/external/openssh/ |
ssh_api.c | 59 u_char *data, u_int datalen, char *alg, u_int compat) 487 char *orig, *avail, *oavail = NULL, *alg, *replace = NULL; local 506 while ((alg = strsep(&avail, ",")) && *alg != '\0') { 507 if ((ktype = sshkey_type_from_name(alg)) == KEY_UNSPEC) 515 strlcat(replace, alg, maxlen); 538 const char *alg, u_int compat) 540 return sshkey_sign(privkey, signature, slen, data, dlen, alg, compat);
|
monitor.c | 603 char *alg = NULL; local 613 (r = sshbuf_get_cstring(m, &alg, &alglen)) != 0) 662 if ((r = sshkey_sign(key, &signature, &siglen, p, datlen, alg, 669 p, datlen, alg, datafellows)) != 0) { 683 free(alg); [all...] |
/external/vboot_reference/tests/ |
vb21_common2_tests.c | 158 "verify_sig sig alg"); 193 VB2_ERROR_VDATA_ALGORITHM, "vb2_verify_data() bad sig alg"); 200 "vb2_verify_data() bad hash alg"); 228 "vb2_verify_data() alg mismatch"); 304 int alg; local 306 for (alg = 0; alg < kNumAlgorithms; alg++) { 307 if (test_algorithm(alg, argv[1]))
|
/external/wpa_supplicant_8/src/tls/ |
pkcs5.c | 25 } alg; member in struct:pkcs5_params 48 static int pkcs5_is_oid(struct asn1_oid *oid, unsigned long alg) 54 oid->oid[6] == alg; 58 static int enc_alg_is_oid(struct asn1_oid *oid, unsigned long alg) 63 oid->oid[5] == alg; 67 static int pkcs12_is_pbe_oid(struct asn1_oid *oid, unsigned long alg) 74 oid->oid[7] == alg; 299 params->alg = pkcs5_get_alg(&oid); 300 if (params->alg == PKCS5_ALG_UNKNOWN) { 306 if (params->alg == PKCS5_ALG_PBES2 [all...] |
tlsv1_client_ocsp.c | 67 static unsigned int ocsp_hash_data(struct asn1_oid *alg, const u8 *data, 74 if (x509_sha1_oid(alg)) { 81 if (x509_sha256_oid(alg)) { 88 if (x509_sha384_oid(alg)) { 95 if (x509_sha512_oid(alg)) { 103 asn1_oid_to_str(alg, buf, sizeof(buf)); 104 wpa_printf(MSG_DEBUG, "OCSP: Could not calculate hash with alg %s", 118 struct x509_algorithm_identifier alg; local 161 if (x509_parse_algorithm_identifier(pos, end - pos, &alg, &pos)) 181 hash_len = ocsp_hash_data(&alg.oid, issuer->subject_dn 363 struct x509_algorithm_identifier alg; local [all...] |
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
KSPrivateKeyEntryTest.java | 234 private String alg = "My algorithm"; field in class:KSPrivateKeyEntryTest.tmpPrivateKey 237 return alg; 253 alg = algorithm;
|
KeyPairGenerator2Test.java | 202 String alg = validValues[i].concat(post); local 203 kpG = KeyPairGenerator.getInstance(alg); 205 .toUpperCase(), (mode <= 2 ? resAlg : alg).toUpperCase()); 241 String alg = validValues[i].concat(post); local 243 KeyPairGenerator.getInstance(alg, prov); 245 .concat(alg).concat(")")); 250 String alg = validValues[i].concat(post); local 253 KeyPairGenerator.getInstance(alg, invalidValues[j]); 255 .concat(alg).concat(" provider: ").concat( 263 String alg = validValues[i].concat(post) local 300 String alg = validValues[i].concat(post); local 310 String alg = validValues[i].concat(post); local [all...] |
AlgorithmParametersTest.java | 197 String[] alg = {"", "qwertyu", "!@#$%^&*()"}; local 209 for (int i = 0; i < alg.length; i++) { 211 AlgorithmParameters ap = AlgorithmParameters.getInstance(alg[i], "MyProvider"); 212 fail("NoSuchAlgorithmException was not thrown for parameter " + alg[i]); 216 fail("Incorrect exception " + e + " was thrown for " + alg[i]); 305 String[] alg = {"", "qwertyu", "!@#$%^&*()"}; local 317 for (int i = 0; i < alg.length; i++) { 319 AlgorithmParameters ap = AlgorithmParameters.getInstance(alg[i], p); 320 fail("NoSuchAlgorithmException was not thrown for parameter " + alg[i]); 324 fail("Incorrect exception " + e + " was thrown for " + alg[i]) [all...] |
Signature2Test.java | 90 String alg = Signature.getInstance("DSA").getAlgorithm(); local 91 assertTrue("getAlgorithm did not get DSA (" + alg + ")", alg 506 put("Alg.Alias.MessageDigest.SHA1", "SHA-1");
|
/libcore/ojluni/src/main/java/java/security/ |
SecureRandom.java | 664 * Entries are alg:prov separated by , 668 * 1 - alg 726 String alg = m.group(1); local 731 return SecureRandom.getInstance(alg); 733 return SecureRandom.getInstance(alg, prov);
|
/bionic/libc/dns/nameser/ |
ns_print.c | 583 u_int c_type, key_tag, alg; local 591 alg = (u_int) *rdata++; 593 len = snprintf(tmp1, sizeof(tmp1), "%d %d %d ", c_type, key_tag, alg);
|
/external/ipsec-tools/src/racoon/ |
handler.c | 1077 struct sainfoalg *alg; local 1198 for (alg = sainfo->algs[algclass_ipsec_auth]; alg; alg = alg->next) { 1199 if (alg->alg == approval->head->head->authtype) 1202 if (alg == NULL) { 1204 "Reload: alg == NULL (auth)\n"); 1209 for (alg = sainfo->algs[algclass_ipsec_enc]; [all...] |
pfkey.c | 2778 u_int alg; local [all...] |
/external/tpm2/ |
CryptoEngine.h | 58 const TPM_ALG_ID alg; member in struct:__anon35325
|
/external/wpa_supplicant_8/src/common/ |
privsep_commands.h | 77 int alg; member in struct:privsep_cmd_set_key
|
/external/wpa_supplicant_8/src/crypto/ |
crypto_libtomcrypt.c | 144 enum crypto_hash_alg alg; member in struct:crypto_hash 153 struct crypto_hash * crypto_hash_init(enum crypto_hash_alg alg, const u8 *key, 162 ctx->alg = alg; 164 switch (alg) { 199 switch (ctx->alg) { 232 switch (ctx->alg) { 297 struct crypto_cipher * crypto_cipher_init(enum crypto_cipher_alg alg, 304 switch (alg) {
|
/external/iproute2/ip/ |
xfrm_state.c | 115 static int xfrm_algo_parse(struct xfrm_algo *alg, enum xfrm_attr_type_t type, 126 strncpy(alg->alg_name, name, sizeof(alg->alg_name)); 168 alg->alg_key_len = len * 8; 421 struct xfrm_algo alg; member in union:__anon20809::__anon20810 426 } alg = {}; local 477 buf = alg.u.alg.alg_key; 478 len = sizeof(alg.u.alg); [all...] |
/external/ipsec-tools/src/libipsec/ |
pfkey.c | 250 struct sadb_alg *alg; local 252 alg = findsupportedalg(satype, alg_id); 253 if (!alg) 256 if (keylen < alg->sadb_alg_minbits || keylen > alg->sadb_alg_maxbits) { 257 fprintf(stderr, "%d %d %d\n", keylen, alg->sadb_alg_minbits, 258 alg->sadb_alg_maxbits); 280 struct sadb_alg *alg; local 301 alg = findsupportedalg(satype, alg_id); 302 if (!alg) [all...] |
/hardware/qcom/msm8996/kernel-headers/linux/ |
qcedev.h | 116 enum qcedev_cipher_alg_enum alg; member in struct:qcedev_cipher_op_req 131 enum qcedev_sha_alg_enum alg; member in struct:qcedev_sha_op_req
|
/hardware/qcom/msm8996/original-kernel-headers/linux/ |
qcedev.h | 156 * @alg (IN): Type of ciphering algorithm: AES/DES/3DES 194 enum qcedev_cipher_alg_enum alg; member in struct:qcedev_cipher_op_req 208 * @alg (IN): Secure Hash algorithm 218 enum qcedev_sha_alg_enum alg; member in struct:qcedev_sha_op_req
|
/hardware/qcom/msm8x09/kernel-headers/linux/ |
qcedev.h | 116 enum qcedev_cipher_alg_enum alg; member in struct:qcedev_cipher_op_req 131 enum qcedev_sha_alg_enum alg; member in struct:qcedev_sha_op_req
|
/hardware/qcom/msm8x09/original-kernel-headers/linux/ |
qcedev.h | 156 * @alg (IN): Type of ciphering algorithm: AES/DES/3DES 194 enum qcedev_cipher_alg_enum alg; member in struct:qcedev_cipher_op_req 208 * @alg (IN): Secure Hash algorithm 218 enum qcedev_sha_alg_enum alg; member in struct:qcedev_sha_op_req
|
/libcore/ojluni/src/main/java/javax/crypto/ |
Cipher.java | 2138 String alg = params.getAlgorithm().toUpperCase(Locale.ENGLISH); local [all...] |
/external/wpa_supplicant_8/src/ap/ |
wpa_auth_ft.c | 776 enum wpa_alg alg, const u8 *addr, int idx, 781 return wpa_auth->cb->set_key(wpa_auth->cb_ctx, vlan_id, alg, addr, idx, 788 enum wpa_alg alg; local 792 alg = wpa_cipher_to_alg(sm->pairwise); 795 wpa_printf(MSG_DEBUG, "FT: Unknown pairwise alg 0x%x - skip " 814 if (wpa_auth_set_key(sm->wpa_auth, 0, alg, sm->addr, 0, [all...] |
/external/wpa_supplicant_8/src/drivers/ |
driver_hostap.h | 166 u8 alg[HOSTAP_CRYPT_ALG_NAME_LEN]; member in struct:prism2_hostapd_param::__anon39456::__anon39459
|