/external/chromium_org/net/cert/ |
H A D | ct_log_verifier_openssl.cc | 20 const EVP_MD* GetEvpAlg(ct::DigitallySigned::HashAlgorithm alg) { argument 21 switch (alg) {
|
H A D | ct_log_verifier_nss.cc | 23 SECOidTag GetNSSSigAlg(ct::DigitallySigned::SignatureAlgorithm alg) { argument 24 switch (alg) { 38 SECOidTag GetNSSHashAlg(ct::DigitallySigned::HashAlgorithm alg) { argument 39 switch (alg) {
|
/external/ipsec-tools/src/racoon/ |
H A D | sainfo.h | 66 int alg; member in struct:sainfoalg
|
/external/openssl/crypto/engine/ |
H A D | eng_fat.c | 103 static int int_def_cb(const char *alg, int len, void *arg) argument 106 if (!strncmp(alg, "ALL", len)) 108 else if (!strncmp(alg, "RSA", len)) 110 else if (!strncmp(alg, "DSA", len)) 112 else if (!strncmp(alg, "ECDH", len)) 114 else if (!strncmp(alg, "ECDSA", len)) 116 else if (!strncmp(alg, "DH", len)) 118 else if (!strncmp(alg, "RAND", len)) 120 else if (!strncmp(alg, "CIPHERS", len)) 122 else if (!strncmp(alg, "DIGEST [all...] |
/external/openssl/crypto/pkcs7/ |
H A D | pk7_attr.c | 99 X509_ALGOR *alg; local 101 if(!(alg = X509_ALGOR_new())) { 105 ASN1_OBJECT_free(alg->algorithm); 106 alg->algorithm = OBJ_nid2obj (nid); 109 if(!(alg->parameter = ASN1_TYPE_new())) { 121 alg->parameter->value.integer = nbit; 122 alg->parameter->type = V_ASN1_INTEGER; 124 sk_X509_ALGOR_push (sk, alg);
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | ap_mlme.c | 23 static const char * mlme_auth_alg_str(int alg) argument 25 switch (alg) {
|
/external/wpa_supplicant_8/src/ap/ |
H A D | ap_mlme.c | 23 static const char * mlme_auth_alg_str(int alg) argument 25 switch (alg) {
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | ap_mlme.c | 23 static const char * mlme_auth_alg_str(int alg) argument 25 switch (alg) {
|
/external/smack/src/org/xbill/DNS/ |
H A D | RRSIGRecord.java | 32 * @param alg The cryptographic algorithm of the key that generated the 42 RRSIGRecord(Name name, int dclass, long ttl, int covered, int alg, long origttl, argument 46 super(name, Type.RRSIG, dclass, ttl, covered, alg, origttl, expire,
|
H A D | SIGRecord.java | 32 * @param alg The cryptographic algorithm of the key that generated the 42 SIGRecord(Name name, int dclass, long ttl, int covered, int alg, long origttl, argument 46 super(name, Type.SIG, dclass, ttl, covered, alg, origttl, expire,
|
H A D | DNSKEYRecord.java | 52 * @param alg The key's algorithm 56 DNSKEYRecord(Name name, int dclass, long ttl, int flags, int proto, int alg, argument 59 super(name, Type.DNSKEY, dclass, ttl, flags, proto, alg, key); 66 * @param alg The key's algorithm 72 DNSKEYRecord(Name name, int dclass, long ttl, int flags, int proto, int alg, argument 75 super(name, Type.DNSKEY, dclass, ttl, flags, proto, alg, 76 DNSSEC.fromPublicKey(key, alg)); 85 alg = DNSSEC.Algorithm.value(algString); 86 if (alg < 0)
|
H A D | KEYBase.java | 20 protected int flags, proto, alg; field in class:KEYBase 30 int alg, byte [] key) 35 this.alg = checkU8("alg", alg); 43 alg = in.readU8(); 56 sb.append(alg); 92 return alg; 117 if (alg == DNSSEC.Algorithm.RSAMD5) { 156 out.writeU8(alg); 29 KEYBase(Name name, int type, int dclass, long ttl, int flags, int proto, int alg, byte [] key) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | crypto_internal.c | 18 enum crypto_hash_alg alg; member in struct:crypto_hash 31 struct crypto_hash * crypto_hash_init(enum crypto_hash_alg alg, const u8 *key, argument 43 ctx->alg = alg; 45 switch (alg) { 130 switch (ctx->alg) { 164 switch (ctx->alg) {
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | crypto_internal.c | 18 enum crypto_hash_alg alg; member in struct:crypto_hash 31 struct crypto_hash * crypto_hash_init(enum crypto_hash_alg alg, const u8 *key, argument 43 ctx->alg = alg; 45 switch (alg) { 130 switch (ctx->alg) { 164 switch (ctx->alg) {
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | crypto_internal.c | 18 enum crypto_hash_alg alg; member in struct:crypto_hash 31 struct crypto_hash * crypto_hash_init(enum crypto_hash_alg alg, const u8 *key, argument 43 ctx->alg = alg; 45 switch (alg) { 130 switch (ctx->alg) { 164 switch (ctx->alg) {
|
/external/apache-harmony/crypto/src/test/support/common/java/org/apache/harmony/crypto/tests/support/ |
H A D | MyExemptionMechanismSpi.java | 101 private String alg; field in class:MyExemptionMechanismSpi.tmpKey 104 public tmpKey(String alg, byte[] enc) { argument 105 this.alg = alg; 114 return alg; 126 public tmp1Key(String alg, byte[] enc) { argument
|
/external/chromium_org/third_party/webrtc/base/ |
H A D | messagedigest.cc | 37 MessageDigest* MessageDigestFactory::Create(const std::string& alg) { argument 39 MessageDigest* digest = new OpenSSLDigest(alg); 47 if (alg == DIGEST_MD5) { 49 } else if (alg == DIGEST_SHA_1) { 56 bool IsFips180DigestAlgorithm(const std::string& alg) { argument 62 return alg == DIGEST_SHA_1 || 63 alg == DIGEST_SHA_224 || 64 alg == DIGEST_SHA_256 || 65 alg == DIGEST_SHA_384 || 66 alg 75 ComputeDigest(const std::string& alg, const void* input, size_t in_len, void* output, size_t out_len) argument 90 ComputeDigest(const std::string& alg, const std::string& input, std::string* output) argument 100 ComputeDigest(const std::string& alg, const std::string& input) argument 144 ComputeHmac(const std::string& alg, const void* key, size_t key_len, const void* input, size_t in_len, void* output, size_t out_len) argument 163 ComputeHmac(const std::string& alg, const std::string& key, const std::string& input, std::string* output) argument 173 ComputeHmac(const std::string& alg, const std::string& key, const std::string& input) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/drivers/ |
H A D | driver_openbsd.c | 71 wpa_driver_openbsd_set_key(const char *ifname, void *priv, enum wpa_alg alg, argument 78 if (alg != WPA_ALG_PMK || key_len > IEEE80211_PMK_LEN)
|
/external/wpa_supplicant_8/src/drivers/ |
H A D | driver_openbsd.c | 71 wpa_driver_openbsd_set_key(const char *ifname, void *priv, enum wpa_alg alg, argument 78 if (alg != WPA_ALG_PMK || key_len > IEEE80211_PMK_LEN)
|
/external/wpa_supplicant_8/wpa_supplicant/src/drivers/ |
H A D | driver_openbsd.c | 71 wpa_driver_openbsd_set_key(const char *ifname, void *priv, enum wpa_alg alg, argument 78 if (alg != WPA_ALG_PMK || key_len > IEEE80211_PMK_LEN)
|
/external/apache-harmony/crypto/src/test/api/java/org/apache/harmony/crypto/tests/javax/crypto/ |
H A D | SecretKeyFactoryTest.java | 421 public mySecretKeyFactory(SecretKeyFactorySpi spi, Provider prov, String alg) { argument 422 super(spi, prov, alg);
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
H A D | AlgorithmParameterGenerator1Test.java | 382 public myAlgPG(AlgorithmParameterGeneratorSpi spi, Provider prov, String alg) { argument 383 super(spi, prov, alg);
|
H A D | KSPrivateKeyEntryTest.java | 188 private String alg = "My algorithm"; field in class:KSPrivateKeyEntryTest.tmpPrivateKey 191 return alg; 207 alg = algorithm;
|
H A D | KeyFactory2Test.java | 71 private KeepAlive createKeepAlive(String alg) { argument 72 if (alg.equals("RSA")) {
|
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/java/security/ |
H A D | KeyStore_Impl1Test.java | 979 public tmpKeyStore(KeyStoreSpi spi, Provider prov, String alg) { argument 980 super(spi, prov, alg);
|