/macosx-10.10/Security-57031.1.35/Security/libsecurity_cdsa_client/lib/ |
H A D | cspclient.h | 67 Context(const CSP &csp, CSSM_ALGORITHMS alg = CSSM_ALGID_NONE); 74 void algorithm(CSSM_ALGORITHMS alg); 215 Digest(const CSP &csp, CSSM_ALGORITHMS alg) : Context(csp, alg) { } argument 239 Random(const CSP &csp, CSSM_ALGORITHMS alg) : Context(csp, alg), mSeed(NULL), mSize(1) { } argument 240 Random(const CSP &csp, CSSM_ALGORITHMS alg, const CssmCryptoData &seed) argument 241 : Context(csp, alg), mSeed(&seed), mSize(1) { } 242 Random(const CSP &csp, CSSM_ALGORITHMS alg, uint32 size) argument 243 : Context(csp, alg), mSee 244 Random(const CSP &csp, CSSM_ALGORITHMS alg, const CssmCryptoData &seed, uint32 size) argument [all...] |
H A D | cryptoclient.h | 38 Crypt(const CSP &csp, CSSM_ALGORITHMS alg); 70 Encrypt(const CSP &csp, CSSM_ALGORITHMS alg) : Crypt(csp, alg) {}; argument 94 Decrypt(const CSP &csp, CSSM_ALGORITHMS alg) : Crypt(csp, alg) {}; argument
|
/macosx-10.10/ruby-106/ruby/ext/openssl/lib/openssl/ |
H A D | digest.rb | 24 alg = %w(DSS DSS1 MD2 MD4 MD5 MDC2 RIPEMD160 SHA SHA1) 26 alg += %w(SHA224 SHA256 SHA384 SHA512) 44 alg.each{|name|
|
/macosx-10.10/bind9-45.101/bind9/bin/tests/dst/ |
H A D | dst_test.c | 138 io(dns_name_t *name, int id, int alg, int type, isc_mem_t *mctx) { argument 142 ret = dst_key_fromfile(name, id, alg, type, current, mctx, &key); 143 printf("read(%d) returned: %s\n", alg, isc_result_totext(ret)); 147 printf("write(%d) returned: %s\n", alg, isc_result_totext(ret)); 162 int alg = DST_ALG_DH; local 165 ret = dst_key_fromfile(name1, id1, alg, type, current, mctx, &key1); 166 printf("read(%d) returned: %s\n", alg, isc_result_totext(ret)); 169 ret = dst_key_fromfile(name2, id2, alg, type, current, mctx, &key2); 170 printf("read(%d) returned: %s\n", alg, isc_result_totext(ret)); 175 printf("write(%d) returned: %s\n", alg, isc_result_totex 216 generate(int alg, isc_mem_t *mctx) argument [all...] |
/macosx-10.10/CommonCrypto-60061/cn_tool/ |
H A D | main.c | 49 uint32_t alg; member in struct:_cnItem 114 uint32_t alg; member in struct:_cnContext 194 uint32_t alg = 0; local 197 alg = algMap[x].alg; 202 return alg; 273 fprintf(stderr, "%s %-1i - %s\n", crcMap[x].alg == context->alg ? "*" : " ", crcMap[x].alg, crcMap[x].name); 283 fprintf(stderr, "%s %-1i - %s\n", basexxMap[x].alg 305 uint32_t alg = 0; local [all...] |
/macosx-10.10/Security-57031.1.35/Security/include/security_cdsa_client/ |
H A D | cryptoclient.h | 38 Crypt(const CSP &csp, CSSM_ALGORITHMS alg); 70 Encrypt(const CSP &csp, CSSM_ALGORITHMS alg) : Crypt(csp, alg) {}; argument 94 Decrypt(const CSP &csp, CSSM_ALGORITHMS alg) : Crypt(csp, alg) {}; argument
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_cssm/lib/ |
H A D | oidsalg.c | 39 CSSM_ALGORITHMS alg; member in struct:__anon4635 53 * On the oid-to-alg map, we'll handle either one, mapping to 54 * the same CSSM alg. When we map from alg to OID, we'll use 65 * mapping alg to OID. 81 /* the current valid alg --> OID mapping */ 132 CSSM_ALGORITHMS *alg) // RETURNED 138 *alg = ent->alg; 151 if(ent->alg 130 cssmOidToAlg( const CSSM_OID *oid, CSSM_ALGORITHMS *alg) argument [all...] |
/macosx-10.10/OpenSSL098-52/src/crypto/ocsp/ |
H A D | ocsp_lib.c | 105 X509_ALGOR *alg; local 111 alg = cid->hashAlgorithm; 112 if (alg->algorithm != NULL) ASN1_OBJECT_free(alg->algorithm); 118 if (!(alg->algorithm=OBJ_nid2obj(nid))) goto err; 119 if ((alg->parameter=ASN1_TYPE_new()) == NULL) goto err; 120 alg->parameter->type=V_ASN1_NULL;
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_apple_csp/lib/ |
H A D | miscAlgFactory.cpp | 76 CSSM_ALGORITHMS alg = context.algorithm(); local 80 switch(alg) { 112 * (an encrypt alg with mode), but they define to the same value. 167 break; // not our symmetric alg 168 } // switch alg for symmetric 173 switch(alg) { 224 break; // not our digest alg 225 } // switch digest alg 229 switch(alg) { 341 break; // not our keygen alg [all...] |
/macosx-10.10/Security-57031.1.35/SecurityTests/cspxutils/hashTimeLibCrypt/ |
H A D | hashTimeLibCrypt.cpp | 197 HT_Alg alg, 201 switch(alg) { 229 HT_Alg alg; local 261 for(alg=FIRST_ALG; alg<=LAST_ALG; alg++) { 262 algToAlgId(alg, &testParams.isSha, &algStr); 196 algToAlgId( HT_Alg alg, bool *isSha, const char **algStr) argument
|
/macosx-10.10/libresolv-57/ |
H A D | dst_api.c | 28 * int dst_check_algorithm() Function to determines if alg is suppored. 86 static DST_KEY *dst_s_get_key_struct(const char *name, const int alg, 141 * alg 1 KEY_RSA 153 dst_check_algorithm(const int alg) argument 155 return (dst_t_func[alg] != NULL); 164 * alg: the algorithm number 173 dst_s_get_key_struct(const char *name, const int alg, const int flags, argument 178 if (dst_check_algorithm(alg)) /* make sure alg is available */ 185 new_key->dk_alg = alg; 480 int flags, proto, alg, len, dlen; local 665 int alg ; local 778 dst_buffer_to_key(const char *key_name, const int alg, const int flags, const int protocol, const u_char *key_buf, const int key_len) argument 849 int cnt, alg, len, major, minor, file_major, file_minor; local 977 dst_generate_key(const char *name, const int bits, const int exp, const int flags, const int protocol, const int alg) argument [all...] |
/macosx-10.10/CommonCrypto-60061/test/CommonCrypto/ |
H A D | CCCryptorTestFuncs.c | 17 CCCryptWithMode(CCOperation op, CCMode mode, CCAlgorithm alg, CCPadding padding, const void *iv, argument 28 if((retval = CCCryptorCreateWithMode(op, mode, alg, padding, iv, key, keyLength, tweak, tweakLength, numRounds, options, &cref)) != kCCSuccess) { 59 CCMultiCrypt(CCOperation op, CCAlgorithm alg, CCOptions options, const void *key, size_t keyLength, const void *iv, const void *dataIn, size_t dataInLength, argument 68 retval = CCCryptorCreate(op, alg, options, key, keyLength, iv, &cref); 103 switch(alg) { 129 CCMultiCryptWithMode(CCOperation op, CCMode mode, CCAlgorithm alg, CCPadding padding, const void *iv, argument 141 if((retval = CCCryptorCreateWithMode(op, mode, alg, padding, iv, key, keyLength, tweak, tweakLength, numRounds, options, &cref)) != kCCSuccess) { 206 CCCryptTestCase(char *keyStr, char *ivStr, CCAlgorithm alg, CCOptions options, char *cipherText, char *plainText) argument 224 if((retval = CCCrypt(kCCEncrypt, alg, options, key->bytes, key->len, iv->bytes, pt->bytes, pt->len, cipherDataOut, 4096, &dataOutMoved)) != kCCSuccess) { 243 if((retval = CCCrypt(kCCDecrypt, alg, option 269 CCMultiCryptTestCase(char *keyStr, char *ivStr, CCAlgorithm alg, CCOptions options, char *cipherText, char *plainText) argument 332 CCModeTestCase(char *keyStr, char *ivStr, CCMode mode, CCAlgorithm alg, CCPadding padding, char *cipherText, char *plainText) argument 401 CCMultiModeTestCase(char *keyStr, char *ivStr, CCMode mode, CCAlgorithm alg, CCPadding padding, char *cipherText, char *plainText) argument 468 CCCryptorGCMDiscreet( CCOperation op, CCAlgorithm alg, const void *key, size_t keyLength, const void *iv, size_t ivLen, const void *aData, size_t aDataLen, const void *dataIn, size_t dataInLength, void *dataOut, const void *tag, size_t *tagLength) argument 536 CCCryptorGCMTestCase(char *keyStr, char *ivStr, char *aDataStr, char *tagStr, CCAlgorithm alg, char *cipherText, char *plainText) argument 621 CCCryptorGCMDiscreetTestCase(char *keyStr, char *ivStr, char *aDataStr, char *tagStr, CCAlgorithm alg, char *cipherText, char *plainText) argument [all...] |
/macosx-10.10/Security-57031.1.35/SecurityTests/cspxutils/badattr/ |
H A D | badattr.c | 9 for each asymmetric alg { 12 make sure you cannot use it for encrypting with other alg 15 make sure you cannot use it for decrypting with other alg 84 uint32 alg, 101 alg, 120 printf("***Testing %s for alg %s:\n", testStr, keyAlgStr); 212 printf("***Testing %s for alg %s:\n", testStr, keyAlgStr); 268 printf("***Testing %s for alg %s:\n", testStr, keyAlgStr); 337 printf("***Testing %s for alg %s:\n", testStr, keyAlgStr); 433 * Given a reference key (any class, any alg), attemp 81 genSymKey( CSSM_CSP_HANDLE cspHand, CSSM_KEY_PTR symKey, uint32 alg, const char *keyAlgStr, uint32 keySizeInBits, CSSM_KEYATTR_FLAGS keyAttr, CSSM_KEYUSE keyUsage, CSSM_RETURN expectRtn, CSSM_BOOL quiet, CSSM_BOOL freeKey, const char *testStr) argument 696 symAttrTest( CSSM_CSP_HANDLE cspHand, CSSM_ALGORITHMS alg, const char *keyAlgStr, uint32 keySizeInBits, CSSM_BOOL bareCsp, CSSM_BOOL quiet) argument 775 symNullWrapTest( CSSM_CSP_HANDLE cspHand, CSSM_ALGORITHMS alg, const char *keyAlgStr, uint32 keySizeInBits, CSSM_BOOL quiet) argument 824 symBadWrapTest( CSSM_CSP_HANDLE cspHand, CSSM_ALGORITHMS alg, const char *keyAlgStr, uint32 keySizeInBits, CSSM_BOOL quiet) argument 862 asymBadWrapTest( CSSM_CSP_HANDLE cspHand, CSSM_ALGORITHMS alg, const char *keyAlgStr, uint32 keySizeInBits, CSSM_BOOL quiet) argument 932 pubKeyAttrTest( CSSM_CSP_HANDLE cspHand, CSSM_ALGORITHMS alg, const char *keyAlgStr, uint32 keySizeInBits, CSSM_KEYATTR_FLAGS pubKeyAttr, CSSM_RETURN expectRtn, CSSM_BOOL quiet, const char *testStr) argument 955 privKeyAttrTest( CSSM_CSP_HANDLE cspHand, CSSM_ALGORITHMS alg, const char *keyAlgStr, uint32 keySizeInBits, CSSM_KEYATTR_FLAGS privKeyAttr, CSSM_RETURN expectRtn, CSSM_BOOL quiet, const char *testStr) argument 997 asymAttrTest( CSSM_CSP_HANDLE cspHand, CSSM_ALGORITHMS alg, const char *keyAlgStr, uint32 keySizeInBits, CSSM_BOOL bareCsp, CSSM_BOOL quiet) argument 1124 asymNullWrapTest( CSSM_CSP_HANDLE cspHand, CSSM_ALGORITHMS alg, const char *keyAlgStr, uint32 keySizeInBits, CSSM_BOOL quiet) argument [all...] |
/macosx-10.10/CommonCrypto-60061/lib/ |
H A D | CommonHMAC.c | 155 CCHmacOutputSize(CCDigestAlg alg) argument 158 return CCDigestGetOutputSize(alg); 181 CCHmacCreate(CCDigestAlg alg, const void *key, size_t keyLength) argument 191 if((hmacCtx->di = CCDigestGetDigestInfo(alg)) == NULL) { 201 void CCHmacOneShot(CCDigestAlg alg, const void *key, size_t keyLength, const void *data, size_t dataLength, void *macOut) { argument 202 const struct ccdigest_info *di = CCDigestGetDigestInfo(alg);
|
/macosx-10.10/bind9-45.101/bind9/bin/confgen/ |
H A D | ddns-confgen.c | 71 %s [-a alg] [-k keyname] [-r randomfile] [-q] [-s name | -z zone]\n\ 72 -a alg: algorithm (default hmac-sha256)\n\ 96 dns_secalg_t alg = DST_ALG_HMACSHA256; local 97 const char *algname = alg_totext(alg); 114 alg = alg_fromtext(algname); 115 if (alg == DST_ALG_UNKNOWN) 117 keysize = alg_bits(alg); 193 generate_key(mctx, randomfile, alg, keysize, &key_txtbuffer);
|
/macosx-10.10/Security-57031.1.35/SecurityTests/cspxutils/rsatool/ |
H A D | rsatool.c | 22 CSSM_ALGORITHMS alg; member in struct:__anon5327 39 CSSM_ALGORITHMS digestAlg; // optional digest alg for raw sign/verify 79 printf(" a=alg d=DSA, r=RSA, e=ECDSA; default = RSA\n"); 404 CSSM_ALGORITHMS alg, 427 hdr->AlgorithmId = alg; 462 if(op->alg == CSSM_ALGID_DSA) { 525 op->alg, 596 irtn = rt_readKey(op->cspHand, op->keyFileName, isPub, op->alg, 611 op->alg, 671 irtn = rt_readKey(op->cspHand, op->keyFileName, isPub, op->alg, 400 rt_readKey( CSSM_CSP_HANDLE cspHand, const char *keyFileBase, CSSM_BOOL isPub, CSSM_ALGORITHMS alg, CSSM_KEYBLOB_FORMAT format, CSSM_KEY_PTR key) argument 722 CSSM_ALGORITHMS alg; local 801 CSSM_ALGORITHMS alg; local [all...] |
/macosx-10.10/CommonCrypto-60061/include/ |
H A D | CommonCryptor.h | 259 @param alg Defines the algorithm. 286 CCAlgorithm alg, /* kCCAlgorithmDES, etc. */ 301 @param alg Defines the algorithm. 347 CCAlgorithm alg, /* kCCAlgorithmDES, etc. */ 554 @param alg Defines the encryption algorithm. 614 CCAlgorithm alg, /* kCCAlgorithmAES128, etc. */ 619 const void *dataIn, /* optional per op and alg */ 697 @param alg Defines the algorithm. 744 CCAlgorithm alg,
|
/macosx-10.10/Heimdal-398.1.2/lib/krb5/ |
H A D | crypto-des-common.c | 59 CCDigestAlg alg, 72 m = CCDigestCreate(alg); 91 CCDigestAlg alg, 104 m = CCDigestCreate(alg); 58 _krb5_des_checksum(krb5_context context, CCDigestAlg alg, struct _krb5_key_data *key, const void *data, size_t len, Checksum *cksum) argument 90 _krb5_des_verify(krb5_context context, CCDigestAlg alg, struct _krb5_key_data *key, const void *data, size_t len, Checksum *C) argument
|
/macosx-10.10/Heimdal-398.1.2/lib/otp/ |
H A D | otp_challenge.c | 65 ctx->alg->name, ctx->n-1, ctx->seed);
|
/macosx-10.10/Security-57031.1.35/SecurityTests/cspxutils/hashTest/ |
H A D | hashTest.c | 91 uint32 alg, 122 alg, 131 alg, 173 alg, 210 uint32 alg; // ALG_MD5, etc. local 322 for(alg=minAlg; alg<=maxAlg; alg++) { 323 switch(alg) { 354 printf("Testing alg 90 doTest(CSSM_CSP_HANDLE cspHand, uint32 alg, CSSM_DATA_PTR ptext, CSSM_BOOL verbose, CSSM_BOOL quiet, CSSM_BOOL mallocDigest, unsigned incr, CSSM_BOOL goodOnly) argument [all...] |
/macosx-10.10/apache-793/httpd/modules/lua/ |
H A D | lua_passwd.h | 74 int alg; member in struct:passwd_ctx
|
/macosx-10.10/apache-793/httpd/support/ |
H A D | passwd_common.c | 189 if (ctx->cost != 0 && ctx->alg != ALG_BCRYPT) { 200 switch (ctx->alg) { 274 ctx->alg); 292 ctx->alg = ALG_APMD5; 295 ctx->alg = ALG_APSHA; 298 ctx->alg = ALG_PLAIN; 308 ctx->alg = ALG_CRYPT; 315 ctx->alg = ALG_APMD5; 320 ctx->alg = ALG_BCRYPT;
|
/macosx-10.10/bind9-45.101/bind9/lib/dns/include/dst/ |
H A D | dst.h | 159 dst_algorithm_supported(unsigned int alg); 269 dst_key_fromfile(dns_name_t *name, dns_keytag_t id, unsigned int alg, int type, 280 * \li "alg" is a supported key algorithm. 400 dst_key_frombuffer(dns_name_t *name, unsigned int alg, 409 *\li "alg" is a supported key algorithm. 494 dst_key_fromlabel(dns_name_t *name, int alg, unsigned int flags, 500 dst_key_generate(dns_name_t *name, unsigned int alg, 507 dst_key_generate2(dns_name_t *name, unsigned int alg, 711 dst_region_computeid(const isc_region_t *source, unsigned int alg); 713 dst_region_computerid(const isc_region_t *source, unsigned int alg); [all...] |
/macosx-10.10/emacs-93/emacs/lisp/calc/ |
H A D | calc-sel.el | 648 alg) 651 (setq alg (calc-do-alg-entry "" "Replace selection with: " nil 653 (and alg 655 (setq alg (calc-encase-atoms (car alg))) 658 expr sel alg)) 660 (list (and calc-sel-reselect alg)))))) 672 alg) 767 alg lh [all...] |
/macosx-10.10/bind9-45.101/bind9/bin/dnssec/ |
H A D | dnssec-keygen.c | 162 fprintf(stderr, " K<name>+<alg>+<id>.key, " 163 "K<name>+<alg>+<id>.private\n"); 208 dns_secalg_t alg; local 528 alg = DST_ALG_HMACMD5; 530 alg = DST_ALG_HMACSHA1; 532 alg = DST_ALG_HMACSHA224; 534 alg = DST_ALG_HMACSHA256; 536 alg = DST_ALG_HMACSHA384; 538 alg = DST_ALG_HMACSHA512; 542 ret = dns_secalg_fromtext(&alg, [all...] |