/osnet-11/usr/src/lib/libpkg/common/ |
H A D | security.c | 250 * Arguments: alg - The algorithm to use to calculate the fingerprint 256 *get_fingerprint(X509 *cert, const EVP_MD *alg) argument 264 if (!X509_digest(cert, alg, md, &n)) {
|
/osnet-11/usr/src/lib/libresolv2/common/nameser/ |
H A D | ns_sign.c | 96 u_char *alg; local 143 alg = cp; 190 n = ns_name_ntol(alg, buf, sizeof(buf));
|
H A D | ns_verify.c | 142 char name[MAXDNAME], alg[MAXDNAME]; local 182 n = dn_expand(msg, eom, cp, alg, MAXDNAME); 185 if (ns_samename(alg, NS_TSIG_ALG_HMAC_MD5) != 1) 267 n = ns_name_pton(alg, buf2, sizeof(buf2)); 348 char name[MAXDNAME], alg[MAXDNAME]; local 409 n = dn_expand(msg, eom, cp, alg, MAXDNAME); 412 if (ns_samename(alg, NS_TSIG_ALG_HMAC_MD5) != 1)
|
H A D | ns_print.c | 573 u_int c_type, key_tag, alg; local 581 alg = (u_int) *rdata++; 583 len = SPRINTF((tmp, "%d %d %d ", c_type, key_tag, alg));
|
/osnet-11/usr/src/lib/libresolv2/common/dst/ |
H A D | support.c | 226 * form: K<keyname>+<alg>+<id>.<suffix> 257 * form: K<keyname>+<alg>+<id>.<suffix> 267 int alg, const char *suffix, size_t filename_length) 280 sprintf(filename, "K%s+%03d+%05d.%s", name, alg, my_id, 266 dst_s_build_filename(char *filename, const char *name, u_int16_t id, int alg, const char *suffix, size_t filename_length) argument
|
H A D | dst_api.c | 26 * int dst_check_algorithm() Function to determines if alg is suppored. 77 static DST_KEY *dst_s_get_key_struct(const char *name, const int alg, 132 * alg 1 KEY_RSA 141 dst_check_algorithm(const int alg) argument 143 return (dst_t_func[alg] != NULL); 152 * alg: the algorithm number 161 dst_s_get_key_struct(const char *name, const int alg, const int flags, argument 166 if (dst_check_algorithm(alg)) /*%< make sure alg is available */ 177 new_key->dk_alg = alg; 465 int flags, proto, alg, len, dlen; local 646 int alg ; local 757 dst_buffer_to_key(const char *key_name, const int alg, const int flags, const int protocol, const u_char *key_buf, const int key_len) argument 823 int cnt, alg, len, major, minor, file_major, file_minor; local 951 dst_generate_key(const char *name, const int bits, const int exp, const int flags, const int protocol, const int alg) argument [all...] |
/osnet-11/usr/src/lib/pkcs11/pkcs11_tpm/common/ |
H A D | asn1.c | 835 CK_BYTE *alg = NULL; local 854 rc = ber_decode_SEQUENCE(buf + offset, &alg, &len, &field_len); 858 *algorithm = alg; 861 rc = ber_decode_OCTET_STRING(alg + len, priv_key, &buf_len, &field_len); 1069 CK_BYTE *alg = NULL; local 1076 rc = ber_decode_PrivateKeyInfo(data, data_len, &alg, 1081 if (memcmp(alg, ber_rsaEncryption, ber_rsaEncryptionLen) != 0) {
|
H A D | key_mgr.c | 37 CK_BYTE *alg = NULL; local 42 rc = ber_decode_PrivateKeyInfo(keydata, keylen, &alg, 48 if (memcmp(alg, ber_rsaEncryption,
|
/osnet-11/usr/src/lib/libkmf/libkmf/common/ |
H A D | csrcrlop.c | 204 KMF_OID *alg; local 209 alg = x509_algid_to_algoid(sigAlg); 211 if (alg != NULL) { 214 (KMF_DATA *)alg);
|
H A D | certgetsetop.c | 1905 KMF_OID *alg; local 1910 alg = x509_algid_to_algoid(sigAlg); 1912 if (alg != NULL) { 1915 (KMF_DATA *)alg);
|
H A D | certop.c | 913 /* If no algorithm specified, use the certs signature alg */ 1085 KMF_OID *alg; local 1138 alg = &pubkey->algorithm.algorithm; 1140 algid = x509_algoid_to_algid(alg);
|
/osnet-11/usr/src/lib/libipsecutil/common/ |
H A D | algs.c | 48 "# ALG|protocol-id|alg-id|name,name,...|ef-id| \n" 125 alg_has_pkg(ipsec_proto_t *proto, struct ipsecalgent *alg) argument 133 if (proto->proto_algs_pkgs[i].alg_num == alg->a_alg_num) 174 * This function takes num_protos + num_protos * dois-per-alg operations. 189 struct ipsecalgent *alg; local 249 alg = protos[i].proto_algs[j]; 252 alg_pkg = alg_has_pkg(&protos[i], alg); 260 alg->a_proto_num, alg->a_alg_num)); 263 for (k = 0; alg [all...] |
H A D | ipsec_util.c | 421 struct ipsecalgent *alg; local 423 alg = getipsecalgbynum(alg_num, proto_num, NULL); 424 if (alg == NULL) { 440 if (fputs(alg->a_names[0], where) == EOF) 444 freeipsecalgent(alg); 2507 "algtype(%d) = alg(%d)"), 3297 rparsealg(uint8_t alg, int proto_num) argument 3304 holder = getipsecalgbynum(alg, proto_num, NULL); 3306 (void) snprintf(numprint, NBUF_SIZE, "%d", alg);
|
/osnet-11/usr/src/grub/grub2/grub-core/disk/ |
H A D | geli.c | 106 grub_uint16_t alg; member in struct:grub_geli_phdr 314 if (grub_le_to_cpu16 (header.alg) >= ARRAY_SIZE (algorithms) 315 || algorithms[grub_le_to_cpu16 (header.alg)] == NULL) 318 grub_le_to_cpu16 (header.alg)); 322 ciphername = algorithms[grub_le_to_cpu16 (header.alg)]; 336 if (grub_le_to_cpu16 (header.alg) == 0x16) 358 if (grub_le_to_cpu16 (header.alg) == 0x16) 522 if (grub_le_to_cpu16 (header.alg) == 0x16) 532 if (grub_le_to_cpu16 (header.alg) == 0x16)
|
/osnet-11/usr/src/lib/libipadm/common/ |
H A D | ipadm_cong.c | 221 const char *proto_str, const char *alg) 230 proto_str, alg); 364 char alg[MAXPROPVALLEN]; local 400 scf_instance_get_name(ss.inst, alg, sizeof (alg)) 405 if (i_ipadm_cong_enlist_alg(alg, enabled_list, 454 char alg[MAXPROPVALLEN]; local 484 if (scf_instance_get_name(ss.inst, alg, sizeof (alg)) <= 0) 488 IPADM_CONG_SVC_INST, proto_str, alg); 220 i_ipadm_get_cong_scf_state(ipadm_scf_state_t *ss, boolean_t needinst, const char *proto_str, const char *alg) argument 547 ipadm_cong_is_privprop(const char *pname, char **alg) argument 580 ipadm_cong_get_persist_propval(const char *alg, const char *pname, char *buf, uint_t *bufsize, const char *proto_str) argument 630 ipadm_cong_smf_set_prop(const char *alg, const char *pname, const char *buf, const char *proto_str) argument 720 ipadm_cong_smf_delete_prop(const char *alg, const char *pname, const char *buf, const char *proto_str) argument 789 ipadm_cong_persist_propval(const char *alg, const char *pname, const char *buf, const char *proto_str, uint_t flags) argument 851 ipadm_cong_smf_set_state(const char *alg, uint_t proto, uint_t flags) argument [all...] |
H A D | ipadm_prop.c | 842 char *alg; local 871 * We allow only one alg to be added or removed at a time. 885 alg = nvpair_name(nvp); 892 status = ipadm_cong_smf_set_state(alg, proto, flags); 894 status = i_ipadm_set_prop(iph, arg, pdp, alg, proto, 897 (void) ipadm_cong_smf_set_state(alg, proto,
|
/osnet-11/usr/src/lib/libc/port/gen/ |
H A D | crypt.c | 113 static void free_crypt_alg(struct crypt_alg_s *alg); 146 struct crypt_alg_s *alg; local 172 * If alg is NULL but found = B_TRUE then there is a problem with 181 alg = getalgbyname(algname, &found); 182 if ((alg == NULL) || !found) { 190 ciphertext = alg->a_genhash(ctbuffer, CRYPT_MAXCIPHERTEXTLEN, 191 plaintext, salt, (const char **)alg->a_params); 195 free_crypt_alg(alg); 219 struct crypt_alg_s *alg = NULL; local 249 alg 490 struct crypt_alg_s *alg = NULL; local 692 free_crypt_alg(struct crypt_alg_s *alg) argument [all...] |
/osnet-11/usr/src/lib/libkmf/plugins/kmf_pkcs11/common/ |
H A D | pkcs11_spi.c | 2063 /* No hash alg specified, just sign the data we were given */ 2960 CK_ULONG alg; local 3024 rv = kmf2pk11keytype(keytype, &alg); 3028 SETATTR(pTmpl, i, CKA_KEY_TYPE, &alg, sizeof (alg));
|
/osnet-11/usr/src/lib/krb5/plugins/preauth/pkinit/ |
H A D | pkinit_crypto_openssl.c | 1001 X509_ALGOR *alg = NULL; local 1163 alg = X509_ALGOR_new(); 1164 if (alg == NULL) 1166 alg->algorithm = OBJ_nid2obj(NID_sha1); 1167 alg->parameter = NULL; 1168 alg_len = i2d_X509_ALGOR(alg, NULL); 1189 i2d_X509_ALGOR(alg, &y); 1310 if (alg != NULL) 1311 X509_ALGOR_free(alg);
|