/macosx-10.10/Security-57031.1.35/Security/include/security_utilities/ |
H A D | hashing.h | 141 CCHashInstance(CCDigestAlg alg);
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_keychain/Security/ |
H A D | SecCertificatePriv.h | 197 CSSM_RETURN SecDigestGetData(CSSM_ALGORITHMS alg, CSSM_DATA* digest, const CSSM_DATA* data);
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_keychain/lib/ |
H A D | SecCertificatePriv.h | 197 CSSM_RETURN SecDigestGetData(CSSM_ALGORITHMS alg, CSSM_DATA* digest, const CSSM_DATA* data);
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_ssl/Security/ |
H A D | appleCdsa.h | 42 CSSM_ALGORITHMS alg,
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_ssl/lib/ |
H A D | appleCdsa.h | 42 CSSM_ALGORITHMS alg,
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_ssl/security_ssl/ |
H A D | appleCdsa.h | 42 CSSM_ALGORITHMS alg,
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_transform/lib/ |
H A D | Digest.h | 174 Hmac(Transform* parentTransform, CFStringRef digestType, CCHmacAlgorithm alg, size_t length);
|
H A D | Digest.cpp | 531 Hmac::Hmac(Transform* parentTransform, CFStringRef digestType, CCHmacAlgorithm alg, size_t length) : argument 532 Digest(digestType, length), mInitialized(false), mParentTransform(parentTransform), mAlg(alg)
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_utilities/lib/ |
H A D | hashing.h | 141 CCHashInstance(CCDigestAlg alg);
|
/macosx-10.10/WebCore-7600.1.25/crypto/ |
H A D | CommonCryptoUtilities.h | 92 extern "C" CCCryptorStatus CCCryptorGCM(CCOperation op, CCAlgorithm alg, const void* key, size_t keyLength, const void* iv, size_t ivLen, const void* aData, size_t aDataLen, const void* dataIn, size_t dataInLength, void* dataOut, const void* tag, size_t* tagLength);
|
/macosx-10.10/bind9-45.101/bind9/lib/dns/rdata/any_255/ |
H A D | tsig_250.c | 432 dns_name_t alg; local 449 dns_name_init(&alg, NULL); 450 dns_name_fromregion(&alg, &sr); 452 RETERR(name_duporclone(&alg, mctx, &tsig->algorithm));
|
/macosx-10.10/libresolv-57/ |
H A D | dst_internal.h | 153 u_int16_t id, int alg, const char *suffix,
|
H A D | res_sendsigned.c | 68 if (ns_samename(key->alg, NS_TSIG_ALG_HMAC_MD5) != 1)
|
/macosx-10.10/ipsec-286.1.1/ipsec-tools/Common/ |
H A D | pfkey.c | 234 struct sadb_alg *alg; local 236 alg = findsupportedalg(satype, alg_id); 237 if (!alg) 240 if (keylen < alg->sadb_alg_minbits || keylen > alg->sadb_alg_maxbits) { 241 fprintf(stderr, "%d %d %d\n", keylen, alg->sadb_alg_minbits, 242 alg->sadb_alg_maxbits); 262 struct sadb_alg *alg; local 283 alg = findsupportedalg(satype, alg_id); 284 if (!alg) [all...] |
/macosx-10.10/Security-57031.1.35/Security/libsecurity_apple_csp/lib/ |
H A D | bsafeKeyGen.cpp | 29 * Stateless, private function to map a CSSM alg and pub/priv state 34 CSSM_ALGORITHMS alg, 39 switch(alg) { 33 bsafeAlgToInfoType( CSSM_ALGORITHMS alg, bool isPublic, B_INFO_TYPE &infoType, CSSM_KEYBLOB_FORMAT &format) argument
|
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/p12/ |
H A D | p12Decode.cpp | 61 CSSM_ALGORITHMS alg) 63 char *s = "unknown alg"; 64 switch(alg) { 60 printAlgAsString( CSSM_ALGORITHMS alg) argument
|
/macosx-10.10/Security-57031.1.35/SecurityTests/cspxutils/keyHashAsym/ |
H A D | keyHashAsym.c | 204 const char *algStr(CSSM_ALGORITHMS alg) argument 206 switch(alg) { 220 printf("alg %s pubForm %s privForm %s\n", 228 * Generate key pair of specified alg and raw format. 485 /* prefetch the alg params */
|
/macosx-10.10/Security-57031.1.35/SecurityTests/cspxutils/pbeTest/ |
H A D | pbeTest.c | 115 static void algInfo(privAlg alg, // pbe_MD5, etc. argument 117 // key alg for key gen algs 118 CSSM_ALGORITHMS *encrAlg, // encrypt/decrypt alg for key 135 switch(alg) { 246 CSSM_ALGORITHMS alg, 271 alg, 333 CSSM_ALGORITHMS alg, 348 alg, 1197 printf(" ...Encrypt alg %s keySizeInBits %u effectKeySize %u\n", 1214 printf(" ...PBE alg 242 encryptCom(CSSM_CSP_HANDLE cspHand, const char *testName, CSSM_DATA_PTR ptext, CSSM_KEY_PTR key, CSSM_ALGORITHMS alg, CSSM_ENCRYPT_MODE mode, CSSM_PADDING padding, CSSM_DATA_PTR iv, uint32 effectiveKeySizeInBits, CSSM_DATA_PTR ctext, CSSM_BOOL quiet) argument 329 decryptCom(CSSM_CSP_HANDLE cspHand, const char *testName, CSSM_DATA_PTR ctext, CSSM_KEY_PTR key, CSSM_ALGORITHMS alg, CSSM_ENCRYPT_MODE mode, CSSM_PADDING padding, CSSM_DATA_PTR iv, uint32 effectiveKeySizeInBits, CSSM_DATA_PTR ptext, CSSM_BOOL quiet) argument [all...] |
/macosx-10.10/Security-57031.1.35/libsecurity_smime/Security/ |
H A D | cmscipher.c | 264 CCAlgorithm alg = -1; local 267 alg = kCCAlgorithmDES; 271 alg = kCCAlgorithm3DES; 275 alg = kCCAlgorithmRC2; 281 alg = kCCAlgorithmAES128; 450 alg, cipheroptions, CFDataGetBytePtr(key), CFDataGetLength(key),
|
/macosx-10.10/Security-57031.1.35/libsecurity_smime/lib/ |
H A D | cmscipher.c | 264 CCAlgorithm alg = -1; local 267 alg = kCCAlgorithmDES; 271 alg = kCCAlgorithm3DES; 275 alg = kCCAlgorithmRC2; 281 alg = kCCAlgorithmAES128; 450 alg, cipheroptions, CFDataGetBytePtr(key), CFDataGetLength(key),
|
/macosx-10.10/Security-57031.1.35/libsecurity_smime/security_smime/ |
H A D | cmscipher.c | 264 CCAlgorithm alg = -1; local 267 alg = kCCAlgorithmDES; 271 alg = kCCAlgorithm3DES; 275 alg = kCCAlgorithmRC2; 281 alg = kCCAlgorithmAES128; 450 alg, cipheroptions, CFDataGetBytePtr(key), CFDataGetLength(key),
|
/macosx-10.10/ipsec-286.1.1/ipsec-tools/racoon/ |
H A D | proposal.c | 630 if (a->alg == IPSECDOI_ATTR_AUTH_NONE) 642 newtr->trns_id = ipsecdoi_authalg2trnsid(a->alg); // IKEv1 only 643 newtr->authtype = a->alg; 667 newtr->trns_id = a->alg; 669 newtr->authtype = b->alg; 694 newtr->trns_id = a->alg;
|
/macosx-10.10/OpenSSL098-52/src/ssl/ |
H A D | s3_clnt.c | 1025 printf("cipher, alg, nc = %s, %lx, %d\n", s->s3->tmp.new_cipher->name, 1098 long n,alg; local 1163 alg=s->s3->tmp.new_cipher->algorithms; 1167 if (alg & SSL_kRSA) 1206 if (alg & SSL_aRSA) 1221 else if (alg & SSL_kEDH) 1275 if (alg & SSL_aRSA) 1282 else if (alg & SSL_aDSS) 1290 else if ((alg & SSL_kDHr) || (alg [all...] |
H A D | ssl_lib.c | 1894 unsigned long alg = cs->algorithms; local 1913 if (alg & SSL_kECDH) 1920 if (alg & SSL_aECDSA) 1922 /* signature alg must be ECDSA */ 1928 if (alg & SSL_aRSA) 1930 /* signature alg must be RSA */ 1939 else if (alg & SSL_aECDSA) 1954 unsigned long alg,kalg; local 1960 alg=s->s3->tmp.new_cipher->algorithms; 1961 kalg=alg 2020 unsigned long alg; local [all...] |
/macosx-10.10/libarchive-30/libarchive/libarchive/ |
H A D | archive_read_support_format_xar.c | 119 int alg; member in struct:chksumval 125 int alg; member in struct:chksumwork 716 xattr->a_sum.alg, xattr->e_sum.alg); 770 xar->entry_a_sum.alg, xar->entry_e_sum.alg); 1208 sumwrk->alg = sum_alg; 1225 switch (sumwrk->alg) { 1243 switch (sumwrk->alg) { 1779 int alg local [all...] |