/macosx-10.10/bind9-45.101/bind9/contrib/ |
H A D | check-secure-delegation.pl.in | 101 foreach $alg ( keys %dnskeyalg ) { 102 print "Missing $zone DNSKEY RRSIG for algorithm $alg\n" 103 if (!exists($dnskeygood{$alg})); 109 foreach $alg ( keys %algorithms ) { 110 if (exists($dsgood{$alg})) { 111 print "$zone algorithm $alg good " . 114 print "$zone algorithm $alg bad " .
|
/macosx-10.10/Heimdal-398.1.2/appl/otp/ |
H A D | otpprint.c | 69 OtpAlgorithm *alg, 84 alg->init (key, pw, seed); 88 alg->next (key); 102 OtpAlgorithm *alg = otp_find_alg (OTP_ALG_DEFAULT); local 115 alg = otp_find_alg (alg_string); 116 if (alg == NULL) 134 return print (argc, argv, count, alg, fn); 66 print(int argc, char **argv, int count, OtpAlgorithm *alg, void (*print_fn)(OtpKey, char *, size_t)) argument
|
H A D | otp.c | 76 renew (int argc, char **argv, OtpAlgorithm *alg, char *user) argument 84 newctx.alg = alg; 91 newctx.alg->name, 95 otp_parse (newctx.key, pw, alg) == 0) { 139 set (int argc, char **argv, OtpAlgorithm *alg, char *user) argument 147 ctx.alg = alg; 162 ctx.alg->init (ctx.key, pw, ctx.seed); 164 ctx.alg 293 OtpAlgorithm *alg = otp_find_alg (OTP_ALG_DEFAULT); local [all...] |
/macosx-10.10/text_cmds-88/md5/ |
H A D | md5.c | 226 MDString(Algorithm_t *alg, const char *string) argument 233 printf("%s\n", Digest_Data(alg->algorithm, string, len, buf)); 235 printf("%s \"%s\"\n", Digest_Data(alg->algorithm, string, len, buf), string); 237 printf("%s (\"%s\") = %s\n", alg->name, string, Digest_Data(alg->algorithm, string, len, buf)); 239 printf("%s\n", alg->Data(string, len, buf)); 241 printf("%s \"%s\"\n", alg->Data(string, len, buf), string); 243 printf("%s (\"%s\") = %s\n", alg->name, string, alg->Data(string, len, buf)); 250 MDTimeTrial(Algorithm_t *alg) argument 358 MDTestSuite(Algorithm_t *alg) argument 382 MDFilter(Algorithm_t *alg, int tee) argument 414 usage(Algorithm_t *alg) argument [all...] |
/macosx-10.10/CommonCrypto-60061/include/ |
H A D | CommonHMacSPI.h | 42 CCHmacCreate(CCDigestAlg alg, const void *key, size_t keyLength) 62 CCHmacOutputSize(CCDigestAlg alg) 70 CCDigestAlg alg, /* kCCHmacSHA1, kCCHmacMD5 */
|
/macosx-10.10/Security-57031.1.35/Security/include/security_cdsa_client/ |
H A D | macclient.h | 40 MacContext(const CSP &csp, CSSM_ALGORITHMS alg) argument 41 : Context(csp, alg) { } 56 GenerateMac(const CSP &csp, CSSM_ALGORITHMS alg) : MacContext(csp, alg) { } argument 73 VerifyMac(const CSP &csp, CSSM_ALGORITHMS alg) : MacContext(csp, alg) { } argument
|
H A D | wrapkey.h | 39 WrapKey(const CSP &csp, CSSM_ALGORITHMS alg) : argument 40 Crypt(csp, alg), mWrappedKeyFormat(CSSM_KEYBLOB_WRAPPED_FORMAT_NONE) {} 65 UnwrapKey(const CSP &csp, CSSM_ALGORITHMS alg) : Crypt(csp, alg) {} argument 96 DeriveKey(const CSP &csp, CSSM_ALGORITHMS alg, CSSM_ALGORITHMS target, uint32 size = 0) argument 97 : Crypt(csp, alg), mKeySize(size), mTargetType(target), mIterationCount(0), 102 void targetType(CSSM_ALGORITHMS alg) { mTargetType = alg; } argument
|
H A D | cspclient.h | 67 Context(const CSP &csp, CSSM_ALGORITHMS alg = CSSM_ALGID_NONE); 74 void algorithm(CSSM_ALGORITHMS alg); 215 Digest(const CSP &csp, CSSM_ALGORITHMS alg) : Context(csp, alg) { } argument 239 Random(const CSP &csp, CSSM_ALGORITHMS alg) : Context(csp, alg), mSeed(NULL), mSize(1) { } argument 240 Random(const CSP &csp, CSSM_ALGORITHMS alg, const CssmCryptoData &seed) argument 241 : Context(csp, alg), mSeed(&seed), mSize(1) { } 242 Random(const CSP &csp, CSSM_ALGORITHMS alg, uint32 size) argument 243 : Context(csp, alg), mSee 244 Random(const CSP &csp, CSSM_ALGORITHMS alg, const CssmCryptoData &seed, uint32 size) argument [all...] |
/macosx-10.10/Security-57031.1.35/Security/libsecurity_cdsa_client/lib/ |
H A D | macclient.h | 40 MacContext(const CSP &csp, CSSM_ALGORITHMS alg) argument 41 : Context(csp, alg) { } 56 GenerateMac(const CSP &csp, CSSM_ALGORITHMS alg) : MacContext(csp, alg) { } argument 73 VerifyMac(const CSP &csp, CSSM_ALGORITHMS alg) : MacContext(csp, alg) { } argument
|
H A D | wrapkey.h | 39 WrapKey(const CSP &csp, CSSM_ALGORITHMS alg) : argument 40 Crypt(csp, alg), mWrappedKeyFormat(CSSM_KEYBLOB_WRAPPED_FORMAT_NONE) {} 65 UnwrapKey(const CSP &csp, CSSM_ALGORITHMS alg) : Crypt(csp, alg) {} argument 96 DeriveKey(const CSP &csp, CSSM_ALGORITHMS alg, CSSM_ALGORITHMS target, uint32 size = 0) argument 97 : Crypt(csp, alg), mKeySize(size), mTargetType(target), mIterationCount(0), 102 void targetType(CSSM_ALGORITHMS alg) { mTargetType = alg; } argument
|
/macosx-10.10/Security-57031.1.35/SecurityTests/cspxutils/utilLib/ |
H A D | ssleayUtils.h | 19 CSSM_ALGORITHMS alg, 45 CSSM_ALGORITHMS alg, // AES 128 only for now
|
H A D | bsafeUtils.c | 405 uint32 effectiveKeyBits, // optional per key alg (actually just RC2) 412 B_ALGORITHM_OBJ alg; 428 brtn = B_CreateAlgorithmObject(&alg); 433 /* per-alg setup */ 437 brtn = B_SetAlgorithmInfo(alg, AI_RC4, NULL); 448 brtn = B_SetAlgorithmInfo(alg, AI_PKCS_RSAPublic, NULL); 451 brtn = B_SetAlgorithmInfo(alg, AI_PKCS_RSAPrivate, NULL); 529 brtn = B_SetAlgorithmInfo(alg, AI_FeedbackCipher, (POINTER)&spec); 553 brtn = B_EncryptInit(alg, 561 brtn = B_EncryptUpdate(alg, [all...] |
/macosx-10.10/Heimdal-398.1.2/lib/otp/ |
H A D | otp_parse.c | 90 OtpAlgorithm *alg = (OtpAlgorithm *)a; local 92 unsigned char *res = malloc(alg->hashsize); 96 alg->hash (s, strlen(s), res); 97 ret = (unsigned)(res[alg->hashsize - 1]) | 98 ((res[alg->hashsize - 2] & 0x03) << 8); 141 OtpAlgorithm *alg, 146 if (parse_words (wn, str, convert, alg)) 161 otp_parse_altdict (OtpKey key, const char *str, OtpAlgorithm *alg) argument 163 return otp_parse_internal (key, str, alg, get_altword); 194 otp_parse (OtpKey key, const char *s, OtpAlgorithm *alg) argument 140 otp_parse_internal(OtpKey key, const char *str, OtpAlgorithm *alg, int (*convert)(const char *, void *)) argument [all...] |
H A D | otp_verify.c | 46 if (otp_parse (key1, passwd, ctx->alg)) { 51 ctx->alg->next (key2);
|
/macosx-10.10/bind9-45.101/bind9/lib/dns/include/dns/ |
H A D | secalg.h | 71 dns_secalg_format(dns_secalg_t alg, char *cp, unsigned int size);
|
/macosx-10.10/OpenSSL098-52/src/crypto/ |
H A D | crypto.h | 538 #define FIPS_ERROR_IGNORED(alg) OpenSSLDie(__FILE__, __LINE__, \ 539 alg " previous FIPS forbidden algorithm error ignored"); 541 #define FIPS_BAD_ABORT(alg) OpenSSLDie(__FILE__, __LINE__, \ 542 #alg " Algorithm forbidden in FIPS mode"); 545 #define FIPS_BAD_ALGORITHM(alg) FIPS_BAD_ABORT(alg) 547 #define FIPS_BAD_ALGORITHM(alg) \ 550 ERR_add_error_data(2, "Algorithm=", #alg); \ 557 #define FIPS_NON_FIPS_MD_Init(alg) \ 558 int alg##_Ini [all...] |
/macosx-10.10/OpenSSL098-52/src/include/openssl/ |
H A D | crypto.h | 538 #define FIPS_ERROR_IGNORED(alg) OpenSSLDie(__FILE__, __LINE__, \ 539 alg " previous FIPS forbidden algorithm error ignored"); 541 #define FIPS_BAD_ABORT(alg) OpenSSLDie(__FILE__, __LINE__, \ 542 #alg " Algorithm forbidden in FIPS mode"); 545 #define FIPS_BAD_ALGORITHM(alg) FIPS_BAD_ABORT(alg) 547 #define FIPS_BAD_ALGORITHM(alg) \ 550 ERR_add_error_data(2, "Algorithm=", #alg); \ 557 #define FIPS_NON_FIPS_MD_Init(alg) \ 558 int alg##_Ini [all...] |
/macosx-10.10/Security-57031.1.35/SecurityTests/cspxutils/ccPerform/ |
H A D | ccPerform.cpp | 38 printf(" -a alg -- alg : d=DES; 3=3DES; a=AES128; n=AES192; A=AES256;\n"); 123 CCAlgorithm alg; local 138 alg = kCCAlgorithmDES; 143 alg = kCCAlgorithm3DES; 148 alg = kCCAlgorithmAES128; 153 alg = kCCAlgorithmAES128; 158 alg = kCCAlgorithmAES128; 163 alg = kCCAlgorithmCAST; 168 alg [all...] |
/macosx-10.10/bind9-45.101/bind9/bin/confgen/ |
H A D | keygen.c | 48 alg_totext(dns_secalg_t alg) { argument 49 switch (alg) { 91 alg_bits(dns_secalg_t alg) { argument 92 switch (alg) { 115 generate_key(isc_mem_t *mctx, const char *randomfile, dns_secalg_t alg, argument 127 switch (alg) { 139 fatal("unsupported algorithm %d\n", alg); 158 DO("generate key", dst_key_generate(dns_rootname, alg, 194 dns_secalg_t alg) { 196 const char *algname = alg_totext(alg); 192 write_key_file(const char *keyfile, const char *user, const char *keyname, isc_buffer_t *secret, dns_secalg_t alg) argument [all...] |
/macosx-10.10/Security-57031.1.35/SecurityTests/clxutils/threadTest/ |
H A D | desTest.cpp | 70 B_ALGORITHM_OBJ *alg) 81 brtn = B_CreateAlgorithmObject(alg); 86 brtn = B_SetAlgorithmInfo(*alg, AI_FeedbackCipher, (POINTER)spec); 103 B_ALGORITHM_OBJ alg = NULL; local 110 brtn = desEncDecSetup(&iv, &spec, &alg); 114 brtn = B_EncryptInit(alg, 122 brtn = B_EncryptUpdate(alg, 136 brtn = B_EncryptFinal(alg, 147 B_DestroyAlgorithmObject (&alg); 160 B_ALGORITHM_OBJ alg local 67 desEncDecSetup( ITEM *iv, B_BLK_CIPHER_W_FEEDBACK_PARAMS *spec, B_ALGORITHM_OBJ *alg) argument [all...] |
/macosx-10.10/Heimdal-398.1.2/lib/gssapi/netlogon/ |
H A D | acquire_cred.c | 133 uint16_t alg; local 149 alg = (p[0] << 0) | (p[1] << 8); 151 if (alg != NL_SIGN_ALG_HMAC_MD5 && alg != NL_SIGN_ALG_SHA256) { 156 cred->SignatureAlgorithm = alg; 157 if (alg == NL_SIGN_ALG_SHA256)
|
/macosx-10.10/mDNSResponder-561.1.1/mDNSMacOSX/ |
H A D | CryptoSupport.c | 53 switch (ctx->alg) 61 LogMsg("enc_create: Unsupported algorithm %d", ctx->alg); 90 switch (ctx->alg) 103 (ctx->alg == ENC_BASE32 ? DISPATCH_DATA_FORMAT_TYPE_BASE32HEX : DISPATCH_DATA_FORMAT_TYPE_BASE64)); 115 LogMsg("enc_add: Unsupported algorithm %d", ctx->alg); 124 switch (ctx->alg) 143 LogMsg("enc_encode: cannot create map %d", ctx->alg); 153 LogMsg("enc_encode: Unsupported algorithm %d", ctx->alg); 161 switch (ctx->alg) 174 LogMsg("sha_create: Unsupported algorithm %d", ctx->alg); [all...] |
/macosx-10.10/Security-57031.1.35/SecurityTests/cspxutils/ccCtxSize/ |
H A D | ccCtxSize.c | 14 CCAlgorithm alg, 23 crtn = CCCryptorCreateFromData(op, alg, 0, key, 4, NULL, 11 report( const char *name, CCOperation op, CCAlgorithm alg, size_t definedSize) argument
|
/macosx-10.10/CommonCrypto-60061/test/CommonCrypto/ |
H A D | CommonDigest.c | 165 static char * testString(char *format, CCDigestAlgorithm alg) { argument 167 sprintf(thestring, format, digestName(alg)); 171 static int testOriginalOneShotDigest(CCDigestAlgorithm alg, char *input, byteBuffer expected) { argument 172 byteBuffer computedMD = mallocDigestByteBuffer(alg); 176 switch(alg) { 190 ok(status = expectedEqualsComputed(testString("Original OneShot Digest %s", alg), expected, computedMD), "Digest is as expected"); 303 testOriginalDiscreetDigest(CCDigestAlgorithm alg, char *input, byteBuffer expected, byteBuffer expectedIntermediate) { argument 304 byteBuffer computedMD = mallocDigestByteBuffer(alg); 309 switch(alg) { 323 ok(status = expectedEqualsComputed(testString("Original Discreet Digest %s", alg), expecte 329 testNewOneShotDigest(CCDigestAlgorithm alg, char *input, byteBuffer expected) argument 340 testNewDiscreetDigest(CCDigestAlgorithm alg, char *input, byteBuffer expected) argument 375 rfc1321Test(CCDigestAlgorithm alg, char *input, byteBuffer expected) argument 391 testAllDigests(CCDigestAlgorithm alg, char *input, byteBuffer expected, byteBuffer expectedIntermediate) argument [all...] |
/macosx-10.10/Security-57031.1.35/Security/libsecurity_apple_csp/lib/ |
H A D | MacContext.h | 42 CSSM_ALGORITHMS alg) : 44 mAlg(alg), 76 CSSM_ALGORITHMS alg) : 40 MacContext( AppleCSPSession &session, CSSM_ALGORITHMS alg) argument 74 MacLegacyContext( AppleCSPSession &session, CSSM_ALGORITHMS alg) argument
|