HomeSort by relevance Sort by last modified time
    Searched defs:alg (Results 1 - 25 of 33) sorted by null

1 2

  /external/ipsec-tools/src/racoon/
sainfo.h 66 int alg; member in struct:sainfoalg
handler.c 1077 struct sainfoalg *alg; local
1198 for (alg = sainfo->algs[algclass_ipsec_auth]; alg; alg = alg->next) {
1199 if (alg->alg == approval->head->head->authtype)
1202 if (alg == NULL) {
1204 "Reload: alg == NULL (auth)\n");
1209 for (alg = sainfo->algs[algclass_ipsec_enc];
    [all...]
pfkey.c 2778 u_int alg; local
    [all...]
cfparse.h 381 struct sainfoalg *alg; member in union:YYSTYPE
  /external/openssl/crypto/pkcs7/
pk7_attr.c 99 X509_ALGOR *alg; local
101 if(!(alg = X509_ALGOR_new())) {
105 ASN1_OBJECT_free(alg->algorithm);
106 alg->algorithm = OBJ_nid2obj (nid);
109 if(!(alg->parameter = ASN1_TYPE_new())) {
121 alg->parameter->value.integer = nbit;
122 alg->parameter->type = V_ASN1_INTEGER;
124 sk_X509_ALGOR_push (sk, alg);
pk7_lib.c 239 X509_ALGOR *alg; local
265 alg=sk_X509_ALGOR_value(md_sk,i);
266 if (OBJ_obj2nid(alg->algorithm) == nid)
274 if(!(alg=X509_ALGOR_new())
275 || !(alg->parameter = ASN1_TYPE_new()))
277 X509_ALGOR_free(alg);
281 alg->algorithm=OBJ_nid2obj(nid);
282 alg->parameter->type = V_ASN1_NULL;
283 if (!sk_X509_ALGOR_push(md_sk,alg))
285 X509_ALGOR_free(alg);
    [all...]
  /external/apache-harmony/crypto/src/test/support/common/java/org/apache/harmony/crypto/tests/support/
MyExemptionMechanismSpi.java 101 private String alg; field in class:MyExemptionMechanismSpi.tmpKey
104 public tmpKey(String alg, byte[] enc) {
105 this.alg = alg;
114 return alg;
126 public tmp1Key(String alg, byte[] enc) {
  /external/openssl/crypto/ocsp/
ocsp_lib.c 106 X509_ALGOR *alg; local
112 alg = cid->hashAlgorithm;
113 if (alg->algorithm != NULL) ASN1_OBJECT_free(alg->algorithm);
119 if (!(alg->algorithm=OBJ_nid2obj(nid))) goto err;
120 if ((alg->parameter=ASN1_TYPE_new()) == NULL) goto err;
121 alg->parameter->type=V_ASN1_NULL;
  /external/apache-harmony/security/src/test/api/java/org/apache/harmony/security/tests/java/security/
AlgorithmParameterGenerator3Test.java 56 String alg = AlgorithmParameterGenerator.getInstance("DSA") local
58 assertEquals("getAlgorithm ok", "DSA", alg);
KeyPairGenerator4Test.java 45 String alg = KeyPairGenerator.getInstance("DSA").getAlgorithm(); local
46 assertEquals("getAlgorithm returned unexpected value", "DSA", alg);
KSPrivateKeyEntryTest.java 188 private String alg = "My algorithm"; field in class:KSPrivateKeyEntryTest.tmpPrivateKey
191 return alg;
207 alg = algorithm;
KeyPairGenerator2Test.java 198 String alg = validValues[i].concat(post); local
199 kpG = KeyPairGenerator.getInstance(alg);
201 .toUpperCase(), (mode <= 2 ? resAlg : alg).toUpperCase());
237 String alg = validValues[i].concat(post); local
239 KeyPairGenerator.getInstance(alg, prov);
241 .concat(alg).concat(")"));
246 String alg = validValues[i].concat(post); local
249 KeyPairGenerator.getInstance(alg, invalidValues[j]);
251 .concat(alg).concat(" provider: ").concat(
259 String alg = validValues[i].concat(post) local
296 String alg = validValues[i].concat(post); local
306 String alg = validValues[i].concat(post); local
    [all...]
Signature2Test.java 62 String alg = Signature.getInstance("DSA").getAlgorithm(); local
63 assertTrue("getAlgorithm did not get DSA (" + alg + ")", alg
MessageDigest2Test.java 326 String alg = MessageDigest.getInstance(digestAlgs[i], local
328 assertTrue("getAlgorithm ok", alg.equals(digestAlgs[i]));
  /external/chromium_org/chrome/utility/importer/
nss_decryptor_system_nss.cc 90 SECAlgorithmID alg; member in struct:SDRResult
98 { SEC_ASN1_INLINE | SEC_ASN1_XTRN, offsetof(SDRResult, alg),
200 params = PK11_ParamFromAlgid(&sdrResult.alg);
  /external/chromium_org/crypto/
symmetric_key_win.cc 44 // key created for the specified |provider|. |alg| contains the algorithm of
46 // If |key_data| is intended to be used as an HMAC key, then |alg| should be
51 ALG_ID alg,
67 key_header->hdr.aiKeyAlg = alg;
73 if (alg == CALG_HMAC) {
105 ALG_ID alg = GetAESAlgIDForKeySize(key_size_in_bits); local
106 if (alg == 0)
124 ok = CryptGenKey(safe_provider.get(), alg, CRYPT_EXPORTABLE,
136 // Section 3. |alg| is the hash function used in the HMAC.
137 bool CheckHMACKeySize(size_t key_size_in_bits, ALG_ID alg) {
367 ALG_ID alg = 0; local
467 ALG_ID alg = 0; local
    [all...]
  /external/openssl/crypto/rsa/
rsa_pmeth.c 571 X509_ALGOR *alg = NULL; local
574 CMS_RecipientInfo_ktri_get0_algs(p2, NULL, NULL, &alg);
575 if (alg)
576 X509_ALGOR_get0(&encalg, NULL, NULL, alg);
rsa_ameth.c 268 static RSA_PSS_PARAMS *rsa_pss_decode(const X509_ALGOR *alg,
277 if (!alg->parameter || alg->parameter->type != V_ASN1_SEQUENCE)
279 p = alg->parameter->value.sequence->data;
280 plen = alg->parameter->value.sequence->length;
412 X509_ALGOR *alg = NULL; local
418 PKCS7_SIGNER_INFO_get0_algs(arg2, NULL, NULL, &alg);
423 PKCS7_RECIP_INFO_get0_alg(arg2, &alg);
428 CMS_SignerInfo_get0_algs(arg2, NULL, NULL, NULL, &alg);
433 CMS_RecipientInfo_ktri_get0_algs(arg2, NULL, NULL, &alg);
    [all...]
  /external/chromium_org/third_party/boringssl/src/crypto/evp/
p_rsa_asn1.c 262 static X509_ALGOR *rsa_mgf1_decode(X509_ALGOR *alg) {
266 if (alg == NULL ||
267 OBJ_obj2nid(alg->algorithm) != NID_mgf1 ||
268 alg->parameter->type != V_ASN1_SEQUENCE) {
272 p = alg->parameter->value.sequence->data;
273 plen = alg->parameter->value.sequence->length;
277 static RSA_PSS_PARAMS *rsa_pss_decode(const X509_ALGOR *alg,
285 if (!alg->parameter || alg->parameter->type != V_ASN1_SEQUENCE) {
288 p = alg->parameter->value.sequence->data
413 X509_ALGOR *alg = NULL; local
    [all...]
  /external/ipsec-tools/src/libipsec/
key_debug.c 309 struct sadb_alg *alg; local
317 / sizeof(*alg);
318 alg = (void *)(sup + 1);
322 alg->sadb_alg_id, alg->sadb_alg_ivlen,
323 alg->sadb_alg_minbits, alg->sadb_alg_maxbits);
324 alg++;
pfkey.c 250 struct sadb_alg *alg; local
252 alg = findsupportedalg(satype, alg_id);
253 if (!alg)
256 if (keylen < alg->sadb_alg_minbits || keylen > alg->sadb_alg_maxbits) {
257 fprintf(stderr, "%d %d %d\n", keylen, alg->sadb_alg_minbits,
258 alg->sadb_alg_maxbits);
280 struct sadb_alg *alg; local
301 alg = findsupportedalg(satype, alg_id);
302 if (!alg)
    [all...]
  /external/openssl/crypto/cms/
cms_sd.c 306 X509_ALGOR *alg; local
369 alg = sk_X509_ALGOR_value(sd->digestAlgorithms, i);
370 X509_ALGOR_get0(&aoid, NULL, NULL, alg);
377 alg = X509_ALGOR_new();
378 if (!alg)
380 cms_DigestAlgorithm_set(alg, md);
381 if (!sk_X509_ALGOR_push(sd->digestAlgorithms, alg))
383 X509_ALGOR_free(alg);
927 X509_ALGOR *alg; local
935 alg = X509_ALGOR_new()
    [all...]
  /bionic/libc/dns/nameser/
ns_print.c 589 u_int c_type, key_tag, alg; local
597 alg = (u_int) *rdata++;
599 len = SPRINTF((tmp1, "%d %d %d ", c_type, key_tag, alg));
  /external/iproute2/ip/
xfrm_state.c 117 static int xfrm_algo_parse(struct xfrm_algo *alg, enum xfrm_attr_type_t type,
128 strncpy(alg->alg_name, name, sizeof(alg->alg_name));
170 alg->alg_key_len = len * 8;
370 struct xfrm_algo alg; member in union:__anon1965::__anon1966
375 } alg = {}; local
419 buf = alg.u.alg.alg_key;
420 len = sizeof(alg.u.alg);
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/keystore/pkcs12/
PKCS12KeyStoreSpi.java 718 PBES2Parameters alg = PBES2Parameters.getInstance(algId.getParameters()); local
719 PBKDF2Params func = PBKDF2Params.getInstance(alg.getKeyDerivationFunc().getParameters());
720 AlgorithmIdentifier encScheme = AlgorithmIdentifier.getInstance(alg.getEncryptionScheme());
722 SecretKeyFactory keyFact = SecretKeyFactory.getInstance(alg.getKeyDerivationFunc().getAlgorithm().getId(), bcProvider);
734 Cipher cipher = Cipher.getInstance(alg.getEncryptionScheme().getAlgorithm().getId());
736 AlgorithmIdentifier encryptionAlg = AlgorithmIdentifier.getInstance(alg.getEncryptionScheme());
738 ASN1Encodable encParams = alg.getEncryptionScheme().getParameters();
    [all...]

Completed in 811 milliseconds

1 2