/macosx-10.10/Heimdal-398.1.2/lib/hx509/ |
H A D | softp11.c | 468 AlgorithmIdentifier alg; local 470 hret = hx509_cert_get_SPKI_AlgorithmIdentifier(context, cert, &alg); 478 free_AlgorithmIdentifier(&alg); 1501 const AlgorithmIdentifier *alg; local 1535 alg = hx509_signature_rsa_pkcs1_x509(); 1547 alg, 1632 const AlgorithmIdentifier *alg; local 1648 alg = hx509_signature_rsa_pkcs1_x509(); 1662 alg,
|
/macosx-10.10/mDNSResponder-561.1.1/mDNSMacOSX/ |
H A D | pfkey.c | 241 struct sadb_alg *alg; local 243 alg = findsupportedalg(satype, alg_id); 244 if (!alg) 247 if (keylen < alg->sadb_alg_minbits || keylen > alg->sadb_alg_maxbits) { 269 struct sadb_alg *alg; local 290 alg = findsupportedalg(satype, alg_id); 291 if (!alg) 294 memcpy(alg0, alg, sizeof(*alg0));
|
/macosx-10.10/ppp-786.1.1/Drivers/L2TP/L2TP-plugin/ |
H A D | pfkey.c | 241 struct sadb_alg *alg; local 243 alg = findsupportedalg(satype, alg_id); 244 if (!alg) 247 if (keylen < alg->sadb_alg_minbits || keylen > alg->sadb_alg_maxbits) { 269 struct sadb_alg *alg; local 290 alg = findsupportedalg(satype, alg_id); 291 if (!alg) 294 memcpy(alg0, alg, sizeof(*alg0));
|
/macosx-10.10/OpenSSL098-52/src/apps/ |
H A D | pkcs12.c | 95 int alg_print(BIO *x, X509_ALGOR *alg); 338 BIO_printf (bio_err, "-certpbe alg specify certificate PBE algorithm (default RC2-40)\n"); 339 BIO_printf (bio_err, "-keypbe alg specify private key PBE algorithm (default 3DES)\n"); 860 int alg_print (BIO *x, X509_ALGOR *alg) argument 864 p = alg->parameter->value.sequence->data; 865 pbe = d2i_PBEPARAM(NULL, &p, alg->parameter->value.sequence->length); 869 OBJ_nid2ln(OBJ_obj2nid(alg->algorithm)),
|
/macosx-10.10/emacs-93/emacs/lisp/gnus/ |
H A D | mml2015.el | 174 (defun mml2015-fix-micalg (alg) 175 (and alg 177 (upcase (if (string-match "^p[gh]p-" alg) 178 (substring alg (match-end 0)) 179 alg))))
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_keychain/regressions/ |
H A D | kc-40-seckey.c | 498 int alg; member in struct:KDFVector_t 514 static int testSecKDF(CFStringRef password, CFDataRef salt, CFNumberRef rounds, CFDataRef alg, CFNumberRef dklen, CFDataRef expected, int expected_failure) { argument 520 CFDictionaryAddValue(parameters, kSecAttrPRF, alg);
|
/macosx-10.10/Security-57031.1.35/SecurityTests/cspxutils/utilLib/ |
H A D | cspwrap.c | 658 uint32 cspDefaultKeySize(uint32 alg) argument 661 switch(alg) { 726 uint32 alg, 746 keySizeInBits = cspDefaultKeySize(alg); 749 alg, 961 uint32 randKeySizeBits(uint32 alg, argument 968 switch(alg) { 1015 if(alg == CSSM_ALGID_FEE) { 1057 printf("randKeySizeBits: unknown alg\n"); 1062 /* per-alg postprocessin 725 cspGenSymKey(CSSM_CSP_HANDLE cspHand, uint32 alg, const char *keyLabel, unsigned keyLabelLen, uint32 keyUsage, uint32 keySizeInBits, CSSM_BOOL refKey) argument 2904 randFeeKeyParams( CSSM_ALGORITHMS alg, uint32 *keySizeInBits, uint32 *primeType, uint32 *curveType) argument [all...] |
/macosx-10.10/Heimdal-398.1.2/lib/hcrypto/ |
H A D | evp-cc.c | 137 init_cc_key(int encp, CCAlgorithm alg, CCOptions opts, const void *key, argument 151 ret = CCCryptorCreate(op, alg, opts, key, keylen, iv, ref);
|
/macosx-10.10/OpenSSL098-52/src/crypto/cms/ |
H A D | cms_lib.c | 345 void cms_DigestAlgorithm_set(X509_ALGOR *alg, const EVP_MD *md) argument 364 X509_ALGOR_set0(alg, OBJ_nid2obj(EVP_MD_type(md)), param_type, NULL);
|
H A D | cms_lcl.h | 442 void cms_DigestAlgorithm_set(X509_ALGOR *alg, const EVP_MD *md);
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_apple_csp/lib/ |
H A D | AppleCSPUtils.cpp | 372 CSSM_ALGORITHMS alg, 380 hdr.AlgorithmId = alg; 369 setKeyHeader( CSSM_KEYHEADER &hdr, const Guid &myGuid, CSSM_ALGORITHMS alg, CSSM_KEYCLASS keyClass, CSSM_KEYATTR_FLAGS attrs, CSSM_KEYUSE use) argument
|
/macosx-10.10/Security-57031.1.35/Security/sec/Security/Regressions/secitem/ |
H A D | si-41-sececkey.c | 277 static void testkeywrap(unsigned long keySizeInBits, CFTypeRef alg) argument 335 _kSecKeyWrapPGPWrapAlg, alg,
|
/macosx-10.10/Security-57031.1.35/Security/sec/Security/ |
H A D | SecDH.c | 224 OSStatus SecDHCreateFromAlgorithmId(const uint8_t *alg, size_t alg_len, argument 229 algId.data = (uint8_t *)alg;
|
/macosx-10.10/bind9-45.101/bind9/lib/dns/ |
H A D | dnssec.c | 1580 char alg[80]; local 1585 dns_secalg_format(dst_key_alg(key->key), alg, sizeof(alg)); 1588 dst_key_id(key->key), alg, 1622 char alg[80]; local 1624 dns_secalg_format(dst_key_alg(key->key), alg, sizeof(alg)); 1626 reason, dst_key_id(key->key), alg);
|
H A D | rcode.c | 323 dns_secalg_format(dns_secalg_t alg, char *cp, unsigned int size) { argument 330 result = dns_secalg_totext(alg, &b);
|
H A D | tsig.c | 68 static unsigned char hmacmd5_ndata[] = "\010hmac-md5\007sig-alg\003reg\003int"; 998 * Digest the name, class, ttl, alg. 1175 unsigned int alg; local 1292 alg = dst_key_alg(key); 1296 if (alg == DST_ALG_HMACMD5 || alg == DST_ALG_HMACSHA1 || 1297 alg == DST_ALG_HMACSHA224 || alg == DST_ALG_HMACSHA256 || 1298 alg == DST_ALG_HMACSHA384 || alg [all...] |
/macosx-10.10/curl-83.1.2/curl/lib/ |
H A D | curl_sasl.c | 322 * alg [in/out] - The buffer where the algorithm will be stored. 332 char *alg, size_t alen, 364 if(!sasl_digest_get_key_value((char *)chlg, "algorithm=", alg, alen, ',')) { 329 sasl_decode_digest_md5_message(const char *chlg64, char *nonce, size_t nlen, char *realm, size_t rlen, char *alg, size_t alen, char *qop, size_t qlen) argument
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_ssl/Security/ |
H A D | tls_hmac.c | 63 switch(hmac->alg) {
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_ssl/lib/ |
H A D | tls_hmac.c | 63 switch(hmac->alg) {
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_ssl/security_ssl/ |
H A D | tls_hmac.c | 63 switch(hmac->alg) {
|
/macosx-10.10/bind9-45.101/bind9/contrib/zkt/ |
H A D | dki.h | 63 # define DK_ALGO_NSEC3DSA 6 /* symlink to alg 3 RFC5155 */ 64 # define DK_ALGO_NSEC3RSASHA1 7 /* symlink to alg 5 RFC5155 */ 188 extern const dki_t *dki_findalgo (const dki_t *list, int ksk, int alg, int status, int no);
|
/macosx-10.10/OpenSSH-189/openssh/ |
H A D | sshconnect2.c | 111 char *oavail, *avail, *first, *last, *alg, *hostname, *ret; local 138 while ((alg = strsep(&avail, ",")) && *alg != '\0') { 139 if ((ktype = key_type_from_name(alg)) == KEY_UNSPEC) 140 fatal("%s: unknown alg %s", __func__, alg); 143 ALG_APPEND(first, alg); 145 ALG_APPEND(last, alg);
|
/macosx-10.10/OpenSSL098-52/src/engines/ |
H A D | e_capi.c | 775 ALG_ID alg; local 797 alg = CALG_SHA1; 801 alg = CALG_MD5; 805 alg = CALG_SSL3_SHAMD5; 820 if(!CryptCreateHash(capi_key->hprov, alg, 0, 0, &hash))
|
/macosx-10.10/mDNSResponder-561.1.1/Clients/ |
H A D | dns-sd.c | 203 unsigned char alg; member in struct:__anon10951 213 unsigned char alg; member in struct:__anon10952 222 unsigned char alg; member in struct:__anon10953 892 rrds->alg, swap16(rrds->keyTag), rrds->digestType); 903 rrkey->alg, (unsigned int)keytag((unsigned char *)rrkey, rdlen)); 976 DNSTypeName(swap16(rrsig->typeCovered)), rrsig->alg, rrsig->labels, swap32(rrsig->origTTL),
|
/macosx-10.10/Heimdal-398.1.2/lib/gssapi/netlogon/ |
H A D | crypto.c | 90 _netlogon_signature_length(uint16_t alg, int conf_req_flag) argument 93 (alg == NL_SIGN_ALG_SHA256 ? 32 : 8) +
|