Searched defs:mechanism (Results 1 - 19 of 19) sorted by relevance

/external/chromium_org/content/child/webcrypto/nss/
H A Dsym_key_nss.cc24 CK_MECHANISM_TYPE mechanism,
26 DCHECK_NE(CKM_INVALID_MECHANISM, mechanism);
33 PK11_KeyGen(slot.get(), mechanism, NULL, keylen_bytes, NULL));
60 CK_MECHANISM_TYPE mechanism,
69 mechanism,
20 GenerateSecretKeyNss(const blink::WebCryptoKeyAlgorithm& algorithm, bool extractable, blink::WebCryptoKeyUsageMask usage_mask, unsigned keylen_bytes, CK_MECHANISM_TYPE mechanism, blink::WebCryptoKey* key) argument
56 ImportKeyRawNss(const CryptoData& key_data, const blink::WebCryptoKeyAlgorithm& algorithm, bool extractable, blink::WebCryptoKeyUsageMask usage_mask, CK_MECHANISM_TYPE mechanism, CK_FLAGS flags, blink::WebCryptoKey* key) argument
H A Daes_kw_nss.cc34 CK_MECHANISM_TYPE mechanism,
63 mechanism,
32 DoUnwrapSymKeyAesKw(const CryptoData& wrapped_key_data, PK11SymKey* wrapping_key, CK_MECHANISM_TYPE mechanism, CK_FLAGS flags, crypto::ScopedPK11SymKey* unwrapped_key) argument
H A Dhmac_nss.cc35 CK_MECHANISM_TYPE* mechanism) {
38 *mechanism = CKM_SHA_1_HMAC;
41 *mechanism = CKM_SHA256_HMAC;
44 *mechanism = CKM_SHA384_HMAC;
47 *mechanism = CKM_SHA512_HMAC;
66 CK_MECHANISM_TYPE mechanism = CKM_INVALID_MECHANISM; variable
67 if (!WebCryptoHashToHMACMechanism(hash, &mechanism))
80 mechanism,
109 CK_MECHANISM_TYPE mechanism = CKM_INVALID_MECHANISM; variable
110 if (!WebCryptoHashToHMACMechanism(hash, &mechanism))
34 WebCryptoHashToHMACMechanism(const blink::WebCryptoAlgorithm& algorithm, CK_MECHANISM_TYPE* mechanism) argument
182 CK_MECHANISM_TYPE mechanism = CKM_INVALID_MECHANISM; variable
[all...]
/external/chromium_org/third_party/libjingle/source/talk/xmpp/
H A Dsaslcookiemechanism.h41 SaslCookieMechanism(const std::string & mechanism, argument
45 : mechanism_(mechanism),
50 SaslCookieMechanism(const std::string & mechanism, argument
53 : mechanism_(mechanism),
H A Dplainsaslhandler.h63 // Creates a SaslMechanism for the given mechanism name (you own it
65 virtual SaslMechanism * CreateSaslMechanism(const std::string & mechanism) { argument
66 if (mechanism == "PLAIN") {
H A Dxmppauth.cc87 // No good mechanism found
92 const std::string& mechanism) {
93 if (mechanism == buzz::AUTH_MECHANISM_OAUTH2) {
95 mechanism, jid_.Str(), auth_token_, "oauth2");
96 } else if (mechanism == buzz::AUTH_MECHANISM_GOOGLE_TOKEN) {
97 return new buzz::SaslCookieMechanism(mechanism, jid_.Str(), auth_token_);
98 // } else if (mechanism == buzz::AUTH_MECHANISM_GOOGLE_COOKIE) {
99 // return new buzz::SaslCookieMechanism(mechanism, jid.Str(), sid_);
100 } else if (mechanism == buzz::AUTH_MECHANISM_PLAIN) {
91 CreateSaslMechanism( const std::string& mechanism) argument
H A Dxmppclientsettings.h47 void set_auth_token(const std::string& mechanism, argument
49 auth_mechanism_ = mechanism;
/external/apache-harmony/crypto/src/test/impl/java/org/apache/harmony/crypto/tests/javax/crypto/
H A DExemptionMechanism_ImplTest.java288 public myEM(ExemptionMechanismSpi spi, Provider prov, String mechanism) { argument
289 super(spi, prov, mechanism);
/external/chromium_org/jingle/notifier/base/
H A Dgaia_token_pre_xmpp_auth.cc21 GaiaCookieMechanism(const std::string & mechanism, argument
26 mechanism, username, cookie, token_service) {}
111 const std::string& mechanism) {
112 if (mechanism == auth_mechanism_)
114 mechanism, username_, token_, token_service_);
110 CreateSaslMechanism( const std::string& mechanism) argument
/external/chromium_org/net/quic/crypto/
H A Daes_128_gcm_12_decrypter_nss.cc48 // necessary function (PK11_Decrypt) or mechanism support (CKM_AES_GCM).
70 CK_MECHANISM_TYPE mechanism,
82 return pk11_decrypt_func(key, mechanism, param, out, out_len, max_len, enc,
93 DCHECK_EQ(mechanism, static_cast<CK_MECHANISM_TYPE>(CKM_AES_GCM));
69 My_Decrypt(PK11SymKey* key, CK_MECHANISM_TYPE mechanism, SECItem* param, unsigned char* out, unsigned int* out_len, unsigned int max_len, const unsigned char* enc, unsigned int enc_len) argument
H A Daes_128_gcm_12_encrypter_nss.cc48 // necessary function (PK11_Encrypt) or mechanism support (CKM_AES_GCM).
70 CK_MECHANISM_TYPE mechanism,
82 return pk11_encrypt_func(key, mechanism, param, out, out_len, max_len, data,
93 DCHECK_EQ(mechanism, static_cast<CK_MECHANISM_TYPE>(CKM_AES_GCM));
69 My_Encrypt(PK11SymKey* key, CK_MECHANISM_TYPE mechanism, SECItem* param, unsigned char* out, unsigned int* out_len, unsigned int max_len, const unsigned char* data, unsigned int data_len) argument
/external/smack/asmack-master/static-src/custom/de/measite/smack/
H A DSasl.java71 public static SaslServer createSaslServer(String mechanism, String protocol, argument
73 return org.apache.harmony.javax.security.sasl.Sasl.createSaslServer(mechanism, protocol, serverName, prop, cbh);
/external/smack/src/de/measite/smack/
H A DSasl.java71 public static SaslServer createSaslServer(String mechanism, String protocol, argument
73 return org.apache.harmony.javax.security.sasl.Sasl.createSaslServer(mechanism, protocol, serverName, prop, cbh);
/external/smack/src/org/apache/harmony/javax/security/sasl/
H A DSasl.java134 public static SaslServer createSaslServer(String mechanism, String protocol, argument
136 if (mechanism == null) {
151 if (mech[j].equals(mechanism)) {
158 SaslServer saslS = fact.createSaslServer(mechanism, protocol, serverName, prop,
/external/chromium_org/remoting/signaling/
H A Dxmpp_signal_strategy.cc248 std::string mechanism = notifier::kDefaultGaiaAuthMechanism; local
250 mechanism = "X-OAUTH2";
254 jid.Str(), settings.auth_token(), settings.token_service(), mechanism);
/external/chromium_org/net/third_party/nss/ssl/
H A Dsslcon.c60 CK_MECHANISM_TYPE mechanism; member in struct:ssl2SpecsStr
1401 CK_MECHANISM_TYPE mechanism; local
1459 mechanism = ssl_Specs[cipherType].mechanism;
1463 slot = PK11_GetBestSlot(mechanism, ss->pkcs11PinArg);
1467 param = PK11_ParamFromIV(mechanism, &sid->u.ssl2.cipherArg);
1470 readcx = PK11_CreateContextByRawKey(slot, mechanism, PK11_OriginUnwrap,
1478 param = PK11_ParamFromIV(mechanism, &sid->u.ssl2.cipherArg);
1481 writecx = PK11_CreateContextByRawKey(slot, mechanism, PK11_OriginUnwrap,
H A Dssl3con.c1872 PK11SymKey *symKey, CK_MECHANISM_TYPE mechanism, SECItem *param,
2121 CK_MECHANISM_TYPE mechanism; local
2189 mechanism = alg2Mech[calg].cmech;
2197 param = ssl3_ParamFromIV(mechanism, &iv, effKeyBits);
2202 serverContext = PK11_CreateContextBySymKey(mechanism,
2205 iv.data = PK11_IVFromParam(mechanism, param, (int *)&iv.len);
2220 param = ssl3_ParamFromIV(mechanism, &iv, effKeyBits);
2225 clientContext = PK11_CreateContextBySymKey(mechanism,
2228 iv.data = PK11_IVFromParam(mechanism, param, (int *)&iv.len);
3938 /* we really should use the actual mac'ing mechanism her
11028 CK_MECHANISM_TYPE mechanism = CKM_INVALID_MECHANISM; local
[all...]
/external/chromium_org/third_party/libaddressinput/src/java/
H A Dandroid.jarMETA-INF/ META-INF/MANIFEST.MF AndroidManifest.xml android/ android/Manifest$permission.class ...
/external/robolectric/lib/main/
H A Dandroid.jarMETA-INF/ META-INF/MANIFEST.MF com/ com/android/ com/android/internal/ com/android/internal/util/ ...

Completed in 369 milliseconds