HomeSort by relevance Sort by last modified time
    Searched refs:algorithm (Results 301 - 325 of 4302) sorted by null

<<11121314151617181920>>

  /external/ipsec-tools/src/racoon/
getcertsbyname.c 70 getnewci(qtype, keytag, algorithm, flags, certlen, cert)
71 int qtype, keytag, algorithm, flags, certlen;
83 res->ci_algorithm = algorithm;
127 int type, keytag, algorithm; local
170 algorithm = *cp++; /* algorithm */
175 type, keytag, algorithm, rdlength);
179 cur->ci_next = getnewci(type, keytag, algorithm,
214 int qtype, qclass, keytag, algorithm; local
303 algorithm = *cp++; /* algorithm *
    [all...]
  /libcore/luni/src/test/java/libcore/javax/crypto/
CipherTest.java 84 private static boolean isSupported(String algorithm, String provider) {
85 if (algorithm.equals("RC2")) {
88 if (algorithm.equals("PBEWITHMD5ANDRC2")) {
91 if (algorithm.startsWith("PBEWITHSHA1ANDRC2")) {
94 if (algorithm.equals("PBEWITHSHAAND40BITRC2-CBC")) {
97 if (algorithm.equals("PBEWITHSHAAND128BITRC2-CBC")) {
100 if (algorithm.equals("PBEWITHSHAANDTWOFISH-CBC")) {
104 if (algorithm.equals("PBEWITHMD5ANDTRIPLEDES")) {
110 (algorithm.equals("AES/CFB/PKCS5PADDING")
111 || algorithm.equals("AES/CFB/PKCS7PADDING"
905 String algorithm = encryptCipher.getAlgorithm().toUpperCase(Locale.US); local
933 String algorithm = "PBEWITHMD5ANDTRIPLEDES"; external variable declarations
1323 String algorithm = service.getAlgorithm(); local
1418 String algorithm = c.getAlgorithm().toUpperCase(Locale.US); local
    [all...]
  /cts/tests/tests/keystore/src/android/keystore/cts/
RSASignatureTest.java 46 for (String algorithm : SignatureTest.EXPECTED_SIGNATURE_ALGORITHMS) {
47 String keyAlgorithm = TestUtils.getSignatureAlgorithmKeyAlgorithm(algorithm);
49 sigAlgs.add(algorithm); external variable declarations
110 for (String algorithm : SIGNATURE_ALGORITHMS) {
112 String digest = TestUtils.getSignatureAlgorithmDigest(algorithm);
128 TestUtils.getMinimalWorkingImportParametersForSigningingWith(algorithm))
133 Signature signature = Signature.getInstance(algorithm, provider);
145 throw new RuntimeException("Failed for " + algorithm, e);
  /external/boringssl/src/crypto/evp/
evp_asn1.c 98 CBS spki, algorithm, key; local
102 !CBS_get_asn1(&spki, &algorithm, CBS_ASN1_SEQUENCE) ||
103 !parse_key_type(&algorithm, &type) ||
126 if (!ret->ameth->pub_decode(ret, &algorithm, &key)) {
148 CBS pkcs8, algorithm, key; local
154 !CBS_get_asn1(&pkcs8, &algorithm, CBS_ASN1_SEQUENCE) ||
155 !parse_key_type(&algorithm, &type) ||
175 if (!ret->ameth->priv_decode(ret, &algorithm, &key)) {
p_dsa_asn1.c 109 CBB spki, algorithm, oid, key_bitstring; local
111 !CBB_add_asn1(&spki, &algorithm, CBS_ASN1_SEQUENCE) ||
112 !CBB_add_asn1(&algorithm, &oid, CBS_ASN1_OBJECT) ||
115 !DSA_marshal_parameters(&algorithm, dsa)) ||
177 CBB pkcs8, algorithm, oid, private_key; local
180 !CBB_add_asn1(&pkcs8, &algorithm, CBS_ASN1_SEQUENCE) ||
181 !CBB_add_asn1(&algorithm, &oid, CBS_ASN1_OBJECT) ||
183 !DSA_marshal_parameters(&algorithm, dsa) ||
p_ec_asn1.c 74 CBB spki, algorithm, oid, key_bitstring; local
76 !CBB_add_asn1(&spki, &algorithm, CBS_ASN1_SEQUENCE) ||
77 !CBB_add_asn1(&algorithm, &oid, CBS_ASN1_OBJECT) ||
79 !EC_KEY_marshal_curve_name(&algorithm, group) ||
174 CBB pkcs8, algorithm, oid, private_key; local
177 !CBB_add_asn1(&pkcs8, &algorithm, CBS_ASN1_SEQUENCE) ||
178 !CBB_add_asn1(&algorithm, &oid, CBS_ASN1_OBJECT) ||
180 !EC_KEY_marshal_curve_name(&algorithm, EC_KEY_get0_group(ec_key)) ||
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/pkcs/
CertificationRequest.java 49 AlgorithmIdentifier algorithm,
53 this.sigAlgId = algorithm;
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/digests/
OpenSSLDigest.java 33 public OpenSSLDigest(String algorithm, int byteSize) {
35 delegate = MessageDigest.getInstance(algorithm, "AndroidOpenSSL");
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/symmetric/util/
PBESecretKeyFactory.java 23 String algorithm,
31 super(algorithm, oid);
  /external/libchrome/crypto/
secure_hash.cc 60 std::unique_ptr<SecureHash> SecureHash::Create(Algorithm algorithm) {
61 switch (algorithm) {
  /external/vboot_reference/firmware/lib20/
packed_key.c 41 /* Unpack key algorithm */
42 key->sig_alg = vb2_crypto_to_signature(packed_key->algorithm);
44 VB2_DEBUG("Unsupported signature algorithm.\n");
48 key->hash_alg = vb2_crypto_to_hash(packed_key->algorithm);
50 VB2_DEBUG("Unsupported hash algorithm.\n");
56 VB2_DEBUG("Wrong key size for algorithm\n");
  /frameworks/base/keystore/java/android/security/keystore/
AndroidKeyStoreKey.java 31 public AndroidKeyStoreKey(String alias, int uid, String algorithm) {
34 mAlgorithm = algorithm;
  /frameworks/base/media/lib/signer/java/com/android/mediadrm/signer/
MediaDrmSigner.java 128 * @param algorithm the signing algorithm to use, e.g. "PKCS1-BlockType1"
134 String algorithm, byte[] wrappedKey, byte[] message) {
135 return drm.signRSA(sessionId, algorithm, wrappedKey, message);
  /libcore/luni/src/test/java/libcore/java/security/spec/
AlgorithmParametersPSSTest.java 218 private static void addDigestOid(String algorithm, String oid) {
219 DIGEST_OID_TO_NAME.put(oid, algorithm);
220 DIGEST_NAME_TO_OID.put(algorithm, oid);
231 private static String getDigestAlgorithmCanonicalName(String algorithm) {
232 if (DIGEST_NAME_TO_OID.containsKey(algorithm)) {
233 return algorithm.toUpperCase(Locale.US);
236 String nameByOid = DIGEST_OID_TO_NAME.get(algorithm);
241 return algorithm;
  /libcore/luni/src/test/java/org/apache/harmony/crypto/tests/support/
MyKeyAgreementSpi.java 65 protected SecretKey engineGenerateSecret(String algorithm)
68 if (algorithm.length() == 0) {
69 throw new NoSuchAlgorithmException("Algorithm is empty");
  /libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/
KeyStorePrivateKeyEntryTest.java 65 String algorithm = certificate.getPublicKey().getAlgorithm(); local
67 .getInstance(algorithm);
  /libcore/support/src/test/java/org/apache/harmony/security/tests/support/
MySignature1.java 60 * @param algorithm
62 public MySignature1(String algorithm) {
63 super(algorithm);
  /prebuilts/ndk/r13/sources/cxx-stl/llvm-libc++/test/libcxx/
double_include.sh.cpp 24 #include <algorithm>
58 #include <experimental/algorithm>
  /libcore/ojluni/src/main/java/java/security/
Provider.java 52 * algorithm-specific keys).
898 private final String algorithm; field in class:Provider.ServiceKey
900 private ServiceKey(String type, String algorithm, boolean intern) {
902 this.originalAlgorithm = algorithm;
903 algorithm = algorithm.toUpperCase(ENGLISH);
904 this.algorithm = intern ? algorithm.intern() : algorithm;
907 return type.hashCode() + algorithm.hashCode()
1167 String algorithm = s.getAlgorithm(); local
1184 String algorithm = s.getAlgorithm(); local
1206 String algorithm = s.getAlgorithm(); local
1266 String algorithm = s.getAlgorithm(); local
1429 private String type, algorithm, className; field in class:Provider.Service
    [all...]
  /hardware/libhardware/include/hardware/
keymaster1.h 138 * Gets the block modes supported for the specified algorithm.
142 * \param[in] algorithm The algorithm for which supported modes will be returned.
150 keymaster_algorithm_t algorithm,
156 * Gets the padding modes supported for the specified algorithm. Caller assumes ownership of
161 * \param[in] algorithm The algorithm for which supported padding modes will be returned.
169 keymaster_algorithm_t algorithm,
175 * Gets the digests supported for the specified algorithm. Caller assumes ownership of the
180 * \param[in] algorithm The algorithm for which supported digests will be returned
    [all...]
  /libcore/ojluni/src/main/java/sun/security/jca/
ProviderList.java 74 public Service getService(String type, String algorithm) {
325 * algorithm from the Provider with the highest precedence that
326 * supports that algorithm. Return null if no Provider supports this
327 * algorithm.
349 public List<Service> getServices(String type, String algorithm) {
350 return new ServiceList(type, algorithm);
378 // type and algorithm for simple lookup
381 private final String algorithm;
384 // if ids is non-null, type and algorithm are null
399 ServiceList(String type, String algorithm) {
    [all...]
  /external/webrtc/webrtc/base/
opensslidentity.cc 247 std::string* algorithm) const {
248 int nid = OBJ_obj2nid(x509_->sig_alg->algorithm);
252 *algorithm = DIGEST_MD5;
259 *algorithm = DIGEST_SHA_1;
264 *algorithm = DIGEST_SHA_224;
269 *algorithm = DIGEST_SHA_256;
273 *algorithm = DIGEST_SHA_384;
277 *algorithm = DIGEST_SHA_512;
280 // Unknown algorithm. There are several unhandled options that are less
282 LOG(LS_ERROR) << "Unknown signature algorithm NID: " << nid
    [all...]
  /external/boringssl/src/crypto/x509/
rsa_pss.c 80 /* Given an MGF1 Algorithm ID decode to an Algorithm Identifier */
83 OBJ_obj2nid(alg->algorithm) != NID_mgf1 ||
112 /* allocate and set algorithm ID from EVP_MD, default SHA1 */
125 /* Allocate and set MGF1 algorithm ID from EVP_MD */
134 /* need to embed algorithm ID inside another */
156 /* convert algorithm ID to EVP_MD, default SHA1 */
162 md = EVP_get_digestbyobj(alg->algorithm);
169 /* convert MGF1 algorithm ID to EVP_MD, default SHA1 */
175 /* Check mask and lookup mask hash algorithm */
    [all...]
  /external/wycheproof/java/com/google/security/wycheproof/testcases/
EcdhTest.java 71 // java.lang.UnsupportedOperationException: KDF can only be used when algorithm is known
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/symmetric/
PBEPBKDF2.java 85 // throw new InvalidParameterSpecException("PBEParameterSpec required to initialise a PBKDF2 PBE parameters algorithm parameters object");
231 private int getDigestCode(ASN1ObjectIdentifier algorithm)
235 // if (algorithm.equals(CryptoProObjectIdentifiers.gostR3411Hmac))
241 if (algorithm.equals(PKCSObjectIdentifiers.id_hmacWithSHA1))
245 else if (algorithm.equals(PKCSObjectIdentifiers.id_hmacWithSHA256))
249 else if (algorithm.equals(PKCSObjectIdentifiers.id_hmacWithSHA224))
253 else if (algorithm.equals(PKCSObjectIdentifiers.id_hmacWithSHA384))
257 else if (algorithm.equals(PKCSObjectIdentifiers.id_hmacWithSHA512))
262 throw new InvalidKeySpecException("Invalid KeySpec: unknown PRF algorithm " + algorithm);
    [all...]

Completed in 1715 milliseconds

<<11121314151617181920>>