Searched refs:alg (Results 126 - 150 of 309) sorted by relevance

1234567891011>>

/macosx-10.10/Security-57031.1.35/Security/libsecurity_cdsa_client/lib/
H A Dgenkey.h39 GenerateKey(const CSP &csp, CSSM_ALGORITHMS alg, uint32 size = 0);
/macosx-10.10/Security-57031.1.35/Security/libsecurity_pkcs12/lib/
H A Dpkcs12Coder.cpp394 CFDataRef alg)
396 p12CfDataToCssm(alg, mWeakEncrAlg, mCoder);
400 CFDataRef alg)
402 p12CfDataToCssm(alg, mStrongEncrAlg, mCoder);
393 weakEncrAlg( CFDataRef alg) argument
399 strongEncrAlg( CFDataRef alg) argument
/macosx-10.10/Security-57031.1.35/Security/libsecurity_smime/lib/
H A Dcmsutil.c218 CSSM_ALGORITHMS alg = oidData->cssmAlgorithm; local
219 if (alg)
222 CSSM_CSP_HANDLE cspHandle = SecCspHandleForAlgorithm(alg);
224 if (!CSSM_CSP_CreateDigestContext(cspHandle, alg, &digobj))
270 * In which case we really do want the combined ECDSA_WithSHA1 alg...
/macosx-10.10/Security-57031.1.35/Security/sec/Security/
H A DSecDH.h83 @param alg A DER-encoded ASN.1 Algorithm Identifier object, as per PKCS1,
85 @param alg_len Length of alg, in bytes
93 OSStatus SecDHCreateFromAlgorithmId(const uint8_t *alg, size_t alg_len,
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/p12/
H A Dp12Crypto.h82 CSSM_ALGORITHMS alg, // better be SHA1!
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/p12Parse/
H A Dp12Crypto.h82 CSSM_ALGORITHMS alg, // better be SHA1!
/macosx-10.10/Security-57031.1.35/libsecurity_smime/Security/
H A Dcmsutil.c237 CSSM_ALGORITHMS alg = oidData->cssmAlgorithm; local
238 if (alg)
241 CSSM_CSP_HANDLE cspHandle = SecCspHandleForAlgorithm(alg);
243 if (!CSSM_CSP_CreateDigestContext(cspHandle, alg, &digobj))
/macosx-10.10/Security-57031.1.35/libsecurity_smime/lib/
H A Dcmsutil.c237 CSSM_ALGORITHMS alg = oidData->cssmAlgorithm; local
238 if (alg)
241 CSSM_CSP_HANDLE cspHandle = SecCspHandleForAlgorithm(alg);
243 if (!CSSM_CSP_CreateDigestContext(cspHandle, alg, &digobj))
/macosx-10.10/Security-57031.1.35/libsecurity_smime/security_smime/
H A Dcmsutil.c237 CSSM_ALGORITHMS alg = oidData->cssmAlgorithm; local
238 if (alg)
241 CSSM_CSP_HANDLE cspHandle = SecCspHandleForAlgorithm(alg);
243 if (!CSSM_CSP_CreateDigestContext(cspHandle, alg, &digobj))
/macosx-10.10/bind9-45.101/bind9/lib/irs/
H A Ddnsconf.c64 isc_uint32_t flags, proto, alg; local
95 alg = cfg_obj_asuint32(cfg_tuple_get(key,
109 if (alg > 0xff)
113 keystruct.algorithm = (isc_uint8_t)alg;
/macosx-10.10/libresolv-57/
H A Dns_verify.c149 char name[NS_MAXDNAME], alg[NS_MAXDNAME]; local
189 n = dn_expand(msg, eom, cp, alg, NS_MAXDNAME);
192 if (ns_samename(alg, NS_TSIG_ALG_HMAC_MD5) != 1)
274 n = ns_name_pton(alg, buf2, sizeof(buf2));
355 char name[NS_MAXDNAME], alg[NS_MAXDNAME]; local
415 n = dn_expand(msg, eom, cp, alg, NS_MAXDNAME);
418 if (ns_samename(alg, NS_TSIG_ALG_HMAC_MD5) != 1)
H A Ddst_support.c244 * form: K<keyname>+<alg>+<id>.<suffix>
276 * form: K<keyname>+<alg>+<id>.<suffix>
286 int alg, const char *suffix, size_t filename_length)
299 sprintf(filename, "K%s+%03d+%05d.%s", name, alg, my_id,
285 dst_s_build_filename(char *filename, const char *name, u_int16_t id, int alg, const char *suffix, size_t filename_length) argument
/macosx-10.10/CommonCrypto-60061/lib/
H A DCommonDigest.c87 CCDigestInit(CCDigestAlgorithm alg, CCDigestRef c) argument
89 if(alg == 0 || alg >= diMax) return kCCParamError;
92 CC_DEBUG_LOG(ASL_LEVEL_ERR, "Entering Algorithm: %d\n", alg);
95 if((p->di = CCDigestGetDigestInfo(alg)) != NULL) {
132 CCDigest(CCDigestAlgorithm alg, const uint8_t *data, size_t len, uint8_t *out) argument
136 CC_DEBUG_LOG(ASL_LEVEL_ERR, "Entering Algorithm: %d\n", alg);
137 if((di = CCDigestGetDigestInfo(alg)) != NULL) {
199 CCDigestCreate(CCDigestAlgorithm alg) argument
205 if(CCDigestInit(alg, retva
[all...]
H A DCommonCryptor.c323 CCAlgorithm alg, /* kCCAlgorithmDES, etc. */
336 CCCryptorStatus err = CCCryptorCreate(op, alg, options, key, keyLength, iv, &cryptor->compat);
343 CCAlgorithm alg, /* kCCAlgorithmDES, etc. */
362 if(alg == kCCAlgorithmRC4) mode = kCCModeRC4;
380 return CCCryptorCreateWithMode(op, mode, alg, padding, iv, key, keyLength, tweak, tweakLength, numRounds, modeOptions, cryptorRef);
388 CCAlgorithm alg,
404 CCCryptorStatus err = CCCryptorCreateWithMode(op, mode, alg, padding, iv, key, keyLength, tweak, tweakLength, numRounds, options, &cryptor->compat);
413 CCAlgorithm alg,
428 CC_DEBUG_LOG(ASL_LEVEL_ERR, "Entering Op: %d Mode: %d Cipher: %d Padding: %d\n", op, mode, alg, padding);
431 if(alg
321 CCCryptorCreateFromData( CCOperation op, CCAlgorithm alg, CCOptions options, const void *key, size_t keyLength, const void *iv, const void *data, size_t dataLength, CCCryptorRef *cryptorRef, size_t *dataUsed) argument
341 CCCryptorCreate( CCOperation op, CCAlgorithm alg, CCOptions options, const void *key, size_t keyLength, const void *iv, CCCryptorRef *cryptorRef) argument
385 CCCryptorCreateFromDataWithMode( CCOperation op, CCMode mode, CCAlgorithm alg, CCPadding padding, const void *iv, const void *key, size_t keyLength, const void *tweak, size_t tweakLength, int numRounds, CCModeOptions options, const void *data, size_t dataLength, CCCryptorRef *cryptorRef, size_t *dataUsed) argument
410 CCCryptorCreateWithMode( CCOperation op, CCMode mode, CCAlgorithm alg, CCPadding padding, const void *iv, const void *key, size_t keyLength, const void *tweak, size_t tweakLength, int numRounds, CCModeOptions options, CCCryptorRef *cryptorRef) argument
803 CCCrypt( CCOperation op, CCAlgorithm alg, CCOptions options, const void *key, size_t keyLength, const void *iv, const void *dataIn, size_t dataInLength, void *dataOut, size_t dataOutAvailable, size_t *dataOutMoved) argument
[all...]
/macosx-10.10/mDNSResponder-561.1.1/mDNSMacOSX/
H A DDNSSECSupport.c72 LogInfo("LinkTrustAnchor: Zone %##s, keytag %d, alg %d, digestType %d, digestLen %d, digest %s", ta->zone.c, ta->rds.keyTag,
73 ta->rds.alg, ta->rds.digestType, ta->digestLen, buffer);
97 mDNSlocal void AddTrustAnchor(mDNS *const m, const domainname *zone, mDNSu16 keytag, mDNSu8 alg, mDNSu8 digestType, int diglen, argument
107 if (SameDomainName(zone, &tmp->zone) && tmp->rds.keyTag == keytag && tmp->rds.alg == alg && tmp->rds.digestType == digestType &&
123 ta->rds.alg = alg;
232 ta->rds.alg = strtol((const char *)val, &invalid, 10);
240 LogInfo("ParseElementChildren: Element %s, value %d", cur_node->name, ta->rds.alg);
365 switch (ta->rds.alg)
[all...]
/macosx-10.10/OpenSSL098-52/src/fips/
H A Dfipsalgtest.pl564 --enable-<alg> Enable algorithm set <alg>.
565 --disable-<alg> Disable algorithm set <alg>.
566 Where <alg> can be one of:
/macosx-10.10/Security-57031.1.35/Security/libsecurity_apple_csp/lib/
H A Dbsafecspi.h72 uint32 alg); // CSSM_ALGID_{RSA,DSA}
83 uint32 alg() { return mAlg; } function in class:BSafe::BSafeBinaryKey
260 // generate alg params, not handled by PublicKeyGenerateContext
336 B_INFO_TYPE alg) :
338 algorithm(alg) { }
368 * Stateless, private function to map a CSSM alg and pub/priv state
373 CSSM_ALGORITHMS alg,
333 RandomContext( AppleCSPSession &session, const Context &, B_INFO_TYPE alg) argument
/macosx-10.10/Security-57031.1.35/SecurityTests/cspxutils/symDelta/
H A DsymDelta.c104 static void algInfo(privAlg alg, // pka_DES, etc. argument
106 // key alg for key gen algs
107 CSSM_ALGORITHMS *encrAlg, // encrypt/decrypt alg for key
113 switch(alg) {
156 CSSM_ALGORITHMS alg,
166 switch(alg) {
202 * Given alg and mode, determine alignment of ptext size. 0 means no
206 CSSM_ALGORITHMS alg,
209 switch(alg) {
220 if(alg
155 modeInfo( CSSM_ALGORITHMS alg, privMode mode, CSSM_ENCRYPT_MODE *cdsaMode, const char **modeStr, CSSM_PADDING *pad, CSSM_BOOL *useInitVector) argument
205 alignInfo( CSSM_ALGORITHMS alg, CSSM_ENCRYPT_MODE mode) argument
266 encryptCom(CSSM_CSP_HANDLE cspHand, const char *testName, CSSM_DATA_PTR ptext, CSSM_KEY_PTR key, CSSM_ALGORITHMS alg, CSSM_ENCRYPT_MODE mode, CSSM_PADDING padding, CSSM_DATA_PTR iv, uint32 effectiveKeySizeInBits, uint32 rounds, CSSM_DATA_PTR ctext, CSSM_BOOL quiet) argument
[all...]
/macosx-10.10/OpenSSL098-52/src/crypto/cms/
H A Dcms_sd.c306 X509_ALGOR *alg; local
363 alg = sk_X509_ALGOR_value(sd->digestAlgorithms, i);
364 X509_ALGOR_get0(&aoid, NULL, NULL, alg);
371 alg = X509_ALGOR_new();
372 if (!alg)
374 cms_DigestAlgorithm_set(alg, md);
375 if (!sk_X509_ALGOR_push(sd->digestAlgorithms, alg))
377 X509_ALGOR_free(alg);
958 X509_ALGOR *alg; local
966 alg
[all...]
/macosx-10.10/CommonCrypto-60061/include/
H A DCommonCryptorSPI.h105 CCAlgorithm alg,
289 CCAlgorithm alg,
/macosx-10.10/Heimdal-398.1.2/lib/hcrypto/
H A Devp-crypt.c95 import_key(int alg, const unsigned char *key, size_t keylen) argument
109 key_blob->hdr.aiKeyAlg = alg;
/macosx-10.10/OpenSSL098-52/src/fips/hmac/
H A Dfips_hmac_selftest.c57 const EVP_MD *(*alg)(void); member in struct:__anon3390
122 md = (*t->alg)();
/macosx-10.10/apache-793/httpd/modules/lua/
H A Dlua_passwd.c98 switch (ctx->alg) {
171 ctx->alg);
/macosx-10.10/ipsec-286.1.1/ipsec-tools/Common/
H A Dkey_debug.c314 struct sadb_alg *alg; local
322 / sizeof(*alg);
323 alg = (void *)(sup + 1);
327 alg->sadb_alg_id, alg->sadb_alg_ivlen,
328 alg->sadb_alg_minbits, alg->sadb_alg_maxbits);
329 alg++;
/macosx-10.10/xnu-2782.1.97/bsd/netkey/
H A Dkey_debug.c270 struct sadb_alg *alg; local
278 / sizeof(*alg);
279 alg = (struct sadb_alg *)(sup + 1);
283 alg->sadb_alg_id, alg->sadb_alg_ivlen,
284 alg->sadb_alg_minbits, alg->sadb_alg_maxbits);
285 alg++;

Completed in 420 milliseconds

1234567891011>>