Searched defs:alg (Results 1 - 25 of 164) sorted by relevance

1234567

/external/chromium_org/net/cert/
H A Dct_log_verifier_openssl.cc20 const EVP_MD* GetEvpAlg(ct::DigitallySigned::HashAlgorithm alg) { argument
21 switch (alg) {
H A Dct_log_verifier_nss.cc23 SECOidTag GetNSSSigAlg(ct::DigitallySigned::SignatureAlgorithm alg) { argument
24 switch (alg) {
38 SECOidTag GetNSSHashAlg(ct::DigitallySigned::HashAlgorithm alg) { argument
39 switch (alg) {
/external/ipsec-tools/src/racoon/
H A Dsainfo.h66 int alg; member in struct:sainfoalg
/external/openssl/crypto/engine/
H A Deng_fat.c103 static int int_def_cb(const char *alg, int len, void *arg) argument
106 if (!strncmp(alg, "ALL", len))
108 else if (!strncmp(alg, "RSA", len))
110 else if (!strncmp(alg, "DSA", len))
112 else if (!strncmp(alg, "ECDH", len))
114 else if (!strncmp(alg, "ECDSA", len))
116 else if (!strncmp(alg, "DH", len))
118 else if (!strncmp(alg, "RAND", len))
120 else if (!strncmp(alg, "CIPHERS", len))
122 else if (!strncmp(alg, "DIGEST
[all...]
/external/openssl/crypto/pkcs7/
H A Dpk7_attr.c99 X509_ALGOR *alg; local
101 if(!(alg = X509_ALGOR_new())) {
105 ASN1_OBJECT_free(alg->algorithm);
106 alg->algorithm = OBJ_nid2obj (nid);
109 if(!(alg->parameter = ASN1_TYPE_new())) {
121 alg->parameter->value.integer = nbit;
122 alg->parameter->type = V_ASN1_INTEGER;
124 sk_X509_ALGOR_push (sk, alg);
/external/wpa_supplicant_8/hostapd/src/ap/
H A Dap_mlme.c23 static const char * mlme_auth_alg_str(int alg) argument
25 switch (alg) {
/external/wpa_supplicant_8/src/ap/
H A Dap_mlme.c23 static const char * mlme_auth_alg_str(int alg) argument
25 switch (alg) {
/external/wpa_supplicant_8/wpa_supplicant/src/ap/
H A Dap_mlme.c23 static const char * mlme_auth_alg_str(int alg) argument
25 switch (alg) {
/external/smack/src/org/xbill/DNS/
H A DRRSIGRecord.java32 * @param alg The cryptographic algorithm of the key that generated the
42 RRSIGRecord(Name name, int dclass, long ttl, int covered, int alg, long origttl, argument
46 super(name, Type.RRSIG, dclass, ttl, covered, alg, origttl, expire,
H A DSIGRecord.java32 * @param alg The cryptographic algorithm of the key that generated the
42 SIGRecord(Name name, int dclass, long ttl, int covered, int alg, long origttl, argument
46 super(name, Type.SIG, dclass, ttl, covered, alg, origttl, expire,
H A DDNSKEYRecord.java52 * @param alg The key's algorithm
56 DNSKEYRecord(Name name, int dclass, long ttl, int flags, int proto, int alg, argument
59 super(name, Type.DNSKEY, dclass, ttl, flags, proto, alg, key);
66 * @param alg The key's algorithm
72 DNSKEYRecord(Name name, int dclass, long ttl, int flags, int proto, int alg, argument
75 super(name, Type.DNSKEY, dclass, ttl, flags, proto, alg,
76 DNSSEC.fromPublicKey(key, alg));
85 alg = DNSSEC.Algorithm.value(algString);
86 if (alg < 0)
H A DKEYBase.java20 protected int flags, proto, alg; field in class:KEYBase
30 int alg, byte [] key)
35 this.alg = checkU8("alg", alg);
43 alg = in.readU8();
56 sb.append(alg);
92 return alg;
117 if (alg == DNSSEC.Algorithm.RSAMD5) {
156 out.writeU8(alg);
29 KEYBase(Name name, int type, int dclass, long ttl, int flags, int proto, int alg, byte [] key) argument
[all...]
/external/wpa_supplicant_8/hostapd/src/crypto/
H A Dcrypto_internal.c18 enum crypto_hash_alg alg; member in struct:crypto_hash
31 struct crypto_hash * crypto_hash_init(enum crypto_hash_alg alg, const u8 *key, argument
43 ctx->alg = alg;
45 switch (alg) {
130 switch (ctx->alg) {
164 switch (ctx->alg) {
/external/wpa_supplicant_8/src/crypto/
H A Dcrypto_internal.c18 enum crypto_hash_alg alg; member in struct:crypto_hash
31 struct crypto_hash * crypto_hash_init(enum crypto_hash_alg alg, const u8 *key, argument
43 ctx->alg = alg;
45 switch (alg) {
130 switch (ctx->alg) {
164 switch (ctx->alg) {
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Dcrypto_internal.c18 enum crypto_hash_alg alg; member in struct:crypto_hash
31 struct crypto_hash * crypto_hash_init(enum crypto_hash_alg alg, const u8 *key, argument
43 ctx->alg = alg;
45 switch (alg) {
130 switch (ctx->alg) {
164 switch (ctx->alg) {
/external/apache-harmony/crypto/src/test/support/common/java/org/apache/harmony/crypto/tests/support/
H A DMyExemptionMechanismSpi.java101 private String alg; field in class:MyExemptionMechanismSpi.tmpKey
104 public tmpKey(String alg, byte[] enc) { argument
105 this.alg = alg;
114 return alg;
126 public tmp1Key(String alg, byte[] enc) { argument
/external/chromium_org/third_party/webrtc/base/
H A Dmessagedigest.cc37 MessageDigest* MessageDigestFactory::Create(const std::string& alg) { argument
39 MessageDigest* digest = new OpenSSLDigest(alg);
47 if (alg == DIGEST_MD5) {
49 } else if (alg == DIGEST_SHA_1) {
56 bool IsFips180DigestAlgorithm(const std::string& alg) { argument
62 return alg == DIGEST_SHA_1 ||
63 alg == DIGEST_SHA_224 ||
64 alg == DIGEST_SHA_256 ||
65 alg == DIGEST_SHA_384 ||
66 alg
75 ComputeDigest(const std::string& alg, const void* input, size_t in_len, void* output, size_t out_len) argument
90 ComputeDigest(const std::string& alg, const std::string& input, std::string* output) argument
100 ComputeDigest(const std::string& alg, const std::string& input) argument
144 ComputeHmac(const std::string& alg, const void* key, size_t key_len, const void* input, size_t in_len, void* output, size_t out_len) argument
163 ComputeHmac(const std::string& alg, const std::string& key, const std::string& input, std::string* output) argument
173 ComputeHmac(const std::string& alg, const std::string& key, const std::string& input) argument
[all...]
/external/wpa_supplicant_8/hostapd/src/drivers/
H A Ddriver_openbsd.c71 wpa_driver_openbsd_set_key(const char *ifname, void *priv, enum wpa_alg alg, argument
78 if (alg != WPA_ALG_PMK || key_len > IEEE80211_PMK_LEN)
/external/wpa_supplicant_8/src/drivers/
H A Ddriver_openbsd.c71 wpa_driver_openbsd_set_key(const char *ifname, void *priv, enum wpa_alg alg, argument
78 if (alg != WPA_ALG_PMK || key_len > IEEE80211_PMK_LEN)
/external/wpa_supplicant_8/wpa_supplicant/src/drivers/
H A Ddriver_openbsd.c71 wpa_driver_openbsd_set_key(const char *ifname, void *priv, enum wpa_alg alg, argument
78 if (alg != WPA_ALG_PMK || key_len > IEEE80211_PMK_LEN)
/external/apache-harmony/crypto/src/test/api/java/org/apache/harmony/crypto/tests/javax/crypto/
H A DSecretKeyFactoryTest.java421 public mySecretKeyFactory(SecretKeyFactorySpi spi, Provider prov, String alg) { argument
422 super(spi, prov, alg);
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/
H A DAlgorithmParameterGenerator1Test.java382 public myAlgPG(AlgorithmParameterGeneratorSpi spi, Provider prov, String alg) { argument
383 super(spi, prov, alg);
H A DKSPrivateKeyEntryTest.java188 private String alg = "My algorithm"; field in class:KSPrivateKeyEntryTest.tmpPrivateKey
191 return alg;
207 alg = algorithm;
H A DKeyFactory2Test.java71 private KeepAlive createKeepAlive(String alg) { argument
72 if (alg.equals("RSA")) {
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/java/security/
H A DKeyStore_Impl1Test.java979 public tmpKeyStore(KeyStoreSpi spi, Provider prov, String alg) { argument
980 super(spi, prov, alg);

Completed in 1435 milliseconds

1234567