/external/chromium_org/content/child/webcrypto/nss/ |
H A D | sym_key_nss.cc | 24 CK_MECHANISM_TYPE mechanism, 26 DCHECK_NE(CKM_INVALID_MECHANISM, mechanism); 33 PK11_KeyGen(slot.get(), mechanism, NULL, keylen_bytes, NULL)); 60 CK_MECHANISM_TYPE mechanism, 69 mechanism, 20 GenerateSecretKeyNss(const blink::WebCryptoKeyAlgorithm& algorithm, bool extractable, blink::WebCryptoKeyUsageMask usage_mask, unsigned keylen_bytes, CK_MECHANISM_TYPE mechanism, blink::WebCryptoKey* key) argument 56 ImportKeyRawNss(const CryptoData& key_data, const blink::WebCryptoKeyAlgorithm& algorithm, bool extractable, blink::WebCryptoKeyUsageMask usage_mask, CK_MECHANISM_TYPE mechanism, CK_FLAGS flags, blink::WebCryptoKey* key) argument
|
H A D | aes_kw_nss.cc | 34 CK_MECHANISM_TYPE mechanism, 63 mechanism, 32 DoUnwrapSymKeyAesKw(const CryptoData& wrapped_key_data, PK11SymKey* wrapping_key, CK_MECHANISM_TYPE mechanism, CK_FLAGS flags, crypto::ScopedPK11SymKey* unwrapped_key) argument
|
H A D | hmac_nss.cc | 35 CK_MECHANISM_TYPE* mechanism) { 38 *mechanism = CKM_SHA_1_HMAC; 41 *mechanism = CKM_SHA256_HMAC; 44 *mechanism = CKM_SHA384_HMAC; 47 *mechanism = CKM_SHA512_HMAC; 66 CK_MECHANISM_TYPE mechanism = CKM_INVALID_MECHANISM; variable 67 if (!WebCryptoHashToHMACMechanism(hash, &mechanism)) 80 mechanism, 109 CK_MECHANISM_TYPE mechanism = CKM_INVALID_MECHANISM; variable 110 if (!WebCryptoHashToHMACMechanism(hash, &mechanism)) 34 WebCryptoHashToHMACMechanism(const blink::WebCryptoAlgorithm& algorithm, CK_MECHANISM_TYPE* mechanism) argument 182 CK_MECHANISM_TYPE mechanism = CKM_INVALID_MECHANISM; variable [all...] |
/external/chromium_org/third_party/libjingle/source/talk/xmpp/ |
H A D | saslcookiemechanism.h | 41 SaslCookieMechanism(const std::string & mechanism, argument 45 : mechanism_(mechanism), 50 SaslCookieMechanism(const std::string & mechanism, argument 53 : mechanism_(mechanism),
|
H A D | plainsaslhandler.h | 63 // Creates a SaslMechanism for the given mechanism name (you own it 65 virtual SaslMechanism * CreateSaslMechanism(const std::string & mechanism) { argument 66 if (mechanism == "PLAIN") {
|
H A D | xmppauth.cc | 87 // No good mechanism found 92 const std::string& mechanism) { 93 if (mechanism == buzz::AUTH_MECHANISM_OAUTH2) { 95 mechanism, jid_.Str(), auth_token_, "oauth2"); 96 } else if (mechanism == buzz::AUTH_MECHANISM_GOOGLE_TOKEN) { 97 return new buzz::SaslCookieMechanism(mechanism, jid_.Str(), auth_token_); 98 // } else if (mechanism == buzz::AUTH_MECHANISM_GOOGLE_COOKIE) { 99 // return new buzz::SaslCookieMechanism(mechanism, jid.Str(), sid_); 100 } else if (mechanism == buzz::AUTH_MECHANISM_PLAIN) { 91 CreateSaslMechanism( const std::string& mechanism) argument
|
H A D | xmppclientsettings.h | 47 void set_auth_token(const std::string& mechanism, argument 49 auth_mechanism_ = mechanism;
|
/external/apache-harmony/crypto/src/test/impl/java/org/apache/harmony/crypto/tests/javax/crypto/ |
H A D | ExemptionMechanism_ImplTest.java | 288 public myEM(ExemptionMechanismSpi spi, Provider prov, String mechanism) { argument 289 super(spi, prov, mechanism);
|
/external/chromium_org/jingle/notifier/base/ |
H A D | gaia_token_pre_xmpp_auth.cc | 21 GaiaCookieMechanism(const std::string & mechanism, argument 26 mechanism, username, cookie, token_service) {} 111 const std::string& mechanism) { 112 if (mechanism == auth_mechanism_) 114 mechanism, username_, token_, token_service_); 110 CreateSaslMechanism( const std::string& mechanism) argument
|
/external/chromium_org/net/quic/crypto/ |
H A D | aes_128_gcm_12_decrypter_nss.cc | 48 // necessary function (PK11_Decrypt) or mechanism support (CKM_AES_GCM). 70 CK_MECHANISM_TYPE mechanism, 82 return pk11_decrypt_func(key, mechanism, param, out, out_len, max_len, enc, 93 DCHECK_EQ(mechanism, static_cast<CK_MECHANISM_TYPE>(CKM_AES_GCM)); 69 My_Decrypt(PK11SymKey* key, CK_MECHANISM_TYPE mechanism, SECItem* param, unsigned char* out, unsigned int* out_len, unsigned int max_len, const unsigned char* enc, unsigned int enc_len) argument
|
H A D | aes_128_gcm_12_encrypter_nss.cc | 48 // necessary function (PK11_Encrypt) or mechanism support (CKM_AES_GCM). 70 CK_MECHANISM_TYPE mechanism, 82 return pk11_encrypt_func(key, mechanism, param, out, out_len, max_len, data, 93 DCHECK_EQ(mechanism, static_cast<CK_MECHANISM_TYPE>(CKM_AES_GCM)); 69 My_Encrypt(PK11SymKey* key, CK_MECHANISM_TYPE mechanism, SECItem* param, unsigned char* out, unsigned int* out_len, unsigned int max_len, const unsigned char* data, unsigned int data_len) argument
|
/external/smack/asmack-master/static-src/custom/de/measite/smack/ |
H A D | Sasl.java | 71 public static SaslServer createSaslServer(String mechanism, String protocol, argument 73 return org.apache.harmony.javax.security.sasl.Sasl.createSaslServer(mechanism, protocol, serverName, prop, cbh);
|
/external/smack/src/de/measite/smack/ |
H A D | Sasl.java | 71 public static SaslServer createSaslServer(String mechanism, String protocol, argument 73 return org.apache.harmony.javax.security.sasl.Sasl.createSaslServer(mechanism, protocol, serverName, prop, cbh);
|
/external/smack/src/org/apache/harmony/javax/security/sasl/ |
H A D | Sasl.java | 134 public static SaslServer createSaslServer(String mechanism, String protocol, argument 136 if (mechanism == null) { 151 if (mech[j].equals(mechanism)) { 158 SaslServer saslS = fact.createSaslServer(mechanism, protocol, serverName, prop,
|
/external/chromium_org/remoting/signaling/ |
H A D | xmpp_signal_strategy.cc | 248 std::string mechanism = notifier::kDefaultGaiaAuthMechanism; local 250 mechanism = "X-OAUTH2"; 254 jid.Str(), settings.auth_token(), settings.token_service(), mechanism);
|
/external/chromium_org/net/third_party/nss/ssl/ |
H A D | sslcon.c | 60 CK_MECHANISM_TYPE mechanism; member in struct:ssl2SpecsStr 1401 CK_MECHANISM_TYPE mechanism; local 1459 mechanism = ssl_Specs[cipherType].mechanism; 1463 slot = PK11_GetBestSlot(mechanism, ss->pkcs11PinArg); 1467 param = PK11_ParamFromIV(mechanism, &sid->u.ssl2.cipherArg); 1470 readcx = PK11_CreateContextByRawKey(slot, mechanism, PK11_OriginUnwrap, 1478 param = PK11_ParamFromIV(mechanism, &sid->u.ssl2.cipherArg); 1481 writecx = PK11_CreateContextByRawKey(slot, mechanism, PK11_OriginUnwrap,
|
H A D | ssl3con.c | 1872 PK11SymKey *symKey, CK_MECHANISM_TYPE mechanism, SECItem *param, 2121 CK_MECHANISM_TYPE mechanism; local 2189 mechanism = alg2Mech[calg].cmech; 2197 param = ssl3_ParamFromIV(mechanism, &iv, effKeyBits); 2202 serverContext = PK11_CreateContextBySymKey(mechanism, 2205 iv.data = PK11_IVFromParam(mechanism, param, (int *)&iv.len); 2220 param = ssl3_ParamFromIV(mechanism, &iv, effKeyBits); 2225 clientContext = PK11_CreateContextBySymKey(mechanism, 2228 iv.data = PK11_IVFromParam(mechanism, param, (int *)&iv.len); 3938 /* we really should use the actual mac'ing mechanism her 11028 CK_MECHANISM_TYPE mechanism = CKM_INVALID_MECHANISM; local [all...] |
/external/chromium_org/third_party/libaddressinput/src/java/ |
H A D | android.jar | META-INF/ META-INF/MANIFEST.MF AndroidManifest.xml android/ android/Manifest$permission.class ... |
/external/robolectric/lib/main/ |
H A D | android.jar | META-INF/ META-INF/MANIFEST.MF com/ com/android/ com/android/internal/ com/android/internal/util/ ... |