha512_hex("") ? 0 : 1 } 49 alg:1 57 alg:256 65 alg:384 73 alg:512
|
| /openbsd-src/lib/libfido2/src/ |
| H A D | tpm.c | 58 uint16_t alg; /* TPM_ALG_SHA256 */ 126 uint16_t alg; /* TPM_ALG_RSA */ 137 uint16_t alg; /* TPM_ALG_ECC */ 174 name->alg = TPM_ALG_SHA256; in get_signed_name() 175 name->size = sizeof(name->alg) + sizeof(name->body); in get_signed_name() 188 x->alg = htobe16(x->alg); in bswap_rs256_pubarea() 201 x->alg = htobe16(x->alg); in bswap_es256_pubarea() 220 x->name.alg = htobe16(x->name.alg); in bswap_sha1_certinfo() 238 expected.alg = TPM_ALG_RSA; in check_rs256_pubarea() 273 expected.alg = TPM_ALG_ECC; in check_es256_pubarea() [all …]
|
| /openbsd-src/lib/libkeynote/ |
| H A D | signature.c | 633 int hashtype, enc, intenc, alg = KEYNOTE_ALGORITHM_NONE, hashlen = 0; in keynote_sigverify_assertion() local 647 alg = keynote_get_sig_algorithm(as->as_signature, &hashtype, &enc, in keynote_sigverify_assertion() 649 if (alg == KEYNOTE_ALGORITHM_NONE) in keynote_sigverify_assertion() 653 if ((alg != as->as_signeralgorithm) && in keynote_sigverify_assertion() 654 !((alg == KEYNOTE_ALGORITHM_RSA) && in keynote_sigverify_assertion() 656 !((alg == KEYNOTE_ALGORITHM_X509) && in keynote_sigverify_assertion() 745 if ((alg == KEYNOTE_ALGORITHM_DSA) && (intenc == INTERNAL_ENC_ASN1)) in keynote_sigverify_assertion() 754 if ((alg == KEYNOTE_ALGORITHM_RSA) && (intenc == INTERNAL_ENC_PKCS1)) in keynote_sigverify_assertion() 764 if ((alg == KEYNOTE_ALGORITHM_X509) && (intenc == INTERNAL_ENC_ASN1)) in keynote_sigverify_assertion() 789 int slen, i, hashlen = 0, hashtype, alg, encoding, internalenc; in keynote_sign_assertion() local [all …]
|
| H A D | auxil.c | 42 keynote_keyhash(void *key, int alg) in keynote_keyhash() argument 52 switch (alg) in keynote_keyhash() 97 int alg; in keynote_in_action_authorizers() local 106 alg = kl2->key_alg; in keynote_in_action_authorizers() 111 alg = algorithm; in keynote_in_action_authorizers() 117 if ((kl->key_alg == alg) || in keynote_in_action_authorizers() 119 (alg == KEYNOTE_ALGORITHM_X509)) || in keynote_in_action_authorizers() 121 (alg == KEYNOTE_ALGORITHM_RSA))) in keynote_in_action_authorizers() 122 if (kn_keycompare(kl->key_key, s, alg) == RESULT_TRUE) in keynote_in_action_authorizers()
|
| /openbsd-src/lib/libcrypto/ocsp/ |
| H A D | ocsp_lib.c | 112 X509_ALGOR *alg; OCSP_cert_id_new() local
|
| /openbsd-src/sys/crypto/ |
| H A D | crypto.c | 287 crypto_register(u_int32_t driverid, int *alg, in crypto_register() argument 293 if (driverid >= crypto_drivers_num || alg == NULL || in crypto_register() 309 crypto_drivers[driverid].cc_alg[i] = alg[i]; in crypto_register() 330 crypto_unregister(u_int32_t driverid, int alg) in crypto_unregister() argument 342 alg <= 0 || alg > (CRYPTO_ALGORITHM_MAX + 1)) { in crypto_unregister() 347 if (alg != CRYPTO_ALGORITHM_MAX + 1) { in crypto_unregister() 348 if (crypto_drivers[driverid].cc_alg[alg] == 0) { in crypto_unregister() 352 crypto_drivers[driverid].cc_alg[alg] = 0; in crypto_unregister() 364 if (i == CRYPTO_ALGORITHM_MAX + 1 || alg == CRYPTO_ALGORITHM_MAX + 1) { in crypto_unregister()
|
| /openbsd-src/gnu/usr.bin/perl/cpan/Digest-SHA/src/ |
| H A D | sha.c | 254 if (s->alg <= SHA256) in digcpy() 272 if (s->alg <= SHA256) in statecpy() 285 s->alg = algo; s->sha = sha ## transform; \ 294 if (s->alg == SHA1) SHA_INIT(s, 1, 1, H32, SHA32); in sharewind() 295 else if (s->alg == SHA224) SHA_INIT(s, 224, 256, H32, SHA32); in sharewind() 296 else if (s->alg == SHA256) SHA_INIT(s, 256, 256, H32, SHA32); in sharewind() 297 else if (s->alg == SHA384) SHA_INIT(s, 384, 512, H64, SHA64); in sharewind() 298 else if (s->alg == SHA512) SHA_INIT(s, 512, 512, H64, SHA64); in sharewind() 299 else if (s->alg == SHA512224) SHA_INIT(s, 512224, 512, H64, SHA64); in sharewind() 300 else if (s->alg == SHA512256) SHA_INIT(s, 512256, 512, H64, SHA64); in sharewind() [all …]
|