/illumos-gate/usr/src/cmd/cmd-inet/usr.lib/mdnsd/ |
H A D | CryptoAlg.h | 32 mDNSu8 alg; member in struct:__anon16 54 extern AlgContext *AlgCreate(AlgType type, mDNSu8 alg);
|
H A D | CryptoAlg.c | 51 mDNSexport mStatus CryptoAlgInit(mDNSu8 alg, AlgFuncs *func) argument 53 if (alg >= CRYPTO_ALG_MAX) 55 LogMsg("CryptoAlgInit: alg %d exceeds bounds", alg); 60 if (alg != CRYPTO_RSA_SHA1 && alg != CRYPTO_RSA_SHA256 && alg != CRYPTO_RSA_SHA512 && 61 alg != CRYPTO_DSA_NSEC3_SHA1 && alg != CRYPTO_RSA_NSEC3_SHA1) 63 LogMsg("CryptoAlgInit: alg 71 EncAlgInit(mDNSu8 alg, AlgFuncs *func) argument 91 AlgCreate(AlgType type, mDNSu8 alg) argument [all...] |
/illumos-gate/usr/src/lib/libpkg/common/ |
H A D | security.c | 250 * Arguments: alg - The algorithm to use to calculate the fingerprint 256 *get_fingerprint(X509 *cert, const EVP_MD *alg) argument 264 if (!X509_digest(cert, alg, md, &n)) {
|
/illumos-gate/usr/src/lib/libresolv2/common/nameser/ |
H A D | ns_sign.c | 96 u_char *alg; local 143 alg = cp; 190 n = ns_name_ntol(alg, buf, sizeof(buf));
|
H A D | ns_verify.c | 142 char name[MAXDNAME], alg[MAXDNAME]; local 182 n = dn_expand(msg, eom, cp, alg, MAXDNAME); 185 if (ns_samename(alg, NS_TSIG_ALG_HMAC_MD5) != 1) 267 n = ns_name_pton(alg, buf2, sizeof(buf2)); 348 char name[MAXDNAME], alg[MAXDNAME]; local 409 n = dn_expand(msg, eom, cp, alg, MAXDNAME); 412 if (ns_samename(alg, NS_TSIG_ALG_HMAC_MD5) != 1)
|
H A D | ns_print.c | 573 u_int c_type, key_tag, alg; local 581 alg = (u_int) *rdata++; 583 len = SPRINTF((tmp, "%d %d %d ", c_type, key_tag, alg));
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.lib/wpad/ |
H A D | driver_wifi.c | 160 * @alg: encryption algorithm (%WPA_ALG_NONE, %WPA_ALG_WEP, 192 wpa_alg alg, unsigned char *addr, int key_idx, boolean_t set_tx, 201 if (alg == WPA_ALG_NONE) 204 switch (alg) { 219 " unknown/unsupported algorithm %d", alg); 223 wpa_printf(MSG_DEBUG, "wpa_driver_wifi_set_key: alg=%s key_idx=%d" 191 wpa_driver_wifi_set_key(dladm_handle_t handle, datalink_id_t linkid, wpa_alg alg, unsigned char *addr, int key_idx, boolean_t set_tx, uint8_t *seq, uint32_t seq_len, uint8_t *key, uint32_t key_len) argument
|
H A D | wpa.c | 1003 int keyidx, tx, key_rsc_len = 0, alg; local 1036 alg = WPA_ALG_CCMP; 1045 alg = WPA_ALG_TKIP; 1053 alg = WPA_ALG_WEP; 1061 alg = WPA_ALG_WEP; 1082 if (wpa_s->driver->set_key(wpa_s->handle, wpa_s->linkid, alg, 1088 } else if (wpa_s->driver->set_key(wpa_s->handle, wpa_s->linkid, alg, 1249 int alg, keylen, rsclen; local 1253 alg = WPA_ALG_CCMP; 1258 alg 1306 int alg, tx; local [all...] |
/illumos-gate/usr/src/uts/common/inet/ilb/ |
H A D | ilb_alg_rr.c | 188 ilb_alg_data_t *alg; local 191 if ((alg = kmem_alloc(sizeof (ilb_alg_data_t), KM_NOSLEEP)) == NULL) 194 kmem_free(alg, sizeof (ilb_alg_data_t)); 198 alg->ilb_alg_lb = rr_lb; 199 alg->ilb_alg_server_del = rr_server_del; 200 alg->ilb_alg_server_add = rr_server_add; 201 alg->ilb_alg_server_enable = rr_server_enable; 202 alg->ilb_alg_server_disable = rr_server_disable; 203 alg->ilb_alg_fini = rr_fini; 204 alg 215 rr_fini(ilb_alg_data_t **alg) argument [all...] |
H A D | ilb_alg_hash.c | 274 hash_t *alg = (hash_t *)alg_data; local 277 mutex_enter(&alg->hash_lock); 279 for (i = 0; i < alg->hash_servers; i++) { 280 if (alg->hash_tbl[i].server == host) { 281 if (alg->hash_tbl[i].enabled) { 282 mutex_exit(&alg->hash_lock); 289 if (i == alg->hash_servers) { 290 mutex_exit(&alg->hash_lock); 299 for (j = 0; j < alg->hash_enabled_servers; j++) { 300 if (alg 328 hash_t *alg = (hash_t *)alg_data; local 366 ilb_alg_data_t *alg; local 415 hash_fini(ilb_alg_data_t **alg) argument [all...] |
/illumos-gate/usr/src/lib/pkcs11/pkcs11_tpm/common/ |
H A D | asn1.c | 839 CK_BYTE *alg = NULL; local 858 rc = ber_decode_SEQUENCE(buf + offset, &alg, &len, &field_len); 862 *algorithm = alg; 865 rc = ber_decode_OCTET_STRING(alg + len, priv_key, &buf_len, &field_len); 1073 CK_BYTE *alg = NULL; local 1080 rc = ber_decode_PrivateKeyInfo(data, data_len, &alg, 1085 if (memcmp(alg, ber_rsaEncryption, ber_rsaEncryptionLen) != 0) {
|
H A D | key_mgr.c | 37 CK_BYTE *alg = NULL; local 42 rc = ber_decode_PrivateKeyInfo(keydata, keylen, &alg, 48 if (memcmp(alg, ber_rsaEncryption,
|
/illumos-gate/usr/src/lib/libresolv2/common/dst/ |
H A D | support.c | 226 * form: K<keyname>+<alg>+<id>.<suffix> 257 * form: K<keyname>+<alg>+<id>.<suffix> 267 int alg, const char *suffix, size_t filename_length) 280 sprintf(filename, "K%s+%03d+%05d.%s", name, alg, my_id, 266 dst_s_build_filename(char *filename, const char *name, u_int16_t id, int alg, const char *suffix, size_t filename_length) argument
|
H A D | dst_api.c | 26 * int dst_check_algorithm() Function to determines if alg is suppored. 77 static DST_KEY *dst_s_get_key_struct(const char *name, const int alg, 132 * alg 1 KEY_RSA 141 dst_check_algorithm(const int alg) argument 143 return (dst_t_func[alg] != NULL); 152 * alg: the algorithm number 161 dst_s_get_key_struct(const char *name, const int alg, const int flags, argument 166 if (dst_check_algorithm(alg)) /*%< make sure alg is available */ 177 new_key->dk_alg = alg; 465 int flags, proto, alg, len, dlen; local 646 int alg ; local 757 dst_buffer_to_key(const char *key_name, const int alg, const int flags, const int protocol, const u_char *key_buf, const int key_len) argument 823 int cnt, alg, len, major, minor, file_major, file_minor; local 951 dst_generate_key(const char *name, const int bits, const int exp, const int flags, const int protocol, const int alg) argument [all...] |
/illumos-gate/usr/src/uts/common/io/comstar/port/iscsit/ |
H A D | iscsit_auth.c | 290 uint64_t alg; local 299 rc = ddi_strtoull(alg_string, NULL, 0, (u_longlong_t *)&alg); 300 if (rc == 0 && alg == 5) { 310 alg = 0; 318 (uint32_t)alg); 323 if (alg == 0) { 473 uint32_t alg; local 477 &alg); 479 if (alg != 0) {
|
/illumos-gate/usr/src/lib/libipsecutil/common/ |
H A D | algs.c | 48 "# ALG|protocol-id|alg-id|name,name,...|ef-id| \n" 125 alg_has_pkg(ipsec_proto_t *proto, struct ipsecalgent *alg) argument 133 if (proto->proto_algs_pkgs[i].alg_num == alg->a_alg_num) 174 * This function takes num_protos + num_protos * dois-per-alg operations. 189 struct ipsecalgent *alg; local 249 alg = protos[i].proto_algs[j]; 252 alg_pkg = alg_has_pkg(&protos[i], alg); 260 alg->a_proto_num, alg->a_alg_num)); 263 for (k = 0; alg [all...] |
/illumos-gate/usr/src/lib/libkmf/libkmf/common/ |
H A D | csrcrlop.c | 204 KMF_OID *alg; local 209 alg = x509_algid_to_algoid(sigAlg); 211 if (alg != NULL) { 214 (KMF_DATA *)alg);
|
H A D | certgetsetop.c | 1905 KMF_OID *alg; local 1910 alg = x509_algid_to_algoid(sigAlg); 1912 if (alg != NULL) { 1915 (KMF_DATA *)alg);
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.sbin/snoop/ |
H A D | snoop_mip.c | 654 uint16_t alg, spi_hi, spi_low; local 661 (void) memcpy(&alg, p, sizeof (alg)); 662 alg = ntohs(alg); 663 switch (alg) { 678 "Algorithm = 0x%x: %s", alg, alg_string); local 679 p += sizeof (alg); 680 this_ext_len -= sizeof (alg);
|
/illumos-gate/usr/src/cmd/cvcd/sparc/sun4u/starcat/ |
H A D | cvcd.c | 398 cvcd_alg_t *alg; local 400 for (alg = algs; alg->arg_name != NULL && arg != NULL; alg++) { 401 if (strncmp(alg->arg_name, arg, strlen(alg->arg_name) + 1) 403 return (alg->alg_id);
|
/illumos-gate/usr/src/uts/common/io/sfxge/common/ |
H A D | ef10_rx.c | 482 __in efx_rx_hash_alg_t alg, 488 EFSYS_ASSERT3U(alg, ==, EFX_RX_HASHALG_TOEPLITZ); 491 if ((alg != EFX_RX_HASHALG_TOEPLITZ) || (insert == B_FALSE)) { 480 ef10_rx_scale_mode_set( __in efx_nic_t *enp, __in efx_rx_hash_alg_t alg, __in efx_rx_hash_type_t type, __in boolean_t insert) argument
|
H A D | efx_rx.c | 56 __in efx_rx_hash_alg_t alg, 337 __in efx_rx_hash_alg_t alg, 348 if ((rc = erxop->erxo_scale_mode_set(enp, alg, 712 __in efx_rx_hash_alg_t alg, 718 switch (alg) { 335 efx_rx_scale_mode_set( __in efx_nic_t *enp, __in efx_rx_hash_alg_t alg, __in efx_rx_hash_type_t type, __in boolean_t insert) argument 710 siena_rx_scale_mode_set( __in efx_nic_t *enp, __in efx_rx_hash_alg_t alg, __in efx_rx_hash_type_t type, __in boolean_t insert) argument
|
/illumos-gate/usr/src/lib/libc/port/gen/ |
H A D | crypt.c | 113 static void free_crypt_alg(struct crypt_alg_s *alg); 146 struct crypt_alg_s *alg; local 172 * If alg is NULL but found = B_TRUE then there is a problem with 181 alg = getalgbyname(algname, &found); 182 if ((alg == NULL) || !found) { 190 ciphertext = alg->a_genhash(ctbuffer, CRYPT_MAXCIPHERTEXTLEN, 191 plaintext, salt, (const char **)alg->a_params); 195 free_crypt_alg(alg); 219 struct crypt_alg_s *alg = NULL; local 249 alg 490 struct crypt_alg_s *alg = NULL; local 692 free_crypt_alg(struct crypt_alg_s *alg) argument [all...] |
/illumos-gate/usr/src/cmd/cmd-inet/usr.sbin/ipsecutils/ |
H A D | ipsecalgs.c | 130 "\t\t-n alg-names -N alg-number -m mech-name\n" 135 "\tipsecalgs -r -p protocol-name -n alg-name [-s]\n" 136 "\tipsecalgs -r -p protocol-name -N alg-number [-s]\n" 168 synch_emit_alg(struct ipsecalgent *alg) argument 173 EMIT(sync_req_attr, SPD_ATTR_ALG_ID, alg->a_alg_num); 174 EMIT(sync_req_attr, SPD_ATTR_ALG_PROTO, alg->a_proto_num); 175 EMIT(sync_req_attr, SPD_ATTR_ALG_INCRBITS, alg->a_key_increment); 177 nkey_sizes = num_sizes(alg->a_key_sizes); 180 EMIT(sync_req_attr, SPD_ATTR_ALG_KEYSIZE, alg 340 struct ipsecalgent alg; local 855 dump_alg(struct ipsecalgent *alg) argument 964 struct ipsecalgent *alg; local [all...] |
/illumos-gate/usr/src/cmd/dcs/sparc/sun4u/ |
H A D | dcs.c | 409 dcs_alg_t *alg; local 413 for (alg = algs; alg->arg_name != NULL && arg != NULL; alg++) { 414 if (strncmp(alg->arg_name, arg, strlen(alg->arg_name) + 1) 416 return (alg->alg_id);
|