Searched refs:alg (Results 1 - 25 of 230) sorted by relevance

12345678910

/external/openssl/crypto/asn1/
H A Dx_algor.c80 int X509_ALGOR_set0(X509_ALGOR *alg, ASN1_OBJECT *aobj, int ptype, void *pval)
82 if (!alg)
86 if (alg->parameter == NULL)
87 alg->parameter = ASN1_TYPE_new();
88 if (alg->parameter == NULL)
91 if (alg)
93 if (alg->algorithm)
94 ASN1_OBJECT_free(alg->algorithm);
95 alg->algorithm = aobj;
101 if (alg
[all...]
H A Dp5_pbe.c77 int PKCS5_pbe_set0_algor(X509_ALGOR *algor, int alg, int iter,
119 if (X509_ALGOR_set0(algor, OBJ_nid2obj(alg), V_ASN1_SEQUENCE, pbe_str))
132 X509_ALGOR *PKCS5_pbe_set(int alg, int iter,
143 if (PKCS5_pbe_set0_algor(ret, alg, iter, salt, saltlen))
/external/openssl/crypto/engine/
H A Deng_fat.c103 static int int_def_cb(const char *alg, int len, void *arg) argument
106 if (!strncmp(alg, "ALL", len))
108 else if (!strncmp(alg, "RSA", len))
110 else if (!strncmp(alg, "DSA", len))
112 else if (!strncmp(alg, "ECDH", len))
114 else if (!strncmp(alg, "ECDSA", len))
116 else if (!strncmp(alg, "DH", len))
118 else if (!strncmp(alg, "RAND", len))
120 else if (!strncmp(alg, "CIPHERS", len))
122 else if (!strncmp(alg, "DIGEST
[all...]
/external/apache-harmony/crypto/src/test/support/common/java/org/apache/harmony/crypto/tests/support/
H A DMyExemptionMechanismSpi.java101 private String alg; field in class:MyExemptionMechanismSpi.tmpKey
103 public tmpKey(String alg, byte[] enc) { argument
104 this.alg = alg;
111 return alg;
120 public tmp1Key(String alg, byte[] enc) { argument
/external/openssl/crypto/pkcs7/
H A Dpk7_attr.c99 X509_ALGOR *alg; local
101 if(!(alg = X509_ALGOR_new())) {
105 ASN1_OBJECT_free(alg->algorithm);
106 alg->algorithm = OBJ_nid2obj (nid);
109 if(!(alg->parameter = ASN1_TYPE_new())) {
121 alg->parameter->value.integer = nbit;
122 alg->parameter->type = V_ASN1_INTEGER;
124 sk_X509_ALGOR_push (sk, alg);
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/
H A DKeyPairGenerator2Test.java199 String alg = validValues[i].concat(post);
200 kpG = KeyPairGenerator.getInstance(alg);
202 .toUpperCase(), (mode <= 2 ? resAlg : alg).toUpperCase());
238 String alg = validValues[i].concat(post);
240 KeyPairGenerator.getInstance(alg, prov);
242 .concat(alg).concat(")"));
247 String alg = validValues[i].concat(post);
250 KeyPairGenerator.getInstance(alg, invalidValues[j]);
252 .concat(alg).concat(" provider: ").concat(
260 String alg
[all...]
H A DKSPrivateKeyEntryTest.java186 private String alg = "My algorithm"; field in class:KSPrivateKeyEntryTest.tmpPrivateKey
189 return alg;
205 alg = algorithm;
/external/chromium/crypto/
H A Dsymmetric_key_win.cc45 // key created for the specified |provider|. |alg| contains the algorithm of
47 // If |key_data| is intended to be used as an HMAC key, then |alg| should be
52 ALG_ID alg,
67 key_header->hdr.aiKeyAlg = alg;
73 if (alg == CALG_HMAC) {
105 ALG_ID alg = GetAESAlgIDForKeySize(key_size_in_bits); local
106 if (alg == 0)
124 ok = CryptGenKey(safe_provider.get(), alg, CRYPT_EXPORTABLE,
136 // Section 3. |alg| is the hash function used in the HMAC.
137 bool CheckHMACKeySize(size_t key_size_in_bits, ALG_ID alg) { argument
51 ImportRawKey(HCRYPTPROV provider, ALG_ID alg, const void* key_data, DWORD key_size, ScopedHCRYPTKEY* key) argument
167 GenerateHMACKey(size_t key_size_in_bits, ALG_ID alg, ScopedHCRYPTPROV* provider, ScopedHCRYPTKEY* key, scoped_array<BYTE>* raw_key) argument
367 ALG_ID alg = 0; local
467 ALG_ID alg = 0; local
[all...]
/external/openssl/crypto/ocsp/
H A Docsp_lib.c106 X509_ALGOR *alg; local
112 alg = cid->hashAlgorithm;
113 if (alg->algorithm != NULL) ASN1_OBJECT_free(alg->algorithm);
119 if (!(alg->algorithm=OBJ_nid2obj(nid))) goto err;
120 if ((alg->parameter=ASN1_TYPE_new()) == NULL) goto err;
121 alg->parameter->type=V_ASN1_NULL;
/external/wpa_supplicant_8/hostapd/src/crypto/
H A Dcrypto_internal-cipher.c18 enum crypto_cipher_alg alg; member in struct:crypto_cipher
43 struct crypto_cipher * crypto_cipher_init(enum crypto_cipher_alg alg, argument
53 ctx->alg = alg;
55 switch (alg) {
108 switch (ctx->alg) {
172 switch (ctx->alg) {
232 switch (ctx->alg) {
H A Dcrypto_internal.c18 enum crypto_hash_alg alg; member in struct:crypto_hash
31 struct crypto_hash * crypto_hash_init(enum crypto_hash_alg alg, const u8 *key, argument
43 ctx->alg = alg;
45 switch (alg) {
130 switch (ctx->alg) {
164 switch (ctx->alg) {
/external/wpa_supplicant_8/src/crypto/
H A Dcrypto_internal-cipher.c18 enum crypto_cipher_alg alg; member in struct:crypto_cipher
43 struct crypto_cipher * crypto_cipher_init(enum crypto_cipher_alg alg, argument
53 ctx->alg = alg;
55 switch (alg) {
108 switch (ctx->alg) {
172 switch (ctx->alg) {
232 switch (ctx->alg) {
H A Dcrypto_internal.c18 enum crypto_hash_alg alg; member in struct:crypto_hash
31 struct crypto_hash * crypto_hash_init(enum crypto_hash_alg alg, const u8 *key, argument
43 ctx->alg = alg;
45 switch (alg) {
130 switch (ctx->alg) {
164 switch (ctx->alg) {
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Dcrypto_internal-cipher.c18 enum crypto_cipher_alg alg; member in struct:crypto_cipher
43 struct crypto_cipher * crypto_cipher_init(enum crypto_cipher_alg alg, argument
53 ctx->alg = alg;
55 switch (alg) {
108 switch (ctx->alg) {
172 switch (ctx->alg) {
232 switch (ctx->alg) {
H A Dcrypto_internal.c18 enum crypto_hash_alg alg; member in struct:crypto_hash
31 struct crypto_hash * crypto_hash_init(enum crypto_hash_alg alg, const u8 *key, argument
43 ctx->alg = alg;
45 switch (alg) {
130 switch (ctx->alg) {
164 switch (ctx->alg) {
/external/openssl/crypto/pkcs12/
H A Dp12_npas.c72 static int alg_get(X509_ALGOR *alg, int *pnid, int *piter, int *psaltlen);
211 static int alg_get(X509_ALGOR *alg, int *pnid, int *piter, int *psaltlen) argument
216 p = alg->parameter->value.sequence->data;
217 pbe = d2i_PBEPARAM(NULL, &p, alg->parameter->value.sequence->length);
220 *pnid = OBJ_obj2nid(alg->algorithm);
/external/openssl/crypto/
H A Dcrypto.h555 #define fips_md_init(alg) fips_md_init_ctx(alg, alg)
558 #define fips_md_init_ctx(alg, cx) \
559 int alg##_Init(cx##_CTX *c) \
562 "Low level API call to digest " #alg " forbidden in FIPS mode!"); \
563 return private_##alg##_Init(c); \
565 int private_##alg##_Init(cx##_CTX *c)
567 #define fips_cipher_abort(alg) \
569 "Low level API call to cipher " #alg " forbidde
[all...]
/external/openssl/include/openssl/
H A Dcrypto.h555 #define fips_md_init(alg) fips_md_init_ctx(alg, alg)
558 #define fips_md_init_ctx(alg, cx) \
559 int alg##_Init(cx##_CTX *c) \
562 "Low level API call to digest " #alg " forbidden in FIPS mode!"); \
563 return private_##alg##_Init(c); \
565 int private_##alg##_Init(cx##_CTX *c)
567 #define fips_cipher_abort(alg) \
569 "Low level API call to cipher " #alg " forbidde
[all...]
/external/ipsec-tools/src/racoon/
H A Dsainfo.h66 int alg; member in struct:sainfoalg
/external/nist-sip/java/gov/nist/javax/sip/header/ims/
H A DSecurityAgreeHeader.java67 * Set Algorithm (alg parameter)
68 * @param alg - algorithm value
71 public void setAlgorithm(String alg) throws ParseException; argument
139 * @return alg parameter value
/external/wpa_supplicant_6/wpa_supplicant/src/common/
H A Dprivsep_commands.h54 int alg; member in struct:privsep_cmd_set_key
/external/wpa_supplicant_8/hostapd/src/common/
H A Dprivsep_commands.h46 int alg; member in struct:privsep_cmd_set_key
/external/wpa_supplicant_8/src/common/
H A Dprivsep_commands.h46 int alg; member in struct:privsep_cmd_set_key
/external/wpa_supplicant_8/wpa_supplicant/src/common/
H A Dprivsep_commands.h46 int alg; member in struct:privsep_cmd_set_key
/external/wpa_supplicant_8/hostapd/src/ap/
H A Dap_mlme.c22 static const char * mlme_auth_alg_str(int alg) argument
24 switch (alg) {

Completed in 316 milliseconds

12345678910