Searched refs:alg (Results 1 - 25 of 27) sorted by relevance

12

/barrelfish-master/lib/openssl-1.0.0d/crypto/asn1/
H A Dx_algor.c80 int X509_ALGOR_set0(X509_ALGOR *alg, ASN1_OBJECT *aobj, int ptype, void *pval)
82 if (!alg)
86 if (alg->parameter == NULL)
87 alg->parameter = ASN1_TYPE_new();
88 if (alg->parameter == NULL)
91 if (alg)
93 if (alg->algorithm)
94 ASN1_OBJECT_free(alg->algorithm);
95 alg->algorithm = aobj;
101 if (alg
[all...]
H A Dp5_pbe.c77 int PKCS5_pbe_set0_algor(X509_ALGOR *algor, int alg, int iter,
119 if (X509_ALGOR_set0(algor, OBJ_nid2obj(alg), V_ASN1_SEQUENCE, pbe_str))
132 X509_ALGOR *PKCS5_pbe_set(int alg, int iter,
143 if (PKCS5_pbe_set0_algor(ret, alg, iter, salt, saltlen))
/barrelfish-master/lib/openssl-1.0.0d/test/
H A Dtest_padlock28 for alg in $ACE_ALGS; do
29 echo $alg
31 $PROG enc -e -k "$HASH" -$alg -bufsize 999 -engine padlock | \
32 $PROG enc -d -k "$HASH" -$alg | \
35 echo "-$alg encrypt test failed"
39 $PROG enc -e -k "$HASH" -$alg | \
40 $PROG enc -d -k "$HASH" -$alg -bufsize 999 -engine padlock | \
43 echo "-$alg decrypt test failed"
47 $PROG enc -e -k "$HASH" -$alg -engine padlock | \
48 $PROG enc -d -k "$HASH" -$alg
[all...]
/barrelfish-master/lib/openssl-1.0.0d/crypto/engine/
H A Deng_fat.c103 static int int_def_cb(const char *alg, int len, void *arg) argument
106 if (!strncmp(alg, "ALL", len))
108 else if (!strncmp(alg, "RSA", len))
110 else if (!strncmp(alg, "DSA", len))
112 else if (!strncmp(alg, "ECDH", len))
114 else if (!strncmp(alg, "ECDSA", len))
116 else if (!strncmp(alg, "DH", len))
118 else if (!strncmp(alg, "RAND", len))
120 else if (!strncmp(alg, "CIPHERS", len))
122 else if (!strncmp(alg, "DIGEST
[all...]
/barrelfish-master/lib/openssl-1.0.0d/crypto/pkcs7/
H A Dpk7_attr.c99 X509_ALGOR *alg; local
101 if(!(alg = X509_ALGOR_new())) {
105 ASN1_OBJECT_free(alg->algorithm);
106 alg->algorithm = OBJ_nid2obj (nid);
109 if(!(alg->parameter = ASN1_TYPE_new())) {
121 alg->parameter->value.integer = nbit;
122 alg->parameter->type = V_ASN1_INTEGER;
124 sk_X509_ALGOR_push (sk, alg);
H A Dpk7_lib.c239 X509_ALGOR *alg; local
265 alg=sk_X509_ALGOR_value(md_sk,i);
266 if (OBJ_obj2nid(alg->algorithm) == nid)
274 if(!(alg=X509_ALGOR_new())
275 || !(alg->parameter = ASN1_TYPE_new()))
277 X509_ALGOR_free(alg);
281 alg->algorithm=OBJ_nid2obj(nid);
282 alg->parameter->type = V_ASN1_NULL;
283 if (!sk_X509_ALGOR_push(md_sk,alg))
285 X509_ALGOR_free(alg);
[all...]
/barrelfish-master/lib/openssl-1.0.0d/crypto/ocsp/
H A Docsp_lib.c106 X509_ALGOR *alg; local
112 alg = cid->hashAlgorithm;
113 if (alg->algorithm != NULL) ASN1_OBJECT_free(alg->algorithm);
119 if (!(alg->algorithm=OBJ_nid2obj(nid))) goto err;
120 if ((alg->parameter=ASN1_TYPE_new()) == NULL) goto err;
121 alg->parameter->type=V_ASN1_NULL;
/barrelfish-master/lib/openssl-1.0.0d/crypto/pkcs12/
H A Dp12_npas.c72 static int alg_get(X509_ALGOR *alg, int *pnid, int *piter, int *psaltlen);
211 static int alg_get(X509_ALGOR *alg, int *pnid, int *piter, int *psaltlen) argument
216 p = alg->parameter->value.sequence->data;
217 pbe = d2i_PBEPARAM(NULL, &p, alg->parameter->value.sequence->length);
220 *pnid = OBJ_obj2nid(alg->algorithm);
/barrelfish-master/lib/openssl-1.0.0d/crypto/rsa/
H A Drsa_ameth.c271 X509_ALGOR *alg = NULL; local
277 PKCS7_SIGNER_INFO_get0_algs(arg2, NULL, NULL, &alg);
282 PKCS7_RECIP_INFO_get0_alg(arg2, &alg);
287 CMS_SignerInfo_get0_algs(arg2, NULL, NULL, NULL, &alg);
292 CMS_RecipientInfo_ktri_get0_algs(arg2, NULL, NULL, &alg);
305 if (alg)
306 X509_ALGOR_set0(alg, OBJ_nid2obj(NID_rsaEncryption),
/barrelfish-master/lib/openssl-1.0.0d/crypto/ts/
H A Dts_lib.c126 int TS_X509_ALGOR_print_bio(BIO *bio, const X509_ALGOR *alg) argument
128 int i = OBJ_obj2nid(alg->algorithm);
H A Dts_req_utils.c97 int TS_MSG_IMPRINT_set_algo(TS_MSG_IMPRINT *a, X509_ALGOR *alg) argument
101 if (a->hash_algo == alg)
103 new_alg = X509_ALGOR_dup(alg);
H A Dts.h381 int TS_MSG_IMPRINT_set_algo(TS_MSG_IMPRINT *a, X509_ALGOR *alg);
726 int TS_X509_ALGOR_print_bio(BIO *bio, const X509_ALGOR *alg);
/barrelfish-master/lib/openssl-1.0.0d/crypto/cms/
H A Dcms_sd.c306 X509_ALGOR *alg; local
369 alg = sk_X509_ALGOR_value(sd->digestAlgorithms, i);
370 X509_ALGOR_get0(&aoid, NULL, NULL, alg);
377 alg = X509_ALGOR_new();
378 if (!alg)
380 cms_DigestAlgorithm_set(alg, md);
381 if (!sk_X509_ALGOR_push(sd->digestAlgorithms, alg))
383 X509_ALGOR_free(alg);
926 X509_ALGOR *alg; local
934 alg
[all...]
H A Dcms_lib.c346 void cms_DigestAlgorithm_set(X509_ALGOR *alg, const EVP_MD *md) argument
355 X509_ALGOR_set0(alg, OBJ_nid2obj(EVP_MD_type(md)), param_type, NULL);
H A Dcms_lcl.h441 void cms_DigestAlgorithm_set(X509_ALGOR *alg, const EVP_MD *md);
/barrelfish-master/lib/openssl-1.0.0d/crypto/bn/asm/
H A Ds390x-mont.pl137 alg $alo,160($sp) # +=tp[0]
160 alg $alo,160($j,$sp)# +=tp[j]
178 alg $NHI,160($j,$sp)# accumulate previous upmost overflow bit
H A Ds390x.S39 alg %r7,0(%r2,%r1) // +=rp[i]
46 alg %r9,8(%r2,%r1)
53 alg %r7,16(%r2,%r1)
60 alg %r9,24(%r2,%r1)
80 alg %r7,0(%r2,%r1) // +=rp[i]
/barrelfish-master/lib/openssl-1.0.0d/apps/
H A Dpkcs12.c89 int alg_print(BIO *x, X509_ALGOR *alg);
320 BIO_printf (bio_err, "-certpbe alg specify certificate PBE algorithm (default RC2-40)\n");
321 BIO_printf (bio_err, "-keypbe alg specify private key PBE algorithm (default 3DES)\n");
322 BIO_printf (bio_err, "-macalg alg digest algorithm used in MAC (default SHA1)\n");
854 int alg_print (BIO *x, X509_ALGOR *alg) argument
858 p = alg->parameter->value.sequence->data;
859 pbe = d2i_PBEPARAM(NULL, &p, alg->parameter->value.sequence->length);
863 OBJ_nid2ln(OBJ_obj2nid(alg->algorithm)),
H A Dspeed.c212 static void print_result(int alg,int run_no,int count,double time_used);
2562 static void print_result(int alg,int run_no,int count,double time_used) argument
2565 : "%d %s's in %.2fs\n",count,names[alg],time_used);
2566 results[alg][run_no]=((double)count)/time_used*lengths[run_no];
2655 int alg; local
2659 alg=atoi(sstrsep(&p,sep));
2662 results[alg][j]+=atof(sstrsep(&p,sep));
/barrelfish-master/lib/openssl-1.0.0d/engines/
H A De_capi.c789 ALG_ID alg; local
811 alg = CALG_SHA1;
815 alg = CALG_MD5;
819 alg = CALG_SSL3_SHAMD5;
834 if(!CryptCreateHash(capi_key->hprov, alg, 0, 0, &hash))
/barrelfish-master/include/openssl/
H A Dts.h381 int TS_MSG_IMPRINT_set_algo(TS_MSG_IMPRINT *a, X509_ALGOR *alg);
726 int TS_X509_ALGOR_print_bio(BIO *bio, const X509_ALGOR *alg);
H A Dx509.h660 int X509_signature_print(BIO *bp,X509_ALGOR *alg, ASN1_STRING *sig);
763 int X509_ALGOR_set0(X509_ALGOR *alg, ASN1_OBJECT *aobj, int ptype, void *pval);
1153 int PKCS5_pbe_set0_algor(X509_ALGOR *algor, int alg, int iter,
1156 X509_ALGOR *PKCS5_pbe_set(int alg, int iter,
/barrelfish-master/lib/openssl-1.0.0d/crypto/x509/
H A Dx509.h660 int X509_signature_print(BIO *bp,X509_ALGOR *alg, ASN1_STRING *sig);
763 int X509_ALGOR_set0(X509_ALGOR *alg, ASN1_OBJECT *aobj, int ptype, void *pval);
1153 int PKCS5_pbe_set0_algor(X509_ALGOR *algor, int alg, int iter,
1156 X509_ALGOR *PKCS5_pbe_set(int alg, int iter,
/barrelfish-master/lib/openssl-1.0.0d/engines/ccgost/
H A Dgost_ameth.c236 X509_ALGOR *alg; local
242 PKCS7_RECIP_INFO_get0_alg((PKCS7_RECIP_INFO*)arg2, &alg);
243 X509_ALGOR_set0(alg, OBJ_nid2obj(pkey->type),
/barrelfish-master/lib/libc/nameser/
H A Dns_print.c584 u_int c_type, key_tag, alg; local
592 alg = (u_int) *rdata++;
594 len = SPRINTF((tmp, "%d %d %d ", c_type, key_tag, alg));

Completed in 216 milliseconds

12