HomeSort by relevance Sort by last modified time
    Searched refs:algs (Results 1 - 25 of 27) sorted by null

1 2

  /dalvik/libcore/security/src/test/java/org/apache/harmony/security/tests/java/security/
AlgorithmParameterGenerator1Test.java 55 private static String[] algs = { field in class:AlgorithmParameterGenerator1Test
142 for (int i = 0; i < algs.length; i++) {
143 apg = AlgorithmParameterGenerator.getInstance(algs[i]);
144 assertEquals("Incorrect algorithm", apg.getAlgorithm(), algs[i]);
167 for (int i = 0; i < algs.length; i++) {
169 AlgorithmParameterGenerator.getInstance(algs[i], provider);
174 AlgorithmParameterGenerator.getInstance(algs[i], "");
199 for (int i = 0; i < algs.length; i++) {
202 AlgorithmParameterGenerator.getInstance(algs[i],
266 for (int i = 0; i < algs.length; i++)
    [all...]
KeyPairGenerator1Test.java 58 public static String[] algs = { field in class:KeyPairGenerator1Test
144 for (int i = 0; i < algs.length; i++) {
145 kpg = KeyPairGenerator.getInstance(algs[i]);
147 algs[i].toUpperCase());
169 for (int i = 0; i < algs.length; i++) {
171 KeyPairGenerator.getInstance(algs[i], provider);
176 KeyPairGenerator.getInstance(algs[i], "");
201 for (int i = 0; i < algs.length; i++) {
204 KeyPairGenerator.getInstance(algs[i], invalidValues[j]);
206 .concat(algs[i]).concat(" provider: ").concat
    [all...]
KeyFactory2Test.java 491 Vector<String> algs = new Vector<String>(); local
500 algs.addElement(algorithm.substring(KEYFACTORY_ID.length()));
504 return algs.toArray(new String[algs.size()]);
SecurityTest.java 180 Set<String> algs = Security.getAlgorithms(servicesNames[i]); local
181 assertTrue("no services with specified name: " + servicesNames[i], algs.size() > 0);
185 Set<String> algs = Security.getAlgorithms(invalidServiceNames[i]); local
186 assertTrue("services with specified name: " + invalidServiceNames[i], algs.size() == 0);
MessageDigest2Test.java 632 Vector<String> algs = new Vector<String>(); local
642 algs.addElement(algorithm.substring(MESSAGEDIGEST_ID.length()));
646 return (String[]) algs.toArray(new String[algs.size()]);
  /external/ipsec-tools/src/racoon/
sainfo.h 57 struct sainfoalg *algs[MAXALGCLASS]; member in struct:sainfo
proposal.c 647 if (sainfo->algs[algclass_ipsec_auth] == NULL) {
653 for (a = sainfo->algs[algclass_ipsec_auth]; a; a = a->next) {
674 if (sainfo->algs[algclass_ipsec_enc] == NULL) {
680 for (a = sainfo->algs[algclass_ipsec_enc]; a; a = a->next) {
681 for (b = sainfo->algs[algclass_ipsec_auth]; b; b = b->next) {
700 if (sainfo->algs[algclass_ipsec_comp] == NULL) {
706 for (a = sainfo->algs[algclass_ipsec_comp]; a; a = a->next) {
sainfo.c 185 delsainfoalg(si->algs[i]);
  /external/wpa_supplicant/
driver_ipw.c 350 int algs = 0; local
353 algs |= 1;
355 algs |= 2;
357 algs |= 4;
358 if (algs == 0)
359 algs = 1; /* at least one algorithm should be set */
361 wpa_printf(MSG_DEBUG, "%s: auth_alg=0x%x", __FUNCTION__, algs);
362 return ipw_set_wpa_param(drv, IPW_PARAM_AUTH_ALGS, algs);
driver_hostap.c 407 int algs = 0; local
410 algs |= 1;
412 algs |= 2;
414 algs |= 4;
415 if (algs == 0)
416 algs = 1; /* at least one algorithm should be set */
418 return prism2param(drv, PRISM2_PARAM_AP_AUTH_ALGS, algs);
tls_schannel.c 721 ALG_ID algs[1]; local
739 algs[0] = CALG_RSA_KEYX;
741 conn->schannel_cred.palgSupportedAlgs = algs;
mlme.c 1136 u8 algs[num_algs]; local
1138 algs[0] = algs[1] = algs[2] = 0xff;
1140 algs[0] = WLAN_AUTH_OPEN;
1143 algs[1] = WLAN_AUTH_SHARED_KEY;
1145 algs[2] = WLAN_AUTH_LEAP;
1156 if (algs[pos] == wpa_s->mlme.auth_alg ||
1157 algs[pos] == 0xff)
1159 if (algs[pos] == WLAN_AUTH_SHARED_KEY &
    [all...]
wpa_supplicant.c 1383 int algs = AUTH_ALG_OPEN_SYSTEM; local
    [all...]
driver_wext.c 2033 int algs = 0, res; local
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/drivers/
driver_ipw.c 348 int algs = 0; local
351 algs |= 1;
353 algs |= 2;
355 algs |= 4;
356 if (algs == 0)
357 algs = 1; /* at least one algorithm should be set */
359 wpa_printf(MSG_DEBUG, "%s: auth_alg=0x%x", __FUNCTION__, algs);
360 return ipw_set_wpa_param(drv, IPW_PARAM_AUTH_ALGS, algs);
driver_hostap.c 405 int algs = 0; local
408 algs |= 1;
410 algs |= 2;
412 algs |= 4;
413 if (algs == 0)
414 algs = 1; /* at least one algorithm should be set */
416 return prism2param(drv, PRISM2_PARAM_AP_AUTH_ALGS, algs);
driver_nl80211.c 2218 int algs = 0, res; local
    [all...]
driver_wext.c 2229 int algs = 0, res; local
    [all...]
  /external/ipsec-tools/
setup.c 170 if (!sainfo.algs[class]) {
171 sainfo.algs[class] = p;
173 struct sainfoalg *q = sainfo.algs[class];
  /external/wpa_supplicant_6/wpa_supplicant/
wpa_supplicant.c 938 int algs = AUTH_ALG_OPEN_SYSTEM; local
999 algs = AUTH_ALG_LEAP;
1001 algs |= AUTH_ALG_LEAP;
1005 wpa_printf(MSG_DEBUG, "Automatic auth_alg selection: 0x%x", algs);
1007 algs = 0;
1009 algs |= AUTH_ALG_OPEN_SYSTEM;
1011 algs |= AUTH_ALG_SHARED_KEY;
1013 algs |= AUTH_ALG_LEAP;
1015 algs);
1017 wpa_drv_set_auth_alg(wpa_s, algs);
    [all...]
mlme.c 841 u8 algs[num_algs]; local
843 algs[0] = algs[1] = algs[2] = 0xff;
845 algs[0] = WLAN_AUTH_OPEN;
848 algs[1] = WLAN_AUTH_SHARED_KEY;
850 algs[2] = WLAN_AUTH_LEAP;
861 if (algs[pos] == wpa_s->mlme.auth_alg ||
862 algs[pos] == 0xff)
864 if (algs[pos] == WLAN_AUTH_SHARED_KEY &
    [all...]
  /hardware/ti/wlan/wl1271/wpa_supplicant_lib/
driver_ti.c 1023 int algs = 0, res; local
1027 algs |= IW_AUTH_ALG_OPEN_SYSTEM;
1029 algs |= IW_AUTH_ALG_SHARED_KEY;
1031 algs |= IW_AUTH_ALG_LEAP;
1032 if (algs == 0) {
1034 algs = IW_AUTH_ALG_OPEN_SYSTEM;
1038 algs);
    [all...]
  /system/wlan/ti/wilink_6_1/wpa_supplicant_lib/
driver_ti.c 1023 int algs = 0, res; local
1027 algs |= IW_AUTH_ALG_OPEN_SYSTEM;
1029 algs |= IW_AUTH_ALG_SHARED_KEY;
1031 algs |= IW_AUTH_ALG_LEAP;
1032 if (algs == 0) {
1034 algs = IW_AUTH_ALG_OPEN_SYSTEM;
1038 algs);
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/crypto/
tls_schannel.c 714 ALG_ID algs[1]; local
732 algs[0] = CALG_RSA_KEYX;
734 conn->schannel_cred.palgSupportedAlgs = algs;
  /external/openssl/ssl/
s3_clnt.c 2585 long algs; local
    [all...]

Completed in 507 milliseconds

1 2