/external/wpa_supplicant_8/wpa_supplicant/tests/ |
test_wpa.c | 136 static int supp_set_key(void *ctx, enum wpa_alg alg, 141 wpa_printf(MSG_DEBUG, "SUPP: %s(alg=%d addr=" MACSTR " key_idx=%d " 143 __func__, alg, MAC2STR(addr), key_idx, set_tx);
|
/system/extras/verity/ |
VerityVerifier.java | 233 String alg = fields[7]; local 235 if (!"sha256".equals(alg)) {
|
/external/ipsec-tools/src/racoon/ |
proposal.c | 345 "sec alg mismatched: my:%d peer:%d\n", 655 if (a->alg == IPSECDOI_ATTR_AUTH_NONE) 667 newtr->trns_id = ipsecdoi_authalg2trnsid(a->alg); 668 newtr->authtype = a->alg; 691 newtr->trns_id = a->alg; 693 newtr->authtype = b->alg; 717 newtr->trns_id = a->alg;
|
cfparse.h | 381 struct sainfoalg *alg; member in union:YYSTYPE
|
/libcore/luni/src/main/java/java/security/ |
Provider.java | 302 * @param alg 310 boolean implementsAlg(String serv, String alg, String attribute, String val) { 311 String servAlg = serv + "." + alg; 314 alg = getPropertyIgnoreCase("Alg.Alias." + servAlg); 315 if (alg != null) { 316 servAlg = serv + "." + alg; 532 super.put("Alg.Alias." + s.type + "." + i.next(), s.algorithm); 554 super.remove("Alg.Alias." + s.type + "." + i.next()); 582 if (k.startsWith("Alg.Alias.")) { // Alg.Alias.<crypto_service>.<aliasName>=<standardName [all...] |
/external/wpa_supplicant_8/src/drivers/ |
driver_hostap.c | 399 enum wpa_alg alg, const u8 *addr, 421 switch (alg) { 423 os_strlcpy((char *) param->u.crypt.alg, "NONE", 427 os_strlcpy((char *) param->u.crypt.alg, "WEP", 431 os_strlcpy((char *) param->u.crypt.alg, "TKIP", 435 os_strlcpy((char *) param->u.crypt.alg, "CCMP",
|
/external/apache-harmony/x-net/src/test/api/java/org/apache/harmony/xnet/tests/javax/net/ssl/ |
SSLContext1Test.java | 498 public MySSLContext(SSLContextSpi spi, Provider prov, String alg) { 499 super(spi, prov, alg);
|
/external/vboot_reference/scripts/image_signing/ |
sign_official_build.sh | 204 verity_algorithm=$(get_verity_arg "${vroot_dev}" alg) 217 alg=${verity_algorithm} \
|
/external/wpa_supplicant_8/src/rsn_supp/ |
wpa_i.h | 156 static inline int wpa_sm_set_key(struct wpa_sm *sm, enum wpa_alg alg, 162 return sm->ctx->set_key(sm->ctx->ctx, alg, addr, key_idx, set_tx,
|
/libcore/harmony-tests/src/test/java/org/apache/harmony/tests/javax/net/ssl/ |
KeyManagerFactory1Test.java | 525 String alg) { 526 super(spi, prov, alg);
|
TrustManagerFactory1Test.java | 515 String alg) { 516 super(spi, prov, alg);
|
SSLContext1Test.java | 596 public MySslContext(SSLContextSpi spi, Provider prov, String alg) { 597 super(spi, prov, alg);
|
/libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/ |
SecretKeyFactoryTest.java | 477 public mySecretKeyFactory(SecretKeyFactorySpi spi, Provider prov, String alg) { 478 super(spi, prov, alg);
|
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
KeyFactory2Test.java | 72 private KeepAlive createKeepAlive(String alg) { 73 if (alg.equals("RSA")) {
|
/external/ipsec-tools/src/libipsec/ |
pfkey.c | 250 struct sadb_alg *alg; local 252 alg = findsupportedalg(satype, alg_id); 253 if (!alg) 256 if (keylen < alg->sadb_alg_minbits || keylen > alg->sadb_alg_maxbits) { 257 fprintf(stderr, "%d %d %d\n", keylen, alg->sadb_alg_minbits, 258 alg->sadb_alg_maxbits); 280 struct sadb_alg *alg; local 301 alg = findsupportedalg(satype, alg_id); 302 if (!alg) [all...] |
/external/icu/icu4j/main/classes/core/src/com/ibm/icu/impl/ |
UCharacterName.java | [all...] |
/external/skia/bench/ |
tile_analyze.py | 265 dest='alg', default=REPRESENTATION_ALG, 274 rev, options.alg, options.log_dir, options.plat)
|
/external/wpa_supplicant_8/src/tls/ |
tlsv1_common.h | 231 enum crypto_cipher_alg alg; member in struct:tls_cipher_data
|
/external/wpa_supplicant_8/wpa_supplicant/ |
preauth_test.c | 127 static int wpa_supplicant_set_key(void *wpa_s, enum wpa_alg alg,
|
wpas_glue.c | 485 static int wpa_supplicant_set_key(void *_wpa_s, enum wpa_alg alg, 491 if (alg == WPA_ALG_TKIP && key_idx == 0 && key_len == 32) { 497 alg != WPA_ALG_NONE && key_len <= sizeof(wpa_s->last_gtk)) { 502 return wpa_drv_set_key(wpa_s, alg, addr, key_idx, set_tx, seq, seq_len,
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/keystore/pkcs12/ |
PKCS12KeyStoreSpi.java | 735 PBES2Parameters alg = PBES2Parameters.getInstance(algId.getParameters()); local 736 PBKDF2Params func = PBKDF2Params.getInstance(alg.getKeyDerivationFunc().getParameters()); 737 AlgorithmIdentifier encScheme = AlgorithmIdentifier.getInstance(alg.getEncryptionScheme()); 739 SecretKeyFactory keyFact = helper.createSecretKeyFactory(alg.getKeyDerivationFunc().getAlgorithm().getId()); 751 Cipher cipher = Cipher.getInstance(alg.getEncryptionScheme().getAlgorithm().getId()); 753 AlgorithmIdentifier encryptionAlg = AlgorithmIdentifier.getInstance(alg.getEncryptionScheme()); 755 ASN1Encodable encParams = alg.getEncryptionScheme().getParameters(); [all...] |
/external/openssh/ |
sshconnect2.c | 105 char *oavail, *avail, *first, *last, *alg, *hostname, *ret; local 132 while ((alg = strsep(&avail, ",")) && *alg != '\0') { 133 if ((ktype = sshkey_type_from_name(alg)) == KEY_UNSPEC) 134 fatal("%s: unknown alg %s", __func__, alg); 137 ALG_APPEND(first, alg); 139 ALG_APPEND(last, alg); [all...] |
/external/wpa_supplicant_8/src/ap/ |
wpa_auth_glue.c | 282 static int hostapd_wpa_auth_set_key(void *ctx, int vlan_id, enum wpa_alg alg, 295 return hostapd_drv_set_key(ifname, hapd, alg, addr, idx, 1, NULL, 0,
|
wpa_auth.h | 199 int (*set_key)(void *ctx, int vlan_id, enum wpa_alg alg,
|
/external/wpa_supplicant_8/src/crypto/ |
crypto_openssl.c | 421 struct crypto_cipher * crypto_cipher_init(enum crypto_cipher_alg alg, 432 switch (alg) { 665 struct crypto_hash * crypto_hash_init(enum crypto_hash_alg alg, const u8 *key, 671 switch (alg) {
|