/macosx-10.10/Security-57031.1.35/Security/libsecurity_cdsa_client/lib/ |
H A D | genkey.h | 39 GenerateKey(const CSP &csp, CSSM_ALGORITHMS alg, uint32 size = 0);
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_pkcs12/lib/ |
H A D | pkcs12Coder.cpp | 394 CFDataRef alg) 396 p12CfDataToCssm(alg, mWeakEncrAlg, mCoder); 400 CFDataRef alg) 402 p12CfDataToCssm(alg, mStrongEncrAlg, mCoder); 393 weakEncrAlg( CFDataRef alg) argument 399 strongEncrAlg( CFDataRef alg) argument
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_smime/lib/ |
H A D | cmsutil.c | 218 CSSM_ALGORITHMS alg = oidData->cssmAlgorithm; local 219 if (alg) 222 CSSM_CSP_HANDLE cspHandle = SecCspHandleForAlgorithm(alg); 224 if (!CSSM_CSP_CreateDigestContext(cspHandle, alg, &digobj)) 270 * In which case we really do want the combined ECDSA_WithSHA1 alg...
|
/macosx-10.10/Security-57031.1.35/Security/sec/Security/ |
H A D | SecDH.h | 83 @param alg A DER-encoded ASN.1 Algorithm Identifier object, as per PKCS1, 85 @param alg_len Length of alg, in bytes 93 OSStatus SecDHCreateFromAlgorithmId(const uint8_t *alg, size_t alg_len,
|
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/p12/ |
H A D | p12Crypto.h | 82 CSSM_ALGORITHMS alg, // better be SHA1!
|
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/p12Parse/ |
H A D | p12Crypto.h | 82 CSSM_ALGORITHMS alg, // better be SHA1!
|
/macosx-10.10/Security-57031.1.35/libsecurity_smime/Security/ |
H A D | cmsutil.c | 237 CSSM_ALGORITHMS alg = oidData->cssmAlgorithm; local 238 if (alg) 241 CSSM_CSP_HANDLE cspHandle = SecCspHandleForAlgorithm(alg); 243 if (!CSSM_CSP_CreateDigestContext(cspHandle, alg, &digobj))
|
/macosx-10.10/Security-57031.1.35/libsecurity_smime/lib/ |
H A D | cmsutil.c | 237 CSSM_ALGORITHMS alg = oidData->cssmAlgorithm; local 238 if (alg) 241 CSSM_CSP_HANDLE cspHandle = SecCspHandleForAlgorithm(alg); 243 if (!CSSM_CSP_CreateDigestContext(cspHandle, alg, &digobj))
|
/macosx-10.10/Security-57031.1.35/libsecurity_smime/security_smime/ |
H A D | cmsutil.c | 237 CSSM_ALGORITHMS alg = oidData->cssmAlgorithm; local 238 if (alg) 241 CSSM_CSP_HANDLE cspHandle = SecCspHandleForAlgorithm(alg); 243 if (!CSSM_CSP_CreateDigestContext(cspHandle, alg, &digobj))
|
/macosx-10.10/bind9-45.101/bind9/lib/irs/ |
H A D | dnsconf.c | 64 isc_uint32_t flags, proto, alg; local 95 alg = cfg_obj_asuint32(cfg_tuple_get(key, 109 if (alg > 0xff) 113 keystruct.algorithm = (isc_uint8_t)alg;
|
/macosx-10.10/libresolv-57/ |
H A D | ns_verify.c | 149 char name[NS_MAXDNAME], alg[NS_MAXDNAME]; local 189 n = dn_expand(msg, eom, cp, alg, NS_MAXDNAME); 192 if (ns_samename(alg, NS_TSIG_ALG_HMAC_MD5) != 1) 274 n = ns_name_pton(alg, buf2, sizeof(buf2)); 355 char name[NS_MAXDNAME], alg[NS_MAXDNAME]; local 415 n = dn_expand(msg, eom, cp, alg, NS_MAXDNAME); 418 if (ns_samename(alg, NS_TSIG_ALG_HMAC_MD5) != 1)
|
H A D | dst_support.c | 244 * form: K<keyname>+<alg>+<id>.<suffix> 276 * form: K<keyname>+<alg>+<id>.<suffix> 286 int alg, const char *suffix, size_t filename_length) 299 sprintf(filename, "K%s+%03d+%05d.%s", name, alg, my_id, 285 dst_s_build_filename(char *filename, const char *name, u_int16_t id, int alg, const char *suffix, size_t filename_length) argument
|
/macosx-10.10/CommonCrypto-60061/lib/ |
H A D | CommonDigest.c | 87 CCDigestInit(CCDigestAlgorithm alg, CCDigestRef c) argument 89 if(alg == 0 || alg >= diMax) return kCCParamError; 92 CC_DEBUG_LOG(ASL_LEVEL_ERR, "Entering Algorithm: %d\n", alg); 95 if((p->di = CCDigestGetDigestInfo(alg)) != NULL) { 132 CCDigest(CCDigestAlgorithm alg, const uint8_t *data, size_t len, uint8_t *out) argument 136 CC_DEBUG_LOG(ASL_LEVEL_ERR, "Entering Algorithm: %d\n", alg); 137 if((di = CCDigestGetDigestInfo(alg)) != NULL) { 199 CCDigestCreate(CCDigestAlgorithm alg) argument 205 if(CCDigestInit(alg, retva [all...] |
H A D | CommonCryptor.c | 323 CCAlgorithm alg, /* kCCAlgorithmDES, etc. */ 336 CCCryptorStatus err = CCCryptorCreate(op, alg, options, key, keyLength, iv, &cryptor->compat); 343 CCAlgorithm alg, /* kCCAlgorithmDES, etc. */ 362 if(alg == kCCAlgorithmRC4) mode = kCCModeRC4; 380 return CCCryptorCreateWithMode(op, mode, alg, padding, iv, key, keyLength, tweak, tweakLength, numRounds, modeOptions, cryptorRef); 388 CCAlgorithm alg, 404 CCCryptorStatus err = CCCryptorCreateWithMode(op, mode, alg, padding, iv, key, keyLength, tweak, tweakLength, numRounds, options, &cryptor->compat); 413 CCAlgorithm alg, 428 CC_DEBUG_LOG(ASL_LEVEL_ERR, "Entering Op: %d Mode: %d Cipher: %d Padding: %d\n", op, mode, alg, padding); 431 if(alg 321 CCCryptorCreateFromData( CCOperation op, CCAlgorithm alg, CCOptions options, const void *key, size_t keyLength, const void *iv, const void *data, size_t dataLength, CCCryptorRef *cryptorRef, size_t *dataUsed) argument 341 CCCryptorCreate( CCOperation op, CCAlgorithm alg, CCOptions options, const void *key, size_t keyLength, const void *iv, CCCryptorRef *cryptorRef) argument 385 CCCryptorCreateFromDataWithMode( CCOperation op, CCMode mode, CCAlgorithm alg, CCPadding padding, const void *iv, const void *key, size_t keyLength, const void *tweak, size_t tweakLength, int numRounds, CCModeOptions options, const void *data, size_t dataLength, CCCryptorRef *cryptorRef, size_t *dataUsed) argument 410 CCCryptorCreateWithMode( CCOperation op, CCMode mode, CCAlgorithm alg, CCPadding padding, const void *iv, const void *key, size_t keyLength, const void *tweak, size_t tweakLength, int numRounds, CCModeOptions options, CCCryptorRef *cryptorRef) argument 803 CCCrypt( CCOperation op, CCAlgorithm alg, CCOptions options, const void *key, size_t keyLength, const void *iv, const void *dataIn, size_t dataInLength, void *dataOut, size_t dataOutAvailable, size_t *dataOutMoved) argument [all...] |
/macosx-10.10/mDNSResponder-561.1.1/mDNSMacOSX/ |
H A D | DNSSECSupport.c | 72 LogInfo("LinkTrustAnchor: Zone %##s, keytag %d, alg %d, digestType %d, digestLen %d, digest %s", ta->zone.c, ta->rds.keyTag, 73 ta->rds.alg, ta->rds.digestType, ta->digestLen, buffer); 97 mDNSlocal void AddTrustAnchor(mDNS *const m, const domainname *zone, mDNSu16 keytag, mDNSu8 alg, mDNSu8 digestType, int diglen, argument 107 if (SameDomainName(zone, &tmp->zone) && tmp->rds.keyTag == keytag && tmp->rds.alg == alg && tmp->rds.digestType == digestType && 123 ta->rds.alg = alg; 232 ta->rds.alg = strtol((const char *)val, &invalid, 10); 240 LogInfo("ParseElementChildren: Element %s, value %d", cur_node->name, ta->rds.alg); 365 switch (ta->rds.alg) [all...] |
/macosx-10.10/OpenSSL098-52/src/fips/ |
H A D | fipsalgtest.pl | 564 --enable-<alg> Enable algorithm set <alg>. 565 --disable-<alg> Disable algorithm set <alg>. 566 Where <alg> can be one of:
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_apple_csp/lib/ |
H A D | bsafecspi.h | 72 uint32 alg); // CSSM_ALGID_{RSA,DSA} 83 uint32 alg() { return mAlg; } function in class:BSafe::BSafeBinaryKey 260 // generate alg params, not handled by PublicKeyGenerateContext 336 B_INFO_TYPE alg) : 338 algorithm(alg) { } 368 * Stateless, private function to map a CSSM alg and pub/priv state 373 CSSM_ALGORITHMS alg, 333 RandomContext( AppleCSPSession &session, const Context &, B_INFO_TYPE alg) argument
|
/macosx-10.10/Security-57031.1.35/SecurityTests/cspxutils/symDelta/ |
H A D | symDelta.c | 104 static void algInfo(privAlg alg, // pka_DES, etc. argument 106 // key alg for key gen algs 107 CSSM_ALGORITHMS *encrAlg, // encrypt/decrypt alg for key 113 switch(alg) { 156 CSSM_ALGORITHMS alg, 166 switch(alg) { 202 * Given alg and mode, determine alignment of ptext size. 0 means no 206 CSSM_ALGORITHMS alg, 209 switch(alg) { 220 if(alg 155 modeInfo( CSSM_ALGORITHMS alg, privMode mode, CSSM_ENCRYPT_MODE *cdsaMode, const char **modeStr, CSSM_PADDING *pad, CSSM_BOOL *useInitVector) argument 205 alignInfo( CSSM_ALGORITHMS alg, CSSM_ENCRYPT_MODE mode) argument 266 encryptCom(CSSM_CSP_HANDLE cspHand, const char *testName, CSSM_DATA_PTR ptext, CSSM_KEY_PTR key, CSSM_ALGORITHMS alg, CSSM_ENCRYPT_MODE mode, CSSM_PADDING padding, CSSM_DATA_PTR iv, uint32 effectiveKeySizeInBits, uint32 rounds, CSSM_DATA_PTR ctext, CSSM_BOOL quiet) argument [all...] |
/macosx-10.10/OpenSSL098-52/src/crypto/cms/ |
H A D | cms_sd.c | 306 X509_ALGOR *alg; local 363 alg = sk_X509_ALGOR_value(sd->digestAlgorithms, i); 364 X509_ALGOR_get0(&aoid, NULL, NULL, alg); 371 alg = X509_ALGOR_new(); 372 if (!alg) 374 cms_DigestAlgorithm_set(alg, md); 375 if (!sk_X509_ALGOR_push(sd->digestAlgorithms, alg)) 377 X509_ALGOR_free(alg); 958 X509_ALGOR *alg; local 966 alg [all...] |
/macosx-10.10/CommonCrypto-60061/include/ |
H A D | CommonCryptorSPI.h | 105 CCAlgorithm alg, 289 CCAlgorithm alg,
|
/macosx-10.10/Heimdal-398.1.2/lib/hcrypto/ |
H A D | evp-crypt.c | 95 import_key(int alg, const unsigned char *key, size_t keylen) argument 109 key_blob->hdr.aiKeyAlg = alg;
|
/macosx-10.10/OpenSSL098-52/src/fips/hmac/ |
H A D | fips_hmac_selftest.c | 57 const EVP_MD *(*alg)(void); member in struct:__anon3390 122 md = (*t->alg)();
|
/macosx-10.10/apache-793/httpd/modules/lua/ |
H A D | lua_passwd.c | 98 switch (ctx->alg) { 171 ctx->alg);
|
/macosx-10.10/ipsec-286.1.1/ipsec-tools/Common/ |
H A D | key_debug.c | 314 struct sadb_alg *alg; local 322 / sizeof(*alg); 323 alg = (void *)(sup + 1); 327 alg->sadb_alg_id, alg->sadb_alg_ivlen, 328 alg->sadb_alg_minbits, alg->sadb_alg_maxbits); 329 alg++;
|
/macosx-10.10/xnu-2782.1.97/bsd/netkey/ |
H A D | key_debug.c | 270 struct sadb_alg *alg; local 278 / sizeof(*alg); 279 alg = (struct sadb_alg *)(sup + 1); 283 alg->sadb_alg_id, alg->sadb_alg_ivlen, 284 alg->sadb_alg_minbits, alg->sadb_alg_maxbits); 285 alg++;
|