Searched refs:alg_id (Results 1 – 8 of 8) sorted by relevance
/external/iproute2/ip/ |
D | ipseg6.c | 55 __u8 alg_id; member 83 __u8 alg_id = rta_getattr_u8(attrs[SEG6_ATTR_ALGID]); in process_msg() local 94 switch (alg_id) { in process_msg() 147 addattr8(&req.n, sizeof(req), SEG6_ATTR_ALGID, opts.alg_id); in seg6_do_cmd() 209 opts.alg_id = SEG6_HMAC_ALGO_SHA1; in do_seg6() 211 opts.alg_id = SEG6_HMAC_ALGO_SHA256; in do_seg6()
|
/external/boringssl/src/crypto/pkcs8/ |
D | p5_pbev2.c | 273 CBS alg_id, prf; in PKCS5_pbe2_decrypt_init() local 274 if (!CBS_get_asn1(&pbkdf2_params, &alg_id, CBS_ASN1_SEQUENCE) || in PKCS5_pbe2_decrypt_init() 275 !CBS_get_asn1(&alg_id, &prf, CBS_ASN1_OBJECT) || in PKCS5_pbe2_decrypt_init() 294 if (!CBS_get_asn1(&alg_id, &null, CBS_ASN1_NULL) || in PKCS5_pbe2_decrypt_init() 296 CBS_len(&alg_id) != 0) { in PKCS5_pbe2_decrypt_init()
|
/external/boringssl/src/ssl/ |
D | tls13_both.cc | 115 uint16_t alg_id; in tls13_process_certificate() local 118 if (!CBS_get_u16(&body, &alg_id) || in tls13_process_certificate() 137 if (alg.alg_id == alg_id) { in tls13_process_certificate() 146 ERR_add_error_dataf("alg=%d", static_cast<int>(alg_id)); in tls13_process_certificate() 155 ERR_add_error_dataf("alg=%d", static_cast<int>(alg_id)); in tls13_process_certificate() 164 "alg=%d got=%u expected=%u", static_cast<int>(alg_id), in tls13_process_certificate() 521 if (candidate.alg_id == hs->cert_compression_alg_id) { in tls13_add_certificate()
|
D | t1_lib.cc | 2770 if (!CBB_add_u16(&algs, alg.alg_id)) { in cert_compression_add_clienthello() 2818 uint16_t alg_id; in cert_compression_parse_clienthello() local 2819 if (!CBS_get_u16(&alg_ids, &alg_id)) { in cert_compression_parse_clienthello() 2823 given_alg_ids[given_alg_idx++] = alg_id; in cert_compression_parse_clienthello() 2827 if (alg.alg_id == alg_id && alg.compress != nullptr) { in cert_compression_parse_clienthello() 2847 hs->cert_compression_alg_id = ctx->cert_compression_algs[best_index].alg_id; in cert_compression_parse_clienthello()
|
D | ssl_lib.cc | 2249 int SSL_CTX_add_cert_compression_alg(SSL_CTX *ctx, uint16_t alg_id, in SSL_CTX_add_cert_compression_alg() argument 2255 if (alg.alg_id == alg_id) { in SSL_CTX_add_cert_compression_alg() 2261 alg.alg_id = alg_id; in SSL_CTX_add_cert_compression_alg()
|
D | internal.h | 2242 uint16_t alg_id = 0;
|
/external/ipsec-tools/src/libipsec/ |
D | pfkey.c | 135 findsupportedalg(satype, alg_id) in findsupportedalg() argument 136 u_int satype, alg_id; in findsupportedalg() 161 if (((struct sadb_alg *)(void *)p)->sadb_alg_id == alg_id) 213 ipsec_check_keylen(supported, alg_id, keylen) in ipsec_check_keylen() argument 215 u_int alg_id; 233 return ipsec_check_keylen2(satype, alg_id, keylen); 245 ipsec_check_keylen2(satype, alg_id, keylen) in ipsec_check_keylen2() argument 247 u_int alg_id; 252 alg = findsupportedalg(satype, alg_id); 276 ipsec_get_keylen(supported, alg_id, alg0) in ipsec_get_keylen() argument [all …]
|
/external/boringssl/src/include/openssl/ |
D | ssl.h | 2788 SSL_CTX *ctx, uint16_t alg_id, ssl_cert_compression_func_t compress,
|