/illumos-gate/usr/src/lib/libkmf/libkmf/common/ |
H A D | certop.c | 910 /* If no algorithm specified, use the certs signature alg */ 1082 KMF_OID *alg; local 1135 alg = &pubkey->algorithm.algorithm; 1137 algid = x509_algoid_to_algid(alg);
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.bin/dns-sd/ |
H A D | dns-sd.c | 187 unsigned char alg; member in struct:__anon9 197 unsigned char alg; member in struct:__anon10 206 unsigned char alg; member in struct:__anon11 870 rrds->alg, swap16(rrds->keyTag), rrds->digestType); 881 rrkey->alg, (unsigned int)keytag((unsigned char *)rrkey, rdlen)); 954 DNSTypeName(swap16(rrsig->typeCovered)), rrsig->alg, rrsig->labels, swap32(rrsig->origTTL),
|
/illumos-gate/usr/src/lib/libipsecutil/common/ |
H A D | ipsec_util.c | 423 struct ipsecalgent *alg; local 425 alg = getipsecalgbynum(alg_num, proto_num, NULL); 426 if (alg == NULL) { 442 if (fputs(alg->a_names[0], where) == EOF) 446 freeipsecalgent(alg); 2509 "algtype(%d) = alg(%d)"), 3299 rparsealg(uint8_t alg, int proto_num) argument 3306 holder = getipsecalgbynum(alg, proto_num, NULL); 3308 (void) snprintf(numprint, NBUF_SIZE, "%d", alg);
|
/illumos-gate/usr/src/lib/libkmf/plugins/kmf_pkcs11/common/ |
H A D | pkcs11_spi.c | 2928 CK_ULONG alg; local 2992 rv = kmf2pk11keytype(keytype, &alg); 2996 SETATTR(pTmpl, i, CKA_KEY_TYPE, &alg, sizeof (alg));
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.sbin/ifconfig/ |
H A D | ifconfig.c | 1111 struct ipsecalgent *alg; local 1126 alg = getipsecalgbynum(alg_value, proto_num, NULL); 1127 if (alg != NULL) { 1128 (void) strlcpy(numprint, alg->a_names[0], sizeof (numprint)); 1129 freeipsecalgent(alg); 1140 struct ipsecalgent *alg; local 1160 alg = getipsecalgbyname(algname, proto_num, NULL); 1161 if (alg != NULL) { 1162 invalue = alg->a_alg_num; 1163 freeipsecalgent(alg); 1189 set_tun_algs(int which_alg, int alg) argument [all...] |
/illumos-gate/usr/src/cmd/cmd-inet/usr.sbin/ipsecutils/ |
H A D | ipseckey.c | 625 parsealg(char *alg, int proto_num, char *ebuf) argument 631 if (alg == NULL) { 636 algent = getipsecalgbyname(alg, proto_num, NULL); 655 invalue = parsenum(alg, B_FALSE, ebuf); 662 "Unknown encryption algorithm type \"%s\"\n"), alg); 665 "Unknown authentication algorithm type \"%s\"\n"), alg);
|
H A D | ipsecconf.c | 601 alginfo_t alg = {0, 0, 0, 0, 0}; local 670 known_algs[algtype][ipsec_nalgs[algtype]] = alg; 677 alg.minkeybits = attr->spd_attr_value; 683 alg.maxkeybits = attr->spd_attr_value; 689 alg.defkeybits = attr->spd_attr_value; 695 alg.incr = attr->spd_attr_value; 701 alg.id = attr->spd_attr_value; 1726 struct ipsecalgent *alg; local 1735 alg = getipsecalgbynum(algreq->alg_id, proto_num, NULL); 1736 if (alg 3437 struct ipsecalgent *alg; local 3456 struct ipsecalgent *alg; local 5161 dump_algreq(const char *tag, algreq_t *alg) argument [all...] |
/illumos-gate/usr/src/uts/common/inet/ip/ |
H A D | spdsock.c | 183 /* mapping from alg type to protocol number, as per RFC 2407 */ 2217 * Process a SPD_ALGLIST request. The caller expects separate alg entries 2349 ipsec_alginfo_t *alg = local 2351 uint_t minbits = alg->alg_minbits; 2352 uint_t maxbits = alg->alg_maxbits; 2353 uint_t defbits = alg->alg_default_bits; 2354 uint_t incr = alg->alg_increment; 2400 ipsec_alginfo_t *alg; local 2427 alg = ipss->ipsec_alglists[algtype][algid]; 2429 (ATTRPERALG + alg 2551 ipsec_alginfo_t *alg = NULL; local 3634 ipsec_alginfo_t *alg, *oalg; local [all...] |
H A D | sadb.c | 2936 ipsec_alginfo_t *alg; local 3202 alg = ipss->ipsec_alglists[IPSEC_ALG_AUTH] 3204 if (alg != NULL && ALG_VALID(alg)) { 3205 newbie->ipsa_amech.cm_type = alg->alg_mech_type; 3209 newbie->ipsa_mac_len = (size_t)alg->alg_datalen; 3218 * An error here indicates that alg is the wrong type 3219 * (IE: not authentication) or its not in the alg tables 3234 alg = ipss->ipsec_alglists[IPSEC_ALG_ENCR] 3237 if (alg ! 5265 sadb_new_algdesc(uint8_t *start, uint8_t *limit, sadb_x_ecomb_t *ecomb, uint8_t satype, uint8_t algtype, uint8_t alg, uint16_t minbits, uint16_t maxbits, ipsec_stack_t *ipss) argument 7186 ipsec_alginfo_t *alg; local [all...] |
H A D | spd.c | 774 ipsec_alg_reg(ipsec_algtype_t algtype, ipsec_alginfo_t *alg, netstack_t *ns) argument 780 ASSERT(ipss->ipsec_alglists[algtype][alg->alg_id] == NULL); 781 ipsec_alg_fix_min_max(alg, algtype, ns); 782 ipss->ipsec_alglists[algtype][alg->alg_id] = alg; 785 alg_insert_sortlist(algtype, alg->alg_id, ns); 1264 #define SET_EXP_MINMAX(type, wild, alg, min, max, ipss) \ 1267 if (ipss->ipsec_alglists[type][alg] != NULL) \ 1642 *reason = "unacceptable ah alg"; 1670 *reason = "unacceptable esp alg"; 4693 ipsec_alg_fix_min_max(ipsec_alginfo_t *alg, ipsec_algtype_t alg_type, netstack_t *ns) argument 4914 alg_flag_check(ipsec_alginfo_t *alg) argument 4955 ipsec_alg_free(ipsec_alginfo_t *alg) argument 4983 ipsec_valid_key_size(uint16_t key_size, ipsec_alginfo_t *alg) argument 5036 ipsec_alginfo_t *alg; local [all...] |
/illumos-gate/usr/src/head/arpa/ |
H A D | nameser.h | 293 char name[NS_MAXDNAME], alg[NS_MAXDNAME]; member in struct:ns_tsig_key 469 #define NS_ALG_EXPIRE_ONLY 253 /* No alg, no security */ 470 #define NS_ALG_PRIVATE_OID 254 /* Key begins with OID giving alg */
|
/illumos-gate/usr/src/lib/krb5/plugins/preauth/pkinit/ |
H A D | pkinit_crypto_openssl.c | 869 X509_ALGOR *alg = NULL; local 1031 alg = X509_ALGOR_new(); 1032 if (alg == NULL) 1034 alg->algorithm = OBJ_nid2obj(NID_sha1); 1035 alg->parameter = NULL; 1036 alg_len = i2d_X509_ALGOR(alg, NULL); 1057 i2d_X509_ALGOR(alg, &y); 1178 if (alg != NULL) 1179 X509_ALGOR_free(alg);
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.lib/mdnsd/ |
H A D | DNSCommon.c | 204 mDNSlocal char *DNSSECAlgName(mDNSu8 alg) argument 206 switch (alg) 215 mDNS_snprintf(algbuffer, sizeof(algbuffer), "ALG%d", alg); 466 DNSSECDigestName(nsec3->alg), nsec3->flags, swap16(nsec3->iterations)); 512 DNSTypeName(swap16(rrsig->typeCovered)), DNSSECAlgName(rrsig->alg), rrsig->labels, swap32(rrsig->origTTL), 523 DNSSECAlgName(rrkey->alg), (unsigned int)keytag((mDNSu8 *)rrkey, rr->rdlength)); 533 length += mDNS_snprintf(buffer+length, RemSpc, "\t%s\t%d\t%s ", DNSSECAlgName(rrds->alg), swap16(rrds->keyTag), 1188 ctx = AlgCreate(DIGEST_ALG, nsec3->alg); 3287 if (nsec3->alg != SHA1_DIGEST_TYPE) 3289 LogInfo("SetRData: nsec3 alg [all...] |
H A D | mDNSEmbeddedAPI.h | 774 // http://www.iana.org/assignments/dns-sec-alg-numbers/dns-sec-alg-numbers.xhtml 784 // alg - same as in RRSIG, DNS KEY or DS. 805 mDNSu8 alg; variable 825 mDNSu8 alg; variable 845 // alg - The only mandatory algorithm that we support is RSA/SHA-1 853 mDNSu8 alg; variable 862 mDNSu8 alg; variable
|