Home
last modified time | relevance | path

Searched refs:alg (Results 101 - 125 of 519) sorted by relevance

12345678910>>...21

/third_party/mbedtls/include/psa/
H A Dcrypto_builtin_composites.h47 psa_algorithm_t MBEDTLS_PRIVATE(alg);
58 psa_algorithm_t MBEDTLS_PRIVATE(alg);
80 psa_algorithm_t MBEDTLS_PRIVATE(alg);
118 psa_algorithm_t MBEDTLS_PRIVATE(alg);
192 psa_algorithm_t MBEDTLS_PRIVATE(alg);
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/
H A Dikev2_common.c56 int ikev2_integ_hash(int alg, const u8 *key, size_t key_len, const u8 *data, in ikev2_integ_hash() argument
61 switch (alg) { in ikev2_integ_hash()
97 int ikev2_prf_hash(int alg, const u8 *key, size_t key_len, in ikev2_prf_hash() argument
101 switch (alg) { in ikev2_prf_hash()
113 int ikev2_prf_plus(int alg, const u8 *key, size_t key_len, in ikev2_prf_plus() argument
125 prf = ikev2_get_prf(alg); in ikev2_prf_plus()
143 res = ikev2_prf_hash(alg, key, key_len, 2, &addr[1], in ikev2_prf_plus()
146 res = ikev2_prf_hash(alg, key, key_len, 3, addr, len, in ikev2_prf_plus()
175 int ikev2_encr_encrypt(int alg, const u8 *key, size_t key_len, const u8 *iv, in ikev2_encr_encrypt() argument
181 switch (alg) { in ikev2_encr_encrypt()
210 ikev2_encr_decrypt(int alg, const u8 *key, size_t key_len, const u8 *iv, const u8 *crypt, u8 *plain, size_t len) ikev2_encr_decrypt() argument
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/
H A Dpkcs5.c25 } alg; member
48 static int pkcs5_is_oid(struct asn1_oid *oid, unsigned long alg) in pkcs5_is_oid() argument
54 oid->oid[6] == alg; in pkcs5_is_oid()
58 static int enc_alg_is_oid(struct asn1_oid *oid, unsigned long alg) in enc_alg_is_oid() argument
63 oid->oid[5] == alg; in enc_alg_is_oid()
67 static int pkcs12_is_pbe_oid(struct asn1_oid *oid, unsigned long alg) in pkcs12_is_pbe_oid() argument
74 oid->oid[7] == alg; in pkcs12_is_pbe_oid()
299 params->alg = pkcs5_get_alg(&oid); in pkcs5_get_params()
300 if (params->alg == PKCS5_ALG_UNKNOWN) { in pkcs5_get_params()
306 if (params->alg in pkcs5_get_params()
[all...]
H A Dtlsv1_client_ocsp.c67 static unsigned int ocsp_hash_data(struct asn1_oid *alg, const u8 *data, in ocsp_hash_data() argument
74 if (x509_sha1_oid(alg)) { in ocsp_hash_data()
81 if (x509_sha256_oid(alg)) { in ocsp_hash_data()
88 if (x509_sha384_oid(alg)) { in ocsp_hash_data()
95 if (x509_sha512_oid(alg)) { in ocsp_hash_data()
103 asn1_oid_to_str(alg, buf, sizeof(buf)); in ocsp_hash_data()
104 wpa_printf(MSG_DEBUG, "OCSP: Could not calculate hash with alg %s", in ocsp_hash_data()
118 struct x509_algorithm_identifier alg; in tls_process_ocsp_single_response() local
161 if (x509_parse_algorithm_identifier(pos, end - pos, &alg, &pos)) in tls_process_ocsp_single_response()
181 hash_len = ocsp_hash_data(&alg in tls_process_ocsp_single_response()
363 struct x509_algorithm_identifier alg; tls_process_basic_ocsp_response() local
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/
H A Dikev2_common.c56 int ikev2_integ_hash(int alg, const u8 *key, size_t key_len, const u8 *data, in ikev2_integ_hash() argument
61 switch (alg) { in ikev2_integ_hash()
97 int ikev2_prf_hash(int alg, const u8 *key, size_t key_len, in ikev2_prf_hash() argument
101 switch (alg) { in ikev2_prf_hash()
113 int ikev2_prf_plus(int alg, const u8 *key, size_t key_len, in ikev2_prf_plus() argument
125 prf = ikev2_get_prf(alg); in ikev2_prf_plus()
143 res = ikev2_prf_hash(alg, key, key_len, 2, &addr[1], in ikev2_prf_plus()
146 res = ikev2_prf_hash(alg, key, key_len, 3, addr, len, in ikev2_prf_plus()
175 int ikev2_encr_encrypt(int alg, const u8 *key, size_t key_len, const u8 *iv, in ikev2_encr_encrypt() argument
181 switch (alg) { in ikev2_encr_encrypt()
210 ikev2_encr_decrypt(int alg, const u8 *key, size_t key_len, const u8 *iv, const u8 *crypt, u8 *plain, size_t len) ikev2_encr_decrypt() argument
[all...]
/third_party/libwebsockets/include/libwebsockets/
H A Dlws-jose.h85 const char *alg; /* the JWA enc alg name, eg "ES512" */ member
125 const struct lws_jose_jwe_alg *alg; member
148 * lws_gencrypto_jws_alg_to_definition() - look up a jws alg name
150 * \param alg: the jws alg name
156 lws_gencrypto_jws_alg_to_definition(const char *alg,
160 * lws_gencrypto_jwe_alg_to_definition() - look up a jwe alg name
162 * \param alg: the jwe alg nam
[all...]
/third_party/mbedtls/library/
H A Dpsa_crypto_aead.h38 * \param alg The AEAD algorithm to compute.
43 * PSA_AEAD_NONCE_LENGTH(key_type, alg) where
61 * PSA_AEAD_ENCRYPT_OUTPUT_SIZE(key_type, alg,
73 * \p alg is not supported.
82 psa_algorithm_t alg,
100 * \param alg The AEAD algorithm to compute.
105 * PSA_AEAD_NONCE_LENGTH(key_type, alg) where
122 * PSA_AEAD_DECRYPT_OUTPUT_SIZE(key_type, alg,
136 * \p alg is not supported.
145 psa_algorithm_t alg,
[all...]
H A Dpsa_crypto_rsa.h150 * \param[in] alg A signature algorithm that is compatible with
164 * \p alg) where \c key_bits is the bit-size of the RSA key.
174 psa_algorithm_t alg, const uint8_t *hash, size_t hash_length,
190 * \param[in] alg A signature algorithm that is compatible with
210 psa_algorithm_t alg, const uint8_t *hash, size_t hash_length,
242 * #PSA_ASYMMETRIC_ENCRYPT_OUTPUT_SIZE(\c key_type, \c key_bits, \p alg)
260 psa_algorithm_t alg,
299 * #PSA_ASYMMETRIC_DECRYPT_OUTPUT_SIZE(\c key_type, \c key_bits, \p alg)
318 psa_algorithm_t alg,
H A Dssl_ticket.c94 psa_set_key_algorithm(&attributes, key->alg); in ssl_ticket_gen_key()
183 psa_set_key_algorithm(&attributes, key->alg); in mbedtls_ssl_ticket_rotate()
223 psa_algorithm_t alg; in mbedtls_ssl_ticket_setup() local
231 &alg, &key_type, &key_bits) != PSA_SUCCESS) { in mbedtls_ssl_ticket_setup()
235 if (PSA_ALG_IS_AEAD(alg) == 0) { in mbedtls_ssl_ticket_setup()
260 ctx->keys[0].alg = alg; in mbedtls_ssl_ticket_setup()
264 ctx->keys[1].alg = alg; in mbedtls_ssl_ticket_setup()
360 if ((status = psa_aead_encrypt(key->key, key->alg, i in mbedtls_ssl_ticket_write()
[all...]
H A Dpk.c247 int mbedtls_pk_can_do_ext(const mbedtls_pk_context *ctx, psa_algorithm_t alg, in mbedtls_pk_can_do_ext() argument
260 if (PSA_ALG_IS_ECDSA(alg) == 0 && in mbedtls_pk_can_do_ext()
261 PSA_ALG_IS_RSA_PKCS1V15_SIGN(alg) == 0 && in mbedtls_pk_can_do_ext()
262 PSA_ALG_IS_RSA_PSS(alg) == 0 && in mbedtls_pk_can_do_ext()
263 alg != PSA_ALG_RSA_PKCS1V15_CRYPT && in mbedtls_pk_can_do_ext()
264 PSA_ALG_IS_ECDH(alg) == 0) { in mbedtls_pk_can_do_ext()
277 if (PSA_ALG_IS_SIGN_HASH(alg) && in mbedtls_pk_can_do_ext()
278 PSA_ALG_SIGN_GET_HASH(alg) == PSA_ALG_ANY_HASH) { in mbedtls_pk_can_do_ext()
285 if (PSA_ALG_IS_ECDSA(alg) || PSA_ALG_IS_ECDH(alg)) { in mbedtls_pk_can_do_ext()
481 psa_algorithm_t alg = 0; mbedtls_pk_get_psa_attributes() local
[all...]
H A Dpsa_crypto_mac.h40 * \param alg The MAC algorithm to use (\c PSA_ALG_XXX value
41 * such that #PSA_ALG_IS_MAC(\p alg) is true).
52 * \p alg is not supported.
62 psa_algorithm_t alg,
85 * \param alg The MAC algorithm to use (\c PSA_ALG_XXX value
86 * such that #PSA_ALG_IS_MAC(\p alg) is true).
91 * \p alg is not supported.
102 psa_algorithm_t alg);
120 * \param alg The MAC algorithm to use (\c PSA_ALG_XXX value
121 * such that #PSA_ALG_IS_MAC(\p alg) i
[all...]
H A Dasn1parse.c353 mbedtls_asn1_buf *alg, mbedtls_asn1_buf *params) in mbedtls_asn1_get_alg()
367 alg->tag = **p; in mbedtls_asn1_get_alg()
370 if ((ret = mbedtls_asn1_get_tag(p, end, &alg->len, MBEDTLS_ASN1_OID)) != 0) { in mbedtls_asn1_get_alg()
374 alg->p = *p; in mbedtls_asn1_get_alg()
375 *p += alg->len; in mbedtls_asn1_get_alg()
401 mbedtls_asn1_buf *alg) in mbedtls_asn1_get_alg_null()
408 if ((ret = mbedtls_asn1_get_alg(p, end, alg, &params)) != 0) { in mbedtls_asn1_get_alg_null()
351 mbedtls_asn1_get_alg(unsigned char **p, const unsigned char *end, mbedtls_asn1_buf *alg, mbedtls_asn1_buf *params) mbedtls_asn1_get_alg() argument
399 mbedtls_asn1_get_alg_null(unsigned char **p, const unsigned char *end, mbedtls_asn1_buf *alg) mbedtls_asn1_get_alg_null() argument
/third_party/mbedtls/programs/psa/
H A Dhmac_demo.c108 const psa_algorithm_t alg = PSA_ALG_HMAC(PSA_ALG_SHA_256); in hmac_demo() local
110 /* PSA_MAC_LENGTH(PSA_KEY_TYPE_HMAC, 8 * sizeof( key_bytes ), alg) in hmac_demo()
118 psa_set_key_algorithm(&attributes, alg); in hmac_demo()
133 PSA_CHECK(psa_mac_sign_setup(&op, key, alg)); in hmac_demo()
140 PSA_CHECK(psa_mac_sign_setup(&op, key, alg)); in hmac_demo()
/third_party/mbedtls/tests/include/test/drivers/
H A Dasymmetric_encryption.h56 size_t key_buffer_size, psa_algorithm_t alg, const uint8_t *input,
62 size_t key_length, psa_algorithm_t alg, const uint8_t *input,
68 size_t key_buffer_size, psa_algorithm_t alg, const uint8_t *input,
74 size_t key_length, psa_algorithm_t alg, const uint8_t *input,
/third_party/node/deps/openssl/openssl/crypto/perlasm/
H A Dsparcv9_modes.pl42 my ($alg,$bits) = @_;
45 .globl ${alg}${bits}_t4_cbc_encrypt
47 ${alg}${bits}_t4_cbc_encrypt:
75 call _${alg}${bits}_load_enckey
115 call _${alg}${bits}_encrypt_1x
224 call _${alg}${bits}_encrypt_1x
254 .type ${alg}${bits}_t4_cbc_encrypt,#function
255 .size ${alg}${bits}_t4_cbc_encrypt,.-${alg}${bits}_t4_cbc_encrypt
260 my ($alg,
[all...]
/third_party/openssl/crypto/perlasm/
H A Dsparcv9_modes.pl42 my ($alg,$bits) = @_;
45 .globl ${alg}${bits}_t4_cbc_encrypt
47 ${alg}${bits}_t4_cbc_encrypt:
75 call _${alg}${bits}_load_enckey
115 call _${alg}${bits}_encrypt_1x
224 call _${alg}${bits}_encrypt_1x
254 .type ${alg}${bits}_t4_cbc_encrypt,#function
255 .size ${alg}${bits}_t4_cbc_encrypt,.-${alg}${bits}_t4_cbc_encrypt
260 my ($alg,
[all...]
/third_party/node/test/parallel/
H A Dtest-webcrypto-export-import-cfrg.js204 alg: keyData[name].jwsAlg,
215 alg: keyData[name].jwsAlg,
255 assert.strictEqual(pubJwk.alg, 'EdDSA');
256 assert.strictEqual(pvtJwk.alg, 'EdDSA');
258 assert.strictEqual(pubJwk.alg, undefined);
259 assert.strictEqual(pvtJwk.alg, undefined);
288 { kty: jwk.kty, x: jwk.x, crv: jwk.crv, alg: 'foo' },
292 { message: 'JWK "alg" does not match the requested algorithm' });
297 { ...jwk, alg: 'foo' },
301 { message: 'JWK "alg" doe
[all...]
/third_party/node/deps/openssl/openssl/crypto/ess/
H A Dess_lib.c144 X509_ALGOR *alg = NULL; in ESS_CERT_ID_V2_new_init() local
152 alg = X509_ALGOR_new(); in ESS_CERT_ID_V2_new_init()
153 if (alg == NULL) in ESS_CERT_ID_V2_new_init()
155 X509_ALGOR_set_md(alg, hash_alg); in ESS_CERT_ID_V2_new_init()
156 if (alg->algorithm == NULL) in ESS_CERT_ID_V2_new_init()
158 cid->hash_alg = alg; in ESS_CERT_ID_V2_new_init()
159 alg = NULL; in ESS_CERT_ID_V2_new_init()
190 X509_ALGOR_free(alg); in ESS_CERT_ID_V2_new_init()
/third_party/node/deps/openssl/openssl/crypto/cmp/
H A Dcmp_protect.c188 static int set_pbmac_algor(const OSSL_CMP_CTX *ctx, X509_ALGOR **alg) in set_pbmac_algor() argument
210 if (*alg == NULL && (*alg = X509_ALGOR_new()) == NULL) in set_pbmac_algor()
214 X509_ALGOR_set0(*alg, OBJ_nid2obj(NID_id_PasswordBasedMAC), in set_pbmac_algor()
226 static int set_sig_algor(const OSSL_CMP_CTX *ctx, X509_ALGOR **alg) in set_sig_algor() argument
238 if (*alg == NULL && (*alg = X509_ALGOR_new()) == NULL) in set_sig_algor()
241 if (X509_ALGOR_set0(*alg, algo, V_ASN1_UNDEF, NULL)) in set_sig_algor()
/third_party/openssl/crypto/ess/
H A Dess_lib.c144 X509_ALGOR *alg = NULL; in ESS_CERT_ID_V2_new_init() local
152 alg = X509_ALGOR_new(); in ESS_CERT_ID_V2_new_init()
153 if (alg == NULL) in ESS_CERT_ID_V2_new_init()
155 X509_ALGOR_set_md(alg, hash_alg); in ESS_CERT_ID_V2_new_init()
156 if (alg->algorithm == NULL) in ESS_CERT_ID_V2_new_init()
158 cid->hash_alg = alg; in ESS_CERT_ID_V2_new_init()
159 alg = NULL; in ESS_CERT_ID_V2_new_init()
190 X509_ALGOR_free(alg); in ESS_CERT_ID_V2_new_init()
/third_party/openssl/crypto/cmp/
H A Dcmp_protect.c188 static int set_pbmac_algor(const OSSL_CMP_CTX *ctx, X509_ALGOR **alg) in set_pbmac_algor() argument
210 if (*alg == NULL && (*alg = X509_ALGOR_new()) == NULL) in set_pbmac_algor()
214 X509_ALGOR_set0(*alg, OBJ_nid2obj(NID_id_PasswordBasedMAC), in set_pbmac_algor()
226 static int set_sig_algor(const OSSL_CMP_CTX *ctx, X509_ALGOR **alg) in set_sig_algor() argument
238 if (*alg == NULL && (*alg = X509_ALGOR_new()) == NULL) in set_sig_algor()
241 if (X509_ALGOR_set0(*alg, algo, V_ASN1_UNDEF, NULL)) in set_sig_algor()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/
H A Dcrypto_internal-cipher.c18 enum crypto_cipher_alg alg; member
43 struct crypto_cipher * crypto_cipher_init(enum crypto_cipher_alg alg, in crypto_cipher_init() argument
53 ctx->alg = alg; in crypto_cipher_init()
55 switch (alg) { in crypto_cipher_init()
108 switch (ctx->alg) { in crypto_cipher_encrypt()
172 switch (ctx->alg) { in crypto_cipher_decrypt()
232 switch (ctx->alg) { in crypto_cipher_deinit()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/
H A Dcrypto_internal-cipher.c18 enum crypto_cipher_alg alg; member
43 struct crypto_cipher * crypto_cipher_init(enum crypto_cipher_alg alg, in crypto_cipher_init() argument
53 ctx->alg = alg; in crypto_cipher_init()
55 switch (alg) { in crypto_cipher_init()
108 switch (ctx->alg) { in crypto_cipher_encrypt()
172 switch (ctx->alg) { in crypto_cipher_decrypt()
232 switch (ctx->alg) { in crypto_cipher_deinit()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/
H A Dtlsv1_client_ocsp.c67 static unsigned int ocsp_hash_data(struct asn1_oid *alg, const u8 *data, in ocsp_hash_data() argument
74 if (x509_sha1_oid(alg)) { in ocsp_hash_data()
81 if (x509_sha256_oid(alg)) { in ocsp_hash_data()
88 if (x509_sha384_oid(alg)) { in ocsp_hash_data()
95 if (x509_sha512_oid(alg)) { in ocsp_hash_data()
103 asn1_oid_to_str(alg, buf, sizeof(buf)); in ocsp_hash_data()
104 wpa_printf(MSG_DEBUG, "OCSP: Could not calculate hash with alg %s", in ocsp_hash_data()
118 struct x509_algorithm_identifier alg; in tls_process_ocsp_single_response() local
157 if (x509_parse_algorithm_identifier(pos, end - pos, &alg, &pos)) in tls_process_ocsp_single_response()
175 hash_len = ocsp_hash_data(&alg in tls_process_ocsp_single_response()
354 struct x509_algorithm_identifier alg; tls_process_basic_ocsp_response() local
[all...]
/third_party/libcoap/include/coap3/
H A Dcoap_crypto_internal.h60 cose_alg_t alg; /**< The COSE algorith to use */ member
71 * @param alg The COSE algorithm to check.
75 int coap_crypto_check_cipher_alg(cose_alg_t alg);
143 * @param alg The hash algorithm.
151 int coap_crypto_hash(cose_alg_t alg,

Completed in 14 milliseconds

12345678910>>...21