Searched defs:alg (Results 1 - 19 of 19) sorted by relevance

/osnet-11/usr/src/lib/libpkg/common/
H A Dsecurity.c250 * Arguments: alg - The algorithm to use to calculate the fingerprint
256 *get_fingerprint(X509 *cert, const EVP_MD *alg) argument
264 if (!X509_digest(cert, alg, md, &n)) {
/osnet-11/usr/src/lib/libresolv2/common/nameser/
H A Dns_sign.c96 u_char *alg; local
143 alg = cp;
190 n = ns_name_ntol(alg, buf, sizeof(buf));
H A Dns_verify.c142 char name[MAXDNAME], alg[MAXDNAME]; local
182 n = dn_expand(msg, eom, cp, alg, MAXDNAME);
185 if (ns_samename(alg, NS_TSIG_ALG_HMAC_MD5) != 1)
267 n = ns_name_pton(alg, buf2, sizeof(buf2));
348 char name[MAXDNAME], alg[MAXDNAME]; local
409 n = dn_expand(msg, eom, cp, alg, MAXDNAME);
412 if (ns_samename(alg, NS_TSIG_ALG_HMAC_MD5) != 1)
H A Dns_print.c573 u_int c_type, key_tag, alg; local
581 alg = (u_int) *rdata++;
583 len = SPRINTF((tmp, "%d %d %d ", c_type, key_tag, alg));
/osnet-11/usr/src/lib/libresolv2/common/dst/
H A Dsupport.c226 * form: K<keyname>+<alg>+<id>.<suffix>
257 * form: K<keyname>+<alg>+<id>.<suffix>
267 int alg, const char *suffix, size_t filename_length)
280 sprintf(filename, "K%s+%03d+%05d.%s", name, alg, my_id,
266 dst_s_build_filename(char *filename, const char *name, u_int16_t id, int alg, const char *suffix, size_t filename_length) argument
H A Ddst_api.c26 * int dst_check_algorithm() Function to determines if alg is suppored.
77 static DST_KEY *dst_s_get_key_struct(const char *name, const int alg,
132 * alg 1 KEY_RSA
141 dst_check_algorithm(const int alg) argument
143 return (dst_t_func[alg] != NULL);
152 * alg: the algorithm number
161 dst_s_get_key_struct(const char *name, const int alg, const int flags, argument
166 if (dst_check_algorithm(alg)) /*%< make sure alg is available */
177 new_key->dk_alg = alg;
465 int flags, proto, alg, len, dlen; local
646 int alg ; local
757 dst_buffer_to_key(const char *key_name, const int alg, const int flags, const int protocol, const u_char *key_buf, const int key_len) argument
823 int cnt, alg, len, major, minor, file_major, file_minor; local
951 dst_generate_key(const char *name, const int bits, const int exp, const int flags, const int protocol, const int alg) argument
[all...]
/osnet-11/usr/src/lib/pkcs11/pkcs11_tpm/common/
H A Dasn1.c835 CK_BYTE *alg = NULL; local
854 rc = ber_decode_SEQUENCE(buf + offset, &alg, &len, &field_len);
858 *algorithm = alg;
861 rc = ber_decode_OCTET_STRING(alg + len, priv_key, &buf_len, &field_len);
1069 CK_BYTE *alg = NULL; local
1076 rc = ber_decode_PrivateKeyInfo(data, data_len, &alg,
1081 if (memcmp(alg, ber_rsaEncryption, ber_rsaEncryptionLen) != 0) {
H A Dkey_mgr.c37 CK_BYTE *alg = NULL; local
42 rc = ber_decode_PrivateKeyInfo(keydata, keylen, &alg,
48 if (memcmp(alg, ber_rsaEncryption,
/osnet-11/usr/src/lib/libkmf/libkmf/common/
H A Dcsrcrlop.c204 KMF_OID *alg; local
209 alg = x509_algid_to_algoid(sigAlg);
211 if (alg != NULL) {
214 (KMF_DATA *)alg);
H A Dcertgetsetop.c1905 KMF_OID *alg; local
1910 alg = x509_algid_to_algoid(sigAlg);
1912 if (alg != NULL) {
1915 (KMF_DATA *)alg);
H A Dcertop.c913 /* If no algorithm specified, use the certs signature alg */
1085 KMF_OID *alg; local
1138 alg = &pubkey->algorithm.algorithm;
1140 algid = x509_algoid_to_algid(alg);
/osnet-11/usr/src/lib/libipsecutil/common/
H A Dalgs.c48 "# ALG|protocol-id|alg-id|name,name,...|ef-id| \n"
125 alg_has_pkg(ipsec_proto_t *proto, struct ipsecalgent *alg) argument
133 if (proto->proto_algs_pkgs[i].alg_num == alg->a_alg_num)
174 * This function takes num_protos + num_protos * dois-per-alg operations.
189 struct ipsecalgent *alg; local
249 alg = protos[i].proto_algs[j];
252 alg_pkg = alg_has_pkg(&protos[i], alg);
260 alg->a_proto_num, alg->a_alg_num));
263 for (k = 0; alg
[all...]
H A Dipsec_util.c421 struct ipsecalgent *alg; local
423 alg = getipsecalgbynum(alg_num, proto_num, NULL);
424 if (alg == NULL) {
440 if (fputs(alg->a_names[0], where) == EOF)
444 freeipsecalgent(alg);
2507 "algtype(%d) = alg(%d)"),
3297 rparsealg(uint8_t alg, int proto_num) argument
3304 holder = getipsecalgbynum(alg, proto_num, NULL);
3306 (void) snprintf(numprint, NBUF_SIZE, "%d", alg);
/osnet-11/usr/src/grub/grub2/grub-core/disk/
H A Dgeli.c106 grub_uint16_t alg; member in struct:grub_geli_phdr
314 if (grub_le_to_cpu16 (header.alg) >= ARRAY_SIZE (algorithms)
315 || algorithms[grub_le_to_cpu16 (header.alg)] == NULL)
318 grub_le_to_cpu16 (header.alg));
322 ciphername = algorithms[grub_le_to_cpu16 (header.alg)];
336 if (grub_le_to_cpu16 (header.alg) == 0x16)
358 if (grub_le_to_cpu16 (header.alg) == 0x16)
522 if (grub_le_to_cpu16 (header.alg) == 0x16)
532 if (grub_le_to_cpu16 (header.alg) == 0x16)
/osnet-11/usr/src/lib/libipadm/common/
H A Dipadm_cong.c221 const char *proto_str, const char *alg)
230 proto_str, alg);
364 char alg[MAXPROPVALLEN]; local
400 scf_instance_get_name(ss.inst, alg, sizeof (alg))
405 if (i_ipadm_cong_enlist_alg(alg, enabled_list,
454 char alg[MAXPROPVALLEN]; local
484 if (scf_instance_get_name(ss.inst, alg, sizeof (alg)) <= 0)
488 IPADM_CONG_SVC_INST, proto_str, alg);
220 i_ipadm_get_cong_scf_state(ipadm_scf_state_t *ss, boolean_t needinst, const char *proto_str, const char *alg) argument
547 ipadm_cong_is_privprop(const char *pname, char **alg) argument
580 ipadm_cong_get_persist_propval(const char *alg, const char *pname, char *buf, uint_t *bufsize, const char *proto_str) argument
630 ipadm_cong_smf_set_prop(const char *alg, const char *pname, const char *buf, const char *proto_str) argument
720 ipadm_cong_smf_delete_prop(const char *alg, const char *pname, const char *buf, const char *proto_str) argument
789 ipadm_cong_persist_propval(const char *alg, const char *pname, const char *buf, const char *proto_str, uint_t flags) argument
851 ipadm_cong_smf_set_state(const char *alg, uint_t proto, uint_t flags) argument
[all...]
H A Dipadm_prop.c842 char *alg; local
871 * We allow only one alg to be added or removed at a time.
885 alg = nvpair_name(nvp);
892 status = ipadm_cong_smf_set_state(alg, proto, flags);
894 status = i_ipadm_set_prop(iph, arg, pdp, alg, proto,
897 (void) ipadm_cong_smf_set_state(alg, proto,
/osnet-11/usr/src/lib/libc/port/gen/
H A Dcrypt.c113 static void free_crypt_alg(struct crypt_alg_s *alg);
146 struct crypt_alg_s *alg; local
172 * If alg is NULL but found = B_TRUE then there is a problem with
181 alg = getalgbyname(algname, &found);
182 if ((alg == NULL) || !found) {
190 ciphertext = alg->a_genhash(ctbuffer, CRYPT_MAXCIPHERTEXTLEN,
191 plaintext, salt, (const char **)alg->a_params);
195 free_crypt_alg(alg);
219 struct crypt_alg_s *alg = NULL; local
249 alg
490 struct crypt_alg_s *alg = NULL; local
692 free_crypt_alg(struct crypt_alg_s *alg) argument
[all...]
/osnet-11/usr/src/lib/libkmf/plugins/kmf_pkcs11/common/
H A Dpkcs11_spi.c2063 /* No hash alg specified, just sign the data we were given */
2960 CK_ULONG alg; local
3024 rv = kmf2pk11keytype(keytype, &alg);
3028 SETATTR(pTmpl, i, CKA_KEY_TYPE, &alg, sizeof (alg));
/osnet-11/usr/src/lib/krb5/plugins/preauth/pkinit/
H A Dpkinit_crypto_openssl.c1001 X509_ALGOR *alg = NULL; local
1163 alg = X509_ALGOR_new();
1164 if (alg == NULL)
1166 alg->algorithm = OBJ_nid2obj(NID_sha1);
1167 alg->parameter = NULL;
1168 alg_len = i2d_X509_ALGOR(alg, NULL);
1189 i2d_X509_ALGOR(alg, &y);
1310 if (alg != NULL)
1311 X509_ALGOR_free(alg);

Completed in 114 milliseconds