HomeSort by relevance Sort by last modified time
    Searched defs:alg (Results 26 - 50 of 108) sorted by null

12 3 4 5

  /external/wpa_supplicant_8/src/rsn_supp/
wpa_ft.c 319 enum wpa_alg alg; local
330 alg = wpa_cipher_to_alg(sm->pairwise_cipher);
333 if (wpa_sm_set_key(sm, alg, bssid, 0, 1, null_rsc,
542 enum wpa_alg alg; local
568 alg = wpa_cipher_to_alg(sm->group_cipher);
569 if (alg == WPA_ALG_NONE) {
592 if (wpa_sm_set_key(sm, alg, broadcast_ether_addr, keyidx, 0,
  /libcore/luni/src/main/java/org/apache/harmony/security/utils/
AlgNameMapper.java 78 // Maps alg name to OID
80 // Maps OID to alg name
82 // Maps aliases to alg names
90 // map upper case alg name to its original name
95 // Alg.Alias.<service>.<OID-INTS-DOT-SEPARATED>=<alg-name>
97 // Alg.Alias.<service>.OID.<OID-INTS-DOT-SEPARATED>=<alg-name>
154 // Alg.Alias.<service>.<OID-INTS-DOT-SEPARATED>=<alg-name
166 String alg = (String)me.getValue(); local
187 algAliasesMap.put(alias.toUpperCase(Locale.US), alg); local
    [all...]
JarUtils.java 121 String alg = null; local
125 alg = daOid + "with" + deaOid;
127 sig = Signature.getInstance(alg);
134 alg = daName + "with" + deaName;
136 sig = Signature.getInstance(alg);
147 alg = daOid;
149 sig = Signature.getInstance(alg);
154 alg = daName;
156 sig = Signature.getInstance(alg);
  /libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/
KSPrivateKeyEntryTest.java 180 private String alg = "My algorithm"; field in class:KSPrivateKeyEntryTest.tmpPrivateKey
183 return alg;
199 alg = algorithm;
KeyPairGenerator2Test.java 202 String alg = validValues[i].concat(post); local
203 kpG = KeyPairGenerator.getInstance(alg);
205 .toUpperCase(), (mode <= 2 ? resAlg : alg).toUpperCase());
241 String alg = validValues[i].concat(post); local
243 KeyPairGenerator.getInstance(alg, prov);
245 .concat(alg).concat(")"));
250 String alg = validValues[i].concat(post); local
253 KeyPairGenerator.getInstance(alg, invalidValues[j]);
255 .concat(alg).concat(" provider: ").concat(
263 String alg = validValues[i].concat(post) local
300 String alg = validValues[i].concat(post); local
310 String alg = validValues[i].concat(post); local
    [all...]
AlgorithmParametersTest.java 197 String[] alg = {"", "qwertyu", "!@#$%^&*()"}; local
209 for (int i = 0; i < alg.length; i++) {
211 AlgorithmParameters ap = AlgorithmParameters.getInstance(alg[i], "MyProvider");
212 fail("NoSuchAlgorithmException was not thrown for parameter " + alg[i]);
216 fail("Incorrect exception " + e + " was thrown for " + alg[i]);
305 String[] alg = {"", "qwertyu", "!@#$%^&*()"}; local
317 for (int i = 0; i < alg.length; i++) {
319 AlgorithmParameters ap = AlgorithmParameters.getInstance(alg[i], p);
320 fail("NoSuchAlgorithmException was not thrown for parameter " + alg[i]);
324 fail("Incorrect exception " + e + " was thrown for " + alg[i])
    [all...]
  /bionic/libc/netbsd/nameser/
ns_print.c 585 u_int c_type, key_tag, alg; local
593 alg = (u_int) *rdata++;
595 len = SPRINTF((tmp1, "%d %d %d ", c_type, key_tag, alg));
  /external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/
KeyPairGenerator2Test.java 199 String alg = validValues[i].concat(post); local
200 kpG = KeyPairGenerator.getInstance(alg);
202 .toUpperCase(), (mode <= 2 ? resAlg : alg).toUpperCase());
238 String alg = validValues[i].concat(post); local
240 KeyPairGenerator.getInstance(alg, prov);
242 .concat(alg).concat(")"));
247 String alg = validValues[i].concat(post); local
250 KeyPairGenerator.getInstance(alg, invalidValues[j]);
252 .concat(alg).concat(" provider: ").concat(
260 String alg = validValues[i].concat(post) local
297 String alg = validValues[i].concat(post); local
307 String alg = validValues[i].concat(post); local
    [all...]
Signature2Test.java 61 String alg = Signature.getInstance("DSA").getAlgorithm(); local
62 assertTrue("getAlgorithm did not get DSA (" + alg + ")", alg
MessageDigest2Test.java 326 String alg = MessageDigest.getInstance(digestAlgs[i], local
328 assertTrue("getAlgorithm ok", alg.equals(digestAlgs[i]));
  /external/ipsec-tools/src/libipsec/
key_debug.c 309 struct sadb_alg *alg; local
317 / sizeof(*alg);
318 alg = (void *)(sup + 1);
322 alg->sadb_alg_id, alg->sadb_alg_ivlen,
323 alg->sadb_alg_minbits, alg->sadb_alg_maxbits);
324 alg++;
pfkey.c 250 struct sadb_alg *alg; local
252 alg = findsupportedalg(satype, alg_id);
253 if (!alg)
256 if (keylen < alg->sadb_alg_minbits || keylen > alg->sadb_alg_maxbits) {
257 fprintf(stderr, "%d %d %d\n", keylen, alg->sadb_alg_minbits,
258 alg->sadb_alg_maxbits);
280 struct sadb_alg *alg; local
301 alg = findsupportedalg(satype, alg_id);
302 if (!alg)
    [all...]
  /external/openssl/crypto/rsa/
rsa_ameth.c 268 static RSA_PSS_PARAMS *rsa_pss_decode(const X509_ALGOR *alg,
277 if (!alg->parameter || alg->parameter->type != V_ASN1_SEQUENCE)
279 p = alg->parameter->value.sequence->data;
280 plen = alg->parameter->value.sequence->length;
412 X509_ALGOR *alg = NULL; local
418 PKCS7_SIGNER_INFO_get0_algs(arg2, NULL, NULL, &alg);
423 PKCS7_RECIP_INFO_get0_alg(arg2, &alg);
428 CMS_SignerInfo_get0_algs(arg2, NULL, NULL, NULL, &alg);
433 CMS_RecipientInfo_ktri_get0_algs(arg2, NULL, NULL, &alg);
    [all...]
  /external/smack/src/org/xbill/DNS/
CERTRecord.java 110 private int alg; field in class:CERTRecord
124 * @param alg The algorithm of the associated KEYRecord, if present
129 int alg, byte [] cert)
134 this.alg = checkU8("alg", alg);
142 alg = in.readU8();
155 alg = DNSSEC.Algorithm.value(algString);
156 if (alg < 0)
171 sb.append (alg);
    [all...]
SIGBase.java 20 protected int alg, labels; field in class:SIGBase
31 SIGBase(Name name, int type, int dclass, long ttl, int covered, int alg,
39 this.alg = checkU8("alg", alg);
54 alg = in.readU8();
71 alg = DNSSEC.Algorithm.value(algString);
72 if (alg < 0)
89 sb.append (alg);
126 return alg;
    [all...]
TSIG.java 18 private static final String HMAC_MD5_STR = "HMAC-MD5.SIG-ALG.REG.INT.";
56 private Name name, alg; field in class:TSIG
63 if (alg.equals(HMAC_MD5)) {
66 } else if (alg.equals(HMAC_SHA1)) {
69 } else if (alg.equals(HMAC_SHA224)) {
72 } else if (alg.equals(HMAC_SHA256)) {
75 } else if (alg.equals(HMAC_SHA512)) {
78 } else if (alg.equals(HMAC_SHA384)) {
94 this.alg = algorithm;
128 this.alg = algorithm
    [all...]
  /external/wpa_supplicant_8/src/common/
privsep_commands.h 46 int alg; member in struct:privsep_cmd_set_key
  /external/wpa_supplicant_8/src/tls/
tlsv1_client_write.c 435 enum { SIGN_ALG_RSA, SIGN_ALG_DSA } alg = SIGN_ALG_RSA; local
508 if (alg == SIGN_ALG_RSA) {
535 if (alg == SIGN_ALG_RSA)
tlsv1_server_read.c 774 enum { SIGN_ALG_RSA, SIGN_ALG_DSA } alg = SIGN_ALG_RSA; local
884 if (alg == SIGN_ALG_RSA) {
911 if (alg == SIGN_ALG_RSA)
  /libcore/luni/src/main/java/java/security/
Security.java 98 String prop = "Alg." + propName + "." + algName;
307 String alg = key.substring(j + 1); local
308 if (serv.length() == 0 || alg.length() == 0) {
318 if (!p.implementsAlg(serv, alg, attribute, val)) {
  /external/iproute2/ip/
xfrm_state.c 120 static int xfrm_algo_parse(struct xfrm_algo *alg, enum xfrm_attr_type_t type,
131 strncpy(alg->alg_name, name, sizeof(alg->alg_name));
173 alg->alg_key_len = len * 8;
351 struct xfrm_algo alg; member in union:__anon9134::__anon9135
355 } alg = {}; local
398 buf = alg.u.alg.alg_key;
399 len = sizeof(alg.u.alg);
    [all...]
  /external/ipsec-tools/src/racoon/
handler.c 1077 struct sainfoalg *alg; local
1198 for (alg = sainfo->algs[algclass_ipsec_auth]; alg; alg = alg->next) {
1199 if (alg->alg == approval->head->head->authtype)
1202 if (alg == NULL) {
1204 "Reload: alg == NULL (auth)\n");
1209 for (alg = sainfo->algs[algclass_ipsec_enc];
    [all...]
  /external/wpa_supplicant_8/src/crypto/
crypto_cryptoapi.c 106 int cryptoapi_hash_vector(ALG_ID alg, size_t hash_len, size_t num_elem,
120 if (!CryptCreateHash(prov, alg, 0, 0, &hash)) {
345 enum crypto_hash_alg alg; member in struct:crypto_hash
352 struct crypto_hash * crypto_hash_init(enum crypto_hash_alg alg, const u8 *key,
364 switch (alg) {
397 ctx->alg = alg;
429 switch (alg) {
491 if (ctx->alg == CRYPTO_HASH_ALG_HMAC_SHA1 ||
492 ctx->alg == CRYPTO_HASH_ALG_HMAC_MD5
    [all...]
crypto_libtomcrypt.c 144 enum crypto_hash_alg alg; member in struct:crypto_hash
153 struct crypto_hash * crypto_hash_init(enum crypto_hash_alg alg, const u8 *key,
162 ctx->alg = alg;
164 switch (alg) {
199 switch (ctx->alg) {
232 switch (ctx->alg) {
297 struct crypto_cipher * crypto_cipher_init(enum crypto_cipher_alg alg,
304 switch (alg) {
  /external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/provider/crypto/
DSAKeyFactoryImplTest.java 374 String alg = pubKey.getAlgorithm(); local
375 assertNotNull(alg);
376 assertFalse(alg.equals("DSA"));
499 String alg = prKey.getAlgorithm(); local
500 assertNotNull(alg);
501 assertFalse("DSA".equals(alg));
781 String alg = pubKey.getAlgorithm(); local
782 assertNotNull(alg);
783 assertFalse("X.509".equals(alg));
825 String alg = prKey.getAlgorithm() local
    [all...]

Completed in 1361 milliseconds

12 3 4 5