/macosx-10.10/bind9-45.101/bind9/bin/tests/system/xfer/ns3/ |
H A D | named.conf | 37 algorithm hmac-md5; 45 algorithm hmac-md5;
|
/macosx-10.10/bind9-45.101/bind9/lib/dns/ |
H A D | nsec.c | 263 if (dnskey.algorithm == DST_ALG_RSAMD5 || 264 dnskey.algorithm == DST_ALG_RSASHA1 || 265 dnskey.algorithm == DST_ALG_DSA || 266 dnskey.algorithm == DST_ALG_ECC)
|
/macosx-10.10/libutil-38/ |
H A D | ExtentManager.h | 31 #include <algorithm>
|
/macosx-10.10/llvmCore-3425.0.34/include/llvm/ADT/ |
H A D | PriorityQueue.h | 17 #include <algorithm>
|
/macosx-10.10/llvmCore-3425.0.34/lib/Support/ |
H A D | FormattedStream.cpp | 16 #include <algorithm>
|
/macosx-10.10/llvmCore-3425.0.34/lib/Transforms/IPO/ |
H A D | ExtractGV.cpp | 21 #include <algorithm>
|
/macosx-10.10/llvmCore-3425.0.34/tools/bugpoint/ |
H A D | FindBugs.cpp | 21 #include <algorithm>
|
/macosx-10.10/Security-57031.1.35/Security/sec/securityd/ |
H A D | SecOCSPResponse.c | 459 SecAsn1Oid *algorithm = NULL; local 482 if (!SecAsn1OidCompare(algorithm, &certId->algId.algorithm) || 484 algorithm = &certId->algId.algorithm; 488 issuerNameHash = SecDigestCreate(kCFAllocatorDefault, algorithm, 490 issuerPubKeyHash = SecDigestCreate(kCFAllocatorDefault, algorithm,
|
/macosx-10.10/ipsec-286.1.1/ipsec-tools/racoon/ |
H A D | vpn.c | 247 u_int16_t class, algorithm, keylen; local 344 "Failed to allocate algorithm structure\n"); 349 algorithm = ntohs(next_algo->algo); 352 new_algo->alg = algtype2doi(class, algorithm); 359 defklen = default_keylen(class, algorithm); 367 if (keylen && check_keylen(class, algorithm, keylen) < 0) { 379 /* check if it's supported algorithm by kernel */ 380 if (!(class == algclass_ipsec_auth && algorithm == algtype_non_auth) 381 && pk_checkalg(class, algorithm, new_algo->encklen)) { 396 "No encryption algorithm a [all...] |
/macosx-10.10/Security-57031.1.35/Security/sec/Security/ |
H A D | p12import.c | 164 require_noerr_quiet(pkcsOidToParams(&algId->algorithm, &alg, &keySizeInBits, 275 require_noerr_quiet(p12Decrypt(context, &keyBag->algorithm, 284 DERItem algorithm = { pki.algorithm.algorithm.Data, pki.algorithm.algorithm.Length }; local 286 if (DEROidCompare(&oidEcPubKey, &algorithm)) { 288 } else if (DEROidCompare(&oidRsa, &algorithm)) { 464 SecAsn1Item *algOid = &digestInfo->digestAlgorithm.algorithm; [all...] |
H A D | SecCertificateRequest.c | 725 certReq.reqInfo.subjectPublicKeyInfo.algorithm.algorithm.Length = oidRsa.length; 726 certReq.reqInfo.subjectPublicKeyInfo.algorithm.algorithm.Data = oidRsa.data; 727 certReq.reqInfo.subjectPublicKeyInfo.algorithm.parameters = asn1_null; 751 certReq.signatureAlgorithm.algorithm.Length = oidSha1Rsa.length; 752 certReq.signatureAlgorithm.algorithm.Data = oidSha1Rsa.data; 792 certReq.reqInfo.subjectPublicKeyInfo.algorithm.algorithm.Length = oidRsa.length; 793 certReq.reqInfo.subjectPublicKeyInfo.algorithm [all...] |
/macosx-10.10/Security-57031.1.35/Security/libsecurity_apple_csp/lib/ |
H A D | deriveKey.cpp | 51 /* validate algorithm-specific arguments */ 307 switch(context.algorithm()) { 331 /* outgoing key type, required (though any algorithm is OK) */ 362 /* break off to algorithm-specific code, whose job it is 364 switch(context.algorithm()) { 388 context.algorithm(), 394 context.algorithm(), 402 context.algorithm(),
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_keychain/regressions/ |
H A D | kc-41-sececkey.c | 66 oid.length = algId->algorithm.Length; 67 oid.data = algId->algorithm.Data; 114 algId.algorithm = *oids[ix]; 116 algId.algorithm.Length = 0; 117 algId.algorithm.Data = NULL;
|
/macosx-10.10/curl-83.1.2/curl/lib/ |
H A D | http_digest.c | 214 else if(Curl_raw_equal(value, "algorithm")) { 215 d->algorithm = strdup(content); 216 if(!d->algorithm) 381 if the algorithm is "MD5" or unspecified (which then defaults to MD5): 385 if the algorithm is "MD5-sess" then: 495 characters. algorithm and qop with standard values only contain web-safe 557 if(d->algorithm) { 558 /* append algorithm */ 559 tmp = aprintf("%s, algorithm=\"%s\"", *allocuserpwd, d->algorithm); [all...] |
/macosx-10.10/bind9-45.101/bind9/lib/dns/rdata/generic/ |
H A D | tkey_249.c | 361 RETERR(name_tobuffer(&tkey->algorithm, target)); 425 dns_name_init(&tkey->algorithm, NULL); 426 RETERR(name_duporclone(&alg, mctx, &tkey->algorithm)); 427 isc_region_consume(&sr, name_length(&tkey->algorithm)); 485 dns_name_free(&tkey->algorithm, mctx); 500 dns_name_free(&tkey->algorithm, tkey->mctx);
|
/macosx-10.10/CommonCrypto-60061/lib/ |
H A D | CommonDigest.c | 57 CCDigestGetDigestInfo(CCDigestAlgorithm algorithm) { argument 82 return globals->digest_info[algorithm]; 145 CCDigestGetBlockSize(CCDigestAlgorithm algorithm) argument 147 CC_DEBUG_LOG(ASL_LEVEL_ERR, "Entering Algorithm: %d\n", algorithm); 148 const struct ccdigest_info *di = CCDigestGetDigestInfo(algorithm); 154 CCDigestGetOutputSize(CCDigestAlgorithm algorithm) argument 156 CC_DEBUG_LOG(ASL_LEVEL_ERR, "Entering Algorithm: %d\n", algorithm); 157 const struct ccdigest_info *di = CCDigestGetDigestInfo(algorithm);
|
/macosx-10.10/OpenSSL098-52/src/crypto/evp/ |
H A D | evp_pkey.c | 123 nid = OBJ_obj2nid(a->algorithm); 338 if (!a->algorithm) BUF_strlcpy (obj_tmp, "NULL", sizeof obj_tmp); 339 else i2t_ASN1_OBJECT(obj_tmp, 80, a->algorithm); 380 p8->pkeyalg->algorithm = OBJ_nid2obj(NID_rsaEncryption); 449 p8->pkeyalg->algorithm = OBJ_nid2obj(NID_dsa); 619 if (p8->pkeyalg->algorithm) 620 ASN1_OBJECT_free(p8->pkeyalg->algorithm); 622 p8->pkeyalg->algorithm = OBJ_nid2obj(NID_X9_62_id_ecPublicKey);
|
/macosx-10.10/OpenSSL098-52/src/crypto/pkcs12/ |
H A D | p12_mutl.c | 86 EVP_get_digestbyobj (p12->mac->dinfo->algor->algorithm))) { 173 p12->mac->dinfo->algor->algorithm = OBJ_nid2obj(EVP_MD_type(md_type));
|
H A D | p12_npas.c | 123 if (!alg_get(p7->d.encrypted->enc_data->algorithm, 220 *pnid = OBJ_obj2nid(alg->algorithm);
|
/macosx-10.10/OpenSSL098-52/src/demos/ |
H A D | spkigen.c | 134 /* set the algorithm id */ 136 ASN1_OBJECT_free(a->algorithm); 137 a->algorithm=o;
|
/macosx-10.10/Security-57031.1.35/Security/include/security_keychain/ |
H A D | SecKey.h | 75 representing the algorithm associated with this key. 252 @param algorithm An algorithm for the key pair. This parameter is ignored if a valid (non-zero) contextHandle is supplied. 254 @param contextHandle (optional) A CSSM_CC_HANDLE, or 0. If this argument is supplied, the algorithm and keySizeInBits parameters are ignored. If extra parameters are needed to generate a key (some algorithms require this), you should create a context using CSSM_CSP_CreateKeyGenContext, using the CSPHandle obtained by calling SecKeychainGetCSPHandle. Then use CSSM_UpdateContextAttributes to add parameters, and dispose of the context using CSSM_DeleteContext after calling this function. 267 CSSM_ALGORITHMS algorithm, 283 @param algorithm An algorithm for the symmetric key. This parameter is ignored if a valid (non-zero) contextHandle is supplied. 285 @param contextHandle (optional) A CSSM_CC_HANDLE, or 0. If this argument is supplied, the algorithm and keySizeInBits parameters are ignored. If extra parameters are needed to generate a key (some algorithms require this), you should create a context using CSSM_CSP_CreateKeyGenContext, using the CSPHandle obtained by calling SecKeychainGetCSPHandle. Then use CSSM_UpdateContextAttributes to add parameters, and dispose of the context using CSSM_DeleteContext after calling this function. 295 CSSM_ALGORITHMS algorithm, 356 and algorithm typ [all...] |
/macosx-10.10/Security-57031.1.35/Security/libsecurity_apple_x509_cl/lib/ |
H A D | Session_CSR.cpp | 128 certReq.signatureAlgorithm.algorithm = csrReq->signatureOid; 178 * 2. Obtain signature algorithm and parameters. 181 CSSM_ALGORITHMS vfyAlg = CL_oidToAlg(sigAlgId.algorithm); 185 * decode to get the digest algorithm.
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_cssm/lib/ |
H A D | cssmcontext.cpp | 188 CSSM_ALGORITHMS algorithm) 191 HandleContext &context = *new(attachment) HandleContext(attachment, type, algorithm); 187 operator ()(CSSM_CONTEXT_TYPE type, CSSM_ALGORITHMS algorithm) argument
|
H A D | x509defs.h | 71 CSSM_OID algorithm; member in struct:cssm_x509_algorithm_identifier 95 CSSM_X509_ALGORITHM_IDENTIFIER algorithm; member in struct:cssm_x509_subject_public_key_info
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_keychain/Security/ |
H A D | SecKey.h | 75 representing the algorithm associated with this key. 252 @param algorithm An algorithm for the key pair. This parameter is ignored if a valid (non-zero) contextHandle is supplied. 254 @param contextHandle (optional) A CSSM_CC_HANDLE, or 0. If this argument is supplied, the algorithm and keySizeInBits parameters are ignored. If extra parameters are needed to generate a key (some algorithms require this), you should create a context using CSSM_CSP_CreateKeyGenContext, using the CSPHandle obtained by calling SecKeychainGetCSPHandle. Then use CSSM_UpdateContextAttributes to add parameters, and dispose of the context using CSSM_DeleteContext after calling this function. 267 CSSM_ALGORITHMS algorithm, 283 @param algorithm An algorithm for the symmetric key. This parameter is ignored if a valid (non-zero) contextHandle is supplied. 285 @param contextHandle (optional) A CSSM_CC_HANDLE, or 0. If this argument is supplied, the algorithm and keySizeInBits parameters are ignored. If extra parameters are needed to generate a key (some algorithms require this), you should create a context using CSSM_CSP_CreateKeyGenContext, using the CSPHandle obtained by calling SecKeychainGetCSPHandle. Then use CSSM_UpdateContextAttributes to add parameters, and dispose of the context using CSSM_DeleteContext after calling this function. 295 CSSM_ALGORITHMS algorithm, 356 and algorithm typ [all...] |