/macosx-10.10/OpenSSH-189/osslshim/tests/ |
H A D | test_md.c | 48 _test_digest(evp_alg_t alg, stringVector_t *msg[], byteVector_t *md[], const size_t num_tests) argument 53 const EVP_MD *evp_md = (*alg)();
|
H A D | test_cryptor.c | 46 static int _test_cryptor(evp_alg_t alg, const byteVector_t *key[], const byteVector_t *pt[], const byteVector_t *ct[], const unsigned num_tests) argument 51 const EVP_CIPHER *c = (*alg)(); 534 static int _test_mode(evp_alg_t alg, const byteVector_t *key[], const byteVector_t *iv[], const byteVector_t *pt[], const byteVector_t *ct[], const unsigned num_tests) argument 539 const EVP_CIPHER *c = (*alg)();
|
/macosx-10.10/OpenSSL098-52/src/crypto/pkcs7/ |
H A D | pk7_doit.c | 105 static int PKCS7_bio_add_digest(BIO **pbio, X509_ALGOR *alg) argument 115 md=EVP_get_digestbyobj(alg->algorithm);
|
/macosx-10.10/bind9-45.101/bind9/contrib/zkt/ |
H A D | dki.c | 1213 const dki_t *dki_findalgo (const dki_t *list, int ksk, int alg, int status, int no) argument 1220 if ( dki_isksk (dkp) == ksk && dki_algo (dkp) == alg &&
|
/macosx-10.10/ipsec-286.1.1/ipsec-tools/racoon/ |
H A D | cfparse.y | 155 struct sainfoalg *alg; 233 %type <alg> algorithm 1236 $$->alg = algtype2doi(cur_algclass, $1); 1237 if ($$->alg == -1) {
|
H A D | pfkey_racoon.c | 2840 u_int alg; local 2857 alg = ipsecdoi2pfkey_alg(algclass2doi(class), algtype2doi(class, calg)); 2858 if (alg == ~0) 2862 if (ipsec_get_keylen(sup, alg, &alg0)) { 2870 error = ipsec_check_keylen(sup, alg, keylen);
|
/macosx-10.10/xnu-2782.1.97/bsd/nfs/ |
H A D | nfs_gss.c | 3318 u_char *alg, 3351 * The alg string encodes the bytes to represent either 3354 bcopy(alg, p, KRB5_SZ_ALG); 3384 * checksum of the alg + plaintext data. 3457 u_char *alg, 3485 if (bcmp(p, alg, KRB5_SZ_ALG) != 0) 3598 u_char *alg, 3614 gss_digest_Update(&context, alg, KRB5_SZ_ALG); 3655 u_char *alg, 3668 return (nfs_gss_cksum_mchain(ki, nmc->nmc_mhead, alg, offse 3316 nfs_gss_token_put( gss_key_info *ki, u_char *alg, u_char *p, int initiator, int datalen, u_char *cksum) argument 3455 nfs_gss_token_get( gss_key_info *ki, u_char *alg, u_char *p, int initiator, uint32_t *len, u_char *cksum) argument 3595 nfs_gss_cksum_mchain( gss_key_info *ki, mbuf_t mhead, u_char *alg, int offset, int len, u_char *digest) argument 3652 nfs_gss_cksum_chain( gss_key_info *ki, struct nfsm_chain *nmc, u_char *alg, int offset, int len, u_char *cksum) argument [all...] |
/macosx-10.10/mDNSResponder-561.1.1/mDNSCore/ |
H A D | DNSCommon.c | 204 mDNSlocal char *DNSSECAlgName(mDNSu8 alg) argument 206 switch (alg) 215 mDNS_snprintf(algbuffer, sizeof(algbuffer), "ALG%d", alg); 463 DNSSECDigestName(nsec3->alg), nsec3->flags, swap16(nsec3->iterations)); 509 DNSTypeName(swap16(rrsig->typeCovered)), DNSSECAlgName(rrsig->alg), rrsig->labels, swap32(rrsig->origTTL), 520 DNSSECAlgName(rrkey->alg), (unsigned int)keytag((mDNSu8 *)rrkey, rr->rdlength)); 530 length += mDNS_snprintf(buffer+length, RemSpc, "\t%s\t%d\t%s ", DNSSECAlgName(rrds->alg), swap16(rrds->keyTag), 1185 ctx = AlgCreate(DIGEST_ALG, nsec3->alg); 3279 if (nsec3->alg != SHA1_DIGEST_TYPE) 3281 LogInfo("SetRData: nsec3 alg [all...] |
H A D | anonymous.c | 44 nsec3->alg = SHA1_DIGEST_TYPE;
|
/macosx-10.10/OpenSSL098-52/src/crypto/x509/ |
H A D | x509.h | 767 int X509_signature_print(BIO *bp,X509_ALGOR *alg, ASN1_STRING *sig); 870 int X509_ALGOR_set0(X509_ALGOR *alg, ASN1_OBJECT *aobj, int ptype, void *pval); 1250 X509_ALGOR *PKCS5_pbe_set(int alg, int iter, unsigned char *salt, int saltlen);
|
/macosx-10.10/OpenSSL098-52/src/include/openssl/ |
H A D | x509.h | 767 int X509_signature_print(BIO *bp,X509_ALGOR *alg, ASN1_STRING *sig); 870 int X509_ALGOR_set0(X509_ALGOR *alg, ASN1_OBJECT *aobj, int ptype, void *pval); 1250 X509_ALGOR *PKCS5_pbe_set(int alg, int iter, unsigned char *salt, int saltlen);
|
/macosx-10.10/BerkeleyDB-21/db/btree/ |
H A D | bt_open.c | 375 meta->dbmeta.encrypt_alg = env->crypto_handle->alg;
|
/macosx-10.10/BerkeleyDB-21/db/hash/ |
H A D | hash_open.c | 275 meta->dbmeta.encrypt_alg = env->crypto_handle->alg;
|
/macosx-10.10/Heimdal-398.1.2/lib/krb5/ |
H A D | pkinit.c | 2456 AlgorithmIdentifier alg; local 2458 ret = hx509_cert_get_SPKI_AlgorithmIdentifier(hx509ctx, cert, &alg); 2460 if (der_heim_oid_cmp(&alg.algorithm, &asn1_oid_id_ecPublicKey) == 0) 2462 free_AlgorithmIdentifier(&alg);
|
/macosx-10.10/emacs-93/emacs/etc/ |
H A D | calccard.tex | 360 \key{finish alg entry without evaluating}{LFD} 361 \key{set mode where alg entry used by default}{m a}
|
/macosx-10.10/Security-57031.1.35/Security/include/security_keychain/ |
H A D | SecCertificate.cpp | 504 SecDigestGetData (CSSM_ALGORITHMS alg, CSSM_DATA* digest, const CSSM_DATA* data) argument 512 Digest context(csp, alg);
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_keychain/Security/ |
H A D | SecCertificate.cpp | 504 SecDigestGetData (CSSM_ALGORITHMS alg, CSSM_DATA* digest, const CSSM_DATA* data) argument 512 Digest context(csp, alg);
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_keychain/lib/ |
H A D | SecCertificate.cpp | 504 SecDigestGetData (CSSM_ALGORITHMS alg, CSSM_DATA* digest, const CSSM_DATA* data) argument 512 Digest context(csp, alg);
|
/macosx-10.10/Security-57031.1.35/SecurityTests/cspxutils/keyDate/ |
H A D | keyDate.cpp | 113 uint32 alg, 139 alg, 110 genSymKey( CSSM_CSP_HANDLE cspHand, CSSM_KEY_PTR symKey, uint32 alg, const char *keyAlgStr, uint32 keySizeInBits, CSSM_KEYATTR_FLAGS keyAttr, CSSM_KEYUSE keyUsage, CSSM_BOOL quiet, bool setStartDate, int startDeltaDays, bool setEndDate, int endDeltaDays, CSSM_DL_DB_HANDLE *dlDbHand = NULL) argument
|
/macosx-10.10/bind9-45.101/bind9/bin/named/ |
H A D | update.c | 3055 isc_uint8_t alg; local 3056 alg = tuple->rdata.data[3]; 3057 if (alg == DST_ALG_RSAMD5 || alg == DST_ALG_RSASHA1 || 3058 alg == DST_ALG_DSA || alg == DST_ALG_ECC) {
|
H A D | server.c | 484 isc_uint32_t flags, proto, alg; local 501 alg = cfg_obj_asuint32(cfg_tuple_get(key, "algorithm")); 539 if (alg > 0xff) 543 keystruct.algorithm = (isc_uint8_t)alg; 1176 dns_secalg_t alg; local 1181 result = dns_secalg_fromtext(&alg, &r); 1185 alg = ui; 1193 CHECK(dns_resolver_disable_algorithm(resolver, name, alg));
|
/macosx-10.10/xnu-2782.1.97/bsd/netkey/ |
H A D | key.c | 8416 struct sadb_alg *alg; local 8475 alg = (struct sadb_alg *) 8477 alg->sadb_alg_id = i; 8478 alg->sadb_alg_ivlen = 0; 8479 alg->sadb_alg_minbits = aalgo->keymin; 8480 alg->sadb_alg_maxbits = aalgo->keymax; 8481 off += PFKEY_ALIGN8(sizeof(*alg)); 8499 alg = (struct sadb_alg *) 8501 alg->sadb_alg_id = i; 8507 alg [all...] |
/macosx-10.10/Heimdal-398.1.2/lib/hx509/ |
H A D | test_cms.in | 390 --peer-alg=1.2.840.113549.1.1.1 \
|
/macosx-10.10/bind9-45.101/bind9/lib/dns/ |
H A D | resolver.c | 8594 unsigned int alg) 8603 if (alg > 255) 8616 len = alg/8 + 2; 8617 mask = 1 << (alg%8); 8651 unsigned int alg) 8668 len = alg/8 + 2; 8669 mask = 1 << (alg%8); 8680 return (dst_algorithm_supported(alg)); 8593 dns_resolver_disable_algorithm(dns_resolver_t *resolver, dns_name_t *name, unsigned int alg) argument 8650 dns_resolver_algorithm_supported(dns_resolver_t *resolver, dns_name_t *name, unsigned int alg) argument
|
/macosx-10.10/BerkeleyDB-21/db/env/ |
H A D | env_method.c | 481 if (db_cipher != NULL && db_cipher->alg == CIPHER_AES)
|