crypto/heimdal/lib/hx509/cert.c
1506
AlgorithmIdentifier *alg)
crypto/heimdal/lib/hx509/cert.c
1510
ret = copy_AlgorithmIdentifier(&p->data->tbsCertificate.subjectPublicKeyInfo.algorithm, alg);
crypto/heimdal/lib/hx509/cert.c
2401
const AlgorithmIdentifier *alg,
crypto/heimdal/lib/hx509/cert.c
2405
return _hx509_verify_signature(context, signer, alg, data, sig);
crypto/heimdal/lib/hx509/cert.c
2411
const AlgorithmIdentifier *alg,
crypto/heimdal/lib/hx509/cert.c
2426
return _hx509_verify_signature(context, signer, alg, data, &os);
crypto/heimdal/lib/hx509/collector.c
106
free_AlgorithmIdentifier(&key->alg);
crypto/heimdal/lib/hx509/collector.c
116
const AlgorithmIdentifier *alg,
crypto/heimdal/lib/hx509/collector.c
137
ret = copy_AlgorithmIdentifier(alg, &key->alg);
crypto/heimdal/lib/hx509/collector.c
146
ret = hx509_parse_private_key(context, alg,
crypto/heimdal/lib/hx509/collector.c
37
AlgorithmIdentifier alg;
crypto/heimdal/lib/hx509/crypto.c
1044
const AlgorithmIdentifier *alg,
crypto/heimdal/lib/hx509/crypto.c
1176
const AlgorithmIdentifier *alg,
crypto/heimdal/lib/hx509/crypto.c
1216
const AlgorithmIdentifier *alg,
crypto/heimdal/lib/hx509/crypto.c
1571
const AlgorithmIdentifier *alg,
crypto/heimdal/lib/hx509/crypto.c
1576
md = find_sig_alg(&alg->algorithm);
crypto/heimdal/lib/hx509/crypto.c
1592
const AlgorithmIdentifier *alg)
crypto/heimdal/lib/hx509/crypto.c
1596
md = find_sig_alg(&alg->algorithm);
crypto/heimdal/lib/hx509/crypto.c
1614
const AlgorithmIdentifier *alg,
crypto/heimdal/lib/hx509/crypto.c
1624
md = find_sig_alg(&alg->algorithm);
crypto/heimdal/lib/hx509/crypto.c
1646
return (*md->verify_signature)(context, md, signer, alg, data, sig);
crypto/heimdal/lib/hx509/crypto.c
1652
const AlgorithmIdentifier *alg,
crypto/heimdal/lib/hx509/crypto.c
1659
md = find_sig_alg(&alg->algorithm);
crypto/heimdal/lib/hx509/crypto.c
1672
return (*md->create_signature)(context, md, signer, alg, data,
crypto/heimdal/lib/hx509/crypto.c
1679
const AlgorithmIdentifier *alg,
crypto/heimdal/lib/hx509/crypto.c
1687
ret = _hx509_create_signature(context, signer, alg,
crypto/heimdal/lib/hx509/crypto.c
338
const AlgorithmIdentifier *alg,
crypto/heimdal/lib/hx509/crypto.c
416
const AlgorithmIdentifier *alg,
crypto/heimdal/lib/hx509/crypto.c
537
const AlgorithmIdentifier *alg,
crypto/heimdal/lib/hx509/crypto.c
646
const AlgorithmIdentifier *alg,
crypto/heimdal/lib/hx509/crypto.c
660
if (alg)
crypto/heimdal/lib/hx509/crypto.c
661
sig_oid = &alg->algorithm;
crypto/heimdal/lib/hx509/ks_file.c
126
alg,
crypto/heimdal/lib/hx509/ks_file.c
70
const AlgorithmIdentifier *alg,
crypto/heimdal/lib/hx509/softp11.c
1505
const AlgorithmIdentifier *alg;
crypto/heimdal/lib/hx509/softp11.c
1539
alg = hx509_signature_rsa_pkcs1_x509();
crypto/heimdal/lib/hx509/softp11.c
1551
alg,
crypto/heimdal/lib/hx509/softp11.c
1636
const AlgorithmIdentifier *alg;
crypto/heimdal/lib/hx509/softp11.c
1652
alg = hx509_signature_rsa_pkcs1_x509();
crypto/heimdal/lib/hx509/softp11.c
1666
alg,
crypto/heimdal/lib/hx509/softp11.c
472
AlgorithmIdentifier alg;
crypto/heimdal/lib/hx509/softp11.c
474
hret = hx509_cert_get_SPKI_AlgorithmIdentifier(context, cert, &alg);
crypto/heimdal/lib/hx509/softp11.c
482
free_AlgorithmIdentifier(&alg);
crypto/heimdal/lib/krb5/pkinit.c
2548
AlgorithmIdentifier alg;
crypto/heimdal/lib/krb5/pkinit.c
2550
ret = hx509_cert_get_SPKI_AlgorithmIdentifier(hx509ctx, cert, &alg);
crypto/heimdal/lib/krb5/pkinit.c
2552
if (der_heim_oid_cmp(&alg.algorithm, &asn1_oid_id_ecPublicKey) == 0)
crypto/heimdal/lib/krb5/pkinit.c
2554
free_AlgorithmIdentifier(&alg);
crypto/krb5/src/lib/crypto/crypto_tests/t_derive.c
339
test->alg);
crypto/krb5/src/lib/crypto/crypto_tests/t_derive.c
346
&test->constant, test->alg);
crypto/krb5/src/lib/crypto/crypto_tests/t_derive.c
38
enum deriv_alg alg;
crypto/krb5/src/lib/crypto/krb/crypto_int.h
390
enum deriv_alg alg);
crypto/krb5/src/lib/crypto/krb/crypto_int.h
395
enum deriv_alg alg);
crypto/krb5/src/lib/crypto/krb/crypto_int.h
400
enum deriv_alg alg);
crypto/krb5/src/lib/crypto/krb/derive.c
111
const krb5_data *in_constant, enum deriv_alg alg)
crypto/krb5/src/lib/crypto/krb/derive.c
122
ret = krb5int_derive_random(enc, hash, inkey, &rawkey, in_constant, alg);
crypto/krb5/src/lib/crypto/krb/derive.c
138
const krb5_data *in_constant, enum deriv_alg alg)
crypto/krb5/src/lib/crypto/krb/derive.c
160
alg);
crypto/krb5/src/lib/crypto/krb/derive.c
84
const krb5_data *in_constant, enum deriv_alg alg)
crypto/krb5/src/lib/crypto/krb/derive.c
88
switch (alg) {
crypto/krb5/src/lib/krb5/krb/kfree.c
781
krb5_algorithm_identifier **alg;
crypto/krb5/src/lib/krb5/krb/kfree.c
789
for (alg = val->supported_hash_alg; alg != NULL && *alg != NULL; alg++)
crypto/krb5/src/lib/krb5/krb/kfree.c
790
k5_free_algorithm_identifier(context, *alg);
crypto/krb5/src/plugins/preauth/pkinit/pkinit_crypto_openssl.c
1737
X509_ALGOR *alg = NULL;
crypto/krb5/src/plugins/preauth/pkinit/pkinit_crypto_openssl.c
1919
if (alg != NULL)
crypto/krb5/src/plugins/preauth/pkinit/pkinit_crypto_openssl.c
1920
X509_ALGOR_free(alg);
crypto/krb5/src/plugins/preauth/pkinit/pkinit_crypto_openssl.c
3753
X509_ALGOR *alg = NULL;
crypto/krb5/src/plugins/preauth/pkinit/pkinit_crypto_openssl.c
3761
alg = X509_ALGOR_new();
crypto/krb5/src/plugins/preauth/pkinit/pkinit_crypto_openssl.c
3762
if (alg == NULL ||
crypto/krb5/src/plugins/preauth/pkinit/pkinit_crypto_openssl.c
3763
!X509_ALGOR_set0(alg, OBJ_nid2obj(EVP_MD_nid(md)), V_ASN1_NULL, NULL))
crypto/krb5/src/plugins/preauth/pkinit/pkinit_crypto_openssl.c
3765
alg_len = i2d_X509_ALGOR(alg, NULL);
crypto/krb5/src/plugins/preauth/pkinit/pkinit_crypto_openssl.c
3782
i2d_X509_ALGOR(alg, &p);
crypto/krb5/src/plugins/preauth/pkinit/pkinit_crypto_openssl.c
3790
X509_ALGOR_free(alg);
crypto/openssh/authfd.c
389
agent_encode_alg(const struct sshkey *key, const char *alg)
crypto/openssh/authfd.c
391
if (alg != NULL && sshkey_type_plain(key->type) == KEY_RSA) {
crypto/openssh/authfd.c
392
if (strcmp(alg, "rsa-sha2-256") == 0 ||
crypto/openssh/authfd.c
393
strcmp(alg, "rsa-sha2-256-cert-v01@openssh.com") == 0)
crypto/openssh/authfd.c
395
if (strcmp(alg, "rsa-sha2-512") == 0 ||
crypto/openssh/authfd.c
396
strcmp(alg, "rsa-sha2-512-cert-v01@openssh.com") == 0)
crypto/openssh/authfd.c
406
const u_char *data, size_t datalen, const char *alg, u_int compat)
crypto/openssh/authfd.c
421
flags |= agent_encode_alg(key, alg);
crypto/openssh/authfd.c
441
if ((r = sshkey_check_sigtype(sig, len, alg)) != 0)
crypto/openssh/authfd.h
65
const u_char *data, size_t datalen, const char *alg, u_int compat);
crypto/openssh/clientloop.c
2339
char *alg = NULL;
crypto/openssh/clientloop.c
2377
if ((r = sshkey_get_sigtype(sig, siglen, &alg)) != 0) {
crypto/openssh/clientloop.c
2388
match_pattern_list(alg, HOSTKEY_PROOF_RSA_ALGS, 0) != 1) {
crypto/openssh/clientloop.c
2390
"%s for key %zu, disregarding", alg, i);
crypto/openssh/clientloop.c
2391
free(alg);
crypto/openssh/clientloop.c
2399
sshkey_type(ctx->keys[i]), i, alg);
crypto/openssh/clientloop.c
2400
free(alg);
crypto/openssh/digest-libc.c
128
ssh_digest_by_alg(int alg)
crypto/openssh/digest-libc.c
130
if (alg < 0 || alg >= SSH_DIGEST_MAX)
crypto/openssh/digest-libc.c
132
if (digests[alg].id != alg) /* sanity */
crypto/openssh/digest-libc.c
134
return &(digests[alg]);
crypto/openssh/digest-libc.c
140
int alg;
crypto/openssh/digest-libc.c
142
for (alg = 0; alg < SSH_DIGEST_MAX; alg++) {
crypto/openssh/digest-libc.c
143
if (strcasecmp(name, digests[alg].name) == 0)
crypto/openssh/digest-libc.c
144
return digests[alg].id;
crypto/openssh/digest-libc.c
150
ssh_digest_alg_name(int alg)
crypto/openssh/digest-libc.c
152
const struct ssh_digest *digest = ssh_digest_by_alg(alg);
crypto/openssh/digest-libc.c
158
ssh_digest_bytes(int alg)
crypto/openssh/digest-libc.c
160
const struct ssh_digest *digest = ssh_digest_by_alg(alg);
crypto/openssh/digest-libc.c
168
const struct ssh_digest *digest = ssh_digest_by_alg(ctx->alg);
crypto/openssh/digest-libc.c
174
ssh_digest_start(int alg)
crypto/openssh/digest-libc.c
176
const struct ssh_digest *digest = ssh_digest_by_alg(alg);
crypto/openssh/digest-libc.c
185
ret->alg = alg;
crypto/openssh/digest-libc.c
193
const struct ssh_digest *digest = ssh_digest_by_alg(from->alg);
crypto/openssh/digest-libc.c
195
if (digest == NULL || from->alg != to->alg)
crypto/openssh/digest-libc.c
204
const struct ssh_digest *digest = ssh_digest_by_alg(ctx->alg);
crypto/openssh/digest-libc.c
221
const struct ssh_digest *digest = ssh_digest_by_alg(ctx->alg);
crypto/openssh/digest-libc.c
239
digest = ssh_digest_by_alg(ctx->alg);
crypto/openssh/digest-libc.c
249
ssh_digest_memory(int alg, const void *m, size_t mlen, u_char *d, size_t dlen)
crypto/openssh/digest-libc.c
251
struct ssh_digest_ctx *ctx = ssh_digest_start(alg);
crypto/openssh/digest-libc.c
263
ssh_digest_buffer(int alg, const struct sshbuf *b, u_char *d, size_t dlen)
crypto/openssh/digest-libc.c
265
return ssh_digest_memory(alg, sshbuf_ptr(b), sshbuf_len(b), d, dlen);
crypto/openssh/digest-libc.c
58
int alg;
crypto/openssh/digest-openssl.c
100
ssh_digest_bytes(int alg)
crypto/openssh/digest-openssl.c
102
const struct ssh_digest *digest = ssh_digest_by_alg(alg);
crypto/openssh/digest-openssl.c
114
ssh_digest_start(int alg)
crypto/openssh/digest-openssl.c
116
const struct ssh_digest *digest = ssh_digest_by_alg(alg);
crypto/openssh/digest-openssl.c
121
ret->alg = alg;
crypto/openssh/digest-openssl.c
136
if (from->alg != to->alg)
crypto/openssh/digest-openssl.c
161
const struct ssh_digest *digest = ssh_digest_by_alg(ctx->alg);
crypto/openssh/digest-openssl.c
185
ssh_digest_memory(int alg, const void *m, size_t mlen, u_char *d, size_t dlen)
crypto/openssh/digest-openssl.c
187
const struct ssh_digest *digest = ssh_digest_by_alg(alg);
crypto/openssh/digest-openssl.c
203
ssh_digest_buffer(int alg, const struct sshbuf *b, u_char *d, size_t dlen)
crypto/openssh/digest-openssl.c
205
return ssh_digest_memory(alg, sshbuf_ptr(b), sshbuf_len(b), d, dlen);
crypto/openssh/digest-openssl.c
46
int alg;
crypto/openssh/digest-openssl.c
68
ssh_digest_by_alg(int alg)
crypto/openssh/digest-openssl.c
70
if (alg < 0 || alg >= SSH_DIGEST_MAX)
crypto/openssh/digest-openssl.c
72
if (digests[alg].id != alg) /* sanity */
crypto/openssh/digest-openssl.c
74
if (digests[alg].mdfunc == NULL)
crypto/openssh/digest-openssl.c
76
return &(digests[alg]);
crypto/openssh/digest-openssl.c
82
int alg;
crypto/openssh/digest-openssl.c
84
for (alg = 0; digests[alg].id != -1; alg++) {
crypto/openssh/digest-openssl.c
85
if (strcasecmp(name, digests[alg].name) == 0)
crypto/openssh/digest-openssl.c
86
return digests[alg].id;
crypto/openssh/digest-openssl.c
92
ssh_digest_alg_name(int alg)
crypto/openssh/digest-openssl.c
94
const struct ssh_digest *digest = ssh_digest_by_alg(alg);
crypto/openssh/digest.h
39
const char *ssh_digest_alg_name(int alg);
crypto/openssh/digest.h
42
size_t ssh_digest_bytes(int alg);
crypto/openssh/digest.h
52
int ssh_digest_memory(int alg, const void *m, size_t mlen,
crypto/openssh/digest.h
56
int ssh_digest_buffer(int alg, const struct sshbuf *b, u_char *d, size_t dlen)
crypto/openssh/digest.h
60
struct ssh_digest_ctx *ssh_digest_start(int alg);
crypto/openssh/dns.c
306
int alg)
crypto/openssh/dns.c
316
if (alg != -1 && dtype != alg)
crypto/openssh/hmac.c
111
len = ssh_digest_bytes(ctx->alg);
crypto/openssh/hmac.c
30
int alg;
crypto/openssh/hmac.c
39
ssh_hmac_bytes(int alg)
crypto/openssh/hmac.c
41
return ssh_digest_bytes(alg);
crypto/openssh/hmac.c
45
ssh_hmac_start(int alg)
crypto/openssh/hmac.c
51
ret->alg = alg;
crypto/openssh/hmac.c
52
if ((ret->ictx = ssh_digest_start(alg)) == NULL ||
crypto/openssh/hmac.c
53
(ret->octx = ssh_digest_start(alg)) == NULL ||
crypto/openssh/hmac.c
54
(ret->digest = ssh_digest_start(alg)) == NULL)
crypto/openssh/hmac.c
75
else if (ssh_digest_memory(ctx->alg, key, klen, ctx->buf,
crypto/openssh/hmac.h
22
size_t ssh_hmac_bytes(int alg);
crypto/openssh/hmac.h
26
struct ssh_hmac_ctx *ssh_hmac_start(int alg);
crypto/openssh/kex.c
263
char *alg, *oalgs, *algs, *sigalgs;
crypto/openssh/kex.c
278
for ((alg = strsep(&algs, ",")); alg != NULL && *alg != '\0';
crypto/openssh/kex.c
279
(alg = strsep(&algs, ","))) {
crypto/openssh/kex.c
280
if ((sigalg = sshkey_sigalg_by_name(alg)) == NULL)
crypto/openssh/mac.c
110
if ((mac->hmac_ctx = ssh_hmac_start(macalg->alg)) == NULL)
crypto/openssh/mac.c
112
mac->key_len = mac->mac_len = ssh_hmac_bytes(macalg->alg);
crypto/openssh/mac.c
51
int alg;
crypto/openssh/monitor.c
713
char *alg = NULL;
crypto/openssh/monitor.c
723
(r = sshbuf_get_cstring(m, &alg, NULL)) != 0 ||
crypto/openssh/monitor.c
775
if ((r = sshkey_sign(key, &signature, &siglen, p, datlen, alg,
crypto/openssh/monitor.c
781
p, datlen, alg, compat)) != 0)
crypto/openssh/monitor.c
786
debug3_f("%s %s signature len=%zu", alg,
crypto/openssh/monitor.c
793
free(alg);
crypto/openssh/regress/misc/sk-dummy/sk-dummy.c
234
sk_enroll(uint32_t alg, const uint8_t *challenge, size_t challenge_len,
crypto/openssh/regress/misc/sk-dummy/sk-dummy.c
255
switch(alg) {
crypto/openssh/regress/misc/sk-dummy/sk-dummy.c
265
skdebug(__func__, "unsupported key type %d", alg);
crypto/openssh/regress/misc/sk-dummy/sk-dummy.c
482
sk_sign(uint32_t alg, const uint8_t *data, size_t datalen,
crypto/openssh/regress/misc/sk-dummy/sk-dummy.c
508
switch(alg) {
crypto/openssh/regress/misc/sk-dummy/sk-dummy.c
522
skdebug(__func__, "unsupported key type %d", alg);
crypto/openssh/sk-api.h
67
uint32_t alg;
crypto/openssh/sk-api.h
89
int sk_enroll(uint32_t alg, const uint8_t *challenge, size_t challenge_len,
crypto/openssh/sk-api.h
94
int sk_sign(uint32_t alg, const uint8_t *data, size_t data_len,
crypto/openssh/sk-usbhid.c
1107
pack_sig(uint32_t alg, fido_assert_t *assert,
crypto/openssh/sk-usbhid.c
1110
switch(alg) {
crypto/openssh/sk-usbhid.c
1150
sk_sign(uint32_t alg, const uint8_t *data, size_t datalen,
crypto/openssh/sk-usbhid.c
123
int sk_enroll(uint32_t alg, const uint8_t *challenge, size_t challenge_len,
crypto/openssh/sk-usbhid.c
1242
if (pack_sig(alg, assert, response) != 0) {
crypto/openssh/sk-usbhid.c
128
int sk_sign(uint32_t alg, const uint8_t *data, size_t data_len,
crypto/openssh/sk-usbhid.c
1382
srk->alg = SSH_SK_ECDSA;
crypto/openssh/sk-usbhid.c
1385
srk->alg = SSH_SK_ED25519;
crypto/openssh/sk-usbhid.c
1397
if ((r = pack_public_key(srk->alg, cred,
crypto/openssh/sk-usbhid.c
708
pack_public_key(uint32_t alg, const fido_cred_t *cred,
crypto/openssh/sk-usbhid.c
711
switch(alg) {
crypto/openssh/sk-usbhid.c
834
sk_enroll(uint32_t alg, const uint8_t *challenge, size_t challenge_len,
crypto/openssh/sk-usbhid.c
862
switch(alg) {
crypto/openssh/sk-usbhid.c
872
skdebug(__func__, "unsupported key type %d", alg);
crypto/openssh/sk-usbhid.c
979
if (pack_public_key(alg, cred, response) != 0) {
crypto/openssh/ssh-add.c
501
const char *alg = NULL;
crypto/openssh/ssh-add.c
511
alg = "rsa-sha2-256";
crypto/openssh/ssh-add.c
514
alg, 0)) != 0) {
crypto/openssh/ssh-add.c
519
alg, 0, NULL)) != 0) {
crypto/openssh/ssh-dss.c
262
const char *alg, const char *sk_provider, const char *sk_pin, u_int compat)
crypto/openssh/ssh-dss.c
331
const u_char *data, size_t dlen, const char *alg, u_int compat,
crypto/openssh/ssh-ecdsa-sk.c
236
const u_char *data, size_t dlen, const char *alg, u_int compat,
crypto/openssh/ssh-ecdsa.c
323
const char *alg, const char *sk_provider, const char *sk_pin, u_int compat)
crypto/openssh/ssh-ecdsa.c
388
const u_char *data, size_t dlen, const char *alg, u_int compat,
crypto/openssh/ssh-ed25519-sk.c
127
const u_char *data, size_t dlen, const char *alg, u_int compat,
crypto/openssh/ssh-ed25519.c
149
const char *alg, const char *sk_provider, const char *sk_pin, u_int compat)
crypto/openssh/ssh-ed25519.c
207
const u_char *data, size_t dlen, const char *alg, u_int compat,
crypto/openssh/ssh-keygen.c
1785
const char *alg, const char *provider, const char *pin,
crypto/openssh/ssh-keygen.c
1791
data, datalen, alg, compat);
crypto/openssh/ssh-keygen.c
488
const char *alg = NULL;
crypto/openssh/ssh-keygen.c
615
alg = "rsa-sha2-256";
crypto/openssh/ssh-keygen.c
624
alg, NULL, NULL, 0)) != 0)
crypto/openssh/ssh-keygen.c
627
alg, 0, NULL)) != 0)
crypto/openssh/ssh-rsa.c
348
rsa_hash_id_from_keyname(const char *alg)
crypto/openssh/ssh-rsa.c
352
if ((r = rsa_hash_id_from_ident(alg)) != -1)
crypto/openssh/ssh-rsa.c
354
if (strcmp(alg, "ssh-rsa-cert-v01@openssh.com") == 0)
crypto/openssh/ssh-rsa.c
356
if (strcmp(alg, "rsa-sha2-256-cert-v01@openssh.com") == 0)
crypto/openssh/ssh-rsa.c
358
if (strcmp(alg, "rsa-sha2-512-cert-v01@openssh.com") == 0)
crypto/openssh/ssh-rsa.c
407
const char *alg, const char *sk_provider, const char *sk_pin, u_int compat)
crypto/openssh/ssh-rsa.c
420
if (alg == NULL || strlen(alg) == 0)
crypto/openssh/ssh-rsa.c
423
hash_alg = rsa_hash_id_from_keyname(alg);
crypto/openssh/ssh-rsa.c
474
const u_char *data, size_t dlen, const char *alg, u_int compat,
crypto/openssh/ssh-rsa.c
504
if (alg != NULL && strcmp(alg, "ssh-rsa-cert-v01@openssh.com") != 0) {
crypto/openssh/ssh-rsa.c
505
if ((want_alg = rsa_hash_id_from_keyname(alg)) == -1) {
crypto/openssh/ssh-sk.c
308
sshsk_key_from_response(int alg, const char *application, uint8_t flags,
crypto/openssh/ssh-sk.c
322
switch (alg) {
crypto/openssh/ssh-sk.c
334
error_f("unsupported algorithm %d", alg);
crypto/openssh/ssh-sk.c
491
int alg;
crypto/openssh/ssh-sk.c
509
alg = SSH_SK_ECDSA;
crypto/openssh/ssh-sk.c
513
alg = SSH_SK_ED25519;
crypto/openssh/ssh-sk.c
550
if ((r = skp->sk_enroll(alg, challenge, challenge_len, application,
crypto/openssh/ssh-sk.c
557
if ((r = sshsk_key_from_response(alg, application, resp->flags,
crypto/openssh/ssh-sk.c
658
int type, alg;
crypto/openssh/ssh-sk.c
66
int (*sk_enroll)(int alg, const uint8_t *challenge,
crypto/openssh/ssh-sk.c
675
alg = SSH_SK_ECDSA;
crypto/openssh/ssh-sk.c
679
alg = SSH_SK_ED25519;
crypto/openssh/ssh-sk.c
700
if ((r = skp->sk_sign(alg, data, datalen, key->sk_application,
crypto/openssh/ssh-sk.c
72
int (*sk_sign)(int alg, const uint8_t *message, size_t message_len,
crypto/openssh/ssh-sk.c
835
i, rks[i]->slot, rks[i]->alg, rks[i]->application,
crypto/openssh/ssh-sk.c
84
int ssh_sk_enroll(int alg, const uint8_t *challenge,
crypto/openssh/ssh-sk.c
840
switch (rks[i]->alg) {
crypto/openssh/ssh-sk.c
850
if ((r = sshsk_key_from_response(rks[i]->alg,
crypto/openssh/ssh-sk.c
88
int ssh_sk_sign(int alg, const uint8_t *message, size_t message_len,
crypto/openssh/ssh-xmss.c
204
const char *alg, const char *sk_provider, const char *sk_pin, u_int compat)
crypto/openssh/ssh-xmss.c
279
const u_char *data, size_t dlen, const char *alg, u_int compat,
crypto/openssh/ssh_api.c
532
char *orig, *avail, *oavail = NULL, *alg, *replace = NULL;
crypto/openssh/ssh_api.c
551
while ((alg = strsep(&avail, ",")) && *alg != '\0') {
crypto/openssh/ssh_api.c
552
if ((ktype = sshkey_type_from_name(alg)) == KEY_UNSPEC)
crypto/openssh/ssh_api.c
554
nid = sshkey_ecdsa_nid_from_name(alg);
crypto/openssh/ssh_api.c
566
strlcat(replace, alg, maxlen);
crypto/openssh/ssh_api.c
588
const u_char *data, size_t dlen, const char *alg)
crypto/openssh/ssh_api.c
591
alg, NULL, NULL, ssh->compat);
crypto/openssh/ssh_api.c
64
const u_char *data, u_int datalen, const char *alg,
crypto/openssh/ssh_api.c
70
ret = sshkey_sign(key, sigp, &slen, data, datalen, alg,
crypto/openssh/sshconnect2.c
1158
char *allowed, *oallowed, *cp, *tmp, *alg = NULL;
crypto/openssh/sshconnect2.c
1195
alg = xstrdup(cp);
crypto/openssh/sshconnect2.c
1197
if (alg != NULL)
crypto/openssh/sshconnect2.c
1201
return alg;
crypto/openssh/sshconnect2.c
1206
const u_char *data, size_t datalen, u_int compat, const char *alg)
crypto/openssh/sshconnect2.c
1219
data, datalen, alg, compat);
crypto/openssh/sshconnect2.c
124
char *alg = NULL, *hostname = NULL, *ret = NULL, *best = NULL;
crypto/openssh/sshconnect2.c
1256
alg, options.sk_provider, pin, compat)) != 0) {
crypto/openssh/sshconnect2.c
1276
if ((r = sshkey_check_sigtype(*sigp, *lenp, alg)) != 0) {
crypto/openssh/sshconnect2.c
1319
char *alg = NULL, *fp = NULL;
crypto/openssh/sshconnect2.c
1389
free(alg);
crypto/openssh/sshconnect2.c
1392
if ((alg = key_sig_algorithm(fallback_sigtype ? NULL : ssh,
crypto/openssh/sshconnect2.c
1397
debug3_f("signing using %s %s", alg, fp);
crypto/openssh/sshconnect2.c
1416
(r = sshbuf_put_cstring(b, alg)) != 0 ||
crypto/openssh/sshconnect2.c
1430
sshbuf_ptr(b), sshbuf_len(b), ssh->compat, alg);
crypto/openssh/sshconnect2.c
1475
free(alg);
crypto/openssh/sshconnect2.c
1486
char *alg = NULL;
crypto/openssh/sshconnect2.c
1491
if ((alg = key_sig_algorithm(ssh, id->key)) == NULL) {
crypto/openssh/sshconnect2.c
1509
(r = sshpkt_put_cstring(ssh, alg)) != 0 ||
crypto/openssh/sshconnect2.c
1516
free(alg);
crypto/openssh/sshconnect2.c
177
while ((alg = strsep(&avail, ",")) && *alg != '\0') {
crypto/openssh/sshconnect2.c
178
if ((ktype = sshkey_type_from_name(alg)) == KEY_UNSPEC)
crypto/openssh/sshconnect2.c
179
fatal_f("unknown alg %s", alg);
crypto/openssh/sshconnect2.c
186
ALG_APPEND(first, alg);
crypto/openssh/sshconnect2.c
192
sshkey_ecdsa_nid_from_name(alg), NULL)) {
crypto/openssh/sshconnect2.c
193
ALG_APPEND(first, alg);
crypto/openssh/sshconnect2.c
197
ALG_APPEND(last, alg);
crypto/openssh/sshd-auth.c
805
const u_char *data, size_t dlen, const char *alg)
crypto/openssh/sshd-auth.c
809
data, dlen, alg, options.sk_provider, NULL,
crypto/openssh/sshd-auth.c
814
data, dlen, alg, options.sk_provider, NULL,
crypto/openssh/sshd-session.c
1390
const u_char *data, size_t dlen, const char *alg)
crypto/openssh/sshd-session.c
1394
data, dlen, alg, options.sk_provider, NULL,
crypto/openssh/sshd-session.c
1399
data, dlen, alg, options.sk_provider, NULL,
crypto/openssh/sshkey.c
1029
fingerprint_b64(const char *alg, u_char *dgst_raw, size_t dgst_raw_len)
crypto/openssh/sshkey.c
1032
size_t plen = strlen(alg) + 1;
crypto/openssh/sshkey.c
1037
strlcpy(ret, alg, rlen);
crypto/openssh/sshkey.c
1051
fingerprint_hex(const char *alg, u_char *dgst_raw, size_t dgst_raw_len)
crypto/openssh/sshkey.c
1054
size_t i, rlen = dgst_raw_len * 3 + strlen(alg) + 2;
crypto/openssh/sshkey.c
1058
strlcpy(retval, alg, rlen);
crypto/openssh/sshkey.c
1150
fingerprint_randomart(const char *alg, u_char *dgst_raw, size_t dgst_raw_len,
crypto/openssh/sshkey.c
1209
r = snprintf(hash, sizeof(hash), "[%s]", alg);
crypto/openssh/sshkey.c
2196
const char *alg, const char *sk_provider, const char *sk_pin, u_int compat)
crypto/openssh/sshkey.c
2220
alg, sk_provider, sk_pin, compat);
crypto/openssh/sshkey.c
2235
const u_char *data, size_t dlen, const char *alg, u_int compat,
crypto/openssh/sshkey.c
2247
alg, compat, detailsp);
crypto/openssh/sshkey.c
2278
sshkey_certify_custom(struct sshkey *k, struct sshkey *ca, const char *alg,
crypto/openssh/sshkey.c
2304
if (alg == NULL)
crypto/openssh/sshkey.c
2305
alg = k->cert->signature_type;
crypto/openssh/sshkey.c
2307
strcmp(alg, k->cert->signature_type) != 0)
crypto/openssh/sshkey.c
2314
if (alg == NULL && ca->type == KEY_RSA)
crypto/openssh/sshkey.c
2315
alg = "rsa-sha2-512";
crypto/openssh/sshkey.c
2361
sshbuf_len(cert), alg, sk_provider, sk_pin, 0, signer_ctx)) != 0)
crypto/openssh/sshkey.c
2366
if (alg != NULL && strcmp(alg, sigtype) != 0) {
crypto/openssh/sshkey.c
2391
const char *alg, const char *sk_provider, const char *sk_pin,
crypto/openssh/sshkey.c
2396
return sshkey_sign(key, sigp, lenp, data, datalen, alg,
crypto/openssh/sshkey.c
2401
sshkey_certify(struct sshkey *k, struct sshkey *ca, const char *alg,
crypto/openssh/sshkey.c
2404
return sshkey_certify_custom(k, ca, alg, sk_provider, sk_pin,
crypto/openssh/sshsig.c
409
int alg, r = SSH_ERR_INTERNAL_ERROR;
crypto/openssh/sshsig.c
417
if ((alg = ssh_digest_alg_by_name(hashalg)) == -1) {
crypto/openssh/sshsig.c
421
if ((r = ssh_digest_buffer(alg, m, hash, sizeof(hash))) != 0) {
crypto/openssh/sshsig.c
425
if ((hex = tohex(hash, ssh_digest_bytes(alg))) != NULL) {
crypto/openssh/sshsig.c
433
if ((r = sshbuf_put(b, hash, ssh_digest_bytes(alg))) != 0) {
crypto/openssh/sshsig.c
511
int alg, oerrno, r = SSH_ERR_INTERNAL_ERROR;
crypto/openssh/sshsig.c
519
if ((alg = ssh_digest_alg_by_name(hashalg)) == -1) {
crypto/openssh/sshsig.c
523
if ((ctx = ssh_digest_start(alg)) == NULL) {
crypto/openssh/sshsig.c
550
if ((hex = tohex(hash, ssh_digest_bytes(alg))) != NULL) {
crypto/openssh/sshsig.c
558
if ((r = sshbuf_put(b, hash, ssh_digest_bytes(alg))) != 0) {
crypto/openssl/apps/cmp.c
3391
X509_ALGOR *alg = OSSL_CMP_ATAV_get0_algId(atav);
crypto/openssl/apps/cmp.c
3397
if (alg == NULL) {
crypto/openssl/apps/cmp.c
3402
X509_ALGOR_get0(&oid, ¶mtype, ¶m, alg);
crypto/openssl/apps/cmp.c
3405
if (paramtype == V_ASN1_UNDEF || alg->parameter == NULL) {
crypto/openssl/apps/cmp.c
3409
ASN1_item_print(mem, (ASN1_VALUE *)alg,
crypto/openssl/apps/dhparam.c
199
const char *alg = dsaparam ? "DSA" : "DH";
crypto/openssl/apps/dhparam.c
205
ctx = EVP_PKEY_CTX_new_from_name(app_get0_libctx(), alg, app_get0_propq());
crypto/openssl/apps/dhparam.c
209
alg);
crypto/openssl/apps/dhparam.c
217
alg, num, dsaparam ? "" : "safe ");
crypto/openssl/apps/dhparam.c
223
alg);
crypto/openssl/apps/dhparam.c
243
tmppkey = app_paramgen(ctx, alg);
crypto/openssl/apps/include/apps.h
353
EVP_PKEY *app_keygen(EVP_PKEY_CTX *ctx, const char *alg, int bits, int verbose);
crypto/openssl/apps/include/apps.h
354
EVP_PKEY *app_paramgen(EVP_PKEY_CTX *ctx, const char *alg);
crypto/openssl/apps/lib/apps.c
3455
EVP_PKEY *app_keygen(EVP_PKEY_CTX *ctx, const char *alg, int bits, int verbose)
crypto/openssl/apps/lib/apps.c
3459
if (verbose && alg != NULL) {
crypto/openssl/apps/lib/apps.c
3460
BIO_printf(bio_err, "Generating %s key", alg);
crypto/openssl/apps/lib/apps.c
3471
alg != NULL ? alg : "asymmetric");
crypto/openssl/apps/lib/apps.c
3475
EVP_PKEY *app_paramgen(EVP_PKEY_CTX *ctx, const char *alg)
crypto/openssl/apps/lib/apps.c
3484
opt_getprog(), alg != NULL ? alg : "asymmetric");
crypto/openssl/apps/list.c
40
static int is_##type##_fetchable(const TYPE *alg) \
crypto/openssl/apps/list.c
45
const char *name = TYPE##_get0_name(alg); \
crypto/openssl/apps/pkcs12.c
1178
static int alg_print(const X509_ALGOR *alg)
crypto/openssl/apps/pkcs12.c
1185
X509_ALGOR_get0(&aoid, &aparamtype, &aparam, alg);
crypto/openssl/apps/pkcs12.c
55
static int alg_print(const X509_ALGOR *alg);
crypto/openssl/apps/pkeyutl.c
355
const char *alg = EVP_PKEY_get0_type_name(pkey);
crypto/openssl/apps/pkeyutl.c
359
prog, alg != NULL ? alg : "(unknown key type)");
crypto/openssl/apps/speed.c
127
static void print_result(int alg, int run_no, int count, double time_used);
crypto/openssl/apps/speed.c
1861
static int is_##type##_fetchable(const TYPE *alg) \
crypto/openssl/apps/speed.c
1866
const char *name = TYPE##_get0_name(alg); \
crypto/openssl/apps/speed.c
4318
EVP_SIGNATURE *alg = NULL;
crypto/openssl/apps/speed.c
4385
alg = EVP_SIGNATURE_fetch(app_get0_libctx(), sig_name, app_get0_propq());
crypto/openssl/apps/speed.c
4400
&& (alg == NULL
crypto/openssl/apps/speed.c
4401
|| EVP_PKEY_sign_message_init(sig_sign_ctx, alg, NULL) <= 0)) {
crypto/openssl/apps/speed.c
4443
&& (alg == NULL
crypto/openssl/apps/speed.c
4444
|| EVP_PKEY_verify_message_init(sig_verify_ctx, alg, NULL) <= 0)) {
crypto/openssl/apps/speed.c
4467
EVP_SIGNATURE_free(alg);
crypto/openssl/apps/speed.c
4474
EVP_SIGNATURE_free(alg);
crypto/openssl/apps/speed.c
4883
static void print_result(int alg, int run_no, int count, double time_used)
crypto/openssl/apps/speed.c
4886
BIO_printf(bio_err, "%s error!\n", names[alg]);
crypto/openssl/apps/speed.c
4893
count, names[alg], time_used);
crypto/openssl/apps/speed.c
4894
results[alg][run_no] = ((double)count) / time_used * lengths[run_no];
crypto/openssl/apps/speed.c
5002
int alg;
crypto/openssl/apps/speed.c
5005
if (strtoint(sstrsep(&p, sep), 0, ALGOR_NUM, &alg)) {
crypto/openssl/apps/speed.c
5008
results[alg][j] += atof(sstrsep(&p, sep));
crypto/openssl/crypto/asn1/a_verify.c
104
rv = ASN1_item_verify_ctx(it, alg, signature, data, ctx);
crypto/openssl/crypto/asn1/a_verify.c
111
int ASN1_item_verify_ctx(const ASN1_ITEM *it, const X509_ALGOR *alg,
crypto/openssl/crypto/asn1/a_verify.c
134
if (!OBJ_find_sigid_algs(OBJ_obj2nid(alg->algorithm), &mdnid, &pknid)) {
crypto/openssl/crypto/asn1/a_verify.c
144
ret = pkey->ameth->item_verify(ctx, it, data, alg, signature, pkey);
crypto/openssl/crypto/asn1/a_verify.c
170
if (ossl_rsa_pss_to_ctx(ctx, NULL, alg, pkey) <= 0) {
crypto/openssl/crypto/asn1/a_verify.c
88
int ASN1_item_verify(const ASN1_ITEM *it, const X509_ALGOR *alg,
crypto/openssl/crypto/asn1/a_verify.c
92
return ASN1_item_verify_ex(it, alg, signature, data, NULL, pkey, NULL, NULL);
crypto/openssl/crypto/asn1/a_verify.c
95
int ASN1_item_verify_ex(const ASN1_ITEM *it, const X509_ALGOR *alg,
crypto/openssl/crypto/asn1/ameth_lib.c
381
const X509_ALGOR *alg,
crypto/openssl/crypto/asn1/p5_pbe.c
101
if (PKCS5_pbe_set0_algor_ex(ret, alg, iter, salt, saltlen, ctx))
crypto/openssl/crypto/asn1/p5_pbe.c
108
X509_ALGOR *PKCS5_pbe_set(int alg, int iter,
crypto/openssl/crypto/asn1/p5_pbe.c
111
return PKCS5_pbe_set_ex(alg, iter, salt, saltlen, NULL);
crypto/openssl/crypto/asn1/p5_pbe.c
28
int PKCS5_pbe_set0_algor_ex(X509_ALGOR *algor, int alg, int iter,
crypto/openssl/crypto/asn1/p5_pbe.c
72
if (X509_ALGOR_set0(algor, OBJ_nid2obj(alg), V_ASN1_SEQUENCE, pbe_str))
crypto/openssl/crypto/asn1/p5_pbe.c
82
int PKCS5_pbe_set0_algor(X509_ALGOR *algor, int alg, int iter,
crypto/openssl/crypto/asn1/p5_pbe.c
85
return PKCS5_pbe_set0_algor_ex(algor, alg, iter, salt, saltlen, NULL);
crypto/openssl/crypto/asn1/p5_pbe.c
90
X509_ALGOR *PKCS5_pbe_set_ex(int alg, int iter,
crypto/openssl/crypto/asn1/x_algor.c
144
X509_ALGOR *alg;
crypto/openssl/crypto/asn1/x_algor.c
149
if ((alg = X509_ALGOR_new()) == NULL)
crypto/openssl/crypto/asn1/x_algor.c
151
X509_ALGOR_set_md(alg, md);
crypto/openssl/crypto/asn1/x_algor.c
152
*palg = alg;
crypto/openssl/crypto/asn1/x_algor.c
157
const EVP_MD *ossl_x509_algor_get_md(X509_ALGOR *alg)
crypto/openssl/crypto/asn1/x_algor.c
161
if (alg == NULL)
crypto/openssl/crypto/asn1/x_algor.c
163
md = EVP_get_digestbyobj(alg->algorithm);
crypto/openssl/crypto/asn1/x_algor.c
169
X509_ALGOR *ossl_x509_algor_mgf1_decode(X509_ALGOR *alg)
crypto/openssl/crypto/asn1/x_algor.c
171
if (OBJ_obj2nid(alg->algorithm) != NID_mgf1)
crypto/openssl/crypto/asn1/x_algor.c
174
alg->parameter);
crypto/openssl/crypto/asn1/x_algor.c
30
int X509_ALGOR_set0(X509_ALGOR *alg, ASN1_OBJECT *aobj, int ptype, void *pval)
crypto/openssl/crypto/asn1/x_algor.c
32
if (alg == NULL)
crypto/openssl/crypto/asn1/x_algor.c
35
if (ptype != V_ASN1_UNDEF && alg->parameter == NULL
crypto/openssl/crypto/asn1/x_algor.c
36
&& (alg->parameter = ASN1_TYPE_new()) == NULL)
crypto/openssl/crypto/asn1/x_algor.c
39
ASN1_OBJECT_free(alg->algorithm);
crypto/openssl/crypto/asn1/x_algor.c
40
alg->algorithm = aobj;
crypto/openssl/crypto/asn1/x_algor.c
45
ASN1_TYPE_free(alg->parameter);
crypto/openssl/crypto/asn1/x_algor.c
46
alg->parameter = NULL;
crypto/openssl/crypto/asn1/x_algor.c
48
ASN1_TYPE_set(alg->parameter, ptype, pval);
crypto/openssl/crypto/asn1/x_algor.c
55
X509_ALGOR *alg = NULL;
crypto/openssl/crypto/asn1/x_algor.c
59
if ((alg = X509_ALGOR_new()) == NULL)
crypto/openssl/crypto/asn1/x_algor.c
61
if (X509_ALGOR_set0(alg, algo, ptype, pval))
crypto/openssl/crypto/asn1/x_algor.c
62
return alg;
crypto/openssl/crypto/asn1/x_algor.c
63
alg->algorithm = NULL; /* precaution to prevent double free */
crypto/openssl/crypto/asn1/x_algor.c
66
X509_ALGOR_free(alg);
crypto/openssl/crypto/asn1/x_algor.c
88
void X509_ALGOR_set_md(X509_ALGOR *alg, const EVP_MD *md)
crypto/openssl/crypto/asn1/x_algor.c
93
(void)X509_ALGOR_set0(alg, OBJ_nid2obj(EVP_MD_get_type(md)), type, NULL);
crypto/openssl/crypto/cmp/cmp_asn.c
495
OSSL_CMP_ATAV *OSSL_CMP_ATAV_new_algId(const X509_ALGOR *alg)
crypto/openssl/crypto/cmp/cmp_asn.c
500
if (alg == NULL) {
crypto/openssl/crypto/cmp/cmp_asn.c
504
if ((dup = X509_ALGOR_dup(alg)) == NULL)
crypto/openssl/crypto/cmp/cmp_protect.c
199
X509_ALGOR *alg = NULL;
crypto/openssl/crypto/cmp/cmp_protect.c
214
alg = ossl_X509_ALGOR_from_nid(NID_id_PasswordBasedMAC,
crypto/openssl/crypto/cmp/cmp_protect.c
217
if (alg == NULL)
crypto/openssl/crypto/cmp/cmp_protect.c
221
return alg;
crypto/openssl/crypto/cms/cms_dh.c
100
X509_ALGOR_get0(&aoid, &ptype, ¶meter, alg);
crypto/openssl/crypto/cms/cms_dh.c
175
X509_ALGOR *alg;
crypto/openssl/crypto/cms/cms_dh.c
178
if (!CMS_RecipientInfo_kari_get0_orig_id(ri, &alg, &pubkey,
crypto/openssl/crypto/cms/cms_dh.c
181
if (alg == NULL || pubkey == NULL)
crypto/openssl/crypto/cms/cms_dh.c
183
if (!dh_cms_set_peerkey(pctx, alg, pubkey)) {
crypto/openssl/crypto/cms/cms_dh.c
21
X509_ALGOR *alg, ASN1_BIT_STRING *pubkey)
crypto/openssl/crypto/cms/cms_dh.c
34
X509_ALGOR_get0(&aoid, &atype, &aval, alg);
crypto/openssl/crypto/cms/cms_dh.c
84
X509_ALGOR *alg, *kekalg = NULL;
crypto/openssl/crypto/cms/cms_dh.c
97
if (!CMS_RecipientInfo_kari_get0_alg(ri, &alg, &ukm))
crypto/openssl/crypto/cms/cms_ec.c
162
X509_ALGOR *alg, *kekalg = NULL;
crypto/openssl/crypto/cms/cms_ec.c
175
if (!CMS_RecipientInfo_kari_get0_alg(ri, &alg, &ukm))
crypto/openssl/crypto/cms/cms_ec.c
178
X509_ALGOR_get0(&aoid, &ptype, ¶meter, alg);
crypto/openssl/crypto/cms/cms_ec.c
235
X509_ALGOR *alg;
crypto/openssl/crypto/cms/cms_ec.c
238
if (!CMS_RecipientInfo_kari_get0_orig_id(ri, &alg, &pubkey,
crypto/openssl/crypto/cms/cms_ec.c
241
if (alg == NULL || pubkey == NULL)
crypto/openssl/crypto/cms/cms_ec.c
243
if (!ecdh_cms_set_peerkey(pctx, alg, pubkey)) {
crypto/openssl/crypto/cms/cms_ec.c
74
X509_ALGOR *alg, ASN1_BIT_STRING *pubkey)
crypto/openssl/crypto/cms/cms_ec.c
84
X509_ALGOR_get0(&aoid, &atype, &aval, alg);
crypto/openssl/crypto/cms/cms_env.c
842
const char *alg = NULL;
crypto/openssl/crypto/cms/cms_env.c
846
alg = "AES-128-WRAP";
crypto/openssl/crypto/cms/cms_env.c
849
alg = "AES-192-WRAP";
crypto/openssl/crypto/cms/cms_env.c
852
alg = "AES-256-WRAP";
crypto/openssl/crypto/cms/cms_env.c
857
return EVP_CIPHER_fetch(ossl_cms_ctx_get0_libctx(ctx), alg,
crypto/openssl/crypto/cms/cms_lib.c
408
char alg[OSSL_MAX_NAME_SIZE];
crypto/openssl/crypto/cms/cms_lib.c
412
OBJ_obj2txt(alg, sizeof(alg), digestoid, 0);
crypto/openssl/crypto/cms/cms_lib.c
415
fetched_digest = EVP_MD_fetch(ossl_cms_ctx_get0_libctx(ctx), alg,
crypto/openssl/crypto/cms/cms_rsa.c
127
X509_ALGOR *alg;
crypto/openssl/crypto/cms/cms_rsa.c
132
if (CMS_RecipientInfo_ktri_get0_algs(ri, NULL, NULL, &alg) <= 0)
crypto/openssl/crypto/cms/cms_rsa.c
139
return X509_ALGOR_set0(alg, OBJ_nid2obj(NID_rsaEncryption),
crypto/openssl/crypto/cms/cms_rsa.c
177
if (!X509_ALGOR_set0(alg, OBJ_nid2obj(NID_rsaesOaep), V_ASN1_SEQUENCE, os))
crypto/openssl/crypto/cms/cms_rsa.c
19
static RSA_OAEP_PARAMS *rsa_oaep_decode(const X509_ALGOR *alg)
crypto/openssl/crypto/cms/cms_rsa.c
205
X509_ALGOR *alg;
crypto/openssl/crypto/cms/cms_rsa.c
212
CMS_SignerInfo_get0_algs(si, NULL, NULL, NULL, &alg);
crypto/openssl/crypto/cms/cms_rsa.c
218
return X509_ALGOR_set0(alg, OBJ_nid2obj(NID_rsaEncryption),
crypto/openssl/crypto/cms/cms_rsa.c
232
if (X509_ALGOR_set0(alg, OBJ_nid2obj(EVP_PKEY_RSA_PSS), V_ASN1_SEQUENCE, os))
crypto/openssl/crypto/cms/cms_rsa.c
24
alg->parameter);
crypto/openssl/crypto/cms/cms_rsa.c
246
if (d2i_X509_ALGOR(&alg, &pp, aid_len) == NULL)
crypto/openssl/crypto/cms/cms_rsa.c
254
X509_ALGOR *alg;
crypto/openssl/crypto/cms/cms_rsa.c
258
CMS_SignerInfo_get0_algs(si, NULL, NULL, NULL, &alg);
crypto/openssl/crypto/cms/cms_rsa.c
259
nid = OBJ_obj2nid(alg->algorithm);
crypto/openssl/crypto/cms/cms_rsa.c
261
return ossl_rsa_pss_to_ctx(NULL, pkctx, alg, NULL) > 0;
crypto/openssl/crypto/cms/cms_sd.c
1179
X509_ALGOR *alg;
crypto/openssl/crypto/cms/cms_sd.c
1189
alg = ossl_X509_ALGOR_from_nid(algnid, key != NULL ? V_ASN1_INTEGER : V_ASN1_UNDEF, key);
crypto/openssl/crypto/cms/cms_sd.c
1190
if (alg == NULL) {
crypto/openssl/crypto/cms/cms_sd.c
1197
if (*algs == NULL || !sk_X509_ALGOR_push(*algs, alg)) {
crypto/openssl/crypto/cms/cms_sd.c
1198
X509_ALGOR_free(alg);
crypto/openssl/crypto/cms/cms_sd.c
350
X509_ALGOR *alg;
crypto/openssl/crypto/cms/cms_sd.c
424
alg = sk_X509_ALGOR_value(sd->digestAlgorithms, i);
crypto/openssl/crypto/cms/cms_sd.c
425
X509_ALGOR_get0(&aoid, NULL, NULL, alg);
crypto/openssl/crypto/cms/cms_sd.c
432
if ((alg = X509_ALGOR_new()) == NULL) {
crypto/openssl/crypto/cms/cms_sd.c
436
X509_ALGOR_set_md(alg, md);
crypto/openssl/crypto/cms/cms_sd.c
437
if (!sk_X509_ALGOR_push(sd->digestAlgorithms, alg)) {
crypto/openssl/crypto/cms/cms_sd.c
438
X509_ALGOR_free(alg);
crypto/openssl/crypto/ec/ecx_meth.c
581
static int ecd_sig_info_set25519(X509_SIG_INFO *siginf, const X509_ALGOR *alg,
crypto/openssl/crypto/ec/ecx_meth.c
597
static int ecd_sig_info_set448(X509_SIG_INFO *siginf, const X509_ALGOR *alg,
crypto/openssl/crypto/engine/eng_fat.c
50
static int int_def_cb(const char *alg, int len, void *arg)
crypto/openssl/crypto/engine/eng_fat.c
53
if (alg == NULL)
crypto/openssl/crypto/engine/eng_fat.c
55
if (strncmp(alg, "ALL", len) == 0)
crypto/openssl/crypto/engine/eng_fat.c
57
else if (strncmp(alg, "RSA", len) == 0)
crypto/openssl/crypto/engine/eng_fat.c
59
else if (strncmp(alg, "DSA", len) == 0)
crypto/openssl/crypto/engine/eng_fat.c
61
else if (strncmp(alg, "DH", len) == 0)
crypto/openssl/crypto/engine/eng_fat.c
63
else if (strncmp(alg, "EC", len) == 0)
crypto/openssl/crypto/engine/eng_fat.c
65
else if (strncmp(alg, "RAND", len) == 0)
crypto/openssl/crypto/engine/eng_fat.c
67
else if (strncmp(alg, "CIPHERS", len) == 0)
crypto/openssl/crypto/engine/eng_fat.c
69
else if (strncmp(alg, "DIGESTS", len) == 0)
crypto/openssl/crypto/engine/eng_fat.c
71
else if (strncmp(alg, "PKEY", len) == 0)
crypto/openssl/crypto/engine/eng_fat.c
73
else if (strncmp(alg, "PKEY_CRYPTO", len) == 0)
crypto/openssl/crypto/engine/eng_fat.c
75
else if (strncmp(alg, "PKEY_ASN1", len) == 0)
crypto/openssl/crypto/ess/ess_lib.c
178
X509_ALGOR *alg = NULL;
crypto/openssl/crypto/ess/ess_lib.c
188
alg = X509_ALGOR_new();
crypto/openssl/crypto/ess/ess_lib.c
189
if (alg == NULL) {
crypto/openssl/crypto/ess/ess_lib.c
193
X509_ALGOR_set_md(alg, hash_alg);
crypto/openssl/crypto/ess/ess_lib.c
194
if (alg->algorithm == NULL) {
crypto/openssl/crypto/ess/ess_lib.c
198
cid->hash_alg = alg;
crypto/openssl/crypto/ess/ess_lib.c
199
alg = NULL;
crypto/openssl/crypto/ess/ess_lib.c
244
X509_ALGOR_free(alg);
crypto/openssl/crypto/evp/digest.c
809
void *alg;
crypto/openssl/crypto/evp/digest.c
825
alg = ossl_provider_ctx(EVP_MD_get0_provider(ctx->digest));
crypto/openssl/crypto/evp/digest.c
826
return ctx->digest->settable_ctx_params(ctx->algctx, alg);
crypto/openssl/crypto/evp/evp_enc.c
1715
void *alg;
crypto/openssl/crypto/evp/evp_enc.c
1718
alg = ossl_provider_ctx(EVP_CIPHER_get0_provider(cctx->cipher));
crypto/openssl/crypto/evp/evp_enc.c
1719
return cctx->cipher->settable_ctx_params(cctx->algctx, alg);
crypto/openssl/crypto/evp/evp_lib.c
1241
int EVP_CIPHER_CTX_set_algor_params(EVP_CIPHER_CTX *ctx, const X509_ALGOR *alg)
crypto/openssl/crypto/evp/evp_lib.c
1247
if ((derl = i2d_ASN1_TYPE(alg->parameter, &der)) >= 0) {
crypto/openssl/crypto/evp/evp_lib.c
1265
int EVP_CIPHER_CTX_get_algor_params(EVP_CIPHER_CTX *ctx, X509_ALGOR *alg)
crypto/openssl/crypto/evp/evp_lib.c
1306
type = alg->parameter;
crypto/openssl/crypto/evp/evp_lib.c
132
X509_ALGOR alg;
crypto/openssl/crypto/evp/evp_lib.c
1323
alg->parameter = type;
crypto/openssl/crypto/evp/evp_lib.c
1332
int EVP_CIPHER_CTX_get_algor(EVP_CIPHER_CTX *ctx, X509_ALGOR **alg)
crypto/openssl/crypto/evp/evp_lib.c
134
alg.algorithm = NULL;
crypto/openssl/crypto/evp/evp_lib.c
135
alg.parameter = type;
crypto/openssl/crypto/evp/evp_lib.c
1352
if (alg != NULL) {
crypto/openssl/crypto/evp/evp_lib.c
1361
&& d2i_X509_ALGOR(alg, &pp, aid_len) != NULL)
crypto/openssl/crypto/evp/evp_lib.c
137
ret = EVP_CIPHER_CTX_get_algor_params(c, &alg);
crypto/openssl/crypto/evp/evp_lib.c
1370
int EVP_PKEY_CTX_set_algor_params(EVP_PKEY_CTX *ctx, const X509_ALGOR *alg)
crypto/openssl/crypto/evp/evp_lib.c
1376
if ((derl = i2d_ASN1_TYPE(alg->parameter, &der)) >= 0) {
crypto/openssl/crypto/evp/evp_lib.c
1392
int EVP_PKEY_CTX_get_algor_params(EVP_PKEY_CTX *ctx, X509_ALGOR *alg)
crypto/openssl/crypto/evp/evp_lib.c
1421
type = alg->parameter;
crypto/openssl/crypto/evp/evp_lib.c
1440
alg->parameter = type;
crypto/openssl/crypto/evp/evp_lib.c
1449
int EVP_PKEY_CTX_get_algor(EVP_PKEY_CTX *ctx, X509_ALGOR **alg)
crypto/openssl/crypto/evp/evp_lib.c
1469
if (alg != NULL) {
crypto/openssl/crypto/evp/evp_lib.c
1478
&& d2i_X509_ALGOR(alg, &pp, aid_len) != NULL)
crypto/openssl/crypto/evp/evp_lib.c
201
X509_ALGOR alg;
crypto/openssl/crypto/evp/evp_lib.c
203
alg.algorithm = NULL;
crypto/openssl/crypto/evp/evp_lib.c
204
alg.parameter = type;
crypto/openssl/crypto/evp/evp_lib.c
206
ret = EVP_CIPHER_CTX_set_algor_params(c, &alg);
crypto/openssl/crypto/evp/kdf_meth.c
186
void *alg;
crypto/openssl/crypto/evp/kdf_meth.c
190
alg = ossl_provider_ctx(EVP_KDF_get0_provider(kdf));
crypto/openssl/crypto/evp/kdf_meth.c
191
return kdf->gettable_ctx_params(NULL, alg);
crypto/openssl/crypto/evp/kdf_meth.c
196
void *alg;
crypto/openssl/crypto/evp/kdf_meth.c
200
alg = ossl_provider_ctx(EVP_KDF_get0_provider(kdf));
crypto/openssl/crypto/evp/kdf_meth.c
201
return kdf->settable_ctx_params(NULL, alg);
crypto/openssl/crypto/evp/kdf_meth.c
206
void *alg;
crypto/openssl/crypto/evp/kdf_meth.c
210
alg = ossl_provider_ctx(EVP_KDF_get0_provider(ctx->meth));
crypto/openssl/crypto/evp/kdf_meth.c
211
return ctx->meth->gettable_ctx_params(ctx->algctx, alg);
crypto/openssl/crypto/evp/kdf_meth.c
216
void *alg;
crypto/openssl/crypto/evp/kdf_meth.c
220
alg = ossl_provider_ctx(EVP_KDF_get0_provider(ctx->meth));
crypto/openssl/crypto/evp/kdf_meth.c
221
return ctx->meth->settable_ctx_params(ctx->algctx, alg);
crypto/openssl/crypto/evp/mac_meth.c
207
void *alg;
crypto/openssl/crypto/evp/mac_meth.c
211
alg = ossl_provider_ctx(EVP_MAC_get0_provider(mac));
crypto/openssl/crypto/evp/mac_meth.c
212
return mac->gettable_ctx_params(NULL, alg);
crypto/openssl/crypto/evp/mac_meth.c
217
void *alg;
crypto/openssl/crypto/evp/mac_meth.c
221
alg = ossl_provider_ctx(EVP_MAC_get0_provider(mac));
crypto/openssl/crypto/evp/mac_meth.c
222
return mac->settable_ctx_params(NULL, alg);
crypto/openssl/crypto/evp/mac_meth.c
227
void *alg;
crypto/openssl/crypto/evp/mac_meth.c
231
alg = ossl_provider_ctx(EVP_MAC_get0_provider(ctx->meth));
crypto/openssl/crypto/evp/mac_meth.c
232
return ctx->meth->gettable_ctx_params(ctx->algctx, alg);
crypto/openssl/crypto/evp/mac_meth.c
237
void *alg;
crypto/openssl/crypto/evp/mac_meth.c
241
alg = ossl_provider_ctx(EVP_MAC_get0_provider(ctx->meth));
crypto/openssl/crypto/evp/mac_meth.c
242
return ctx->meth->settable_ctx_params(ctx->algctx, alg);
crypto/openssl/crypto/ffc/ffc_params.c
132
void ossl_ffc_set_digest(FFC_PARAMS *params, const char *alg, const char *props)
crypto/openssl/crypto/ffc/ffc_params.c
134
params->mdname = alg;
crypto/openssl/crypto/ml_dsa/ml_dsa_encoders.c
819
key->params->alg);
crypto/openssl/crypto/ml_dsa/ml_dsa_key.c
490
out->params->alg);
crypto/openssl/crypto/ml_dsa/ml_dsa_key.c
552
return key->params->alg;
crypto/openssl/crypto/ml_dsa/ml_dsa_params.c
100
for (p = ml_dsa_params; p->alg != NULL; ++p) {
crypto/openssl/crypto/ocsp/ocsp_lib.c
49
X509_ALGOR *alg;
crypto/openssl/crypto/ocsp/ocsp_lib.c
56
alg = &cid->hashAlgorithm;
crypto/openssl/crypto/ocsp/ocsp_lib.c
57
ASN1_OBJECT_free(alg->algorithm);
crypto/openssl/crypto/ocsp/ocsp_lib.c
62
if ((alg->algorithm = OBJ_nid2obj(nid)) == NULL)
crypto/openssl/crypto/ocsp/ocsp_lib.c
64
if ((alg->parameter = ASN1_TYPE_new()) == NULL)
crypto/openssl/crypto/ocsp/ocsp_lib.c
66
alg->parameter->type = V_ASN1_NULL;
crypto/openssl/crypto/pkcs12/p12_mutl.c
459
X509_ALGOR *alg = NULL;
crypto/openssl/crypto/pkcs12/p12_mutl.c
502
alg = PKCS5_pbkdf2_set(iter, salt ? salt : known_salt, saltlen, prf_nid, keylen);
crypto/openssl/crypto/pkcs12/p12_mutl.c
503
if (param == NULL || hmac_alg == NULL || alg == NULL)
crypto/openssl/crypto/pkcs12/p12_mutl.c
520
param->keyDerivationFunc = alg;
crypto/openssl/crypto/pkcs12/p12_mutl.c
522
alg = NULL;
crypto/openssl/crypto/pkcs12/p12_mutl.c
545
X509_ALGOR_free(alg);
crypto/openssl/crypto/pkcs12/p12_npas.c
195
static int alg_get(const X509_ALGOR *alg, int *pnid, int *piter,
crypto/openssl/crypto/pkcs12/p12_npas.c
206
X509_ALGOR_get0(&aoid, &aparamtype, &aparam, alg);
crypto/openssl/crypto/pkcs12/p12_npas.c
241
pbe = ASN1_TYPE_unpack_sequence(ASN1_ITEM_rptr(PBEPARAM), alg->parameter);
crypto/openssl/crypto/pkcs12/p12_npas.c
244
*pnid = OBJ_obj2nid(alg->algorithm);
crypto/openssl/crypto/pkcs12/p12_npas.c
27
static int alg_get(const X509_ALGOR *alg, int *pnid, int *piter,
crypto/openssl/crypto/pkcs7/pk7_attr.c
61
X509_ALGOR *alg;
crypto/openssl/crypto/pkcs7/pk7_attr.c
63
if ((alg = X509_ALGOR_new()) == NULL) {
crypto/openssl/crypto/pkcs7/pk7_attr.c
67
ASN1_OBJECT_free(alg->algorithm);
crypto/openssl/crypto/pkcs7/pk7_attr.c
68
alg->algorithm = OBJ_nid2obj(nid);
crypto/openssl/crypto/pkcs7/pk7_attr.c
70
if ((alg->parameter = ASN1_TYPE_new()) == NULL) {
crypto/openssl/crypto/pkcs7/pk7_attr.c
82
alg->parameter->value.integer = nbit;
crypto/openssl/crypto/pkcs7/pk7_attr.c
83
alg->parameter->type = V_ASN1_INTEGER;
crypto/openssl/crypto/pkcs7/pk7_attr.c
86
if (!sk_X509_ALGOR_push(sk, alg)) {
crypto/openssl/crypto/pkcs7/pk7_attr.c
93
X509_ALGOR_free(alg);
crypto/openssl/crypto/pkcs7/pk7_doit.c
107
OBJ_obj2txt(name, sizeof(name), alg->algorithm, 0);
crypto/openssl/crypto/pkcs7/pk7_doit.c
94
static int pkcs7_bio_add_digest(BIO **pbio, X509_ALGOR *alg,
crypto/openssl/crypto/pkcs7/pk7_lib.c
198
X509_ALGOR *alg;
crypto/openssl/crypto/pkcs7/pk7_lib.c
221
alg = sk_X509_ALGOR_value(md_sk, i);
crypto/openssl/crypto/pkcs7/pk7_lib.c
222
if (OBJ_cmp(obj, alg->algorithm) == 0) {
crypto/openssl/crypto/pkcs7/pk7_lib.c
230
if ((alg = X509_ALGOR_new()) == NULL
crypto/openssl/crypto/pkcs7/pk7_lib.c
231
|| (alg->parameter = ASN1_TYPE_new()) == NULL) {
crypto/openssl/crypto/pkcs7/pk7_lib.c
232
X509_ALGOR_free(alg);
crypto/openssl/crypto/pkcs7/pk7_lib.c
241
alg->algorithm = OBJ_nid2obj(nid);
crypto/openssl/crypto/pkcs7/pk7_lib.c
243
alg->algorithm = OBJ_dup(obj);
crypto/openssl/crypto/pkcs7/pk7_lib.c
244
alg->parameter->type = V_ASN1_NULL;
crypto/openssl/crypto/pkcs7/pk7_lib.c
245
if (alg->algorithm == NULL || !sk_X509_ALGOR_push(md_sk, alg)) {
crypto/openssl/crypto/pkcs7/pk7_lib.c
246
X509_ALGOR_free(alg);
crypto/openssl/crypto/pkcs7/pk7_lib.c
336
X509_ALGOR *alg = NULL;
crypto/openssl/crypto/pkcs7/pk7_lib.c
338
PKCS7_SIGNER_INFO_get0_algs(si, NULL, NULL, &alg);
crypto/openssl/crypto/pkcs7/pk7_lib.c
339
if (alg != NULL)
crypto/openssl/crypto/pkcs7/pk7_lib.c
340
return X509_ALGOR_set0(alg, OBJ_nid2obj(NID_rsaEncryption),
crypto/openssl/crypto/pkcs7/pk7_lib.c
614
X509_ALGOR *alg = NULL;
crypto/openssl/crypto/pkcs7/pk7_lib.c
617
PKCS7_RECIP_INFO_get0_alg(ri, &alg);
crypto/openssl/crypto/pkcs7/pk7_lib.c
618
if (alg != NULL)
crypto/openssl/crypto/pkcs7/pk7_lib.c
619
return X509_ALGOR_set0(alg, OBJ_nid2obj(NID_rsaEncryption),
crypto/openssl/crypto/property/property.c
110
ALGORITHM *alg);
crypto/openssl/crypto/property/property.c
219
static void impl_cache_flush_alg(ossl_uintmax_t idx, ALGORITHM *alg)
crypto/openssl/crypto/property/property.c
221
lh_QUERY_doall(alg->cache, &impl_cache_free);
crypto/openssl/crypto/property/property.c
222
lh_QUERY_flush(alg->cache);
crypto/openssl/crypto/property/property.c
287
static int ossl_method_store_insert(OSSL_METHOD_STORE *store, ALGORITHM *alg)
crypto/openssl/crypto/property/property.c
289
return ossl_sa_ALGORITHM_set(store->algs, alg->nid, alg);
crypto/openssl/crypto/property/property.c
322
ALGORITHM *alg = NULL;
crypto/openssl/crypto/property/property.c
388
alg = ossl_method_store_retrieve(store, nid);
crypto/openssl/crypto/property/property.c
389
if (alg == NULL) {
crypto/openssl/crypto/property/property.c
390
if ((alg = OPENSSL_zalloc(sizeof(*alg))) == NULL
crypto/openssl/crypto/property/property.c
391
|| (alg->impls = sk_IMPLEMENTATION_new_null()) == NULL
crypto/openssl/crypto/property/property.c
392
|| (alg->cache = lh_QUERY_new(&query_hash, &query_cmp)) == NULL)
crypto/openssl/crypto/property/property.c
394
alg->nid = nid;
crypto/openssl/crypto/property/property.c
395
if (!ossl_method_store_insert(store, alg))
crypto/openssl/crypto/property/property.c
401
for (i = 0; i < sk_IMPLEMENTATION_num(alg->impls); i++) {
crypto/openssl/crypto/property/property.c
402
const IMPLEMENTATION *tmpimpl = sk_IMPLEMENTATION_value(alg->impls, i);
crypto/openssl/crypto/property/property.c
409
if (i == sk_IMPLEMENTATION_num(alg->impls)
crypto/openssl/crypto/property/property.c
410
&& sk_IMPLEMENTATION_push(alg->impls, impl)) {
crypto/openssl/crypto/property/property.c
430
alg_cleanup(0, alg, NULL);
crypto/openssl/crypto/property/property.c
438
ALGORITHM *alg = NULL;
crypto/openssl/crypto/property/property.c
447
alg = ossl_method_store_retrieve(store, nid);
crypto/openssl/crypto/property/property.c
448
if (alg == NULL) {
crypto/openssl/crypto/property/property.c
458
for (i = 0; i < sk_IMPLEMENTATION_num(alg->impls); i++) {
crypto/openssl/crypto/property/property.c
459
IMPLEMENTATION *impl = sk_IMPLEMENTATION_value(alg->impls, i);
crypto/openssl/crypto/property/property.c
463
(void)sk_IMPLEMENTATION_delete(alg->impls, i);
crypto/openssl/crypto/property/property.c
493
alg_cleanup_by_provider(ossl_uintmax_t idx, ALGORITHM *alg, void *arg)
crypto/openssl/crypto/property/property.c
502
for (count = 0, i = sk_IMPLEMENTATION_num(alg->impls); i-- > 0;) {
crypto/openssl/crypto/property/property.c
503
IMPLEMENTATION *impl = sk_IMPLEMENTATION_value(alg->impls, i);
crypto/openssl/crypto/property/property.c
522
(void)sk_IMPLEMENTATION_delete(alg->impls, i);
crypto/openssl/crypto/property/property.c
535
ossl_method_cache_flush_alg(data->store, alg);
crypto/openssl/crypto/property/property.c
552
static void alg_do_one(ALGORITHM *alg, IMPLEMENTATION *impl,
crypto/openssl/crypto/property/property.c
556
fn(alg->nid, impl->method.method, fnarg);
crypto/openssl/crypto/property/property.c
559
static void alg_copy(ossl_uintmax_t idx, ALGORITHM *alg, void *arg)
crypto/openssl/crypto/property/property.c
563
alg = OPENSSL_memdup(alg, sizeof(ALGORITHM));
crypto/openssl/crypto/property/property.c
564
if (alg == NULL)
crypto/openssl/crypto/property/property.c
567
alg->impls = sk_IMPLEMENTATION_dup(alg->impls);
crypto/openssl/crypto/property/property.c
569
(void)sk_ALGORITHM_push(newalg, alg);
crypto/openssl/crypto/property/property.c
572
static void del_tmpalg(ALGORITHM *alg)
crypto/openssl/crypto/property/property.c
574
sk_IMPLEMENTATION_free(alg->impls);
crypto/openssl/crypto/property/property.c
575
OPENSSL_free(alg);
crypto/openssl/crypto/property/property.c
585
ALGORITHM *alg;
crypto/openssl/crypto/property/property.c
603
alg = sk_ALGORITHM_value(tmpalgs, i);
crypto/openssl/crypto/property/property.c
604
numimps = sk_IMPLEMENTATION_num(alg->impls);
crypto/openssl/crypto/property/property.c
606
alg_do_one(alg, sk_IMPLEMENTATION_value(alg->impls, j), fn, fnarg);
crypto/openssl/crypto/property/property.c
640
ALGORITHM *alg;
crypto/openssl/crypto/property/property.c
661
alg = ossl_method_store_retrieve(store, nid);
crypto/openssl/crypto/property/property.c
662
if (alg == NULL) {
crypto/openssl/crypto/property/property.c
701
for (j = 0; j < sk_IMPLEMENTATION_num(alg->impls); j++) {
crypto/openssl/crypto/property/property.c
702
if ((impl = sk_IMPLEMENTATION_value(alg->impls, j)) != NULL
crypto/openssl/crypto/property/property.c
718
for (j = 0; j < sk_IMPLEMENTATION_num(alg->impls); j++) {
crypto/openssl/crypto/property/property.c
719
if ((impl = sk_IMPLEMENTATION_value(alg->impls, j)) != NULL
crypto/openssl/crypto/property/property.c
761
ALGORITHM *alg)
crypto/openssl/crypto/property/property.c
763
store->cache_nelem -= lh_QUERY_num_items(alg->cache);
crypto/openssl/crypto/property/property.c
764
impl_cache_flush_alg(0, alg);
crypto/openssl/crypto/property/property.c
769
ALGORITHM *alg = ossl_method_store_retrieve(store, nid);
crypto/openssl/crypto/property/property.c
771
if (alg != NULL)
crypto/openssl/crypto/property/property.c
772
ossl_method_cache_flush_alg(store, alg);
crypto/openssl/crypto/property/property.c
826
static void impl_cache_flush_one_alg(ossl_uintmax_t idx, ALGORITHM *alg,
crypto/openssl/crypto/property/property.c
830
unsigned long orig_down_load = lh_QUERY_get_down_load(alg->cache);
crypto/openssl/crypto/property/property.c
832
state->cache = alg->cache;
crypto/openssl/crypto/property/property.c
833
lh_QUERY_set_down_load(alg->cache, 0);
crypto/openssl/crypto/property/property.c
836
lh_QUERY_set_down_load(alg->cache, orig_down_load);
crypto/openssl/crypto/property/property.c
862
ALGORITHM *alg;
crypto/openssl/crypto/property/property.c
871
alg = ossl_method_store_retrieve(store, nid);
crypto/openssl/crypto/property/property.c
872
if (alg == NULL)
crypto/openssl/crypto/property/property.c
877
r = lh_QUERY_retrieve(alg->cache, &elem);
crypto/openssl/crypto/property/property.c
895
ALGORITHM *alg;
crypto/openssl/crypto/property/property.c
909
alg = ossl_method_store_retrieve(store, nid);
crypto/openssl/crypto/property/property.c
910
if (alg == NULL)
crypto/openssl/crypto/property/property.c
916
if ((old = lh_QUERY_delete(alg->cache, &elem)) != NULL) {
crypto/openssl/crypto/property/property.c
932
if ((old = lh_QUERY_insert(alg->cache, p)) != NULL) {
crypto/openssl/crypto/property/property.c
936
if (!lh_QUERY_error(alg->cache)) {
crypto/openssl/crypto/rsa/rsa_ameth.c
80
X509_ALGOR *alg;
crypto/openssl/crypto/rsa/rsa_ameth.c
83
if (!X509_PUBKEY_get0_param(NULL, &p, &pklen, &alg, pubkey))
crypto/openssl/crypto/rsa/rsa_ameth.c
87
if (!ossl_rsa_param_decode(rsa, alg)) {
crypto/openssl/crypto/rsa/rsa_backend.c
563
RSA_PSS_PARAMS *ossl_rsa_pss_decode(const X509_ALGOR *alg)
crypto/openssl/crypto/rsa/rsa_backend.c
568
alg->parameter);
crypto/openssl/crypto/rsa/rsa_backend.c
652
int ossl_rsa_param_decode(RSA *rsa, const X509_ALGOR *alg)
crypto/openssl/crypto/rsa/rsa_backend.c
659
X509_ALGOR_get0(&algoid, &algptype, &algp, alg);
crypto/openssl/crypto/rsa/rsa_backend.c
668
if ((pss = ossl_rsa_pss_decode(alg)) == NULL
crypto/openssl/crypto/rsa/rsa_backend.c
684
const X509_ALGOR *alg;
crypto/openssl/crypto/rsa/rsa_backend.c
686
if (!PKCS8_pkey_get0(NULL, &p, &pklen, &alg, p8inf))
crypto/openssl/crypto/rsa/rsa_backend.c
693
if (!ossl_rsa_param_decode(rsa, alg)) {
crypto/openssl/crypto/rsa/rsa_backend.c
699
switch (OBJ_obj2nid(alg->algorithm)) {
crypto/openssl/crypto/slh_dsa/slh_dsa_key.c
102
const SLH_DSA_PARAMS *params = ossl_slh_dsa_params_get(alg);
crypto/openssl/crypto/slh_dsa/slh_dsa_key.c
409
int ossl_slh_dsa_key_type_matches(const SLH_DSA_KEY *key, const char *alg)
crypto/openssl/crypto/slh_dsa/slh_dsa_key.c
411
return (OPENSSL_strcasecmp(key->params->alg, alg) == 0);
crypto/openssl/crypto/slh_dsa/slh_dsa_key.c
453
return key->params->alg;
crypto/openssl/crypto/slh_dsa/slh_dsa_key.c
99
const char *alg)
crypto/openssl/crypto/slh_dsa/slh_params.c
115
const SLH_DSA_PARAMS *ossl_slh_dsa_params_get(const char *alg)
crypto/openssl/crypto/slh_dsa/slh_params.c
119
if (alg == NULL)
crypto/openssl/crypto/slh_dsa/slh_params.c
121
for (p = slh_dsa_params; p->alg != NULL; ++p) {
crypto/openssl/crypto/slh_dsa/slh_params.c
122
if (strcmp(p->alg, alg) == 0)
crypto/openssl/crypto/slh_dsa/slh_params.h
23
const char *alg;
crypto/openssl/crypto/slh_dsa/slh_params.h
39
const SLH_DSA_PARAMS *ossl_slh_dsa_params_get(const char *alg);
crypto/openssl/crypto/store/store_result.c
358
const X509_ALGOR *alg = NULL;
crypto/openssl/crypto/store/store_result.c
362
X509_SIG_get0(p8, &alg, &oct);
crypto/openssl/crypto/store/store_result.c
368
PKCS12_pbe_crypt(alg, pbuf, plen,
crypto/openssl/crypto/ts/ts_lib.c
73
int TS_X509_ALGOR_print_bio(BIO *bio, const X509_ALGOR *alg)
crypto/openssl/crypto/ts/ts_lib.c
75
int i = OBJ_obj2nid(alg->algorithm);
crypto/openssl/crypto/ts/ts_req_utils.c
48
int TS_MSG_IMPRINT_set_algo(TS_MSG_IMPRINT *a, X509_ALGOR *alg)
crypto/openssl/crypto/ts/ts_req_utils.c
52
if (a->hash_algo == alg)
crypto/openssl/crypto/ts/ts_req_utils.c
54
new_alg = X509_ALGOR_dup(alg);
crypto/openssl/crypto/x509/x509_set.c
212
static int x509_sig_info_init(X509_SIG_INFO *siginf, const X509_ALGOR *alg,
crypto/openssl/crypto/x509/x509_set.c
223
if (!OBJ_find_sigid_algs(OBJ_obj2nid(alg->algorithm), &mdnid, &pknid)
crypto/openssl/crypto/x509/x509_set.c
236
&& ameth->siginf_set(siginf, alg, sig))
crypto/openssl/engines/e_capi.c
846
ALG_ID alg;
crypto/openssl/engines/e_capi.c
866
alg = CALG_SHA_256;
crypto/openssl/engines/e_capi.c
870
alg = CALG_SHA_384;
crypto/openssl/engines/e_capi.c
874
alg = CALG_SHA_512;
crypto/openssl/engines/e_capi.c
878
alg = CALG_SHA1;
crypto/openssl/engines/e_capi.c
882
alg = CALG_MD5;
crypto/openssl/engines/e_capi.c
886
alg = CALG_SSL3_SHAMD5;
crypto/openssl/engines/e_capi.c
898
if (!CryptCreateHash(capi_key->hprov, alg, 0, 0, &hash)) {
crypto/openssl/fuzz/ml-dsa.c
308
const char *alg = EVP_PKEY_get0_type_name(key);
crypto/openssl/fuzz/ml-dsa.c
323
|| ctx == NULL || alg == NULL
crypto/openssl/fuzz/ml-dsa.c
335
if ((sig_alg = EVP_SIGNATURE_fetch(NULL, alg, NULL)) == NULL
crypto/openssl/fuzz/provider.c
582
evp *alg = sk_##evp##_value(source, *algorithm % sk_##evp##_num(source)); \
crypto/openssl/fuzz/provider.c
585
if (alg == NULL) \
crypto/openssl/fuzz/provider.c
587
fuzzed_params = fuzz_params((OSSL_PARAM *)evp##_settable_ctx_params(alg), &buf, &len); \
crypto/openssl/fuzz/provider.c
589
f(alg, fuzzed_params); \
crypto/openssl/include/crypto/asn1.h
140
const EVP_MD *ossl_x509_algor_get_md(X509_ALGOR *alg);
crypto/openssl/include/crypto/asn1.h
141
X509_ALGOR *ossl_x509_algor_mgf1_decode(X509_ALGOR *alg);
crypto/openssl/include/crypto/asn1.h
65
int (*siginf_set)(X509_SIG_INFO *siginf, const X509_ALGOR *alg,
crypto/openssl/include/crypto/ml_dsa.h
56
const char *alg;
crypto/openssl/include/crypto/rsa.h
87
RSA_PSS_PARAMS *ossl_rsa_pss_decode(const X509_ALGOR *alg);
crypto/openssl/include/crypto/rsa.h
88
int ossl_rsa_param_decode(RSA *rsa, const X509_ALGOR *alg);
crypto/openssl/include/crypto/slh_dsa.h
28
const char *alg);
crypto/openssl/include/crypto/slh_dsa.h
54
__owur int ossl_slh_dsa_key_type_matches(const SLH_DSA_KEY *key, const char *alg);
crypto/openssl/include/internal/ffc.h
140
void ossl_ffc_set_digest(FFC_PARAMS *params, const char *alg, const char *props);
crypto/openssl/include/openssl/asn1.h
912
int ASN1_item_verify_ex(const ASN1_ITEM *it, const X509_ALGOR *alg,
crypto/openssl/include/openssl/cmp.h
483
OSSL_CMP_ATAV *OSSL_CMP_ATAV_new_algId(const X509_ALGOR *alg);
crypto/openssl/include/openssl/evp.h
1686
const X509_ALGOR *alg,
crypto/openssl/include/openssl/evp.h
1871
int EVP_PKEY_CTX_set_algor_params(EVP_PKEY_CTX *ctx, const X509_ALGOR *alg);
crypto/openssl/include/openssl/evp.h
1872
int EVP_PKEY_CTX_get_algor_params(EVP_PKEY_CTX *ctx, X509_ALGOR *alg);
crypto/openssl/include/openssl/evp.h
1873
int EVP_PKEY_CTX_get_algor(EVP_PKEY_CTX *ctx, X509_ALGOR **alg);
crypto/openssl/include/openssl/evp.h
929
int EVP_CIPHER_CTX_set_algor_params(EVP_CIPHER_CTX *ctx, const X509_ALGOR *alg);
crypto/openssl/include/openssl/evp.h
930
int EVP_CIPHER_CTX_get_algor_params(EVP_CIPHER_CTX *ctx, X509_ALGOR *alg);
crypto/openssl/include/openssl/evp.h
931
int EVP_CIPHER_CTX_get_algor(EVP_CIPHER_CTX *ctx, X509_ALGOR **alg);
crypto/openssl/include/openssl/ssl.h
2894
int SSL_CTX_compress_certs(SSL_CTX *ctx, int alg);
crypto/openssl/include/openssl/ssl.h
2895
int SSL_compress_certs(SSL *ssl, int alg);
crypto/openssl/include/openssl/ssl.h
2904
size_t SSL_CTX_get1_compressed_cert(SSL_CTX *ctx, int alg, unsigned char **data, size_t *orig_len);
crypto/openssl/include/openssl/ssl.h
2905
size_t SSL_get1_compressed_cert(SSL *ssl, int alg, unsigned char **data, size_t *orig_len);
crypto/openssl/include/openssl/ts.h
137
int TS_MSG_IMPRINT_set_algo(TS_MSG_IMPRINT *a, X509_ALGOR *alg);
crypto/openssl/include/openssl/ts.h
475
int TS_X509_ALGOR_print_bio(BIO *bio, const X509_ALGOR *alg);
crypto/openssl/include/openssl/x509.h
1228
int PKCS5_pbe_set0_algor(X509_ALGOR *algor, int alg, int iter,
crypto/openssl/include/openssl/x509.h
1230
int PKCS5_pbe_set0_algor_ex(X509_ALGOR *algor, int alg, int iter,
crypto/openssl/include/openssl/x509.h
1234
X509_ALGOR *PKCS5_pbe_set(int alg, int iter,
crypto/openssl/include/openssl/x509.h
1236
X509_ALGOR *PKCS5_pbe_set_ex(int alg, int iter,
crypto/openssl/include/openssl/x509.h
541
int X509_signature_print(BIO *bp, const X509_ALGOR *alg,
crypto/openssl/include/openssl/x509.h
681
int X509_ALGOR_set0(X509_ALGOR *alg, ASN1_OBJECT *aobj, int ptype,
crypto/openssl/include/openssl/x509.h
685
void X509_ALGOR_set_md(X509_ALGOR *alg, const EVP_MD *md);
crypto/openssl/include/openssl/x509.h
832
int ASN1_item_verify(const ASN1_ITEM *it, const X509_ALGOR *alg,
crypto/openssl/include/openssl/x509.h
835
int ASN1_item_verify_ctx(const ASN1_ITEM *it, const X509_ALGOR *alg,
crypto/openssl/providers/common/der/der_ml_dsa_key.c
21
const uint8_t *alg;
crypto/openssl/providers/common/der/der_ml_dsa_key.c
26
alg = ossl_der_oid_id_ml_dsa_44;
crypto/openssl/providers/common/der/der_ml_dsa_key.c
29
alg = ossl_der_oid_id_ml_dsa_65;
crypto/openssl/providers/common/der/der_ml_dsa_key.c
32
alg = ossl_der_oid_id_ml_dsa_87;
crypto/openssl/providers/common/der/der_ml_dsa_key.c
39
&& ossl_DER_w_precompiled(pkt, -1, alg, len)
crypto/openssl/providers/common/der/der_slh_dsa_key.c
17
alg = ossl_der_oid_##name; \
crypto/openssl/providers/common/der/der_slh_dsa_key.c
23
const uint8_t *alg;
crypto/openssl/providers/common/der/der_slh_dsa_key.c
45
&& ossl_DER_w_precompiled(pkt, -1, alg, len)
crypto/openssl/providers/common/include/prov/provider_util.h
131
OSSL_ALGORITHM alg;
crypto/openssl/providers/common/provider_util.c
355
for (i = j = 0; in[i].alg.algorithm_names != NULL; ++i) {
crypto/openssl/providers/common/provider_util.c
357
out[j++] = in[i].alg;
crypto/openssl/providers/common/provider_util.c
359
out[j++] = in[i].alg;
crypto/openssl/providers/implementations/ciphers/cipher_aes_gcm_siv.c
273
#define IMPLEMENT_cipher(alg, lc, UCMODE, flags, kbits, blkbits, ivbits) \
crypto/openssl/providers/implementations/ciphers/cipher_aes_gcm_siv.c
274
static OSSL_FUNC_cipher_newctx_fn ossl_##alg##kbits##_##lc##_newctx; \
crypto/openssl/providers/implementations/ciphers/cipher_aes_gcm_siv.c
275
static OSSL_FUNC_cipher_freectx_fn ossl_##alg##_##lc##_freectx; \
crypto/openssl/providers/implementations/ciphers/cipher_aes_gcm_siv.c
276
static OSSL_FUNC_cipher_dupctx_fn ossl_##alg##_##lc##_dupctx; \
crypto/openssl/providers/implementations/ciphers/cipher_aes_gcm_siv.c
277
static OSSL_FUNC_cipher_encrypt_init_fn ossl_##alg##_##lc##_einit; \
crypto/openssl/providers/implementations/ciphers/cipher_aes_gcm_siv.c
278
static OSSL_FUNC_cipher_decrypt_init_fn ossl_##alg##_##lc##_dinit; \
crypto/openssl/providers/implementations/ciphers/cipher_aes_gcm_siv.c
279
static OSSL_FUNC_cipher_update_fn ossl_##alg##_##lc##_stream_update; \
crypto/openssl/providers/implementations/ciphers/cipher_aes_gcm_siv.c
280
static OSSL_FUNC_cipher_final_fn ossl_##alg##_##lc##_stream_final; \
crypto/openssl/providers/implementations/ciphers/cipher_aes_gcm_siv.c
281
static OSSL_FUNC_cipher_cipher_fn ossl_##alg##_##lc##_cipher; \
crypto/openssl/providers/implementations/ciphers/cipher_aes_gcm_siv.c
282
static OSSL_FUNC_cipher_get_params_fn ossl_##alg##_##kbits##_##lc##_get_params; \
crypto/openssl/providers/implementations/ciphers/cipher_aes_gcm_siv.c
283
static OSSL_FUNC_cipher_get_ctx_params_fn ossl_##alg##_##lc##_get_ctx_params; \
crypto/openssl/providers/implementations/ciphers/cipher_aes_gcm_siv.c
284
static OSSL_FUNC_cipher_gettable_ctx_params_fn ossl_##alg##_##lc##_gettable_ctx_params; \
crypto/openssl/providers/implementations/ciphers/cipher_aes_gcm_siv.c
285
static OSSL_FUNC_cipher_set_ctx_params_fn ossl_##alg##_##lc##_set_ctx_params; \
crypto/openssl/providers/implementations/ciphers/cipher_aes_gcm_siv.c
286
static OSSL_FUNC_cipher_settable_ctx_params_fn ossl_##alg##_##lc##_settable_ctx_params; \
crypto/openssl/providers/implementations/ciphers/cipher_aes_gcm_siv.c
287
static int ossl_##alg##_##kbits##_##lc##_get_params(OSSL_PARAM params[]) \
crypto/openssl/providers/implementations/ciphers/cipher_aes_gcm_siv.c
292
static void *ossl_##alg##kbits##_##lc##_newctx(void *provctx) \
crypto/openssl/providers/implementations/ciphers/cipher_aes_gcm_siv.c
294
return ossl_##alg##_##lc##_newctx(provctx, kbits); \
crypto/openssl/providers/implementations/ciphers/cipher_aes_gcm_siv.c
296
const OSSL_DISPATCH ossl_##alg##kbits##lc##_functions[] = { \
crypto/openssl/providers/implementations/ciphers/cipher_aes_gcm_siv.c
297
{ OSSL_FUNC_CIPHER_NEWCTX, (void (*)(void))ossl_##alg##kbits##_##lc##_newctx }, \
crypto/openssl/providers/implementations/ciphers/cipher_aes_gcm_siv.c
298
{ OSSL_FUNC_CIPHER_FREECTX, (void (*)(void))ossl_##alg##_##lc##_freectx }, \
crypto/openssl/providers/implementations/ciphers/cipher_aes_gcm_siv.c
299
{ OSSL_FUNC_CIPHER_DUPCTX, (void (*)(void))ossl_##alg##_##lc##_dupctx }, \
crypto/openssl/providers/implementations/ciphers/cipher_aes_gcm_siv.c
300
{ OSSL_FUNC_CIPHER_ENCRYPT_INIT, (void (*)(void))ossl_##alg##_##lc##_einit }, \
crypto/openssl/providers/implementations/ciphers/cipher_aes_gcm_siv.c
301
{ OSSL_FUNC_CIPHER_DECRYPT_INIT, (void (*)(void))ossl_##alg##_##lc##_dinit }, \
crypto/openssl/providers/implementations/ciphers/cipher_aes_gcm_siv.c
302
{ OSSL_FUNC_CIPHER_UPDATE, (void (*)(void))ossl_##alg##_##lc##_stream_update }, \
crypto/openssl/providers/implementations/ciphers/cipher_aes_gcm_siv.c
303
{ OSSL_FUNC_CIPHER_FINAL, (void (*)(void))ossl_##alg##_##lc##_stream_final }, \
crypto/openssl/providers/implementations/ciphers/cipher_aes_gcm_siv.c
304
{ OSSL_FUNC_CIPHER_CIPHER, (void (*)(void))ossl_##alg##_##lc##_cipher }, \
crypto/openssl/providers/implementations/ciphers/cipher_aes_gcm_siv.c
305
{ OSSL_FUNC_CIPHER_GET_PARAMS, (void (*)(void))ossl_##alg##_##kbits##_##lc##_get_params }, \
crypto/openssl/providers/implementations/ciphers/cipher_aes_gcm_siv.c
307
{ OSSL_FUNC_CIPHER_GET_CTX_PARAMS, (void (*)(void))ossl_##alg##_##lc##_get_ctx_params }, \
crypto/openssl/providers/implementations/ciphers/cipher_aes_gcm_siv.c
308
{ OSSL_FUNC_CIPHER_GETTABLE_CTX_PARAMS, (void (*)(void))ossl_##alg##_##lc##_gettable_ctx_params }, \
crypto/openssl/providers/implementations/ciphers/cipher_aes_gcm_siv.c
309
{ OSSL_FUNC_CIPHER_SET_CTX_PARAMS, (void (*)(void))ossl_##alg##_##lc##_set_ctx_params }, \
crypto/openssl/providers/implementations/ciphers/cipher_aes_gcm_siv.c
310
{ OSSL_FUNC_CIPHER_SETTABLE_CTX_PARAMS, (void (*)(void))ossl_##alg##_##lc##_settable_ctx_params }, \
crypto/openssl/providers/implementations/ciphers/cipher_aes_siv.c
244
#define IMPLEMENT_cipher(alg, lc, UCMODE, flags, kbits, blkbits, ivbits) \
crypto/openssl/providers/implementations/ciphers/cipher_aes_siv.c
245
static OSSL_FUNC_cipher_newctx_fn alg##kbits##lc##_newctx; \
crypto/openssl/providers/implementations/ciphers/cipher_aes_siv.c
246
static OSSL_FUNC_cipher_freectx_fn alg##_##lc##_freectx; \
crypto/openssl/providers/implementations/ciphers/cipher_aes_siv.c
253
static OSSL_FUNC_cipher_get_params_fn alg##_##kbits##_##lc##_get_params; \
crypto/openssl/providers/implementations/ciphers/cipher_aes_siv.c
254
static OSSL_FUNC_cipher_get_ctx_params_fn alg##_##lc##_get_ctx_params; \
crypto/openssl/providers/implementations/ciphers/cipher_aes_siv.c
256
alg##_##lc##_gettable_ctx_params; \
crypto/openssl/providers/implementations/ciphers/cipher_aes_siv.c
257
static OSSL_FUNC_cipher_set_ctx_params_fn alg##_##lc##_set_ctx_params; \
crypto/openssl/providers/implementations/ciphers/cipher_aes_siv.c
259
alg##_##lc##_settable_ctx_params; \
crypto/openssl/providers/implementations/ciphers/cipher_aes_siv.c
260
static int alg##_##kbits##_##lc##_get_params(OSSL_PARAM params[]) \
crypto/openssl/providers/implementations/ciphers/cipher_aes_siv.c
265
static void *alg##kbits##lc##_newctx(void *provctx) \
crypto/openssl/providers/implementations/ciphers/cipher_aes_siv.c
267
return alg##_##lc##_newctx(provctx, 2 * kbits, EVP_CIPH_##UCMODE##_MODE, \
crypto/openssl/providers/implementations/ciphers/cipher_aes_siv.c
270
const OSSL_DISPATCH ossl_##alg##kbits##lc##_functions[] = { \
crypto/openssl/providers/implementations/ciphers/cipher_aes_siv.c
271
{ OSSL_FUNC_CIPHER_NEWCTX, (void (*)(void))alg##kbits##lc##_newctx }, \
crypto/openssl/providers/implementations/ciphers/cipher_aes_siv.c
272
{ OSSL_FUNC_CIPHER_FREECTX, (void (*)(void))alg##_##lc##_freectx }, \
crypto/openssl/providers/implementations/ciphers/cipher_aes_siv.c
280
(void (*)(void))alg##_##kbits##_##lc##_get_params }, \
crypto/openssl/providers/implementations/ciphers/cipher_aes_siv.c
284
(void (*)(void))alg##_##lc##_get_ctx_params }, \
crypto/openssl/providers/implementations/ciphers/cipher_aes_siv.c
286
(void (*)(void))alg##_##lc##_gettable_ctx_params }, \
crypto/openssl/providers/implementations/ciphers/cipher_aes_siv.c
288
(void (*)(void))alg##_##lc##_set_ctx_params }, \
crypto/openssl/providers/implementations/ciphers/cipher_aes_siv.c
290
(void (*)(void))alg##_##lc##_settable_ctx_params }, \
crypto/openssl/providers/implementations/ciphers/cipher_cts.h
13
#define IMPLEMENT_cts_cipher(alg, UCALG, lcmode, UCMODE, flags, kbits, \
crypto/openssl/providers/implementations/ciphers/cipher_cts.h
15
static OSSL_FUNC_cipher_get_params_fn alg##_##kbits##_##lcmode##_get_params; \
crypto/openssl/providers/implementations/ciphers/cipher_cts.h
16
static int alg##_cts_##kbits##_##lcmode##_get_params(OSSL_PARAM params[]) \
crypto/openssl/providers/implementations/ciphers/cipher_cts.h
21
const OSSL_DISPATCH ossl_##alg##kbits##lcmode##_cts_functions[] = { \
crypto/openssl/providers/implementations/ciphers/cipher_cts.h
23
(void (*)(void))alg##_##kbits##_##lcmode##_newctx }, \
crypto/openssl/providers/implementations/ciphers/cipher_cts.h
24
{ OSSL_FUNC_CIPHER_FREECTX, (void (*)(void))alg##_freectx }, \
crypto/openssl/providers/implementations/ciphers/cipher_cts.h
25
{ OSSL_FUNC_CIPHER_DUPCTX, (void (*)(void))alg##_dupctx }, \
crypto/openssl/providers/implementations/ciphers/cipher_cts.h
26
{ OSSL_FUNC_CIPHER_ENCRYPT_INIT, (void (*)(void))alg##_cbc_cts_einit }, \
crypto/openssl/providers/implementations/ciphers/cipher_cts.h
27
{ OSSL_FUNC_CIPHER_DECRYPT_INIT, (void (*)(void))alg##_cbc_cts_dinit }, \
crypto/openssl/providers/implementations/ciphers/cipher_cts.h
34
(void (*)(void))alg##_cts_##kbits##_##lcmode##_get_params }, \
crypto/openssl/providers/implementations/ciphers/cipher_cts.h
38
(void (*)(void))alg##_cbc_cts_get_ctx_params }, \
crypto/openssl/providers/implementations/ciphers/cipher_cts.h
40
(void (*)(void))alg##_cbc_cts_set_ctx_params }, \
crypto/openssl/providers/implementations/ciphers/cipher_cts.h
42
(void (*)(void))alg##_cbc_cts_gettable_ctx_params }, \
crypto/openssl/providers/implementations/ciphers/cipher_cts.h
44
(void (*)(void))alg##_cbc_cts_settable_ctx_params }, \
crypto/openssl/providers/implementations/ciphers/cipher_rc2.c
234
#define IMPLEMENT_cipher(alg, UCALG, lcmode, UCMODE, flags, kbits, blkbits, \
crypto/openssl/providers/implementations/ciphers/cipher_rc2.c
236
static OSSL_FUNC_cipher_get_params_fn alg##_##kbits##_##lcmode##_get_params; \
crypto/openssl/providers/implementations/ciphers/cipher_rc2.c
237
static int alg##_##kbits##_##lcmode##_get_params(OSSL_PARAM params[]) \
crypto/openssl/providers/implementations/ciphers/cipher_rc2.c
242
static OSSL_FUNC_cipher_newctx_fn alg##_##kbits##_##lcmode##_newctx; \
crypto/openssl/providers/implementations/ciphers/cipher_rc2.c
243
static void *alg##_##kbits##_##lcmode##_newctx(void *provctx) \
crypto/openssl/providers/implementations/ciphers/cipher_rc2.c
252
ossl_prov_cipher_hw_##alg##_##lcmode(kbits), \
crypto/openssl/providers/implementations/ciphers/cipher_rc2.c
258
const OSSL_DISPATCH ossl_##alg##kbits##lcmode##_functions[] = { \
crypto/openssl/providers/implementations/ciphers/cipher_rc2.c
260
(void (*)(void))alg##_##kbits##_##lcmode##_newctx }, \
crypto/openssl/providers/implementations/ciphers/cipher_rc2.c
261
{ OSSL_FUNC_CIPHER_FREECTX, (void (*)(void))alg##_freectx }, \
crypto/openssl/providers/implementations/ciphers/cipher_rc2.c
262
{ OSSL_FUNC_CIPHER_DUPCTX, (void (*)(void))alg##_dupctx }, \
crypto/openssl/providers/implementations/ciphers/cipher_rc2.c
269
(void (*)(void))alg##_##kbits##_##lcmode##_get_params }, \
crypto/openssl/providers/implementations/ciphers/cipher_rc4.c
102
(void (*)(void))alg##_##kbits##_get_params }, \
crypto/openssl/providers/implementations/ciphers/cipher_rc4.c
71
#define IMPLEMENT_cipher(alg, UCALG, flags, kbits, blkbits, ivbits, typ) \
crypto/openssl/providers/implementations/ciphers/cipher_rc4.c
72
static OSSL_FUNC_cipher_get_params_fn alg##_##kbits##_get_params; \
crypto/openssl/providers/implementations/ciphers/cipher_rc4.c
73
static int alg##_##kbits##_get_params(OSSL_PARAM params[]) \
crypto/openssl/providers/implementations/ciphers/cipher_rc4.c
78
static OSSL_FUNC_cipher_newctx_fn alg##_##kbits##_newctx; \
crypto/openssl/providers/implementations/ciphers/cipher_rc4.c
79
static void *alg##_##kbits##_newctx(void *provctx) \
crypto/openssl/providers/implementations/ciphers/cipher_rc4.c
87
ossl_prov_cipher_hw_##alg(kbits), NULL); \
crypto/openssl/providers/implementations/ciphers/cipher_rc4.c
91
const OSSL_DISPATCH ossl_##alg##kbits##_functions[] = { \
crypto/openssl/providers/implementations/ciphers/cipher_rc4.c
93
(void (*)(void))alg##_##kbits##_newctx }, \
crypto/openssl/providers/implementations/ciphers/cipher_rc4.c
94
{ OSSL_FUNC_CIPHER_FREECTX, (void (*)(void))alg##_freectx }, \
crypto/openssl/providers/implementations/ciphers/cipher_rc4.c
95
{ OSSL_FUNC_CIPHER_DUPCTX, (void (*)(void))alg##_dupctx }, \
crypto/openssl/providers/implementations/ciphers/cipher_rc5.c
129
#define IMPLEMENT_cipher(alg, UCALG, lcmode, UCMODE, flags, kbits, \
crypto/openssl/providers/implementations/ciphers/cipher_rc5.c
131
static OSSL_FUNC_cipher_get_params_fn alg##_##kbits##_##lcmode##_get_params; \
crypto/openssl/providers/implementations/ciphers/cipher_rc5.c
132
static int alg##_##kbits##_##lcmode##_get_params(OSSL_PARAM params[]) \
crypto/openssl/providers/implementations/ciphers/cipher_rc5.c
137
static OSSL_FUNC_cipher_newctx_fn alg##_##kbits##_##lcmode##_newctx; \
crypto/openssl/providers/implementations/ciphers/cipher_rc5.c
138
static void *alg##_##kbits##_##lcmode##_newctx(void *provctx) \
crypto/openssl/providers/implementations/ciphers/cipher_rc5.c
147
ossl_prov_cipher_hw_##alg##_##lcmode(kbits), \
crypto/openssl/providers/implementations/ciphers/cipher_rc5.c
153
const OSSL_DISPATCH ossl_##alg##kbits##lcmode##_functions[] = { \
crypto/openssl/providers/implementations/ciphers/cipher_rc5.c
155
(void (*)(void))alg##_##kbits##_##lcmode##_newctx }, \
crypto/openssl/providers/implementations/ciphers/cipher_rc5.c
156
{ OSSL_FUNC_CIPHER_FREECTX, (void (*)(void))alg##_freectx }, \
crypto/openssl/providers/implementations/ciphers/cipher_rc5.c
157
{ OSSL_FUNC_CIPHER_DUPCTX, (void (*)(void))alg##_dupctx }, \
crypto/openssl/providers/implementations/ciphers/cipher_rc5.c
164
(void (*)(void))alg##_##kbits##_##lcmode##_get_params }, \
crypto/openssl/providers/implementations/encode_decode/decode_der2key.c
137
const X509_ALGOR *alg = NULL;
crypto/openssl/providers/implementations/encode_decode/decode_der2key.c
141
&& PKCS8_pkey_get0(NULL, NULL, NULL, &alg, p8inf)
crypto/openssl/providers/implementations/encode_decode/decode_der2key.c
142
&& (OBJ_obj2nid(alg->algorithm) == ctx->desc->evp_type
crypto/openssl/providers/implementations/encode_decode/decode_der2key.c
144
|| (OBJ_obj2nid(alg->algorithm) == NID_X9_62_id_ecPublicKey
crypto/openssl/providers/implementations/encode_decode/decode_der2key.c
648
const X509_ALGOR *alg = NULL;
crypto/openssl/providers/implementations/encode_decode/decode_der2key.c
652
|| !PKCS8_pkey_get0(NULL, &p, &plen, &alg, p8inf))
crypto/openssl/providers/implementations/encode_decode/decode_der2key.c
656
if ((X509_ALGOR_get0(NULL, &ptype, NULL, alg), ptype != V_ASN1_UNDEF)) {
crypto/openssl/providers/implementations/encode_decode/decode_der2key.c
662
if (OBJ_obj2nid(alg->algorithm) != ctx->desc->evp_type)
crypto/openssl/providers/implementations/encode_decode/decode_epki2pki.c
125
const X509_ALGOR *alg = NULL;
crypto/openssl/providers/implementations/encode_decode/decode_epki2pki.c
142
X509_SIG_get0(p8, &alg, &oct);
crypto/openssl/providers/implementations/encode_decode/decode_epki2pki.c
143
if (!PKCS12_pbe_crypt_ex(alg, pbuf, plen,
crypto/openssl/providers/implementations/encode_decode/decode_epki2pki.c
152
alg = NULL;
crypto/openssl/providers/implementations/encode_decode/decode_epki2pki.c
164
if (p8inf != NULL && PKCS8_pkey_get0(NULL, NULL, NULL, &alg, p8inf)) {
crypto/openssl/providers/implementations/encode_decode/decode_epki2pki.c
173
OBJ_obj2txt(keytype, sizeof(keytype), alg->algorithm, 0);
crypto/openssl/providers/implementations/encode_decode/ml_dsa_codecs.c
391
params->alg);
crypto/openssl/providers/implementations/encode_decode/ml_dsa_codecs.c
411
const X509_ALGOR *alg = NULL;
crypto/openssl/providers/implementations/encode_decode/ml_dsa_codecs.c
428
if (!PKCS8_pkey_get0(NULL, &buf, &len, &alg, p8inf))
crypto/openssl/providers/implementations/encode_decode/ml_dsa_codecs.c
431
if (OBJ_obj2nid(alg->algorithm) != evp_type)
crypto/openssl/providers/implementations/encode_decode/ml_dsa_codecs.c
437
fmt_slots = ossl_ml_common_pkcs8_fmt_order(v->alg, codec->p8fmt,
crypto/openssl/providers/implementations/encode_decode/ml_dsa_codecs.c
443
X509_ALGOR_get0(NULL, &ptype, NULL, alg);
crypto/openssl/providers/implementations/encode_decode/ml_dsa_codecs.c
447
v->alg);
crypto/openssl/providers/implementations/encode_decode/ml_dsa_codecs.c
470
v->alg);
crypto/openssl/providers/implementations/encode_decode/ml_dsa_codecs.c
536
"no %s public key data available", params->alg);
crypto/openssl/providers/implementations/encode_decode/ml_dsa_codecs.c
567
params->alg);
crypto/openssl/providers/implementations/encode_decode/ml_dsa_codecs.c
573
fmt_slots = ossl_ml_common_pkcs8_fmt_order(params->alg, codec->p8fmt,
crypto/openssl/providers/implementations/encode_decode/ml_dsa_codecs.c
589
params->alg);
crypto/openssl/providers/implementations/encode_decode/ml_dsa_codecs.c
613
"error encoding %s private key", params->alg);
crypto/openssl/providers/implementations/encode_decode/ml_dsa_codecs.c
626
"error encoding %s private key", params->alg);
crypto/openssl/providers/implementations/encode_decode/ml_dsa_codecs.c
637
"error encoding %s private key", params->alg);
crypto/openssl/providers/implementations/encode_decode/ml_dsa_codecs.c
648
"error encoding %s private key", params->alg);
crypto/openssl/providers/implementations/encode_decode/ml_dsa_codecs.c
684
"no %s key material available", params->alg);
crypto/openssl/providers/implementations/encode_decode/ml_dsa_codecs.c
691
"no %s key material available", params->alg);
crypto/openssl/providers/implementations/encode_decode/ml_dsa_codecs.c
694
if (BIO_printf(out, "%s Private-Key:\n", params->alg) <= 0)
crypto/openssl/providers/implementations/encode_decode/ml_dsa_codecs.c
701
if (BIO_printf(out, "%s Public-Key:\n", params->alg) <= 0)
crypto/openssl/providers/implementations/encode_decode/ml_kem_codecs.c
280
const X509_ALGOR *alg = NULL;
crypto/openssl/providers/implementations/encode_decode/ml_kem_codecs.c
295
if (!PKCS8_pkey_get0(NULL, &buf, &len, &alg, p8inf))
crypto/openssl/providers/implementations/encode_decode/ml_kem_codecs.c
298
if (OBJ_obj2nid(alg->algorithm) != evp_type)
crypto/openssl/providers/implementations/encode_decode/ml_kem_codecs.c
310
X509_ALGOR_get0(NULL, &ptype, NULL, alg);
crypto/openssl/providers/implementations/include/prov/ciphercommon.h
136
#define IMPLEMENT_generic_cipher_func(alg, UCALG, lcmode, UCMODE, flags, kbits, \
crypto/openssl/providers/implementations/include/prov/ciphercommon.h
138
const OSSL_DISPATCH ossl_##alg##kbits##lcmode##_functions[] = { \
crypto/openssl/providers/implementations/include/prov/ciphercommon.h
140
(void (*)(void))alg##_##kbits##_##lcmode##_newctx }, \
crypto/openssl/providers/implementations/include/prov/ciphercommon.h
141
{ OSSL_FUNC_CIPHER_FREECTX, (void (*)(void))alg##_freectx }, \
crypto/openssl/providers/implementations/include/prov/ciphercommon.h
142
{ OSSL_FUNC_CIPHER_DUPCTX, (void (*)(void))alg##_dupctx }, \
crypto/openssl/providers/implementations/include/prov/ciphercommon.h
149
(void (*)(void))alg##_##kbits##_##lcmode##_get_params }, \
crypto/openssl/providers/implementations/include/prov/ciphercommon.h
165
#define IMPLEMENT_var_keylen_cipher_func(alg, UCALG, lcmode, UCMODE, flags, \
crypto/openssl/providers/implementations/include/prov/ciphercommon.h
167
const OSSL_DISPATCH ossl_##alg##kbits##lcmode##_functions[] = { \
crypto/openssl/providers/implementations/include/prov/ciphercommon.h
169
(void (*)(void))alg##_##kbits##_##lcmode##_newctx }, \
crypto/openssl/providers/implementations/include/prov/ciphercommon.h
170
{ OSSL_FUNC_CIPHER_FREECTX, (void (*)(void))alg##_freectx }, \
crypto/openssl/providers/implementations/include/prov/ciphercommon.h
171
{ OSSL_FUNC_CIPHER_DUPCTX, (void (*)(void))alg##_dupctx }, \
crypto/openssl/providers/implementations/include/prov/ciphercommon.h
178
(void (*)(void))alg##_##kbits##_##lcmode##_get_params }, \
crypto/openssl/providers/implementations/include/prov/ciphercommon.h
194
#define IMPLEMENT_generic_cipher_genfn(alg, UCALG, lcmode, UCMODE, flags, \
crypto/openssl/providers/implementations/include/prov/ciphercommon.h
196
static OSSL_FUNC_cipher_get_params_fn alg##_##kbits##_##lcmode##_get_params; \
crypto/openssl/providers/implementations/include/prov/ciphercommon.h
197
static int alg##_##kbits##_##lcmode##_get_params(OSSL_PARAM params[]) \
crypto/openssl/providers/implementations/include/prov/ciphercommon.h
202
static OSSL_FUNC_cipher_newctx_fn alg##_##kbits##_##lcmode##_newctx; \
crypto/openssl/providers/implementations/include/prov/ciphercommon.h
203
static void *alg##_##kbits##_##lcmode##_newctx(void *provctx) \
crypto/openssl/providers/implementations/include/prov/ciphercommon.h
210
ossl_prov_cipher_hw_##alg##_##lcmode(kbits), \
crypto/openssl/providers/implementations/include/prov/ciphercommon.h
216
#define IMPLEMENT_generic_cipher(alg, UCALG, lcmode, UCMODE, flags, kbits, \
crypto/openssl/providers/implementations/include/prov/ciphercommon.h
218
IMPLEMENT_generic_cipher_genfn(alg, UCALG, lcmode, UCMODE, flags, kbits, \
crypto/openssl/providers/implementations/include/prov/ciphercommon.h
220
IMPLEMENT_generic_cipher_func(alg, UCALG, lcmode, UCMODE, flags, kbits, \
crypto/openssl/providers/implementations/include/prov/ciphercommon.h
223
#define IMPLEMENT_var_keylen_cipher(alg, UCALG, lcmode, UCMODE, flags, kbits, \
crypto/openssl/providers/implementations/include/prov/ciphercommon.h
225
IMPLEMENT_generic_cipher_genfn(alg, UCALG, lcmode, UCMODE, flags, kbits, \
crypto/openssl/providers/implementations/include/prov/ciphercommon.h
227
IMPLEMENT_var_keylen_cipher_func(alg, UCALG, lcmode, UCMODE, flags, kbits, \
crypto/openssl/providers/implementations/include/prov/ciphercommon_aead.h
18
#define IMPLEMENT_aead_cipher(alg, lc, UCMODE, flags, kbits, blkbits, ivbits) \
crypto/openssl/providers/implementations/include/prov/ciphercommon_aead.h
19
static OSSL_FUNC_cipher_get_params_fn alg##_##kbits##_##lc##_get_params; \
crypto/openssl/providers/implementations/include/prov/ciphercommon_aead.h
20
static int alg##_##kbits##_##lc##_get_params(OSSL_PARAM params[]) \
crypto/openssl/providers/implementations/include/prov/ciphercommon_aead.h
25
static OSSL_FUNC_cipher_newctx_fn alg##kbits##lc##_newctx; \
crypto/openssl/providers/implementations/include/prov/ciphercommon_aead.h
26
static void *alg##kbits##lc##_newctx(void *provctx) \
crypto/openssl/providers/implementations/include/prov/ciphercommon_aead.h
28
return alg##_##lc##_newctx(provctx, kbits); \
crypto/openssl/providers/implementations/include/prov/ciphercommon_aead.h
30
static void *alg##kbits##lc##_dupctx(void *src) \
crypto/openssl/providers/implementations/include/prov/ciphercommon_aead.h
32
return alg##_##lc##_dupctx(src); \
crypto/openssl/providers/implementations/include/prov/ciphercommon_aead.h
34
const OSSL_DISPATCH ossl_##alg##kbits##lc##_functions[] = { \
crypto/openssl/providers/implementations/include/prov/ciphercommon_aead.h
35
{ OSSL_FUNC_CIPHER_NEWCTX, (void (*)(void))alg##kbits##lc##_newctx }, \
crypto/openssl/providers/implementations/include/prov/ciphercommon_aead.h
36
{ OSSL_FUNC_CIPHER_FREECTX, (void (*)(void))alg##_##lc##_freectx }, \
crypto/openssl/providers/implementations/include/prov/ciphercommon_aead.h
37
{ OSSL_FUNC_CIPHER_DUPCTX, (void (*)(void))alg##kbits##lc##_dupctx }, \
crypto/openssl/providers/implementations/include/prov/ciphercommon_aead.h
44
(void (*)(void))alg##_##kbits##_##lc##_get_params }, \
crypto/openssl/providers/implementations/keymgmt/ecx_kmgmt.c
1010
#define MAKE_KEYMGMT_FUNCTIONS(alg) \
crypto/openssl/providers/implementations/keymgmt/ecx_kmgmt.c
1011
const OSSL_DISPATCH ossl_##alg##_keymgmt_functions[] = { \
crypto/openssl/providers/implementations/keymgmt/ecx_kmgmt.c
1012
{ OSSL_FUNC_KEYMGMT_NEW, (void (*)(void))alg##_new_key }, \
crypto/openssl/providers/implementations/keymgmt/ecx_kmgmt.c
1014
{ OSSL_FUNC_KEYMGMT_GET_PARAMS, (void (*)(void))alg##_get_params }, \
crypto/openssl/providers/implementations/keymgmt/ecx_kmgmt.c
1015
{ OSSL_FUNC_KEYMGMT_GETTABLE_PARAMS, (void (*)(void))alg##_gettable_params }, \
crypto/openssl/providers/implementations/keymgmt/ecx_kmgmt.c
1016
{ OSSL_FUNC_KEYMGMT_SET_PARAMS, (void (*)(void))alg##_set_params }, \
crypto/openssl/providers/implementations/keymgmt/ecx_kmgmt.c
1017
{ OSSL_FUNC_KEYMGMT_SETTABLE_PARAMS, (void (*)(void))alg##_settable_params }, \
crypto/openssl/providers/implementations/keymgmt/ecx_kmgmt.c
1020
{ OSSL_FUNC_KEYMGMT_VALIDATE, (void (*)(void))alg##_validate }, \
crypto/openssl/providers/implementations/keymgmt/ecx_kmgmt.c
1025
{ OSSL_FUNC_KEYMGMT_GEN_INIT, (void (*)(void))alg##_gen_init }, \
crypto/openssl/providers/implementations/keymgmt/ecx_kmgmt.c
1029
{ OSSL_FUNC_KEYMGMT_GEN, (void (*)(void))alg##_gen }, \
crypto/openssl/providers/implementations/keymgmt/ml_dsa_kmgmt.c
208
"Invalid %s public key length", key_params->alg);
crypto/openssl/providers/implementations/keymgmt/ml_dsa_kmgmt.c
229
"Invalid %s private key length", key_params->alg);
crypto/openssl/providers/implementations/keymgmt/ml_dsa_kmgmt.c
264
key_params->alg);
crypto/openssl/providers/implementations/keymgmt/ml_dsa_kmgmt.c
438
key_params->alg);
crypto/openssl/providers/implementations/keymgmt/ml_dsa_kmgmt.c
556
#define MAKE_KEYMGMT_FUNCTIONS(alg) \
crypto/openssl/providers/implementations/keymgmt/ml_dsa_kmgmt.c
557
static OSSL_FUNC_keymgmt_new_fn ml_dsa_##alg##_new_key; \
crypto/openssl/providers/implementations/keymgmt/ml_dsa_kmgmt.c
558
static OSSL_FUNC_keymgmt_gen_fn ml_dsa_##alg##_gen; \
crypto/openssl/providers/implementations/keymgmt/ml_dsa_kmgmt.c
559
static void *ml_dsa_##alg##_new_key(void *provctx) \
crypto/openssl/providers/implementations/keymgmt/ml_dsa_kmgmt.c
561
return ossl_prov_ml_dsa_new(provctx, NULL, EVP_PKEY_ML_DSA_##alg); \
crypto/openssl/providers/implementations/keymgmt/ml_dsa_kmgmt.c
563
static void *ml_dsa_##alg##_gen(void *genctx, OSSL_CALLBACK *osslcb, void *cbarg) \
crypto/openssl/providers/implementations/keymgmt/ml_dsa_kmgmt.c
565
return ml_dsa_gen(genctx, EVP_PKEY_ML_DSA_##alg); \
crypto/openssl/providers/implementations/keymgmt/ml_dsa_kmgmt.c
567
const OSSL_DISPATCH ossl_ml_dsa_##alg##_keymgmt_functions[] = { \
crypto/openssl/providers/implementations/keymgmt/ml_dsa_kmgmt.c
568
{ OSSL_FUNC_KEYMGMT_NEW, (void (*)(void))ml_dsa_##alg##_new_key }, \
crypto/openssl/providers/implementations/keymgmt/ml_dsa_kmgmt.c
580
{ OSSL_FUNC_KEYMGMT_GEN, (void (*)(void))ml_dsa_##alg##_gen }, \
crypto/openssl/providers/implementations/keymgmt/mlx_kmgmt.c
340
const char *alg;
crypto/openssl/providers/implementations/keymgmt/mlx_kmgmt.c
348
alg = key->minfo->algorithm_name;
crypto/openssl/providers/implementations/keymgmt/mlx_kmgmt.c
353
alg = key->xinfo->algorithm_name;
crypto/openssl/providers/implementations/keymgmt/mlx_kmgmt.c
361
if ((ctx = EVP_PKEY_CTX_new_from_name(libctx, alg, propq)) == NULL
crypto/openssl/providers/implementations/keymgmt/slh_dsa_kmgmt.c
351
static void *slh_dsa_gen(void *genctx, const char *alg)
crypto/openssl/providers/implementations/keymgmt/slh_dsa_kmgmt.c
359
key = ossl_slh_dsa_key_new(gctx->libctx, gctx->propq, alg);
crypto/openssl/providers/implementations/keymgmt/slh_dsa_kmgmt.c
436
#define MAKE_KEYMGMT_FUNCTIONS(alg, fn) \
crypto/openssl/providers/implementations/keymgmt/slh_dsa_kmgmt.c
441
return slh_dsa_new_key(provctx, alg); \
crypto/openssl/providers/implementations/keymgmt/slh_dsa_kmgmt.c
445
return slh_dsa_gen(genctx, alg); \
crypto/openssl/providers/implementations/keymgmt/slh_dsa_kmgmt.c
54
static void *slh_dsa_new_key(void *provctx, const char *alg)
crypto/openssl/providers/implementations/keymgmt/slh_dsa_kmgmt.c
59
return ossl_slh_dsa_key_new(PROV_LIBCTX_OF(provctx), NULL, alg);
crypto/openssl/providers/implementations/signature/ml_dsa_sig.c
331
#define MAKE_SIGNATURE_FUNCTIONS(alg) \
crypto/openssl/providers/implementations/signature/ml_dsa_sig.c
332
static OSSL_FUNC_signature_newctx_fn ml_dsa_##alg##_newctx; \
crypto/openssl/providers/implementations/signature/ml_dsa_sig.c
333
static void *ml_dsa_##alg##_newctx(void *provctx, const char *propq) \
crypto/openssl/providers/implementations/signature/ml_dsa_sig.c
335
return ml_dsa_newctx(provctx, EVP_PKEY_ML_DSA_##alg, propq); \
crypto/openssl/providers/implementations/signature/ml_dsa_sig.c
337
const OSSL_DISPATCH ossl_ml_dsa_##alg##_signature_functions[] = { \
crypto/openssl/providers/implementations/signature/ml_dsa_sig.c
338
{ OSSL_FUNC_SIGNATURE_NEWCTX, (void (*)(void))ml_dsa_##alg##_newctx }, \
crypto/openssl/providers/implementations/signature/slh_dsa_sig.c
162
if (!ossl_slh_dsa_key_type_matches(key, ctx->alg))
crypto/openssl/providers/implementations/signature/slh_dsa_sig.c
343
#define MAKE_SIGNATURE_FUNCTIONS(alg, fn) \
crypto/openssl/providers/implementations/signature/slh_dsa_sig.c
347
return slh_dsa_newctx(provctx, alg, propq); \
crypto/openssl/providers/implementations/signature/slh_dsa_sig.c
52
const char *alg;
crypto/openssl/providers/implementations/signature/slh_dsa_sig.c
68
static void *slh_dsa_newctx(void *provctx, const char *alg, const char *propq)
crypto/openssl/providers/implementations/signature/slh_dsa_sig.c
82
ctx->alg = alg;
crypto/openssl/ssl/ssl_cert_comp.c
113
if ((max_length = ossl_calculate_comp_expansion(alg, len)) == 0
crypto/openssl/ssl/ssl_cert_comp.c
123
ret = OSSL_COMP_CERT_new(comp_data, comp_length, len, alg);
crypto/openssl/ssl/ssl_cert_comp.c
16
size_t ossl_calculate_comp_expansion(int alg, size_t length)
crypto/openssl/ssl/ssl_cert_comp.c
233
static int ssl_compress_one_cert(SSL *ssl, CERT_PKEY *cpk, int alg)
crypto/openssl/ssl/ssl_cert_comp.c
240
|| alg == TLSEXT_comp_cert_none
crypto/openssl/ssl/ssl_cert_comp.c
241
|| !ossl_comp_has_alg(alg))
crypto/openssl/ssl/ssl_cert_comp.c
246
comp_cert = OSSL_COMP_CERT_from_uncompressed_data(cert_data, length, alg);
crypto/openssl/ssl/ssl_cert_comp.c
251
OSSL_COMP_CERT_free(cpk->comp_cert[alg]);
crypto/openssl/ssl/ssl_cert_comp.c
252
cpk->comp_cert[alg] = comp_cert;
crypto/openssl/ssl/ssl_cert_comp.c
26
switch (alg) {
crypto/openssl/ssl/ssl_cert_comp.c
262
int alg;
crypto/openssl/ssl/ssl_cert_comp.c
276
alg = sc->cert_comp_prefs[i];
crypto/openssl/ssl/ssl_cert_comp.c
277
if ((alg_in == 0 && alg != TLSEXT_comp_cert_none)
crypto/openssl/ssl/ssl_cert_comp.c
278
|| (alg_in != 0 && alg == alg_in)) {
crypto/openssl/ssl/ssl_cert_comp.c
285
if (!ssl_compress_one_cert(ssl, &cpks[j], alg))
crypto/openssl/ssl/ssl_cert_comp.c
289
if (cpks[j].comp_cert[alg]->len >= cpks[j].comp_cert[alg]->orig_len) {
crypto/openssl/ssl/ssl_cert_comp.c
290
OSSL_COMP_CERT_free(cpks[j].comp_cert[alg]);
crypto/openssl/ssl/ssl_cert_comp.c
291
cpks[j].comp_cert[alg] = NULL;
crypto/openssl/ssl/ssl_cert_comp.c
301
static size_t ssl_get_compressed_cert(SSL *ssl, CERT_PKEY *cpk, int alg, unsigned char **data,
crypto/openssl/ssl/ssl_cert_comp.c
316
|| !ossl_comp_has_alg(alg))
crypto/openssl/ssl/ssl_cert_comp.c
322
comp_cert = OSSL_COMP_CERT_from_uncompressed_data(cert_data, cert_len, alg);
crypto/openssl/ssl/ssl_cert_comp.c
383
int SSL_compress_certs(SSL *ssl, int alg)
crypto/openssl/ssl/ssl_cert_comp.c
391
return ssl_compress_certs(ssl, sc->cert->pkeys, alg);
crypto/openssl/ssl/ssl_cert_comp.c
396
int SSL_CTX_compress_certs(SSL_CTX *ctx, int alg)
crypto/openssl/ssl/ssl_cert_comp.c
405
ret = ssl_compress_certs(new, ctx->cert->pkeys, alg);
crypto/openssl/ssl/ssl_cert_comp.c
411
size_t SSL_get1_compressed_cert(SSL *ssl, int alg, unsigned char **data, size_t *orig_len)
crypto/openssl/ssl/ssl_cert_comp.c
425
return ssl_get_compressed_cert(ssl, cpk, alg, data, orig_len);
crypto/openssl/ssl/ssl_cert_comp.c
431
size_t SSL_CTX_get1_compressed_cert(SSL_CTX *ctx, int alg, unsigned char **data, size_t *orig_len)
crypto/openssl/ssl/ssl_cert_comp.c
437
ret = ssl_get_compressed_cert(new, ctx->cert->key, alg, data, orig_len);
crypto/openssl/ssl/ssl_cert_comp.c
61
static OSSL_COMP_CERT *OSSL_COMP_CERT_new(unsigned char *data, size_t len, size_t orig_len, int alg)
crypto/openssl/ssl/ssl_cert_comp.c
65
if (!ossl_comp_has_alg(alg)
crypto/openssl/ssl/ssl_cert_comp.c
74
ret->alg = alg;
crypto/openssl/ssl/ssl_cert_comp.c
84
size_t orig_len, int alg)
crypto/openssl/ssl/ssl_cert_comp.c
86
return OSSL_COMP_CERT_new(OPENSSL_memdup(data, len), len, orig_len, alg);
crypto/openssl/ssl/ssl_cert_comp.c
90
int alg)
crypto/openssl/ssl/ssl_cert_comp.c
99
switch (alg) {
crypto/openssl/ssl/ssl_local.h
1999
int alg;
crypto/openssl/ssl/ssl_local.h
3078
size_t ossl_calculate_comp_expansion(int alg, size_t length);
crypto/openssl/ssl/statem/extensions.c
1782
static int tls_comp_in_pref(SSL_CONNECTION *sc, int alg)
crypto/openssl/ssl/statem/extensions.c
1787
if (alg == 0)
crypto/openssl/ssl/statem/extensions.c
1790
if (!ossl_comp_has_alg(alg))
crypto/openssl/ssl/statem/extensions.c
1797
if (sc->cert_comp_prefs[i] == alg)
crypto/openssl/ssl/statem/statem_clnt.c
3875
int alg = sc->ext.compress_certificate_from_peer[0];
crypto/openssl/ssl/statem/statem_clnt.c
3896
if (!WPACKET_put_bytes_u16(pkt, alg)
crypto/openssl/ssl/statem/statem_clnt.c
3901
switch (alg) {
crypto/openssl/ssl/statem/statem_clnt.c
3914
max_length = ossl_calculate_comp_expansion(alg, length);
crypto/openssl/ssl/statem/statem_srvr.c
3896
int alg = get_compressed_certificate_alg(sc);
crypto/openssl/ssl/statem/statem_srvr.c
3897
OSSL_COMP_CERT *cc = sc->s3.tmp.cert->comp_cert[alg];
crypto/openssl/ssl/statem/statem_srvr.c
3907
if (!WPACKET_put_bytes_u16(pkt, alg)
crypto/openssl/ssl/statem/statem_srvr.c
394
int *alg = sc->ext.compress_certificate_from_peer;
crypto/openssl/ssl/statem/statem_srvr.c
399
for (; *alg != TLSEXT_comp_cert_none; alg++) {
crypto/openssl/ssl/statem/statem_srvr.c
400
if (sc->s3.tmp.cert->comp_cert[*alg] != NULL)
crypto/openssl/ssl/statem/statem_srvr.c
401
return *alg;
crypto/openssl/ssl/t1_trce.c
1407
unsigned int alg;
crypto/openssl/ssl/t1_trce.c
1418
alg = (msg[0] << 8) | msg[1];
crypto/openssl/ssl/t1_trce.c
1426
BIO_printf(bio, "Compression type=%s (0x%04x)\n", ssl_trace_str(alg, ssl_comp_cert_tbl), alg);
crypto/openssl/ssl/t1_trce.c
1438
if (!ossl_comp_has_alg(alg))
crypto/openssl/ssl/t1_trce.c
1445
switch (alg) {
crypto/openssl/test/acvp_test.c
1004
&& aes_ccm_enc_dec(tst->alg, tst->ct, ct_len,
crypto/openssl/test/acvp_test.c
1011
static int aes_gcm_enc_dec(const char *alg,
crypto/openssl/test/acvp_test.c
1027
TEST_note("%s : %s : expected to %s", alg, enc ? "encrypt" : "decrypt",
crypto/openssl/test/acvp_test.c
1031
|| !TEST_ptr(cipher = EVP_CIPHER_fetch(libctx, alg, ""))
crypto/openssl/test/acvp_test.c
1111
return aes_gcm_enc_dec(tst->alg, tst->pt, tst->pt_len,
crypto/openssl/test/acvp_test.c
1116
&& aes_gcm_enc_dec(tst->alg, tst->ct, tst->ct_len,
crypto/openssl/test/acvp_test.c
1122
&& aes_gcm_enc_dec(tst->alg, tst->ct, tst->ct_len,
crypto/openssl/test/acvp_test.c
1138
return aes_gcm_enc_dec(tst->alg, tst->pt, tst->pt_len,
crypto/openssl/test/acvp_test.c
1143
&& aes_gcm_enc_dec(tst->alg, out, out_len,
crypto/openssl/test/acvp_test.c
876
static int cipher_enc(const char *alg,
crypto/openssl/test/acvp_test.c
888
TEST_note("%s : %s", alg, enc ? "encrypt" : "decrypt");
crypto/openssl/test/acvp_test.c
890
|| !TEST_ptr(cipher = EVP_CIPHER_fetch(libctx, alg, ""))
crypto/openssl/test/acvp_test.c
911
return TEST_true(cipher_enc(tst->alg, tst->pt, tst->pt_len,
crypto/openssl/test/acvp_test.c
915
&& TEST_true(cipher_enc(tst->alg, tst->ct, tst->ct_len,
crypto/openssl/test/acvp_test.c
921
static int aes_ccm_enc_dec(const char *alg,
crypto/openssl/test/acvp_test.c
936
TEST_note("%s : %s : expected to %s", alg, enc ? "encrypt" : "decrypt",
crypto/openssl/test/acvp_test.c
940
|| !TEST_ptr(cipher = EVP_CIPHER_fetch(libctx, alg, ""))
crypto/openssl/test/acvp_test.c
995
return aes_ccm_enc_dec(tst->alg, tst->pt, tst->pt_len,
crypto/openssl/test/acvp_test.c
999
&& aes_ccm_enc_dec(tst->alg, tst->ct, ct_len,
crypto/openssl/test/algorithmid_test.c
115
const X509_ALGOR *alg = NULL;
crypto/openssl/test/algorithmid_test.c
132
X509_get0_signature(NULL, &alg, eecert);
crypto/openssl/test/algorithmid_test.c
133
X509_ALGOR_get0(&sig_oid, NULL, NULL, alg);
crypto/openssl/test/algorithmid_test.c
134
if (!TEST_int_eq(X509_ALGOR_cmp(alg, X509_get0_tbs_sigalg(eecert)), 0))
crypto/openssl/test/algorithmid_test.c
150
if (!TEST_int_ge(algid_legacy_len = i2d_X509_ALGOR(alg, &algid_legacy), 0))
crypto/openssl/test/algorithmid_test.c
26
X509_ALGOR *alg = NULL;
crypto/openssl/test/algorithmid_test.c
43
if (!TEST_true(X509_PUBKEY_get0_param(NULL, NULL, NULL, &alg, pubkey))
crypto/openssl/test/algorithmid_test.c
47
if (!TEST_int_ge(algid_legacy_len = i2d_X509_ALGOR(alg, &algid_legacy), 0))
crypto/openssl/test/algorithmid_test.c
50
X509_ALGOR_get0(&oid, NULL, NULL, alg);
crypto/openssl/test/cert_comp_test.c
101
retval = alg;
crypto/openssl/test/cert_comp_test.c
89
static int ssl_comp_cert(SSL *ssl, int alg)
crypto/openssl/test/cert_comp_test.c
96
if (!TEST_size_t_gt(comp_len = SSL_get1_compressed_cert(ssl, alg, &comp_data, &orig_len), 0))
crypto/openssl/test/cert_comp_test.c
99
if (!TEST_true(SSL_set1_compressed_cert(ssl, alg, comp_data, comp_len, orig_len)))
crypto/openssl/test/evp_extra_test.c
3156
ml_kem_seed_to_priv(const char *alg, const unsigned char *seed, int seedlen,
crypto/openssl/test/evp_extra_test.c
3168
ctx = EVP_PKEY_CTX_new_from_name(testctx, alg, NULL);
crypto/openssl/test/evp_fetch_prov_test.c
25
static char *alg = "digest";
crypto/openssl/test/evp_fetch_prov_test.c
385
alg = opt_arg();
crypto/openssl/test/evp_fetch_prov_test.c
404
if (strcmp(alg, "digest") == 0) {
crypto/openssl/test/evp_pkey_provided_test.c
1351
const char *alg = NULL;
crypto/openssl/test/evp_pkey_provided_test.c
141
static int test_print_key_using_pem(const char *alg, const EVP_PKEY *pk)
crypto/openssl/test/evp_pkey_provided_test.c
1470
alg = "X25519";
crypto/openssl/test/evp_pkey_provided_test.c
1478
alg = "X448";
crypto/openssl/test/evp_pkey_provided_test.c
1486
alg = "ED25519";
crypto/openssl/test/evp_pkey_provided_test.c
1494
alg = "ED448";
crypto/openssl/test/evp_pkey_provided_test.c
1500
ctx = EVP_PKEY_CTX_new_from_name(NULL, alg, NULL);
crypto/openssl/test/evp_pkey_provided_test.c
1571
ret = test_print_key_using_encoder_public(alg, pk);
crypto/openssl/test/evp_pkey_provided_test.c
1573
ret = test_print_key_using_pem(alg, pk)
crypto/openssl/test/evp_pkey_provided_test.c
1574
&& test_print_key_using_encoder(alg, pk);
crypto/openssl/test/evp_pkey_provided_test.c
1607
const char *alg = "EC";
crypto/openssl/test/evp_pkey_provided_test.c
1679
ctx = EVP_PKEY_CTX_new_from_name(NULL, alg, NULL);
crypto/openssl/test/evp_pkey_provided_test.c
1772
ret = test_print_key_using_pem(alg, pk)
crypto/openssl/test/evp_pkey_provided_test.c
1773
&& test_print_key_using_encoder(alg, pk);
crypto/openssl/test/evp_pkey_provided_test.c
184
|| !TEST_true(compare_with_file(alg, PRIV_TEXT, membio))
crypto/openssl/test/evp_pkey_provided_test.c
187
|| !TEST_true(compare_with_file(alg, PUB_PEM, membio))
crypto/openssl/test/evp_pkey_provided_test.c
191
|| !TEST_true(compare_with_file(alg, PRIV_PEM, membio))
crypto/openssl/test/evp_pkey_provided_test.c
205
static int test_print_key_type_using_encoder(const char *alg, int type,
crypto/openssl/test/evp_pkey_provided_test.c
2225
const char *alg = name_dup_algs[idx];
crypto/openssl/test/evp_pkey_provided_test.c
2230
if (alg == NULL
crypto/openssl/test/evp_pkey_provided_test.c
2231
|| (factory = EVP_PKEY_CTX_new_from_name(NULL, alg, NULL)) == NULL)
crypto/openssl/test/evp_pkey_provided_test.c
2233
TEST_info("Testing fresh context dup for: %s", alg);
crypto/openssl/test/evp_pkey_provided_test.c
278
|| !TEST_true(compare_with_file(alg, type, membio)))
crypto/openssl/test/evp_pkey_provided_test.c
304
|| !TEST_true(compare_with_file(alg, type, membio)))
crypto/openssl/test/evp_pkey_provided_test.c
314
static int test_print_key_using_encoder(const char *alg, const EVP_PKEY *pk)
crypto/openssl/test/evp_pkey_provided_test.c
320
ret = ret && test_print_key_type_using_encoder(alg, i, pk);
crypto/openssl/test/evp_pkey_provided_test.c
326
static int test_print_key_using_encoder_public(const char *alg,
crypto/openssl/test/evp_pkey_provided_test.c
333
ret = ret && test_print_key_type_using_encoder(alg, i, pk);
crypto/openssl/test/evp_pkey_provided_test.c
54
static int compare_with_file(const char *alg, int type, BIO *membio)
crypto/openssl/test/evp_pkey_provided_test.c
96
BIO_snprintf(filename, sizeof(filename), "%s.%s", alg, suffix);
crypto/openssl/test/evp_test.c
1576
char *alg;
crypto/openssl/test/evp_test.c
1606
static int mac_test_init(EVP_TEST *t, const char *alg)
crypto/openssl/test/evp_test.c
1612
if (is_mac_disabled(alg)) {
crypto/openssl/test/evp_test.c
1613
TEST_info("skipping, '%s' is disabled", alg);
crypto/openssl/test/evp_test.c
1617
if ((mac = EVP_MAC_fetch(libctx, alg, propquery)) == NULL) {
crypto/openssl/test/evp_test.c
1623
size_t sz = strlen(alg);
crypto/openssl/test/evp_test.c
1627
&& strcmp(alg + sz - (sizeof(epilogue) - 1), epilogue) == 0)
crypto/openssl/test/evp_test.c
1630
if (strncmp(alg, "HMAC", sz) == 0)
crypto/openssl/test/evp_test.c
1632
else if (strncmp(alg, "CMAC", sz) == 0)
crypto/openssl/test/evp_test.c
1634
else if (strncmp(alg, "Poly1305", sz) == 0)
crypto/openssl/test/evp_test.c
1636
else if (strncmp(alg, "SipHash", sz) == 0)
crypto/openssl/test/evp_test.c
1646
if (!TEST_ptr(mdat->mac_name = OPENSSL_strdup(alg))) {
crypto/openssl/test/evp_test.c
1670
OPENSSL_free(mdat->alg);
crypto/openssl/test/evp_test.c
1693
mdata->alg = OPENSSL_strdup(value);
crypto/openssl/test/evp_test.c
1694
if (mdata->alg == NULL)
crypto/openssl/test/evp_test.c
1763
if (expected->alg == NULL)
crypto/openssl/test/evp_test.c
1767
OBJ_nid2sn(expected->type), expected->alg);
crypto/openssl/test/evp_test.c
1771
TEST_info("skipping, PKEY CMAC '%s' is disabled", expected->alg);
crypto/openssl/test/evp_test.c
1778
if (expected->alg != NULL && is_cipher_disabled(expected->alg)) {
crypto/openssl/test/evp_test.c
1779
TEST_info("skipping, PKEY CMAC '%s' is disabled", expected->alg);
crypto/openssl/test/evp_test.c
1784
if (!TEST_ptr(cipher = EVP_CIPHER_fetch(libctx, expected->alg, propquery))) {
crypto/openssl/test/evp_test.c
1803
if (expected->type == EVP_PKEY_HMAC && expected->alg != NULL) {
crypto/openssl/test/evp_test.c
1804
if (is_digest_disabled(expected->alg)) {
crypto/openssl/test/evp_test.c
1805
TEST_info("skipping, HMAC '%s' is disabled", expected->alg);
crypto/openssl/test/evp_test.c
1810
mdname = expected->alg;
crypto/openssl/test/evp_test.c
1883
if (expected->alg == NULL)
crypto/openssl/test/evp_test.c
1887
expected->mac_name, expected->alg);
crypto/openssl/test/evp_test.c
1889
if (expected->alg != NULL) {
crypto/openssl/test/evp_test.c
1900
if (is_cipher_disabled(expected->alg))
crypto/openssl/test/evp_test.c
1904
expected->alg, 0);
crypto/openssl/test/evp_test.c
1908
if (is_digest_disabled(expected->alg))
crypto/openssl/test/evp_test.c
1912
expected->alg, 0);
crypto/openssl/test/evp_test.c
1918
TEST_info("skipping, algorithm '%s' is disabled", expected->alg);
crypto/openssl/test/evp_test.c
2089
expected->alg, params,
crypto/openssl/test/evp_test.c
2152
static int kem_test_init(EVP_TEST *t, const char *alg)
crypto/openssl/test/evp_test.c
2158
|| !TEST_ptr(kdata->algname = OPENSSL_strdup(alg)))
crypto/openssl/test/evp_test.c
3195
static int pbe_test_init(EVP_TEST *t, const char *alg)
crypto/openssl/test/evp_test.c
3200
if (is_kdf_disabled(alg)) {
crypto/openssl/test/evp_test.c
3201
TEST_info("skipping, '%s' is disabled", alg);
crypto/openssl/test/evp_test.c
3205
if (strcmp(alg, "scrypt") == 0) {
crypto/openssl/test/evp_test.c
3207
} else if (strcmp(alg, "pbkdf2") == 0) {
crypto/openssl/test/evp_test.c
3209
} else if (strcmp(alg, "pkcs12") == 0) {
crypto/openssl/test/evp_test.c
3212
TEST_error("Unknown pbe algorithm %s", alg);
crypto/openssl/test/evp_test.c
4281
char *alg;
crypto/openssl/test/evp_test.c
4286
static int keygen_test_init(EVP_TEST *t, const char *alg)
crypto/openssl/test/evp_test.c
4290
if (is_pkey_disabled(alg)) {
crypto/openssl/test/evp_test.c
4301
data->alg = OPENSSL_strdup(alg);
crypto/openssl/test/evp_test.c
4313
OPENSSL_free(keygen->alg);
crypto/openssl/test/evp_test.c
4397
if (!TEST_ptr(genctx = EVP_PKEY_CTX_new_from_name(libctx, keygen->alg,
crypto/openssl/test/evp_test.c
4503
static int digestsigver_test_init(EVP_TEST *t, const char *alg, int is_verify,
crypto/openssl/test/evp_test.c
4509
if (strcmp(alg, "NULL") != 0) {
crypto/openssl/test/evp_test.c
4510
if (is_digest_disabled(alg)) {
crypto/openssl/test/evp_test.c
4514
md = EVP_get_digestbyname(alg);
crypto/openssl/test/evp_test.c
4533
static int digestsign_test_init(EVP_TEST *t, const char *alg)
crypto/openssl/test/evp_test.c
4535
return digestsigver_test_init(t, alg, 0, 0);
crypto/openssl/test/evp_test.c
4725
static int digestverify_test_init(EVP_TEST *t, const char *alg)
crypto/openssl/test/evp_test.c
4727
return digestsigver_test_init(t, alg, 1, 0);
crypto/openssl/test/evp_test.c
4763
static int oneshot_digestsign_test_init(EVP_TEST *t, const char *alg)
crypto/openssl/test/evp_test.c
4765
return digestsigver_test_init(t, alg, 0, 1);
crypto/openssl/test/evp_test.c
4811
static int oneshot_digestverify_test_init(EVP_TEST *t, const char *alg)
crypto/openssl/test/evp_test.c
4813
return digestsigver_test_init(t, alg, 1, 1);
crypto/openssl/test/evp_test.c
58
int (*init)(EVP_TEST *t, const char *alg);
crypto/openssl/test/evp_test.c
666
static int digest_test_init(EVP_TEST *t, const char *alg)
crypto/openssl/test/evp_test.c
672
if (is_digest_disabled(alg)) {
crypto/openssl/test/evp_test.c
673
TEST_info("skipping, '%s' is disabled", alg);
crypto/openssl/test/evp_test.c
678
if ((digest = fetched_digest = EVP_MD_fetch(libctx, alg, propquery)) == NULL
crypto/openssl/test/evp_test.c
679
&& (digest = EVP_get_digestbyname(alg)) == NULL)
crypto/openssl/test/evp_test.c
691
TEST_info("%s is fetched", alg);
crypto/openssl/test/evp_test.c
927
static int cipher_test_init(EVP_TEST *t, const char *alg)
crypto/openssl/test/evp_test.c
934
if (is_cipher_disabled(alg)) {
crypto/openssl/test/evp_test.c
936
TEST_info("skipping, '%s' is disabled", alg);
crypto/openssl/test/evp_test.c
941
if ((cipher = fetched_cipher = EVP_CIPHER_fetch(libctx, alg, propquery)) == NULL
crypto/openssl/test/evp_test.c
942
&& (cipher = EVP_get_cipherbyname(alg)) == NULL) {
crypto/openssl/test/evp_test.c
944
if (strstr(alg, "HMAC") != NULL) {
crypto/openssl/test/evp_test.c
947
TEST_info("skipping, '%s' is not available", alg);
crypto/openssl/test/evp_test.c
973
TEST_info("skipping, '%s' does not support fragmentation", alg);
crypto/openssl/test/evp_test.c
979
TEST_info("%s is fetched", alg);
crypto/openssl/test/evp_xof_test.c
467
static int do_shake_squeeze_dup_test(int tst, const char *alg,
crypto/openssl/test/evp_xof_test.c
478
if (!TEST_ptr(ctx = shake_setup(alg)))
crypto/openssl/test/evp_xof_test.c
516
const char *alg = "SHAKE128";
crypto/openssl/test/evp_xof_test.c
519
|| !TEST_ptr(ctx = shake_setup(alg))
crypto/openssl/test/evp_xof_test.c
524
ret = do_shake_squeeze_dup_test(tst, alg, msg, sizeof(msg),
crypto/openssl/test/evp_xof_test.c
538
const char *alg = "SHAKE128";
crypto/openssl/test/evp_xof_test.c
540
if (!TEST_ptr(ctx = shake_setup(alg))
crypto/openssl/test/fake_pipelineprov.c
252
#define IMPLEMENT_aead_cipher_pipeline(alg, lc, UCMODE, flags, kbits, blkbits, \
crypto/openssl/test/fake_pipelineprov.c
254
static OSSL_FUNC_cipher_get_params_fn alg##_##kbits##_##lc##_get_params; \
crypto/openssl/test/fake_pipelineprov.c
255
static int alg##_##kbits##_##lc##_get_params(OSSL_PARAM params[]) \
crypto/openssl/test/fake_pipelineprov.c
260
static OSSL_FUNC_cipher_newctx_fn fake_pipeline_##alg##_##kbits##_##lc##_newctx; \
crypto/openssl/test/fake_pipelineprov.c
261
static void *fake_pipeline_##alg##_##kbits##_##lc##_newctx(void *provctx) \
crypto/openssl/test/fake_pipelineprov.c
265
static const OSSL_DISPATCH fake_pipeline_##alg##kbits##lc##_functions[] = { \
crypto/openssl/test/fake_pipelineprov.c
267
(void (*)(void))fake_pipeline_##alg##_##kbits##_##lc##_newctx }, \
crypto/openssl/test/fake_pipelineprov.c
279
(void (*)(void))alg##_##kbits##_##lc##_get_params }, \
crypto/openssl/test/fake_rsaprov.c
826
const X509_ALGOR *alg = NULL;
crypto/openssl/test/fake_rsaprov.c
830
&& PKCS8_pkey_get0(NULL, NULL, NULL, &alg, p8inf)
crypto/openssl/test/fake_rsaprov.c
831
&& OBJ_obj2nid(alg->algorithm) == ctx->desc->evp_type)
crypto/openssl/test/filterprov.c
111
if (globs->dispatch[i].alg == algs)
crypto/openssl/test/filterprov.c
248
globs->dispatch[globs->num_dispatch].alg[algnum++] = *algs;
crypto/openssl/test/filterprov.c
32
OSSL_ALGORITHM alg[MAX_ALG_FILTERS + 1];
crypto/openssl/test/filterprov.c
91
return globs->dispatch[i].alg;
crypto/openssl/test/ml_dsa_test.c
147
if (!TEST_true(ml_dsa_create_keypair(&pkey, td->alg, td->priv, td->priv_len,
crypto/openssl/test/ml_dsa_test.c
150
|| !TEST_ptr(sig_alg = EVP_SIGNATURE_fetch(lib_ctx, td->alg, NULL))
crypto/openssl/test/ml_dsa_test.c
189
if (!TEST_true(ml_dsa_create_keypair(&pkey, td->alg, NULL, 0,
crypto/openssl/test/ml_dsa_test.c
195
if (!TEST_ptr(sig_alg = EVP_SIGNATURE_fetch(lib_ctx, td->alg, NULL)))
crypto/openssl/test/ml_dsa_test.c
28
static EVP_PKEY *do_gen_key(const char *alg,
crypto/openssl/test/ml_dsa_test.c
393
static int do_ml_dsa_sign_verify(const char *alg, int tstid)
crypto/openssl/test/ml_dsa_test.c
404
if (!TEST_ptr(key = do_gen_key(alg, NULL, 0)))
crypto/openssl/test/ml_dsa_test.c
415
|| !TEST_ptr(sig_alg = EVP_SIGNATURE_fetch(lib_ctx, alg, NULL))
crypto/openssl/test/ml_dsa_test.c
42
if (!TEST_ptr(ctx = EVP_PKEY_CTX_new_from_name(lib_ctx, alg, NULL))
crypto/openssl/test/ml_dsa_test.c
464
const char *alg = "ML-DSA-44";
crypto/openssl/test/ml_dsa_test.c
467
if (!TEST_ptr(key = do_gen_key(alg, NULL, 0)))
crypto/openssl/test/ml_dsa_test.c
538
if (!TEST_true(ml_dsa_create_keypair(&key, td->alg,
crypto/openssl/test/ml_dsa_test.c
543
if (!TEST_true(ml_dsa_create_keypair(&key, td->alg,
crypto/openssl/test/ml_kem_evp_extra_test.c
216
static const int alg[3] = {
crypto/openssl/test/ml_kem_evp_extra_test.c
233
for (i = 0; i < (int)OSSL_NELEM(alg); ++i) {
crypto/openssl/test/ml_kem_evp_extra_test.c
247
if ((v = ossl_ml_kem_get_vinfo(alg[i])) == NULL)
crypto/openssl/test/ml_kem_internal_test.c
123
public_key = ossl_ml_kem_key_new(NULL, NULL, alg[i]);
crypto/openssl/test/ml_kem_internal_test.c
124
private_key = ossl_ml_kem_key_new(NULL, NULL, alg[i]);
crypto/openssl/test/ml_kem_internal_test.c
76
static const int alg[3] = {
crypto/openssl/test/ml_kem_internal_test.c
98
for (i = 0; i < (int)OSSL_NELEM(alg); ++i) {
crypto/openssl/test/provider_pkey_test.c
25
static int fetch_sig(OSSL_LIB_CTX *ctx, const char *alg, const char *propq,
crypto/openssl/test/slh_dsa_test.c
104
if (!TEST_ptr_null(pkey = slh_dsa_key_from_data(td->alg, pubdata,
crypto/openssl/test/slh_dsa_test.c
106
|| !TEST_ptr_null(pkey = slh_dsa_key_from_data(td->alg, pubdata,
crypto/openssl/test/slh_dsa_test.c
130
if (!TEST_ptr(key[0] = slh_dsa_key_from_data(td1->alg, td1->pub, td1->pub_len, 1))
crypto/openssl/test/slh_dsa_test.c
131
|| !TEST_ptr(key[1] = slh_dsa_key_from_data(td1->alg, td1->pub, td1->pub_len, 1))
crypto/openssl/test/slh_dsa_test.c
132
|| !TEST_ptr(key[2] = slh_dsa_key_from_data(td2->alg, td2->pub, td2->pub_len, 1))
crypto/openssl/test/slh_dsa_test.c
162
if (!TEST_ptr(key = slh_dsa_key_from_data(td->alg, td->pub, td->pub_len, 1)))
crypto/openssl/test/slh_dsa_test.c
224
if (!TEST_ptr(key = slh_dsa_key_from_data(td->alg, td->pub, td->pub_len, 1)))
crypto/openssl/test/slh_dsa_test.c
228
if (!TEST_ptr(sig_alg = EVP_SIGNATURE_fetch(lib_ctx, td->alg, NULL)))
crypto/openssl/test/slh_dsa_test.c
269
if (!slh_dsa_create_keypair(&pkey, td->alg, td->priv, td->priv_len,
crypto/openssl/test/slh_dsa_test.c
275
if (!TEST_ptr(sig_alg = EVP_SIGNATURE_fetch(lib_ctx, td->alg, NULL)))
crypto/openssl/test/slh_dsa_test.c
306
static EVP_PKEY *do_gen_key(const char *alg,
crypto/openssl/test/slh_dsa_test.c
31
static EVP_PKEY *slh_dsa_key_from_data(const char *alg,
crypto/openssl/test/slh_dsa_test.c
318
if (!TEST_ptr(ctx = EVP_PKEY_CTX_new_from_name(lib_ctx, alg, NULL))
crypto/openssl/test/slh_dsa_test.c
44
ret = TEST_ptr(ctx = EVP_PKEY_CTX_new_from_name(lib_ctx, alg, NULL))
crypto/openssl/test/slh_dsa_test.c
537
const char *alg = "SLH-DSA-SHA2-128s";
crypto/openssl/test/slh_dsa_test.c
543
if (!TEST_ptr(key = do_gen_key(alg, NULL, 0)))
crypto/openssl/test/tls-provider.c
2213
const X509_ALGOR *alg = NULL;
crypto/openssl/test/tls-provider.c
2217
&& PKCS8_pkey_get0(NULL, NULL, NULL, &alg, p8inf)
crypto/openssl/test/tls-provider.c
2218
&& OBJ_obj2nid(alg->algorithm) == ctx->desc->evp_type)
crypto/openssl/test/x509_test.c
131
const X509_ALGOR *alg = NULL;
crypto/openssl/test/x509_test.c
152
X509_get0_signature(&sig, &alg, x509);
crypto/openssl/test/x509_test.c
155
(X509_ALGOR *)alg, (ASN1_BIT_STRING *)sig,
crypto/openssl/test/x509_test.c
162
(X509_ALGOR *)alg, (ASN1_BIT_STRING *)sig,
include/arpa/nameser.h
250
char name[NS_MAXDNAME], alg[NS_MAXDNAME];
lib/libc/nameser/ns_print.c
580
u_int c_type, key_tag, alg;
lib/libc/nameser/ns_print.c
588
alg = (u_int) *rdata++;
lib/libc/nameser/ns_print.c
590
len = SPRINTF((tmp, "%d %d %d ", c_type, key_tag, alg));
lib/libipsec/pfkey.c
211
struct sadb_alg *alg;
lib/libipsec/pfkey.c
213
alg = findsupportedalg(satype, alg_id);
lib/libipsec/pfkey.c
214
if (!alg)
lib/libipsec/pfkey.c
217
if (keylen < alg->sadb_alg_minbits || keylen > alg->sadb_alg_maxbits) {
lib/libipsec/pfkey.c
237
struct sadb_alg *alg;
lib/libipsec/pfkey.c
258
alg = findsupportedalg(satype, alg_id);
lib/libipsec/pfkey.c
259
if (!alg)
lib/libipsec/pfkey.c
262
memcpy(alg0, alg, sizeof(*alg0));
sbin/md5/md5.c
1004
printf("%s test suite:\n", alg->name);
sbin/md5/md5.c
1006
(*alg->Data)(MDTestInput[i], strlen(MDTestInput[i]), buffer);
sbin/md5/md5.c
1007
printf("%s (\"%s\") = %s", alg->name, MDTestInput[i], buffer);
sbin/md5/md5.c
1008
if (strcmp(buffer, (*alg->TestOutput)[i]) == 0) {
sbin/md5/md5.c
1018
usage(const Algorithm_t *alg)
sbin/md5/md5.c
1023
fprintf(stderr, "usage: %ssum [-bctwz] [files ...]\n", alg->progname);
sbin/md5/md5.c
1030
alg->progname);
sbin/md5/md5.c
683
MDInput(const Algorithm_t *alg, FILE *f, char *buf, bool tee)
sbin/md5/md5.c
693
alg->Init(&context);
sbin/md5/md5.c
700
alg->Update(&context, block, len);
sbin/md5/md5.c
710
alg->Update(&context, "\n", 1);
sbin/md5/md5.c
720
alg->Update(&context, p, q - p);
sbin/md5/md5.c
738
alg->Update(&context, &byte, 1);
sbin/md5/md5.c
747
alg->End(&context, buf);
sbin/md5/md5.c
753
alg->Update(&context, "\n", 1);
sbin/md5/md5.c
757
return (alg->End(&context, buf));
sbin/md5/md5.c
764
MDOutput(const Algorithm_t *alg, char *p, const char *name)
sbin/md5/md5.c
789
strncmp(alg->name, "SHA512t", 7) == 0) {
sbin/md5/md5.c
790
printf("%.6s/%s", alg->name, alg->name + 7);
sbin/md5/md5.c
792
printf("%s", alg->name);
sbin/md5/md5.c
812
MDTimeTrial(const Algorithm_t *alg)
sbin/md5/md5.c
823
alg->name, TEST_BLOCK_COUNT, TEST_BLOCK_LEN);
sbin/md5/md5.c
834
alg->Init(&context);
sbin/md5/md5.c
836
alg->Update(&context, block, TEST_BLOCK_LEN);
sbin/md5/md5.c
837
p = alg->End(&context, buf);
sbin/md5/md5.c
999
MDTestSuite(const Algorithm_t *alg)
sys/crypto/ccp/ccp.c
262
ccp_aes_check_keylen(int alg, int klen)
sys/crypto/ccp/ccp.c
268
if (alg == CRYPTO_AES_XTS)
sys/crypto/ccp/ccp.c
274
if (alg != CRYPTO_AES_XTS)
sys/crypto/ccp/ccp.c
284
ccp_aes_setkey(struct ccp_session *s, int alg, const void *key, int klen)
sys/crypto/ccp/ccp.c
288
if (alg == CRYPTO_AES_XTS)
sys/crypto/via/padlock_hash.c
317
padlock_hash_lookup(int alg)
sys/crypto/via/padlock_hash.c
321
switch (alg) {
sys/dev/aic7xxx/aic79xx.c
3248
ahd_queue_alg alg)
sys/dev/aic7xxx/aic79xx.c
3250
ahd_platform_set_tags(ahd, devinfo, alg);
sys/dev/aic7xxx/aic79xx.c
3252
devinfo->lun, AC_TRANSFER_NEG, &alg);
sys/dev/aic7xxx/aic79xx.h
1534
ahd_queue_alg alg);
sys/dev/aic7xxx/aic7xxx.c
2076
ahc_queue_alg alg)
sys/dev/aic7xxx/aic7xxx.c
2078
ahc_platform_set_tags(ahc, devinfo, alg);
sys/dev/aic7xxx/aic7xxx.c
2080
devinfo->lun, AC_TRANSFER_NEG, &alg);
sys/dev/aic7xxx/aic7xxx.h
1325
ahc_queue_alg alg);
sys/dev/cesa/cesa.c
421
cesa_set_mkey(struct cesa_session *cs, int alg, const uint8_t *mkey, int mklen)
sys/dev/cesa/cesa.c
431
switch (alg) {
sys/dev/cxgbe/crypto/t4_crypto.c
2067
ccr_aes_check_keylen(int alg, int klen)
sys/dev/cxgbe/crypto/t4_crypto.c
2073
if (alg == CRYPTO_AES_XTS)
sys/dev/cxgbe/crypto/t4_crypto.c
2079
if (alg != CRYPTO_AES_XTS)
sys/dev/cxgbe/crypto/t4_keyctx.c
311
t4_copy_partial_hash(int alg, union authctx *auth_ctx, void *dst)
sys/dev/cxgbe/crypto/t4_keyctx.c
319
switch (alg) {
sys/dev/qat/qat_api/common/crypto/sym/include/lac_sym_qat_hash.h
267
CpaCySymHashAlgorithm alg,
sys/dev/qat/qat_api/common/crypto/sym/lac_sym_hash.c
42
#define LAC_HASH_ALG_MODE_NOT_SUPPORTED(alg, mode) \
sys/dev/qat/qat_api/common/crypto/sym/lac_sym_hash.c
43
((((CPA_CY_SYM_HASH_KASUMI_F9 == (alg)) || \
sys/dev/qat/qat_api/common/crypto/sym/lac_sym_hash.c
44
(CPA_CY_SYM_HASH_SNOW3G_UIA2 == (alg)) || \
sys/dev/qat/qat_api/common/crypto/sym/lac_sym_hash.c
45
(CPA_CY_SYM_HASH_AES_XCBC == (alg)) || \
sys/dev/qat/qat_api/common/crypto/sym/lac_sym_hash.c
46
(CPA_CY_SYM_HASH_AES_CCM == (alg)) || \
sys/dev/qat/qat_api/common/crypto/sym/lac_sym_hash.c
47
(CPA_CY_SYM_HASH_AES_GCM == (alg)) || \
sys/dev/qat/qat_api/common/crypto/sym/lac_sym_hash.c
48
(CPA_CY_SYM_HASH_AES_GMAC == (alg)) || \
sys/dev/qat/qat_api/common/crypto/sym/lac_sym_hash.c
49
(CPA_CY_SYM_HASH_AES_CMAC == (alg)) || \
sys/dev/qat/qat_api/common/crypto/sym/lac_sym_hash.c
50
(CPA_CY_SYM_HASH_ZUC_EIA3 == (alg))) && \
sys/dev/qat/qat_api/common/crypto/sym/lac_sym_hash.c
52
((LAC_HASH_IS_SHA3(alg)) && (CPA_CY_SYM_HASH_MODE_NESTED == (mode))))
sys/dev/qat/qat_api/common/crypto/sym/qat/lac_sym_qat_hash.c
867
CpaCySymHashAlgorithm alg,
sys/dev/qat/qat_api/common/crypto/sym/qat/lac_sym_qat_hash.c
978
if (CPA_CY_SYM_HASH_AES_GMAC == alg) {
sys/dev/safexcel/safexcel.c
1388
int aklen, alg, cklen, off;
sys/dev/safexcel/safexcel.c
1396
ctrl0 = sess->alg | sess->digest | sess->hash;
sys/dev/safexcel/safexcel.c
1441
alg = csp->csp_cipher_alg;
sys/dev/safexcel/safexcel.c
1442
if (alg == 0)
sys/dev/safexcel/safexcel.c
1443
alg = csp->csp_auth_alg;
sys/dev/safexcel/safexcel.c
1445
switch (alg) {
sys/dev/safexcel/safexcel.c
2369
safexcel_sha_hashid(int alg)
sys/dev/safexcel/safexcel.c
2371
switch (alg) {
sys/dev/safexcel/safexcel.c
2393
safexcel_sha_hashlen(int alg)
sys/dev/safexcel/safexcel.c
2395
switch (alg) {
sys/dev/safexcel/safexcel.c
2417
safexcel_sha_statelen(int alg)
sys/dev/safexcel/safexcel.c
2419
switch (alg) {
sys/dev/safexcel/safexcel.c
2472
sess->alg = safexcel_aes_algid(csp->csp_auth_klen);
sys/dev/safexcel/safexcel.c
2482
sess->alg = safexcel_aes_algid(csp->csp_cipher_klen);
sys/dev/safexcel/safexcel.c
2489
sess->alg = safexcel_aes_algid(csp->csp_cipher_klen);
sys/dev/safexcel/safexcel.c
2493
sess->alg = safexcel_aes_algid(csp->csp_cipher_klen);
sys/dev/safexcel/safexcel.c
2497
sess->alg = safexcel_aes_algid(csp->csp_cipher_klen);
sys/dev/safexcel/safexcel.c
2501
sess->alg = safexcel_aes_algid(csp->csp_cipher_klen / 2);
sys/dev/safexcel/safexcel_var.h
343
uint32_t alg; /* cipher algorithm */
sys/dev/sec/sec.c
107
static bool sec_mdeu_can_handle(u_int alg);
sys/dev/sec/sec.c
1464
sec_mdeu_can_handle(u_int alg)
sys/dev/sec/sec.c
1466
switch (alg) {
sys/dev/sfxge/common/ef10_impl.h
966
__in efx_rx_hash_alg_t alg,
sys/dev/sfxge/common/ef10_rx.c
625
__in efx_rx_hash_alg_t alg,
sys/dev/sfxge/common/ef10_rx.c
634
if ((encp->enc_rx_scale_hash_alg_mask & (1U << alg)) == 0 ||
sys/dev/sfxge/common/efx.h
2453
__in efx_rx_hash_alg_t alg,
sys/dev/sfxge/common/efx_rx.c
1143
__in efx_rx_hash_alg_t alg,
sys/dev/sfxge/common/efx_rx.c
1154
switch (alg) {
sys/dev/sfxge/common/efx_rx.c
555
__in efx_rx_hash_alg_t alg,
sys/dev/sfxge/common/efx_rx.c
59
__in efx_rx_hash_alg_t alg,
sys/dev/sfxge/common/efx_rx.c
592
rc = efx_rx_scale_hash_flags_get(enp, alg, type_flags,
sys/dev/sfxge/common/efx_rx.c
636
if ((rc = erxop->erxo_scale_mode_set(enp, rss_context, alg,
sys/net80211/ieee80211_freebsd.h
458
#define IEEE80211_SCANNER_ALG(name, alg, v) \
sys/net80211/ieee80211_freebsd.h
463
ieee80211_scanner_register(alg, &v); \
sys/net80211/ieee80211_freebsd.h
465
ieee80211_scanner_unregister(alg, &v); \
sys/net80211/ieee80211_freebsd.h
472
#define IEEE80211_ACL_MODULE(name, alg, version) \
sys/net80211/ieee80211_freebsd.h
475
alg##_modevent(int type) \
sys/net80211/ieee80211_freebsd.h
478
ieee80211_aclator_register(&alg); \
sys/net80211/ieee80211_freebsd.h
480
ieee80211_aclator_unregister(&alg); \
sys/net80211/ieee80211_freebsd.h
482
TEXT_SET(acl_set, alg##_modevent); \
sys/net80211/ieee80211_freebsd.h
490
#define IEEE80211_AUTH_ALG(name, alg, v) \
sys/net80211/ieee80211_freebsd.h
495
ieee80211_authenticator_register(alg, &v); \
sys/net80211/ieee80211_freebsd.h
497
ieee80211_authenticator_unregister(alg); \
sys/net80211/ieee80211_freebsd.h
504
#define IEEE80211_RATECTL_MODULE(alg, version) \
sys/net80211/ieee80211_freebsd.h
505
_IEEE80211_POLICY_MODULE(ratectl, alg, version); \
sys/net80211/ieee80211_freebsd.h
507
#define IEEE80211_RATECTL_ALG(name, alg, v) \
sys/net80211/ieee80211_freebsd.h
509
alg##_modevent(int type) \
sys/net80211/ieee80211_freebsd.h
512
ieee80211_ratectl_register(alg, &v); \
sys/net80211/ieee80211_freebsd.h
514
ieee80211_ratectl_unregister(alg); \
sys/net80211/ieee80211_freebsd.h
516
TEXT_SET(ratectl##_set, alg##_modevent)
sys/netipsec/key.c
6697
key_getsizes_ah(const struct auth_hash *ah, int alg, u_int16_t* min,
sys/netipsec/key.c
6707
switch (alg) {
sys/netipsec/key.c
6714
__func__, alg));
sys/netipsec/key.c
7466
struct sadb_alg *alg;
sys/netipsec/key.c
7517
alg = (struct sadb_alg *)(mtod(n, caddr_t) + off);
sys/netipsec/key.c
7518
alg->sadb_alg_id = i;
sys/netipsec/key.c
7519
alg->sadb_alg_ivlen = 0;
sys/netipsec/key.c
7521
alg->sadb_alg_minbits = _BITS(minkeysize);
sys/netipsec/key.c
7522
alg->sadb_alg_maxbits = _BITS(maxkeysize);
sys/netipsec/key.c
7523
off += PFKEY_ALIGN8(sizeof(*alg));
sys/netipsec/key.c
7540
alg = (struct sadb_alg *)(mtod(n, caddr_t) + off);
sys/netipsec/key.c
7541
alg->sadb_alg_id = i;
sys/netipsec/key.c
7542
alg->sadb_alg_ivlen = ealgo->ivsize;
sys/netipsec/key.c
7543
alg->sadb_alg_minbits = _BITS(ealgo->minkey);
sys/netipsec/key.c
7544
alg->sadb_alg_maxbits = _BITS(ealgo->maxkey);
sys/netipsec/key.c
8943
enc_algorithm_lookup(int alg)
sys/netipsec/key.c
8948
if (alg == supported_ealgs[i].sadb_alg)
sys/netipsec/key.c
8954
auth_algorithm_lookup(int alg)
sys/netipsec/key.c
8959
if (alg == supported_aalgs[i].sadb_alg)
sys/netipsec/key.c
8965
comp_algorithm_lookup(int alg)
sys/netipsec/key.c
8970
if (alg == supported_calgs[i].sadb_alg)
sys/netipsec/key_debug.c
368
struct sadb_alg *alg;
sys/netipsec/key_debug.c
376
/ sizeof(*alg);
sys/netipsec/key_debug.c
377
alg = (struct sadb_alg *)(sup + 1);
sys/netipsec/key_debug.c
381
alg->sadb_alg_id, alg->sadb_alg_ivlen,
sys/netipsec/key_debug.c
382
alg->sadb_alg_minbits, alg->sadb_alg_maxbits);
sys/netipsec/key_debug.c
383
alg++;
sys/netipsec/xform_ah.c
264
ah_massage_headers(struct mbuf **m0, int proto, int skip, int alg, int out)
sys/opencrypto/crypto.c
677
alg_type(int alg)
sys/opencrypto/crypto.c
680
if (alg < nitems(alg_types))
sys/opencrypto/crypto.c
681
return (alg_types[alg]);
sys/opencrypto/crypto.c
686
alg_is_compression(int alg)
sys/opencrypto/crypto.c
689
return (alg_type(alg) == ALG_COMPRESSION);
sys/opencrypto/crypto.c
693
alg_is_cipher(int alg)
sys/opencrypto/crypto.c
696
return (alg_type(alg) == ALG_CIPHER);
sys/opencrypto/crypto.c
700
alg_is_digest(int alg)
sys/opencrypto/crypto.c
703
return (alg_type(alg) == ALG_DIGEST ||
sys/opencrypto/crypto.c
704
alg_type(alg) == ALG_KEYED_DIGEST);
sys/opencrypto/crypto.c
708
alg_is_keyed_digest(int alg)
sys/opencrypto/crypto.c
711
return (alg_type(alg) == ALG_KEYED_DIGEST);
sys/opencrypto/crypto.c
715
alg_is_aead(int alg)
sys/opencrypto/crypto.c
718
return (alg_type(alg) == ALG_AEAD);
tests/sys/opencrypto/blake2_test.c
103
sop.mac = alg;
tests/sys/opencrypto/blake2_test.c
109
"alg %d keylen %zu, errno=%d (%s)", alg, klen, errno,
tests/sys/opencrypto/blake2_test.c
97
create_session(int fd, int alg, int crid, const void *key, size_t klen)
tests/sys/opencrypto/poly1305_test.c
311
create_session(int fd, int alg, int crid, const void *key, size_t klen)
tests/sys/opencrypto/poly1305_test.c
317
sop.mac = alg;
tests/sys/opencrypto/poly1305_test.c
323
"alg %d keylen %zu, errno=%d (%s)", alg, klen, errno,
tools/tools/crypto/cryptocheck.c
1003
if (!openssl_cipher(alg, cipher, cipher_key, iv, cleartext + aad_len,
tools/tools/crypto/cryptocheck.c
1009
alg->name, aad_len, size);
tools/tools/crypto/cryptocheck.c
1015
warnx("OpenSSL %s (%zu, %zu) HMAC failed: %s", alg->name,
tools/tools/crypto/cryptocheck.c
1020
if (!ocf_init_eta_session(alg, cipher_key, cipher_key_len, auth_key,
tools/tools/crypto/cryptocheck.c
1030
alg->name, aad_len, size, crfind(ses.crid));
tools/tools/crypto/cryptocheck.c
1034
printf("%s (%zu, %zu) encryption mismatch:\n", alg->name,
tools/tools/crypto/cryptocheck.c
1045
alg->name, aad_len, size);
tools/tools/crypto/cryptocheck.c
1047
printf("%s (%zu, %zu) enc hash mismatch:\n", alg->name,
tools/tools/crypto/cryptocheck.c
1062
alg->name, aad_len, size, crfind(ses.crid));
tools/tools/crypto/cryptocheck.c
1066
printf("%s (%zu, %zu) decryption mismatch:\n", alg->name,
tools/tools/crypto/cryptocheck.c
1084
alg->name, aad_len, size, crfind(ses.crid));
tools/tools/crypto/cryptocheck.c
1088
alg->name, aad_len, size, crfind(ses.crid));
tools/tools/crypto/cryptocheck.c
1094
alg->name, aad_len, size, crfind(ses.crid));
tools/tools/crypto/cryptocheck.c
1108
openssl_gmac(const struct alg *alg, const EVP_CIPHER *cipher, const char *key,
tools/tools/crypto/cryptocheck.c
1116
warnx("OpenSSL %s (%zu) ctx new failed: %s", alg->name,
tools/tools/crypto/cryptocheck.c
1122
warnx("OpenSSL %s (%zu) ctx init failed: %s", alg->name,
tools/tools/crypto/cryptocheck.c
1130
alg->name, size, ERR_error_string(ERR_get_error(), NULL));
tools/tools/crypto/cryptocheck.c
1134
warnx("OpenSSL %s (%zu) final failed: %s", alg->name,
tools/tools/crypto/cryptocheck.c
1138
if (EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_AEAD_GET_TAG, alg->tag_len,
tools/tools/crypto/cryptocheck.c
1140
warnx("OpenSSL %s (%zu) get tag failed: %s", alg->name,
tools/tools/crypto/cryptocheck.c
1153
ocf_mac(const struct alg *alg, const char *input, size_t size, const char *key,
tools/tools/crypto/cryptocheck.c
1163
sop.mac = alg->mac;
tools/tools/crypto/cryptocheck.c
1164
if (!ocf_init_session(&sop, "MAC", alg->name, &ses))
tools/tools/crypto/cryptocheck.c
1175
warn("cryptodev %s (%zu) failed for device %s", alg->name,
tools/tools/crypto/cryptocheck.c
1187
run_gmac_test(const struct alg *alg, size_t size)
tools/tools/crypto/cryptocheck.c
1195
cipher = alg->evp_cipher();
tools/tools/crypto/cryptocheck.c
1204
iv = generate_iv(iv_len, alg);
tools/tools/crypto/cryptocheck.c
1208
if (!openssl_gmac(alg, cipher, key, iv, buffer, size, control_tag))
tools/tools/crypto/cryptocheck.c
1212
if (!ocf_mac(alg, buffer, size, key, key_len, iv, test_tag, &crid))
tools/tools/crypto/cryptocheck.c
1215
printf("%s (%zu) mismatch:\n", alg->name, size);
tools/tools/crypto/cryptocheck.c
1225
alg->name, size, crfind(crid));
tools/tools/crypto/cryptocheck.c
1234
openssl_digest(const struct alg *alg, const char *key, u_int key_len,
tools/tools/crypto/cryptocheck.c
1241
pkey = EVP_PKEY_new_raw_private_key(alg->pkey, NULL, key, key_len);
tools/tools/crypto/cryptocheck.c
1243
warnx("OpenSSL %s (%zu) pkey new failed: %s", alg->name,
tools/tools/crypto/cryptocheck.c
1249
warnx("OpenSSL %s (%zu) ctx new failed: %s", alg->name,
tools/tools/crypto/cryptocheck.c
1256
alg->name, size, ERR_error_string(ERR_get_error(), NULL));
tools/tools/crypto/cryptocheck.c
1260
warnx("OpenSSL %s (%zu) digest update failed: %s", alg->name,
tools/tools/crypto/cryptocheck.c
1266
warnx("OpenSSL %s (%zu) digest final failed: %s", alg->name,
tools/tools/crypto/cryptocheck.c
1281
run_digest_test(const struct alg *alg, size_t size)
tools/tools/crypto/cryptocheck.c
1291
key_len = alg->key_len;
tools/tools/crypto/cryptocheck.c
1297
if (!openssl_digest(alg, key, key_len, buffer, size, control_tag,
tools/tools/crypto/cryptocheck.c
1302
if (!ocf_mac(alg, buffer, size, key, key_len, NULL, test_tag, &crid))
tools/tools/crypto/cryptocheck.c
1305
printf("%s (%zu) mismatch:\n", alg->name, size);
tools/tools/crypto/cryptocheck.c
1315
alg->name, size, crfind(crid));
tools/tools/crypto/cryptocheck.c
1323
openssl_aead_encrypt(const struct alg *alg, const EVP_CIPHER *cipher,
tools/tools/crypto/cryptocheck.c
1332
warnx("OpenSSL %s (%zu) ctx new failed: %s", alg->name,
tools/tools/crypto/cryptocheck.c
1337
warnx("OpenSSL %s (%zu) ctx init failed: %s", alg->name,
tools/tools/crypto/cryptocheck.c
1343
warnx("OpenSSL %s (%zu) setting iv length failed: %s", alg->name,
tools/tools/crypto/cryptocheck.c
1349
warnx("OpenSSL %s (%zu) ctx init failed: %s", alg->name,
tools/tools/crypto/cryptocheck.c
1358
alg->name, size,
tools/tools/crypto/cryptocheck.c
1365
warnx("OpenSSL %s (%zu) encrypt update failed: %s", alg->name,
tools/tools/crypto/cryptocheck.c
1371
warnx("OpenSSL %s (%zu) encrypt final failed: %s", alg->name,
tools/tools/crypto/cryptocheck.c
1377
warnx("OpenSSL %s (%zu) encrypt size mismatch: %d", alg->name,
tools/tools/crypto/cryptocheck.c
1381
if (EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_AEAD_GET_TAG, alg->tag_len,
tools/tools/crypto/cryptocheck.c
1383
warnx("OpenSSL %s (%zu) get tag failed: %s", alg->name,
tools/tools/crypto/cryptocheck.c
1397
openssl_aead_decrypt(const struct alg *alg, const EVP_CIPHER *cipher,
tools/tools/crypto/cryptocheck.c
1407
errx(1, "OpenSSL %s (%zu) ctx new failed: %s", alg->name,
tools/tools/crypto/cryptocheck.c
1411
errx(1, "OpenSSL %s (%zu) ctx init failed: %s", alg->name,
tools/tools/crypto/cryptocheck.c
1418
alg->name, size,
tools/tools/crypto/cryptocheck.c
1423
errx(1, "OpenSSL %s (%zu) decrypt update failed: %s", alg->name,
tools/tools/crypto/cryptocheck.c
1426
if (EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_AEAD_SET_TAG, alg->tag_len,
tools/tools/crypto/cryptocheck.c
1428
errx(1, "OpenSSL %s (%zu) get tag failed: %s", alg->name,
tools/tools/crypto/cryptocheck.c
1433
errx(1, "OpenSSL %s (%zu) decrypt size mismatch: %d", alg->name,
tools/tools/crypto/cryptocheck.c
1441
openssl_ccm_encrypt(const struct alg *alg, const EVP_CIPHER *cipher,
tools/tools/crypto/cryptocheck.c
1451
alg->name, iv_len, aad_len, size,
tools/tools/crypto/cryptocheck.c
1457
alg->name, iv_len, aad_len, size,
tools/tools/crypto/cryptocheck.c
1464
alg->name, iv_len, aad_len, size,
tools/tools/crypto/cryptocheck.c
1471
alg->name, iv_len, aad_len, size,
tools/tools/crypto/cryptocheck.c
1478
alg->name, iv_len, aad_len, size,
tools/tools/crypto/cryptocheck.c
1484
alg->name, iv_len, aad_len, size,
tools/tools/crypto/cryptocheck.c
1493
alg->name, iv_len, aad_len, size,
tools/tools/crypto/cryptocheck.c
1501
alg->name, iv_len, aad_len, size,
tools/tools/crypto/cryptocheck.c
1508
alg->name, iv_len, aad_len, size,
tools/tools/crypto/cryptocheck.c
1515
alg->name, iv_len, aad_len, size, total);
tools/tools/crypto/cryptocheck.c
1521
alg->name, iv_len, aad_len, size,
tools/tools/crypto/cryptocheck.c
1534
ocf_init_aead_session(const struct alg *alg, const char *key, size_t key_len,
tools/tools/crypto/cryptocheck.c
1542
sop.cipher = alg->cipher;
tools/tools/crypto/cryptocheck.c
1544
return (ocf_init_session(&sop, "AEAD", alg->name, ses));
tools/tools/crypto/cryptocheck.c
1602
run_aead_test(const struct alg *alg, size_t aad_len, size_t size,
tools/tools/crypto/cryptocheck.c
1614
cipher = alg->evp_cipher();
tools/tools/crypto/cryptocheck.c
1619
alg->name, iv_len, aad_len, size,
tools/tools/crypto/cryptocheck.c
1628
alg->name, iv_len, aad_len, size);
tools/tools/crypto/cryptocheck.c
1638
iv = generate_iv(iv_len, alg);
tools/tools/crypto/cryptocheck.c
1649
ok = openssl_ccm_encrypt(alg, cipher, key, iv, iv_len, aad,
tools/tools/crypto/cryptocheck.c
1652
ok = openssl_aead_encrypt(alg, cipher, key, iv, iv_len, aad,
tools/tools/crypto/cryptocheck.c
1657
if (!ocf_init_aead_session(alg, key, key_len, iv_len, &ses))
tools/tools/crypto/cryptocheck.c
1665
alg->name, iv_len, aad_len, size, crfind(ses.crid));
tools/tools/crypto/cryptocheck.c
1669
printf("%s/%zu (%zu, %zu) encryption mismatch:\n", alg->name,
tools/tools/crypto/cryptocheck.c
1678
printf("%s/%zu (%zu, %zu) enc tag mismatch:\n", alg->name,
tools/tools/crypto/cryptocheck.c
1692
alg->name, iv_len, aad_len, size, crfind(ses.crid));
tools/tools/crypto/cryptocheck.c
1696
printf("%s/%zu (%zu, %zu) decryption mismatch:\n", alg->name,
tools/tools/crypto/cryptocheck.c
1713
alg->name, iv_len, aad_len, size, crfind(ses.crid));
tools/tools/crypto/cryptocheck.c
1717
alg->name, iv_len, aad_len, size, crfind(ses.crid));
tools/tools/crypto/cryptocheck.c
1723
alg->name, iv_len, aad_len, size, crfind(ses.crid));
tools/tools/crypto/cryptocheck.c
1737
run_test(const struct alg *alg, size_t aad_len, size_t size, size_t iv_len)
tools/tools/crypto/cryptocheck.c
1740
switch (alg->type) {
tools/tools/crypto/cryptocheck.c
1742
run_hash_test(alg, size);
tools/tools/crypto/cryptocheck.c
1745
run_hmac_test(alg, size);
tools/tools/crypto/cryptocheck.c
1748
run_gmac_test(alg, size);
tools/tools/crypto/cryptocheck.c
1751
run_digest_test(alg, size);
tools/tools/crypto/cryptocheck.c
1754
run_cipher_test(alg, size);
tools/tools/crypto/cryptocheck.c
1757
run_eta_test(alg, aad_len, size);
tools/tools/crypto/cryptocheck.c
1760
run_aead_test(alg, aad_len, size, iv_len);
tools/tools/crypto/cryptocheck.c
1766
run_test_sizes(const struct alg *alg)
tools/tools/crypto/cryptocheck.c
1770
switch (alg->type) {
tools/tools/crypto/cryptocheck.c
1773
run_test(alg, 0, sizes[i], 0);
tools/tools/crypto/cryptocheck.c
1778
run_test(alg, aad_sizes[i], sizes[j], 0);
tools/tools/crypto/cryptocheck.c
1784
run_test(alg, aad_sizes[i], sizes[j],
tools/tools/crypto/cryptocheck.c
1787
for (k = 0; alg->iv_sizes[k] != 0; k++)
tools/tools/crypto/cryptocheck.c
1788
run_test(alg, aad_sizes[i],
tools/tools/crypto/cryptocheck.c
1789
sizes[j], alg->iv_sizes[k]);
tools/tools/crypto/cryptocheck.c
1791
run_test(alg, aad_sizes[i], sizes[j],
tools/tools/crypto/cryptocheck.c
1792
alg->iv_sizes[0]);
tools/tools/crypto/cryptocheck.c
1833
const struct alg *cipher, *mac;
tools/tools/crypto/cryptocheck.c
1834
struct alg *eta;
tools/tools/crypto/cryptocheck.c
1879
const struct alg *alg;
tools/tools/crypto/cryptocheck.c
1880
struct alg *eta;
tools/tools/crypto/cryptocheck.c
2023
alg = find_alg(algname);
tools/tools/crypto/cryptocheck.c
2024
if (alg == NULL)
tools/tools/crypto/cryptocheck.c
2026
run_test_sizes(alg);
tools/tools/crypto/cryptocheck.c
275
static const struct alg *
tools/tools/crypto/cryptocheck.c
286
static struct alg *
tools/tools/crypto/cryptocheck.c
287
build_eta(const struct alg *cipher, const struct alg *mac)
tools/tools/crypto/cryptocheck.c
289
struct alg *eta;
tools/tools/crypto/cryptocheck.c
306
free_eta(struct alg *eta)
tools/tools/crypto/cryptocheck.c
312
static struct alg *
tools/tools/crypto/cryptocheck.c
315
const struct alg *cipher, *mac;
tools/tools/crypto/cryptocheck.c
433
generate_iv(size_t len, const struct alg *alg)
tools/tools/crypto/cryptocheck.c
438
switch (alg->cipher) {
tools/tools/crypto/cryptocheck.c
515
ocf_hash(const struct alg *alg, const char *buffer, size_t size, char *digest,
tools/tools/crypto/cryptocheck.c
523
sop.mac = alg->mac;
tools/tools/crypto/cryptocheck.c
524
if (!ocf_init_session(&sop, "HASH", alg->name, &ses))
tools/tools/crypto/cryptocheck.c
534
warn("cryptodev %s (%zu) HASH failed for device %s", alg->name,
tools/tools/crypto/cryptocheck.c
546
openssl_hash(const struct alg *alg, const EVP_MD *md, const void *buffer,
tools/tools/crypto/cryptocheck.c
575
warnx("OpenSSL %s HASH failed%s: %s", alg->name, errs,
tools/tools/crypto/cryptocheck.c
581
run_hash_test(const struct alg *alg, size_t size)
tools/tools/crypto/cryptocheck.c
592
md = alg->evp_md();
tools/tools/crypto/cryptocheck.c
599
if (!openssl_hash(alg, md, buffer, size, control_digest, &digest_len))
tools/tools/crypto/cryptocheck.c
603
if (!ocf_hash(alg, buffer, size, test_digest, &crid))
tools/tools/crypto/cryptocheck.c
608
alg->name, size);
tools/tools/crypto/cryptocheck.c
610
printf("%s (%zu) mismatch:\n", alg->name, size);
tools/tools/crypto/cryptocheck.c
620
alg->name, size, crfind(crid));
tools/tools/crypto/cryptocheck.c
627
ocf_hmac(const struct alg *alg, const char *buffer, size_t size,
tools/tools/crypto/cryptocheck.c
637
sop.mac = alg->mac;
tools/tools/crypto/cryptocheck.c
638
if (!ocf_init_session(&sop, "HMAC", alg->name, &ses))
tools/tools/crypto/cryptocheck.c
648
warn("cryptodev %s (%zu) HMAC failed for device %s", alg->name,
tools/tools/crypto/cryptocheck.c
660
run_hmac_test(const struct alg *alg, size_t size)
tools/tools/crypto/cryptocheck.c
671
md = alg->evp_md();
tools/tools/crypto/cryptocheck.c
682
warnx("OpenSSL %s (%zu) HMAC failed: %s", alg->name,
tools/tools/crypto/cryptocheck.c
688
if (!ocf_hmac(alg, buffer, size, key, key_len, test_digest, &crid))
tools/tools/crypto/cryptocheck.c
693
alg->name, size);
tools/tools/crypto/cryptocheck.c
695
printf("%s (%zu) mismatch:\n", alg->name, size);
tools/tools/crypto/cryptocheck.c
705
alg->name, size, crfind(crid));
tools/tools/crypto/cryptocheck.c
713
openssl_cipher(const struct alg *alg, const EVP_CIPHER *cipher, const char *key,
tools/tools/crypto/cryptocheck.c
721
warnx("OpenSSL %s (%zu) ctx new failed: %s", alg->name,
tools/tools/crypto/cryptocheck.c
727
warnx("OpenSSL %s (%zu) ctx init failed: %s", alg->name,
tools/tools/crypto/cryptocheck.c
734
warnx("OpenSSL %s (%zu) cipher update failed: %s", alg->name,
tools/tools/crypto/cryptocheck.c
740
warnx("OpenSSL %s (%zu) cipher final failed: %s", alg->name,
tools/tools/crypto/cryptocheck.c
746
warnx("OpenSSL %s (%zu) cipher size mismatch: %d", alg->name,
tools/tools/crypto/cryptocheck.c
759
ocf_init_cipher_session(const struct alg *alg, const char *key, size_t key_len,
tools/tools/crypto/cryptocheck.c
767
sop.cipher = alg->cipher;
tools/tools/crypto/cryptocheck.c
768
return (ocf_init_session(&sop, "cipher", alg->name, ses));
tools/tools/crypto/cryptocheck.c
772
ocf_cipher(const struct ocf_session *ses, const struct alg *alg, const char *iv,
tools/tools/crypto/cryptocheck.c
786
alg->name, size, crfind(ses->crid));
tools/tools/crypto/cryptocheck.c
794
run_cipher_test(const struct alg *alg, size_t size)
tools/tools/crypto/cryptocheck.c
802
cipher = alg->evp_cipher();
tools/tools/crypto/cryptocheck.c
807
alg->name, size, EVP_CIPHER_block_size(cipher));
tools/tools/crypto/cryptocheck.c
820
printf("%s (%zu): invalid buffer size\n", alg->name,
tools/tools/crypto/cryptocheck.c
829
iv = generate_iv(iv_len, alg);
tools/tools/crypto/cryptocheck.c
835
if (!openssl_cipher(alg, cipher, key, iv, cleartext, ciphertext, size,
tools/tools/crypto/cryptocheck.c
839
warnx("OpenSSL %s (%zu): cipher text unchanged", alg->name,
tools/tools/crypto/cryptocheck.c
843
if (!openssl_cipher(alg, cipher, key, iv, ciphertext, buffer, size, 0))
tools/tools/crypto/cryptocheck.c
846
printf("OpenSSL %s (%zu): cipher mismatch:", alg->name, size);
tools/tools/crypto/cryptocheck.c
854
if (!ocf_init_cipher_session(alg, key, key_len, &ses))
tools/tools/crypto/cryptocheck.c
858
if (!ocf_cipher(&ses, alg, iv, cleartext, buffer, size, COP_ENCRYPT))
tools/tools/crypto/cryptocheck.c
861
printf("%s (%zu) encryption mismatch:\n", alg->name, size);
tools/tools/crypto/cryptocheck.c
870
if (!ocf_cipher(&ses, alg, iv, ciphertext, buffer, size, COP_DECRYPT))
tools/tools/crypto/cryptocheck.c
873
printf("%s (%zu) decryption mismatch:\n", alg->name, size);
tools/tools/crypto/cryptocheck.c
883
alg->name, size, crfind(ses.crid));
tools/tools/crypto/cryptocheck.c
896
ocf_init_eta_session(const struct alg *alg, const char *cipher_key,
tools/tools/crypto/cryptocheck.c
905
sop.cipher = alg->cipher;
tools/tools/crypto/cryptocheck.c
908
sop.mac = alg->mac;
tools/tools/crypto/cryptocheck.c
909
return (ocf_init_session(&sop, "ETA", alg->name, ses));
tools/tools/crypto/cryptocheck.c
954
run_eta_test(const struct alg *alg, size_t aad_len, size_t size)
tools/tools/crypto/cryptocheck.c
965
cipher = alg->evp_cipher();
tools/tools/crypto/cryptocheck.c
970
alg->name, aad_len, size,
tools/tools/crypto/cryptocheck.c
979
printf("%s (%zu): invalid buffer size\n", alg->name,
tools/tools/crypto/cryptocheck.c
987
md = alg->evp_md();
tools/tools/crypto/cryptocheck.c
994
iv = generate_iv(iv_len, alg);
tools/tools/crypto/ipsecstats.c
42
static const struct alg aalgs[] = {
tools/tools/crypto/ipsecstats.c
53
static const struct alg espalgs[] = {
tools/tools/crypto/ipsecstats.c
62
static const struct alg ipcompalgs[] = {
tools/tools/crypto/ipsecstats.c
70
algname(int a, const struct alg algs[], int nalgs)
tools/tools/sortbench/sort_bench.c
180
parse_alg(char *alg)
tools/tools/sortbench/sort_bench.c
182
if (strcmp(alg, "merge") == 0)
tools/tools/sortbench/sort_bench.c
185
else if (strcmp(alg, "wiki") == 0)
tools/tools/sortbench/sort_bench.c
188
else if (strcmp(alg, "quick") == 0)
tools/tools/sortbench/sort_bench.c
190
else if (strcmp(alg, "heap") == 0)
usr.sbin/makefs/zfs/dsl.c
201
enum zio_compress alg;
usr.sbin/makefs/zfs/dsl.c
223
compression_algorithms[i].alg);