Searched refs:alg (Results 1 - 25 of 46) sorted by relevance

12

/illumos-gate/usr/src/cmd/cmd-inet/usr.lib/mdnsd/
H A DCryptoAlg.c51 mDNSexport mStatus CryptoAlgInit(mDNSu8 alg, AlgFuncs *func) argument
53 if (alg >= CRYPTO_ALG_MAX)
55 LogMsg("CryptoAlgInit: alg %d exceeds bounds", alg);
60 if (alg != CRYPTO_RSA_SHA1 && alg != CRYPTO_RSA_SHA256 && alg != CRYPTO_RSA_SHA512 &&
61 alg != CRYPTO_DSA_NSEC3_SHA1 && alg != CRYPTO_RSA_NSEC3_SHA1)
63 LogMsg("CryptoAlgInit: alg
71 EncAlgInit(mDNSu8 alg, AlgFuncs *func) argument
91 AlgCreate(AlgType type, mDNSu8 alg) argument
[all...]
H A DCryptoAlg.h32 mDNSu8 alg; member in struct:__anon16
54 extern AlgContext *AlgCreate(AlgType type, mDNSu8 alg);
/illumos-gate/usr/src/uts/common/inet/ilb/
H A Dilb_alg_hash.c274 hash_t *alg = (hash_t *)alg_data; local
277 mutex_enter(&alg->hash_lock);
279 for (i = 0; i < alg->hash_servers; i++) {
280 if (alg->hash_tbl[i].server == host) {
281 if (alg->hash_tbl[i].enabled) {
282 mutex_exit(&alg->hash_lock);
289 if (i == alg->hash_servers) {
290 mutex_exit(&alg->hash_lock);
299 for (j = 0; j < alg->hash_enabled_servers; j++) {
300 if (alg
328 hash_t *alg = (hash_t *)alg_data; local
366 ilb_alg_data_t *alg; local
415 hash_fini(ilb_alg_data_t **alg) argument
[all...]
H A Dilb_alg_rr.c188 ilb_alg_data_t *alg; local
191 if ((alg = kmem_alloc(sizeof (ilb_alg_data_t), KM_NOSLEEP)) == NULL)
194 kmem_free(alg, sizeof (ilb_alg_data_t));
198 alg->ilb_alg_lb = rr_lb;
199 alg->ilb_alg_server_del = rr_server_del;
200 alg->ilb_alg_server_add = rr_server_add;
201 alg->ilb_alg_server_enable = rr_server_enable;
202 alg->ilb_alg_server_disable = rr_server_disable;
203 alg->ilb_alg_fini = rr_fini;
204 alg
215 rr_fini(ilb_alg_data_t **alg) argument
[all...]
/illumos-gate/usr/src/lib/libc/port/gen/
H A Dcrypt.c113 static void free_crypt_alg(struct crypt_alg_s *alg);
146 struct crypt_alg_s *alg; local
172 * If alg is NULL but found = B_TRUE then there is a problem with
181 alg = getalgbyname(algname, &found);
182 if ((alg == NULL) || !found) {
190 ciphertext = alg->a_genhash(ctbuffer, CRYPT_MAXCIPHERTEXTLEN,
191 plaintext, salt, (const char **)alg->a_params);
195 free_crypt_alg(alg);
219 struct crypt_alg_s *alg = NULL; local
249 alg
490 struct crypt_alg_s *alg = NULL; local
692 free_crypt_alg(struct crypt_alg_s *alg) argument
[all...]
/illumos-gate/usr/src/cmd/cmd-inet/usr.sbin/ipsecutils/
H A Dipsecalgs.c130 "\t\t-n alg-names -N alg-number -m mech-name\n"
135 "\tipsecalgs -r -p protocol-name -n alg-name [-s]\n"
136 "\tipsecalgs -r -p protocol-name -N alg-number [-s]\n"
168 synch_emit_alg(struct ipsecalgent *alg) argument
173 EMIT(sync_req_attr, SPD_ATTR_ALG_ID, alg->a_alg_num);
174 EMIT(sync_req_attr, SPD_ATTR_ALG_PROTO, alg->a_proto_num);
175 EMIT(sync_req_attr, SPD_ATTR_ALG_INCRBITS, alg->a_key_increment);
177 nkey_sizes = num_sizes(alg->a_key_sizes);
180 EMIT(sync_req_attr, SPD_ATTR_ALG_KEYSIZE, alg
340 struct ipsecalgent alg; local
855 dump_alg(struct ipsecalgent *alg) argument
964 struct ipsecalgent *alg; local
[all...]
H A Dipsecconf.c601 alginfo_t alg = {0, 0, 0, 0, 0}; local
670 known_algs[algtype][ipsec_nalgs[algtype]] = alg;
677 alg.minkeybits = attr->spd_attr_value;
683 alg.maxkeybits = attr->spd_attr_value;
689 alg.defkeybits = attr->spd_attr_value;
695 alg.incr = attr->spd_attr_value;
701 alg.id = attr->spd_attr_value;
1726 struct ipsecalgent *alg; local
1735 alg = getipsecalgbynum(algreq->alg_id, proto_num, NULL);
1736 if (alg
3437 struct ipsecalgent *alg; local
3456 struct ipsecalgent *alg; local
5161 dump_algreq(const char *tag, algreq_t *alg) argument
[all...]
/illumos-gate/usr/src/lib/libresolv2/common/dst/
H A Ddst_api.c26 * int dst_check_algorithm() Function to determines if alg is suppored.
77 static DST_KEY *dst_s_get_key_struct(const char *name, const int alg,
132 * alg 1 KEY_RSA
141 dst_check_algorithm(const int alg) argument
143 return (dst_t_func[alg] != NULL);
152 * alg: the algorithm number
161 dst_s_get_key_struct(const char *name, const int alg, const int flags, argument
166 if (dst_check_algorithm(alg)) /*%< make sure alg is available */
177 new_key->dk_alg = alg;
465 int flags, proto, alg, len, dlen; local
646 int alg ; local
757 dst_buffer_to_key(const char *key_name, const int alg, const int flags, const int protocol, const u_char *key_buf, const int key_len) argument
823 int cnt, alg, len, major, minor, file_major, file_minor; local
951 dst_generate_key(const char *name, const int bits, const int exp, const int flags, const int protocol, const int alg) argument
[all...]
H A Dsupport.c226 * form: K&lt;keyname&gt;+&lt;alg&gt;+&lt;id&gt;.&lt;suffix&gt;
257 * form: K&lt;keyname&gt;+&lt;alg&gt;+&lt;id&gt;.&lt;suffix&gt;
267 int alg, const char *suffix, size_t filename_length)
280 sprintf(filename, "K%s+%03d+%05d.%s", name, alg, my_id,
266 dst_s_build_filename(char *filename, const char *name, u_int16_t id, int alg, const char *suffix, size_t filename_length) argument
H A Ddst_internal.h127 u_int16_t id, int alg, const char *suffix,
/illumos-gate/usr/src/lib/libipsecutil/common/
H A Dalgs.c48 "# ALG|protocol-id|alg-id|name,name,...|ef-id| \n"
125 alg_has_pkg(ipsec_proto_t *proto, struct ipsecalgent *alg) argument
133 if (proto->proto_algs_pkgs[i].alg_num == alg->a_alg_num)
174 * This function takes num_protos + num_protos * dois-per-alg operations.
189 struct ipsecalgent *alg; local
249 alg = protos[i].proto_algs[j];
252 alg_pkg = alg_has_pkg(&protos[i], alg);
260 alg->a_proto_num, alg->a_alg_num));
263 for (k = 0; alg
[all...]
/illumos-gate/usr/src/uts/common/inet/ip/
H A Dspdsock.c183 /* mapping from alg type to protocol number, as per RFC 2407 */
2217 * Process a SPD_ALGLIST request. The caller expects separate alg entries
2349 ipsec_alginfo_t *alg = local
2351 uint_t minbits = alg->alg_minbits;
2352 uint_t maxbits = alg->alg_maxbits;
2353 uint_t defbits = alg->alg_default_bits;
2354 uint_t incr = alg->alg_increment;
2400 ipsec_alginfo_t *alg; local
2427 alg = ipss->ipsec_alglists[algtype][algid];
2429 (ATTRPERALG + alg
2551 ipsec_alginfo_t *alg = NULL; local
3634 ipsec_alginfo_t *alg, *oalg; local
[all...]
H A Dspd.c774 ipsec_alg_reg(ipsec_algtype_t algtype, ipsec_alginfo_t *alg, netstack_t *ns) argument
780 ASSERT(ipss->ipsec_alglists[algtype][alg->alg_id] == NULL);
781 ipsec_alg_fix_min_max(alg, algtype, ns);
782 ipss->ipsec_alglists[algtype][alg->alg_id] = alg;
785 alg_insert_sortlist(algtype, alg->alg_id, ns);
1264 #define SET_EXP_MINMAX(type, wild, alg, min, max, ipss) \
1267 if (ipss->ipsec_alglists[type][alg] != NULL) \
1642 *reason = "unacceptable ah alg";
1670 *reason = "unacceptable esp alg";
4693 ipsec_alg_fix_min_max(ipsec_alginfo_t *alg, ipsec_algtype_t alg_type, netstack_t *ns) argument
4914 alg_flag_check(ipsec_alginfo_t *alg) argument
4955 ipsec_alg_free(ipsec_alginfo_t *alg) argument
4983 ipsec_valid_key_size(uint16_t key_size, ipsec_alginfo_t *alg) argument
5036 ipsec_alginfo_t *alg; local
[all...]
/illumos-gate/usr/src/cmd/cmd-inet/usr.lib/wpad/
H A Ddriver_wifi.c160 * @alg: encryption algorithm (%WPA_ALG_NONE, %WPA_ALG_WEP,
192 wpa_alg alg, unsigned char *addr, int key_idx, boolean_t set_tx,
201 if (alg == WPA_ALG_NONE)
204 switch (alg) {
219 " unknown/unsupported algorithm %d", alg);
223 wpa_printf(MSG_DEBUG, "wpa_driver_wifi_set_key: alg=%s key_idx=%d"
191 wpa_driver_wifi_set_key(dladm_handle_t handle, datalink_id_t linkid, wpa_alg alg, unsigned char *addr, int key_idx, boolean_t set_tx, uint8_t *seq, uint32_t seq_len, uint8_t *key, uint32_t key_len) argument
H A Dwpa.c1003 int keyidx, tx, key_rsc_len = 0, alg; local
1036 alg = WPA_ALG_CCMP;
1045 alg = WPA_ALG_TKIP;
1053 alg = WPA_ALG_WEP;
1061 alg = WPA_ALG_WEP;
1082 if (wpa_s->driver->set_key(wpa_s->handle, wpa_s->linkid, alg,
1088 } else if (wpa_s->driver->set_key(wpa_s->handle, wpa_s->linkid, alg,
1249 int alg, keylen, rsclen; local
1253 alg = WPA_ALG_CCMP;
1258 alg
1306 int alg, tx; local
[all...]
/illumos-gate/usr/src/lib/libresolv2/common/nameser/
H A Dns_verify.c142 char name[MAXDNAME], alg[MAXDNAME]; local
182 n = dn_expand(msg, eom, cp, alg, MAXDNAME);
185 if (ns_samename(alg, NS_TSIG_ALG_HMAC_MD5) != 1)
267 n = ns_name_pton(alg, buf2, sizeof(buf2));
348 char name[MAXDNAME], alg[MAXDNAME]; local
409 n = dn_expand(msg, eom, cp, alg, MAXDNAME);
412 if (ns_samename(alg, NS_TSIG_ALG_HMAC_MD5) != 1)
H A Dns_sign.c96 u_char *alg; local
143 alg = cp;
190 n = ns_name_ntol(alg, buf, sizeof(buf));
/illumos-gate/usr/src/cmd/cvcd/sparc/sun4u/starcat/
H A Dcvcd.c398 cvcd_alg_t *alg; local
400 for (alg = algs; alg->arg_name != NULL && arg != NULL; alg++) {
401 if (strncmp(alg->arg_name, arg, strlen(alg->arg_name) + 1)
403 return (alg->alg_id);
/illumos-gate/usr/src/cmd/cmd-inet/usr.sbin/snoop/
H A Dsnoop_mip.c654 uint16_t alg, spi_hi, spi_low; local
661 (void) memcpy(&alg, p, sizeof (alg));
662 alg = ntohs(alg);
663 switch (alg) {
678 "Algorithm = 0x%x: %s", alg, alg_string); local
679 p += sizeof (alg);
680 this_ext_len -= sizeof (alg);
/illumos-gate/usr/src/uts/common/io/comstar/port/iscsit/
H A Discsit_auth.c290 uint64_t alg; local
299 rc = ddi_strtoull(alg_string, NULL, 0, (u_longlong_t *)&alg);
300 if (rc == 0 && alg == 5) {
310 alg = 0;
318 (uint32_t)alg);
323 if (alg == 0) {
473 uint32_t alg; local
477 &alg);
479 if (alg != 0) {
/illumos-gate/usr/src/lib/libpkg/common/
H A Dsecurity.c250 * Arguments: alg - The algorithm to use to calculate the fingerprint
256 *get_fingerprint(X509 *cert, const EVP_MD *alg) argument
264 if (!X509_digest(cert, alg, md, &n)) {
/illumos-gate/usr/src/lib/pkcs11/pkcs11_tpm/common/
H A Dasn1.c839 CK_BYTE *alg = NULL; local
858 rc = ber_decode_SEQUENCE(buf + offset, &alg, &len, &field_len);
862 *algorithm = alg;
865 rc = ber_decode_OCTET_STRING(alg + len, priv_key, &buf_len, &field_len);
1073 CK_BYTE *alg = NULL; local
1080 rc = ber_decode_PrivateKeyInfo(data, data_len, &alg,
1085 if (memcmp(alg, ber_rsaEncryption, ber_rsaEncryptionLen) != 0) {
H A Dkey_mgr.c37 CK_BYTE *alg = NULL; local
42 rc = ber_decode_PrivateKeyInfo(keydata, keylen, &alg,
48 if (memcmp(alg, ber_rsaEncryption,
/illumos-gate/usr/src/lib/libresolv2/common/resolv/
H A Dres_sendsigned.c62 if (ns_samename(key->alg, NS_TSIG_ALG_HMAC_MD5) != 1)
/illumos-gate/usr/src/lib/libslp/javalib/com/sun/slp/
H A DAuthBlock.java389 String alg = cert.getPublicKey().getAlgorithm();
391 if (alg.equals("DSA")) {
393 } else if (alg.equals("RSA")) {
397 new Object[] {alg});

Completed in 125 milliseconds

12