/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
H A D | AlgorithmParameterGenerator1Test.java | 50 private static String[] algs = { field in class:AlgorithmParameterGenerator1Test 124 for (int i = 0; i < algs.length; i++) { 125 apg = AlgorithmParameterGenerator.getInstance(algs[i]); 126 assertEquals("Incorrect algorithm", apg.getAlgorithm(), algs[i]); 143 for (int i = 0; i < algs.length; i++) { 145 AlgorithmParameterGenerator.getInstance(algs[i], provider); 150 AlgorithmParameterGenerator.getInstance(algs[i], ""); 169 for (int i = 0; i < algs.length; i++) { 172 AlgorithmParameterGenerator.getInstance(algs[i], 224 for (int i = 0; i < algs [all...] |
H A D | KeyPairGenerator1Test.java | 53 public static String[] algs = { field in class:KeyPairGenerator1Test 127 for (int i = 0; i < algs.length; i++) { 128 kpg = KeyPairGenerator.getInstance(algs[i]); 130 algs[i].toUpperCase()); 146 for (int i = 0; i < algs.length; i++) { 148 KeyPairGenerator.getInstance(algs[i], provider); 153 KeyPairGenerator.getInstance(algs[i], ""); 173 for (int i = 0; i < algs.length; i++) { 176 KeyPairGenerator.getInstance(algs[i], invalidValues[j]); 178 .concat(algs[ [all...] |
H A D | KeyFactory2Test.java | 363 Vector algs = new Vector(); 372 algs.addElement(algorithm.substring(KEYFACTORY_ID.length())); 376 return (String[]) algs.toArray(new String[algs.size()]);
|
H A D | MessageDigest2Test.java | 440 Vector algs = new Vector(); 449 algs.addElement(algorithm.substring(MESSAGEDIGEST_ID.length())); 453 return (String[]) algs.toArray(new String[algs.size()]);
|
/external/ipsec-tools/src/racoon/ |
H A D | sainfo.h | 57 struct sainfoalg *algs[MAXALGCLASS]; member in struct:sainfo
|
H A D | proposal.c | 647 if (sainfo->algs[algclass_ipsec_auth] == NULL) { 653 for (a = sainfo->algs[algclass_ipsec_auth]; a; a = a->next) { 674 if (sainfo->algs[algclass_ipsec_enc] == NULL) { 680 for (a = sainfo->algs[algclass_ipsec_enc]; a; a = a->next) { 681 for (b = sainfo->algs[algclass_ipsec_auth]; b; b = b->next) { 700 if (sainfo->algs[algclass_ipsec_comp] == NULL) { 706 for (a = sainfo->algs[algclass_ipsec_comp]; a; a = a->next) {
|
H A D | sainfo.c | 185 delsainfoalg(si->algs[i]);
|
H A D | cfparse.y | 1137 if (cur_sainfo->algs[algclass_ipsec_enc] == 0) { 1142 if (cur_sainfo->algs[algclass_ipsec_auth] == 0) { 1147 if (cur_sainfo->algs[algclass_ipsec_comp] == 0) { 1425 inssainfoalg(&cur_sainfo->algs[cur_algclass], $1); 1429 inssainfoalg(&cur_sainfo->algs[cur_algclass], $1);
|
H A D | handler.c | 1198 for (alg = sainfo->algs[algclass_ipsec_auth]; alg; alg = alg->next) { 1209 for (alg = sainfo->algs[algclass_ipsec_enc];
|
/external/smack/src/org/xbill/DNS/ |
H A D | DNSSEC.java | 67 private static Mnemonic algs = new Mnemonic("DNSSEC algorithm", field in class:DNSSEC.Algorithm 71 algs.setMaximum(0xFF); 72 algs.setNumericAllowed(true); 74 algs.add(RSAMD5, "RSAMD5"); 75 algs.add(DH, "DH"); 76 algs.add(DSA, "DSA"); 77 algs.add(RSASHA1, "RSASHA1"); 78 algs.add(DSA_NSEC3_SHA1, "DSA-NSEC3-SHA1"); 79 algs.add(RSA_NSEC3_SHA1, "RSA-NSEC3-SHA1"); 80 algs [all...] |
/external/openssl/crypto/cms/ |
H A D | cms_sd.c | 911 int CMS_add_smimecap(CMS_SignerInfo *si, STACK_OF(X509_ALGOR) *algs) argument 915 smderlen = i2d_X509_ALGORS(algs, &smder); 924 int CMS_add_simple_smimecap(STACK_OF(X509_ALGOR) **algs, 945 if (!*algs) 946 *algs = sk_X509_ALGOR_new_null(); 947 if (!*algs || !sk_X509_ALGOR_push(*algs, alg))
|
H A D | cms.h | 273 int CMS_add_smimecap(CMS_SignerInfo *si, STACK_OF(X509_ALGOR) *algs); 274 int CMS_add_simple_smimecap(STACK_OF(X509_ALGOR) **algs,
|
/external/ipsec-tools/ |
H A D | setup.c | 76 if (!sainfo.algs[class]) { 77 sainfo.algs[class] = p; 79 struct sainfoalg *q = sainfo.algs[class];
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | tls_schannel.c | 688 ALG_ID algs[1]; local 706 algs[0] = CALG_RSA_KEYX; 708 conn->schannel_cred.palgSupportedAlgs = algs;
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | tls_schannel.c | 688 ALG_ID algs[1]; local 706 algs[0] = CALG_RSA_KEYX; 708 conn->schannel_cred.palgSupportedAlgs = algs;
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | tls_schannel.c | 688 ALG_ID algs[1]; local 706 algs[0] = CALG_RSA_KEYX; 708 conn->schannel_cred.palgSupportedAlgs = algs;
|
/external/openssl/include/openssl/ |
H A D | cms.h | 273 int CMS_add_smimecap(CMS_SignerInfo *si, STACK_OF(X509_ALGOR) *algs); 274 int CMS_add_simple_smimecap(STACK_OF(X509_ALGOR) **algs,
|
/external/wpa_supplicant_8/hostapd/src/drivers/ |
H A D | driver_wext.c | 2142 int algs = 0, res; local 2145 algs |= IW_AUTH_ALG_OPEN_SYSTEM; 2147 algs |= IW_AUTH_ALG_SHARED_KEY; 2149 algs |= IW_AUTH_ALG_LEAP; 2150 if (algs == 0) { 2152 algs = IW_AUTH_ALG_OPEN_SYSTEM; 2156 algs);
|
H A D | driver_nl80211.c | 9044 int algs; local 9057 algs = 0; 9059 algs++; 9061 algs++; 9063 algs++; 9064 if (algs > 1) {
|
/external/wpa_supplicant_8/src/drivers/ |
H A D | driver_wext.c | 2142 int algs = 0, res; local 2145 algs |= IW_AUTH_ALG_OPEN_SYSTEM; 2147 algs |= IW_AUTH_ALG_SHARED_KEY; 2149 algs |= IW_AUTH_ALG_LEAP; 2150 if (algs == 0) { 2152 algs = IW_AUTH_ALG_OPEN_SYSTEM; 2156 algs);
|
H A D | driver_nl80211.c | 9044 int algs; local 9057 algs = 0; 9059 algs++; 9061 algs++; 9063 algs++; 9064 if (algs > 1) {
|
/external/wpa_supplicant_8/wpa_supplicant/src/drivers/ |
H A D | driver_wext.c | 2142 int algs = 0, res; local 2145 algs |= IW_AUTH_ALG_OPEN_SYSTEM; 2147 algs |= IW_AUTH_ALG_SHARED_KEY; 2149 algs |= IW_AUTH_ALG_LEAP; 2150 if (algs == 0) { 2152 algs = IW_AUTH_ALG_OPEN_SYSTEM; 2156 algs);
|
H A D | driver_nl80211.c | 9044 int algs; local 9057 algs = 0; 9059 algs++; 9061 algs++; 9063 algs++; 9064 if (algs > 1) {
|
/external/wpa_supplicant_8/wpa_supplicant/ |
H A D | wpa_supplicant.c | 1558 int algs = WPA_AUTH_ALG_OPEN; local 1646 algs = WPA_AUTH_ALG_LEAP; 1648 algs |= WPA_AUTH_ALG_LEAP; 1652 wpa_dbg(wpa_s, MSG_DEBUG, "Automatic auth_alg selection: 0x%x", algs); 1654 algs = ssid->auth_alg; 1656 "0x%x", algs); 1891 params.auth_alg = algs;
|