Searched refs:algorithm (Results 226 - 250 of 891) sorted by relevance

1234567891011>>

/macosx-10.10/bind9-45.101/bind9/bin/tests/system/xfer/ns3/
H A Dnamed.conf37 algorithm hmac-md5;
45 algorithm hmac-md5;
/macosx-10.10/bind9-45.101/bind9/lib/dns/
H A Dnsec.c263 if (dnskey.algorithm == DST_ALG_RSAMD5 ||
264 dnskey.algorithm == DST_ALG_RSASHA1 ||
265 dnskey.algorithm == DST_ALG_DSA ||
266 dnskey.algorithm == DST_ALG_ECC)
/macosx-10.10/libutil-38/
H A DExtentManager.h31 #include <algorithm>
/macosx-10.10/llvmCore-3425.0.34/include/llvm/ADT/
H A DPriorityQueue.h17 #include <algorithm>
/macosx-10.10/llvmCore-3425.0.34/lib/Support/
H A DFormattedStream.cpp16 #include <algorithm>
/macosx-10.10/llvmCore-3425.0.34/lib/Transforms/IPO/
H A DExtractGV.cpp21 #include <algorithm>
/macosx-10.10/llvmCore-3425.0.34/tools/bugpoint/
H A DFindBugs.cpp21 #include <algorithm>
/macosx-10.10/Security-57031.1.35/Security/sec/securityd/
H A DSecOCSPResponse.c459 SecAsn1Oid *algorithm = NULL; local
482 if (!SecAsn1OidCompare(algorithm, &certId->algId.algorithm) ||
484 algorithm = &certId->algId.algorithm;
488 issuerNameHash = SecDigestCreate(kCFAllocatorDefault, algorithm,
490 issuerPubKeyHash = SecDigestCreate(kCFAllocatorDefault, algorithm,
/macosx-10.10/ipsec-286.1.1/ipsec-tools/racoon/
H A Dvpn.c247 u_int16_t class, algorithm, keylen; local
344 "Failed to allocate algorithm structure\n");
349 algorithm = ntohs(next_algo->algo);
352 new_algo->alg = algtype2doi(class, algorithm);
359 defklen = default_keylen(class, algorithm);
367 if (keylen && check_keylen(class, algorithm, keylen) < 0) {
379 /* check if it's supported algorithm by kernel */
380 if (!(class == algclass_ipsec_auth && algorithm == algtype_non_auth)
381 && pk_checkalg(class, algorithm, new_algo->encklen)) {
396 "No encryption algorithm a
[all...]
/macosx-10.10/Security-57031.1.35/Security/sec/Security/
H A Dp12import.c164 require_noerr_quiet(pkcsOidToParams(&algId->algorithm, &alg, &keySizeInBits,
275 require_noerr_quiet(p12Decrypt(context, &keyBag->algorithm,
284 DERItem algorithm = { pki.algorithm.algorithm.Data, pki.algorithm.algorithm.Length }; local
286 if (DEROidCompare(&oidEcPubKey, &algorithm)) {
288 } else if (DEROidCompare(&oidRsa, &algorithm)) {
464 SecAsn1Item *algOid = &digestInfo->digestAlgorithm.algorithm;
[all...]
H A DSecCertificateRequest.c725 certReq.reqInfo.subjectPublicKeyInfo.algorithm.algorithm.Length = oidRsa.length;
726 certReq.reqInfo.subjectPublicKeyInfo.algorithm.algorithm.Data = oidRsa.data;
727 certReq.reqInfo.subjectPublicKeyInfo.algorithm.parameters = asn1_null;
751 certReq.signatureAlgorithm.algorithm.Length = oidSha1Rsa.length;
752 certReq.signatureAlgorithm.algorithm.Data = oidSha1Rsa.data;
792 certReq.reqInfo.subjectPublicKeyInfo.algorithm.algorithm.Length = oidRsa.length;
793 certReq.reqInfo.subjectPublicKeyInfo.algorithm
[all...]
/macosx-10.10/Security-57031.1.35/Security/libsecurity_apple_csp/lib/
H A DderiveKey.cpp51 /* validate algorithm-specific arguments */
307 switch(context.algorithm()) {
331 /* outgoing key type, required (though any algorithm is OK) */
362 /* break off to algorithm-specific code, whose job it is
364 switch(context.algorithm()) {
388 context.algorithm(),
394 context.algorithm(),
402 context.algorithm(),
/macosx-10.10/Security-57031.1.35/Security/libsecurity_keychain/regressions/
H A Dkc-41-sececkey.c66 oid.length = algId->algorithm.Length;
67 oid.data = algId->algorithm.Data;
114 algId.algorithm = *oids[ix];
116 algId.algorithm.Length = 0;
117 algId.algorithm.Data = NULL;
/macosx-10.10/curl-83.1.2/curl/lib/
H A Dhttp_digest.c214 else if(Curl_raw_equal(value, "algorithm")) {
215 d->algorithm = strdup(content);
216 if(!d->algorithm)
381 if the algorithm is "MD5" or unspecified (which then defaults to MD5):
385 if the algorithm is "MD5-sess" then:
495 characters. algorithm and qop with standard values only contain web-safe
557 if(d->algorithm) {
558 /* append algorithm */
559 tmp = aprintf("%s, algorithm=\"%s\"", *allocuserpwd, d->algorithm);
[all...]
/macosx-10.10/bind9-45.101/bind9/lib/dns/rdata/generic/
H A Dtkey_249.c361 RETERR(name_tobuffer(&tkey->algorithm, target));
425 dns_name_init(&tkey->algorithm, NULL);
426 RETERR(name_duporclone(&alg, mctx, &tkey->algorithm));
427 isc_region_consume(&sr, name_length(&tkey->algorithm));
485 dns_name_free(&tkey->algorithm, mctx);
500 dns_name_free(&tkey->algorithm, tkey->mctx);
/macosx-10.10/CommonCrypto-60061/lib/
H A DCommonDigest.c57 CCDigestGetDigestInfo(CCDigestAlgorithm algorithm) { argument
82 return globals->digest_info[algorithm];
145 CCDigestGetBlockSize(CCDigestAlgorithm algorithm) argument
147 CC_DEBUG_LOG(ASL_LEVEL_ERR, "Entering Algorithm: %d\n", algorithm);
148 const struct ccdigest_info *di = CCDigestGetDigestInfo(algorithm);
154 CCDigestGetOutputSize(CCDigestAlgorithm algorithm) argument
156 CC_DEBUG_LOG(ASL_LEVEL_ERR, "Entering Algorithm: %d\n", algorithm);
157 const struct ccdigest_info *di = CCDigestGetDigestInfo(algorithm);
/macosx-10.10/OpenSSL098-52/src/crypto/evp/
H A Devp_pkey.c123 nid = OBJ_obj2nid(a->algorithm);
338 if (!a->algorithm) BUF_strlcpy (obj_tmp, "NULL", sizeof obj_tmp);
339 else i2t_ASN1_OBJECT(obj_tmp, 80, a->algorithm);
380 p8->pkeyalg->algorithm = OBJ_nid2obj(NID_rsaEncryption);
449 p8->pkeyalg->algorithm = OBJ_nid2obj(NID_dsa);
619 if (p8->pkeyalg->algorithm)
620 ASN1_OBJECT_free(p8->pkeyalg->algorithm);
622 p8->pkeyalg->algorithm = OBJ_nid2obj(NID_X9_62_id_ecPublicKey);
/macosx-10.10/OpenSSL098-52/src/crypto/pkcs12/
H A Dp12_mutl.c86 EVP_get_digestbyobj (p12->mac->dinfo->algor->algorithm))) {
173 p12->mac->dinfo->algor->algorithm = OBJ_nid2obj(EVP_MD_type(md_type));
H A Dp12_npas.c123 if (!alg_get(p7->d.encrypted->enc_data->algorithm,
220 *pnid = OBJ_obj2nid(alg->algorithm);
/macosx-10.10/OpenSSL098-52/src/demos/
H A Dspkigen.c134 /* set the algorithm id */
136 ASN1_OBJECT_free(a->algorithm);
137 a->algorithm=o;
/macosx-10.10/Security-57031.1.35/Security/include/security_keychain/
H A DSecKey.h75 representing the algorithm associated with this key.
252 @param algorithm An algorithm for the key pair. This parameter is ignored if a valid (non-zero) contextHandle is supplied.
254 @param contextHandle (optional) A CSSM_CC_HANDLE, or 0. If this argument is supplied, the algorithm and keySizeInBits parameters are ignored. If extra parameters are needed to generate a key (some algorithms require this), you should create a context using CSSM_CSP_CreateKeyGenContext, using the CSPHandle obtained by calling SecKeychainGetCSPHandle. Then use CSSM_UpdateContextAttributes to add parameters, and dispose of the context using CSSM_DeleteContext after calling this function.
267 CSSM_ALGORITHMS algorithm,
283 @param algorithm An algorithm for the symmetric key. This parameter is ignored if a valid (non-zero) contextHandle is supplied.
285 @param contextHandle (optional) A CSSM_CC_HANDLE, or 0. If this argument is supplied, the algorithm and keySizeInBits parameters are ignored. If extra parameters are needed to generate a key (some algorithms require this), you should create a context using CSSM_CSP_CreateKeyGenContext, using the CSPHandle obtained by calling SecKeychainGetCSPHandle. Then use CSSM_UpdateContextAttributes to add parameters, and dispose of the context using CSSM_DeleteContext after calling this function.
295 CSSM_ALGORITHMS algorithm,
356 and algorithm typ
[all...]
/macosx-10.10/Security-57031.1.35/Security/libsecurity_apple_x509_cl/lib/
H A DSession_CSR.cpp128 certReq.signatureAlgorithm.algorithm = csrReq->signatureOid;
178 * 2. Obtain signature algorithm and parameters.
181 CSSM_ALGORITHMS vfyAlg = CL_oidToAlg(sigAlgId.algorithm);
185 * decode to get the digest algorithm.
/macosx-10.10/Security-57031.1.35/Security/libsecurity_cssm/lib/
H A Dcssmcontext.cpp188 CSSM_ALGORITHMS algorithm)
191 HandleContext &context = *new(attachment) HandleContext(attachment, type, algorithm);
187 operator ()(CSSM_CONTEXT_TYPE type, CSSM_ALGORITHMS algorithm) argument
H A Dx509defs.h71 CSSM_OID algorithm; member in struct:cssm_x509_algorithm_identifier
95 CSSM_X509_ALGORITHM_IDENTIFIER algorithm; member in struct:cssm_x509_subject_public_key_info
/macosx-10.10/Security-57031.1.35/Security/libsecurity_keychain/Security/
H A DSecKey.h75 representing the algorithm associated with this key.
252 @param algorithm An algorithm for the key pair. This parameter is ignored if a valid (non-zero) contextHandle is supplied.
254 @param contextHandle (optional) A CSSM_CC_HANDLE, or 0. If this argument is supplied, the algorithm and keySizeInBits parameters are ignored. If extra parameters are needed to generate a key (some algorithms require this), you should create a context using CSSM_CSP_CreateKeyGenContext, using the CSPHandle obtained by calling SecKeychainGetCSPHandle. Then use CSSM_UpdateContextAttributes to add parameters, and dispose of the context using CSSM_DeleteContext after calling this function.
267 CSSM_ALGORITHMS algorithm,
283 @param algorithm An algorithm for the symmetric key. This parameter is ignored if a valid (non-zero) contextHandle is supplied.
285 @param contextHandle (optional) A CSSM_CC_HANDLE, or 0. If this argument is supplied, the algorithm and keySizeInBits parameters are ignored. If extra parameters are needed to generate a key (some algorithms require this), you should create a context using CSSM_CSP_CreateKeyGenContext, using the CSPHandle obtained by calling SecKeychainGetCSPHandle. Then use CSSM_UpdateContextAttributes to add parameters, and dispose of the context using CSSM_DeleteContext after calling this function.
295 CSSM_ALGORITHMS algorithm,
356 and algorithm typ
[all...]

Completed in 165 milliseconds

1234567891011>>