/barrelfish-master/lib/openssl-1.0.0d/crypto/asn1/ |
H A D | x_algor.c | 80 int X509_ALGOR_set0(X509_ALGOR *alg, ASN1_OBJECT *aobj, int ptype, void *pval) 82 if (!alg) 86 if (alg->parameter == NULL) 87 alg->parameter = ASN1_TYPE_new(); 88 if (alg->parameter == NULL) 91 if (alg) 93 if (alg->algorithm) 94 ASN1_OBJECT_free(alg->algorithm); 95 alg->algorithm = aobj; 101 if (alg [all...] |
H A D | p5_pbe.c | 77 int PKCS5_pbe_set0_algor(X509_ALGOR *algor, int alg, int iter, 119 if (X509_ALGOR_set0(algor, OBJ_nid2obj(alg), V_ASN1_SEQUENCE, pbe_str)) 132 X509_ALGOR *PKCS5_pbe_set(int alg, int iter, 143 if (PKCS5_pbe_set0_algor(ret, alg, iter, salt, saltlen))
|
/barrelfish-master/lib/openssl-1.0.0d/test/ |
H A D | test_padlock | 28 for alg in $ACE_ALGS; do 29 echo $alg 31 $PROG enc -e -k "$HASH" -$alg -bufsize 999 -engine padlock | \ 32 $PROG enc -d -k "$HASH" -$alg | \ 35 echo "-$alg encrypt test failed" 39 $PROG enc -e -k "$HASH" -$alg | \ 40 $PROG enc -d -k "$HASH" -$alg -bufsize 999 -engine padlock | \ 43 echo "-$alg decrypt test failed" 47 $PROG enc -e -k "$HASH" -$alg -engine padlock | \ 48 $PROG enc -d -k "$HASH" -$alg [all...] |
/barrelfish-master/lib/openssl-1.0.0d/crypto/engine/ |
H A D | eng_fat.c | 103 static int int_def_cb(const char *alg, int len, void *arg) argument 106 if (!strncmp(alg, "ALL", len)) 108 else if (!strncmp(alg, "RSA", len)) 110 else if (!strncmp(alg, "DSA", len)) 112 else if (!strncmp(alg, "ECDH", len)) 114 else if (!strncmp(alg, "ECDSA", len)) 116 else if (!strncmp(alg, "DH", len)) 118 else if (!strncmp(alg, "RAND", len)) 120 else if (!strncmp(alg, "CIPHERS", len)) 122 else if (!strncmp(alg, "DIGEST [all...] |
/barrelfish-master/lib/openssl-1.0.0d/crypto/pkcs7/ |
H A D | pk7_attr.c | 99 X509_ALGOR *alg; local 101 if(!(alg = X509_ALGOR_new())) { 105 ASN1_OBJECT_free(alg->algorithm); 106 alg->algorithm = OBJ_nid2obj (nid); 109 if(!(alg->parameter = ASN1_TYPE_new())) { 121 alg->parameter->value.integer = nbit; 122 alg->parameter->type = V_ASN1_INTEGER; 124 sk_X509_ALGOR_push (sk, alg);
|
H A D | pk7_lib.c | 239 X509_ALGOR *alg; local 265 alg=sk_X509_ALGOR_value(md_sk,i); 266 if (OBJ_obj2nid(alg->algorithm) == nid) 274 if(!(alg=X509_ALGOR_new()) 275 || !(alg->parameter = ASN1_TYPE_new())) 277 X509_ALGOR_free(alg); 281 alg->algorithm=OBJ_nid2obj(nid); 282 alg->parameter->type = V_ASN1_NULL; 283 if (!sk_X509_ALGOR_push(md_sk,alg)) 285 X509_ALGOR_free(alg); [all...] |
/barrelfish-master/lib/openssl-1.0.0d/crypto/ocsp/ |
H A D | ocsp_lib.c | 106 X509_ALGOR *alg; local 112 alg = cid->hashAlgorithm; 113 if (alg->algorithm != NULL) ASN1_OBJECT_free(alg->algorithm); 119 if (!(alg->algorithm=OBJ_nid2obj(nid))) goto err; 120 if ((alg->parameter=ASN1_TYPE_new()) == NULL) goto err; 121 alg->parameter->type=V_ASN1_NULL;
|
/barrelfish-master/lib/openssl-1.0.0d/crypto/pkcs12/ |
H A D | p12_npas.c | 72 static int alg_get(X509_ALGOR *alg, int *pnid, int *piter, int *psaltlen); 211 static int alg_get(X509_ALGOR *alg, int *pnid, int *piter, int *psaltlen) argument 216 p = alg->parameter->value.sequence->data; 217 pbe = d2i_PBEPARAM(NULL, &p, alg->parameter->value.sequence->length); 220 *pnid = OBJ_obj2nid(alg->algorithm);
|
/barrelfish-master/lib/openssl-1.0.0d/crypto/rsa/ |
H A D | rsa_ameth.c | 271 X509_ALGOR *alg = NULL; local 277 PKCS7_SIGNER_INFO_get0_algs(arg2, NULL, NULL, &alg); 282 PKCS7_RECIP_INFO_get0_alg(arg2, &alg); 287 CMS_SignerInfo_get0_algs(arg2, NULL, NULL, NULL, &alg); 292 CMS_RecipientInfo_ktri_get0_algs(arg2, NULL, NULL, &alg); 305 if (alg) 306 X509_ALGOR_set0(alg, OBJ_nid2obj(NID_rsaEncryption),
|
/barrelfish-master/lib/openssl-1.0.0d/crypto/ts/ |
H A D | ts_lib.c | 126 int TS_X509_ALGOR_print_bio(BIO *bio, const X509_ALGOR *alg) argument 128 int i = OBJ_obj2nid(alg->algorithm);
|
H A D | ts_req_utils.c | 97 int TS_MSG_IMPRINT_set_algo(TS_MSG_IMPRINT *a, X509_ALGOR *alg) argument 101 if (a->hash_algo == alg) 103 new_alg = X509_ALGOR_dup(alg);
|
H A D | ts.h | 381 int TS_MSG_IMPRINT_set_algo(TS_MSG_IMPRINT *a, X509_ALGOR *alg); 726 int TS_X509_ALGOR_print_bio(BIO *bio, const X509_ALGOR *alg);
|
/barrelfish-master/lib/openssl-1.0.0d/crypto/cms/ |
H A D | cms_sd.c | 306 X509_ALGOR *alg; local 369 alg = sk_X509_ALGOR_value(sd->digestAlgorithms, i); 370 X509_ALGOR_get0(&aoid, NULL, NULL, alg); 377 alg = X509_ALGOR_new(); 378 if (!alg) 380 cms_DigestAlgorithm_set(alg, md); 381 if (!sk_X509_ALGOR_push(sd->digestAlgorithms, alg)) 383 X509_ALGOR_free(alg); 926 X509_ALGOR *alg; local 934 alg [all...] |
H A D | cms_lib.c | 346 void cms_DigestAlgorithm_set(X509_ALGOR *alg, const EVP_MD *md) argument 355 X509_ALGOR_set0(alg, OBJ_nid2obj(EVP_MD_type(md)), param_type, NULL);
|
H A D | cms_lcl.h | 441 void cms_DigestAlgorithm_set(X509_ALGOR *alg, const EVP_MD *md);
|
/barrelfish-master/lib/openssl-1.0.0d/crypto/bn/asm/ |
H A D | s390x-mont.pl | 137 alg $alo,160($sp) # +=tp[0] 160 alg $alo,160($j,$sp)# +=tp[j] 178 alg $NHI,160($j,$sp)# accumulate previous upmost overflow bit
|
H A D | s390x.S | 39 alg %r7,0(%r2,%r1) // +=rp[i] 46 alg %r9,8(%r2,%r1) 53 alg %r7,16(%r2,%r1) 60 alg %r9,24(%r2,%r1) 80 alg %r7,0(%r2,%r1) // +=rp[i]
|
/barrelfish-master/lib/openssl-1.0.0d/apps/ |
H A D | pkcs12.c | 89 int alg_print(BIO *x, X509_ALGOR *alg); 320 BIO_printf (bio_err, "-certpbe alg specify certificate PBE algorithm (default RC2-40)\n"); 321 BIO_printf (bio_err, "-keypbe alg specify private key PBE algorithm (default 3DES)\n"); 322 BIO_printf (bio_err, "-macalg alg digest algorithm used in MAC (default SHA1)\n"); 854 int alg_print (BIO *x, X509_ALGOR *alg) argument 858 p = alg->parameter->value.sequence->data; 859 pbe = d2i_PBEPARAM(NULL, &p, alg->parameter->value.sequence->length); 863 OBJ_nid2ln(OBJ_obj2nid(alg->algorithm)),
|
H A D | speed.c | 212 static void print_result(int alg,int run_no,int count,double time_used); 2562 static void print_result(int alg,int run_no,int count,double time_used) argument 2565 : "%d %s's in %.2fs\n",count,names[alg],time_used); 2566 results[alg][run_no]=((double)count)/time_used*lengths[run_no]; 2655 int alg; local 2659 alg=atoi(sstrsep(&p,sep)); 2662 results[alg][j]+=atof(sstrsep(&p,sep));
|
/barrelfish-master/lib/openssl-1.0.0d/engines/ |
H A D | e_capi.c | 789 ALG_ID alg; local 811 alg = CALG_SHA1; 815 alg = CALG_MD5; 819 alg = CALG_SSL3_SHAMD5; 834 if(!CryptCreateHash(capi_key->hprov, alg, 0, 0, &hash))
|
/barrelfish-master/include/openssl/ |
H A D | ts.h | 381 int TS_MSG_IMPRINT_set_algo(TS_MSG_IMPRINT *a, X509_ALGOR *alg); 726 int TS_X509_ALGOR_print_bio(BIO *bio, const X509_ALGOR *alg);
|
H A D | x509.h | 660 int X509_signature_print(BIO *bp,X509_ALGOR *alg, ASN1_STRING *sig); 763 int X509_ALGOR_set0(X509_ALGOR *alg, ASN1_OBJECT *aobj, int ptype, void *pval); 1153 int PKCS5_pbe_set0_algor(X509_ALGOR *algor, int alg, int iter, 1156 X509_ALGOR *PKCS5_pbe_set(int alg, int iter,
|
/barrelfish-master/lib/openssl-1.0.0d/crypto/x509/ |
H A D | x509.h | 660 int X509_signature_print(BIO *bp,X509_ALGOR *alg, ASN1_STRING *sig); 763 int X509_ALGOR_set0(X509_ALGOR *alg, ASN1_OBJECT *aobj, int ptype, void *pval); 1153 int PKCS5_pbe_set0_algor(X509_ALGOR *algor, int alg, int iter, 1156 X509_ALGOR *PKCS5_pbe_set(int alg, int iter,
|
/barrelfish-master/lib/openssl-1.0.0d/engines/ccgost/ |
H A D | gost_ameth.c | 236 X509_ALGOR *alg; local 242 PKCS7_RECIP_INFO_get0_alg((PKCS7_RECIP_INFO*)arg2, &alg); 243 X509_ALGOR_set0(alg, OBJ_nid2obj(pkey->type),
|
/barrelfish-master/lib/libc/nameser/ |
H A D | ns_print.c | 584 u_int c_type, key_tag, alg; local 592 alg = (u_int) *rdata++; 594 len = SPRINTF((tmp, "%d %d %d ", c_type, key_tag, alg));
|