Searched defs:alg (Results 26 - 39 of 39) sorted by relevance

12

/illumos-gate/usr/src/lib/libkmf/libkmf/common/
H A Dcertop.c910 /* If no algorithm specified, use the certs signature alg */
1082 KMF_OID *alg; local
1135 alg = &pubkey->algorithm.algorithm;
1137 algid = x509_algoid_to_algid(alg);
/illumos-gate/usr/src/cmd/cmd-inet/usr.bin/dns-sd/
H A Ddns-sd.c187 unsigned char alg; member in struct:__anon9
197 unsigned char alg; member in struct:__anon10
206 unsigned char alg; member in struct:__anon11
870 rrds->alg, swap16(rrds->keyTag), rrds->digestType);
881 rrkey->alg, (unsigned int)keytag((unsigned char *)rrkey, rdlen));
954 DNSTypeName(swap16(rrsig->typeCovered)), rrsig->alg, rrsig->labels, swap32(rrsig->origTTL),
/illumos-gate/usr/src/lib/libipsecutil/common/
H A Dipsec_util.c423 struct ipsecalgent *alg; local
425 alg = getipsecalgbynum(alg_num, proto_num, NULL);
426 if (alg == NULL) {
442 if (fputs(alg->a_names[0], where) == EOF)
446 freeipsecalgent(alg);
2509 "algtype(%d) = alg(%d)"),
3299 rparsealg(uint8_t alg, int proto_num) argument
3306 holder = getipsecalgbynum(alg, proto_num, NULL);
3308 (void) snprintf(numprint, NBUF_SIZE, "%d", alg);
/illumos-gate/usr/src/lib/libkmf/plugins/kmf_pkcs11/common/
H A Dpkcs11_spi.c2928 CK_ULONG alg; local
2992 rv = kmf2pk11keytype(keytype, &alg);
2996 SETATTR(pTmpl, i, CKA_KEY_TYPE, &alg, sizeof (alg));
/illumos-gate/usr/src/cmd/cmd-inet/usr.sbin/ifconfig/
H A Difconfig.c1111 struct ipsecalgent *alg; local
1126 alg = getipsecalgbynum(alg_value, proto_num, NULL);
1127 if (alg != NULL) {
1128 (void) strlcpy(numprint, alg->a_names[0], sizeof (numprint));
1129 freeipsecalgent(alg);
1140 struct ipsecalgent *alg; local
1160 alg = getipsecalgbyname(algname, proto_num, NULL);
1161 if (alg != NULL) {
1162 invalue = alg->a_alg_num;
1163 freeipsecalgent(alg);
1189 set_tun_algs(int which_alg, int alg) argument
[all...]
/illumos-gate/usr/src/cmd/cmd-inet/usr.sbin/ipsecutils/
H A Dipseckey.c625 parsealg(char *alg, int proto_num, char *ebuf) argument
631 if (alg == NULL) {
636 algent = getipsecalgbyname(alg, proto_num, NULL);
655 invalue = parsenum(alg, B_FALSE, ebuf);
662 "Unknown encryption algorithm type \"%s\"\n"), alg);
665 "Unknown authentication algorithm type \"%s\"\n"), alg);
H A Dipsecconf.c601 alginfo_t alg = {0, 0, 0, 0, 0}; local
670 known_algs[algtype][ipsec_nalgs[algtype]] = alg;
677 alg.minkeybits = attr->spd_attr_value;
683 alg.maxkeybits = attr->spd_attr_value;
689 alg.defkeybits = attr->spd_attr_value;
695 alg.incr = attr->spd_attr_value;
701 alg.id = attr->spd_attr_value;
1726 struct ipsecalgent *alg; local
1735 alg = getipsecalgbynum(algreq->alg_id, proto_num, NULL);
1736 if (alg
3437 struct ipsecalgent *alg; local
3456 struct ipsecalgent *alg; local
5161 dump_algreq(const char *tag, algreq_t *alg) argument
[all...]
/illumos-gate/usr/src/uts/common/inet/ip/
H A Dspdsock.c183 /* mapping from alg type to protocol number, as per RFC 2407 */
2217 * Process a SPD_ALGLIST request. The caller expects separate alg entries
2349 ipsec_alginfo_t *alg = local
2351 uint_t minbits = alg->alg_minbits;
2352 uint_t maxbits = alg->alg_maxbits;
2353 uint_t defbits = alg->alg_default_bits;
2354 uint_t incr = alg->alg_increment;
2400 ipsec_alginfo_t *alg; local
2427 alg = ipss->ipsec_alglists[algtype][algid];
2429 (ATTRPERALG + alg
2551 ipsec_alginfo_t *alg = NULL; local
3634 ipsec_alginfo_t *alg, *oalg; local
[all...]
H A Dsadb.c2936 ipsec_alginfo_t *alg; local
3202 alg = ipss->ipsec_alglists[IPSEC_ALG_AUTH]
3204 if (alg != NULL && ALG_VALID(alg)) {
3205 newbie->ipsa_amech.cm_type = alg->alg_mech_type;
3209 newbie->ipsa_mac_len = (size_t)alg->alg_datalen;
3218 * An error here indicates that alg is the wrong type
3219 * (IE: not authentication) or its not in the alg tables
3234 alg = ipss->ipsec_alglists[IPSEC_ALG_ENCR]
3237 if (alg !
5265 sadb_new_algdesc(uint8_t *start, uint8_t *limit, sadb_x_ecomb_t *ecomb, uint8_t satype, uint8_t algtype, uint8_t alg, uint16_t minbits, uint16_t maxbits, ipsec_stack_t *ipss) argument
7186 ipsec_alginfo_t *alg; local
[all...]
H A Dspd.c774 ipsec_alg_reg(ipsec_algtype_t algtype, ipsec_alginfo_t *alg, netstack_t *ns) argument
780 ASSERT(ipss->ipsec_alglists[algtype][alg->alg_id] == NULL);
781 ipsec_alg_fix_min_max(alg, algtype, ns);
782 ipss->ipsec_alglists[algtype][alg->alg_id] = alg;
785 alg_insert_sortlist(algtype, alg->alg_id, ns);
1264 #define SET_EXP_MINMAX(type, wild, alg, min, max, ipss) \
1267 if (ipss->ipsec_alglists[type][alg] != NULL) \
1642 *reason = "unacceptable ah alg";
1670 *reason = "unacceptable esp alg";
4693 ipsec_alg_fix_min_max(ipsec_alginfo_t *alg, ipsec_algtype_t alg_type, netstack_t *ns) argument
4914 alg_flag_check(ipsec_alginfo_t *alg) argument
4955 ipsec_alg_free(ipsec_alginfo_t *alg) argument
4983 ipsec_valid_key_size(uint16_t key_size, ipsec_alginfo_t *alg) argument
5036 ipsec_alginfo_t *alg; local
[all...]
/illumos-gate/usr/src/head/arpa/
H A Dnameser.h293 char name[NS_MAXDNAME], alg[NS_MAXDNAME]; member in struct:ns_tsig_key
469 #define NS_ALG_EXPIRE_ONLY 253 /* No alg, no security */
470 #define NS_ALG_PRIVATE_OID 254 /* Key begins with OID giving alg */
/illumos-gate/usr/src/lib/krb5/plugins/preauth/pkinit/
H A Dpkinit_crypto_openssl.c869 X509_ALGOR *alg = NULL; local
1031 alg = X509_ALGOR_new();
1032 if (alg == NULL)
1034 alg->algorithm = OBJ_nid2obj(NID_sha1);
1035 alg->parameter = NULL;
1036 alg_len = i2d_X509_ALGOR(alg, NULL);
1057 i2d_X509_ALGOR(alg, &y);
1178 if (alg != NULL)
1179 X509_ALGOR_free(alg);
/illumos-gate/usr/src/cmd/cmd-inet/usr.lib/mdnsd/
H A DDNSCommon.c204 mDNSlocal char *DNSSECAlgName(mDNSu8 alg) argument
206 switch (alg)
215 mDNS_snprintf(algbuffer, sizeof(algbuffer), "ALG%d", alg);
466 DNSSECDigestName(nsec3->alg), nsec3->flags, swap16(nsec3->iterations));
512 DNSTypeName(swap16(rrsig->typeCovered)), DNSSECAlgName(rrsig->alg), rrsig->labels, swap32(rrsig->origTTL),
523 DNSSECAlgName(rrkey->alg), (unsigned int)keytag((mDNSu8 *)rrkey, rr->rdlength));
533 length += mDNS_snprintf(buffer+length, RemSpc, "\t%s\t%d\t%s ", DNSSECAlgName(rrds->alg), swap16(rrds->keyTag),
1188 ctx = AlgCreate(DIGEST_ALG, nsec3->alg);
3287 if (nsec3->alg != SHA1_DIGEST_TYPE)
3289 LogInfo("SetRData: nsec3 alg
[all...]
H A DmDNSEmbeddedAPI.h774 // http://www.iana.org/assignments/dns-sec-alg-numbers/dns-sec-alg-numbers.xhtml
784 // alg - same as in RRSIG, DNS KEY or DS.
805 mDNSu8 alg; variable
825 mDNSu8 alg; variable
845 // alg - The only mandatory algorithm that we support is RSA/SHA-1
853 mDNSu8 alg; variable
862 mDNSu8 alg; variable

Completed in 158 milliseconds

12