/external/wpa_supplicant_8/src/rsn_supp/ |
wpa_ft.c | 319 enum wpa_alg alg; local 330 alg = wpa_cipher_to_alg(sm->pairwise_cipher); 333 if (wpa_sm_set_key(sm, alg, bssid, 0, 1, null_rsc, 542 enum wpa_alg alg; local 568 alg = wpa_cipher_to_alg(sm->group_cipher); 569 if (alg == WPA_ALG_NONE) { 592 if (wpa_sm_set_key(sm, alg, broadcast_ether_addr, keyidx, 0,
|
/libcore/luni/src/main/java/org/apache/harmony/security/utils/ |
AlgNameMapper.java | 78 // Maps alg name to OID 80 // Maps OID to alg name 82 // Maps aliases to alg names 90 // map upper case alg name to its original name 95 // Alg.Alias.<service>.<OID-INTS-DOT-SEPARATED>=<alg-name> 97 // Alg.Alias.<service>.OID.<OID-INTS-DOT-SEPARATED>=<alg-name> 154 // Alg.Alias.<service>.<OID-INTS-DOT-SEPARATED>=<alg-name 166 String alg = (String)me.getValue(); local 187 algAliasesMap.put(alias.toUpperCase(Locale.US), alg); local [all...] |
JarUtils.java | 121 String alg = null; local 125 alg = daOid + "with" + deaOid; 127 sig = Signature.getInstance(alg); 134 alg = daName + "with" + deaName; 136 sig = Signature.getInstance(alg); 147 alg = daOid; 149 sig = Signature.getInstance(alg); 154 alg = daName; 156 sig = Signature.getInstance(alg);
|
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
KSPrivateKeyEntryTest.java | 180 private String alg = "My algorithm"; field in class:KSPrivateKeyEntryTest.tmpPrivateKey 183 return alg; 199 alg = algorithm;
|
KeyPairGenerator2Test.java | 202 String alg = validValues[i].concat(post); local 203 kpG = KeyPairGenerator.getInstance(alg); 205 .toUpperCase(), (mode <= 2 ? resAlg : alg).toUpperCase()); 241 String alg = validValues[i].concat(post); local 243 KeyPairGenerator.getInstance(alg, prov); 245 .concat(alg).concat(")")); 250 String alg = validValues[i].concat(post); local 253 KeyPairGenerator.getInstance(alg, invalidValues[j]); 255 .concat(alg).concat(" provider: ").concat( 263 String alg = validValues[i].concat(post) local 300 String alg = validValues[i].concat(post); local 310 String alg = validValues[i].concat(post); local [all...] |
AlgorithmParametersTest.java | 197 String[] alg = {"", "qwertyu", "!@#$%^&*()"}; local 209 for (int i = 0; i < alg.length; i++) { 211 AlgorithmParameters ap = AlgorithmParameters.getInstance(alg[i], "MyProvider"); 212 fail("NoSuchAlgorithmException was not thrown for parameter " + alg[i]); 216 fail("Incorrect exception " + e + " was thrown for " + alg[i]); 305 String[] alg = {"", "qwertyu", "!@#$%^&*()"}; local 317 for (int i = 0; i < alg.length; i++) { 319 AlgorithmParameters ap = AlgorithmParameters.getInstance(alg[i], p); 320 fail("NoSuchAlgorithmException was not thrown for parameter " + alg[i]); 324 fail("Incorrect exception " + e + " was thrown for " + alg[i]) [all...] |
/bionic/libc/netbsd/nameser/ |
ns_print.c | 585 u_int c_type, key_tag, alg; local 593 alg = (u_int) *rdata++; 595 len = SPRINTF((tmp1, "%d %d %d ", c_type, key_tag, alg));
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
KeyPairGenerator2Test.java | 199 String alg = validValues[i].concat(post); local 200 kpG = KeyPairGenerator.getInstance(alg); 202 .toUpperCase(), (mode <= 2 ? resAlg : alg).toUpperCase()); 238 String alg = validValues[i].concat(post); local 240 KeyPairGenerator.getInstance(alg, prov); 242 .concat(alg).concat(")")); 247 String alg = validValues[i].concat(post); local 250 KeyPairGenerator.getInstance(alg, invalidValues[j]); 252 .concat(alg).concat(" provider: ").concat( 260 String alg = validValues[i].concat(post) local 297 String alg = validValues[i].concat(post); local 307 String alg = validValues[i].concat(post); local [all...] |
Signature2Test.java | 61 String alg = Signature.getInstance("DSA").getAlgorithm(); local 62 assertTrue("getAlgorithm did not get DSA (" + alg + ")", alg
|
MessageDigest2Test.java | 326 String alg = MessageDigest.getInstance(digestAlgs[i], local 328 assertTrue("getAlgorithm ok", alg.equals(digestAlgs[i]));
|
/external/ipsec-tools/src/libipsec/ |
key_debug.c | 309 struct sadb_alg *alg; local 317 / sizeof(*alg); 318 alg = (void *)(sup + 1); 322 alg->sadb_alg_id, alg->sadb_alg_ivlen, 323 alg->sadb_alg_minbits, alg->sadb_alg_maxbits); 324 alg++;
|
pfkey.c | 250 struct sadb_alg *alg; local 252 alg = findsupportedalg(satype, alg_id); 253 if (!alg) 256 if (keylen < alg->sadb_alg_minbits || keylen > alg->sadb_alg_maxbits) { 257 fprintf(stderr, "%d %d %d\n", keylen, alg->sadb_alg_minbits, 258 alg->sadb_alg_maxbits); 280 struct sadb_alg *alg; local 301 alg = findsupportedalg(satype, alg_id); 302 if (!alg) [all...] |
/external/openssl/crypto/rsa/ |
rsa_ameth.c | 268 static RSA_PSS_PARAMS *rsa_pss_decode(const X509_ALGOR *alg, 277 if (!alg->parameter || alg->parameter->type != V_ASN1_SEQUENCE) 279 p = alg->parameter->value.sequence->data; 280 plen = alg->parameter->value.sequence->length; 412 X509_ALGOR *alg = NULL; local 418 PKCS7_SIGNER_INFO_get0_algs(arg2, NULL, NULL, &alg); 423 PKCS7_RECIP_INFO_get0_alg(arg2, &alg); 428 CMS_SignerInfo_get0_algs(arg2, NULL, NULL, NULL, &alg); 433 CMS_RecipientInfo_ktri_get0_algs(arg2, NULL, NULL, &alg); [all...] |
/external/smack/src/org/xbill/DNS/ |
CERTRecord.java | 110 private int alg; field in class:CERTRecord 124 * @param alg The algorithm of the associated KEYRecord, if present 129 int alg, byte [] cert) 134 this.alg = checkU8("alg", alg); 142 alg = in.readU8(); 155 alg = DNSSEC.Algorithm.value(algString); 156 if (alg < 0) 171 sb.append (alg); [all...] |
SIGBase.java | 20 protected int alg, labels; field in class:SIGBase 31 SIGBase(Name name, int type, int dclass, long ttl, int covered, int alg, 39 this.alg = checkU8("alg", alg); 54 alg = in.readU8(); 71 alg = DNSSEC.Algorithm.value(algString); 72 if (alg < 0) 89 sb.append (alg); 126 return alg; [all...] |
TSIG.java | 18 private static final String HMAC_MD5_STR = "HMAC-MD5.SIG-ALG.REG.INT."; 56 private Name name, alg; field in class:TSIG 63 if (alg.equals(HMAC_MD5)) { 66 } else if (alg.equals(HMAC_SHA1)) { 69 } else if (alg.equals(HMAC_SHA224)) { 72 } else if (alg.equals(HMAC_SHA256)) { 75 } else if (alg.equals(HMAC_SHA512)) { 78 } else if (alg.equals(HMAC_SHA384)) { 94 this.alg = algorithm; 128 this.alg = algorithm [all...] |
/external/wpa_supplicant_8/src/common/ |
privsep_commands.h | 46 int alg; member in struct:privsep_cmd_set_key
|
/external/wpa_supplicant_8/src/tls/ |
tlsv1_client_write.c | 435 enum { SIGN_ALG_RSA, SIGN_ALG_DSA } alg = SIGN_ALG_RSA; local 508 if (alg == SIGN_ALG_RSA) { 535 if (alg == SIGN_ALG_RSA)
|
tlsv1_server_read.c | 774 enum { SIGN_ALG_RSA, SIGN_ALG_DSA } alg = SIGN_ALG_RSA; local 884 if (alg == SIGN_ALG_RSA) { 911 if (alg == SIGN_ALG_RSA)
|
/libcore/luni/src/main/java/java/security/ |
Security.java | 98 String prop = "Alg." + propName + "." + algName; 307 String alg = key.substring(j + 1); local 308 if (serv.length() == 0 || alg.length() == 0) { 318 if (!p.implementsAlg(serv, alg, attribute, val)) {
|
/external/iproute2/ip/ |
xfrm_state.c | 120 static int xfrm_algo_parse(struct xfrm_algo *alg, enum xfrm_attr_type_t type, 131 strncpy(alg->alg_name, name, sizeof(alg->alg_name)); 173 alg->alg_key_len = len * 8; 351 struct xfrm_algo alg; member in union:__anon9134::__anon9135 355 } alg = {}; local 398 buf = alg.u.alg.alg_key; 399 len = sizeof(alg.u.alg); [all...] |
/external/ipsec-tools/src/racoon/ |
handler.c | 1077 struct sainfoalg *alg; local 1198 for (alg = sainfo->algs[algclass_ipsec_auth]; alg; alg = alg->next) { 1199 if (alg->alg == approval->head->head->authtype) 1202 if (alg == NULL) { 1204 "Reload: alg == NULL (auth)\n"); 1209 for (alg = sainfo->algs[algclass_ipsec_enc]; [all...] |
/external/wpa_supplicant_8/src/crypto/ |
crypto_cryptoapi.c | 106 int cryptoapi_hash_vector(ALG_ID alg, size_t hash_len, size_t num_elem, 120 if (!CryptCreateHash(prov, alg, 0, 0, &hash)) { 345 enum crypto_hash_alg alg; member in struct:crypto_hash 352 struct crypto_hash * crypto_hash_init(enum crypto_hash_alg alg, const u8 *key, 364 switch (alg) { 397 ctx->alg = alg; 429 switch (alg) { 491 if (ctx->alg == CRYPTO_HASH_ALG_HMAC_SHA1 || 492 ctx->alg == CRYPTO_HASH_ALG_HMAC_MD5 [all...] |
crypto_libtomcrypt.c | 144 enum crypto_hash_alg alg; member in struct:crypto_hash 153 struct crypto_hash * crypto_hash_init(enum crypto_hash_alg alg, const u8 *key, 162 ctx->alg = alg; 164 switch (alg) { 199 switch (ctx->alg) { 232 switch (ctx->alg) { 297 struct crypto_cipher * crypto_cipher_init(enum crypto_cipher_alg alg, 304 switch (alg) {
|
/external/apache-harmony/security/src/test/impl/java/org/apache/harmony/security/tests/provider/crypto/ |
DSAKeyFactoryImplTest.java | 374 String alg = pubKey.getAlgorithm(); local 375 assertNotNull(alg); 376 assertFalse(alg.equals("DSA")); 499 String alg = prKey.getAlgorithm(); local 500 assertNotNull(alg); 501 assertFalse("DSA".equals(alg)); 781 String alg = pubKey.getAlgorithm(); local 782 assertNotNull(alg); 783 assertFalse("X.509".equals(alg)); 825 String alg = prKey.getAlgorithm() local [all...] |