/external/libcups/cups/ |
hash.c | 169 gnutls_digest_algorithm_t alg = GNUTLS_DIG_UNKNOWN; local 175 alg = GNUTLS_DIG_SHA1; 177 alg = GNUTLS_DIG_SHA224; 179 alg = GNUTLS_DIG_SHA256; 181 alg = GNUTLS_DIG_SHA384; 183 alg = GNUTLS_DIG_SHA512; 186 alg = GNUTLS_DIG_SHA512; 191 alg = GNUTLS_DIG_SHA512; 195 if (alg != GNUTLS_DIG_UNKNOWN) 206 gnutls_hash_fast(alg, data, datalen, temp) [all...] |
/external/tpm2/ |
EncryptDecrypt.c | 31 TPM_ALG_ID alg; local 62 alg = symKey->publicArea.parameters.symDetail.sym.algorithm; 63 blockSize = CryptGetSymmetricBlockSize(alg, keySize); 89 alg, 99 alg,
|
CryptSelfTest.c | 25 TPM_ALG_ID alg; local 28 for(alg = TPM_ALG_FIRST; alg <= TPM_ALG_LAST; alg++) 30 if(TEST_BIT(alg, *toTest)) 32 TPM_RC result = CryptTestAlgorithm(alg, toTest); 96 TPM_ALG_ID alg; local 104 TPM_ALG_ID alg = toTest->algorithms[i]; local 106 if((alg > TPM_ALG_LAST) || !TEST_BIT(alg, g_implementedAlgorithms) [all...] |
/external/ipsec-tools/src/racoon/ |
sainfo.h | 66 int alg; member in struct:sainfoalg
|
/external/apache-commons-math/src/main/java/org/apache/commons/math/random/ |
RandomDataImpl.java | 256 MessageDigest alg = null; local 258 alg = MessageDigest.getInstance("SHA-1"); 263 alg.reset(); 272 alg.update(randomBytes); 275 byte hash[] = alg.digest(); [all...] |
/external/wpa_supplicant_8/src/crypto/ |
crypto_internal.c | 20 enum crypto_hash_alg alg; member in struct:crypto_hash 39 struct crypto_hash * crypto_hash_init(enum crypto_hash_alg alg, const u8 *key, 51 ctx->alg = alg; 53 switch (alg) { 148 switch (ctx->alg) { 192 switch (ctx->alg) {
|
crypto_internal-cipher.c | 18 enum crypto_cipher_alg alg; member in struct:crypto_cipher 43 struct crypto_cipher * crypto_cipher_init(enum crypto_cipher_alg alg, 53 ctx->alg = alg; 55 switch (alg) { 108 switch (ctx->alg) { 172 switch (ctx->alg) { 232 switch (ctx->alg) {
|
/libcore/luni/src/test/java/org/apache/harmony/crypto/tests/support/ |
MyExemptionMechanismSpi.java | 108 private String alg; field in class:MyExemptionMechanismSpi.tmpKey 110 public tmpKey(String alg, byte[] enc) { 111 this.alg = alg; 118 return alg; 127 public tmp1Key(String alg, byte[] enc) {
|
/external/vboot_reference/tests/ |
vboot_common2_tests.c | 268 int alg; local 270 for (alg = 0; alg < kNumAlgorithms; alg++) { 271 if (test_algorithm(alg, argv[1]))
|
vb20_common2_tests.c | 101 0, "vb2_verify_data() bad sig alg"); 107 0, "vb2_verify_data() bad hash alg"); 200 int alg; local 202 for (alg = 0; alg < kNumAlgorithms; alg++) { 203 if (test_algorithm(alg, argv[1]))
|
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
KeyPairGenerator3Test.java | 140 String[] alg = {null, "", "AsDfGh!#$*", "DSA", "RSA"}; local 143 for (int i = 0; i < alg.length; i++) { 145 kpg = new MykeyPGen(alg[i]); 158 public MykeyPGen(String alg) { 159 super(alg);
|
KeyPairGenerator4Test.java | 43 String alg = KeyPairGenerator.getInstance("DSA").getAlgorithm(); local 44 assertEquals("getAlgorithm returned unexpected value", "DSA", alg);
|
/cts/hostsidetests/security/securityPatch/Bug-36591162/ |
poc.c | 57 enum qcedev_sha_alg_enum alg; member in struct:qcedev_sha_op_req 74 arg.alg = QCEDEV_ALG_AES_CMAC;
|
/external/icu/android_icu4j/src/main/java/android/icu/impl/ |
UCharacterNameReader.java | 90 UCharacterName.AlgorithmName alg[] = local 99 alg[i] = an; 101 data.setAlgorithm(alg);
|
/external/icu/icu4j/main/classes/core/src/com/ibm/icu/impl/ |
UCharacterNameReader.java | 90 UCharacterName.AlgorithmName alg[] = local 99 alg[i] = an; 101 data.setAlgorithm(alg);
|
/external/linux-kselftest/tools/testing/selftests/bpf/ |
test_tag.c | 115 static const struct sockaddr_alg alg = { local 126 ret = bind(fd_base, (struct sockaddr *)&alg, sizeof(alg));
|
/external/openssh/ |
digest-libc.c | 44 int alg; member in struct:ssh_digest_ctx 124 ssh_digest_by_alg(int alg) 126 if (alg < 0 || alg >= SSH_DIGEST_MAX) 128 if (digests[alg].id != alg) /* sanity */ 130 return &(digests[alg]); 136 int alg; local 138 for (alg = 0; alg < SSH_DIGEST_MAX; alg++) [all...] |
digest-openssl.c | 45 int alg; member in struct:ssh_digest_ctx 68 ssh_digest_by_alg(int alg) 70 if (alg < 0 || alg >= SSH_DIGEST_MAX) 72 if (digests[alg].id != alg) /* sanity */ 74 if (digests[alg].mdfunc == NULL) 76 return &(digests[alg]); 82 int alg; local 84 for (alg = 0; digests[alg].id != -1; alg++) [all...] |
hmac.c | 28 int alg; member in struct:ssh_hmac_ctx 37 ssh_hmac_bytes(int alg) 39 return ssh_digest_bytes(alg); 43 ssh_hmac_start(int alg) 49 ret->alg = alg; 50 if ((ret->ictx = ssh_digest_start(alg)) == NULL || 51 (ret->octx = ssh_digest_start(alg)) == NULL || 52 (ret->digest = ssh_digest_start(alg)) == NULL) 73 else if (ssh_digest_memory(ctx->alg, key, klen, ctx->buf [all...] |
mac.c | 50 int alg; member in struct:macalg 120 if ((mac->hmac_ctx = ssh_hmac_start(macalg->alg)) == NULL) 122 mac->key_len = mac->mac_len = ssh_hmac_bytes(macalg->alg);
|
/external/wpa_supplicant_8/src/rsn_supp/ |
wpa_ft.c | 317 enum wpa_alg alg; local 328 alg = wpa_cipher_to_alg(sm->pairwise_cipher); 331 if (wpa_sm_set_key(sm, alg, bssid, 0, 1, null_rsc, 545 enum wpa_alg alg; local 572 alg = wpa_cipher_to_alg(sm->group_cipher); 573 if (alg == WPA_ALG_NONE) { 603 if (wpa_sm_set_key(sm, alg, broadcast_ether_addr, keyidx, 0,
|
/external/wpa_supplicant_8/src/tls/ |
tlsv1_common.c | 346 enum crypto_hash_alg alg; local 350 alg = CRYPTO_HASH_ALG_SHA256; 354 alg = CRYPTO_HASH_ALG_SHA384; 358 alg = CRYPTO_HASH_ALG_SHA512; 364 ctx = crypto_hash_init(alg, NULL, 0);
|
/cts/hostsidetests/security/securityPatch/CVE-2017-0576/ |
poc.c | 96 enum qcedev_cipher_alg_enum alg;
member in struct:qcedev_cipher_op_req
|
/external/boringssl/src/ssl/ |
ssl_privkey.cc | 363 const SSL_SIGNATURE_ALGORITHM *alg = get_signature_algorithm(sigalg); local 364 if (alg == NULL || 365 EVP_PKEY_id(pkey) != alg->pkey_type) { 371 if (alg->pkey_type == EVP_PKEY_RSA && !alg->is_rsa_pss) { 376 if (alg->pkey_type == EVP_PKEY_EC && 377 (alg->curve == NID_undef || 379 EC_KEY_get0_group(EVP_PKEY_get0_EC_KEY(pkey))) != alg->curve)) { 394 const SSL_SIGNATURE_ALGORITHM *alg = get_signature_algorithm(sigalg); local 395 const EVP_MD *digest = alg->digest_func != NULL ? alg->digest_func() : NULL 425 const SSL_SIGNATURE_ALGORITHM *alg = get_signature_algorithm(sigalg); local 523 const SSL_SIGNATURE_ALGORITHM *alg = get_signature_algorithm(sigalg); local [all...] |
/external/ipsec-tools/src/libipsec/ |
key_debug.c | 309 struct sadb_alg *alg; local 317 / sizeof(*alg); 318 alg = (void *)(sup + 1); 322 alg->sadb_alg_id, alg->sadb_alg_ivlen, 323 alg->sadb_alg_minbits, alg->sadb_alg_maxbits); 324 alg++;
|