/illumos-gate/usr/src/common/crypto/ecc/ |
H A D | secoidt.h | 59 ** An X.500 algorithm identifier 62 SECItem algorithm; member in struct:SECAlgorithmIDStr
|
/illumos-gate/usr/src/lib/krb5/plugins/preauth/pkinit/ |
H A D | pkinit_lib.c | 165 if ((*in)->clientPublicValue->algorithm.algorithm.data != NULL) 166 free((*in)->clientPublicValue->algorithm.algorithm.data); 167 if ((*in)->clientPublicValue->algorithm.parameters.data != NULL) 168 free((*in)->clientPublicValue->algorithm.parameters.data); 280 if (in->algorithm.data != NULL) 281 free(in->algorithm.data); 303 if ((*in)->algorithm.parameters.data != NULL) 304 free((*in)->algorithm [all...] |
H A D | pkinit_clnt.c | 339 pkiDebug("as_req: DH key transport algorithm\n"); 340 retval = pkinit_copy_krb5_octet_data(&info->algorithm.algorithm, &dh_oid); 349 &info->algorithm.parameters.data, 350 &info->algorithm.parameters.length, 358 pkiDebug("as_req: RSA key transport algorithm\n"); 727 pkiDebug("as_rep: DH key transport algorithm\n"); 744 pkiDebug("as_rep: RSA key transport algorithm\n");
|
H A D | pkinit_crypto_openssl.c | 958 p7si->digest_alg->algorithm = OBJ_nid2obj(NID_sha1); 969 p7si->digest_enc_alg->algorithm = OBJ_nid2obj(NID_sha1WithRSAEncryption); 1013 /* to compute sha1WithRSAEncryption, encode the algorithm ID for the hash 1034 alg->algorithm = OBJ_nid2obj(NID_sha1); 2806 algId[0]->algorithm = dh_oid; 2816 algId[1]->algorithm = dh_oid; 2826 algId[2]->algorithm = dh_oid; 2841 algId[0]->algorithm = dh_oid; 2851 algId[1]->algorithm = dh_oid; 2866 algId[0]->algorithm [all...] |
/illumos-gate/usr/src/cmd/iscsiadm/ |
H A D | sun_ima.h | 92 SUN_IMA_DIGEST_ALGORITHM_VALUE *algorithm); 95 SUN_IMA_DIGEST_ALGORITHM_VALUE *algorithm); 119 SUN_IMA_DIGEST_ALGORITHM_VALUE *algorithm,
|
H A D | sun_ima.c | 86 SUN_IMA_DIGEST_ALGORITHM_VALUE *algorithm); 92 SUN_IMA_DIGEST_ALGORITHM_VALUE *algorithm, 1105 /* We only support one preference of digest algorithm. */ 1108 "More than one digest algorithm specified."); 1136 /* We only support one preference of digest algorithm. */ 1139 "More than one digest algorithm specified."); 1160 SUN_IMA_DIGEST_ALGORITHM_VALUE *algorithm 1163 return (getDigest(oid, ISCSI_LOGIN_PARAM_HEADER_DIGEST, algorithm)); 1168 SUN_IMA_DIGEST_ALGORITHM_VALUE *algorithm 1171 return (getDigest(oid, ISCSI_LOGIN_PARAM_DATA_DIGEST, algorithm)); 2598 getNegotiatedDigest( int digestType, SUN_IMA_DIGEST_ALGORITHM_VALUE *algorithm, SUN_IMA_CONN_PROPERTIES *connProps) argument [all...] |
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/include/ |
H A D | k5-int-pkinit.h | 58 krb5_octet_data algorithm; /* OID */ member in struct:_krb5_algorithm_identifier 64 krb5_algorithm_identifier algorithm; member in struct:_krb5_subject_pk_info
|
/illumos-gate/usr/src/lib/libkmf/libkmf/common/ |
H A D | certop.c | 64 /* Get the algorithm info from the signer certificate */ 66 &SignerCert->signature.algorithmIdentifier.algorithm); 135 * First, get the key algorithm info from the certificate and saves it 295 NODATA(tbs_cert->signature.algorithm) || 387 * the key algorithm. 557 * for an algorithm index identifier instead. 748 * Get the algorithm index attribute and its oid. If this attribute 882 /* We only need the algorithm index if we don't have a signer cert. */ 910 /* If no algorithm specified, use the certs signature alg */ 953 kmf_free_algoid(&spki.algorithm); [all...] |
H A D | csrcrlop.c | 213 &CsrData->signature.algorithmIdentifier.algorithm, 217 &CsrData->csr.subjectPublicKeyInfo.algorithm.parameters); 403 kmf_set_attr_at_index(attlist, i++, KMF_OID_ATTR, &algo->algorithm, 429 algid = x509_algoid_to_algid(&algo->algorithm); 485 * algo(input) - contains algorithm info needed for signing 598 algid = x509_algoid_to_algid(&x509alg->algorithm);
|
H A D | pk11keys.c | 218 (KMF_OID *)&pKey->algorithm.algorithm); 272 /* Add algorithm specific attributes */ 381 /* Fetch the key class and algorithm from the object */ 721 algId = x509_algoid_to_algid(&spki->algorithm.algorithm); 729 /* Check the KEY algorithm */
|
H A D | certgetsetop.c | 1914 &CertData->certificate.signature.algorithm, 1917 &CertData->certificate.subjectPublicKeyInfo.algorithm. 1921 &CertData->signature.algorithmIdentifier.algorithm, 1922 &CertData->certificate.signature.algorithm);
|
/illumos-gate/usr/src/lib/libslp/clib/ |
H A D | slp_ami.h | 140 struct ami_algid *algorithm; member in struct:ami_cert 182 struct ami_algid *algorithm; member in struct:ami_pubkey_info 189 struct ami_oid *algorithm; member in struct:ami_algid 261 struct ami_algid *algorithm; member in struct:ami_keypkg 326 struct ami_algid *algorithm; member in struct:ami_crl 496 struct ami_algid *algorithm; member in struct:ami_certreq 758 const ami_algid *, /* IN: digest algorithm */ 766 const ami_algid *, /* IN: signature key algorithm */ 769 const ami_algid *, /* IN: signature algorithm */ 777 const ami_algid *, /* IN: verification key algorithm */ [all...] |
H A D | slp_auth.c | 517 * a signature algorithm. 769 certs[icert].info.pubKeyInfo->algorithm,
|
/illumos-gate/usr/src/lib/libc/sparc/gen/ |
H A D | memchr.s | 50 ! The first part of this algorithm focuses on determining
|
/illumos-gate/usr/src/lib/libc/sparcv9/gen/ |
H A D | memchr.s | 50 ! The first part of this algorithm focuses on determining
|
/illumos-gate/usr/src/lib/libkmf/ber_der/common/ |
H A D | clasn1.c | 30 if (kmfber_printf(asn1, "{D", &algoid->algorithm) == -1) { 42 * The algorithm data can be anything, so we just write it 69 free_data(&algoid->algorithm); 77 free_algoid(&spki->algorithm); 266 algoid->algorithm.Data = (uchar_t *)algoid_data.bv_val; 267 algoid->algorithm.Length = algoid_data.bv_len; 278 algoid->algorithm.Data = (uchar_t *)AlgOID.bv_val; 279 algoid->algorithm.Length = AlgOID.bv_len; 291 /* The rest of the data is the algorithm parameters */ 346 * The SPKI is the only place where algorithm parameter [all...] |
/illumos-gate/usr/src/lib/libresolv2/common/nameser/ |
H A D | ns_print.c | 455 u_int keyflags, protocol, algorithm, key_id; local 466 algorithm = *rdata++; 468 keyflags, protocol, algorithm)); 498 u_int type, algorithm, labels, footprint; local 508 algorithm = *rdata++; 512 p_type(type), algorithm, labels, t)); 997 unsigned int i, hip_len, algorithm, key_len; local 1003 algorithm = *rdata++; 1012 len = sprintf(tmp, "( %u ", algorithm);
|
/illumos-gate/usr/src/lib/libkmf/include/ |
H A D | kmftypes.h | 414 * cryptographic algorithm and an optional set of 415 * parameters to be used as input to that algorithm. 419 KMF_OID algorithm; member in struct:__anon3443 459 * description of the verification algorithm 464 KMF_X509_ALGORITHM_IDENTIFIER algorithm; member in struct:__anon3447 603 #define CERT_ALG_OID(c) &c->certificate.signature.algorithm 604 #define CERT_SIG_OID(c) &c->signature.algorithmIdentifier.algorithm
|
/illumos-gate/usr/src/uts/intel/io/dktp/controller/ata/ |
H A D | capacity.notes.txt | 53 Is the right algorithm for making sense of all this written down 68 implement this algorithm in deriving the capacity and geometry 87 >Is the right algorithm for making sense of all this written down 111 An algorithm??? (I hope there aren't any typo's here)...
|
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/asn.1/ |
H A D | asn1_k_encode.c | 1508 retval = asn1_encode_oid(buf, val->algorithm.length, 1509 val->algorithm.data, 1530 if (val->algorithm.parameters.length != 0) { 1533 retval = asn1buf_insert_octetstring(buf, val->algorithm.parameters.length, 1534 val->algorithm.parameters.data); 1537 sum += val->algorithm.parameters.length; 1539 retval = asn1_encode_oid(buf, val->algorithm.algorithm.length, 1540 val->algorithm.algorithm [all...] |
H A D | asn1_k_decode.c | 1358 retval = asn1_decode_oid(&subbuf, &val->algorithm.length, 1359 &val->algorithm.data); 1383 retval = asn1_decode_algorithm_identifier(&subbuf, &val->algorithm);
|
/illumos-gate/usr/src/cmd/lofiadm/ |
H A D | main.c | 1472 char algorithm[MAXALGLEN]; local 1683 * Signature (name of the compression algorithm) 1692 (void) bzero(algorithm, sizeof (algorithm)); 1693 (void) strlcpy(algorithm, li->l_name, sizeof (algorithm)); 1694 if (write(compfd, algorithm, sizeof (algorithm)) 1695 != sizeof (algorithm)) 1797 die(gettext("invalid algorithm nam [all...] |
/illumos-gate/usr/src/cmd/fm/eversholt/files/sparc/sun4/ |
H A D | fire.esc | 221 event fault.io.fire.dmc.sw-algorithm@hostbridge/pciexrc, retire=0, response=0, 225 event fault.io.fire.pec.sw-algorithm@hostbridge/pciexrc, retire=0, response=0, 245 prop fault.io.fire.dmc.sw-algorithm@hostbridge/pciexrc (0)-> 517 prop fault.io.fire.pec.sw-algorithm@hostbridge/pciexrc (0) ->
|
/illumos-gate/usr/src/common/crypto/aes/amd64/ |
H A D | aesopt.h | 32 * These source code files implement the AES algorithm Rijndael designed by 146 #error The algorithm byte order is not defined
|
/illumos-gate/usr/src/lib/pkcs11/pkcs11_tpm/common/ |
H A D | asn1.c | 834 CK_BYTE ** algorithm, 862 *algorithm = alg; 832 ber_decode_PrivateKeyInfo(CK_BYTE * data, CK_ULONG data_len, CK_BYTE ** algorithm, CK_ULONG * alg_len, CK_BYTE ** priv_key) argument
|