/external/wpa_supplicant_8/wpa_supplicant/ |
wpas_glue.c | 485 static int wpa_supplicant_set_key(void *_wpa_s, enum wpa_alg alg, 491 if (alg == WPA_ALG_TKIP && key_idx == 0 && key_len == 32) { 497 alg != WPA_ALG_NONE && key_len <= sizeof(wpa_s->last_gtk)) { 502 return wpa_drv_set_key(wpa_s, alg, addr, key_idx, set_tx, seq, seq_len,
|
driver_i.h | 142 enum wpa_alg alg, const u8 *addr, 147 if (alg != WPA_ALG_NONE) { 155 alg, addr, key_idx, set_tx,
|
/toolchain/binutils/binutils-2.25/gas/testsuite/gas/s390/ |
zarch-z900.s | 10 alg %r9,4095(%r5,%r10)
|
zarch-z990.s | 8 alg %r6,-524288(%r5,%r10)
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/keystore/pkcs12/ |
PKCS12KeyStoreSpi.java | 733 PBES2Parameters alg = PBES2Parameters.getInstance(algId.getParameters()); local 734 PBKDF2Params func = PBKDF2Params.getInstance(alg.getKeyDerivationFunc().getParameters()); 735 AlgorithmIdentifier encScheme = AlgorithmIdentifier.getInstance(alg.getEncryptionScheme()); 737 SecretKeyFactory keyFact = helper.createSecretKeyFactory(alg.getKeyDerivationFunc().getAlgorithm().getId()); 749 Cipher cipher = Cipher.getInstance(alg.getEncryptionScheme().getAlgorithm().getId()); 751 AlgorithmIdentifier encryptionAlg = AlgorithmIdentifier.getInstance(alg.getEncryptionScheme()); 753 ASN1Encodable encParams = alg.getEncryptionScheme().getParameters(); [all...] |
/external/chromium-trace/catapult/third_party/gsutil/gslib/ |
gcs_json_media.py | 244 for alg in self.outer_digesters: 245 self.outer_digesters[alg].update(data)
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/gs/ |
key.py | 120 alg, b64_digest = hash_pair.strip().split('=', 1) 121 self.cloud_hashes[alg] = binascii.a2b_base64(b64_digest) [all...] |
/external/libmicrohttpd/src/microhttpd/ |
digestauth.c | 90 * @param alg The hash algorithm used, can be "md5" or "md5-sess" 99 digest_calc_ha1 (const char *alg, 117 if (MHD_str_equal_caseless_(alg, "md5-sess"))
|
/external/tpm2/ |
CpriHash.c | 141 if(g_hashData[i].alg == hashAlg) 195 return g_hashData[index].alg; [all...] |
/external/wpa_supplicant_8/src/crypto/ |
tls_openssl_ocsp.c | 319 static char * algor_str(X509_ALGOR *alg) 327 i2a_ASN1_OBJECT(out, alg->algorithm);
|
crypto_openssl.c | 490 struct crypto_cipher * crypto_cipher_init(enum crypto_cipher_alg alg, 501 switch (alg) { 738 struct crypto_hash * crypto_hash_init(enum crypto_hash_alg alg, const u8 *key, 744 switch (alg) {
|
/libcore/harmony-tests/src/test/java/org/apache/harmony/tests/javax/net/ssl/ |
SSLContext1Test.java | 596 public MySslContext(SSLContextSpi spi, Provider prov, String alg) { 597 super(spi, prov, alg);
|
/external/wpa_supplicant_8/src/tls/ |
tlsv1_record.c | 61 rl->cipher_alg = data->alg;
|
/external/boringssl/src/include/openssl/ |
x509.h | 617 OPENSSL_EXPORT int X509_signature_print(BIO *bp,X509_ALGOR *alg, ASN1_STRING *sig); 714 OPENSSL_EXPORT int X509_ALGOR_set0(X509_ALGOR *alg, const ASN1_OBJECT *aobj, int ptype, void *pval); 717 OPENSSL_EXPORT void X509_ALGOR_set_md(X509_ALGOR *alg, const EVP_MD *md); [all...] |
/external/wpa_supplicant_8/src/ap/ |
wpa_auth_ft.c | 759 enum wpa_alg alg, const u8 *addr, int idx, 764 return wpa_auth->cb.set_key(wpa_auth->cb.ctx, vlan_id, alg, addr, idx, 771 enum wpa_alg alg; local 775 alg = wpa_cipher_to_alg(sm->pairwise); 778 wpa_printf(MSG_DEBUG, "FT: Unknown pairwise alg 0x%x - skip " 789 if (wpa_auth_set_key(sm->wpa_auth, 0, alg, sm->addr, 0, [all...] |
wpa_auth.c | 126 enum wpa_alg alg, const u8 *addr, int idx, 131 return wpa_auth->cb.set_key(wpa_auth->cb.ctx, vlan_id, alg, addr, idx, 1417 int alg; local 2391 enum wpa_alg alg = wpa_cipher_to_alg(sm->pairwise); local 2906 enum wpa_alg alg; local [all...] |
/external/wpa_supplicant_8/src/drivers/ |
driver_bsd.c | 334 bsd_set_key(const char *ifname, void *priv, enum wpa_alg alg, 343 wpa_printf(MSG_DEBUG, "%s: alg=%d addr=%p key_idx=%d set_tx=%d " 344 "seq_len=%zu key_len=%zu", __func__, alg, addr, key_idx, 347 if (alg == WPA_ALG_NONE) { 357 switch (alg) { 368 wpa_printf(MSG_ERROR, "%s: unknown alg=%d", __func__, alg); [all...] |
driver_atheros.c | 477 atheros_set_key(const char *ifname, void *priv, enum wpa_alg alg, 486 if (alg == WPA_ALG_NONE) 489 wpa_printf(MSG_DEBUG, "%s: alg=%d addr=%s key_idx=%d", 490 __func__, alg, ether_sprintf(addr), key_idx); 492 switch (alg) { 531 __func__, alg); 559 " key_idx %d alg %d key_len %lu set_tx %d)", 561 alg, (unsigned long) key_len, set_tx); [all...] |
/external/conscrypt/src/main/native/ |
org_conscrypt_NativeCrypto.cpp | [all...] |
/bionic/libc/dns/nameser/ |
ns_print.c | 583 u_int c_type, key_tag, alg; local 591 alg = (u_int) *rdata++; 593 len = snprintf(tmp1, sizeof(tmp1), "%d %d %d ", c_type, key_tag, alg);
|
/external/opencv3/samples/gpu/performance/ |
tests.cpp | 39 Ptr<cuda::TemplateMatching> alg = cuda::createTemplateMatching(src.type(), TM_CCORR); local 53 alg->match(d_src, d_templ, d_dst); 56 alg->match(d_src, d_templ, d_dst);
|
/bionic/libc/include/arpa/ |
nameser.h | 258 char name[NS_MAXDNAME], alg[NS_MAXDNAME]; member in struct:ns_tsig_key 278 #define NS_TSIG_ALG_HMAC_MD5 "HMAC-MD5.SIG-ALG.REG.INT" 434 #define NS_ALG_EXPIRE_ONLY 253 /* No alg, no security */ 435 #define NS_ALG_PRIVATE_OID 254 /* Key begins with OID giving alg */
|
/bionic/libc/kernel/uapi/linux/ |
wireless.h | 387 __u16 alg; member in struct:iw_encode_ext
|
/development/ndk/platforms/android-21/include/arpa/ |
nameser.h | 258 char name[NS_MAXDNAME], alg[NS_MAXDNAME]; member in struct:ns_tsig_key 278 #define NS_TSIG_ALG_HMAC_MD5 "HMAC-MD5.SIG-ALG.REG.INT" 434 #define NS_ALG_EXPIRE_ONLY 253 /* No alg, no security */ 435 #define NS_ALG_PRIVATE_OID 254 /* Key begins with OID giving alg */
|
/development/ndk/platforms/android-21/include/linux/ |
wireless.h | 399 __u16 alg; member in struct:iw_encode_ext
|