HomeSort by relevance Sort by last modified time
    Searched defs:alg (Results 26 - 50 of 279) sorted by null

12 3 4 5 6 7 8 91011>>

  /external/openssh/
ssh_api.c 59 u_char *data, u_int datalen, char *alg, u_int compat)
487 char *orig, *avail, *oavail = NULL, *alg, *replace = NULL; local
506 while ((alg = strsep(&avail, ",")) && *alg != '\0') {
507 if ((ktype = sshkey_type_from_name(alg)) == KEY_UNSPEC)
515 strlcat(replace, alg, maxlen);
538 const char *alg, u_int compat)
540 return sshkey_sign(privkey, signature, slen, data, dlen, alg, compat);
monitor.c 603 char *alg = NULL; local
613 (r = sshbuf_get_cstring(m, &alg, &alglen)) != 0)
662 if ((r = sshkey_sign(key, &signature, &siglen, p, datlen, alg,
669 p, datlen, alg, datafellows)) != 0) {
683 free(alg);
    [all...]
  /external/vboot_reference/tests/
vb21_common2_tests.c 158 "verify_sig sig alg");
193 VB2_ERROR_VDATA_ALGORITHM, "vb2_verify_data() bad sig alg");
200 "vb2_verify_data() bad hash alg");
228 "vb2_verify_data() alg mismatch");
304 int alg; local
306 for (alg = 0; alg < kNumAlgorithms; alg++) {
307 if (test_algorithm(alg, argv[1]))
  /external/wpa_supplicant_8/src/tls/
pkcs5.c 25 } alg; member in struct:pkcs5_params
48 static int pkcs5_is_oid(struct asn1_oid *oid, unsigned long alg)
54 oid->oid[6] == alg;
58 static int enc_alg_is_oid(struct asn1_oid *oid, unsigned long alg)
63 oid->oid[5] == alg;
67 static int pkcs12_is_pbe_oid(struct asn1_oid *oid, unsigned long alg)
74 oid->oid[7] == alg;
299 params->alg = pkcs5_get_alg(&oid);
300 if (params->alg == PKCS5_ALG_UNKNOWN) {
306 if (params->alg == PKCS5_ALG_PBES2
    [all...]
tlsv1_client_ocsp.c 67 static unsigned int ocsp_hash_data(struct asn1_oid *alg, const u8 *data,
74 if (x509_sha1_oid(alg)) {
81 if (x509_sha256_oid(alg)) {
88 if (x509_sha384_oid(alg)) {
95 if (x509_sha512_oid(alg)) {
103 asn1_oid_to_str(alg, buf, sizeof(buf));
104 wpa_printf(MSG_DEBUG, "OCSP: Could not calculate hash with alg %s",
118 struct x509_algorithm_identifier alg; local
161 if (x509_parse_algorithm_identifier(pos, end - pos, &alg, &pos))
181 hash_len = ocsp_hash_data(&alg.oid, issuer->subject_dn
363 struct x509_algorithm_identifier alg; local
    [all...]
  /libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/
KSPrivateKeyEntryTest.java 234 private String alg = "My algorithm"; field in class:KSPrivateKeyEntryTest.tmpPrivateKey
237 return alg;
253 alg = algorithm;
KeyPairGenerator2Test.java 202 String alg = validValues[i].concat(post); local
203 kpG = KeyPairGenerator.getInstance(alg);
205 .toUpperCase(), (mode <= 2 ? resAlg : alg).toUpperCase());
241 String alg = validValues[i].concat(post); local
243 KeyPairGenerator.getInstance(alg, prov);
245 .concat(alg).concat(")"));
250 String alg = validValues[i].concat(post); local
253 KeyPairGenerator.getInstance(alg, invalidValues[j]);
255 .concat(alg).concat(" provider: ").concat(
263 String alg = validValues[i].concat(post) local
300 String alg = validValues[i].concat(post); local
310 String alg = validValues[i].concat(post); local
    [all...]
AlgorithmParametersTest.java 197 String[] alg = {"", "qwertyu", "!@#$%^&*()"}; local
209 for (int i = 0; i < alg.length; i++) {
211 AlgorithmParameters ap = AlgorithmParameters.getInstance(alg[i], "MyProvider");
212 fail("NoSuchAlgorithmException was not thrown for parameter " + alg[i]);
216 fail("Incorrect exception " + e + " was thrown for " + alg[i]);
305 String[] alg = {"", "qwertyu", "!@#$%^&*()"}; local
317 for (int i = 0; i < alg.length; i++) {
319 AlgorithmParameters ap = AlgorithmParameters.getInstance(alg[i], p);
320 fail("NoSuchAlgorithmException was not thrown for parameter " + alg[i]);
324 fail("Incorrect exception " + e + " was thrown for " + alg[i])
    [all...]
Signature2Test.java 90 String alg = Signature.getInstance("DSA").getAlgorithm(); local
91 assertTrue("getAlgorithm did not get DSA (" + alg + ")", alg
506 put("Alg.Alias.MessageDigest.SHA1", "SHA-1");
  /libcore/ojluni/src/main/java/java/security/
SecureRandom.java 664 * Entries are alg:prov separated by ,
668 * 1 - alg
726 String alg = m.group(1); local
731 return SecureRandom.getInstance(alg);
733 return SecureRandom.getInstance(alg, prov);
  /bionic/libc/dns/nameser/
ns_print.c 583 u_int c_type, key_tag, alg; local
591 alg = (u_int) *rdata++;
593 len = snprintf(tmp1, sizeof(tmp1), "%d %d %d ", c_type, key_tag, alg);
  /external/ipsec-tools/src/racoon/
handler.c 1077 struct sainfoalg *alg; local
1198 for (alg = sainfo->algs[algclass_ipsec_auth]; alg; alg = alg->next) {
1199 if (alg->alg == approval->head->head->authtype)
1202 if (alg == NULL) {
1204 "Reload: alg == NULL (auth)\n");
1209 for (alg = sainfo->algs[algclass_ipsec_enc];
    [all...]
pfkey.c 2778 u_int alg; local
    [all...]
  /external/tpm2/
CryptoEngine.h 58 const TPM_ALG_ID alg; member in struct:__anon35325
  /external/wpa_supplicant_8/src/common/
privsep_commands.h 77 int alg; member in struct:privsep_cmd_set_key
  /external/wpa_supplicant_8/src/crypto/
crypto_libtomcrypt.c 144 enum crypto_hash_alg alg; member in struct:crypto_hash
153 struct crypto_hash * crypto_hash_init(enum crypto_hash_alg alg, const u8 *key,
162 ctx->alg = alg;
164 switch (alg) {
199 switch (ctx->alg) {
232 switch (ctx->alg) {
297 struct crypto_cipher * crypto_cipher_init(enum crypto_cipher_alg alg,
304 switch (alg) {
  /external/iproute2/ip/
xfrm_state.c 115 static int xfrm_algo_parse(struct xfrm_algo *alg, enum xfrm_attr_type_t type,
126 strncpy(alg->alg_name, name, sizeof(alg->alg_name));
168 alg->alg_key_len = len * 8;
421 struct xfrm_algo alg; member in union:__anon20809::__anon20810
426 } alg = {}; local
477 buf = alg.u.alg.alg_key;
478 len = sizeof(alg.u.alg);
    [all...]
  /external/ipsec-tools/src/libipsec/
pfkey.c 250 struct sadb_alg *alg; local
252 alg = findsupportedalg(satype, alg_id);
253 if (!alg)
256 if (keylen < alg->sadb_alg_minbits || keylen > alg->sadb_alg_maxbits) {
257 fprintf(stderr, "%d %d %d\n", keylen, alg->sadb_alg_minbits,
258 alg->sadb_alg_maxbits);
280 struct sadb_alg *alg; local
301 alg = findsupportedalg(satype, alg_id);
302 if (!alg)
    [all...]
  /hardware/qcom/msm8996/kernel-headers/linux/
qcedev.h 116 enum qcedev_cipher_alg_enum alg; member in struct:qcedev_cipher_op_req
131 enum qcedev_sha_alg_enum alg; member in struct:qcedev_sha_op_req
  /hardware/qcom/msm8996/original-kernel-headers/linux/
qcedev.h 156 * @alg (IN): Type of ciphering algorithm: AES/DES/3DES
194 enum qcedev_cipher_alg_enum alg; member in struct:qcedev_cipher_op_req
208 * @alg (IN): Secure Hash algorithm
218 enum qcedev_sha_alg_enum alg; member in struct:qcedev_sha_op_req
  /hardware/qcom/msm8x09/kernel-headers/linux/
qcedev.h 116 enum qcedev_cipher_alg_enum alg; member in struct:qcedev_cipher_op_req
131 enum qcedev_sha_alg_enum alg; member in struct:qcedev_sha_op_req
  /hardware/qcom/msm8x09/original-kernel-headers/linux/
qcedev.h 156 * @alg (IN): Type of ciphering algorithm: AES/DES/3DES
194 enum qcedev_cipher_alg_enum alg; member in struct:qcedev_cipher_op_req
208 * @alg (IN): Secure Hash algorithm
218 enum qcedev_sha_alg_enum alg; member in struct:qcedev_sha_op_req
  /libcore/ojluni/src/main/java/javax/crypto/
Cipher.java 2138 String alg = params.getAlgorithm().toUpperCase(Locale.ENGLISH); local
    [all...]
  /external/wpa_supplicant_8/src/ap/
wpa_auth_ft.c 776 enum wpa_alg alg, const u8 *addr, int idx,
781 return wpa_auth->cb->set_key(wpa_auth->cb_ctx, vlan_id, alg, addr, idx,
788 enum wpa_alg alg; local
792 alg = wpa_cipher_to_alg(sm->pairwise);
795 wpa_printf(MSG_DEBUG, "FT: Unknown pairwise alg 0x%x - skip "
814 if (wpa_auth_set_key(sm->wpa_auth, 0, alg, sm->addr, 0,
    [all...]
  /external/wpa_supplicant_8/src/drivers/
driver_hostap.h 166 u8 alg[HOSTAP_CRYPT_ALG_NAME_LEN]; member in struct:prism2_hostapd_param::__anon39456::__anon39459

Completed in 576 milliseconds

12 3 4 5 6 7 8 91011>>