HomeSort by relevance Sort by last modified time
    Searched refs:alg (Results 1 - 25 of 189) sorted by null

1 2 3 4 5 6 7 8

  /external/openssl/crypto/asn1/
x_algor.c 80 int X509_ALGOR_set0(X509_ALGOR *alg, ASN1_OBJECT *aobj, int ptype, void *pval)
82 if (!alg)
86 if (alg->parameter == NULL)
87 alg->parameter = ASN1_TYPE_new();
88 if (alg->parameter == NULL)
91 if (alg)
93 if (alg->algorithm)
94 ASN1_OBJECT_free(alg->algorithm);
95 alg->algorithm = aobj;
101 if (alg->parameter
    [all...]
p5_pbe.c 77 int PKCS5_pbe_set0_algor(X509_ALGOR *algor, int alg, int iter,
119 if (X509_ALGOR_set0(algor, OBJ_nid2obj(alg), V_ASN1_SEQUENCE, pbe_str))
132 X509_ALGOR *PKCS5_pbe_set(int alg, int iter,
143 if (PKCS5_pbe_set0_algor(ret, alg, iter, salt, saltlen))
  /external/smack/src/org/xbill/DNS/
SSHFPRecord.java 31 private int alg; field in class:SSHFPRecord
44 * @param alg The public key's algorithm.
49 SSHFPRecord(Name name, int dclass, long ttl, int alg, int digestType,
53 this.alg = checkU8("alg", alg);
60 alg = in.readU8();
67 alg = st.getUInt8();
75 sb.append(alg);
86 return alg;
    [all...]
DNSKEYRecord.java 52 * @param alg The key's algorithm
56 DNSKEYRecord(Name name, int dclass, long ttl, int flags, int proto, int alg,
59 super(name, Type.DNSKEY, dclass, ttl, flags, proto, alg, key);
66 * @param alg The key's algorithm
72 DNSKEYRecord(Name name, int dclass, long ttl, int flags, int proto, int alg,
75 super(name, Type.DNSKEY, dclass, ttl, flags, proto, alg,
76 DNSSEC.fromPublicKey(key, alg));
85 alg = DNSSEC.Algorithm.value(algString);
86 if (alg < 0)
DLVRecord.java 26 private int alg; field in class:DLVRecord
40 * @param alg The original key algorithm.
45 DLVRecord(Name name, int dclass, long ttl, int footprint, int alg,
50 this.alg = checkU8("alg", alg);
58 alg = in.readU8();
66 alg = st.getUInt8();
79 sb.append(alg);
95 return alg;
    [all...]
DSRecord.java 39 private int alg; field in class:DSRecord
53 * @param alg The original key algorithm.
58 DSRecord(Name name, int dclass, long ttl, int footprint, int alg,
63 this.alg = checkU8("alg", alg);
83 alg = in.readU8();
91 alg = st.getUInt8();
104 sb.append(alg);
120 return alg;
    [all...]
KEYBase.java 20 protected int flags, proto, alg; field in class:KEYBase
30 int alg, byte [] key)
35 this.alg = checkU8("alg", alg);
43 alg = in.readU8();
56 sb.append(alg);
92 return alg;
117 if (alg == DNSSEC.Algorithm.RSAMD5) {
156 out.writeU8(alg);
    [all...]
RRSIGRecord.java 32 * @param alg The cryptographic algorithm of the key that generated the
42 RRSIGRecord(Name name, int dclass, long ttl, int covered, int alg, long origttl,
46 super(name, Type.RRSIG, dclass, ttl, covered, alg, origttl, expire,
SIGRecord.java 32 * @param alg The cryptographic algorithm of the key that generated the
42 SIGRecord(Name name, int dclass, long ttl, int covered, int alg, long origttl,
46 super(name, Type.SIG, dclass, ttl, covered, alg, origttl, expire,
CERTRecord.java 110 private int alg; field in class:CERTRecord
124 * @param alg The algorithm of the associated KEYRecord, if present
129 int alg, byte [] cert)
134 this.alg = checkU8("alg", alg);
142 alg = in.readU8();
155 alg = DNSSEC.Algorithm.value(algString);
156 if (alg < 0)
171 sb.append (alg);
    [all...]
SIGBase.java 20 protected int alg, labels; field in class:SIGBase
31 SIGBase(Name name, int type, int dclass, long ttl, int covered, int alg,
39 this.alg = checkU8("alg", alg);
54 alg = in.readU8();
71 alg = DNSSEC.Algorithm.value(algString);
72 if (alg < 0)
89 sb.append (alg);
126 return alg;
    [all...]
TKEYRecord.java 21 private Name alg; field in class:TKEYRecord
52 * @param alg The shared key's algorithm
64 TKEYRecord(Name name, int dclass, long ttl, Name alg,
69 this.alg = checkName("alg", alg);
80 alg = new Name(in);
120 sb.append(alg);
155 return alg;
202 alg.toWire(out, null, canonical)
    [all...]
TSIGRecord.java 23 private Name alg; field in class:TSIGRecord
41 * @param alg The shared key's algorithm
54 TSIGRecord(Name name, int dclass, long ttl, Name alg, Date timeSigned,
59 this.alg = checkName("alg", alg);
70 alg = new Name(in);
100 sb.append(alg);
156 return alg;
197 alg.toWire(out, null, canonical)
    [all...]
DNSSEC.java 93 string(int alg) {
94 return algs.getText(alg);
206 UnsupportedAlgorithmException(int alg) {
207 super("Unsupported algorithm: " + alg);
432 int alg = r.getAlgorithm(); local
434 switch (alg) {
449 throw new UnsupportedAlgorithmException(alg);
512 fromPublicKey(PublicKey key, int alg) throws DNSSECException
515 switch (alg) {
535 throw new UnsupportedAlgorithmException(alg);
923 int alg = key.getAlgorithm(); local
943 int alg = key.getAlgorithm(); local
    [all...]
TSIG.java 18 private static final String HMAC_MD5_STR = "HMAC-MD5.SIG-ALG.REG.INT.";
56 private Name name, alg; field in class:TSIG
63 if (alg.equals(HMAC_MD5)) {
66 } else if (alg.equals(HMAC_SHA1)) {
69 } else if (alg.equals(HMAC_SHA224)) {
72 } else if (alg.equals(HMAC_SHA256)) {
75 } else if (alg.equals(HMAC_SHA512)) {
78 } else if (alg.equals(HMAC_SHA384)) {
94 this.alg = algorithm;
128 this.alg = algorithm
    [all...]
  /external/openssl/crypto/engine/
eng_fat.c 103 static int int_def_cb(const char *alg, int len, void *arg)
106 if (!strncmp(alg, "ALL", len))
108 else if (!strncmp(alg, "RSA", len))
110 else if (!strncmp(alg, "DSA", len))
112 else if (!strncmp(alg, "ECDH", len))
114 else if (!strncmp(alg, "ECDSA", len))
116 else if (!strncmp(alg, "DH", len))
118 else if (!strncmp(alg, "RAND", len))
120 else if (!strncmp(alg, "CIPHERS", len))
122 else if (!strncmp(alg, "DIGESTS", len)
    [all...]
  /external/apache-harmony/crypto/src/test/support/common/java/org/apache/harmony/crypto/tests/support/
MyExemptionMechanismSpi.java 101 private String alg; field in class:MyExemptionMechanismSpi.tmpKey
103 public tmpKey(String alg, byte[] enc) {
104 this.alg = alg;
111 return alg;
120 public tmp1Key(String alg, byte[] enc) {
  /libcore/luni/src/test/java/org/apache/harmony/crypto/tests/support/
MyExemptionMechanismSpi.java 108 private String alg; field in class:MyExemptionMechanismSpi.tmpKey
110 public tmpKey(String alg, byte[] enc) {
111 this.alg = alg;
118 return alg;
127 public tmp1Key(String alg, byte[] enc) {
  /external/openssl/crypto/pkcs7/
pk7_attr.c 99 X509_ALGOR *alg; local
101 if(!(alg = X509_ALGOR_new())) {
105 ASN1_OBJECT_free(alg->algorithm);
106 alg->algorithm = OBJ_nid2obj (nid);
109 if(!(alg->parameter = ASN1_TYPE_new())) {
121 alg->parameter->value.integer = nbit;
122 alg->parameter->type = V_ASN1_INTEGER;
124 sk_X509_ALGOR_push (sk, alg);
  /external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/
KeyPairGenerator2Test.java 199 String alg = validValues[i].concat(post); local
200 kpG = KeyPairGenerator.getInstance(alg);
202 .toUpperCase(), (mode <= 2 ? resAlg : alg).toUpperCase());
238 String alg = validValues[i].concat(post); local
240 KeyPairGenerator.getInstance(alg, prov);
242 .concat(alg).concat(")"));
247 String alg = validValues[i].concat(post); local
250 KeyPairGenerator.getInstance(alg, invalidValues[j]);
252 .concat(alg).concat(" provider: ").concat(
260 String alg = validValues[i].concat(post) local
297 String alg = validValues[i].concat(post); local
307 String alg = validValues[i].concat(post); local
    [all...]
  /libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/
KeyPairGenerator2Test.java 202 String alg = validValues[i].concat(post); local
203 kpG = KeyPairGenerator.getInstance(alg);
205 .toUpperCase(), (mode <= 2 ? resAlg : alg).toUpperCase());
241 String alg = validValues[i].concat(post); local
243 KeyPairGenerator.getInstance(alg, prov);
245 .concat(alg).concat(")"));
250 String alg = validValues[i].concat(post); local
253 KeyPairGenerator.getInstance(alg, invalidValues[j]);
255 .concat(alg).concat(" provider: ").concat(
263 String alg = validValues[i].concat(post) local
300 String alg = validValues[i].concat(post); local
310 String alg = validValues[i].concat(post); local
    [all...]
  /external/chromium/crypto/
symmetric_key_win.cc 45 // key created for the specified |provider|. |alg| contains the algorithm of
47 // If |key_data| is intended to be used as an HMAC key, then |alg| should be
52 ALG_ID alg,
67 key_header->hdr.aiKeyAlg = alg;
73 if (alg == CALG_HMAC) {
105 ALG_ID alg = GetAESAlgIDForKeySize(key_size_in_bits); local
106 if (alg == 0)
124 ok = CryptGenKey(safe_provider.get(), alg, CRYPT_EXPORTABLE,
136 // Section 3. |alg| is the hash function used in the HMAC.
137 bool CheckHMACKeySize(size_t key_size_in_bits, ALG_ID alg) {
367 ALG_ID alg = 0; local
467 ALG_ID alg = 0; local
    [all...]
  /external/openssl/crypto/ocsp/
ocsp_lib.c 106 X509_ALGOR *alg; local
112 alg = cid->hashAlgorithm;
113 if (alg->algorithm != NULL) ASN1_OBJECT_free(alg->algorithm);
119 if (!(alg->algorithm=OBJ_nid2obj(nid))) goto err;
120 if ((alg->parameter=ASN1_TYPE_new()) == NULL) goto err;
121 alg->parameter->type=V_ASN1_NULL;
  /libcore/luni/src/main/java/org/apache/harmony/security/utils/
JarUtils.java 121 String alg = null; local
125 alg = daOid + "with" + deaOid;
127 sig = Signature.getInstance(alg);
134 alg = daName + "with" + deaName;
136 sig = Signature.getInstance(alg);
147 alg = daOid;
149 sig = Signature.getInstance(alg);
154 alg = daName;
156 sig = Signature.getInstance(alg);
  /external/wpa_supplicant_8/src/crypto/
crypto_internal-cipher.c 18 enum crypto_cipher_alg alg; member in struct:crypto_cipher
43 struct crypto_cipher * crypto_cipher_init(enum crypto_cipher_alg alg,
53 ctx->alg = alg;
55 switch (alg) {
108 switch (ctx->alg) {
172 switch (ctx->alg) {
232 switch (ctx->alg) {

Completed in 942 milliseconds

1 2 3 4 5 6 7 8