Home
last modified time | relevance | path

Searched refs:algorithm (Results 1 – 25 of 168) sorted by relevance

1234567

/onnv-gate/usr/src/cmd/perl/5.8.4/distrib/lib/
H A DDigest.pm20 my $algorithm = shift;
21 my $impl = $MMAP{$algorithm} || do {
22 $algorithm =~ s/\W+//;
23 "Digest::$algorithm";
47 my $algorithm = substr($AUTOLOAD, rindex($AUTOLOAD, '::')+2);
48 $class->new($algorithm, @_);
/onnv-gate/usr/src/common/openssl/crypto/asn1/
H A Da_sign.c160 ASN1_OBJECT_free(a->algorithm); in ASN1_sign()
161 a->algorithm=OBJ_nid2obj(type->pkey_type); in ASN1_sign()
162 if (a->algorithm == NULL) in ASN1_sign()
167 if (a->algorithm->length == 0) in ASN1_sign()
247 ASN1_OBJECT_free(a->algorithm); in ASN1_item_sign()
248 a->algorithm=OBJ_nid2obj(type->pkey_type); in ASN1_item_sign()
249 if (a->algorithm == NULL) in ASN1_item_sign()
254 if (a->algorithm->length == 0) in ASN1_item_sign()
H A Dp5_pbev2.c112 scheme->algorithm = obj;
161 pbe2->keyfunc->algorithm = OBJ_nid2obj(NID_id_pbkdf2);
179 ret->algorithm = OBJ_nid2obj(NID_pbes2);
H A Dt_spki.c80 i=OBJ_obj2nid(spki->spkac->pubkey->algor->algorithm); in NETSCAPE_SPKI_print()
118 i=OBJ_obj2nid(spki->sig_algor->algorithm); in NETSCAPE_SPKI_print()
H A Dp5_pbe.c122 ASN1_OBJECT_free(algor->algorithm);
123 algor->algorithm = al;
H A Da_verify.c85 i=OBJ_obj2nid(a->algorithm); in ASN1_verify()
137 i=OBJ_obj2nid(a->algorithm); in ASN1_item_verify()
/onnv-gate/usr/src/common/openssl/doc/apps/
H A Dpasswd.pod27 The Unix standard algorithm B<crypt> and the MD5-based BSD password
28 algorithm B<1> and its Apache variant B<apr1> are available.
36 Use the B<crypt> algorithm (default).
40 Use the MD5 based BSD password algorithm B<1>.
44 Use the B<apr1> algorithm (Apache variant of the BSD algorithm).
H A Dpkcs8.pod81 structures using an appropriate password based encryption algorithm. With
110 private keys are encrypted with the password based encryption algorithm
112 was the strongest encryption algorithm supported in PKCS#5 v1.5. Using
114 encryption algorithm such as 168 bit triple DES or 128 bit RC2 however
118 The B<alg> argument is the encryption algorithm to use, valid values include
123 This option specifies a PKCS#5 v1.5 or PKCS#12 algorithm to use. A complete
180 but they use the same key derivation algorithm and are supported by some
186 These algorithms use the PKCS#12 password based encryption algorithm and
198 Convert a private key to PKCS#8 using a PKCS#5 1.5 compatible algorithm
203 Convert a private key to PKCS#8 using a PKCS#12 compatible algorithm
[all …]
/onnv-gate/usr/src/lib/krb5/plugins/preauth/pkinit/
H A Dpkinit_lib.c165 if ((*in)->clientPublicValue->algorithm.algorithm.data != NULL) in free_krb5_auth_pack()
166 free((*in)->clientPublicValue->algorithm.algorithm.data); in free_krb5_auth_pack()
167 if ((*in)->clientPublicValue->algorithm.parameters.data != NULL) in free_krb5_auth_pack()
168 free((*in)->clientPublicValue->algorithm.parameters.data); in free_krb5_auth_pack()
280 if (in->algorithm.data != NULL) in free_krb5_algorithm_identifier()
281 free(in->algorithm.data); in free_krb5_algorithm_identifier()
303 if ((*in)->algorithm.parameters.data != NULL) in free_krb5_subject_pk_info()
304 free((*in)->algorithm.parameters.data); in free_krb5_subject_pk_info()
424 (*in)->algorithm.parameters.data = NULL; in init_krb5_subject_pk_info()
425 (*in)->algorithm.parameters.length = 0; in init_krb5_subject_pk_info()
/onnv-gate/usr/src/common/openssl/crypto/ocsp/
H A Docsp_lib.c112 if (alg->algorithm != NULL) ASN1_OBJECT_free(alg->algorithm); in OCSP_cert_id_new()
118 if (!(alg->algorithm=OBJ_nid2obj(nid))) goto err; in OCSP_cert_id_new()
146 ret = OBJ_cmp(a->hashAlgorithm->algorithm, b->hashAlgorithm->algorithm); in OCSP_id_issuer_cmp()
/onnv-gate/usr/src/common/openssl/crypto/pkcs7/
H A Dpk7_lib.c258 nid=OBJ_obj2nid(psi->digest_alg->algorithm); in PKCS7_add_signer()
265 if (OBJ_obj2nid(alg->algorithm) == nid) in PKCS7_add_signer()
278 alg->algorithm=OBJ_nid2obj(nid); in PKCS7_add_signer()
369 if (is_dsa) p7i->digest_alg->algorithm=OBJ_nid2obj(NID_sha1); in PKCS7_SIGNER_INFO_set()
371 p7i->digest_alg->algorithm=OBJ_nid2obj(EVP_MD_type(dgst)); in PKCS7_SIGNER_INFO_set()
384 p7i->digest_enc_alg->algorithm=OBJ_nid2obj(NID_rsaEncryption); in PKCS7_SIGNER_INFO_set()
394 p7i->digest_enc_alg->algorithm=OBJ_nid2obj(NID_dsa); in PKCS7_SIGNER_INFO_set()
398 p7i->digest_enc_alg->algorithm=OBJ_nid2obj(NID_dsaWithSHA1); in PKCS7_SIGNER_INFO_set()
404 p7i->digest_enc_alg->algorithm=OBJ_nid2obj(NID_ecdsa_with_SHA1); in PKCS7_SIGNER_INFO_set()
440 p7->d.digest->md->algorithm = OBJ_nid2obj(EVP_MD_nid(md)); in PKCS7_set_digest()
H A Dpk7_doit.c115 md=EVP_get_digestbyobj(alg->algorithm); in PKCS7_bio_add_digest()
166 xalg=p7->d.signed_and_enveloped->enc_data->algorithm; in PKCS7_dataInit()
177 xalg=p7->d.enveloped->enc_data->algorithm; in PKCS7_dataInit()
219 xalg->algorithm = OBJ_nid2obj(EVP_CIPHER_type(evp_cipher)); in PKCS7_dataInit()
352 enc_alg=p7->d.signed_and_enveloped->enc_data->algorithm; in PKCS7_dataDecode()
353 evp_cipher=EVP_get_cipherbyobj(enc_alg->algorithm); in PKCS7_dataDecode()
359 xalg=p7->d.signed_and_enveloped->enc_data->algorithm; in PKCS7_dataDecode()
363 enc_alg=p7->d.enveloped->enc_data->algorithm; in PKCS7_dataDecode()
365 evp_cipher=EVP_get_cipherbyobj(enc_alg->algorithm); in PKCS7_dataDecode()
371 xalg=p7->d.enveloped->enc_data->algorithm; in PKCS7_dataDecode()
[all …]
H A Dpk7_attr.c120 ASN1_OBJECT_free(alg->algorithm); in PKCS7_simple_smimecap()
121 alg->algorithm = OBJ_nid2obj (nid); in PKCS7_simple_smimecap()
/onnv-gate/usr/src/cmd/iscsiadm/
H A Dsun_ima.c86 SUN_IMA_DIGEST_ALGORITHM_VALUE *algorithm);
92 SUN_IMA_DIGEST_ALGORITHM_VALUE *algorithm,
1160 SUN_IMA_DIGEST_ALGORITHM_VALUE *algorithm in SUN_IMA_GetHeaderDigest() argument
1163 return (getDigest(oid, ISCSI_LOGIN_PARAM_HEADER_DIGEST, algorithm)); in SUN_IMA_GetHeaderDigest()
1168 SUN_IMA_DIGEST_ALGORITHM_VALUE *algorithm in SUN_IMA_GetDataDigest() argument
1171 return (getDigest(oid, ISCSI_LOGIN_PARAM_DATA_DIGEST, algorithm)); in SUN_IMA_GetDataDigest()
2137 SUN_IMA_DIGEST_ALGORITHM_VALUE *algorithm in getDigest() argument
2150 algorithm->defaultAlgorithms[0] = ISCSI_DIGEST_NONE; in getDigest()
2151 algorithm->defaultAlgorithmCount = 1; in getDigest()
2154 algorithm->defaultAlgorithms[0] = ISCSI_DIGEST_CRC32C; in getDigest()
[all …]
H A Dsun_ima.h92 SUN_IMA_DIGEST_ALGORITHM_VALUE *algorithm);
95 SUN_IMA_DIGEST_ALGORITHM_VALUE *algorithm);
119 SUN_IMA_DIGEST_ALGORITHM_VALUE *algorithm,
/onnv-gate/usr/src/common/openssl/doc/crypto/
H A DRSA_sign.pod24 B<type> denotes the message digest algorithm that was used to generate
28 and no algorithm identifier) is created.
32 the message digest algorithm that was used to generate the signature.
44 Certain signatures with an improper algorithm identifier are accepted
H A Ddes_modes.pod19 Normally, this is found as the function I<algorithm>_ecb_encrypt().
44 Normally, this is found as the function I<algorithm>_cbc_encrypt().
78 Normally, this is found as the function I<algorithm>_cfb_encrypt().
110 the encipherment algorithm per unit of plaintext and thus cause
125 Normally, this is found as the function I<algorithm>_ofb_encrypt().
155 the encipherment algorithm per unit of plaintext and thus cause
186 Normally, this is found as the function I<algorithm>_ecb3_encrypt().
221 Normally, this is found as the function I<algorithm>_ede3_cbc_encrypt().
246 Part 5.2: Modes of operation for an n-bit block cipher algorithm
H A DEVP_BytesToKey.pod29 encryption algorithm from a password in the B<data> parameter.
31 Increasing the B<count> parameter slows down the algorithm which makes it
36 B<MD5> is used then the derivation algorithm is compatible with PKCS#5 v1.5
50 algorithm in use, HASH^1(data) is simply HASH(data), HASH^2(data)
H A DPKCS7_encrypt.pod21 be signed using the RSA algorithm.
23 EVP_des_ede3_cbc() (triple DES) is the algorithm of choice for S/MIME use because
29 The algorithm passed in the B<cipher> parameter must support ASN1 encoding of its
/onnv-gate/usr/src/common/openssl/crypto/rsa/
H A Drsa_sign.c94 sig.algor->algorithm=OBJ_nid2obj(type); in RSA_sign()
95 if (sig.algor->algorithm == NULL) in RSA_sign()
100 if (sig.algor->algorithm->length == 0) in RSA_sign()
205 sigtype=OBJ_obj2nid(sig->algor->algorithm); in RSA_verify()
/onnv-gate/usr/src/common/openssl/crypto/pkcs12/
H A Dp12_add.c180 X509_ALGOR_free(p7->d.encrypted->enc_data->algorithm); in PKCS12_pack_p7encdata()
181 p7->d.encrypted->enc_data->algorithm = pbe; in PKCS12_pack_p7encdata()
196 return PKCS12_item_decrypt_d2i(p7->d.encrypted->enc_data->algorithm, in STACK_OF()
/onnv-gate/usr/src/common/openssl/crypto/evp/
H A Devp_pkey.c123 nid = OBJ_obj2nid(a->algorithm); in EVP_PKCS82PKEY()
338 if (!a->algorithm) BUF_strlcpy (obj_tmp, "NULL", sizeof obj_tmp); in EVP_PKCS82PKEY()
339 else i2t_ASN1_OBJECT(obj_tmp, 80, a->algorithm); in EVP_PKCS82PKEY()
380 p8->pkeyalg->algorithm = OBJ_nid2obj(NID_rsaEncryption); in EVP_PKEY2PKCS8_broken()
449 p8->pkeyalg->algorithm = OBJ_nid2obj(NID_dsa); in dsa_pkey2pkcs8()
619 if (p8->pkeyalg->algorithm) in eckey_pkey2pkcs8()
620 ASN1_OBJECT_free(p8->pkeyalg->algorithm); in eckey_pkey2pkcs8()
622 p8->pkeyalg->algorithm = OBJ_nid2obj(NID_X9_62_id_ecPublicKey); in eckey_pkey2pkcs8()
H A Dp5_crpt2.c174 if(OBJ_obj2nid(pbe2->keyfunc->algorithm) != NID_id_pbkdf2) { in PKCS5_v2_PBE_keyivgen()
184 OBJ_nid2sn(OBJ_obj2nid(pbe2->encryption->algorithm))); in PKCS5_v2_PBE_keyivgen()
224 if(kdf->prf && (OBJ_obj2nid(kdf->prf->algorithm) != NID_hmacWithSHA1)) { in PKCS5_v2_PBE_keyivgen()
/onnv-gate/usr/src/common/openssl/crypto/dsa/
H A Dfips186a.txt17 With this SEED, the algorithm found p and q when the counter was at 105.
19 x was generated by the algorithm described in appendix 3, section 3.1, using
31 k was generated by the algorithm described in appendix 3, section 3.2, using
/onnv-gate/usr/src/lib/libslp/clib/
H A Dslp_ami.h140 struct ami_algid *algorithm; member
182 struct ami_algid *algorithm; member
189 struct ami_oid *algorithm; member
261 struct ami_algid *algorithm; member
326 struct ami_algid *algorithm; member
496 struct ami_algid *algorithm; member

1234567