/external/ipsec-tools/src/racoon/ |
handler.c | 1077 struct sainfoalg *alg; local 1198 for (alg = sainfo->algs[algclass_ipsec_auth]; alg; alg = alg->next) { 1199 if (alg->alg == approval->head->head->authtype) 1202 if (alg == NULL) { 1204 "Reload: alg == NULL (auth)\n"); 1209 for (alg = sainfo->algs[algclass_ipsec_enc]; [all...] |
sainfo.c | 245 delsainfoalg(alg) 246 struct sainfoalg *alg; 250 for (a = alg; a; a = next) {
|
/external/wpa_supplicant_8/src/ap/ |
ap_mlme.c | 23 static const char * mlme_auth_alg_str(int alg) 25 switch (alg) {
|
/external/wpa_supplicant_8/src/drivers/ |
driver_openbsd.c | 71 wpa_driver_openbsd_set_key(const char *ifname, void *priv, enum wpa_alg alg, 78 if (alg != WPA_ALG_PMK || key_len > IEEE80211_PMK_LEN)
|
driver_wext.h | 55 int wpa_driver_wext_set_key(const char *ifname, void *priv, enum wpa_alg alg,
|
/hardware/qcom/msm8996/original-kernel-headers/linux/ |
qcedev.h | 156 * @alg (IN): Type of ciphering algorithm: AES/DES/3DES 194 enum qcedev_cipher_alg_enum alg; member in struct:qcedev_cipher_op_req 208 * @alg (IN): Secure Hash algorithm 218 enum qcedev_sha_alg_enum alg; member in struct:qcedev_sha_op_req
|
/hardware/qcom/msm8x09/original-kernel-headers/linux/ |
qcedev.h | 156 * @alg (IN): Type of ciphering algorithm: AES/DES/3DES 194 enum qcedev_cipher_alg_enum alg; member in struct:qcedev_cipher_op_req 208 * @alg (IN): Secure Hash algorithm 218 enum qcedev_sha_alg_enum alg; member in struct:qcedev_sha_op_req
|
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
KeyPairGenerator4Test.java | 43 String alg = KeyPairGenerator.getInstance("DSA").getAlgorithm(); local 44 assertEquals("getAlgorithm returned unexpected value", "DSA", alg);
|
/system/keymaster/ |
operation.h | 42 KeyType(keymaster_algorithm_t alg, keymaster_purpose_t purp) 43 : algorithm(alg), purpose(purp) {}
|
/external/iproute2/ip/ |
xfrm_state.c | 115 static int xfrm_algo_parse(struct xfrm_algo *alg, enum xfrm_attr_type_t type, 126 strncpy(alg->alg_name, name, sizeof(alg->alg_name)); 168 alg->alg_key_len = len * 8; 421 struct xfrm_algo alg; member in union:__anon20809::__anon20810 426 } alg = {}; local 477 buf = alg.u.alg.alg_key; 478 len = sizeof(alg.u.alg); [all...] |
/external/ipsec-tools/src/racoon/missing/crypto/rijndael/ |
rijndael-api-fst.h | 16 #include <crypto/rijndael/rijndael-alg-fst.h>
|
/external/ltp/testcases/kernel/device-drivers/zram/ |
zram_lib.sh | 104 for alg in $zram_algs; do 106 echo "$alg" > $sys_path || \ 107 tst_brkm TFAIL "can't set '$alg' to $sys_path" 109 tst_resm TINFO "$sys_path = '$alg' ($i/$dev_num)"
|
/external/openssh/ |
authfd.h | 44 const u_char *data, size_t datalen, const char *alg, u_int compat);
|
ssh_api.c | 59 u_char *data, u_int datalen, char *alg, u_int compat) 487 char *orig, *avail, *oavail = NULL, *alg, *replace = NULL; local 506 while ((alg = strsep(&avail, ",")) && *alg != '\0') { 507 if ((ktype = sshkey_type_from_name(alg)) == KEY_UNSPEC) 515 strlcat(replace, alg, maxlen); 538 const char *alg, u_int compat) 540 return sshkey_sign(privkey, signature, slen, data, dlen, alg, compat);
|
/external/valgrind/none/tests/s390x/ |
add.c | 25 memsweep(alg, s2, 0);
|
/external/wpa_supplicant_8/src/common/ |
privsep_commands.h | 77 int alg; member in struct:privsep_cmd_set_key
|
/prebuilts/go/darwin-x86/src/crypto/x509/ |
pem_decrypt.go | 183 func EncryptPEMBlock(rand io.Reader, blockType string, data, password []byte, alg PEMCipher) (*pem.Block, error) { 184 ciph := cipherByKey(alg) 224 alg := &rfc1423Algos[i] 225 if alg.name == name { 226 return alg 234 alg := &rfc1423Algos[i] 235 if alg.cipher == key { 236 return alg
|
/prebuilts/go/linux-x86/src/crypto/x509/ |
pem_decrypt.go | 183 func EncryptPEMBlock(rand io.Reader, blockType string, data, password []byte, alg PEMCipher) (*pem.Block, error) { 184 ciph := cipherByKey(alg) 224 alg := &rfc1423Algos[i] 225 if alg.name == name { 226 return alg 234 alg := &rfc1423Algos[i] 235 if alg.cipher == key { 236 return alg
|
/external/autotest/client/cros/ |
verity_utils.py | 59 'verity mode=create alg=%s payload=%s payload_blocks=%d hashtree=%s' 111 self.alg = DEFAULT_ALG 146 self.table = utils.system_output(self.verity_cmd % (self.alg, 176 alg=DEFAULT_ALG, 196 self.alg = alg
|
/external/vboot_reference/tests/ |
vb21_common2_tests.c | 158 "verify_sig sig alg"); 193 VB2_ERROR_VDATA_ALGORITHM, "vb2_verify_data() bad sig alg"); 200 "vb2_verify_data() bad hash alg"); 228 "vb2_verify_data() alg mismatch"); 304 int alg; local 306 for (alg = 0; alg < kNumAlgorithms; alg++) { 307 if (test_algorithm(alg, argv[1]))
|
/external/wpa_supplicant_8/src/crypto/ |
crypto_libtomcrypt.c | 144 enum crypto_hash_alg alg; member in struct:crypto_hash 153 struct crypto_hash * crypto_hash_init(enum crypto_hash_alg alg, const u8 *key, 162 ctx->alg = alg; 164 switch (alg) { 199 switch (ctx->alg) { 232 switch (ctx->alg) { 297 struct crypto_cipher * crypto_cipher_init(enum crypto_cipher_alg alg, 304 switch (alg) {
|
/external/ipsec-tools/src/libipsec/ |
key_debug.c | 309 struct sadb_alg *alg; local 317 / sizeof(*alg); 318 alg = (void *)(sup + 1); 322 alg->sadb_alg_id, alg->sadb_alg_ivlen, 323 alg->sadb_alg_minbits, alg->sadb_alg_maxbits); 324 alg++;
|
/external/tpm2/ |
AlgorithmCap.c | 153 algList->algProperties[algList->count].alg = s_algorithms[i].algID;
|
/libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/func/ |
KeyAgreementThread.java | 50 public byte[] getSecretKey(String alg, byte[] publicKey) throws Exception {
|
/external/autotest/client/site_tests/kernel_CryptoAPI/ |
kernel_CryptoAPI.py | 110 alg = sockaddr_alg(AF_ALG, "hash", name) 111 if libc.bind(sock, ctypes.addressof(alg), ctypes.sizeof(alg)) == -1:
|