Searched refs:parameter (Results 1 - 25 of 72) sorted by relevance

123

/barrelfish-master/lib/openssl-1.0.0d/crypto/asn1/
H A Dx_algor.c66 ASN1_OPT(X509_ALGOR, parameter, ASN1_ANY)
86 if (alg->parameter == NULL)
87 alg->parameter = ASN1_TYPE_new();
88 if (alg->parameter == NULL)
101 if (alg->parameter)
103 ASN1_TYPE_free(alg->parameter);
104 alg->parameter = NULL;
108 ASN1_TYPE_set(alg->parameter, ptype, pval);
119 if (algor->parameter == NULL)
125 *pptype = algor->parameter
[all...]
H A Dp5_pbev2.c116 if(!(scheme->parameter = ASN1_TYPE_new())) goto merr;
131 if(EVP_CIPHER_param_to_asn1(&ctx, scheme->parameter) < 0) {
187 /* Encode PBKDF2PARAM into parameter of pbe2 */
189 if(!(pbe2->keyfunc->parameter = ASN1_TYPE_new())) goto merr;
192 &pbe2->keyfunc->parameter->value.sequence)) goto merr;
193 pbe2->keyfunc->parameter->type = V_ASN1_SEQUENCE;
201 if(!(ret->parameter = ASN1_TYPE_new())) goto merr;
205 /* Encode PBE2PARAM into parameter */
208 &ret->parameter->value.sequence)) goto merr;
209 ret->parameter
[all...]
H A Da_sign.c151 ASN1_TYPE_free(a->parameter);
152 a->parameter = NULL;
154 else if ((a->parameter == NULL) ||
155 (a->parameter->type != V_ASN1_NULL))
157 ASN1_TYPE_free(a->parameter);
158 if ((a->parameter=ASN1_TYPE_new()) == NULL) goto err;
159 a->parameter->type=V_ASN1_NULL;
H A Dx_pkey.c90 if (ret->enc_algor->parameter->type == V_ASN1_OCTET_STRING)
92 i=ret->enc_algor->parameter->value.octet_string->length;
100 ret->enc_algor->parameter->value.octet_string->data,i);
H A Dn_pkey.c140 if ((pkey->algor->parameter=ASN1_TYPE_new()) == NULL) goto err;
141 pkey->algor->parameter->type=V_ASN1_NULL;
158 if ((enckey->enckey->algor->parameter=ASN1_TYPE_new()) == NULL) goto err;
159 enckey->enckey->algor->parameter->type=V_ASN1_NULL;
/barrelfish-master/lib/openssl-1.0.0d/demos/
H A Dspkigen.c139 /* Set the parameter list */
140 if ((a->parameter == NULL) || (a->parameter->type != V_ASN1_NULL))
142 ASN1_TYPE_free(a->parameter);
143 a->parameter=ASN1_TYPE_new();
144 a->parameter->type=V_ASN1_NULL;
/barrelfish-master/lib/openssl-1.0.0d/crypto/rsa/
H A Drsa_sign.c74 ASN1_TYPE parameter; local
106 parameter.type=V_ASN1_NULL;
107 parameter.value.ptr=NULL;
108 sig.algor->parameter= &parameter;
206 if(sig->algor->parameter
207 && ASN1_TYPE_get(sig->algor->parameter) != V_ASN1_NULL)
/barrelfish-master/lib/openssl-1.0.0d/crypto/pkcs7/
H A Dpk7_attr.c109 if(!(alg->parameter = ASN1_TYPE_new())) {
121 alg->parameter->value.integer = nbit;
122 alg->parameter->type = V_ASN1_INTEGER;
H A Dpk7_lib.c275 || !(alg->parameter = ASN1_TYPE_new()))
282 alg->parameter->type = V_ASN1_NULL;
446 if(!(p7->d.digest->md->parameter = ASN1_TYPE_new()))
451 p7->d.digest->md->parameter->type = V_ASN1_NULL;
H A Dpk7_doit.c345 if (xalg->parameter == NULL) {
346 xalg->parameter = ASN1_TYPE_new();
347 if (xalg->parameter == NULL)
350 if(EVP_CIPHER_param_to_asn1(ctx, xalg->parameter) < 0)
566 if (EVP_CIPHER_asn1_to_param(evp_ctx,enc_alg->parameter) < 0)
/barrelfish-master/lib/openssl-1.0.0d/crypto/cms/
H A Dcms_enc.c134 else if (EVP_CIPHER_asn1_to_param(ctx, calg->parameter) <= 0)
178 calg->parameter = ASN1_TYPE_new();
179 if (!calg->parameter)
185 if (EVP_CIPHER_param_to_asn1(ctx, calg->parameter) <= 0)
/barrelfish-master/lib/openssl-1.0.0d/crypto/evp/
H A Dp5_crpt2.c215 if(EVP_CIPHER_asn1_to_param(ctx, pbe2->encryption->parameter) < 0) {
225 if(!pbe2->keyfunc->parameter ||
226 (pbe2->keyfunc->parameter->type != V_ASN1_SEQUENCE))
232 pbuf = pbe2->keyfunc->parameter->value.sequence->data;
233 plen = pbe2->keyfunc->parameter->value.sequence->length;
/barrelfish-master/lib/openssl-1.0.0d/engines/
H A De_4758cca.c636 ASN1_TYPE parameter; local
662 parameter.type = V_ASN1_NULL;
663 parameter.value.ptr = NULL;
664 algorithm.parameter = &parameter;
761 ASN1_TYPE parameter; local
787 parameter.type = V_ASN1_NULL;
788 parameter.value.ptr = NULL;
789 algorithm.parameter = &parameter;
[all...]
/barrelfish-master/lib/openssl-1.0.0d/crypto/ocsp/
H A Docsp_lib.c120 if ((alg->parameter=ASN1_TYPE_new()) == NULL) goto err;
121 alg->parameter->type=V_ASN1_NULL;
/barrelfish-master/lib/openssl-1.0.0d/crypto/pkcs12/
H A Dp12_mutl.c178 if (!(p12->mac->dinfo->algor->parameter = ASN1_TYPE_new())) {
182 p12->mac->dinfo->algor->parameter->type = V_ASN1_NULL;
H A Dp12_npas.c216 p = alg->parameter->value.sequence->data;
217 pbe = d2i_PBEPARAM(NULL, &p, alg->parameter->value.sequence->length);
H A Dp12_decr.c82 algor->parameter, &ctx, en_de)) {
/barrelfish-master/usr/eclipseclp/Opium/
H A Dopium-mode.el162 (defun parameter () function
H A Dopium_light.pl144 * instantiated to the first parameter
182 compile('parameter.op', opium_kernel),
194 directory (scenario_handler.op, make.op, parameter.op, scenario.op,
/barrelfish-master/doc/015-disk-driver-arch/
H A Dflounder-ahci.tex99 \item The presence of an output parameter \lstinline+status+ of type
102 \lstinline+errval_t+-typed parameter with a different name?
106 parameter. In either case, the size might also be specified as a
107 meta-parameter. Which of these information sources should be accepted?
119 the \lstinline+port+ parameter of \lstinline+ahci_init+. Also, the client must
164 When parameter analysis indicates a \acs{dma} transfer is expected, the
/barrelfish-master/usr/eclipseclp/Opium/demo/
H A Dsimplify.pl19 There is a clause missing which matches 2nd parameter = []. \n \
/barrelfish-master/usr/eclipseclp/documents/userman/
H A Dumscmdlineopts.tex129 Each parameter is specified on a separate line in the appropriate
132 parameter value
139 where each parameter is specified as a string value under the appropriate
140 parameter key.
/barrelfish-master/lib/openssl-1.0.0d/crypto/ts/
H A Dts_rsp_verify.c646 /* The parameter must be NULL in both. */
647 if ((algor_a->parameter
648 && ASN1_TYPE_get(algor_a->parameter) != V_ASN1_NULL)
649 || (algor_b->parameter
650 && ASN1_TYPE_get(algor_b->parameter) != V_ASN1_NULL))
/barrelfish-master/lib/acpica/generate/efi/
H A DMakefile.config168 -Wmissing-parameter-type\
/barrelfish-master/lib/acpica/generate/unix/
H A DMakefile.config223 -Wmissing-parameter-type\

Completed in 189 milliseconds

123