/external/chromium_org/third_party/openssl/openssl/crypto/engine/ |
H A D | eng_fat.c | 103 static int int_def_cb(const char *alg, int len, void *arg) argument 106 if (!strncmp(alg, "ALL", len)) 108 else if (!strncmp(alg, "RSA", len)) 110 else if (!strncmp(alg, "DSA", len)) 112 else if (!strncmp(alg, "ECDH", len)) 114 else if (!strncmp(alg, "ECDSA", len)) 116 else if (!strncmp(alg, "DH", len)) 118 else if (!strncmp(alg, "RAND", len)) 120 else if (!strncmp(alg, "CIPHERS", len)) 122 else if (!strncmp(alg, "DIGEST [all...] |
/external/chromium_org/third_party/openssl/openssl/crypto/pkcs7/ |
H A D | pk7_attr.c | 99 X509_ALGOR *alg; local 101 if(!(alg = X509_ALGOR_new())) { 105 ASN1_OBJECT_free(alg->algorithm); 106 alg->algorithm = OBJ_nid2obj (nid); 109 if(!(alg->parameter = ASN1_TYPE_new())) { 121 alg->parameter->value.integer = nbit; 122 alg->parameter->type = V_ASN1_INTEGER; 124 sk_X509_ALGOR_push (sk, alg);
|
/external/ipsec-tools/src/racoon/ |
H A D | sainfo.h | 66 int alg; member in struct:sainfoalg
|
/external/openssl/crypto/engine/ |
H A D | eng_fat.c | 103 static int int_def_cb(const char *alg, int len, void *arg) argument 106 if (!strncmp(alg, "ALL", len)) 108 else if (!strncmp(alg, "RSA", len)) 110 else if (!strncmp(alg, "DSA", len)) 112 else if (!strncmp(alg, "ECDH", len)) 114 else if (!strncmp(alg, "ECDSA", len)) 116 else if (!strncmp(alg, "DH", len)) 118 else if (!strncmp(alg, "RAND", len)) 120 else if (!strncmp(alg, "CIPHERS", len)) 122 else if (!strncmp(alg, "DIGEST [all...] |
/external/openssl/crypto/pkcs7/ |
H A D | pk7_attr.c | 99 X509_ALGOR *alg; local 101 if(!(alg = X509_ALGOR_new())) { 105 ASN1_OBJECT_free(alg->algorithm); 106 alg->algorithm = OBJ_nid2obj (nid); 109 if(!(alg->parameter = ASN1_TYPE_new())) { 121 alg->parameter->value.integer = nbit; 122 alg->parameter->type = V_ASN1_INTEGER; 124 sk_X509_ALGOR_push (sk, alg);
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | ap_mlme.c | 22 static const char * mlme_auth_alg_str(int alg) argument 24 switch (alg) {
|
/external/wpa_supplicant_8/src/ap/ |
H A D | ap_mlme.c | 22 static const char * mlme_auth_alg_str(int alg) argument 24 switch (alg) {
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | ap_mlme.c | 22 static const char * mlme_auth_alg_str(int alg) argument 24 switch (alg) {
|
/external/chromium_org/third_party/libjingle/source/talk/base/ |
H A D | messagedigest.cc | 54 MessageDigest* MessageDigestFactory::Create(const std::string& alg) { argument 56 MessageDigest* digest = new OpenSSLDigest(alg); 64 if (alg == DIGEST_MD5) { 66 } else if (alg == DIGEST_SHA_1) { 79 size_t ComputeDigest(const std::string& alg, const void* input, size_t in_len, argument 81 scoped_ptr<MessageDigest> digest(MessageDigestFactory::Create(alg)); 94 bool ComputeDigest(const std::string& alg, const std::string& input, argument 96 scoped_ptr<MessageDigest> digest(MessageDigestFactory::Create(alg)); 104 std::string ComputeDigest(const std::string& alg, const std::string& input) { argument 106 ComputeDigest(alg, inpu 148 ComputeHmac(const std::string& alg, const void* key, size_t key_len, const void* input, size_t in_len, void* output, size_t out_len) argument 167 ComputeHmac(const std::string& alg, const std::string& key, const std::string& input, std::string* output) argument 177 ComputeHmac(const std::string& alg, const std::string& key, const std::string& input) argument [all...] |
/external/chromium_org/third_party/libjingle/source/talk/p2p/base/ |
H A D | transportdescriptionfactory.h | 62 void set_digest_algorithm(const std::string& alg) { digest_alg_ = alg; } argument
|
/external/smack/src/org/xbill/DNS/ |
H A D | RRSIGRecord.java | 32 * @param alg The cryptographic algorithm of the key that generated the 42 RRSIGRecord(Name name, int dclass, long ttl, int covered, int alg, long origttl, argument 46 super(name, Type.RRSIG, dclass, ttl, covered, alg, origttl, expire,
|
H A D | SIGRecord.java | 32 * @param alg The cryptographic algorithm of the key that generated the 42 SIGRecord(Name name, int dclass, long ttl, int covered, int alg, long origttl, argument 46 super(name, Type.SIG, dclass, ttl, covered, alg, origttl, expire,
|
H A D | DNSKEYRecord.java | 52 * @param alg The key's algorithm 56 DNSKEYRecord(Name name, int dclass, long ttl, int flags, int proto, int alg, argument 59 super(name, Type.DNSKEY, dclass, ttl, flags, proto, alg, key); 66 * @param alg The key's algorithm 72 DNSKEYRecord(Name name, int dclass, long ttl, int flags, int proto, int alg, argument 75 super(name, Type.DNSKEY, dclass, ttl, flags, proto, alg, 76 DNSSEC.fromPublicKey(key, alg)); 85 alg = DNSSEC.Algorithm.value(algString); 86 if (alg < 0)
|
H A D | KEYBase.java | 20 protected int flags, proto, alg; field in class:KEYBase 30 int alg, byte [] key) 35 this.alg = checkU8("alg", alg); 43 alg = in.readU8(); 56 sb.append(alg); 92 return alg; 117 if (alg == DNSSEC.Algorithm.RSAMD5) { 156 out.writeU8(alg); 29 KEYBase(Name name, int type, int dclass, long ttl, int flags, int proto, int alg, byte [] key) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | crypto_internal.c | 18 enum crypto_hash_alg alg; member in struct:crypto_hash 31 struct crypto_hash * crypto_hash_init(enum crypto_hash_alg alg, const u8 *key, argument 43 ctx->alg = alg; 45 switch (alg) { 130 switch (ctx->alg) { 164 switch (ctx->alg) {
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | crypto_internal.c | 18 enum crypto_hash_alg alg; member in struct:crypto_hash 31 struct crypto_hash * crypto_hash_init(enum crypto_hash_alg alg, const u8 *key, argument 43 ctx->alg = alg; 45 switch (alg) { 130 switch (ctx->alg) { 164 switch (ctx->alg) {
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | crypto_internal.c | 18 enum crypto_hash_alg alg; member in struct:crypto_hash 31 struct crypto_hash * crypto_hash_init(enum crypto_hash_alg alg, const u8 *key, argument 43 ctx->alg = alg; 45 switch (alg) { 130 switch (ctx->alg) { 164 switch (ctx->alg) {
|
/external/apache-harmony/crypto/src/test/support/common/java/org/apache/harmony/crypto/tests/support/ |
H A D | MyExemptionMechanismSpi.java | 101 private String alg; field in class:MyExemptionMechanismSpi.tmpKey 103 public tmpKey(String alg, byte[] enc) { argument 104 this.alg = alg; 111 return alg; 120 public tmp1Key(String alg, byte[] enc) { argument
|
/external/wpa_supplicant_8/hostapd/src/drivers/ |
H A D | driver_openbsd.c | 71 wpa_driver_openbsd_set_key(const char *ifname, void *priv, enum wpa_alg alg, argument 78 if (alg != WPA_ALG_PMK || key_len > IEEE80211_PMK_LEN)
|
/external/wpa_supplicant_8/src/drivers/ |
H A D | driver_openbsd.c | 71 wpa_driver_openbsd_set_key(const char *ifname, void *priv, enum wpa_alg alg, argument 78 if (alg != WPA_ALG_PMK || key_len > IEEE80211_PMK_LEN)
|
/external/wpa_supplicant_8/wpa_supplicant/src/drivers/ |
H A D | driver_openbsd.c | 71 wpa_driver_openbsd_set_key(const char *ifname, void *priv, enum wpa_alg alg, argument 78 if (alg != WPA_ALG_PMK || key_len > IEEE80211_PMK_LEN)
|
/external/apache-harmony/crypto/src/test/api/java/org/apache/harmony/crypto/tests/javax/crypto/ |
H A D | SecretKeyFactoryTest.java | 422 public mySecretKeyFactory(SecretKeyFactorySpi spi, Provider prov, String alg) { argument 423 super(spi, prov, alg);
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
H A D | AlgorithmParameterGenerator1Test.java | 382 public myAlgPG(AlgorithmParameterGeneratorSpi spi, Provider prov, String alg) { argument 383 super(spi, prov, alg);
|
H A D | KSPrivateKeyEntryTest.java | 186 private String alg = "My algorithm"; field in class:KSPrivateKeyEntryTest.tmpPrivateKey 189 return alg; 205 alg = algorithm;
|
H A D | KeyFactory2Test.java | 71 private KeepAlive createKeepAlive(String alg) { argument 72 if (alg.equals("RSA")) {
|