/external/tpm2/ |
CryptSelfTest.c | 25 TPM_ALG_ID alg; local 28 for(alg = TPM_ALG_FIRST; alg <= TPM_ALG_LAST; alg++) 30 if(TEST_BIT(alg, *toTest)) 32 TPM_RC result = CryptTestAlgorithm(alg, toTest); 96 TPM_ALG_ID alg; local 104 TPM_ALG_ID alg = toTest->algorithms[i]; local 106 if((alg > TPM_ALG_LAST) || !TEST_BIT(alg, g_implementedAlgorithms) [all...] |
CryptSelfTest_fp.h | 17 TPM_RC CryptTestAlgorithm(TPM_ALG_ID alg, ALGORITHM_VECTOR *toTest);
|
EncryptDecrypt.c | 31 TPM_ALG_ID alg; local 62 alg = symKey->publicArea.parameters.symDetail.sym.algorithm; 63 blockSize = CryptGetSymmetricBlockSize(alg, keySize); 89 alg, 99 alg,
|
/external/boringssl/src/crypto/x509/ |
x_algor.c | 80 int X509_ALGOR_set0(X509_ALGOR *alg, const ASN1_OBJECT *aobj, int ptype, 83 if (!alg) 86 if (alg->parameter == NULL) 87 alg->parameter = ASN1_TYPE_new(); 88 if (alg->parameter == NULL) 91 if (alg) { 92 if (alg->algorithm) 93 ASN1_OBJECT_free(alg->algorithm); 94 alg->algorithm = (ASN1_OBJECT *)aobj; 99 if (alg->parameter) [all...] |
rsa_pss.c | 81 static X509_ALGOR *rsa_mgf1_decode(X509_ALGOR *alg) { 82 if (alg == NULL || alg->parameter == NULL || 83 OBJ_obj2nid(alg->algorithm) != NID_mgf1 || 84 alg->parameter->type != V_ASN1_SEQUENCE) { 88 const uint8_t *p = alg->parameter->value.sequence->data; 89 int plen = alg->parameter->value.sequence->length; 93 static RSA_PSS_PARAMS *rsa_pss_decode(const X509_ALGOR *alg, 97 if (alg->parameter == NULL || alg->parameter->type != V_ASN1_SEQUENCE) [all...] |
/libcore/ojluni/src/main/java/javax/crypto/ |
CryptoPermission.java | 40 CryptoPermission(String alg) { super(""); } 42 CryptoPermission(String alg, int maxKeySize) { super(""); } 44 CryptoPermission(String alg, 48 CryptoPermission(String alg, 51 CryptoPermission(String alg, 55 CryptoPermission(String alg,
|
JceSecurityManager.java | 43 CryptoPermission getCryptoPermission(String alg) { return null; }
|
CryptoPermissions.java | 59 PermissionCollection getPermissionCollection(String alg) { return null; }
|
/external/strace/tests/ |
netlink_crypto.c | 103 struct crypto_user_alg alg = { local 114 alg, print_quoted_memory, 118 PRINT_FIELD_X(", ", alg, cru_type); 119 PRINT_FIELD_X(", ", alg, cru_mask); 120 PRINT_FIELD_U(", ", alg, cru_refcnt); 121 PRINT_FIELD_X(", ", alg, cru_flags); 124 fill_memory_ex(alg.cru_name, sizeof(alg.cru_name), '0', 10); 125 fill_memory_ex(alg.cru_driver_name, sizeof(alg.cru_driver_name) [all...] |
/external/strace/tests-m32/ |
netlink_crypto.c | 103 struct crypto_user_alg alg = { local 114 alg, print_quoted_memory, 118 PRINT_FIELD_X(", ", alg, cru_type); 119 PRINT_FIELD_X(", ", alg, cru_mask); 120 PRINT_FIELD_U(", ", alg, cru_refcnt); 121 PRINT_FIELD_X(", ", alg, cru_flags); 124 fill_memory_ex(alg.cru_name, sizeof(alg.cru_name), '0', 10); 125 fill_memory_ex(alg.cru_driver_name, sizeof(alg.cru_driver_name) [all...] |
/external/strace/tests-mx32/ |
netlink_crypto.c | 103 struct crypto_user_alg alg = { local 114 alg, print_quoted_memory, 118 PRINT_FIELD_X(", ", alg, cru_type); 119 PRINT_FIELD_X(", ", alg, cru_mask); 120 PRINT_FIELD_U(", ", alg, cru_refcnt); 121 PRINT_FIELD_X(", ", alg, cru_flags); 124 fill_memory_ex(alg.cru_name, sizeof(alg.cru_name), '0', 10); 125 fill_memory_ex(alg.cru_driver_name, sizeof(alg.cru_driver_name) [all...] |
/tools/apkzlib/src/main/java/com/android/tools/build/apkzlib/sign/ |
SignatureAlgorithm.java | 76 for (SignatureAlgorithm alg : values()) { 77 if (alg.keyAlgorithm.equalsIgnoreCase(keyAlgorithm)) { 78 if (alg.minSdkVersion > minSdkVersion) { 82 + alg.minSdkVersion); 85 return alg;
|
/external/webrtc/webrtc/base/ |
messagedigest.h | 43 static MessageDigest* Create(const std::string& alg); 47 bool IsFips180DigestAlgorithm(const std::string& alg); 58 // the desired digest name |alg|, e.g. DIGEST_SHA_1. Returns 0 if there is no 60 size_t ComputeDigest(const std::string& alg, const void* input, size_t in_len, 66 // the desired digest name |alg|, e.g. DIGEST_SHA_1. Returns empty string if 68 std::string ComputeDigest(const std::string& alg, const std::string& input); 70 bool ComputeDigest(const std::string& alg, const std::string& input, 89 // the desired digest name |alg|, e.g. DIGEST_SHA_1. Returns 0 if there is no 91 size_t ComputeHmac(const std::string& alg, const void* key, size_t key_len, 99 // the desired digest name |alg|, e.g. DIGEST_SHA_1. Returns empty string i [all...] |
messagedigest.cc | 38 MessageDigest* MessageDigestFactory::Create(const std::string& alg) { 40 MessageDigest* digest = new OpenSSLDigest(alg); 48 if (alg == DIGEST_MD5) { 50 } else if (alg == DIGEST_SHA_1) { 57 bool IsFips180DigestAlgorithm(const std::string& alg) { 63 return alg == DIGEST_SHA_1 || 64 alg == DIGEST_SHA_224 || 65 alg == DIGEST_SHA_256 || 66 alg == DIGEST_SHA_384 || 67 alg == DIGEST_SHA_512 [all...] |
/external/libcups/cups/ |
hash.c | 169 gnutls_digest_algorithm_t alg = GNUTLS_DIG_UNKNOWN; local 175 alg = GNUTLS_DIG_SHA1; 177 alg = GNUTLS_DIG_SHA224; 179 alg = GNUTLS_DIG_SHA256; 181 alg = GNUTLS_DIG_SHA384; 183 alg = GNUTLS_DIG_SHA512; 186 alg = GNUTLS_DIG_SHA512; 191 alg = GNUTLS_DIG_SHA512; 195 if (alg != GNUTLS_DIG_UNKNOWN) 206 gnutls_hash_fast(alg, data, datalen, temp) [all...] |
/external/scapy/scapy/layers/tls/ |
tools.py | 34 def _tls_compress(alg, p): 37 alg and return a TLSCompressed instance. 42 c.fragment = alg.compress(p.fragment) 46 def _tls_decompress(alg, c): 49 instance alg and return a TLSPlaintext instance. 54 p.fragment = alg.decompress(c.fragment) 58 def _tls_mac_add(alg, c, write_seq_num): 60 Compute the MAC using provided MAC alg instance over TLSCiphertext c using 67 h = alg.digest(write_seq_num + str(c)) 69 c.len += alg.hash_le [all...] |
/external/vboot_reference/tests/ |
gen_test_keys.sh | 39 alg=$((${key_index} * 3 + ${alg_index})) 45 --algorithm ${alg} 51 --algorithm ${alg}
|
/libcore/luni/src/test/java/org/apache/harmony/crypto/tests/support/ |
MyExemptionMechanismSpi.java | 108 private String alg; field in class:MyExemptionMechanismSpi.tmpKey 110 public tmpKey(String alg, byte[] enc) { 111 this.alg = alg; 118 return alg; 127 public tmp1Key(String alg, byte[] enc) {
|
/external/strace/ |
netlink_crypto.c | 198 struct crypto_user_alg alg; local 200 if (len < sizeof(alg)) 202 else if (!umove_or_printaddr(tcp, addr, &alg)) { 203 PRINT_FIELD_CSTRING("{", alg, cru_name); 204 PRINT_FIELD_CSTRING(", ", alg, cru_driver_name); 205 PRINT_FIELD_CSTRING(", ", alg, cru_module_name); 206 PRINT_FIELD_X(", ", alg, cru_type); 207 PRINT_FIELD_X(", ", alg, cru_mask); 208 PRINT_FIELD_U(", ", alg, cru_refcnt); 209 PRINT_FIELD_X(", ", alg, cru_flags) [all...] |
/external/boringssl/src/ssl/ |
ssl_privkey.cc | 144 const SSL_SIGNATURE_ALGORITHM *alg = get_signature_algorithm(sigalg); local 145 if (alg == NULL || 146 EVP_PKEY_id(pkey) != alg->pkey_type) { 152 if (alg->pkey_type == EVP_PKEY_RSA && !alg->is_rsa_pss) { 157 if (alg->pkey_type == EVP_PKEY_EC && 158 (alg->curve == NID_undef || 160 EC_KEY_get0_group(EVP_PKEY_get0_EC_KEY(pkey))) != alg->curve)) { 175 const SSL_SIGNATURE_ALGORITHM *alg = get_signature_algorithm(sigalg); local 176 const EVP_MD *digest = alg->digest_func != NULL ? alg->digest_func() : NULL 283 const SSL_SIGNATURE_ALGORITHM *alg = get_signature_algorithm(sigalg); local 446 const SSL_SIGNATURE_ALGORITHM *alg = get_signature_algorithm(sigalg); local 451 const SSL_SIGNATURE_ALGORITHM *alg = get_signature_algorithm(sigalg); local 459 const SSL_SIGNATURE_ALGORITHM *alg = get_signature_algorithm(sigalg); local [all...] |
/libcore/luni/src/test/java/org/apache/harmony/security/tests/java/security/ |
KeyPairGenerator2Test.java | 202 String alg = validValues[i].concat(post); local 203 kpG = KeyPairGenerator.getInstance(alg); 205 .toUpperCase(), (mode <= 2 ? resAlg : alg).toUpperCase()); 241 String alg = validValues[i].concat(post); local 243 KeyPairGenerator.getInstance(alg, prov); 245 .concat(alg).concat(")")); 250 String alg = validValues[i].concat(post); local 253 KeyPairGenerator.getInstance(alg, invalidValues[j]); 255 .concat(alg).concat(" provider: ").concat( 263 String alg = validValues[i].concat(post) local 300 String alg = validValues[i].concat(post); local 310 String alg = validValues[i].concat(post); local [all...] |
/external/webrtc/webrtc/modules/remote_bitrate_estimator/test/ |
plot_dynamics.py | 76 for alg in v.samples.keys(): 78 for series in v.samples[alg].keys(): 80 x = [sample[0] for sample in v.samples[alg][series]] 81 y = [sample[1] for sample in v.samples[alg][series]] 85 line = plt.plot(x, y, label=alg, linewidth=4.0) 101 key = alg + flow_id.group(1) 105 elif alg == 'TCP': 110 if alg.startswith('Available'):
|
/external/vboot_reference/utility/ |
dev_make_keypair | 11 Usage: ${0##*/} BASENAME [ALG] 17 If specified, ALG is one of: 32 If ALG is not specified, a default value will be used. 47 local alg=$2 48 local len=$(alg_to_keylen $alg) 63 --algorithm $alg 69 --algorithm $alg
|
/external/ltp/testcases/network/dctcp/ |
dctcp01.sh | 30 local alg=$1 31 tst_resm TINFO "setting $alg" 33 tst_set_sysctl net.ipv4.tcp_congestion_control $alg safe 65 tst_resm TINFO "compare '$def_alg' and 'dctcp' congestion alg. results"
|
/libcore/tools/docs/crypto/ |
update_crypto_support.py | 196 for alg in alg_union: 197 prev_alg = find_by_normalized_name(prev_category['algorithms'], alg) 200 elif alg in name_dict: 201 new_algorithm = {'name': name_dict[alg]} 203 new_algorithm = {'name': alg} 207 if alg in current_category and alg in prev_algorithms: 214 elif alg in prev_algorithms: 229 if alg in prev_algorithms and 'note' in prev_alg:
|