/external/boringssl/src/crypto/x509/ |
H A D | x_algor.c | 78 int X509_ALGOR_set0(X509_ALGOR *alg, const ASN1_OBJECT *aobj, int ptype, void *pval) 80 if (!alg) 84 if (alg->parameter == NULL) 85 alg->parameter = ASN1_TYPE_new(); 86 if (alg->parameter == NULL) 89 if (alg) 91 if (alg->algorithm) 92 ASN1_OBJECT_free(alg->algorithm); 93 alg->algorithm = (ASN1_OBJECT*) aobj; 99 if (alg [all...] |
/external/openssh/ |
H A D | digest-openssl.c | 45 int alg; member in struct:ssh_digest_ctx 68 ssh_digest_by_alg(int alg) argument 70 if (alg < 0 || alg >= SSH_DIGEST_MAX) 72 if (digests[alg].id != alg) /* sanity */ 74 if (digests[alg].mdfunc == NULL) 76 return &(digests[alg]); 82 int alg; local 84 for (alg 92 ssh_digest_alg_name(int alg) argument 100 ssh_digest_bytes(int alg) argument 114 ssh_digest_start(int alg) argument 183 ssh_digest_memory(int alg, const void *m, size_t mlen, u_char *d, size_t dlen) argument 201 ssh_digest_buffer(int alg, const struct sshbuf *b, u_char *d, size_t dlen) argument [all...] |
H A D | digest-libc.c | 44 int alg; member in struct:ssh_digest_ctx 124 ssh_digest_by_alg(int alg) argument 126 if (alg < 0 || alg >= SSH_DIGEST_MAX) 128 if (digests[alg].id != alg) /* sanity */ 130 return &(digests[alg]); 136 int alg; local 138 for (alg = 0; alg < SSH_DIGEST_MA 146 ssh_digest_alg_name(int alg) argument 154 ssh_digest_bytes(int alg) argument 170 ssh_digest_start(int alg) argument 246 ssh_digest_memory(int alg, const void *m, size_t mlen, u_char *d, size_t dlen) argument 260 ssh_digest_buffer(int alg, const struct sshbuf *b, u_char *d, size_t dlen) argument [all...] |
H A D | digest.h | 40 const char *ssh_digest_alg_name(int alg); 43 size_t ssh_digest_bytes(int alg); 53 int ssh_digest_memory(int alg, const void *m, size_t mlen, 57 int ssh_digest_buffer(int alg, const struct sshbuf *b, u_char *d, size_t dlen) 61 struct ssh_digest_ctx *ssh_digest_start(int alg);
|
H A D | hmac.h | 22 size_t ssh_hmac_bytes(int alg); 26 struct ssh_hmac_ctx *ssh_hmac_start(int alg);
|
H A D | hmac.c | 28 int alg; member in struct:ssh_hmac_ctx 37 ssh_hmac_bytes(int alg) argument 39 return ssh_digest_bytes(alg); 43 ssh_hmac_start(int alg) argument 49 ret->alg = alg; 50 if ((ret->ictx = ssh_digest_start(alg)) == NULL || 51 (ret->octx = ssh_digest_start(alg)) == NULL || 52 (ret->digest = ssh_digest_start(alg)) == NULL) 73 else if (ssh_digest_memory(ctx->alg, ke [all...] |
/external/vboot_reference/tests/ |
H A D | gen_test_keys.sh | 39 alg=$((${key_index} * 3 + ${alg_index})) 45 --algorithm ${alg} 51 --algorithm ${alg}
|
/external/apache-harmony/crypto/src/test/support/common/java/org/apache/harmony/crypto/tests/support/ |
H A D | MyExemptionMechanismSpi.java | 101 private String alg; field in class:MyExemptionMechanismSpi.tmpKey 104 public tmpKey(String alg, byte[] enc) { argument 105 this.alg = alg; 114 return alg; 126 public tmp1Key(String alg, byte[] enc) { argument
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
H A D | KeyPairGenerator2Test.java | 198 String alg = validValues[i].concat(post); 199 kpG = KeyPairGenerator.getInstance(alg); 201 .toUpperCase(), (mode <= 2 ? resAlg : alg).toUpperCase()); 237 String alg = validValues[i].concat(post); 239 KeyPairGenerator.getInstance(alg, prov); 241 .concat(alg).concat(")")); 246 String alg = validValues[i].concat(post); 249 KeyPairGenerator.getInstance(alg, invalidValues[j]); 251 .concat(alg).concat(" provider: ").concat( 259 String alg [all...] |
H A D | KSPrivateKeyEntryTest.java | 188 private String alg = "My algorithm"; field in class:KSPrivateKeyEntryTest.tmpPrivateKey 191 return alg; 207 alg = algorithm;
|
/external/boringssl/src/crypto/pkcs8/ |
H A D | p5_pbe.c | 79 int PKCS5_pbe_set0_algor(X509_ALGOR *algor, int alg, int iter, 121 if (X509_ALGOR_set0(algor, OBJ_nid2obj(alg), V_ASN1_SEQUENCE, pbe_str)) 134 X509_ALGOR *PKCS5_pbe_set(int alg, int iter, 145 if (PKCS5_pbe_set0_algor(ret, alg, iter, salt, saltlen))
|
/external/vboot_reference/utility/ |
H A D | dev_make_keypair | 47 local alg=$2 48 local len=$(alg_to_keylen $alg) 63 --algorithm $alg 69 --algorithm $alg
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | crypto_internal-cipher.c | 18 enum crypto_cipher_alg alg; member in struct:crypto_cipher 43 struct crypto_cipher * crypto_cipher_init(enum crypto_cipher_alg alg, argument 53 ctx->alg = alg; 55 switch (alg) { 108 switch (ctx->alg) { 172 switch (ctx->alg) { 232 switch (ctx->alg) {
|
H A D | crypto_internal.c | 18 enum crypto_hash_alg alg; member in struct:crypto_hash 31 struct crypto_hash * crypto_hash_init(enum crypto_hash_alg alg, const u8 *key, argument 43 ctx->alg = alg; 45 switch (alg) { 130 switch (ctx->alg) { 164 switch (ctx->alg) {
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | crypto_internal-cipher.c | 18 enum crypto_cipher_alg alg; member in struct:crypto_cipher 43 struct crypto_cipher * crypto_cipher_init(enum crypto_cipher_alg alg, argument 53 ctx->alg = alg; 55 switch (alg) { 108 switch (ctx->alg) { 172 switch (ctx->alg) { 232 switch (ctx->alg) {
|
H A D | crypto_internal.c | 18 enum crypto_hash_alg alg; member in struct:crypto_hash 31 struct crypto_hash * crypto_hash_init(enum crypto_hash_alg alg, const u8 *key, argument 43 ctx->alg = alg; 45 switch (alg) { 130 switch (ctx->alg) { 164 switch (ctx->alg) {
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | crypto_internal-cipher.c | 18 enum crypto_cipher_alg alg; member in struct:crypto_cipher 43 struct crypto_cipher * crypto_cipher_init(enum crypto_cipher_alg alg, argument 53 ctx->alg = alg; 55 switch (alg) { 108 switch (ctx->alg) { 172 switch (ctx->alg) { 232 switch (ctx->alg) {
|
H A D | crypto_internal.c | 18 enum crypto_hash_alg alg; member in struct:crypto_hash 31 struct crypto_hash * crypto_hash_init(enum crypto_hash_alg alg, const u8 *key, argument 43 ctx->alg = alg; 45 switch (alg) { 130 switch (ctx->alg) { 164 switch (ctx->alg) {
|
/external/boringssl/src/crypto/evp/ |
H A D | p_rsa_asn1.c | 264 static X509_ALGOR *rsa_mgf1_decode(X509_ALGOR *alg) { argument 268 if (alg == NULL || 269 OBJ_obj2nid(alg->algorithm) != NID_mgf1 || 270 alg->parameter->type != V_ASN1_SEQUENCE) { 274 p = alg->parameter->value.sequence->data; 275 plen = alg->parameter->value.sequence->length; 279 static RSA_PSS_PARAMS *rsa_pss_decode(const X509_ALGOR *alg, argument 287 if (!alg->parameter || alg->parameter->type != V_ASN1_SEQUENCE) { 290 p = alg 470 rsa_algor_to_md(X509_ALGOR *alg) argument 483 rsa_mgf1_to_md(X509_ALGOR *alg, X509_ALGOR *maskHash) argument [all...] |
/external/ipsec-tools/src/racoon/ |
H A D | sainfo.h | 66 int alg; member in struct:sainfoalg
|
/external/nist-sip/java/gov/nist/javax/sip/header/ims/ |
H A D | SecurityAgreeHeader.java | 67 * Set Algorithm (alg parameter) 68 * @param alg - algorithm value 71 public void setAlgorithm(String alg) throws ParseException; argument 139 * @return alg parameter value
|
/external/vboot_reference/scripts/keygeneration/ |
H A D | common.sh | 59 local alg=$2 61 local len=$(alg_to_keylen $alg) 78 --algorithm $alg 84 --algorithm $alg
|
/external/wpa_supplicant_8/hostapd/src/common/ |
H A D | privsep_commands.h | 50 int alg; member in struct:privsep_cmd_set_key
|
/external/wpa_supplicant_8/src/common/ |
H A D | privsep_commands.h | 50 int alg; member in struct:privsep_cmd_set_key
|
/external/wpa_supplicant_8/wpa_supplicant/src/common/ |
H A D | privsep_commands.h | 50 int alg; member in struct:privsep_cmd_set_key
|