/dalvik/libcore/security/src/test/java/org/apache/harmony/security/tests/java/security/ |
AlgorithmParameterGenerator1Test.java | 55 private static String[] algs = { field in class:AlgorithmParameterGenerator1Test 142 for (int i = 0; i < algs.length; i++) { 143 apg = AlgorithmParameterGenerator.getInstance(algs[i]); 144 assertEquals("Incorrect algorithm", apg.getAlgorithm(), algs[i]); 167 for (int i = 0; i < algs.length; i++) { 169 AlgorithmParameterGenerator.getInstance(algs[i], provider); 174 AlgorithmParameterGenerator.getInstance(algs[i], ""); 199 for (int i = 0; i < algs.length; i++) { 202 AlgorithmParameterGenerator.getInstance(algs[i], 266 for (int i = 0; i < algs.length; i++) [all...] |
KeyPairGenerator1Test.java | 58 public static String[] algs = { field in class:KeyPairGenerator1Test 144 for (int i = 0; i < algs.length; i++) { 145 kpg = KeyPairGenerator.getInstance(algs[i]); 147 algs[i].toUpperCase()); 169 for (int i = 0; i < algs.length; i++) { 171 KeyPairGenerator.getInstance(algs[i], provider); 176 KeyPairGenerator.getInstance(algs[i], ""); 201 for (int i = 0; i < algs.length; i++) { 204 KeyPairGenerator.getInstance(algs[i], invalidValues[j]); 206 .concat(algs[i]).concat(" provider: ").concat [all...] |
KeyFactory2Test.java | 491 Vector<String> algs = new Vector<String>(); local 500 algs.addElement(algorithm.substring(KEYFACTORY_ID.length())); 504 return algs.toArray(new String[algs.size()]);
|
SecurityTest.java | 180 Set<String> algs = Security.getAlgorithms(servicesNames[i]); local 181 assertTrue("no services with specified name: " + servicesNames[i], algs.size() > 0); 185 Set<String> algs = Security.getAlgorithms(invalidServiceNames[i]); local 186 assertTrue("services with specified name: " + invalidServiceNames[i], algs.size() == 0);
|
MessageDigest2Test.java | 632 Vector<String> algs = new Vector<String>(); local 642 algs.addElement(algorithm.substring(MESSAGEDIGEST_ID.length())); 646 return (String[]) algs.toArray(new String[algs.size()]);
|
/external/ipsec-tools/src/racoon/ |
sainfo.h | 57 struct sainfoalg *algs[MAXALGCLASS]; member in struct:sainfo
|
proposal.c | 647 if (sainfo->algs[algclass_ipsec_auth] == NULL) { 653 for (a = sainfo->algs[algclass_ipsec_auth]; a; a = a->next) { 674 if (sainfo->algs[algclass_ipsec_enc] == NULL) { 680 for (a = sainfo->algs[algclass_ipsec_enc]; a; a = a->next) { 681 for (b = sainfo->algs[algclass_ipsec_auth]; b; b = b->next) { 700 if (sainfo->algs[algclass_ipsec_comp] == NULL) { 706 for (a = sainfo->algs[algclass_ipsec_comp]; a; a = a->next) {
|
sainfo.c | 185 delsainfoalg(si->algs[i]);
|
/external/wpa_supplicant/ |
driver_ipw.c | 350 int algs = 0; local 353 algs |= 1; 355 algs |= 2; 357 algs |= 4; 358 if (algs == 0) 359 algs = 1; /* at least one algorithm should be set */ 361 wpa_printf(MSG_DEBUG, "%s: auth_alg=0x%x", __FUNCTION__, algs); 362 return ipw_set_wpa_param(drv, IPW_PARAM_AUTH_ALGS, algs);
|
driver_hostap.c | 407 int algs = 0; local 410 algs |= 1; 412 algs |= 2; 414 algs |= 4; 415 if (algs == 0) 416 algs = 1; /* at least one algorithm should be set */ 418 return prism2param(drv, PRISM2_PARAM_AP_AUTH_ALGS, algs);
|
tls_schannel.c | 721 ALG_ID algs[1]; local 739 algs[0] = CALG_RSA_KEYX; 741 conn->schannel_cred.palgSupportedAlgs = algs;
|
mlme.c | 1136 u8 algs[num_algs]; local 1138 algs[0] = algs[1] = algs[2] = 0xff; 1140 algs[0] = WLAN_AUTH_OPEN; 1143 algs[1] = WLAN_AUTH_SHARED_KEY; 1145 algs[2] = WLAN_AUTH_LEAP; 1156 if (algs[pos] == wpa_s->mlme.auth_alg || 1157 algs[pos] == 0xff) 1159 if (algs[pos] == WLAN_AUTH_SHARED_KEY & [all...] |
wpa_supplicant.c | 1383 int algs = AUTH_ALG_OPEN_SYSTEM; local [all...] |
driver_wext.c | 2033 int algs = 0, res; local [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/drivers/ |
driver_ipw.c | 348 int algs = 0; local 351 algs |= 1; 353 algs |= 2; 355 algs |= 4; 356 if (algs == 0) 357 algs = 1; /* at least one algorithm should be set */ 359 wpa_printf(MSG_DEBUG, "%s: auth_alg=0x%x", __FUNCTION__, algs); 360 return ipw_set_wpa_param(drv, IPW_PARAM_AUTH_ALGS, algs);
|
driver_hostap.c | 405 int algs = 0; local 408 algs |= 1; 410 algs |= 2; 412 algs |= 4; 413 if (algs == 0) 414 algs = 1; /* at least one algorithm should be set */ 416 return prism2param(drv, PRISM2_PARAM_AP_AUTH_ALGS, algs);
|
driver_nl80211.c | 2218 int algs = 0, res; local [all...] |
driver_wext.c | 2229 int algs = 0, res; local [all...] |
/external/ipsec-tools/ |
setup.c | 170 if (!sainfo.algs[class]) { 171 sainfo.algs[class] = p; 173 struct sainfoalg *q = sainfo.algs[class];
|
/external/wpa_supplicant_6/wpa_supplicant/ |
wpa_supplicant.c | 938 int algs = AUTH_ALG_OPEN_SYSTEM; local 999 algs = AUTH_ALG_LEAP; 1001 algs |= AUTH_ALG_LEAP; 1005 wpa_printf(MSG_DEBUG, "Automatic auth_alg selection: 0x%x", algs); 1007 algs = 0; 1009 algs |= AUTH_ALG_OPEN_SYSTEM; 1011 algs |= AUTH_ALG_SHARED_KEY; 1013 algs |= AUTH_ALG_LEAP; 1015 algs); 1017 wpa_drv_set_auth_alg(wpa_s, algs); [all...] |
mlme.c | 841 u8 algs[num_algs]; local 843 algs[0] = algs[1] = algs[2] = 0xff; 845 algs[0] = WLAN_AUTH_OPEN; 848 algs[1] = WLAN_AUTH_SHARED_KEY; 850 algs[2] = WLAN_AUTH_LEAP; 861 if (algs[pos] == wpa_s->mlme.auth_alg || 862 algs[pos] == 0xff) 864 if (algs[pos] == WLAN_AUTH_SHARED_KEY & [all...] |
/hardware/ti/wlan/wl1271/wpa_supplicant_lib/ |
driver_ti.c | 1023 int algs = 0, res; local 1027 algs |= IW_AUTH_ALG_OPEN_SYSTEM; 1029 algs |= IW_AUTH_ALG_SHARED_KEY; 1031 algs |= IW_AUTH_ALG_LEAP; 1032 if (algs == 0) { 1034 algs = IW_AUTH_ALG_OPEN_SYSTEM; 1038 algs); [all...] |
/system/wlan/ti/wilink_6_1/wpa_supplicant_lib/ |
driver_ti.c | 1023 int algs = 0, res; local 1027 algs |= IW_AUTH_ALG_OPEN_SYSTEM; 1029 algs |= IW_AUTH_ALG_SHARED_KEY; 1031 algs |= IW_AUTH_ALG_LEAP; 1032 if (algs == 0) { 1034 algs = IW_AUTH_ALG_OPEN_SYSTEM; 1038 algs); [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
tls_schannel.c | 714 ALG_ID algs[1]; local 732 algs[0] = CALG_RSA_KEYX; 734 conn->schannel_cred.palgSupportedAlgs = algs;
|
/external/openssl/ssl/ |
s3_clnt.c | 2585 long algs; local [all...] |