/dports/security/cryptlib/cryptlib-3.4.3/test/ |
H A D | keyfile.c | 1539 CRYPT_USE_DEFAULT ) ); in testWriteFileCertChain() 1546 CRYPT_USE_DEFAULT ) ); in testWriteFileLongCertChain() 2879 CRYPT_USE_DEFAULT ) ) in createTestKeys() 2889 CRYPT_USE_DEFAULT ) ) in createTestKeys() 2899 CRYPT_USE_DEFAULT ) ) in createTestKeys() 2927 CRYPT_USE_DEFAULT ) ) in createTestKeys() 2936 CRYPT_USE_DEFAULT ) ) in createTestKeys() 2944 CRYPT_USE_DEFAULT ) ) in createTestKeys() 2953 CRYPT_USE_DEFAULT ) ) in createTestKeys() 2974 CRYPT_USE_DEFAULT ) ) in createTestKeys() [all …]
|
H A D | highlvl.c | 143 CRYPT_USE_DEFAULT : CRYPT_UNUSED; in signData() 1694 debugDump( ( signingAttributes == CRYPT_USE_DEFAULT ) ? \ in signDataCMS() 1701 ( cmsAttributes == CRYPT_USE_DEFAULT ) ? NULL : &cmsAttributes ); in signDataCMS() 1711 if( cmsAttributes != CRYPT_USE_DEFAULT ) in signDataCMS() 1731 if( !signDataCMS( "CMS signature", CRYPT_USE_DEFAULT, FALSE ) ) in testSignDataCMS()
|
H A D | devices.c | 1360 #define CLIENT_TOKEN_SLOT CRYPT_USE_DEFAULT 1368 #define NET_TIMEOUT CRYPT_USE_DEFAULT 1399 if( cryptStatusOK( status ) && timeout != CRYPT_USE_DEFAULT ) in setConnectInfo() 1519 if( slotNo == CRYPT_USE_DEFAULT ) in connectDevice()
|
/dports/security/cryptlib/cryptlib-3.4.3/session/ |
H A D | ssh2_msg.c | 613 status = selectChannel( sessionInfoPtr, CRYPT_USE_DEFAULT, in closeChannel() 617 cryptStatusOK( selectChannel( sessionInfoPtr, CRYPT_USE_DEFAULT, in closeChannel()
|
H A D | ssl_wr.c | 106 const int streamSize = ( bufferSize == CRYPT_USE_DEFAULT ) ? \ in openPacketStreamSSL() 114 REQUIRES( bufferSize == CRYPT_USE_DEFAULT || \ in openPacketStreamSSL() 681 CRYPT_USE_DEFAULT, SSL_MSG_ALERT ); in sendAlert()
|
H A D | ssl_kmgmt.c | 753 ( CRYPT_ALGO_TYPE ) CRYPT_USE_DEFAULT, in premasterToMaster() 792 ( CRYPT_ALGO_TYPE ) CRYPT_USE_DEFAULT, in premasterToMaster() 830 ( CRYPT_ALGO_TYPE ) CRYPT_USE_DEFAULT, in masterToKeys() 855 ( CRYPT_ALGO_TYPE ) CRYPT_USE_DEFAULT, in masterToKeys()
|
H A D | ssh2_chn.c | 273 REQUIRES_N( ( channelNo == CRYPT_USE_DEFAULT ) || \ in findChannelAttr() 292 if( channelNo == CRYPT_USE_DEFAULT ) in findChannelAttr() 321 REQUIRES_N( ( channelNo == CRYPT_USE_DEFAULT ) || \ in findChannelByChannelNo() 752 REQUIRES( ( channelNo == CRYPT_USE_DEFAULT ) || \ in selectChannel()
|
H A D | ssh2_msgs.c | 213 REQUIRES( ( channelNo == CRYPT_USE_DEFAULT ) || \ in sendChannelResponse() 223 ( channelNo == CRYPT_USE_DEFAULT ) ? \ in sendChannelResponse()
|
H A D | ssh2_cry.c | 133 requestedKeySize == CRYPT_USE_DEFAULT ) || \ in initDHcontextSSH() 143 requestedKeySize == CRYPT_USE_DEFAULT ) || \ in initDHcontextSSH() 172 const int dlpKeySize = ( requestedKeySize == CRYPT_USE_DEFAULT ) ? \ in initDHcontextSSH()
|
H A D | ssh2_cli.c | 349 CRYPT_USE_DEFAULT ); in beginClientHandshake() 1078 status = openPacketStreamSSH( &stream, sessionInfoPtr, CRYPT_USE_DEFAULT, in completeClientHandshake()
|
H A D | ssl_cli.c | 1156 status = openPacketStreamSSL( stream, sessionInfoPtr, CRYPT_USE_DEFAULT, in beginClientHandshake() 1574 status = openPacketStreamSSL( stream, sessionInfoPtr, CRYPT_USE_DEFAULT, in exchangeClientKeys()
|
H A D | ssl_hsc.c | 342 CRYPT_USE_DEFAULT, in writeHandshakeCompletionData()
|
H A D | ssh2_svr.c | 477 CRYPT_USE_DEFAULT ); in beginServerHandshake()
|
H A D | ssl_svr.c | 920 status = openPacketStreamSSL( stream, sessionInfoPtr, CRYPT_USE_DEFAULT, in beginServerHandshake()
|
H A D | ssl_cry.c | 1063 ( CRYPT_ALGO_TYPE ) CRYPT_USE_DEFAULT, hashBuffer,
|
/dports/security/cryptlib/cryptlib-3.4.3/ |
H A D | cryptlib.c | 40 const int messageValueCryptUseDefault = CRYPT_USE_DEFAULT;
|
H A D | cryptlib.h | 1689 #define CRYPT_USE_DEFAULT ( -100 ) macro
|
H A D | README | 816 contexts, since there's no longer any need to juggle CRYPT_USE_DEFAULT,
|
/dports/security/cryptlib/cryptlib-3.4.3/mechs/ |
H A D | sign.c | 200 if( extraData != CRYPT_USE_DEFAULT ) in cryptCreateSignatureEx() 225 if( extraData == CRYPT_USE_DEFAULT ) in cryptCreateSignatureEx()
|
/dports/security/cryptlib/cryptlib-3.4.3/device/ |
H A D | system.c | 360 inputValue, MECHANISM_INPUT_SIZE_SSL, ( CRYPT_ALGO_TYPE ) CRYPT_USE_DEFAULT, 0, 366 inputValue, MECHANISM_INPUT_SIZE_SSL, ( CRYPT_ALGO_TYPE ) CRYPT_USE_DEFAULT, 0,
|
/dports/security/cryptlib/cryptlib-3.4.3/kernel/ |
H A D | mech_acl.c | 348 MKACP_N_FIXED( CRYPT_USE_DEFAULT ), /* SSL uses dual hash */ 362 MKACP_N_FIXED( CRYPT_USE_DEFAULT ), /* TLS uses dual hash */
|
H A D | msg_acl.c | 899 !( paramACL->lowRange == CRYPT_USE_DEFAULT && \ in paramAclConsistent() 900 paramACL->highRange == CRYPT_USE_DEFAULT ) ) in paramAclConsistent()
|
/dports/security/cryptlib/cryptlib-3.4.3/bindings/ |
H A D | PerlCryptLib.ph | 2070 sub CRYPT_USE_DEFAULT { -100 } subroutine
|
H A D | cryptlib.bas | 1400 Public Const CRYPT_USE_DEFAULT As Long = -100
|
H A D | cryptlib.pas | 1406 CRYPT_USE_DEFAULT = -100;
|