/external/chromium_org/third_party/openssl/openssl/crypto/asn1/ |
H A D | x_algor.c | 80 int X509_ALGOR_set0(X509_ALGOR *alg, ASN1_OBJECT *aobj, int ptype, void *pval) 82 if (!alg) 86 if (alg->parameter == NULL) 87 alg->parameter = ASN1_TYPE_new(); 88 if (alg->parameter == NULL) 91 if (alg) 93 if (alg->algorithm) 94 ASN1_OBJECT_free(alg->algorithm); 95 alg->algorithm = aobj; 101 if (alg [all...] |
H A D | p5_pbe.c | 77 int PKCS5_pbe_set0_algor(X509_ALGOR *algor, int alg, int iter, 119 if (X509_ALGOR_set0(algor, OBJ_nid2obj(alg), V_ASN1_SEQUENCE, pbe_str)) 132 X509_ALGOR *PKCS5_pbe_set(int alg, int iter, 143 if (PKCS5_pbe_set0_algor(ret, alg, iter, salt, saltlen))
|
/external/openssl/crypto/asn1/ |
H A D | x_algor.c | 80 int X509_ALGOR_set0(X509_ALGOR *alg, ASN1_OBJECT *aobj, int ptype, void *pval) 82 if (!alg) 86 if (alg->parameter == NULL) 87 alg->parameter = ASN1_TYPE_new(); 88 if (alg->parameter == NULL) 91 if (alg) 93 if (alg->algorithm) 94 ASN1_OBJECT_free(alg->algorithm); 95 alg->algorithm = aobj; 101 if (alg [all...] |
H A D | p5_pbe.c | 77 int PKCS5_pbe_set0_algor(X509_ALGOR *algor, int alg, int iter, 119 if (X509_ALGOR_set0(algor, OBJ_nid2obj(alg), V_ASN1_SEQUENCE, pbe_str)) 132 X509_ALGOR *PKCS5_pbe_set(int alg, int iter, 143 if (PKCS5_pbe_set0_algor(ret, alg, iter, salt, saltlen))
|
/external/smack/src/org/xbill/DNS/ |
H A D | SSHFPRecord.java | 31 private int alg; field in class:SSHFPRecord 44 * @param alg The public key's algorithm. 49 SSHFPRecord(Name name, int dclass, long ttl, int alg, int digestType, argument 53 this.alg = checkU8("alg", alg); 60 alg = in.readU8(); 67 alg = st.getUInt8(); 75 sb.append(alg); 86 return alg; [all...] |
H A D | DNSKEYRecord.java | 52 * @param alg The key's algorithm 56 DNSKEYRecord(Name name, int dclass, long ttl, int flags, int proto, int alg, argument 59 super(name, Type.DNSKEY, dclass, ttl, flags, proto, alg, key); 66 * @param alg The key's algorithm 72 DNSKEYRecord(Name name, int dclass, long ttl, int flags, int proto, int alg, argument 75 super(name, Type.DNSKEY, dclass, ttl, flags, proto, alg, 76 DNSSEC.fromPublicKey(key, alg)); 85 alg = DNSSEC.Algorithm.value(algString); 86 if (alg < 0)
|
H A D | DLVRecord.java | 26 private int alg; field in class:DLVRecord 40 * @param alg The original key algorithm. 45 DLVRecord(Name name, int dclass, long ttl, int footprint, int alg, argument 50 this.alg = checkU8("alg", alg); 58 alg = in.readU8(); 66 alg = st.getUInt8(); 79 sb.append(alg); 95 return alg; [all...] |
H A D | DSRecord.java | 39 private int alg; field in class:DSRecord 53 * @param alg The original key algorithm. 58 DSRecord(Name name, int dclass, long ttl, int footprint, int alg, argument 63 this.alg = checkU8("alg", alg); 83 alg = in.readU8(); 91 alg = st.getUInt8(); 104 sb.append(alg); 120 return alg; [all...] |
H A D | KEYBase.java | 20 protected int flags, proto, alg; field in class:KEYBase 30 int alg, byte [] key) 35 this.alg = checkU8("alg", alg); 43 alg = in.readU8(); 56 sb.append(alg); 92 return alg; 117 if (alg == DNSSEC.Algorithm.RSAMD5) { 156 out.writeU8(alg); 29 KEYBase(Name name, int type, int dclass, long ttl, int flags, int proto, int alg, byte [] key) argument [all...] |
H A D | RRSIGRecord.java | 32 * @param alg The cryptographic algorithm of the key that generated the 42 RRSIGRecord(Name name, int dclass, long ttl, int covered, int alg, long origttl, argument 46 super(name, Type.RRSIG, dclass, ttl, covered, alg, origttl, expire,
|
H A D | SIGRecord.java | 32 * @param alg The cryptographic algorithm of the key that generated the 42 SIGRecord(Name name, int dclass, long ttl, int covered, int alg, long origttl, argument 46 super(name, Type.SIG, dclass, ttl, covered, alg, origttl, expire,
|
H A D | CERTRecord.java | 110 private int alg; field in class:CERTRecord 124 * @param alg The algorithm of the associated KEYRecord, if present 129 int alg, byte [] cert) 134 this.alg = checkU8("alg", alg); 142 alg = in.readU8(); 155 alg = DNSSEC.Algorithm.value(algString); 156 if (alg < 0) 171 sb.append (alg); 128 CERTRecord(Name name, int dclass, long ttl, int certType, int keyTag, int alg, byte [] cert) argument [all...] |
H A D | SIGBase.java | 20 protected int alg, labels; field in class:SIGBase 31 SIGBase(Name name, int type, int dclass, long ttl, int covered, int alg, argument 39 this.alg = checkU8("alg", alg); 54 alg = in.readU8(); 71 alg = DNSSEC.Algorithm.value(algString); 72 if (alg < 0) 89 sb.append (alg); 126 return alg; [all...] |
H A D | TKEYRecord.java | 21 private Name alg; field in class:TKEYRecord 52 * @param alg The shared key's algorithm 64 TKEYRecord(Name name, int dclass, long ttl, Name alg, argument 69 this.alg = checkName("alg", alg); 80 alg = new Name(in); 120 sb.append(alg); 155 return alg; 202 alg [all...] |
H A D | TSIGRecord.java | 23 private Name alg; field in class:TSIGRecord 41 * @param alg The shared key's algorithm 54 TSIGRecord(Name name, int dclass, long ttl, Name alg, Date timeSigned, argument 59 this.alg = checkName("alg", alg); 70 alg = new Name(in); 100 sb.append(alg); 156 return alg; 197 alg [all...] |
/external/chromium_org/third_party/openssl/openssl/crypto/engine/ |
H A D | eng_fat.c | 103 static int int_def_cb(const char *alg, int len, void *arg) argument 106 if (!strncmp(alg, "ALL", len)) 108 else if (!strncmp(alg, "RSA", len)) 110 else if (!strncmp(alg, "DSA", len)) 112 else if (!strncmp(alg, "ECDH", len)) 114 else if (!strncmp(alg, "ECDSA", len)) 116 else if (!strncmp(alg, "DH", len)) 118 else if (!strncmp(alg, "RAND", len)) 120 else if (!strncmp(alg, "CIPHERS", len)) 122 else if (!strncmp(alg, "DIGEST [all...] |
/external/openssl/crypto/engine/ |
H A D | eng_fat.c | 103 static int int_def_cb(const char *alg, int len, void *arg) argument 106 if (!strncmp(alg, "ALL", len)) 108 else if (!strncmp(alg, "RSA", len)) 110 else if (!strncmp(alg, "DSA", len)) 112 else if (!strncmp(alg, "ECDH", len)) 114 else if (!strncmp(alg, "ECDSA", len)) 116 else if (!strncmp(alg, "DH", len)) 118 else if (!strncmp(alg, "RAND", len)) 120 else if (!strncmp(alg, "CIPHERS", len)) 122 else if (!strncmp(alg, "DIGEST [all...] |
/external/chromium_org/third_party/libjingle/source/talk/base/ |
H A D | messagedigest.h | 60 static MessageDigest* Create(const std::string& alg); 72 // the desired digest name |alg|, e.g. DIGEST_SHA_1. Returns 0 if there is no 74 size_t ComputeDigest(const std::string& alg, const void* input, size_t in_len, 80 // the desired digest name |alg|, e.g. DIGEST_SHA_1. Returns empty string if 82 std::string ComputeDigest(const std::string& alg, const std::string& input); 84 bool ComputeDigest(const std::string& alg, const std::string& input, 103 // the desired digest name |alg|, e.g. DIGEST_SHA_1. Returns 0 if there is no 105 size_t ComputeHmac(const std::string& alg, const void* key, size_t key_len, 113 // the desired digest name |alg|, e.g. DIGEST_SHA_1. Returns empty string if 115 std::string ComputeHmac(const std::string& alg, cons [all...] |
H A D | messagedigest.cc | 54 MessageDigest* MessageDigestFactory::Create(const std::string& alg) { argument 56 MessageDigest* digest = new OpenSSLDigest(alg); 64 if (alg == DIGEST_MD5) { 66 } else if (alg == DIGEST_SHA_1) { 79 size_t ComputeDigest(const std::string& alg, const void* input, size_t in_len, argument 81 scoped_ptr<MessageDigest> digest(MessageDigestFactory::Create(alg)); 94 bool ComputeDigest(const std::string& alg, const std::string& input, argument 96 scoped_ptr<MessageDigest> digest(MessageDigestFactory::Create(alg)); 104 std::string ComputeDigest(const std::string& alg, const std::string& input) { argument 106 ComputeDigest(alg, inpu 148 ComputeHmac(const std::string& alg, const void* key, size_t key_len, const void* input, size_t in_len, void* output, size_t out_len) argument 167 ComputeHmac(const std::string& alg, const std::string& key, const std::string& input, std::string* output) argument 177 ComputeHmac(const std::string& alg, const std::string& key, const std::string& input) argument [all...] |
/external/apache-harmony/crypto/src/test/support/common/java/org/apache/harmony/crypto/tests/support/ |
H A D | MyExemptionMechanismSpi.java | 101 private String alg; field in class:MyExemptionMechanismSpi.tmpKey 103 public tmpKey(String alg, byte[] enc) { argument 104 this.alg = alg; 111 return alg; 120 public tmp1Key(String alg, byte[] enc) { argument
|
/external/chromium_org/third_party/openssl/openssl/crypto/pkcs7/ |
H A D | pk7_attr.c | 99 X509_ALGOR *alg; local 101 if(!(alg = X509_ALGOR_new())) { 105 ASN1_OBJECT_free(alg->algorithm); 106 alg->algorithm = OBJ_nid2obj (nid); 109 if(!(alg->parameter = ASN1_TYPE_new())) { 121 alg->parameter->value.integer = nbit; 122 alg->parameter->type = V_ASN1_INTEGER; 124 sk_X509_ALGOR_push (sk, alg);
|
/external/openssl/crypto/pkcs7/ |
H A D | pk7_attr.c | 99 X509_ALGOR *alg; local 101 if(!(alg = X509_ALGOR_new())) { 105 ASN1_OBJECT_free(alg->algorithm); 106 alg->algorithm = OBJ_nid2obj (nid); 109 if(!(alg->parameter = ASN1_TYPE_new())) { 121 alg->parameter->value.integer = nbit; 122 alg->parameter->type = V_ASN1_INTEGER; 124 sk_X509_ALGOR_push (sk, alg);
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
H A D | KeyPairGenerator2Test.java | 199 String alg = validValues[i].concat(post); 200 kpG = KeyPairGenerator.getInstance(alg); 202 .toUpperCase(), (mode <= 2 ? resAlg : alg).toUpperCase()); 238 String alg = validValues[i].concat(post); 240 KeyPairGenerator.getInstance(alg, prov); 242 .concat(alg).concat(")")); 247 String alg = validValues[i].concat(post); 250 KeyPairGenerator.getInstance(alg, invalidValues[j]); 252 .concat(alg).concat(" provider: ").concat( 260 String alg [all...] |
/external/chromium/crypto/ |
H A D | symmetric_key_win.cc | 45 // key created for the specified |provider|. |alg| contains the algorithm of 47 // If |key_data| is intended to be used as an HMAC key, then |alg| should be 52 ALG_ID alg, 67 key_header->hdr.aiKeyAlg = alg; 73 if (alg == CALG_HMAC) { 105 ALG_ID alg = GetAESAlgIDForKeySize(key_size_in_bits); local 106 if (alg == 0) 124 ok = CryptGenKey(safe_provider.get(), alg, CRYPT_EXPORTABLE, 136 // Section 3. |alg| is the hash function used in the HMAC. 137 bool CheckHMACKeySize(size_t key_size_in_bits, ALG_ID alg) { argument 51 ImportRawKey(HCRYPTPROV provider, ALG_ID alg, const void* key_data, DWORD key_size, ScopedHCRYPTKEY* key) argument 167 GenerateHMACKey(size_t key_size_in_bits, ALG_ID alg, ScopedHCRYPTPROV* provider, ScopedHCRYPTKEY* key, scoped_array<BYTE>* raw_key) argument 367 ALG_ID alg = 0; local 467 ALG_ID alg = 0; local [all...] |
/external/chromium_org/crypto/ |
H A D | symmetric_key_win.cc | 44 // key created for the specified |provider|. |alg| contains the algorithm of 46 // If |key_data| is intended to be used as an HMAC key, then |alg| should be 51 ALG_ID alg, 67 key_header->hdr.aiKeyAlg = alg; 73 if (alg == CALG_HMAC) { 105 ALG_ID alg = GetAESAlgIDForKeySize(key_size_in_bits); local 106 if (alg == 0) 124 ok = CryptGenKey(safe_provider.get(), alg, CRYPT_EXPORTABLE, 136 // Section 3. |alg| is the hash function used in the HMAC. 137 bool CheckHMACKeySize(size_t key_size_in_bits, ALG_ID alg) { argument 50 ImportRawKey(HCRYPTPROV provider, ALG_ID alg, const void* key_data, size_t key_size, ScopedHCRYPTKEY* key) argument 167 GenerateHMACKey(size_t key_size_in_bits, ALG_ID alg, ScopedHCRYPTPROV* provider, ScopedHCRYPTKEY* key, scoped_ptr<BYTE[]>* raw_key) argument 367 ALG_ID alg = 0; local 467 ALG_ID alg = 0; local [all...] |