/external/ipsec-tools/src/racoon/ |
H A D | sainfo.h | 57 struct sainfoalg *algs[MAXALGCLASS]; member in struct:sainfo
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
H A D | AlgorithmParameterGenerator1Test.java | 50 private static String[] algs = { field in class:AlgorithmParameterGenerator1Test 125 for (int i = 0; i < algs.length; i++) { 126 apg = AlgorithmParameterGenerator.getInstance(algs[i]); 127 assertEquals("Incorrect algorithm", apg.getAlgorithm(), algs[i]); 144 for (int i = 0; i < algs.length; i++) { 146 AlgorithmParameterGenerator.getInstance(algs[i], provider); 151 AlgorithmParameterGenerator.getInstance(algs[i], ""); 170 for (int i = 0; i < algs.length; i++) { 173 AlgorithmParameterGenerator.getInstance(algs[i], 225 for (int i = 0; i < algs [all...] |
H A D | KeyPairGenerator1Test.java | 54 public static String[] algs = { field in class:KeyPairGenerator1Test 128 for (int i = 0; i < algs.length; i++) { 129 kpg = KeyPairGenerator.getInstance(algs[i]); 131 algs[i].toUpperCase()); 147 for (int i = 0; i < algs.length; i++) { 149 KeyPairGenerator.getInstance(algs[i], provider); 154 KeyPairGenerator.getInstance(algs[i], ""); 174 for (int i = 0; i < algs.length; i++) { 177 KeyPairGenerator.getInstance(algs[i], invalidValues[j]); 179 .concat(algs[ [all...] |
/external/smack/src/org/xbill/DNS/ |
H A D | DNSSEC.java | 67 private static Mnemonic algs = new Mnemonic("DNSSEC algorithm", field in class:DNSSEC.Algorithm 71 algs.setMaximum(0xFF); 72 algs.setNumericAllowed(true); 74 algs.add(RSAMD5, "RSAMD5"); 75 algs.add(DH, "DH"); 76 algs.add(DSA, "DSA"); 77 algs.add(RSASHA1, "RSASHA1"); 78 algs.add(DSA_NSEC3_SHA1, "DSA-NSEC3-SHA1"); 79 algs.add(RSA_NSEC3_SHA1, "RSA-NSEC3-SHA1"); 80 algs [all...] |
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | tls_schannel.c | 688 ALG_ID algs[1]; local 706 algs[0] = CALG_RSA_KEYX; 708 conn->schannel_cred.palgSupportedAlgs = algs;
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | tls_schannel.c | 688 ALG_ID algs[1]; local 706 algs[0] = CALG_RSA_KEYX; 708 conn->schannel_cred.palgSupportedAlgs = algs;
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | tls_schannel.c | 688 ALG_ID algs[1]; local 706 algs[0] = CALG_RSA_KEYX; 708 conn->schannel_cred.palgSupportedAlgs = algs;
|
/external/wpa_supplicant_8/hostapd/src/drivers/ |
H A D | driver_wext.c | 2159 int algs = 0, res; local 2162 algs |= IW_AUTH_ALG_OPEN_SYSTEM; 2164 algs |= IW_AUTH_ALG_SHARED_KEY; 2166 algs |= IW_AUTH_ALG_LEAP; 2167 if (algs == 0) { 2169 algs = IW_AUTH_ALG_OPEN_SYSTEM; 2173 algs);
|
H A D | driver_nl80211.c | 7661 int algs; local 7703 algs = 0; 7705 algs++; 7707 algs++; 7709 algs++; 7710 if (algs > 1) {
|
/external/wpa_supplicant_8/src/drivers/ |
H A D | driver_wext.c | 2159 int algs = 0, res; local 2162 algs |= IW_AUTH_ALG_OPEN_SYSTEM; 2164 algs |= IW_AUTH_ALG_SHARED_KEY; 2166 algs |= IW_AUTH_ALG_LEAP; 2167 if (algs == 0) { 2169 algs = IW_AUTH_ALG_OPEN_SYSTEM; 2173 algs);
|
H A D | driver_nl80211.c | 7661 int algs; local 7703 algs = 0; 7705 algs++; 7707 algs++; 7709 algs++; 7710 if (algs > 1) {
|
/external/wpa_supplicant_8/wpa_supplicant/src/drivers/ |
H A D | driver_wext.c | 2159 int algs = 0, res; local 2162 algs |= IW_AUTH_ALG_OPEN_SYSTEM; 2164 algs |= IW_AUTH_ALG_SHARED_KEY; 2166 algs |= IW_AUTH_ALG_LEAP; 2167 if (algs == 0) { 2169 algs = IW_AUTH_ALG_OPEN_SYSTEM; 2173 algs);
|
H A D | driver_nl80211.c | 7661 int algs; local 7703 algs = 0; 7705 algs++; 7707 algs++; 7709 algs++; 7710 if (algs > 1) {
|
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | wpa_supplicant.c | 1276 int algs = WPA_AUTH_ALG_OPEN; local 1382 algs = WPA_AUTH_ALG_LEAP; 1384 algs |= WPA_AUTH_ALG_LEAP; 1388 wpa_dbg(wpa_s, MSG_DEBUG, "Automatic auth_alg selection: 0x%x", algs); 1390 algs = ssid->auth_alg; 1392 "0x%x", algs); 1579 params.auth_alg = algs;
|