Searched refs:alg (Results 26 - 50 of 309) sorted by relevance

1234567891011>>

/macosx-10.10/bind9-45.101/bind9/contrib/
H A Dcheck-secure-delegation.pl.in101 foreach $alg ( keys %dnskeyalg ) {
102 print "Missing $zone DNSKEY RRSIG for algorithm $alg\n"
103 if (!exists($dnskeygood{$alg}));
109 foreach $alg ( keys %algorithms ) {
110 if (exists($dsgood{$alg})) {
111 print "$zone algorithm $alg good " .
114 print "$zone algorithm $alg bad " .
/macosx-10.10/Heimdal-398.1.2/appl/otp/
H A Dotpprint.c69 OtpAlgorithm *alg,
84 alg->init (key, pw, seed);
88 alg->next (key);
102 OtpAlgorithm *alg = otp_find_alg (OTP_ALG_DEFAULT); local
115 alg = otp_find_alg (alg_string);
116 if (alg == NULL)
134 return print (argc, argv, count, alg, fn);
66 print(int argc, char **argv, int count, OtpAlgorithm *alg, void (*print_fn)(OtpKey, char *, size_t)) argument
H A Dotp.c76 renew (int argc, char **argv, OtpAlgorithm *alg, char *user) argument
84 newctx.alg = alg;
91 newctx.alg->name,
95 otp_parse (newctx.key, pw, alg) == 0) {
139 set (int argc, char **argv, OtpAlgorithm *alg, char *user) argument
147 ctx.alg = alg;
162 ctx.alg->init (ctx.key, pw, ctx.seed);
164 ctx.alg
293 OtpAlgorithm *alg = otp_find_alg (OTP_ALG_DEFAULT); local
[all...]
/macosx-10.10/text_cmds-88/md5/
H A Dmd5.c226 MDString(Algorithm_t *alg, const char *string) argument
233 printf("%s\n", Digest_Data(alg->algorithm, string, len, buf));
235 printf("%s \"%s\"\n", Digest_Data(alg->algorithm, string, len, buf), string);
237 printf("%s (\"%s\") = %s\n", alg->name, string, Digest_Data(alg->algorithm, string, len, buf));
239 printf("%s\n", alg->Data(string, len, buf));
241 printf("%s \"%s\"\n", alg->Data(string, len, buf), string);
243 printf("%s (\"%s\") = %s\n", alg->name, string, alg->Data(string, len, buf));
250 MDTimeTrial(Algorithm_t *alg) argument
358 MDTestSuite(Algorithm_t *alg) argument
382 MDFilter(Algorithm_t *alg, int tee) argument
414 usage(Algorithm_t *alg) argument
[all...]
/macosx-10.10/CommonCrypto-60061/include/
H A DCommonHMacSPI.h42 CCHmacCreate(CCDigestAlg alg, const void *key, size_t keyLength)
62 CCHmacOutputSize(CCDigestAlg alg)
70 CCDigestAlg alg, /* kCCHmacSHA1, kCCHmacMD5 */
/macosx-10.10/Security-57031.1.35/Security/include/security_cdsa_client/
H A Dmacclient.h40 MacContext(const CSP &csp, CSSM_ALGORITHMS alg) argument
41 : Context(csp, alg) { }
56 GenerateMac(const CSP &csp, CSSM_ALGORITHMS alg) : MacContext(csp, alg) { } argument
73 VerifyMac(const CSP &csp, CSSM_ALGORITHMS alg) : MacContext(csp, alg) { } argument
H A Dwrapkey.h39 WrapKey(const CSP &csp, CSSM_ALGORITHMS alg) : argument
40 Crypt(csp, alg), mWrappedKeyFormat(CSSM_KEYBLOB_WRAPPED_FORMAT_NONE) {}
65 UnwrapKey(const CSP &csp, CSSM_ALGORITHMS alg) : Crypt(csp, alg) {} argument
96 DeriveKey(const CSP &csp, CSSM_ALGORITHMS alg, CSSM_ALGORITHMS target, uint32 size = 0) argument
97 : Crypt(csp, alg), mKeySize(size), mTargetType(target), mIterationCount(0),
102 void targetType(CSSM_ALGORITHMS alg) { mTargetType = alg; } argument
H A Dcspclient.h67 Context(const CSP &csp, CSSM_ALGORITHMS alg = CSSM_ALGID_NONE);
74 void algorithm(CSSM_ALGORITHMS alg);
215 Digest(const CSP &csp, CSSM_ALGORITHMS alg) : Context(csp, alg) { } argument
239 Random(const CSP &csp, CSSM_ALGORITHMS alg) : Context(csp, alg), mSeed(NULL), mSize(1) { } argument
240 Random(const CSP &csp, CSSM_ALGORITHMS alg, const CssmCryptoData &seed) argument
241 : Context(csp, alg), mSeed(&seed), mSize(1) { }
242 Random(const CSP &csp, CSSM_ALGORITHMS alg, uint32 size) argument
243 : Context(csp, alg), mSee
244 Random(const CSP &csp, CSSM_ALGORITHMS alg, const CssmCryptoData &seed, uint32 size) argument
[all...]
/macosx-10.10/Security-57031.1.35/Security/libsecurity_cdsa_client/lib/
H A Dmacclient.h40 MacContext(const CSP &csp, CSSM_ALGORITHMS alg) argument
41 : Context(csp, alg) { }
56 GenerateMac(const CSP &csp, CSSM_ALGORITHMS alg) : MacContext(csp, alg) { } argument
73 VerifyMac(const CSP &csp, CSSM_ALGORITHMS alg) : MacContext(csp, alg) { } argument
H A Dwrapkey.h39 WrapKey(const CSP &csp, CSSM_ALGORITHMS alg) : argument
40 Crypt(csp, alg), mWrappedKeyFormat(CSSM_KEYBLOB_WRAPPED_FORMAT_NONE) {}
65 UnwrapKey(const CSP &csp, CSSM_ALGORITHMS alg) : Crypt(csp, alg) {} argument
96 DeriveKey(const CSP &csp, CSSM_ALGORITHMS alg, CSSM_ALGORITHMS target, uint32 size = 0) argument
97 : Crypt(csp, alg), mKeySize(size), mTargetType(target), mIterationCount(0),
102 void targetType(CSSM_ALGORITHMS alg) { mTargetType = alg; } argument
/macosx-10.10/Security-57031.1.35/SecurityTests/cspxutils/utilLib/
H A DssleayUtils.h19 CSSM_ALGORITHMS alg,
45 CSSM_ALGORITHMS alg, // AES 128 only for now
H A DbsafeUtils.c405 uint32 effectiveKeyBits, // optional per key alg (actually just RC2)
412 B_ALGORITHM_OBJ alg;
428 brtn = B_CreateAlgorithmObject(&alg);
433 /* per-alg setup */
437 brtn = B_SetAlgorithmInfo(alg, AI_RC4, NULL);
448 brtn = B_SetAlgorithmInfo(alg, AI_PKCS_RSAPublic, NULL);
451 brtn = B_SetAlgorithmInfo(alg, AI_PKCS_RSAPrivate, NULL);
529 brtn = B_SetAlgorithmInfo(alg, AI_FeedbackCipher, (POINTER)&spec);
553 brtn = B_EncryptInit(alg,
561 brtn = B_EncryptUpdate(alg,
[all...]
/macosx-10.10/Heimdal-398.1.2/lib/otp/
H A Dotp_parse.c90 OtpAlgorithm *alg = (OtpAlgorithm *)a; local
92 unsigned char *res = malloc(alg->hashsize);
96 alg->hash (s, strlen(s), res);
97 ret = (unsigned)(res[alg->hashsize - 1]) |
98 ((res[alg->hashsize - 2] & 0x03) << 8);
141 OtpAlgorithm *alg,
146 if (parse_words (wn, str, convert, alg))
161 otp_parse_altdict (OtpKey key, const char *str, OtpAlgorithm *alg) argument
163 return otp_parse_internal (key, str, alg, get_altword);
194 otp_parse (OtpKey key, const char *s, OtpAlgorithm *alg) argument
140 otp_parse_internal(OtpKey key, const char *str, OtpAlgorithm *alg, int (*convert)(const char *, void *)) argument
[all...]
H A Dotp_verify.c46 if (otp_parse (key1, passwd, ctx->alg)) {
51 ctx->alg->next (key2);
/macosx-10.10/bind9-45.101/bind9/lib/dns/include/dns/
H A Dsecalg.h71 dns_secalg_format(dns_secalg_t alg, char *cp, unsigned int size);
/macosx-10.10/OpenSSL098-52/src/crypto/
H A Dcrypto.h538 #define FIPS_ERROR_IGNORED(alg) OpenSSLDie(__FILE__, __LINE__, \
539 alg " previous FIPS forbidden algorithm error ignored");
541 #define FIPS_BAD_ABORT(alg) OpenSSLDie(__FILE__, __LINE__, \
542 #alg " Algorithm forbidden in FIPS mode");
545 #define FIPS_BAD_ALGORITHM(alg) FIPS_BAD_ABORT(alg)
547 #define FIPS_BAD_ALGORITHM(alg) \
550 ERR_add_error_data(2, "Algorithm=", #alg); \
557 #define FIPS_NON_FIPS_MD_Init(alg) \
558 int alg##_Ini
[all...]
/macosx-10.10/OpenSSL098-52/src/include/openssl/
H A Dcrypto.h538 #define FIPS_ERROR_IGNORED(alg) OpenSSLDie(__FILE__, __LINE__, \
539 alg " previous FIPS forbidden algorithm error ignored");
541 #define FIPS_BAD_ABORT(alg) OpenSSLDie(__FILE__, __LINE__, \
542 #alg " Algorithm forbidden in FIPS mode");
545 #define FIPS_BAD_ALGORITHM(alg) FIPS_BAD_ABORT(alg)
547 #define FIPS_BAD_ALGORITHM(alg) \
550 ERR_add_error_data(2, "Algorithm=", #alg); \
557 #define FIPS_NON_FIPS_MD_Init(alg) \
558 int alg##_Ini
[all...]
/macosx-10.10/Security-57031.1.35/SecurityTests/cspxutils/ccPerform/
H A DccPerform.cpp38 printf(" -a alg -- alg : d=DES; 3=3DES; a=AES128; n=AES192; A=AES256;\n");
123 CCAlgorithm alg; local
138 alg = kCCAlgorithmDES;
143 alg = kCCAlgorithm3DES;
148 alg = kCCAlgorithmAES128;
153 alg = kCCAlgorithmAES128;
158 alg = kCCAlgorithmAES128;
163 alg = kCCAlgorithmCAST;
168 alg
[all...]
/macosx-10.10/bind9-45.101/bind9/bin/confgen/
H A Dkeygen.c48 alg_totext(dns_secalg_t alg) { argument
49 switch (alg) {
91 alg_bits(dns_secalg_t alg) { argument
92 switch (alg) {
115 generate_key(isc_mem_t *mctx, const char *randomfile, dns_secalg_t alg, argument
127 switch (alg) {
139 fatal("unsupported algorithm %d\n", alg);
158 DO("generate key", dst_key_generate(dns_rootname, alg,
194 dns_secalg_t alg) {
196 const char *algname = alg_totext(alg);
192 write_key_file(const char *keyfile, const char *user, const char *keyname, isc_buffer_t *secret, dns_secalg_t alg) argument
[all...]
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/threadTest/
H A DdesTest.cpp70 B_ALGORITHM_OBJ *alg)
81 brtn = B_CreateAlgorithmObject(alg);
86 brtn = B_SetAlgorithmInfo(*alg, AI_FeedbackCipher, (POINTER)spec);
103 B_ALGORITHM_OBJ alg = NULL; local
110 brtn = desEncDecSetup(&iv, &spec, &alg);
114 brtn = B_EncryptInit(alg,
122 brtn = B_EncryptUpdate(alg,
136 brtn = B_EncryptFinal(alg,
147 B_DestroyAlgorithmObject (&alg);
160 B_ALGORITHM_OBJ alg local
67 desEncDecSetup( ITEM *iv, B_BLK_CIPHER_W_FEEDBACK_PARAMS *spec, B_ALGORITHM_OBJ *alg) argument
[all...]
/macosx-10.10/Heimdal-398.1.2/lib/gssapi/netlogon/
H A Dacquire_cred.c133 uint16_t alg; local
149 alg = (p[0] << 0) | (p[1] << 8);
151 if (alg != NL_SIGN_ALG_HMAC_MD5 && alg != NL_SIGN_ALG_SHA256) {
156 cred->SignatureAlgorithm = alg;
157 if (alg == NL_SIGN_ALG_SHA256)
/macosx-10.10/mDNSResponder-561.1.1/mDNSMacOSX/
H A DCryptoSupport.c53 switch (ctx->alg)
61 LogMsg("enc_create: Unsupported algorithm %d", ctx->alg);
90 switch (ctx->alg)
103 (ctx->alg == ENC_BASE32 ? DISPATCH_DATA_FORMAT_TYPE_BASE32HEX : DISPATCH_DATA_FORMAT_TYPE_BASE64));
115 LogMsg("enc_add: Unsupported algorithm %d", ctx->alg);
124 switch (ctx->alg)
143 LogMsg("enc_encode: cannot create map %d", ctx->alg);
153 LogMsg("enc_encode: Unsupported algorithm %d", ctx->alg);
161 switch (ctx->alg)
174 LogMsg("sha_create: Unsupported algorithm %d", ctx->alg);
[all...]
/macosx-10.10/Security-57031.1.35/SecurityTests/cspxutils/ccCtxSize/
H A DccCtxSize.c14 CCAlgorithm alg,
23 crtn = CCCryptorCreateFromData(op, alg, 0, key, 4, NULL,
11 report( const char *name, CCOperation op, CCAlgorithm alg, size_t definedSize) argument
/macosx-10.10/CommonCrypto-60061/test/CommonCrypto/
H A DCommonDigest.c165 static char * testString(char *format, CCDigestAlgorithm alg) { argument
167 sprintf(thestring, format, digestName(alg));
171 static int testOriginalOneShotDigest(CCDigestAlgorithm alg, char *input, byteBuffer expected) { argument
172 byteBuffer computedMD = mallocDigestByteBuffer(alg);
176 switch(alg) {
190 ok(status = expectedEqualsComputed(testString("Original OneShot Digest %s", alg), expected, computedMD), "Digest is as expected");
303 testOriginalDiscreetDigest(CCDigestAlgorithm alg, char *input, byteBuffer expected, byteBuffer expectedIntermediate) { argument
304 byteBuffer computedMD = mallocDigestByteBuffer(alg);
309 switch(alg) {
323 ok(status = expectedEqualsComputed(testString("Original Discreet Digest %s", alg), expecte
329 testNewOneShotDigest(CCDigestAlgorithm alg, char *input, byteBuffer expected) argument
340 testNewDiscreetDigest(CCDigestAlgorithm alg, char *input, byteBuffer expected) argument
375 rfc1321Test(CCDigestAlgorithm alg, char *input, byteBuffer expected) argument
391 testAllDigests(CCDigestAlgorithm alg, char *input, byteBuffer expected, byteBuffer expectedIntermediate) argument
[all...]
/macosx-10.10/Security-57031.1.35/Security/libsecurity_apple_csp/lib/
H A DMacContext.h42 CSSM_ALGORITHMS alg) :
44 mAlg(alg),
76 CSSM_ALGORITHMS alg) :
40 MacContext( AppleCSPSession &session, CSSM_ALGORITHMS alg) argument
74 MacLegacyContext( AppleCSPSession &session, CSSM_ALGORITHMS alg) argument

Completed in 284 milliseconds

1234567891011>>