/external/linux-kselftest/tools/testing/selftests/bpf/ |
test_tag.c | 115 static const struct sockaddr_alg alg = { local 126 ret = bind(fd_base, (struct sockaddr *)&alg, sizeof(alg));
|
/external/openssh/ |
mac.c | 50 int alg; member in struct:macalg 120 if ((mac->hmac_ctx = ssh_hmac_start(macalg->alg)) == NULL) 122 mac->key_len = mac->mac_len = ssh_hmac_bytes(macalg->alg);
|
authfd.c | 431 agent_encode_alg(struct sshkey *key, const char *alg) 433 if (alg != NULL && key->type == KEY_RSA) { 434 if (strcmp(alg, "rsa-sha2-256") == 0) 436 else if (strcmp(alg, "rsa-sha2-512") == 0) 446 const u_char *data, size_t datalen, const char *alg, u_int compat) 465 flags |= agent_encode_alg(key, alg);
|
/libcore/ojluni/src/main/java/java/security/ |
SecureRandom.java | 664 * Entries are alg:prov separated by , 668 * 1 - alg 726 String alg = m.group(1); local 731 return SecureRandom.getInstance(alg); 733 return SecureRandom.getInstance(alg, prov);
|
/system/tpm/trunks/ |
tpm_state_impl.cc | 261 VLOG(1) << "Algorithm Properties 0x" << std::hex << property.alg 263 impl->algorithm_properties_[property.alg] = property.alg_properties; 264 next_property = property.alg + 1;
|
/prebuilts/go/darwin-x86/src/runtime/ |
hashmap.go | 321 alg := t.key.alg 322 hash := alg.hash(key, uintptr(h.hash0)) 348 if alg.equal(key, k) { 379 alg := t.key.alg 380 hash := alg.hash(key, uintptr(h.hash0)) 406 if alg.equal(key, k) { 426 alg := t.key.alg [all...] |
hashmap_fast.go | 28 hash := t.key.alg.hash(noescape(unsafe.Pointer(&key)), uintptr(h.hash0)) 77 hash := t.key.alg.hash(noescape(unsafe.Pointer(&key)), uintptr(h.hash0)) 126 hash := t.key.alg.hash(noescape(unsafe.Pointer(&key)), uintptr(h.hash0)) 175 hash := t.key.alg.hash(noescape(unsafe.Pointer(&key)), uintptr(h.hash0)) 279 hash := t.key.alg.hash(noescape(unsafe.Pointer(&ky)), uintptr(h.hash0)) 386 hash := t.key.alg.hash(noescape(unsafe.Pointer(&ky)), uintptr(h.hash0))
|
alg.go | 147 fn := t.alg.hash 164 fn := t.alg.hash 222 eq := t.alg.equal 240 eq := t.alg.equal
|
/prebuilts/go/linux-x86/src/runtime/ |
hashmap.go | 321 alg := t.key.alg 322 hash := alg.hash(key, uintptr(h.hash0)) 348 if alg.equal(key, k) { 379 alg := t.key.alg 380 hash := alg.hash(key, uintptr(h.hash0)) 406 if alg.equal(key, k) { 426 alg := t.key.alg [all...] |
hashmap_fast.go | 28 hash := t.key.alg.hash(noescape(unsafe.Pointer(&key)), uintptr(h.hash0)) 77 hash := t.key.alg.hash(noescape(unsafe.Pointer(&key)), uintptr(h.hash0)) 126 hash := t.key.alg.hash(noescape(unsafe.Pointer(&key)), uintptr(h.hash0)) 175 hash := t.key.alg.hash(noescape(unsafe.Pointer(&key)), uintptr(h.hash0)) 279 hash := t.key.alg.hash(noescape(unsafe.Pointer(&ky)), uintptr(h.hash0)) 386 hash := t.key.alg.hash(noescape(unsafe.Pointer(&ky)), uintptr(h.hash0))
|
alg.go | 147 fn := t.alg.hash 164 fn := t.alg.hash 222 eq := t.alg.equal 240 eq := t.alg.equal
|
/external/apache-commons-math/src/main/java/org/apache/commons/math/random/ |
RandomDataImpl.java | 256 MessageDigest alg = null; local 258 alg = MessageDigest.getInstance("SHA-1"); 263 alg.reset(); 272 alg.update(randomBytes); 275 byte hash[] = alg.digest(); [all...] |
/external/wpa_supplicant_8/src/tls/ |
tlsv1_common.c | 346 enum crypto_hash_alg alg; local 350 alg = CRYPTO_HASH_ALG_SHA256; 354 alg = CRYPTO_HASH_ALG_SHA384; 358 alg = CRYPTO_HASH_ALG_SHA512; 364 ctx = crypto_hash_init(alg, NULL, 0);
|
/external/valgrind/none/tests/s390x/ |
add.stdout.exp | 56 alg 0 + 0000000000000000 + 0000000000000000 = 0000000000000000 (cc=0) 57 alg 0 + 0000000000000001 + 0000000000000000 = 0000000000000001 (cc=1) 58 alg 0 + 000000000000FFFF + 0000000000000000 = 000000000000FFFF (cc=1) 59 alg 0 + 0000000000007FFF + 0000000000000000 = 0000000000007FFF (cc=1) 60 alg 0 + 0000000000008000 + 0000000000000000 = 0000000000008000 (cc=1) 61 alg 0 + 00000000FFFFFFFF + 0000000000000000 = 00000000FFFFFFFF (cc=1) 62 alg 0 + 0000000080000000 + 0000000000000000 = 0000000080000000 (cc=1) 63 alg 0 + 000000007FFFFFFF + 0000000000000000 = 000000007FFFFFFF (cc=1) 64 alg 0 + FFFFFFFFFFFFFFFF + 0000000000000000 = FFFFFFFFFFFFFFFF (cc=1) 65 alg 0 + 8000000000000000 + 0000000000000000 = 8000000000000000 (cc=1 [all...] |
/cts/hostsidetests/security/securityPatch/CVE-2017-0576/ |
poc.c | 96 enum qcedev_cipher_alg_enum alg;
member in struct:qcedev_cipher_op_req
|
/external/tpm2/ |
CryptoEngine.h | 58 const TPM_ALG_ID alg; member in struct:__anon35325
|
/external/wpa_supplicant_8/src/drivers/ |
driver_hostap.h | 166 u8 alg[HOSTAP_CRYPT_ALG_NAME_LEN]; member in struct:prism2_hostapd_param::__anon39456::__anon39459
|
driver_wext.c | [all...] |
/external/wpa_supplicant_8/src/crypto/ |
crypto.h | 168 * @alg: Hash algorithm 178 struct crypto_hash * crypto_hash_init(enum crypto_hash_alg alg, const u8 *key, 222 * @alg: Cipher algorithm 233 struct crypto_cipher * crypto_cipher_init(enum crypto_cipher_alg alg,
|
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
AlgorithmParameterGenerator1Test.java | 388 public myAlgPG(AlgorithmParameterGeneratorSpi spi, Provider prov, String alg) { 389 super(spi, prov, alg);
|
Signature2Test.java | 90 String alg = Signature.getInstance("DSA").getAlgorithm(); local 91 assertTrue("getAlgorithm did not get DSA (" + alg + ")", alg 506 put("Alg.Alias.MessageDigest.SHA1", "SHA-1");
|
/external/wpa_supplicant_8/src/rsn_supp/ |
wpa_ft.c | 317 enum wpa_alg alg; local 328 alg = wpa_cipher_to_alg(sm->pairwise_cipher); 331 if (wpa_sm_set_key(sm, alg, bssid, 0, 1, null_rsc, 545 enum wpa_alg alg; local 572 alg = wpa_cipher_to_alg(sm->group_cipher); 573 if (alg == WPA_ALG_NONE) { 603 if (wpa_sm_set_key(sm, alg, broadcast_ether_addr, keyidx, 0,
|
/external/wpa_supplicant_8/wpa_supplicant/ |
ibss_rsn.c | 139 static int supp_set_key(void *ctx, enum wpa_alg alg, 146 wpa_printf(MSG_DEBUG, "SUPP: %s(alg=%d addr=" MACSTR " key_idx=%d " 148 __func__, alg, MAC2STR(addr), key_idx, set_tx); 168 return wpa_drv_set_key(peer->ibss_rsn->wpa_s, alg, addr, key_idx, 291 static int auth_set_key(void *ctx, int vlan_id, enum wpa_alg alg, 300 wpa_printf(MSG_DEBUG, "AUTH: %s(alg=%d addr=" MACSTR 302 __func__, alg, MAC2STR(addr), idx); 304 wpa_printf(MSG_DEBUG, "AUTH: %s(alg=%d key_idx=%d)", 305 __func__, alg, idx); 330 return wpa_drv_set_key(ibss_rsn->wpa_s, alg, addr, idx [all...] |
/external/ipsec-tools/src/libipsec/ |
pfkey.c | 250 struct sadb_alg *alg; local 252 alg = findsupportedalg(satype, alg_id); 253 if (!alg) 256 if (keylen < alg->sadb_alg_minbits || keylen > alg->sadb_alg_maxbits) { 257 fprintf(stderr, "%d %d %d\n", keylen, alg->sadb_alg_minbits, 258 alg->sadb_alg_maxbits); 280 struct sadb_alg *alg; local 301 alg = findsupportedalg(satype, alg_id); 302 if (!alg) [all...] |
/tools/apksig/src/main/java/com/android/apksig/internal/apk/v1/ |
V1SchemeVerifier.java | 1625 String alg = tokens.nextToken(); local [all...] |