Home
last modified time | relevance | path

Searched refs:alg (Results 1 – 25 of 133) sorted by relevance

123456

/openbsd-src/regress/lib/libcrypto/asn1/
H A Dx509_algor.c26 int X509_ALGOR_set_evp_md(X509_ALGOR *alg, const EVP_MD *md);
31 X509_ALGOR *alg = NULL; in x509_algor_new_test() local
35 if ((alg = X509_ALGOR_new()) == NULL) in x509_algor_new_test()
41 if (alg->algorithm != aobj) { in x509_algor_new_test()
45 if (alg->parameter != NULL) { in x509_algor_new_test()
53 X509_ALGOR_free(alg); in x509_algor_new_test()
61 X509_ALGOR *alg = NULL; in x509_algor_set0_test() local
74 if ((alg = X509_ALGOR_new()) == NULL) in x509_algor_set0_test()
78 if ((ret = X509_ALGOR_set0(alg, NULL, 0, NULL)) != 1) { in x509_algor_set0_test()
83 if (alg->algorithm != NULL) { in x509_algor_set0_test()
[all …]
/openbsd-src/usr.bin/ssh/
H A Ddigest-libc.c38 int alg; member
108 ssh_digest_by_alg(int alg) in ssh_digest_by_alg() argument
110 if (alg < 0 || alg >= SSH_DIGEST_MAX) in ssh_digest_by_alg()
112 if (digests[alg].id != alg) /* sanity */ in ssh_digest_by_alg()
114 return &(digests[alg]); in ssh_digest_by_alg()
120 int alg; in ssh_digest_alg_by_name() local
122 for (alg = 0; alg < SSH_DIGEST_MAX; alg++) { in ssh_digest_alg_by_name()
123 if (strcasecmp(name, digests[alg].name) == 0) in ssh_digest_alg_by_name()
124 return digests[alg].id; in ssh_digest_alg_by_name()
130 ssh_digest_alg_name(int alg) in ssh_digest_alg_name() argument
[all …]
H A Ddigest-openssl.c30 int alg; member
52 ssh_digest_by_alg(int alg) in ssh_digest_by_alg() argument
54 if (alg < 0 || alg >= SSH_DIGEST_MAX) in ssh_digest_by_alg()
56 if (digests[alg].id != alg) /* sanity */ in ssh_digest_by_alg()
58 return &(digests[alg]); in ssh_digest_by_alg()
64 int alg; in ssh_digest_alg_by_name() local
66 for (alg = 0; digests[alg].id != -1; alg++) { in ssh_digest_alg_by_name()
67 if (strcasecmp(name, digests[alg].name) == 0) in ssh_digest_alg_by_name()
68 return digests[alg].id; in ssh_digest_alg_by_name()
74 ssh_digest_alg_name(int alg) in ssh_digest_alg_name() argument
[all …]
H A Dhmac.c27 int alg; member
36 ssh_hmac_bytes(int alg) in ssh_hmac_bytes() argument
38 return ssh_digest_bytes(alg); in ssh_hmac_bytes()
42 ssh_hmac_start(int alg) in ssh_hmac_start() argument
48 ret->alg = alg; in ssh_hmac_start()
49 if ((ret->ictx = ssh_digest_start(alg)) == NULL || in ssh_hmac_start()
50 (ret->octx = ssh_digest_start(alg)) == NULL || in ssh_hmac_start()
51 (ret->digest = ssh_digest_start(alg)) == NULL) in ssh_hmac_start()
72 else if (ssh_digest_memory(ctx->alg, key, klen, ctx->buf, in ssh_hmac_init()
108 len = ssh_digest_bytes(ctx->alg); in ssh_hmac_final()
H A Ddigest.h39 const char *ssh_digest_alg_name(int alg);
42 size_t ssh_digest_bytes(int alg);
52 int ssh_digest_memory(int alg, const void *m, size_t mlen,
56 int ssh_digest_buffer(int alg, const struct sshbuf *b, u_char *d, size_t dlen)
60 struct ssh_digest_ctx *ssh_digest_start(int alg);
H A Dssh-sk.c51 int (*sk_enroll)(int alg, const uint8_t *challenge,
57 int (*sk_sign)(int alg, const uint8_t *message, size_t message_len,
69 int ssh_sk_enroll(int alg, const uint8_t *challenge,
73 int ssh_sk_sign(int alg, const uint8_t *message, size_t message_len,
289 sshsk_key_from_response(int alg, const char *application, uint8_t flags, in sshsk_key_from_response()
303 switch (alg) { in sshsk_key_from_response()
315 error_f("unsupported algorithm %d", alg); in sshsk_key_from_response()
472 int alg; in sshsk_enroll()
490 alg = SSH_SK_ECDSA; in sshsk_enroll()
494 alg in sshsk_enroll()
274 sshsk_key_from_response(int alg,const char * application,uint8_t flags,struct sk_enroll_response * resp,struct sshkey ** keyp) sshsk_key_from_response() argument
457 int alg; sshsk_enroll() local
624 int type, alg; sshsk_sign() local
[all...]
/openbsd-src/lib/libcrypto/asn1/
H A Dx_algor.c162 X509_ALGOR_set0_obj(X509_ALGOR *alg, ASN1_OBJECT *aobj) in X509_ALGOR_set0_obj() argument
164 ASN1_OBJECT_free(alg->algorithm); in X509_ALGOR_set0_obj()
165 alg->algorithm = aobj; in X509_ALGOR_set0_obj()
171 X509_ALGOR_set_obj_by_nid(X509_ALGOR *alg, int nid) in X509_ALGOR_set_obj_by_nid() argument
177 if (!X509_ALGOR_set0_obj(alg, aobj)) in X509_ALGOR_set_obj_by_nid()
184 X509_ALGOR_set0_parameter(X509_ALGOR *alg, int parameter_type, in X509_ALGOR_set0_parameter() argument
188 ASN1_TYPE_free(alg->parameter); in X509_ALGOR_set0_parameter()
189 alg->parameter = NULL; in X509_ALGOR_set0_parameter()
194 if (alg->parameter == NULL) in X509_ALGOR_set0_parameter()
195 alg->parameter = ASN1_TYPE_new(); in X509_ALGOR_set0_parameter()
[all …]
H A Dp5_pbe.c124 PKCS5_pbe_set0_algor(X509_ALGOR *algor, int alg, int iter, in PKCS5_pbe_set0_algor() argument
161 if (X509_ALGOR_set0(algor, OBJ_nid2obj(alg), V_ASN1_SEQUENCE, pbe_str)) in PKCS5_pbe_set0_algor()
174 PKCS5_pbe_set(int alg, int iter, const unsigned char *salt, int saltlen) in PKCS5_pbe_set() argument
183 if (PKCS5_pbe_set0_algor(ret, alg, iter, salt, saltlen)) in PKCS5_pbe_set()
/openbsd-src/gnu/usr.bin/perl/t/op/
H A Dcrypt.t34 my $alg = ''; # Use default algorithm
35 if ( !defined(crypt("ab", $alg."cd")) ) {
36 $alg = '$5$'; # Try SHA-256
38 if ( !defined(crypt("ab", $alg."cd")) ) {
39 $alg = '$2b$12$FPWWO2RJ3CK4FINTw0Hi'; # Try Blowfish
41 if ( !defined(crypt("ab", $alg."cd")) ) {
42 $alg = ''; # Nothing worked. Back to default
47 ok(substr(crypt("ab", $alg."cd"), length($alg)+2) ne
48 substr(crypt("ab", $alg."ce"), length($alg)+2),
54 eval {$b = crypt($a, $alg."cd")};
[all …]
/openbsd-src/lib/libssl/test/
H A Dtest_padlock28 for alg in $ACE_ALGS; do
29 echo $alg
31 $PROG enc -e -k "$HASH" -$alg -bufsize 999 -engine padlock | \
32 $PROG enc -d -k "$HASH" -$alg | \
35 echo "-$alg encrypt test failed"
39 $PROG enc -e -k "$HASH" -$alg | \
40 $PROG enc -d -k "$HASH" -$alg -bufsize 999 -engine padlock | \
43 echo "-$alg decrypt test failed"
47 $PROG enc -e -k "$HASH" -$alg -engine padlock | \
48 $PROG enc -d -k "$HASH" -$alg -engine padlock | \
[all …]
H A Dtest_aesni29 for alg in $AES_ALGS; do
30 echo $alg
33 $PROG enc -e -k "$HASH" -$alg -bufsize $bufsize -engine aesni | \
34 $PROG enc -d -k "$HASH" -$alg | \
37 echo "-$alg/$bufsize encrypt test failed"
43 $PROG enc -e -k "$HASH" -$alg | \
44 $PROG enc -d -k "$HASH" -$alg -bufsize $bufsize -engine aesni | \
47 echo "-$alg/$bufsize decrypt test failed"
52 $PROG enc -e -k "$HASH" -$alg -engine aesni | \
53 $PROG enc -d -k "$HASH" -$alg -engine aesni | \
[all …]
/openbsd-src/lib/libcrypto/rsa/
H A Drsa_ameth.c90 static RSA_PSS_PARAMS *rsa_pss_decode(const X509_ALGOR *alg); in rsa_param_encode()
92 static int rsa_alg_set_pkcs1_padding(X509_ALGOR *alg); in rsa_param_encode()
124 rsa_param_decode(RSA *rsa, const X509_ALGOR *alg) in rsa_param_decode()
130 X509_ALGOR_get0(&algoid, &algptype, &algp, alg); in rsa_param_decode()
139 rsa->pss = rsa_pss_decode(alg);
179 X509_ALGOR *alg; in rsa_pub_decode()
182 if (!X509_PUBKEY_get0_param(NULL, &p, &pklen, &alg, pubkey)) in rsa_pub_decode()
188 if (!rsa_param_decode(rsa, alg)) { in rsa_pub_decode()
275 const X509_ALGOR *alg; in rsa_priv_decode()
278 if (!PKCS8_pkey_get0(NULL, &p, &pklen, &alg, p in rsa_priv_decode()
118 rsa_param_decode(RSA * rsa,const X509_ALGOR * alg) rsa_param_decode() argument
173 X509_ALGOR *alg; rsa_pub_decode() local
269 const X509_ALGOR *alg; rsa_priv_decode() local
315 rsa_mgf1_decode(X509_ALGOR * alg) rsa_mgf1_decode() argument
324 rsa_pss_decode(const X509_ALGOR * alg) rsa_pss_decode() argument
528 X509_ALGOR *alg = NULL; rsa_pkey_ctrl() local
596 X509_ALGOR *alg = NULL; rsa_md_to_algor() local
634 X509_ALGOR *alg = NULL; rsa_mgf1md_to_maskGenAlgorithm() local
678 rsa_algor_to_md(X509_ALGOR * alg) rsa_algor_to_md() argument
853 X509_ALGOR *alg; rsa_cms_verify() local
897 rsa_alg_set_pkcs1_padding(X509_ALGOR * alg) rsa_alg_set_pkcs1_padding() argument
903 rsa_alg_set_pss_padding(X509_ALGOR * alg,EVP_PKEY_CTX * pkey_ctx) rsa_alg_set_pss_padding() argument
931 rsa_alg_set_oaep_padding(X509_ALGOR * alg,EVP_PKEY_CTX * pkey_ctx) rsa_alg_set_oaep_padding() argument
992 X509_ALGOR *alg; rsa_cms_sign() local
1041 rsa_oaep_decode(const X509_ALGOR * alg) rsa_oaep_decode() argument
1137 X509_ALGOR *alg; rsa_cms_encrypt() local
[all...]
/openbsd-src/gnu/usr.bin/perl/cpan/Digest-SHA/
H A Dshasum137 my ($alg, $binary, $check, $text, $status, $quiet, $warn, $help);
143 't|text' => \$text, 'a|algorithm=i' => \$alg,
183 $alg = 1 unless defined $alg;
184 usage(1, "shasum: Unrecognized algorithm\n") unless $isAlg{$alg};
221 my $digest = eval { Digest::SHA->new($alg)->addfile($file, $mode) };
230 $len2alg{56} = 512224 if $alg == 512224;
231 $len2alg{64} = 512256 if $alg == 512256;
262 ($bslash, $alg, $fname, $sum) =
264 $alg =~ tr{/}{}d if defined $alg;
269 $alg = defined $sum ? $len2alg{length($sum)} : undef;
[all …]
H A DSHA.xs60 shainit(s, alg)
62 int alg
75 newSHA(classname, alg)
77 int alg
82 if (!shainit(state, alg)) {
242 RETVAL = ix ? state->alg : (int) (state->digestlen << 3);
307 Copy(digcpy(state), ptr, state->alg <= SHA256 ? 32 : 64, UCHR);
308 ptr += state->alg <= SHA256 ? 32 : 64;
309 Copy(state->block, ptr, state->alg <= SHA256 ? 64 : 128, UCHR);
310 ptr += state->alg <= SHA256 ? 64 : 128;
[all …]
/openbsd-src/gnu/usr.bin/perl/cpan/Digest-SHA/lib/Digest/
H A DSHA.pm43 my($class, $alg) = @_;
44 $alg =~ s/\D+//g if defined $alg;
46 if (!defined($alg) || ($alg == $class->algorithm)) {
50 return shainit($class, $alg) ? $class : undef;
52 $alg = 1 unless defined $alg;
53 return $class->newSHA($alg);
161 my $alg = $self->algorithm or return;
163 my $nD = $alg <= 256 ? 8 : 16;
164 my $nH = $alg <= 256 ? 32 : 64;
165 my $nB = $alg <= 256 ? 64 : 128;
[all …]
/openbsd-src/usr.bin/dig/lib/dns/
H A Ddst_api.c59 static dst_key_t * get_key_struct(unsigned int alg,
64 static isc_result_t frombuffer(unsigned int alg,
70 static isc_result_t algorithm_status(unsigned int alg);
79 #define CHECKALG(alg) \ argument
82 _r = algorithm_status(alg); \
121 dst_algorithm_supported(unsigned int alg) { in dst_algorithm_supported() argument
124 if (alg >= DST_MAX_ALGS || dst_t_func[alg] == NULL) in dst_algorithm_supported()
227 dst_key_frombuffer(unsigned int alg, unsigned int flags, unsigned int protocol, in dst_key_frombuffer() argument
235 result = frombuffer(alg, flags, protocol, source, &key); in dst_key_frombuffer()
315 get_key_struct(unsigned int alg, in get_key_struct() argument
[all …]
H A Dtsig.c719 unsigned int alg; in dns_tsig_verify() local
813 alg = dst_key_alg(key); in dns_tsig_verify()
818 alg == DST_ALG_HMACSHA1 || in dns_tsig_verify()
819 alg == DST_ALG_HMACSHA224 || alg == DST_ALG_HMACSHA256 || in dns_tsig_verify()
820 alg == DST_ALG_HMACSHA384 || alg == DST_ALG_HMACSHA512) in dns_tsig_verify()
985 alg == DST_ALG_HMACSHA1 || in dns_tsig_verify()
986 alg == DST_ALG_HMACSHA224 || alg == DST_ALG_HMACSHA256 || in dns_tsig_verify()
987 alg == DST_ALG_HMACSHA384 || alg == DST_ALG_HMACSHA512) in dns_tsig_verify()
1055 unsigned int alg; in tsig_verify_tcp() local
1115 alg = dst_key_alg(key); in tsig_verify_tcp()
[all …]
/openbsd-src/lib/libcrypto/pkcs7/
H A Dpk7_attr.c102 X509_ALGOR *alg; in PKCS7_simple_smimecap() local
104 if (!(alg = X509_ALGOR_new())) { in PKCS7_simple_smimecap()
108 ASN1_OBJECT_free(alg->algorithm); in PKCS7_simple_smimecap()
109 alg->algorithm = OBJ_nid2obj(nid); in PKCS7_simple_smimecap()
113 if (!(alg->parameter = ASN1_TYPE_new())) in PKCS7_simple_smimecap()
121 alg->parameter->value.integer = nbit; in PKCS7_simple_smimecap()
122 alg->parameter->type = V_ASN1_INTEGER; in PKCS7_simple_smimecap()
124 if (sk_X509_ALGOR_push(sk, alg) == 0) in PKCS7_simple_smimecap()
130 X509_ALGOR_free(alg); in PKCS7_simple_smimecap()
/openbsd-src/gnu/usr.bin/perl/cpan/Digest-SHA/t/
H A Dstate.t21 my @alg = (1, 256, 384, 512);
27 my $alg = shift @alg;
29 if ($alg == 384) { $skip = sha384_hex("") ? 0 : 1 }
30 if ($alg == 512) { $skip = sha512_hex("") ? 0 : 1 }
49 alg:1
57 alg:256
65 alg:384
73 alg:512
/openbsd-src/lib/libfido2/src/
H A Dtpm.c58 uint16_t alg; /* TPM_ALG_SHA256 */
126 uint16_t alg; /* TPM_ALG_RSA */
137 uint16_t alg; /* TPM_ALG_ECC */
174 name->alg = TPM_ALG_SHA256; in get_signed_name()
175 name->size = sizeof(name->alg) + sizeof(name->body); in get_signed_name()
188 x->alg = htobe16(x->alg); in bswap_rs256_pubarea()
201 x->alg = htobe16(x->alg); in bswap_es256_pubarea()
220 x->name.alg = htobe16(x->name.alg); in bswap_sha1_certinfo()
238 expected.alg = TPM_ALG_RSA; in check_rs256_pubarea()
273 expected.alg = TPM_ALG_ECC; in check_es256_pubarea()
[all …]
/openbsd-src/lib/libkeynote/
H A Dsignature.c633 int hashtype, enc, intenc, alg = KEYNOTE_ALGORITHM_NONE, hashlen = 0; in keynote_sigverify_assertion() local
647 alg = keynote_get_sig_algorithm(as->as_signature, &hashtype, &enc, in keynote_sigverify_assertion()
649 if (alg == KEYNOTE_ALGORITHM_NONE) in keynote_sigverify_assertion()
653 if ((alg != as->as_signeralgorithm) && in keynote_sigverify_assertion()
654 !((alg == KEYNOTE_ALGORITHM_RSA) && in keynote_sigverify_assertion()
656 !((alg == KEYNOTE_ALGORITHM_X509) && in keynote_sigverify_assertion()
745 if ((alg == KEYNOTE_ALGORITHM_DSA) && (intenc == INTERNAL_ENC_ASN1)) in keynote_sigverify_assertion()
754 if ((alg == KEYNOTE_ALGORITHM_RSA) && (intenc == INTERNAL_ENC_PKCS1)) in keynote_sigverify_assertion()
764 if ((alg == KEYNOTE_ALGORITHM_X509) && (intenc == INTERNAL_ENC_ASN1)) in keynote_sigverify_assertion()
789 int slen, i, hashlen = 0, hashtype, alg, encoding, internalenc; in keynote_sign_assertion() local
[all …]
H A Dauxil.c42 keynote_keyhash(void *key, int alg) in keynote_keyhash() argument
52 switch (alg) in keynote_keyhash()
97 int alg; in keynote_in_action_authorizers() local
106 alg = kl2->key_alg; in keynote_in_action_authorizers()
111 alg = algorithm; in keynote_in_action_authorizers()
117 if ((kl->key_alg == alg) || in keynote_in_action_authorizers()
119 (alg == KEYNOTE_ALGORITHM_X509)) || in keynote_in_action_authorizers()
121 (alg == KEYNOTE_ALGORITHM_RSA))) in keynote_in_action_authorizers()
122 if (kn_keycompare(kl->key_key, s, alg) == RESULT_TRUE) in keynote_in_action_authorizers()
/openbsd-src/lib/libcrypto/ocsp/
H A Docsp_lib.c112 X509_ALGOR *alg; OCSP_cert_id_new() local
/openbsd-src/sys/crypto/
H A Dcrypto.c287 crypto_register(u_int32_t driverid, int *alg, in crypto_register() argument
293 if (driverid >= crypto_drivers_num || alg == NULL || in crypto_register()
309 crypto_drivers[driverid].cc_alg[i] = alg[i]; in crypto_register()
330 crypto_unregister(u_int32_t driverid, int alg) in crypto_unregister() argument
342 alg <= 0 || alg > (CRYPTO_ALGORITHM_MAX + 1)) { in crypto_unregister()
347 if (alg != CRYPTO_ALGORITHM_MAX + 1) { in crypto_unregister()
348 if (crypto_drivers[driverid].cc_alg[alg] == 0) { in crypto_unregister()
352 crypto_drivers[driverid].cc_alg[alg] = 0; in crypto_unregister()
364 if (i == CRYPTO_ALGORITHM_MAX + 1 || alg == CRYPTO_ALGORITHM_MAX + 1) { in crypto_unregister()
/openbsd-src/gnu/usr.bin/perl/cpan/Digest-SHA/src/
H A Dsha.c254 if (s->alg <= SHA256) in digcpy()
272 if (s->alg <= SHA256) in statecpy()
285 s->alg = algo; s->sha = sha ## transform; \
294 if (s->alg == SHA1) SHA_INIT(s, 1, 1, H32, SHA32); in sharewind()
295 else if (s->alg == SHA224) SHA_INIT(s, 224, 256, H32, SHA32); in sharewind()
296 else if (s->alg == SHA256) SHA_INIT(s, 256, 256, H32, SHA32); in sharewind()
297 else if (s->alg == SHA384) SHA_INIT(s, 384, 512, H64, SHA64); in sharewind()
298 else if (s->alg == SHA512) SHA_INIT(s, 512, 512, H64, SHA64); in sharewind()
299 else if (s->alg == SHA512224) SHA_INIT(s, 512224, 512, H64, SHA64); in sharewind()
300 else if (s->alg == SHA512256) SHA_INIT(s, 512256, 512, H64, SHA64); in sharewind()
[all …]

123456