Searched refs:algs (Results 1 - 24 of 24) sorted by relevance

/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/
H A DAlgorithmParameterGenerator1Test.java50 private static String[] algs = { field in class:AlgorithmParameterGenerator1Test
124 for (int i = 0; i < algs.length; i++) {
125 apg = AlgorithmParameterGenerator.getInstance(algs[i]);
126 assertEquals("Incorrect algorithm", apg.getAlgorithm(), algs[i]);
143 for (int i = 0; i < algs.length; i++) {
145 AlgorithmParameterGenerator.getInstance(algs[i], provider);
150 AlgorithmParameterGenerator.getInstance(algs[i], "");
169 for (int i = 0; i < algs.length; i++) {
172 AlgorithmParameterGenerator.getInstance(algs[i],
224 for (int i = 0; i < algs
[all...]
H A DKeyPairGenerator1Test.java53 public static String[] algs = { field in class:KeyPairGenerator1Test
127 for (int i = 0; i < algs.length; i++) {
128 kpg = KeyPairGenerator.getInstance(algs[i]);
130 algs[i].toUpperCase());
146 for (int i = 0; i < algs.length; i++) {
148 KeyPairGenerator.getInstance(algs[i], provider);
153 KeyPairGenerator.getInstance(algs[i], "");
173 for (int i = 0; i < algs.length; i++) {
176 KeyPairGenerator.getInstance(algs[i], invalidValues[j]);
178 .concat(algs[
[all...]
H A DKeyFactory2Test.java363 Vector algs = new Vector();
372 algs.addElement(algorithm.substring(KEYFACTORY_ID.length()));
376 return (String[]) algs.toArray(new String[algs.size()]);
H A DMessageDigest2Test.java440 Vector algs = new Vector();
449 algs.addElement(algorithm.substring(MESSAGEDIGEST_ID.length()));
453 return (String[]) algs.toArray(new String[algs.size()]);
/external/ipsec-tools/src/racoon/
H A Dsainfo.h57 struct sainfoalg *algs[MAXALGCLASS]; member in struct:sainfo
H A Dproposal.c647 if (sainfo->algs[algclass_ipsec_auth] == NULL) {
653 for (a = sainfo->algs[algclass_ipsec_auth]; a; a = a->next) {
674 if (sainfo->algs[algclass_ipsec_enc] == NULL) {
680 for (a = sainfo->algs[algclass_ipsec_enc]; a; a = a->next) {
681 for (b = sainfo->algs[algclass_ipsec_auth]; b; b = b->next) {
700 if (sainfo->algs[algclass_ipsec_comp] == NULL) {
706 for (a = sainfo->algs[algclass_ipsec_comp]; a; a = a->next) {
H A Dsainfo.c185 delsainfoalg(si->algs[i]);
H A Dcfparse.y1137 if (cur_sainfo->algs[algclass_ipsec_enc] == 0) {
1142 if (cur_sainfo->algs[algclass_ipsec_auth] == 0) {
1147 if (cur_sainfo->algs[algclass_ipsec_comp] == 0) {
1425 inssainfoalg(&cur_sainfo->algs[cur_algclass], $1);
1429 inssainfoalg(&cur_sainfo->algs[cur_algclass], $1);
H A Dhandler.c1198 for (alg = sainfo->algs[algclass_ipsec_auth]; alg; alg = alg->next) {
1209 for (alg = sainfo->algs[algclass_ipsec_enc];
/external/smack/src/org/xbill/DNS/
H A DDNSSEC.java67 private static Mnemonic algs = new Mnemonic("DNSSEC algorithm", field in class:DNSSEC.Algorithm
71 algs.setMaximum(0xFF);
72 algs.setNumericAllowed(true);
74 algs.add(RSAMD5, "RSAMD5");
75 algs.add(DH, "DH");
76 algs.add(DSA, "DSA");
77 algs.add(RSASHA1, "RSASHA1");
78 algs.add(DSA_NSEC3_SHA1, "DSA-NSEC3-SHA1");
79 algs.add(RSA_NSEC3_SHA1, "RSA-NSEC3-SHA1");
80 algs
[all...]
/external/openssl/crypto/cms/
H A Dcms_sd.c911 int CMS_add_smimecap(CMS_SignerInfo *si, STACK_OF(X509_ALGOR) *algs) argument
915 smderlen = i2d_X509_ALGORS(algs, &smder);
924 int CMS_add_simple_smimecap(STACK_OF(X509_ALGOR) **algs,
945 if (!*algs)
946 *algs = sk_X509_ALGOR_new_null();
947 if (!*algs || !sk_X509_ALGOR_push(*algs, alg))
H A Dcms.h273 int CMS_add_smimecap(CMS_SignerInfo *si, STACK_OF(X509_ALGOR) *algs);
274 int CMS_add_simple_smimecap(STACK_OF(X509_ALGOR) **algs,
/external/ipsec-tools/
H A Dsetup.c76 if (!sainfo.algs[class]) {
77 sainfo.algs[class] = p;
79 struct sainfoalg *q = sainfo.algs[class];
/external/wpa_supplicant_8/hostapd/src/crypto/
H A Dtls_schannel.c688 ALG_ID algs[1]; local
706 algs[0] = CALG_RSA_KEYX;
708 conn->schannel_cred.palgSupportedAlgs = algs;
/external/wpa_supplicant_8/src/crypto/
H A Dtls_schannel.c688 ALG_ID algs[1]; local
706 algs[0] = CALG_RSA_KEYX;
708 conn->schannel_cred.palgSupportedAlgs = algs;
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Dtls_schannel.c688 ALG_ID algs[1]; local
706 algs[0] = CALG_RSA_KEYX;
708 conn->schannel_cred.palgSupportedAlgs = algs;
/external/openssl/include/openssl/
H A Dcms.h273 int CMS_add_smimecap(CMS_SignerInfo *si, STACK_OF(X509_ALGOR) *algs);
274 int CMS_add_simple_smimecap(STACK_OF(X509_ALGOR) **algs,
/external/wpa_supplicant_8/hostapd/src/drivers/
H A Ddriver_wext.c2142 int algs = 0, res; local
2145 algs |= IW_AUTH_ALG_OPEN_SYSTEM;
2147 algs |= IW_AUTH_ALG_SHARED_KEY;
2149 algs |= IW_AUTH_ALG_LEAP;
2150 if (algs == 0) {
2152 algs = IW_AUTH_ALG_OPEN_SYSTEM;
2156 algs);
H A Ddriver_nl80211.c9044 int algs; local
9057 algs = 0;
9059 algs++;
9061 algs++;
9063 algs++;
9064 if (algs > 1) {
/external/wpa_supplicant_8/src/drivers/
H A Ddriver_wext.c2142 int algs = 0, res; local
2145 algs |= IW_AUTH_ALG_OPEN_SYSTEM;
2147 algs |= IW_AUTH_ALG_SHARED_KEY;
2149 algs |= IW_AUTH_ALG_LEAP;
2150 if (algs == 0) {
2152 algs = IW_AUTH_ALG_OPEN_SYSTEM;
2156 algs);
H A Ddriver_nl80211.c9044 int algs; local
9057 algs = 0;
9059 algs++;
9061 algs++;
9063 algs++;
9064 if (algs > 1) {
/external/wpa_supplicant_8/wpa_supplicant/src/drivers/
H A Ddriver_wext.c2142 int algs = 0, res; local
2145 algs |= IW_AUTH_ALG_OPEN_SYSTEM;
2147 algs |= IW_AUTH_ALG_SHARED_KEY;
2149 algs |= IW_AUTH_ALG_LEAP;
2150 if (algs == 0) {
2152 algs = IW_AUTH_ALG_OPEN_SYSTEM;
2156 algs);
H A Ddriver_nl80211.c9044 int algs; local
9057 algs = 0;
9059 algs++;
9061 algs++;
9063 algs++;
9064 if (algs > 1) {
/external/wpa_supplicant_8/wpa_supplicant/
H A Dwpa_supplicant.c1558 int algs = WPA_AUTH_ALG_OPEN; local
1646 algs = WPA_AUTH_ALG_LEAP;
1648 algs |= WPA_AUTH_ALG_LEAP;
1652 wpa_dbg(wpa_s, MSG_DEBUG, "Automatic auth_alg selection: 0x%x", algs);
1654 algs = ssid->auth_alg;
1656 "0x%x", algs);
1891 params.auth_alg = algs;

Completed in 2337 milliseconds