/freebsd/sys/dev/qat/qat_api/common/crypto/sym/include/ |
H A D | lac_sym_cipher_defs.h | 102 #define LAC_CIPHER_IS_SM4(algo) \ argument 103 ((algo == CPA_CY_SYM_CIPHER_SM4_ECB) || \ 104 (algo == CPA_CY_SYM_CIPHER_SM4_CBC) || \ 105 (algo == CPA_CY_SYM_CIPHER_SM4_CTR)) 108 #define LAC_CIPHER_IS_CHACHA(algo) (algo == CPA_CY_SYM_CIPHER_CHACHA) argument 110 #define LAC_CIPHER_IS_AES(algo) \ argument 111 ((algo == CPA_CY_SYM_CIPHER_AES_ECB) || \ 112 (algo == CPA_CY_SYM_CIPHER_AES_CBC) || \ 113 (algo == CPA_CY_SYM_CIPHER_AES_CTR) || \ 114 (algo == CPA_CY_SYM_CIPHER_AES_CCM) || \ [all …]
|
H A D | lac_sym_hash_defs.h | 326 #define LAC_HASH_IS_SHA3(algo) \ argument 327 ((algo == CPA_CY_SYM_HASH_SHA3_224) || \ 328 (algo == CPA_CY_SYM_HASH_SHA3_256) || \ 329 (algo == CPA_CY_SYM_HASH_SHA3_384) || \ 330 (algo == CPA_CY_SYM_HASH_SHA3_512))
|
/freebsd/stand/libsa/geli/ |
H A D | geliboot_crypto.c | 36 geliboot_crypt(u_int algo, geli_op_t enc, u_char *data, size_t datasize, in geliboot_crypt() argument 45 switch (algo) { in geliboot_crypt() 96 printf("Unsupported crypto algorithm #%d\n", algo); in geliboot_crypt() 104 g_eli_crypto_cipher(u_int algo, geli_op_t enc, u_char *data, size_t datasize, in g_eli_crypto_cipher() argument 110 return (geliboot_crypt(algo, enc, data, datasize, key, keysize, iv)); in g_eli_crypto_cipher() 114 g_eli_crypto_encrypt(u_int algo, u_char *data, size_t datasize, in g_eli_crypto_encrypt() argument 119 if (algo == CRYPTO_AES_XTS) in g_eli_crypto_encrypt() 120 algo = CRYPTO_AES_CBC; in g_eli_crypto_encrypt() 122 return (g_eli_crypto_cipher(algo, GELI_ENCRYPT, data, datasize, key, in g_eli_crypto_encrypt() 127 g_eli_crypto_decrypt(u_int algo, u_char *data, size_t datasize, in g_eli_crypto_decrypt() argument [all …]
|
/freebsd/sys/netinet/cc/ |
H A D | cc.c | 111 cc_refer(struct cc_algo *algo) in cc_refer() argument 114 refcount_acquire(&algo->cc_refcount); in cc_refer() 118 cc_release(struct cc_algo *algo) in cc_release() argument 121 refcount_release(&algo->cc_refcount); in cc_release() 126 cc_attach(struct tcpcb *tp, struct cc_algo *algo) in cc_attach() argument 132 CC_ALGO(tp) = algo; in cc_attach() 133 cc_refer(algo); in cc_attach() 140 struct cc_algo *algo; in cc_detach() local 143 algo = CC_ALGO(tp); in cc_detach() 145 cc_release(algo); in cc_detach() [all …]
|
/freebsd/sys/geom/eli/ |
H A D | g_eli_crypto.c | 58 g_eli_crypto_cipher(u_int algo, int enc, u_char *data, size_t datasize, in g_eli_crypto_cipher() argument 66 KASSERT(algo != CRYPTO_AES_XTS, in g_eli_crypto_cipher() 71 csp.csp_cipher_alg = algo; in g_eli_crypto_cipher() 72 csp.csp_ivlen = g_eli_ivlen(algo); in g_eli_crypto_cipher() 107 g_eli_crypto_cipher(u_int algo, int enc, u_char *data, size_t datasize, in g_eli_crypto_cipher() argument 115 assert(algo != CRYPTO_AES_XTS); in g_eli_crypto_cipher() 117 switch (algo) { in g_eli_crypto_cipher() 185 g_eli_crypto_encrypt(u_int algo, u_char *data, size_t datasize, in g_eli_crypto_encrypt() argument 190 if (algo == CRYPTO_AES_XTS) in g_eli_crypto_encrypt() 191 algo = CRYPTO_AES_CBC; in g_eli_crypto_encrypt() [all …]
|
/freebsd/contrib/unbound/validator/ |
H A D | val_secalgo.c | 131 secalgo_nsec3_hash(int algo, unsigned char* buf, size_t len, in secalgo_nsec3_hash() argument 134 switch(algo) { in secalgo_nsec3_hash() 230 ds_digest_size_supported(int algo) in ds_digest_size_supported() argument 232 switch(algo) { in ds_digest_size_supported() 278 secalgo_ds_digest(int algo, unsigned char* buf, size_t len, in secalgo_ds_digest() argument 281 switch(algo) { in secalgo_ds_digest() 323 algo); in secalgo_ds_digest() 548 setup_key_digest(int algo, EVP_PKEY** evp_key, const EVP_MD** digest_type, in setup_key_digest() argument 551 switch(algo) { in setup_key_digest() 588 if(algo == LDNS_RSASHA256) in setup_key_digest() [all …]
|
H A D | val_kentry.c | 62 if(kd->algo) in key_entry_sizefunc() 63 s += strlen((char*)kd->algo)+1; in key_entry_sizefunc() 97 free(kd->algo); in key_entry_deldatafunc() 143 if(d->algo) { in key_entry_copy_toregion() 144 newd->algo = (uint8_t*)regional_strdup(region, in key_entry_copy_toregion() 145 (char*)d->algo); in key_entry_copy_toregion() 146 if(!newd->algo) in key_entry_copy_toregion() 205 if(d->algo) { in key_entry_copy() 206 newd->algo = (uint8_t*)strdup((char*)d->algo); in key_entry_copy() 207 if(!newd->algo) { in key_entry_copy() [all …]
|
H A D | val_secalgo.h | 60 int secalgo_nsec3_hash(int algo, unsigned char* buf, size_t len, 118 size_t ds_digest_size_supported(int algo); 127 int secalgo_ds_digest(int algo, unsigned char* buf, size_t len, 146 enum sec_status verify_canonrrset(struct sldns_buffer* buf, int algo,
|
H A D | val_sigcrypt.c | 439 uint8_t algo; in algo_needs_init_dnskey_add() local 444 algo = (uint8_t)dnskey_get_algo(dnskey, i); in algo_needs_init_dnskey_add() 445 if(!dnskey_algo_id_is_supported((int)algo)) in algo_needs_init_dnskey_add() 447 if(n->needs[algo] == 0) { in algo_needs_init_dnskey_add() 448 n->needs[algo] = 1; in algo_needs_init_dnskey_add() 449 sigalg[total] = algo; in algo_needs_init_dnskey_add() 459 uint8_t algo; in algo_needs_init_list() local 463 while( (algo=*sigalg++) != 0) { in algo_needs_init_list() 464 log_assert(dnskey_algo_id_is_supported((int)algo)); in algo_needs_init_list() 465 log_assert(n->needs[algo] == 0); in algo_needs_init_list() [all …]
|
/freebsd/crypto/openssh/regress/ |
H A D | hostbased.sh | 51 for algo in $algos; do 52 trace "hostbased algo $algo" 54 if [ "x$algo" != "xdefault" ]; then 55 opts="$opts -oHostbasedAcceptedAlgorithms=$algo" 59 fail "connect failed, hostbased algo $algo" 61 fail "hostbased algo $algo bad SSH_CONNECTION" \ 64 verbose "ok hostbased algo $algo"
|
/freebsd/contrib/mandoc/ |
H A D | TODO | 18 - algo = difficulty of the new algorithm to be written 48 loc * exist *** algo *** size * imp * 59 loc ** exist * algo ** size * imp *** 63 loc * exist *** algo *** size * imp * 67 loc * exist * algo * size * imp * 77 loc ** exist *** algo *** size ** imp * 94 loc *** exist *** algo ** size ** imp ** (parser reorg would help) 98 loc ** exist *** algo * size * imp * 103 loc *** exist *** algo *** size ** imp * 108 loc ** exist *** algo *** size * imp *** [all …]
|
/freebsd/sbin/hastd/ |
H A D | hast_checksum.c | 120 const char *algo; in checksum_recv() local 122 algo = nv_get_string(nv, "checksum"); in checksum_recv() 123 if (algo == NULL) in checksum_recv() 130 if (strcmp(algo, "crc32") == 0) in checksum_recv() 132 else if (strcmp(algo, "sha256") == 0) in checksum_recv() 135 pjdlog_error("Unknown checksum algorithm '%s'.", algo); in checksum_recv() 140 rhsize, algo, chsize); in checksum_recv()
|
H A D | hast_compression.c | 255 const char *algo; in compression_recv() local 258 algo = nv_get_string(nv, "compression"); in compression_recv() 259 if (algo == NULL) in compression_recv() 265 if (strcmp(algo, "hole") == 0) in compression_recv() 267 else if (strcmp(algo, "lzf") == 0) in compression_recv() 270 pjdlog_error("Unknown compression algorithm '%s'.", algo); in compression_recv()
|
/freebsd/sys/contrib/openzfs/module/zfs/ |
H A D | zfs_impl.c | 47 zfs_impl_get_ops(const char *algo) in zfs_impl_get_ops() argument 51 if (!algo || !*algo) in zfs_impl_get_ops() 55 if (strcmp(algo, (*ops)->name) == 0) in zfs_impl_get_ops()
|
/freebsd/crypto/openssl/crypto/ |
H A D | core_algorithm.c | 143 const OSSL_ALGORITHM *algo, in ossl_algorithm_do_all() argument 180 char *ossl_algorithm_get1_first_name(const OSSL_ALGORITHM *algo) in ossl_algorithm_get1_first_name() argument 186 if (algo->algorithm_names == NULL) in ossl_algorithm_get1_first_name() 189 first_name_end = strchr(algo->algorithm_names, ':'); in ossl_algorithm_get1_first_name() 191 first_name_len = strlen(algo->algorithm_names); in ossl_algorithm_get1_first_name() 193 first_name_len = first_name_end - algo->algorithm_names; in ossl_algorithm_get1_first_name() 195 ret = OPENSSL_strndup(algo->algorithm_names, first_name_len); in ossl_algorithm_get1_first_name()
|
H A D | core_fetch.c | 103 const OSSL_ALGORITHM *algo, in ossl_method_construct_this() argument 109 if ((method = data->mcm->construct(algo, provider, data->mcm_data)) in ossl_method_construct_this() 124 method, provider, algo->algorithm_names, in ossl_method_construct_this() 125 algo->property_definition, data->mcm_data); in ossl_method_construct_this()
|
/freebsd/sys/dev/qat/include/ |
H A D | icp_qat_hw.h | 128 #define ICP_QAT_HW_AUTH_CONFIG_BUILD(mode, algo, cmp_len) \ argument 130 ((algo & QAT_AUTH_ALGO_MASK) << QAT_AUTH_ALGO_BITPOS) | \ 131 (((algo >> 4) & QAT_AUTH_ALGO_SHA3_MASK) \ 133 (((((algo == ICP_QAT_HW_AUTH_ALGO_SHA3_256) || \ 134 (algo == ICP_QAT_HW_AUTH_ALGO_SHA3_512)) ? \ 274 #define ICP_QAT_HW_CIPHER_CONFIG_BUILD(mode, algo, convert, dir) \ argument 276 ((algo & QAT_CIPHER_ALGO_MASK) << QAT_CIPHER_ALGO_BITPOS) | \
|
/freebsd/sys/compat/linuxkpi/common/include/linux/ |
H A D | i2c.h | 61 const struct i2c_algorithm *algo; member 128 if (adapter->algo != NULL && adapter->algo->master_xfer != NULL) in do_i2c_transfer() 129 ret = adapter->algo->master_xfer(adapter, msgs, nmsgs); in do_i2c_transfer() 144 if (adapter->algo == NULL && adapter->algo_data == NULL) in i2c_transfer()
|
/freebsd/crypto/openssl/apps/ |
H A D | progs.pl | 207 (my $algo = $cmd) =~ s/-.*//g; 210 } elsif (grep { $algo eq $_ } @disablables) { 211 print "#ifndef OPENSSL_NO_" . uc($algo) . "\n${str}#endif\n"; 212 } elsif (my $disabler = $cipher_disabler{$algo}) {
|
/freebsd/sys/dev/rtwn/ |
H A D | if_rtwn_cam.c | 185 uint8_t algo, keyid; in rtwn_key_set_cb0() local 198 algo = R92C_CAM_ALGO_WEP40; in rtwn_key_set_cb0() 200 algo = R92C_CAM_ALGO_WEP104; in rtwn_key_set_cb0() 203 algo = R92C_CAM_ALGO_TKIP; in rtwn_key_set_cb0() 206 algo = R92C_CAM_ALGO_AES; in rtwn_key_set_cb0() 217 k->wk_cipher->ic_cipher, algo, k->wk_flags, k->wk_keylen, in rtwn_key_set_cb0() 238 SM(R92C_CAM_ALGO, algo) | in rtwn_key_set_cb0()
|
/freebsd/sys/dev/qat/qat_api/firmware/include/ |
H A D | icp_qat_hw.h | 366 #define ICP_QAT_HW_AUTH_CONFIG_BUILD(mode, algo, cmp_len) \ argument 368 (((algo)&QAT_AUTH_ALGO_MASK) << QAT_AUTH_ALGO_BITPOS) | \ 369 (((algo >> 4) & QAT_AUTH_ALGO_SHA3_MASK) \ 916 mode, algo, convert, dir, aead_hash_cmp_len) \ argument 918 (((algo)&QAT_CIPHER_ALGO_MASK) << QAT_CIPHER_ALGO_BITPOS) | \ 1602 dir, delayed, algo, depth, filetype) \ argument 1606 (((algo)&QAT_COMPRESSION_ALGO_MASK) << QAT_COMPRESSION_ALGO_BITPOS) | \
|
H A D | icp_qat_hw_20_comp.h | 35 icp_qat_hw_comp_20_hw_comp_format_t algo; member 64 csr.algo, in ICP_QAT_FW_COMP_20_BUILD_CONFIG_LOWER() 222 icp_qat_hw_decomp_20_hw_comp_format_t algo; member 252 csr.algo, in ICP_QAT_FW_DECOMP_20_BUILD_CONFIG_LOWER()
|
/freebsd/usr.bin/diff/ |
H A D | diffreg_new.c | 94 .algo = &myers_then_myers_divide, 101 .algo = &myers_then_patience, 107 .algo = &patience, 157 enum diffreg_algo algo; in diffreg_new() local 160 algo = DIFFREG_ALGO_MYERS_THEN_MYERS_DIVIDE; in diffreg_new() 162 switch (algo) { in diffreg_new()
|
/freebsd/sys/dev/qat/qat_api/common/crypto/sym/qat/ |
H A D | lac_sym_qat_constants_table.c | 209 uint8_t algo, in LacSymQat_ConstantsGetCipherOffset() argument 227 ->cipher_offset[algo][mode][direction][convert]; in LacSymQat_ConstantsGetCipherOffset() 239 uint8_t algo, in LacSymQat_ConstantsGetAuthOffset() argument 255 *poffset = pConstantsLookupTables->auth_offset[algo][mode][nested]; in LacSymQat_ConstantsGetAuthOffset()
|
/freebsd/crypto/openssl/doc/man1/ |
H A D | openssl-speed.pod.in | 13 [B<-evp> I<algo>] 14 [B<-hmac> I<algo>] 15 [B<-cmac> I<algo>] 48 =item B<-evp> I<algo> 51 If I<algo> is an AEAD cipher, then you can pass B<-aead> to benchmark a 52 TLS-like sequence. And if I<algo> is a multi-buffer capable cipher, e.g.
|