HomeSort by relevance Sort by last modified time
    Searched refs:alg (Results 1 - 25 of 415) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /external/tpm2/
CryptSelfTest.c 25 TPM_ALG_ID alg; local
28 for(alg = TPM_ALG_FIRST; alg <= TPM_ALG_LAST; alg++)
30 if(TEST_BIT(alg, *toTest))
32 TPM_RC result = CryptTestAlgorithm(alg, toTest);
96 TPM_ALG_ID alg; local
104 TPM_ALG_ID alg = toTest->algorithms[i]; local
106 if((alg > TPM_ALG_LAST) || !TEST_BIT(alg, g_implementedAlgorithms)
    [all...]
CryptSelfTest_fp.h 17 TPM_RC CryptTestAlgorithm(TPM_ALG_ID alg, ALGORITHM_VECTOR *toTest);
EncryptDecrypt.c 31 TPM_ALG_ID alg; local
62 alg = symKey->publicArea.parameters.symDetail.sym.algorithm;
63 blockSize = CryptGetSymmetricBlockSize(alg, keySize);
89 alg,
99 alg,
  /external/boringssl/src/crypto/x509/
x_algor.c 80 int X509_ALGOR_set0(X509_ALGOR *alg, const ASN1_OBJECT *aobj, int ptype,
83 if (!alg)
86 if (alg->parameter == NULL)
87 alg->parameter = ASN1_TYPE_new();
88 if (alg->parameter == NULL)
91 if (alg) {
92 if (alg->algorithm)
93 ASN1_OBJECT_free(alg->algorithm);
94 alg->algorithm = (ASN1_OBJECT *)aobj;
99 if (alg->parameter)
    [all...]
rsa_pss.c 81 static X509_ALGOR *rsa_mgf1_decode(X509_ALGOR *alg) {
82 if (alg == NULL || alg->parameter == NULL ||
83 OBJ_obj2nid(alg->algorithm) != NID_mgf1 ||
84 alg->parameter->type != V_ASN1_SEQUENCE) {
88 const uint8_t *p = alg->parameter->value.sequence->data;
89 int plen = alg->parameter->value.sequence->length;
93 static RSA_PSS_PARAMS *rsa_pss_decode(const X509_ALGOR *alg,
97 if (alg->parameter == NULL || alg->parameter->type != V_ASN1_SEQUENCE)
    [all...]
  /external/openssh/
digest-openssl.c 45 int alg; member in struct:ssh_digest_ctx
68 ssh_digest_by_alg(int alg)
70 if (alg < 0 || alg >= SSH_DIGEST_MAX)
72 if (digests[alg].id != alg) /* sanity */
74 if (digests[alg].mdfunc == NULL)
76 return &(digests[alg]);
82 int alg; local
84 for (alg = 0; digests[alg].id != -1; alg++)
    [all...]
digest-libc.c 44 int alg; member in struct:ssh_digest_ctx
124 ssh_digest_by_alg(int alg)
126 if (alg < 0 || alg >= SSH_DIGEST_MAX)
128 if (digests[alg].id != alg) /* sanity */
130 return &(digests[alg]);
136 int alg; local
138 for (alg = 0; alg < SSH_DIGEST_MAX; alg++)
    [all...]
digest.h 40 const char *ssh_digest_alg_name(int alg);
43 size_t ssh_digest_bytes(int alg);
53 int ssh_digest_memory(int alg, const void *m, size_t mlen,
57 int ssh_digest_buffer(int alg, const struct sshbuf *b, u_char *d, size_t dlen)
61 struct ssh_digest_ctx *ssh_digest_start(int alg);
hmac.h 22 size_t ssh_hmac_bytes(int alg);
26 struct ssh_hmac_ctx *ssh_hmac_start(int alg);
hmac.c 28 int alg; member in struct:ssh_hmac_ctx
37 ssh_hmac_bytes(int alg)
39 return ssh_digest_bytes(alg);
43 ssh_hmac_start(int alg)
49 ret->alg = alg;
50 if ((ret->ictx = ssh_digest_start(alg)) == NULL ||
51 (ret->octx = ssh_digest_start(alg)) == NULL ||
52 (ret->digest = ssh_digest_start(alg)) == NULL)
73 else if (ssh_digest_memory(ctx->alg, key, klen, ctx->buf
    [all...]
  /libcore/ojluni/src/main/java/javax/crypto/
CryptoPermission.java 40 CryptoPermission(String alg) { super(""); }
42 CryptoPermission(String alg, int maxKeySize) { super(""); }
44 CryptoPermission(String alg,
48 CryptoPermission(String alg,
51 CryptoPermission(String alg,
55 CryptoPermission(String alg,
JceSecurityManager.java 43 CryptoPermission getCryptoPermission(String alg) { return null; }
CryptoPermissions.java 59 PermissionCollection getPermissionCollection(String alg) { return null; }
  /external/webrtc/webrtc/base/
messagedigest.h 43 static MessageDigest* Create(const std::string& alg);
47 bool IsFips180DigestAlgorithm(const std::string& alg);
58 // the desired digest name |alg|, e.g. DIGEST_SHA_1. Returns 0 if there is no
60 size_t ComputeDigest(const std::string& alg, const void* input, size_t in_len,
66 // the desired digest name |alg|, e.g. DIGEST_SHA_1. Returns empty string if
68 std::string ComputeDigest(const std::string& alg, const std::string& input);
70 bool ComputeDigest(const std::string& alg, const std::string& input,
89 // the desired digest name |alg|, e.g. DIGEST_SHA_1. Returns 0 if there is no
91 size_t ComputeHmac(const std::string& alg, const void* key, size_t key_len,
99 // the desired digest name |alg|, e.g. DIGEST_SHA_1. Returns empty string i
    [all...]
messagedigest.cc 38 MessageDigest* MessageDigestFactory::Create(const std::string& alg) {
40 MessageDigest* digest = new OpenSSLDigest(alg);
48 if (alg == DIGEST_MD5) {
50 } else if (alg == DIGEST_SHA_1) {
57 bool IsFips180DigestAlgorithm(const std::string& alg) {
63 return alg == DIGEST_SHA_1 ||
64 alg == DIGEST_SHA_224 ||
65 alg == DIGEST_SHA_256 ||
66 alg == DIGEST_SHA_384 ||
67 alg == DIGEST_SHA_512
    [all...]
  /external/libcups/cups/
hash.c 169 gnutls_digest_algorithm_t alg = GNUTLS_DIG_UNKNOWN; local
175 alg = GNUTLS_DIG_SHA1;
177 alg = GNUTLS_DIG_SHA224;
179 alg = GNUTLS_DIG_SHA256;
181 alg = GNUTLS_DIG_SHA384;
183 alg = GNUTLS_DIG_SHA512;
186 alg = GNUTLS_DIG_SHA512;
191 alg = GNUTLS_DIG_SHA512;
195 if (alg != GNUTLS_DIG_UNKNOWN)
206 gnutls_hash_fast(alg, data, datalen, temp)
    [all...]
  /external/vboot_reference/tests/
gen_test_keys.sh 39 alg=$((${key_index} * 3 + ${alg_index}))
45 --algorithm ${alg}
51 --algorithm ${alg}
  /libcore/luni/src/test/java/org/apache/harmony/crypto/tests/support/
MyExemptionMechanismSpi.java 108 private String alg; field in class:MyExemptionMechanismSpi.tmpKey
110 public tmpKey(String alg, byte[] enc) {
111 this.alg = alg;
118 return alg;
127 public tmp1Key(String alg, byte[] enc) {
  /libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/
KeyPairGenerator2Test.java 202 String alg = validValues[i].concat(post); local
203 kpG = KeyPairGenerator.getInstance(alg);
205 .toUpperCase(), (mode <= 2 ? resAlg : alg).toUpperCase());
241 String alg = validValues[i].concat(post); local
243 KeyPairGenerator.getInstance(alg, prov);
245 .concat(alg).concat(")"));
250 String alg = validValues[i].concat(post); local
253 KeyPairGenerator.getInstance(alg, invalidValues[j]);
255 .concat(alg).concat(" provider: ").concat(
263 String alg = validValues[i].concat(post) local
300 String alg = validValues[i].concat(post); local
310 String alg = validValues[i].concat(post); local
    [all...]
  /external/webrtc/webrtc/modules/remote_bitrate_estimator/test/
plot_dynamics.py 76 for alg in v.samples.keys():
78 for series in v.samples[alg].keys():
80 x = [sample[0] for sample in v.samples[alg][series]]
81 y = [sample[1] for sample in v.samples[alg][series]]
85 line = plt.plot(x, y, label=alg, linewidth=4.0)
101 key = alg + flow_id.group(1)
105 elif alg == 'TCP':
110 if alg.startswith('Available'):
  /external/vboot_reference/utility/
dev_make_keypair 11 Usage: ${0##*/} BASENAME [ALG]
17 If specified, ALG is one of:
32 If ALG is not specified, a default value will be used.
47 local alg=$2
48 local len=$(alg_to_keylen $alg)
63 --algorithm $alg
69 --algorithm $alg
  /external/ltp/testcases/network/dctcp/
dctcp01.sh 29 local alg=$1
30 tst_resm TINFO "setting $alg"
32 tst_set_sysctl net.ipv4.tcp_congestion_control $alg safe
66 tst_resm TINFO "compare '$def_alg' and 'dctcp' congestion alg. results"
  /external/boringssl/src/ssl/
ssl_privkey.cc 363 const SSL_SIGNATURE_ALGORITHM *alg = get_signature_algorithm(sigalg); local
364 if (alg == NULL ||
365 EVP_PKEY_id(pkey) != alg->pkey_type) {
371 if (alg->pkey_type == EVP_PKEY_RSA && !alg->is_rsa_pss) {
376 if (alg->pkey_type == EVP_PKEY_EC &&
377 (alg->curve == NID_undef ||
379 EC_KEY_get0_group(EVP_PKEY_get0_EC_KEY(pkey))) != alg->curve)) {
394 const SSL_SIGNATURE_ALGORITHM *alg = get_signature_algorithm(sigalg); local
395 const EVP_MD *digest = alg->digest_func != NULL ? alg->digest_func() : NULL
425 const SSL_SIGNATURE_ALGORITHM *alg = get_signature_algorithm(sigalg); local
523 const SSL_SIGNATURE_ALGORITHM *alg = get_signature_algorithm(sigalg); local
    [all...]
  /tools/apksig/src/main/java/com/android/apksig/internal/apk/v2/
SignatureAlgorithm.java 133 for (SignatureAlgorithm alg : SignatureAlgorithm.values()) {
134 if (alg.getId() == id) {
135 return alg;
  /external/wpa_supplicant_8/src/crypto/
crypto_internal-cipher.c 18 enum crypto_cipher_alg alg; member in struct:crypto_cipher
43 struct crypto_cipher * crypto_cipher_init(enum crypto_cipher_alg alg,
53 ctx->alg = alg;
55 switch (alg) {
108 switch (ctx->alg) {
172 switch (ctx->alg) {
232 switch (ctx->alg) {

Completed in 1230 milliseconds

1 2 3 4 5 6 7 8 91011>>