/external/tpm2/ |
CryptSelfTest.c | 25 TPM_ALG_ID alg; local 28 for(alg = TPM_ALG_FIRST; alg <= TPM_ALG_LAST; alg++) 30 if(TEST_BIT(alg, *toTest)) 32 TPM_RC result = CryptTestAlgorithm(alg, toTest); 96 TPM_ALG_ID alg; local 104 TPM_ALG_ID alg = toTest->algorithms[i]; local 106 if((alg > TPM_ALG_LAST) || !TEST_BIT(alg, g_implementedAlgorithms) [all...] |
CryptSelfTest_fp.h | 17 TPM_RC CryptTestAlgorithm(TPM_ALG_ID alg, ALGORITHM_VECTOR *toTest);
|
EncryptDecrypt.c | 31 TPM_ALG_ID alg; local 62 alg = symKey->publicArea.parameters.symDetail.sym.algorithm; 63 blockSize = CryptGetSymmetricBlockSize(alg, keySize); 89 alg, 99 alg,
|
/external/boringssl/src/crypto/x509/ |
x_algor.c | 80 int X509_ALGOR_set0(X509_ALGOR *alg, const ASN1_OBJECT *aobj, int ptype, 83 if (!alg) 86 if (alg->parameter == NULL) 87 alg->parameter = ASN1_TYPE_new(); 88 if (alg->parameter == NULL) 91 if (alg) { 92 if (alg->algorithm) 93 ASN1_OBJECT_free(alg->algorithm); 94 alg->algorithm = (ASN1_OBJECT *)aobj; 99 if (alg->parameter) [all...] |
rsa_pss.c | 81 static X509_ALGOR *rsa_mgf1_decode(X509_ALGOR *alg) { 82 if (alg == NULL || alg->parameter == NULL || 83 OBJ_obj2nid(alg->algorithm) != NID_mgf1 || 84 alg->parameter->type != V_ASN1_SEQUENCE) { 88 const uint8_t *p = alg->parameter->value.sequence->data; 89 int plen = alg->parameter->value.sequence->length; 93 static RSA_PSS_PARAMS *rsa_pss_decode(const X509_ALGOR *alg, 97 if (alg->parameter == NULL || alg->parameter->type != V_ASN1_SEQUENCE) [all...] |
/external/openssh/ |
digest-openssl.c | 45 int alg; member in struct:ssh_digest_ctx 68 ssh_digest_by_alg(int alg) 70 if (alg < 0 || alg >= SSH_DIGEST_MAX) 72 if (digests[alg].id != alg) /* sanity */ 74 if (digests[alg].mdfunc == NULL) 76 return &(digests[alg]); 82 int alg; local 84 for (alg = 0; digests[alg].id != -1; alg++) [all...] |
digest-libc.c | 44 int alg; member in struct:ssh_digest_ctx 124 ssh_digest_by_alg(int alg) 126 if (alg < 0 || alg >= SSH_DIGEST_MAX) 128 if (digests[alg].id != alg) /* sanity */ 130 return &(digests[alg]); 136 int alg; local 138 for (alg = 0; alg < SSH_DIGEST_MAX; alg++) [all...] |
digest.h | 40 const char *ssh_digest_alg_name(int alg); 43 size_t ssh_digest_bytes(int alg); 53 int ssh_digest_memory(int alg, const void *m, size_t mlen, 57 int ssh_digest_buffer(int alg, const struct sshbuf *b, u_char *d, size_t dlen) 61 struct ssh_digest_ctx *ssh_digest_start(int alg);
|
hmac.h | 22 size_t ssh_hmac_bytes(int alg); 26 struct ssh_hmac_ctx *ssh_hmac_start(int alg);
|
hmac.c | 28 int alg; member in struct:ssh_hmac_ctx 37 ssh_hmac_bytes(int alg) 39 return ssh_digest_bytes(alg); 43 ssh_hmac_start(int alg) 49 ret->alg = alg; 50 if ((ret->ictx = ssh_digest_start(alg)) == NULL || 51 (ret->octx = ssh_digest_start(alg)) == NULL || 52 (ret->digest = ssh_digest_start(alg)) == NULL) 73 else if (ssh_digest_memory(ctx->alg, key, klen, ctx->buf [all...] |
/libcore/ojluni/src/main/java/javax/crypto/ |
CryptoPermission.java | 40 CryptoPermission(String alg) { super(""); } 42 CryptoPermission(String alg, int maxKeySize) { super(""); } 44 CryptoPermission(String alg, 48 CryptoPermission(String alg, 51 CryptoPermission(String alg, 55 CryptoPermission(String alg,
|
JceSecurityManager.java | 43 CryptoPermission getCryptoPermission(String alg) { return null; }
|
CryptoPermissions.java | 59 PermissionCollection getPermissionCollection(String alg) { return null; }
|
/external/webrtc/webrtc/base/ |
messagedigest.h | 43 static MessageDigest* Create(const std::string& alg); 47 bool IsFips180DigestAlgorithm(const std::string& alg); 58 // the desired digest name |alg|, e.g. DIGEST_SHA_1. Returns 0 if there is no 60 size_t ComputeDigest(const std::string& alg, const void* input, size_t in_len, 66 // the desired digest name |alg|, e.g. DIGEST_SHA_1. Returns empty string if 68 std::string ComputeDigest(const std::string& alg, const std::string& input); 70 bool ComputeDigest(const std::string& alg, const std::string& input, 89 // the desired digest name |alg|, e.g. DIGEST_SHA_1. Returns 0 if there is no 91 size_t ComputeHmac(const std::string& alg, const void* key, size_t key_len, 99 // the desired digest name |alg|, e.g. DIGEST_SHA_1. Returns empty string i [all...] |
messagedigest.cc | 38 MessageDigest* MessageDigestFactory::Create(const std::string& alg) { 40 MessageDigest* digest = new OpenSSLDigest(alg); 48 if (alg == DIGEST_MD5) { 50 } else if (alg == DIGEST_SHA_1) { 57 bool IsFips180DigestAlgorithm(const std::string& alg) { 63 return alg == DIGEST_SHA_1 || 64 alg == DIGEST_SHA_224 || 65 alg == DIGEST_SHA_256 || 66 alg == DIGEST_SHA_384 || 67 alg == DIGEST_SHA_512 [all...] |
/external/libcups/cups/ |
hash.c | 169 gnutls_digest_algorithm_t alg = GNUTLS_DIG_UNKNOWN; local 175 alg = GNUTLS_DIG_SHA1; 177 alg = GNUTLS_DIG_SHA224; 179 alg = GNUTLS_DIG_SHA256; 181 alg = GNUTLS_DIG_SHA384; 183 alg = GNUTLS_DIG_SHA512; 186 alg = GNUTLS_DIG_SHA512; 191 alg = GNUTLS_DIG_SHA512; 195 if (alg != GNUTLS_DIG_UNKNOWN) 206 gnutls_hash_fast(alg, data, datalen, temp) [all...] |
/external/vboot_reference/tests/ |
gen_test_keys.sh | 39 alg=$((${key_index} * 3 + ${alg_index})) 45 --algorithm ${alg} 51 --algorithm ${alg}
|
/libcore/luni/src/test/java/org/apache/harmony/crypto/tests/support/ |
MyExemptionMechanismSpi.java | 108 private String alg; field in class:MyExemptionMechanismSpi.tmpKey 110 public tmpKey(String alg, byte[] enc) { 111 this.alg = alg; 118 return alg; 127 public tmp1Key(String alg, byte[] enc) {
|
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
KeyPairGenerator2Test.java | 202 String alg = validValues[i].concat(post); local 203 kpG = KeyPairGenerator.getInstance(alg); 205 .toUpperCase(), (mode <= 2 ? resAlg : alg).toUpperCase()); 241 String alg = validValues[i].concat(post); local 243 KeyPairGenerator.getInstance(alg, prov); 245 .concat(alg).concat(")")); 250 String alg = validValues[i].concat(post); local 253 KeyPairGenerator.getInstance(alg, invalidValues[j]); 255 .concat(alg).concat(" provider: ").concat( 263 String alg = validValues[i].concat(post) local 300 String alg = validValues[i].concat(post); local 310 String alg = validValues[i].concat(post); local [all...] |
/external/webrtc/webrtc/modules/remote_bitrate_estimator/test/ |
plot_dynamics.py | 76 for alg in v.samples.keys(): 78 for series in v.samples[alg].keys(): 80 x = [sample[0] for sample in v.samples[alg][series]] 81 y = [sample[1] for sample in v.samples[alg][series]] 85 line = plt.plot(x, y, label=alg, linewidth=4.0) 101 key = alg + flow_id.group(1) 105 elif alg == 'TCP': 110 if alg.startswith('Available'):
|
/external/vboot_reference/utility/ |
dev_make_keypair | 11 Usage: ${0##*/} BASENAME [ALG] 17 If specified, ALG is one of: 32 If ALG is not specified, a default value will be used. 47 local alg=$2 48 local len=$(alg_to_keylen $alg) 63 --algorithm $alg 69 --algorithm $alg
|
/external/ltp/testcases/network/dctcp/ |
dctcp01.sh | 29 local alg=$1 30 tst_resm TINFO "setting $alg" 32 tst_set_sysctl net.ipv4.tcp_congestion_control $alg safe 66 tst_resm TINFO "compare '$def_alg' and 'dctcp' congestion alg. results"
|
/external/boringssl/src/ssl/ |
ssl_privkey.cc | 363 const SSL_SIGNATURE_ALGORITHM *alg = get_signature_algorithm(sigalg); local 364 if (alg == NULL || 365 EVP_PKEY_id(pkey) != alg->pkey_type) { 371 if (alg->pkey_type == EVP_PKEY_RSA && !alg->is_rsa_pss) { 376 if (alg->pkey_type == EVP_PKEY_EC && 377 (alg->curve == NID_undef || 379 EC_KEY_get0_group(EVP_PKEY_get0_EC_KEY(pkey))) != alg->curve)) { 394 const SSL_SIGNATURE_ALGORITHM *alg = get_signature_algorithm(sigalg); local 395 const EVP_MD *digest = alg->digest_func != NULL ? alg->digest_func() : NULL 425 const SSL_SIGNATURE_ALGORITHM *alg = get_signature_algorithm(sigalg); local 523 const SSL_SIGNATURE_ALGORITHM *alg = get_signature_algorithm(sigalg); local [all...] |
/tools/apksig/src/main/java/com/android/apksig/internal/apk/v2/ |
SignatureAlgorithm.java | 133 for (SignatureAlgorithm alg : SignatureAlgorithm.values()) { 134 if (alg.getId() == id) { 135 return alg;
|
/external/wpa_supplicant_8/src/crypto/ |
crypto_internal-cipher.c | 18 enum crypto_cipher_alg alg; member in struct:crypto_cipher 43 struct crypto_cipher * crypto_cipher_init(enum crypto_cipher_alg alg, 53 ctx->alg = alg; 55 switch (alg) { 108 switch (ctx->alg) { 172 switch (ctx->alg) { 232 switch (ctx->alg) {
|