| /external/ipsec-tools/src/racoon/ |
| getcertsbyname.c | 70 getnewci(qtype, keytag, algorithm, flags, certlen, cert) 71 int qtype, keytag, algorithm, flags, certlen; 83 res->ci_algorithm = algorithm; 127 int type, keytag, algorithm; local 170 algorithm = *cp++; /* algorithm */ 175 type, keytag, algorithm, rdlength); 179 cur->ci_next = getnewci(type, keytag, algorithm, 214 int qtype, qclass, keytag, algorithm; local 303 algorithm = *cp++; /* algorithm * [all...] |
| /libcore/luni/src/test/java/libcore/javax/crypto/ |
| CipherTest.java | 84 private static boolean isSupported(String algorithm, String provider) { 85 if (algorithm.equals("RC2")) { 88 if (algorithm.equals("PBEWITHMD5ANDRC2")) { 91 if (algorithm.startsWith("PBEWITHSHA1ANDRC2")) { 94 if (algorithm.equals("PBEWITHSHAAND40BITRC2-CBC")) { 97 if (algorithm.equals("PBEWITHSHAAND128BITRC2-CBC")) { 100 if (algorithm.equals("PBEWITHSHAANDTWOFISH-CBC")) { 104 if (algorithm.equals("PBEWITHMD5ANDTRIPLEDES")) { 110 (algorithm.equals("AES/CFB/PKCS5PADDING") 111 || algorithm.equals("AES/CFB/PKCS7PADDING" 905 String algorithm = encryptCipher.getAlgorithm().toUpperCase(Locale.US); local 933 String algorithm = "PBEWITHMD5ANDTRIPLEDES"; external variable declarations 1323 String algorithm = service.getAlgorithm(); local 1418 String algorithm = c.getAlgorithm().toUpperCase(Locale.US); local [all...] |
| /cts/tests/tests/keystore/src/android/keystore/cts/ |
| RSASignatureTest.java | 46 for (String algorithm : SignatureTest.EXPECTED_SIGNATURE_ALGORITHMS) { 47 String keyAlgorithm = TestUtils.getSignatureAlgorithmKeyAlgorithm(algorithm); 49 sigAlgs.add(algorithm); external variable declarations 110 for (String algorithm : SIGNATURE_ALGORITHMS) { 112 String digest = TestUtils.getSignatureAlgorithmDigest(algorithm); 128 TestUtils.getMinimalWorkingImportParametersForSigningingWith(algorithm)) 133 Signature signature = Signature.getInstance(algorithm, provider); 145 throw new RuntimeException("Failed for " + algorithm, e);
|
| /external/boringssl/src/crypto/evp/ |
| evp_asn1.c | 98 CBS spki, algorithm, key; local 102 !CBS_get_asn1(&spki, &algorithm, CBS_ASN1_SEQUENCE) || 103 !parse_key_type(&algorithm, &type) || 126 if (!ret->ameth->pub_decode(ret, &algorithm, &key)) { 148 CBS pkcs8, algorithm, key; local 154 !CBS_get_asn1(&pkcs8, &algorithm, CBS_ASN1_SEQUENCE) || 155 !parse_key_type(&algorithm, &type) || 175 if (!ret->ameth->priv_decode(ret, &algorithm, &key)) {
|
| p_dsa_asn1.c | 109 CBB spki, algorithm, oid, key_bitstring; local 111 !CBB_add_asn1(&spki, &algorithm, CBS_ASN1_SEQUENCE) || 112 !CBB_add_asn1(&algorithm, &oid, CBS_ASN1_OBJECT) || 115 !DSA_marshal_parameters(&algorithm, dsa)) || 177 CBB pkcs8, algorithm, oid, private_key; local 180 !CBB_add_asn1(&pkcs8, &algorithm, CBS_ASN1_SEQUENCE) || 181 !CBB_add_asn1(&algorithm, &oid, CBS_ASN1_OBJECT) || 183 !DSA_marshal_parameters(&algorithm, dsa) ||
|
| p_ec_asn1.c | 74 CBB spki, algorithm, oid, key_bitstring; local 76 !CBB_add_asn1(&spki, &algorithm, CBS_ASN1_SEQUENCE) || 77 !CBB_add_asn1(&algorithm, &oid, CBS_ASN1_OBJECT) || 79 !EC_KEY_marshal_curve_name(&algorithm, group) || 174 CBB pkcs8, algorithm, oid, private_key; local 177 !CBB_add_asn1(&pkcs8, &algorithm, CBS_ASN1_SEQUENCE) || 178 !CBB_add_asn1(&algorithm, &oid, CBS_ASN1_OBJECT) || 180 !EC_KEY_marshal_curve_name(&algorithm, EC_KEY_get0_group(ec_key)) ||
|
| /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/pkcs/ |
| CertificationRequest.java | 49 AlgorithmIdentifier algorithm, 53 this.sigAlgId = algorithm;
|
| /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/digests/ |
| OpenSSLDigest.java | 33 public OpenSSLDigest(String algorithm, int byteSize) { 35 delegate = MessageDigest.getInstance(algorithm, "AndroidOpenSSL");
|
| /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/symmetric/util/ |
| PBESecretKeyFactory.java | 23 String algorithm, 31 super(algorithm, oid);
|
| /external/libchrome/crypto/ |
| secure_hash.cc | 60 std::unique_ptr<SecureHash> SecureHash::Create(Algorithm algorithm) { 61 switch (algorithm) {
|
| /external/vboot_reference/firmware/lib20/ |
| packed_key.c | 41 /* Unpack key algorithm */ 42 key->sig_alg = vb2_crypto_to_signature(packed_key->algorithm); 44 VB2_DEBUG("Unsupported signature algorithm.\n"); 48 key->hash_alg = vb2_crypto_to_hash(packed_key->algorithm); 50 VB2_DEBUG("Unsupported hash algorithm.\n"); 56 VB2_DEBUG("Wrong key size for algorithm\n");
|
| /frameworks/base/keystore/java/android/security/keystore/ |
| AndroidKeyStoreKey.java | 31 public AndroidKeyStoreKey(String alias, int uid, String algorithm) { 34 mAlgorithm = algorithm;
|
| /frameworks/base/media/lib/signer/java/com/android/mediadrm/signer/ |
| MediaDrmSigner.java | 128 * @param algorithm the signing algorithm to use, e.g. "PKCS1-BlockType1" 134 String algorithm, byte[] wrappedKey, byte[] message) { 135 return drm.signRSA(sessionId, algorithm, wrappedKey, message);
|
| /libcore/luni/src/test/java/libcore/java/security/spec/ |
| AlgorithmParametersPSSTest.java | 218 private static void addDigestOid(String algorithm, String oid) { 219 DIGEST_OID_TO_NAME.put(oid, algorithm); 220 DIGEST_NAME_TO_OID.put(algorithm, oid); 231 private static String getDigestAlgorithmCanonicalName(String algorithm) { 232 if (DIGEST_NAME_TO_OID.containsKey(algorithm)) { 233 return algorithm.toUpperCase(Locale.US); 236 String nameByOid = DIGEST_OID_TO_NAME.get(algorithm); 241 return algorithm;
|
| /libcore/luni/src/test/java/org/apache/harmony/crypto/tests/support/ |
| MyKeyAgreementSpi.java | 65 protected SecretKey engineGenerateSecret(String algorithm) 68 if (algorithm.length() == 0) { 69 throw new NoSuchAlgorithmException("Algorithm is empty");
|
| /libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
| KeyStorePrivateKeyEntryTest.java | 65 String algorithm = certificate.getPublicKey().getAlgorithm(); local 67 .getInstance(algorithm);
|
| /libcore/support/src/test/java/org/apache/harmony/security/tests/support/ |
| MySignature1.java | 60 * @param algorithm 62 public MySignature1(String algorithm) { 63 super(algorithm);
|
| /prebuilts/ndk/r13/sources/cxx-stl/llvm-libc++/test/libcxx/ |
| double_include.sh.cpp | 24 #include <algorithm> 58 #include <experimental/algorithm>
|
| /libcore/ojluni/src/main/java/java/security/ |
| Provider.java | 52 * algorithm-specific keys). 898 private final String algorithm; field in class:Provider.ServiceKey 900 private ServiceKey(String type, String algorithm, boolean intern) { 902 this.originalAlgorithm = algorithm; 903 algorithm = algorithm.toUpperCase(ENGLISH); 904 this.algorithm = intern ? algorithm.intern() : algorithm; 907 return type.hashCode() + algorithm.hashCode() 1167 String algorithm = s.getAlgorithm(); local 1184 String algorithm = s.getAlgorithm(); local 1206 String algorithm = s.getAlgorithm(); local 1266 String algorithm = s.getAlgorithm(); local 1429 private String type, algorithm, className; field in class:Provider.Service [all...] |
| /hardware/libhardware/include/hardware/ |
| keymaster1.h | 138 * Gets the block modes supported for the specified algorithm. 142 * \param[in] algorithm The algorithm for which supported modes will be returned. 150 keymaster_algorithm_t algorithm, 156 * Gets the padding modes supported for the specified algorithm. Caller assumes ownership of 161 * \param[in] algorithm The algorithm for which supported padding modes will be returned. 169 keymaster_algorithm_t algorithm, 175 * Gets the digests supported for the specified algorithm. Caller assumes ownership of the 180 * \param[in] algorithm The algorithm for which supported digests will be returned [all...] |
| /libcore/ojluni/src/main/java/sun/security/jca/ |
| ProviderList.java | 74 public Service getService(String type, String algorithm) { 325 * algorithm from the Provider with the highest precedence that 326 * supports that algorithm. Return null if no Provider supports this 327 * algorithm. 349 public List<Service> getServices(String type, String algorithm) { 350 return new ServiceList(type, algorithm); 378 // type and algorithm for simple lookup 381 private final String algorithm; 384 // if ids is non-null, type and algorithm are null 399 ServiceList(String type, String algorithm) { [all...] |
| /external/webrtc/webrtc/base/ |
| opensslidentity.cc | 247 std::string* algorithm) const { 248 int nid = OBJ_obj2nid(x509_->sig_alg->algorithm); 252 *algorithm = DIGEST_MD5; 259 *algorithm = DIGEST_SHA_1; 264 *algorithm = DIGEST_SHA_224; 269 *algorithm = DIGEST_SHA_256; 273 *algorithm = DIGEST_SHA_384; 277 *algorithm = DIGEST_SHA_512; 280 // Unknown algorithm. There are several unhandled options that are less 282 LOG(LS_ERROR) << "Unknown signature algorithm NID: " << nid [all...] |
| /external/boringssl/src/crypto/x509/ |
| rsa_pss.c | 80 /* Given an MGF1 Algorithm ID decode to an Algorithm Identifier */ 83 OBJ_obj2nid(alg->algorithm) != NID_mgf1 || 112 /* allocate and set algorithm ID from EVP_MD, default SHA1 */ 125 /* Allocate and set MGF1 algorithm ID from EVP_MD */ 134 /* need to embed algorithm ID inside another */ 156 /* convert algorithm ID to EVP_MD, default SHA1 */ 162 md = EVP_get_digestbyobj(alg->algorithm); 169 /* convert MGF1 algorithm ID to EVP_MD, default SHA1 */ 175 /* Check mask and lookup mask hash algorithm */ [all...] |
| /external/wycheproof/java/com/google/security/wycheproof/testcases/ |
| EcdhTest.java | 71 // java.lang.UnsupportedOperationException: KDF can only be used when algorithm is known [all...] |
| /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/symmetric/ |
| PBEPBKDF2.java | 85 // throw new InvalidParameterSpecException("PBEParameterSpec required to initialise a PBKDF2 PBE parameters algorithm parameters object"); 231 private int getDigestCode(ASN1ObjectIdentifier algorithm) 235 // if (algorithm.equals(CryptoProObjectIdentifiers.gostR3411Hmac)) 241 if (algorithm.equals(PKCSObjectIdentifiers.id_hmacWithSHA1)) 245 else if (algorithm.equals(PKCSObjectIdentifiers.id_hmacWithSHA256)) 249 else if (algorithm.equals(PKCSObjectIdentifiers.id_hmacWithSHA224)) 253 else if (algorithm.equals(PKCSObjectIdentifiers.id_hmacWithSHA384)) 257 else if (algorithm.equals(PKCSObjectIdentifiers.id_hmacWithSHA512)) 262 throw new InvalidKeySpecException("Invalid KeySpec: unknown PRF algorithm " + algorithm); [all...] |