Searched refs:alg (Results 51 - 75 of 309) sorted by relevance

1234567891011>>

/macosx-10.10/Security-57031.1.35/Security/libsecurity_cdsa_client/lib/
H A Dcspclient.h67 Context(const CSP &csp, CSSM_ALGORITHMS alg = CSSM_ALGID_NONE);
74 void algorithm(CSSM_ALGORITHMS alg);
215 Digest(const CSP &csp, CSSM_ALGORITHMS alg) : Context(csp, alg) { } argument
239 Random(const CSP &csp, CSSM_ALGORITHMS alg) : Context(csp, alg), mSeed(NULL), mSize(1) { } argument
240 Random(const CSP &csp, CSSM_ALGORITHMS alg, const CssmCryptoData &seed) argument
241 : Context(csp, alg), mSeed(&seed), mSize(1) { }
242 Random(const CSP &csp, CSSM_ALGORITHMS alg, uint32 size) argument
243 : Context(csp, alg), mSee
244 Random(const CSP &csp, CSSM_ALGORITHMS alg, const CssmCryptoData &seed, uint32 size) argument
[all...]
H A Dcryptoclient.h38 Crypt(const CSP &csp, CSSM_ALGORITHMS alg);
70 Encrypt(const CSP &csp, CSSM_ALGORITHMS alg) : Crypt(csp, alg) {}; argument
94 Decrypt(const CSP &csp, CSSM_ALGORITHMS alg) : Crypt(csp, alg) {}; argument
/macosx-10.10/ruby-106/ruby/ext/openssl/lib/openssl/
H A Ddigest.rb24 alg = %w(DSS DSS1 MD2 MD4 MD5 MDC2 RIPEMD160 SHA SHA1)
26 alg += %w(SHA224 SHA256 SHA384 SHA512)
44 alg.each{|name|
/macosx-10.10/bind9-45.101/bind9/bin/tests/dst/
H A Ddst_test.c138 io(dns_name_t *name, int id, int alg, int type, isc_mem_t *mctx) { argument
142 ret = dst_key_fromfile(name, id, alg, type, current, mctx, &key);
143 printf("read(%d) returned: %s\n", alg, isc_result_totext(ret));
147 printf("write(%d) returned: %s\n", alg, isc_result_totext(ret));
162 int alg = DST_ALG_DH; local
165 ret = dst_key_fromfile(name1, id1, alg, type, current, mctx, &key1);
166 printf("read(%d) returned: %s\n", alg, isc_result_totext(ret));
169 ret = dst_key_fromfile(name2, id2, alg, type, current, mctx, &key2);
170 printf("read(%d) returned: %s\n", alg, isc_result_totext(ret));
175 printf("write(%d) returned: %s\n", alg, isc_result_totex
216 generate(int alg, isc_mem_t *mctx) argument
[all...]
/macosx-10.10/CommonCrypto-60061/cn_tool/
H A Dmain.c49 uint32_t alg; member in struct:_cnItem
114 uint32_t alg; member in struct:_cnContext
194 uint32_t alg = 0; local
197 alg = algMap[x].alg;
202 return alg;
273 fprintf(stderr, "%s %-1i - %s\n", crcMap[x].alg == context->alg ? "*" : " ", crcMap[x].alg, crcMap[x].name);
283 fprintf(stderr, "%s %-1i - %s\n", basexxMap[x].alg
305 uint32_t alg = 0; local
[all...]
/macosx-10.10/Security-57031.1.35/Security/include/security_cdsa_client/
H A Dcryptoclient.h38 Crypt(const CSP &csp, CSSM_ALGORITHMS alg);
70 Encrypt(const CSP &csp, CSSM_ALGORITHMS alg) : Crypt(csp, alg) {}; argument
94 Decrypt(const CSP &csp, CSSM_ALGORITHMS alg) : Crypt(csp, alg) {}; argument
/macosx-10.10/Security-57031.1.35/Security/libsecurity_cssm/lib/
H A Doidsalg.c39 CSSM_ALGORITHMS alg; member in struct:__anon4635
53 * On the oid-to-alg map, we'll handle either one, mapping to
54 * the same CSSM alg. When we map from alg to OID, we'll use
65 * mapping alg to OID.
81 /* the current valid alg --> OID mapping */
132 CSSM_ALGORITHMS *alg) // RETURNED
138 *alg = ent->alg;
151 if(ent->alg
130 cssmOidToAlg( const CSSM_OID *oid, CSSM_ALGORITHMS *alg) argument
[all...]
/macosx-10.10/OpenSSL098-52/src/crypto/ocsp/
H A Docsp_lib.c105 X509_ALGOR *alg; local
111 alg = cid->hashAlgorithm;
112 if (alg->algorithm != NULL) ASN1_OBJECT_free(alg->algorithm);
118 if (!(alg->algorithm=OBJ_nid2obj(nid))) goto err;
119 if ((alg->parameter=ASN1_TYPE_new()) == NULL) goto err;
120 alg->parameter->type=V_ASN1_NULL;
/macosx-10.10/Security-57031.1.35/Security/libsecurity_apple_csp/lib/
H A DmiscAlgFactory.cpp76 CSSM_ALGORITHMS alg = context.algorithm(); local
80 switch(alg) {
112 * (an encrypt alg with mode), but they define to the same value.
167 break; // not our symmetric alg
168 } // switch alg for symmetric
173 switch(alg) {
224 break; // not our digest alg
225 } // switch digest alg
229 switch(alg) {
341 break; // not our keygen alg
[all...]
/macosx-10.10/Security-57031.1.35/SecurityTests/cspxutils/hashTimeLibCrypt/
H A DhashTimeLibCrypt.cpp197 HT_Alg alg,
201 switch(alg) {
229 HT_Alg alg; local
261 for(alg=FIRST_ALG; alg<=LAST_ALG; alg++) {
262 algToAlgId(alg, &testParams.isSha, &algStr);
196 algToAlgId( HT_Alg alg, bool *isSha, const char **algStr) argument
/macosx-10.10/libresolv-57/
H A Ddst_api.c28 * int dst_check_algorithm() Function to determines if alg is suppored.
86 static DST_KEY *dst_s_get_key_struct(const char *name, const int alg,
141 * alg 1 KEY_RSA
153 dst_check_algorithm(const int alg) argument
155 return (dst_t_func[alg] != NULL);
164 * alg: the algorithm number
173 dst_s_get_key_struct(const char *name, const int alg, const int flags, argument
178 if (dst_check_algorithm(alg)) /* make sure alg is available */
185 new_key->dk_alg = alg;
480 int flags, proto, alg, len, dlen; local
665 int alg ; local
778 dst_buffer_to_key(const char *key_name, const int alg, const int flags, const int protocol, const u_char *key_buf, const int key_len) argument
849 int cnt, alg, len, major, minor, file_major, file_minor; local
977 dst_generate_key(const char *name, const int bits, const int exp, const int flags, const int protocol, const int alg) argument
[all...]
/macosx-10.10/CommonCrypto-60061/test/CommonCrypto/
H A DCCCryptorTestFuncs.c17 CCCryptWithMode(CCOperation op, CCMode mode, CCAlgorithm alg, CCPadding padding, const void *iv, argument
28 if((retval = CCCryptorCreateWithMode(op, mode, alg, padding, iv, key, keyLength, tweak, tweakLength, numRounds, options, &cref)) != kCCSuccess) {
59 CCMultiCrypt(CCOperation op, CCAlgorithm alg, CCOptions options, const void *key, size_t keyLength, const void *iv, const void *dataIn, size_t dataInLength, argument
68 retval = CCCryptorCreate(op, alg, options, key, keyLength, iv, &cref);
103 switch(alg) {
129 CCMultiCryptWithMode(CCOperation op, CCMode mode, CCAlgorithm alg, CCPadding padding, const void *iv, argument
141 if((retval = CCCryptorCreateWithMode(op, mode, alg, padding, iv, key, keyLength, tweak, tweakLength, numRounds, options, &cref)) != kCCSuccess) {
206 CCCryptTestCase(char *keyStr, char *ivStr, CCAlgorithm alg, CCOptions options, char *cipherText, char *plainText) argument
224 if((retval = CCCrypt(kCCEncrypt, alg, options, key->bytes, key->len, iv->bytes, pt->bytes, pt->len, cipherDataOut, 4096, &dataOutMoved)) != kCCSuccess) {
243 if((retval = CCCrypt(kCCDecrypt, alg, option
269 CCMultiCryptTestCase(char *keyStr, char *ivStr, CCAlgorithm alg, CCOptions options, char *cipherText, char *plainText) argument
332 CCModeTestCase(char *keyStr, char *ivStr, CCMode mode, CCAlgorithm alg, CCPadding padding, char *cipherText, char *plainText) argument
401 CCMultiModeTestCase(char *keyStr, char *ivStr, CCMode mode, CCAlgorithm alg, CCPadding padding, char *cipherText, char *plainText) argument
468 CCCryptorGCMDiscreet( CCOperation op, CCAlgorithm alg, const void *key, size_t keyLength, const void *iv, size_t ivLen, const void *aData, size_t aDataLen, const void *dataIn, size_t dataInLength, void *dataOut, const void *tag, size_t *tagLength) argument
536 CCCryptorGCMTestCase(char *keyStr, char *ivStr, char *aDataStr, char *tagStr, CCAlgorithm alg, char *cipherText, char *plainText) argument
621 CCCryptorGCMDiscreetTestCase(char *keyStr, char *ivStr, char *aDataStr, char *tagStr, CCAlgorithm alg, char *cipherText, char *plainText) argument
[all...]
/macosx-10.10/Security-57031.1.35/SecurityTests/cspxutils/badattr/
H A Dbadattr.c9 for each asymmetric alg {
12 make sure you cannot use it for encrypting with other alg
15 make sure you cannot use it for decrypting with other alg
84 uint32 alg,
101 alg,
120 printf("***Testing %s for alg %s:\n", testStr, keyAlgStr);
212 printf("***Testing %s for alg %s:\n", testStr, keyAlgStr);
268 printf("***Testing %s for alg %s:\n", testStr, keyAlgStr);
337 printf("***Testing %s for alg %s:\n", testStr, keyAlgStr);
433 * Given a reference key (any class, any alg), attemp
81 genSymKey( CSSM_CSP_HANDLE cspHand, CSSM_KEY_PTR symKey, uint32 alg, const char *keyAlgStr, uint32 keySizeInBits, CSSM_KEYATTR_FLAGS keyAttr, CSSM_KEYUSE keyUsage, CSSM_RETURN expectRtn, CSSM_BOOL quiet, CSSM_BOOL freeKey, const char *testStr) argument
696 symAttrTest( CSSM_CSP_HANDLE cspHand, CSSM_ALGORITHMS alg, const char *keyAlgStr, uint32 keySizeInBits, CSSM_BOOL bareCsp, CSSM_BOOL quiet) argument
775 symNullWrapTest( CSSM_CSP_HANDLE cspHand, CSSM_ALGORITHMS alg, const char *keyAlgStr, uint32 keySizeInBits, CSSM_BOOL quiet) argument
824 symBadWrapTest( CSSM_CSP_HANDLE cspHand, CSSM_ALGORITHMS alg, const char *keyAlgStr, uint32 keySizeInBits, CSSM_BOOL quiet) argument
862 asymBadWrapTest( CSSM_CSP_HANDLE cspHand, CSSM_ALGORITHMS alg, const char *keyAlgStr, uint32 keySizeInBits, CSSM_BOOL quiet) argument
932 pubKeyAttrTest( CSSM_CSP_HANDLE cspHand, CSSM_ALGORITHMS alg, const char *keyAlgStr, uint32 keySizeInBits, CSSM_KEYATTR_FLAGS pubKeyAttr, CSSM_RETURN expectRtn, CSSM_BOOL quiet, const char *testStr) argument
955 privKeyAttrTest( CSSM_CSP_HANDLE cspHand, CSSM_ALGORITHMS alg, const char *keyAlgStr, uint32 keySizeInBits, CSSM_KEYATTR_FLAGS privKeyAttr, CSSM_RETURN expectRtn, CSSM_BOOL quiet, const char *testStr) argument
997 asymAttrTest( CSSM_CSP_HANDLE cspHand, CSSM_ALGORITHMS alg, const char *keyAlgStr, uint32 keySizeInBits, CSSM_BOOL bareCsp, CSSM_BOOL quiet) argument
1124 asymNullWrapTest( CSSM_CSP_HANDLE cspHand, CSSM_ALGORITHMS alg, const char *keyAlgStr, uint32 keySizeInBits, CSSM_BOOL quiet) argument
[all...]
/macosx-10.10/CommonCrypto-60061/lib/
H A DCommonHMAC.c155 CCHmacOutputSize(CCDigestAlg alg) argument
158 return CCDigestGetOutputSize(alg);
181 CCHmacCreate(CCDigestAlg alg, const void *key, size_t keyLength) argument
191 if((hmacCtx->di = CCDigestGetDigestInfo(alg)) == NULL) {
201 void CCHmacOneShot(CCDigestAlg alg, const void *key, size_t keyLength, const void *data, size_t dataLength, void *macOut) { argument
202 const struct ccdigest_info *di = CCDigestGetDigestInfo(alg);
/macosx-10.10/bind9-45.101/bind9/bin/confgen/
H A Dddns-confgen.c71 %s [-a alg] [-k keyname] [-r randomfile] [-q] [-s name | -z zone]\n\
72 -a alg: algorithm (default hmac-sha256)\n\
96 dns_secalg_t alg = DST_ALG_HMACSHA256; local
97 const char *algname = alg_totext(alg);
114 alg = alg_fromtext(algname);
115 if (alg == DST_ALG_UNKNOWN)
117 keysize = alg_bits(alg);
193 generate_key(mctx, randomfile, alg, keysize, &key_txtbuffer);
/macosx-10.10/Security-57031.1.35/SecurityTests/cspxutils/rsatool/
H A Drsatool.c22 CSSM_ALGORITHMS alg; member in struct:__anon5327
39 CSSM_ALGORITHMS digestAlg; // optional digest alg for raw sign/verify
79 printf(" a=alg d=DSA, r=RSA, e=ECDSA; default = RSA\n");
404 CSSM_ALGORITHMS alg,
427 hdr->AlgorithmId = alg;
462 if(op->alg == CSSM_ALGID_DSA) {
525 op->alg,
596 irtn = rt_readKey(op->cspHand, op->keyFileName, isPub, op->alg,
611 op->alg,
671 irtn = rt_readKey(op->cspHand, op->keyFileName, isPub, op->alg,
400 rt_readKey( CSSM_CSP_HANDLE cspHand, const char *keyFileBase, CSSM_BOOL isPub, CSSM_ALGORITHMS alg, CSSM_KEYBLOB_FORMAT format, CSSM_KEY_PTR key) argument
722 CSSM_ALGORITHMS alg; local
801 CSSM_ALGORITHMS alg; local
[all...]
/macosx-10.10/CommonCrypto-60061/include/
H A DCommonCryptor.h259 @param alg Defines the algorithm.
286 CCAlgorithm alg, /* kCCAlgorithmDES, etc. */
301 @param alg Defines the algorithm.
347 CCAlgorithm alg, /* kCCAlgorithmDES, etc. */
554 @param alg Defines the encryption algorithm.
614 CCAlgorithm alg, /* kCCAlgorithmAES128, etc. */
619 const void *dataIn, /* optional per op and alg */
697 @param alg Defines the algorithm.
744 CCAlgorithm alg,
/macosx-10.10/Heimdal-398.1.2/lib/krb5/
H A Dcrypto-des-common.c59 CCDigestAlg alg,
72 m = CCDigestCreate(alg);
91 CCDigestAlg alg,
104 m = CCDigestCreate(alg);
58 _krb5_des_checksum(krb5_context context, CCDigestAlg alg, struct _krb5_key_data *key, const void *data, size_t len, Checksum *cksum) argument
90 _krb5_des_verify(krb5_context context, CCDigestAlg alg, struct _krb5_key_data *key, const void *data, size_t len, Checksum *C) argument
/macosx-10.10/Heimdal-398.1.2/lib/otp/
H A Dotp_challenge.c65 ctx->alg->name, ctx->n-1, ctx->seed);
/macosx-10.10/Security-57031.1.35/SecurityTests/cspxutils/hashTest/
H A DhashTest.c91 uint32 alg,
122 alg,
131 alg,
173 alg,
210 uint32 alg; // ALG_MD5, etc. local
322 for(alg=minAlg; alg<=maxAlg; alg++) {
323 switch(alg) {
354 printf("Testing alg
90 doTest(CSSM_CSP_HANDLE cspHand, uint32 alg, CSSM_DATA_PTR ptext, CSSM_BOOL verbose, CSSM_BOOL quiet, CSSM_BOOL mallocDigest, unsigned incr, CSSM_BOOL goodOnly) argument
[all...]
/macosx-10.10/apache-793/httpd/modules/lua/
H A Dlua_passwd.h74 int alg; member in struct:passwd_ctx
/macosx-10.10/apache-793/httpd/support/
H A Dpasswd_common.c189 if (ctx->cost != 0 && ctx->alg != ALG_BCRYPT) {
200 switch (ctx->alg) {
274 ctx->alg);
292 ctx->alg = ALG_APMD5;
295 ctx->alg = ALG_APSHA;
298 ctx->alg = ALG_PLAIN;
308 ctx->alg = ALG_CRYPT;
315 ctx->alg = ALG_APMD5;
320 ctx->alg = ALG_BCRYPT;
/macosx-10.10/bind9-45.101/bind9/lib/dns/include/dst/
H A Ddst.h159 dst_algorithm_supported(unsigned int alg);
269 dst_key_fromfile(dns_name_t *name, dns_keytag_t id, unsigned int alg, int type,
280 * \li "alg" is a supported key algorithm.
400 dst_key_frombuffer(dns_name_t *name, unsigned int alg,
409 *\li "alg" is a supported key algorithm.
494 dst_key_fromlabel(dns_name_t *name, int alg, unsigned int flags,
500 dst_key_generate(dns_name_t *name, unsigned int alg,
507 dst_key_generate2(dns_name_t *name, unsigned int alg,
711 dst_region_computeid(const isc_region_t *source, unsigned int alg);
713 dst_region_computerid(const isc_region_t *source, unsigned int alg);
[all...]
/macosx-10.10/emacs-93/emacs/lisp/calc/
H A Dcalc-sel.el648 alg)
651 (setq alg (calc-do-alg-entry "" "Replace selection with: " nil
653 (and alg
655 (setq alg (calc-encase-atoms (car alg)))
658 expr sel alg))
660 (list (and calc-sel-reselect alg))))))
672 alg)
767 alg lh
[all...]
/macosx-10.10/bind9-45.101/bind9/bin/dnssec/
H A Ddnssec-keygen.c162 fprintf(stderr, " K<name>+<alg>+<id>.key, "
163 "K<name>+<alg>+<id>.private\n");
208 dns_secalg_t alg; local
528 alg = DST_ALG_HMACMD5;
530 alg = DST_ALG_HMACSHA1;
532 alg = DST_ALG_HMACSHA224;
534 alg = DST_ALG_HMACSHA256;
536 alg = DST_ALG_HMACSHA384;
538 alg = DST_ALG_HMACSHA512;
542 ret = dns_secalg_fromtext(&alg,
[all...]

Completed in 179 milliseconds

1234567891011>>