/external/openssl/crypto/asn1/ |
H A D | x_algor.c | 80 int X509_ALGOR_set0(X509_ALGOR *alg, ASN1_OBJECT *aobj, int ptype, void *pval) 82 if (!alg) 86 if (alg->parameter == NULL) 87 alg->parameter = ASN1_TYPE_new(); 88 if (alg->parameter == NULL) 91 if (alg) 93 if (alg->algorithm) 94 ASN1_OBJECT_free(alg->algorithm); 95 alg->algorithm = aobj; 101 if (alg [all...] |
H A D | p5_pbe.c | 77 int PKCS5_pbe_set0_algor(X509_ALGOR *algor, int alg, int iter, 119 if (X509_ALGOR_set0(algor, OBJ_nid2obj(alg), V_ASN1_SEQUENCE, pbe_str)) 132 X509_ALGOR *PKCS5_pbe_set(int alg, int iter, 143 if (PKCS5_pbe_set0_algor(ret, alg, iter, salt, saltlen))
|
/external/openssl/crypto/engine/ |
H A D | eng_fat.c | 103 static int int_def_cb(const char *alg, int len, void *arg) argument 106 if (!strncmp(alg, "ALL", len)) 108 else if (!strncmp(alg, "RSA", len)) 110 else if (!strncmp(alg, "DSA", len)) 112 else if (!strncmp(alg, "ECDH", len)) 114 else if (!strncmp(alg, "ECDSA", len)) 116 else if (!strncmp(alg, "DH", len)) 118 else if (!strncmp(alg, "RAND", len)) 120 else if (!strncmp(alg, "CIPHERS", len)) 122 else if (!strncmp(alg, "DIGEST [all...] |
/external/apache-harmony/crypto/src/test/support/common/java/org/apache/harmony/crypto/tests/support/ |
H A D | MyExemptionMechanismSpi.java | 101 private String alg; field in class:MyExemptionMechanismSpi.tmpKey 103 public tmpKey(String alg, byte[] enc) { argument 104 this.alg = alg; 111 return alg; 120 public tmp1Key(String alg, byte[] enc) { argument
|
/external/openssl/crypto/pkcs7/ |
H A D | pk7_attr.c | 99 X509_ALGOR *alg; local 101 if(!(alg = X509_ALGOR_new())) { 105 ASN1_OBJECT_free(alg->algorithm); 106 alg->algorithm = OBJ_nid2obj (nid); 109 if(!(alg->parameter = ASN1_TYPE_new())) { 121 alg->parameter->value.integer = nbit; 122 alg->parameter->type = V_ASN1_INTEGER; 124 sk_X509_ALGOR_push (sk, alg);
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
H A D | KeyPairGenerator2Test.java | 199 String alg = validValues[i].concat(post); 200 kpG = KeyPairGenerator.getInstance(alg); 202 .toUpperCase(), (mode <= 2 ? resAlg : alg).toUpperCase()); 238 String alg = validValues[i].concat(post); 240 KeyPairGenerator.getInstance(alg, prov); 242 .concat(alg).concat(")")); 247 String alg = validValues[i].concat(post); 250 KeyPairGenerator.getInstance(alg, invalidValues[j]); 252 .concat(alg).concat(" provider: ").concat( 260 String alg [all...] |
H A D | KSPrivateKeyEntryTest.java | 186 private String alg = "My algorithm"; field in class:KSPrivateKeyEntryTest.tmpPrivateKey 189 return alg; 205 alg = algorithm;
|
/external/chromium/crypto/ |
H A D | symmetric_key_win.cc | 45 // key created for the specified |provider|. |alg| contains the algorithm of 47 // If |key_data| is intended to be used as an HMAC key, then |alg| should be 52 ALG_ID alg, 67 key_header->hdr.aiKeyAlg = alg; 73 if (alg == CALG_HMAC) { 105 ALG_ID alg = GetAESAlgIDForKeySize(key_size_in_bits); local 106 if (alg == 0) 124 ok = CryptGenKey(safe_provider.get(), alg, CRYPT_EXPORTABLE, 136 // Section 3. |alg| is the hash function used in the HMAC. 137 bool CheckHMACKeySize(size_t key_size_in_bits, ALG_ID alg) { argument 51 ImportRawKey(HCRYPTPROV provider, ALG_ID alg, const void* key_data, DWORD key_size, ScopedHCRYPTKEY* key) argument 167 GenerateHMACKey(size_t key_size_in_bits, ALG_ID alg, ScopedHCRYPTPROV* provider, ScopedHCRYPTKEY* key, scoped_array<BYTE>* raw_key) argument 367 ALG_ID alg = 0; local 467 ALG_ID alg = 0; local [all...] |
/external/bouncycastle/src/main/java/org/bouncycastle/openssl/ |
H A D | PEMUtilities.java | 125 String alg; 155 alg = "DESede"; 159 sKey = getKey(password, alg, 24, iv, des2); 163 alg = "DES"; 164 sKey = getKey(password, alg, 8, iv); 168 alg = "Blowfish"; 169 sKey = getKey(password, alg, 16, iv); 173 alg = "RC2"; 183 sKey = getKey(password, alg, keyBits / 8, iv); 195 alg [all...] |
/external/openssl/crypto/ocsp/ |
H A D | ocsp_lib.c | 106 X509_ALGOR *alg; local 112 alg = cid->hashAlgorithm; 113 if (alg->algorithm != NULL) ASN1_OBJECT_free(alg->algorithm); 119 if (!(alg->algorithm=OBJ_nid2obj(nid))) goto err; 120 if ((alg->parameter=ASN1_TYPE_new()) == NULL) goto err; 121 alg->parameter->type=V_ASN1_NULL;
|
/external/openssl/crypto/pkcs12/ |
H A D | p12_npas.c | 72 static int alg_get(X509_ALGOR *alg, int *pnid, int *piter, int *psaltlen); 211 static int alg_get(X509_ALGOR *alg, int *pnid, int *piter, int *psaltlen) argument 216 p = alg->parameter->value.sequence->data; 217 pbe = d2i_PBEPARAM(NULL, &p, alg->parameter->value.sequence->length); 220 *pnid = OBJ_obj2nid(alg->algorithm);
|
/external/openssl/crypto/ |
H A D | crypto.h | 555 #define fips_md_init(alg) fips_md_init_ctx(alg, alg) 558 #define fips_md_init_ctx(alg, cx) \ 559 int alg##_Init(cx##_CTX *c) \ 562 "Low level API call to digest " #alg " forbidden in FIPS mode!"); \ 563 return private_##alg##_Init(c); \ 565 int private_##alg##_Init(cx##_CTX *c) 567 #define fips_cipher_abort(alg) \ 569 "Low level API call to cipher " #alg " forbidde [all...] |
/external/openssl/include/openssl/ |
H A D | crypto.h | 555 #define fips_md_init(alg) fips_md_init_ctx(alg, alg) 558 #define fips_md_init_ctx(alg, cx) \ 559 int alg##_Init(cx##_CTX *c) \ 562 "Low level API call to digest " #alg " forbidden in FIPS mode!"); \ 563 return private_##alg##_Init(c); \ 565 int private_##alg##_Init(cx##_CTX *c) 567 #define fips_cipher_abort(alg) \ 569 "Low level API call to cipher " #alg " forbidde [all...] |
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | crypto_internal.c | 18 enum crypto_hash_alg alg; member in struct:crypto_hash 31 struct crypto_hash * crypto_hash_init(enum crypto_hash_alg alg, const u8 *key, argument 43 ctx->alg = alg; 45 switch (alg) { 130 switch (ctx->alg) { 164 switch (ctx->alg) {
|
H A D | crypto_internal-cipher.c | 18 enum crypto_cipher_alg alg; member in struct:crypto_cipher 44 struct crypto_cipher * crypto_cipher_init(enum crypto_cipher_alg alg, argument 54 ctx->alg = alg; 56 switch (alg) { 114 switch (ctx->alg) { 179 switch (ctx->alg) { 239 switch (ctx->alg) {
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | crypto_internal.c | 18 enum crypto_hash_alg alg; member in struct:crypto_hash 31 struct crypto_hash * crypto_hash_init(enum crypto_hash_alg alg, const u8 *key, argument 43 ctx->alg = alg; 45 switch (alg) { 130 switch (ctx->alg) { 164 switch (ctx->alg) {
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | crypto_internal.c | 18 enum crypto_hash_alg alg; member in struct:crypto_hash 31 struct crypto_hash * crypto_hash_init(enum crypto_hash_alg alg, const u8 *key, argument 43 ctx->alg = alg; 45 switch (alg) { 130 switch (ctx->alg) { 164 switch (ctx->alg) {
|
/external/ipsec-tools/src/racoon/ |
H A D | sainfo.h | 66 int alg; member in struct:sainfoalg
|
/external/nist-sip/java/gov/nist/javax/sip/header/ims/ |
H A D | SecurityAgreeHeader.java | 67 * Set Algorithm (alg parameter) 68 * @param alg - algorithm value 71 public void setAlgorithm(String alg) throws ParseException; argument 139 * @return alg parameter value
|
/external/wpa_supplicant_6/wpa_supplicant/src/common/ |
H A D | privsep_commands.h | 54 int alg; member in struct:privsep_cmd_set_key
|
/external/wpa_supplicant_8/hostapd/src/common/ |
H A D | privsep_commands.h | 46 int alg; member in struct:privsep_cmd_set_key
|
/external/wpa_supplicant_8/src/common/ |
H A D | privsep_commands.h | 46 int alg; member in struct:privsep_cmd_set_key
|
/external/wpa_supplicant_8/wpa_supplicant/src/common/ |
H A D | privsep_commands.h | 46 int alg; member in struct:privsep_cmd_set_key
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | ap_mlme.c | 22 static const char * mlme_auth_alg_str(int alg) argument 24 switch (alg) {
|
/external/wpa_supplicant_8/src/ap/ |
H A D | ap_mlme.c | 22 static const char * mlme_auth_alg_str(int alg) argument 24 switch (alg) {
|