/external/ipsec-tools/src/racoon/ |
sainfo.h | 66 int alg; member in struct:sainfoalg
|
handler.c | 1077 struct sainfoalg *alg; local 1198 for (alg = sainfo->algs[algclass_ipsec_auth]; alg; alg = alg->next) { 1199 if (alg->alg == approval->head->head->authtype) 1202 if (alg == NULL) { 1204 "Reload: alg == NULL (auth)\n"); 1209 for (alg = sainfo->algs[algclass_ipsec_enc]; [all...] |
pfkey.c | 2778 u_int alg; local [all...] |
cfparse.h | 381 struct sainfoalg *alg; member in union:YYSTYPE
|
/external/openssl/crypto/pkcs7/ |
pk7_attr.c | 99 X509_ALGOR *alg; local 101 if(!(alg = X509_ALGOR_new())) { 105 ASN1_OBJECT_free(alg->algorithm); 106 alg->algorithm = OBJ_nid2obj (nid); 109 if(!(alg->parameter = ASN1_TYPE_new())) { 121 alg->parameter->value.integer = nbit; 122 alg->parameter->type = V_ASN1_INTEGER; 124 sk_X509_ALGOR_push (sk, alg);
|
pk7_lib.c | 239 X509_ALGOR *alg; local 265 alg=sk_X509_ALGOR_value(md_sk,i); 266 if (OBJ_obj2nid(alg->algorithm) == nid) 274 if(!(alg=X509_ALGOR_new()) 275 || !(alg->parameter = ASN1_TYPE_new())) 277 X509_ALGOR_free(alg); 281 alg->algorithm=OBJ_nid2obj(nid); 282 alg->parameter->type = V_ASN1_NULL; 283 if (!sk_X509_ALGOR_push(md_sk,alg)) 285 X509_ALGOR_free(alg); [all...] |
/external/apache-harmony/crypto/src/test/support/common/java/org/apache/harmony/crypto/tests/support/ |
MyExemptionMechanismSpi.java | 101 private String alg; field in class:MyExemptionMechanismSpi.tmpKey 104 public tmpKey(String alg, byte[] enc) { 105 this.alg = alg; 114 return alg; 126 public tmp1Key(String alg, byte[] enc) {
|
/external/openssl/crypto/ocsp/ |
ocsp_lib.c | 106 X509_ALGOR *alg; local 112 alg = cid->hashAlgorithm; 113 if (alg->algorithm != NULL) ASN1_OBJECT_free(alg->algorithm); 119 if (!(alg->algorithm=OBJ_nid2obj(nid))) goto err; 120 if ((alg->parameter=ASN1_TYPE_new()) == NULL) goto err; 121 alg->parameter->type=V_ASN1_NULL;
|
/external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/ |
AlgorithmParameterGenerator3Test.java | 56 String alg = AlgorithmParameterGenerator.getInstance("DSA") local 58 assertEquals("getAlgorithm ok", "DSA", alg);
|
KeyPairGenerator4Test.java | 45 String alg = KeyPairGenerator.getInstance("DSA").getAlgorithm(); local 46 assertEquals("getAlgorithm returned unexpected value", "DSA", alg);
|
KSPrivateKeyEntryTest.java | 188 private String alg = "My algorithm"; field in class:KSPrivateKeyEntryTest.tmpPrivateKey 191 return alg; 207 alg = algorithm;
|
KeyPairGenerator2Test.java | 198 String alg = validValues[i].concat(post); local 199 kpG = KeyPairGenerator.getInstance(alg); 201 .toUpperCase(), (mode <= 2 ? resAlg : alg).toUpperCase()); 237 String alg = validValues[i].concat(post); local 239 KeyPairGenerator.getInstance(alg, prov); 241 .concat(alg).concat(")")); 246 String alg = validValues[i].concat(post); local 249 KeyPairGenerator.getInstance(alg, invalidValues[j]); 251 .concat(alg).concat(" provider: ").concat( 259 String alg = validValues[i].concat(post) local 296 String alg = validValues[i].concat(post); local 306 String alg = validValues[i].concat(post); local [all...] |
Signature2Test.java | 62 String alg = Signature.getInstance("DSA").getAlgorithm(); local 63 assertTrue("getAlgorithm did not get DSA (" + alg + ")", alg
|
MessageDigest2Test.java | 326 String alg = MessageDigest.getInstance(digestAlgs[i], local 328 assertTrue("getAlgorithm ok", alg.equals(digestAlgs[i]));
|
/external/chromium_org/chrome/utility/importer/ |
nss_decryptor_system_nss.cc | 90 SECAlgorithmID alg; member in struct:SDRResult 98 { SEC_ASN1_INLINE | SEC_ASN1_XTRN, offsetof(SDRResult, alg), 200 params = PK11_ParamFromAlgid(&sdrResult.alg);
|
/external/chromium_org/crypto/ |
symmetric_key_win.cc | 44 // key created for the specified |provider|. |alg| contains the algorithm of 46 // If |key_data| is intended to be used as an HMAC key, then |alg| should be 51 ALG_ID alg, 67 key_header->hdr.aiKeyAlg = alg; 73 if (alg == CALG_HMAC) { 105 ALG_ID alg = GetAESAlgIDForKeySize(key_size_in_bits); local 106 if (alg == 0) 124 ok = CryptGenKey(safe_provider.get(), alg, CRYPT_EXPORTABLE, 136 // Section 3. |alg| is the hash function used in the HMAC. 137 bool CheckHMACKeySize(size_t key_size_in_bits, ALG_ID alg) { 367 ALG_ID alg = 0; local 467 ALG_ID alg = 0; local [all...] |
/external/openssl/crypto/rsa/ |
rsa_pmeth.c | 571 X509_ALGOR *alg = NULL; local 574 CMS_RecipientInfo_ktri_get0_algs(p2, NULL, NULL, &alg); 575 if (alg) 576 X509_ALGOR_get0(&encalg, NULL, NULL, alg);
|
rsa_ameth.c | 268 static RSA_PSS_PARAMS *rsa_pss_decode(const X509_ALGOR *alg, 277 if (!alg->parameter || alg->parameter->type != V_ASN1_SEQUENCE) 279 p = alg->parameter->value.sequence->data; 280 plen = alg->parameter->value.sequence->length; 412 X509_ALGOR *alg = NULL; local 418 PKCS7_SIGNER_INFO_get0_algs(arg2, NULL, NULL, &alg); 423 PKCS7_RECIP_INFO_get0_alg(arg2, &alg); 428 CMS_SignerInfo_get0_algs(arg2, NULL, NULL, NULL, &alg); 433 CMS_RecipientInfo_ktri_get0_algs(arg2, NULL, NULL, &alg); [all...] |
/external/chromium_org/third_party/boringssl/src/crypto/evp/ |
p_rsa_asn1.c | 262 static X509_ALGOR *rsa_mgf1_decode(X509_ALGOR *alg) { 266 if (alg == NULL || 267 OBJ_obj2nid(alg->algorithm) != NID_mgf1 || 268 alg->parameter->type != V_ASN1_SEQUENCE) { 272 p = alg->parameter->value.sequence->data; 273 plen = alg->parameter->value.sequence->length; 277 static RSA_PSS_PARAMS *rsa_pss_decode(const X509_ALGOR *alg, 285 if (!alg->parameter || alg->parameter->type != V_ASN1_SEQUENCE) { 288 p = alg->parameter->value.sequence->data 413 X509_ALGOR *alg = NULL; local [all...] |
/external/ipsec-tools/src/libipsec/ |
key_debug.c | 309 struct sadb_alg *alg; local 317 / sizeof(*alg); 318 alg = (void *)(sup + 1); 322 alg->sadb_alg_id, alg->sadb_alg_ivlen, 323 alg->sadb_alg_minbits, alg->sadb_alg_maxbits); 324 alg++;
|
pfkey.c | 250 struct sadb_alg *alg; local 252 alg = findsupportedalg(satype, alg_id); 253 if (!alg) 256 if (keylen < alg->sadb_alg_minbits || keylen > alg->sadb_alg_maxbits) { 257 fprintf(stderr, "%d %d %d\n", keylen, alg->sadb_alg_minbits, 258 alg->sadb_alg_maxbits); 280 struct sadb_alg *alg; local 301 alg = findsupportedalg(satype, alg_id); 302 if (!alg) [all...] |
/external/openssl/crypto/cms/ |
cms_sd.c | 306 X509_ALGOR *alg; local 369 alg = sk_X509_ALGOR_value(sd->digestAlgorithms, i); 370 X509_ALGOR_get0(&aoid, NULL, NULL, alg); 377 alg = X509_ALGOR_new(); 378 if (!alg) 380 cms_DigestAlgorithm_set(alg, md); 381 if (!sk_X509_ALGOR_push(sd->digestAlgorithms, alg)) 383 X509_ALGOR_free(alg); 927 X509_ALGOR *alg; local 935 alg = X509_ALGOR_new() [all...] |
/bionic/libc/dns/nameser/ |
ns_print.c | 589 u_int c_type, key_tag, alg; local 597 alg = (u_int) *rdata++; 599 len = SPRINTF((tmp1, "%d %d %d ", c_type, key_tag, alg));
|
/external/iproute2/ip/ |
xfrm_state.c | 117 static int xfrm_algo_parse(struct xfrm_algo *alg, enum xfrm_attr_type_t type, 128 strncpy(alg->alg_name, name, sizeof(alg->alg_name)); 170 alg->alg_key_len = len * 8; 370 struct xfrm_algo alg; member in union:__anon1965::__anon1966 375 } alg = {}; local 419 buf = alg.u.alg.alg_key; 420 len = sizeof(alg.u.alg); [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/keystore/pkcs12/ |
PKCS12KeyStoreSpi.java | 718 PBES2Parameters alg = PBES2Parameters.getInstance(algId.getParameters()); local 719 PBKDF2Params func = PBKDF2Params.getInstance(alg.getKeyDerivationFunc().getParameters()); 720 AlgorithmIdentifier encScheme = AlgorithmIdentifier.getInstance(alg.getEncryptionScheme()); 722 SecretKeyFactory keyFact = SecretKeyFactory.getInstance(alg.getKeyDerivationFunc().getAlgorithm().getId(), bcProvider); 734 Cipher cipher = Cipher.getInstance(alg.getEncryptionScheme().getAlgorithm().getId()); 736 AlgorithmIdentifier encryptionAlg = AlgorithmIdentifier.getInstance(alg.getEncryptionScheme()); 738 ASN1Encodable encParams = alg.getEncryptionScheme().getParameters(); [all...] |