/external/tpm2/ |
H A D | EncryptDecrypt.c | 31 TPM_ALG_ID alg; local 62 alg = symKey->publicArea.parameters.symDetail.sym.algorithm; 63 blockSize = CryptGetSymmetricBlockSize(alg, keySize); 89 alg, 99 alg,
|
H A D | CryptSelfTest.c | 25 TPM_ALG_ID alg; local 28 for(alg = TPM_ALG_FIRST; alg <= TPM_ALG_LAST; alg++) 30 if(TEST_BIT(alg, *toTest)) 32 TPM_RC result = CryptTestAlgorithm(alg, toTest); 96 TPM_ALG_ID alg; local 104 TPM_ALG_ID alg = toTest->algorithms[i]; local 106 if((alg > TPM_ALG_LAST) || !TEST_BIT(alg, g_implementedAlgorithm 165 CryptTestAlgorithm( TPM_ALG_ID alg, ALGORITHM_VECTOR *toTest ) argument [all...] |
/external/libcups/cups/ |
H A D | hash.c | 169 gnutls_digest_algorithm_t alg = GNUTLS_DIG_UNKNOWN; local 175 alg = GNUTLS_DIG_SHA1; 177 alg = GNUTLS_DIG_SHA224; 179 alg = GNUTLS_DIG_SHA256; 181 alg = GNUTLS_DIG_SHA384; 183 alg = GNUTLS_DIG_SHA512; 186 alg = GNUTLS_DIG_SHA512; 191 alg = GNUTLS_DIG_SHA512; 195 if (alg != GNUTLS_DIG_UNKNOWN) 206 gnutls_hash_fast(alg, dat [all...] |
/external/ipsec-tools/src/racoon/ |
H A D | sainfo.h | 66 int alg; member in struct:sainfoalg
|
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | ap_mlme.c | 23 static const char * mlme_auth_alg_str(int alg) argument 25 switch (alg) {
|
/external/wpa_supplicant_8/src/ap/ |
H A D | ap_mlme.c | 23 static const char * mlme_auth_alg_str(int alg) argument 25 switch (alg) {
|
/external/wpa_supplicant_8/wpa_supplicant/src/ap/ |
H A D | ap_mlme.c | 23 static const char * mlme_auth_alg_str(int alg) argument 25 switch (alg) {
|
/external/webrtc/webrtc/base/ |
H A D | messagedigest.cc | 38 MessageDigest* MessageDigestFactory::Create(const std::string& alg) { argument 40 MessageDigest* digest = new OpenSSLDigest(alg); 48 if (alg == DIGEST_MD5) { 50 } else if (alg == DIGEST_SHA_1) { 57 bool IsFips180DigestAlgorithm(const std::string& alg) { argument 63 return alg == DIGEST_SHA_1 || 64 alg == DIGEST_SHA_224 || 65 alg == DIGEST_SHA_256 || 66 alg == DIGEST_SHA_384 || 67 alg 76 ComputeDigest(const std::string& alg, const void* input, size_t in_len, void* output, size_t out_len) argument 91 ComputeDigest(const std::string& alg, const std::string& input, std::string* output) argument 101 ComputeDigest(const std::string& alg, const std::string& input) argument 146 ComputeHmac(const std::string& alg, const void* key, size_t key_len, const void* input, size_t in_len, void* output, size_t out_len) argument 165 ComputeHmac(const std::string& alg, const std::string& key, const std::string& input, std::string* output) argument 175 ComputeHmac(const std::string& alg, const std::string& key, const std::string& input) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | crypto_internal.c | 20 enum crypto_hash_alg alg; member in struct:crypto_hash 39 struct crypto_hash * crypto_hash_init(enum crypto_hash_alg alg, const u8 *key, argument 51 ctx->alg = alg; 53 switch (alg) { 148 switch (ctx->alg) { 192 switch (ctx->alg) {
|
H A D | crypto_internal-cipher.c | 18 enum crypto_cipher_alg alg; member in struct:crypto_cipher 43 struct crypto_cipher * crypto_cipher_init(enum crypto_cipher_alg alg, argument 53 ctx->alg = alg; 55 switch (alg) { 108 switch (ctx->alg) { 172 switch (ctx->alg) { 232 switch (ctx->alg) {
|
/external/wpa_supplicant_8/hostapd/src/drivers/ |
H A D | driver_openbsd.c | 71 wpa_driver_openbsd_set_key(const char *ifname, void *priv, enum wpa_alg alg, argument 78 if (alg != WPA_ALG_PMK || key_len > IEEE80211_PMK_LEN)
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | crypto_internal.c | 20 enum crypto_hash_alg alg; member in struct:crypto_hash 39 struct crypto_hash * crypto_hash_init(enum crypto_hash_alg alg, const u8 *key, argument 51 ctx->alg = alg; 53 switch (alg) { 148 switch (ctx->alg) { 192 switch (ctx->alg) {
|
H A D | crypto_internal-cipher.c | 18 enum crypto_cipher_alg alg; member in struct:crypto_cipher 43 struct crypto_cipher * crypto_cipher_init(enum crypto_cipher_alg alg, argument 53 ctx->alg = alg; 55 switch (alg) { 108 switch (ctx->alg) { 172 switch (ctx->alg) { 232 switch (ctx->alg) {
|
/external/wpa_supplicant_8/src/drivers/ |
H A D | driver_openbsd.c | 71 wpa_driver_openbsd_set_key(const char *ifname, void *priv, enum wpa_alg alg, argument 78 if (alg != WPA_ALG_PMK || key_len > IEEE80211_PMK_LEN)
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | crypto_internal.c | 20 enum crypto_hash_alg alg; member in struct:crypto_hash 39 struct crypto_hash * crypto_hash_init(enum crypto_hash_alg alg, const u8 *key, argument 51 ctx->alg = alg; 53 switch (alg) { 148 switch (ctx->alg) { 192 switch (ctx->alg) {
|
H A D | crypto_internal-cipher.c | 18 enum crypto_cipher_alg alg; member in struct:crypto_cipher 43 struct crypto_cipher * crypto_cipher_init(enum crypto_cipher_alg alg, argument 53 ctx->alg = alg; 55 switch (alg) { 108 switch (ctx->alg) { 172 switch (ctx->alg) { 232 switch (ctx->alg) {
|
/external/wpa_supplicant_8/wpa_supplicant/src/drivers/ |
H A D | driver_openbsd.c | 71 wpa_driver_openbsd_set_key(const char *ifname, void *priv, enum wpa_alg alg, argument 78 if (alg != WPA_ALG_PMK || key_len > IEEE80211_PMK_LEN)
|
/external/nist-sip/java/gov/nist/javax/sip/header/ims/ |
H A D | SecurityAgreeHeader.java | 67 * Set Algorithm (alg parameter) 68 * @param alg - algorithm value 71 public void setAlgorithm(String alg) throws ParseException; argument 139 * @return alg parameter value
|
/external/openssh/ |
H A D | digest-libc.c | 44 int alg; member in struct:ssh_digest_ctx 124 ssh_digest_by_alg(int alg) argument 126 if (alg < 0 || alg >= SSH_DIGEST_MAX) 128 if (digests[alg].id != alg) /* sanity */ 130 return &(digests[alg]); 136 int alg; local 138 for (alg = 0; alg < SSH_DIGEST_MA 146 ssh_digest_alg_name(int alg) argument 154 ssh_digest_bytes(int alg) argument 170 ssh_digest_start(int alg) argument 246 ssh_digest_memory(int alg, const void *m, size_t mlen, u_char *d, size_t dlen) argument 260 ssh_digest_buffer(int alg, const struct sshbuf *b, u_char *d, size_t dlen) argument [all...] |
H A D | digest-openssl.c | 45 int alg; member in struct:ssh_digest_ctx 68 ssh_digest_by_alg(int alg) argument 70 if (alg < 0 || alg >= SSH_DIGEST_MAX) 72 if (digests[alg].id != alg) /* sanity */ 74 if (digests[alg].mdfunc == NULL) 76 return &(digests[alg]); 82 int alg; local 84 for (alg 92 ssh_digest_alg_name(int alg) argument 100 ssh_digest_bytes(int alg) argument 114 ssh_digest_start(int alg) argument 183 ssh_digest_memory(int alg, const void *m, size_t mlen, u_char *d, size_t dlen) argument 201 ssh_digest_buffer(int alg, const struct sshbuf *b, u_char *d, size_t dlen) argument [all...] |
H A D | hmac.c | 28 int alg; member in struct:ssh_hmac_ctx 37 ssh_hmac_bytes(int alg) argument 39 return ssh_digest_bytes(alg); 43 ssh_hmac_start(int alg) argument 49 ret->alg = alg; 50 if ((ret->ictx = ssh_digest_start(alg)) == NULL || 51 (ret->octx = ssh_digest_start(alg)) == NULL || 52 (ret->digest = ssh_digest_start(alg)) == NULL) 73 else if (ssh_digest_memory(ctx->alg, ke [all...] |
/external/vboot_reference/tests/ |
H A D | vb20_common2_tests.c | 101 0, "vb2_verify_data() bad sig alg"); 107 0, "vb2_verify_data() bad hash alg"); 200 int alg; local 202 for (alg = 0; alg < kNumAlgorithms; alg++) { 203 if (test_algorithm(alg, argv[1]))
|
H A D | vboot_common2_tests.c | 268 int alg; local 270 for (alg = 0; alg < kNumAlgorithms; alg++) { 271 if (test_algorithm(alg, argv[1]))
|
/external/ipsec-tools/src/libipsec/ |
H A D | key_debug.c | 309 struct sadb_alg *alg; local 317 / sizeof(*alg); 318 alg = (void *)(sup + 1); 322 alg->sadb_alg_id, alg->sadb_alg_ivlen, 323 alg->sadb_alg_minbits, alg->sadb_alg_maxbits); 324 alg++;
|
/external/linux-kselftest/tools/testing/selftests/bpf/ |
H A D | test_tag.c | 115 static const struct sockaddr_alg alg = { local 126 ret = bind(fd_base, (struct sockaddr *)&alg, sizeof(alg));
|