/macosx-10.10/bind9-45.101/bind9/bin/tests/system/logfileconfig/ns1/ |
H A D | named.pipeconf | 49 algorithm hmac-md5;
|
H A D | named.plain | 49 algorithm hmac-md5;
|
H A D | named.symconf | 49 algorithm hmac-md5;
|
/macosx-10.10/OpenSSL098-52/src/crypto/ocsp/ |
H A D | ocsp_lib.c | 112 if (alg->algorithm != NULL) ASN1_OBJECT_free(alg->algorithm); 118 if (!(alg->algorithm=OBJ_nid2obj(nid))) goto err; 146 ret = OBJ_cmp(a->hashAlgorithm->algorithm, b->hashAlgorithm->algorithm);
|
/macosx-10.10/WebCore-7600.1.25/bindings/js/ |
H A D | JSCryptoAlgorithmDictionary.cpp | 300 std::unique_ptr<CryptoAlgorithmParameters> JSCryptoAlgorithmDictionary::createParametersForEncrypt(ExecState* exec, CryptoAlgorithmIdentifier algorithm, JSValue value) argument 302 switch (algorithm) { 340 std::unique_ptr<CryptoAlgorithmParameters> JSCryptoAlgorithmDictionary::createParametersForDecrypt(ExecState* exec, CryptoAlgorithmIdentifier algorithm, JSValue value) argument 342 switch (algorithm) { 380 std::unique_ptr<CryptoAlgorithmParameters> JSCryptoAlgorithmDictionary::createParametersForSign(ExecState* exec, CryptoAlgorithmIdentifier algorithm, JSValue value) argument 382 switch (algorithm) { 416 std::unique_ptr<CryptoAlgorithmParameters> JSCryptoAlgorithmDictionary::createParametersForVerify(ExecState* exec, CryptoAlgorithmIdentifier algorithm, JSValue value) argument 418 switch (algorithm) { 452 std::unique_ptr<CryptoAlgorithmParameters> JSCryptoAlgorithmDictionary::createParametersForDigest(ExecState* exec, CryptoAlgorithmIdentifier algorithm, JSValue) argument 454 switch (algorithm) { 485 createParametersForGenerateKey(ExecState* exec, CryptoAlgorithmIdentifier algorithm, JSValue value) argument 520 createParametersForDeriveKey(ExecState* exec, CryptoAlgorithmIdentifier algorithm, JSValue) argument 550 createParametersForDeriveBits(ExecState* exec, CryptoAlgorithmIdentifier algorithm, JSValue) argument 580 createParametersForImportKey(ExecState* exec, CryptoAlgorithmIdentifier algorithm, JSValue value) argument 617 createParametersForExportKey(ExecState* exec, CryptoAlgorithmIdentifier algorithm, JSValue) argument [all...] |
/macosx-10.10/Security-57031.1.35/SecurityTool/ |
H A D | key_create.c | 44 do_key_create_pair(const char *keychainName, SecAccessRef access, CSSM_ALGORITHMS algorithm, uint32 keySizeInBits, CFAbsoluteTime from_time, CFAbsoluteTime to_time, Boolean print_hash) argument 68 status = SecKeyCreatePair(keychain, algorithm, keySizeInBits, contextHandle, 134 parse_algorithm(const char *name, CSSM_ALGORITHMS *algorithm) argument 139 *algorithm = CSSM_ALGID_RSA; 141 *algorithm = CSSM_ALGID_DSA; 143 *algorithm = CSSM_ALGID_DH; 145 *algorithm = CSSM_ALGID_FEE; 148 sec_error("Invalid algorithm: %s", name); 177 CSSM_ALGORITHMS algorithm = CSSM_ALGID_RSA; local 192 " -a Use alg as the algorithm, ca [all...] |
/macosx-10.10/OpenSSL098-52/src/engines/ |
H A D | e_4758cca.c | 645 X509_ALGOR algorithm; local 653 sig.algor = &algorithm; 654 algorithm.algorithm = OBJ_nid2obj(type); 656 if (!algorithm.algorithm) 663 if (!algorithm.algorithm->length) 672 algorithm.parameter = ¶meter; 769 X509_ALGOR algorithm; local [all...] |
/macosx-10.10/ruby-106/ruby/lib/webrick/httpauth/ |
H A D | digestauth.rb | 56 # Digest authentication algorithm 58 attr_reader :algorithm 89 @algorithm = @config[:Algorithm] 100 case @algorithm 106 msg = format('Algorithm "%s" is not supported.', @algorithm) 147 param["algorithm"] = @algorithm 191 auth_req['algorithm'] ||= 'MD5' 192 if auth_req['algorithm'].upcase != @algorithm [all...] |
/macosx-10.10/Security-57031.1.35/Security/sec/securityd/ |
H A D | SecOCSPCache.c | 221 certId->algId.algorithm.Data, 222 certId->algId.algorithm.Length, 271 SecAsn1Oid algorithm; 272 algorithm.Data = (uint8_t *)sqlite3_column_blob(selectHash, 0); 273 algorithm.Length = sqlite3_column_bytes(selectHash, 0); 278 &algorithm, NULL, CFDataGetBytePtr(issuer), CFDataGetLength(issuer)); 280 &algorithm, NULL, publicKey->data, publicKey->length); 283 /* Now we have the serial, algorithm, issuerNameHash and 291 if (ok) ok = SecDbBindBlob(selectResponse, 4, algorithm.Data, 292 algorithm [all...] |
/macosx-10.10/Security-57031.1.35/Security/libsecurity_apple_csp/lib/ |
H A D | cryptkitcsp.cpp | 57 // Manage the CryptKit algorithm factory 81 switch(context.algorithm()) { 179 switch(context.algorithm()) { 192 switch(context.algorithm()) {
|
H A D | miscalgorithms.cpp | 53 // We really should match the key algorithm to the sign/vfy 54 // algorithm. Also: verify key usage bits. 62 setAlgorithm(algorithm, NULL); 82 // Note that BSafe treats MACs as digest algorithms - it has no MAC algorithm 96 digestSpec.digestInfoType = algorithm; 135 setAlgorithm(algorithm, NULL); // MD5 generator mode (RSA proprietary)
|
H A D | bsafeAsymmetric.cpp | 32 // We really should match the key algorithm to the en/decrypt 33 // algorithm. Also: verify key usage bits. 36 assert(context.algorithm() == CSSM_ALGID_RSA);
|
/macosx-10.10/Security-57031.1.35/securityd/src/ |
H A D | tempdatabase.cpp | 136 rawKey.algorithm(context.algorithm()); 158 switch (context.algorithm())
|
/macosx-10.10/CommonCrypto-60061/lib/ |
H A D | CommonSymmetricKeywrap.c | 78 CCSymmetricKeyWrap( CCWrappingAlgorithm algorithm, argument 136 CCSymmetricKeyUnwrap( CCWrappingAlgorithm algorithm, argument 198 CCSymmetricWrappedSize( CCWrappingAlgorithm algorithm, size_t rawKeyLen) argument 205 CCSymmetricUnwrappedSize( CCWrappingAlgorithm algorithm, size_t wrappedKeyLen) argument
|
/macosx-10.10/Heimdal-398.1.2/lib/roken/ |
H A D | resolve-test.c | 137 printf ("type %u (%s), algorithm %u, labels %u, orig_ttl %u, sig_expiration %u, sig_inception %u, key_tag %u, signer %s\n", 139 sig->algorithm, sig->labels, sig->orig_ttl, 147 printf ("flags %u, protocol %u, algorithm %u\n", 148 key->flags, key->protocol, key->algorithm); 155 printf ("alg %u type %u length %lu data ", sshfp->algorithm, 168 ds->key_tag, ds->algorithm, ds->digest_type,
|
/macosx-10.10/OpenSSL098-52/src/crypto/asn1/ |
H A D | p5_pbe.c | 74 /* Return an algorithm identifier for a PKCS#5 PBE algorithm */ 122 ASN1_OBJECT_free(algor->algorithm); 123 algor->algorithm = al;
|
/macosx-10.10/Security-57031.1.35/Security/include/security_smime/ |
H A D | cmsencdata.c | 52 * "algorithm" specifies the bulk encryption algorithm to use. 59 SecCmsEncryptedDataCreate(SecCmsMessageRef cmsg, SECOidTag algorithm, int keysize) argument 79 switch (algorithm) { 84 rv = SecCmsContentInfoSetContentEncAlg((SecArenaPoolRef)poolp, &(encd->contentInfo), algorithm, NULL, keysize); 92 pbe_algid = PK11_CreatePBEAlgorithmID(algorithm, 1, NULL); 184 /* find bulkkey and algorithm - must have been set by SecCmsEncryptedDataEncodeBeforeStart */
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_apple_csp/open_ssl/rsa/ |
H A D | rsa_sign.c | 108 sig.algor->algorithm=OBJ_nid2obj(type); 109 if (sig.algor->algorithm == NULL) 114 if (sig.algor->algorithm->length == 0) 198 sigtype=OBJ_obj2nid(sig->algor->algorithm);
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_keychain/libDER/Tests/ |
H A D | DER_Ticket.c | 160 /* Decode the algorithm sequence. */ 161 DERAlgorithmId algorithm = {}; 163 DERNumAlgorithmIdItemSpecs, DERAlgorithmIdItemSpecs, &algorithm, 0); 165 /* TODO Check algorithm oid and ensure there are no params. 167 an already ASN.1 encoded algorithm parms block. */ 189 /* Decode the algorithm sequence. */ 190 DERAlgorithmId algorithm = {}; 192 DERNumAlgorithmIdItemSpecs, DERAlgorithmIdItemSpecs, &algorithm, 0); 194 /* TODO Check algorithm oid and ensure there are no params. 196 an already ASN.1 encoded algorithm parm [all...] |
/macosx-10.10/Security-57031.1.35/Security/libsecurity_smime/lib/ |
H A D | cmsencdata.c | 52 * "algorithm" specifies the bulk encryption algorithm to use. 59 SecCmsEncryptedDataCreate(SecCmsMessageRef cmsg, SECOidTag algorithm, int keysize) argument 79 switch (algorithm) { 84 rv = SecCmsContentInfoSetContentEncAlg((SecArenaPoolRef)poolp, &(encd->contentInfo), algorithm, NULL, keysize); 92 pbe_algid = PK11_CreatePBEAlgorithmID(algorithm, 1, NULL); 184 /* find bulkkey and algorithm - must have been set by SecCmsEncryptedDataEncodeBeforeStart */
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_ssl/Security/ |
H A D | secCrypto.c | 63 algId.algorithm = oidForSSLHash(hash);
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_ssl/lib/ |
H A D | secCrypto.c | 63 algId.algorithm = oidForSSLHash(hash);
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_ssl/security_ssl/ |
H A D | secCrypto.c | 63 algId.algorithm = oidForSSLHash(hash);
|
/macosx-10.10/Security-57031.1.35/Security/sec/Security/ |
H A D | SecFramework.h | 57 algorithm is selected based on the algorithm and params passed in. */ 59 const SecAsn1Oid *algorithm, const SecAsn1Item *params,
|
/macosx-10.10/Security-57031.1.35/SecurityTests/cspxutils/genKeyPair/ |
H A D | genKeyPair.cpp | 18 printf(" -a r|f|d -- algorithm RSA/FEE/DSA, default = RSA\n"); 24 * Generate key pair of arbitrary algorithm. 30 uint32 algorithm, 46 /* pre-context-create algorithm-specific stuff */ 47 switch(algorithm) { 64 printf("cspGenKeyPair: Unknown algorithm\n"); 73 algorithm, 90 /* post-context-create algorithm-specific stuff */ 91 switch(algorithm) { 28 genKeyPair(CSSM_CSP_HANDLE cspHand, CSSM_DL_DB_HANDLE dlDbHand, uint32 algorithm, const char *keyLabel, unsigned keyLabelLen, uint32 keySize, CSSM_KEY_PTR pubKey, uint32 pubKeyUsage, CSSM_KEY_PTR privKey, uint32 privKeyUsage) argument
|