/third_party/mbedtls/include/psa/ |
H A D | crypto_builtin_composites.h | 47 psa_algorithm_t MBEDTLS_PRIVATE(alg); 58 psa_algorithm_t MBEDTLS_PRIVATE(alg); 80 psa_algorithm_t MBEDTLS_PRIVATE(alg); 118 psa_algorithm_t MBEDTLS_PRIVATE(alg); 192 psa_algorithm_t MBEDTLS_PRIVATE(alg);
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/ |
H A D | ikev2_common.c | 56 int ikev2_integ_hash(int alg, const u8 *key, size_t key_len, const u8 *data, in ikev2_integ_hash() argument 61 switch (alg) { in ikev2_integ_hash() 97 int ikev2_prf_hash(int alg, const u8 *key, size_t key_len, in ikev2_prf_hash() argument 101 switch (alg) { in ikev2_prf_hash() 113 int ikev2_prf_plus(int alg, const u8 *key, size_t key_len, in ikev2_prf_plus() argument 125 prf = ikev2_get_prf(alg); in ikev2_prf_plus() 143 res = ikev2_prf_hash(alg, key, key_len, 2, &addr[1], in ikev2_prf_plus() 146 res = ikev2_prf_hash(alg, key, key_len, 3, addr, len, in ikev2_prf_plus() 175 int ikev2_encr_encrypt(int alg, const u8 *key, size_t key_len, const u8 *iv, in ikev2_encr_encrypt() argument 181 switch (alg) { in ikev2_encr_encrypt() 210 ikev2_encr_decrypt(int alg, const u8 *key, size_t key_len, const u8 *iv, const u8 *crypt, u8 *plain, size_t len) ikev2_encr_decrypt() argument [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/ |
H A D | pkcs5.c | 25 } alg; member 48 static int pkcs5_is_oid(struct asn1_oid *oid, unsigned long alg) in pkcs5_is_oid() argument 54 oid->oid[6] == alg; in pkcs5_is_oid() 58 static int enc_alg_is_oid(struct asn1_oid *oid, unsigned long alg) in enc_alg_is_oid() argument 63 oid->oid[5] == alg; in enc_alg_is_oid() 67 static int pkcs12_is_pbe_oid(struct asn1_oid *oid, unsigned long alg) in pkcs12_is_pbe_oid() argument 74 oid->oid[7] == alg; in pkcs12_is_pbe_oid() 299 params->alg = pkcs5_get_alg(&oid); in pkcs5_get_params() 300 if (params->alg == PKCS5_ALG_UNKNOWN) { in pkcs5_get_params() 306 if (params->alg in pkcs5_get_params() [all...] |
H A D | tlsv1_client_ocsp.c | 67 static unsigned int ocsp_hash_data(struct asn1_oid *alg, const u8 *data, in ocsp_hash_data() argument 74 if (x509_sha1_oid(alg)) { in ocsp_hash_data() 81 if (x509_sha256_oid(alg)) { in ocsp_hash_data() 88 if (x509_sha384_oid(alg)) { in ocsp_hash_data() 95 if (x509_sha512_oid(alg)) { in ocsp_hash_data() 103 asn1_oid_to_str(alg, buf, sizeof(buf)); in ocsp_hash_data() 104 wpa_printf(MSG_DEBUG, "OCSP: Could not calculate hash with alg %s", in ocsp_hash_data() 118 struct x509_algorithm_identifier alg; in tls_process_ocsp_single_response() local 161 if (x509_parse_algorithm_identifier(pos, end - pos, &alg, &pos)) in tls_process_ocsp_single_response() 181 hash_len = ocsp_hash_data(&alg in tls_process_ocsp_single_response() 363 struct x509_algorithm_identifier alg; tls_process_basic_ocsp_response() local [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/ |
H A D | ikev2_common.c | 56 int ikev2_integ_hash(int alg, const u8 *key, size_t key_len, const u8 *data, in ikev2_integ_hash() argument 61 switch (alg) { in ikev2_integ_hash() 97 int ikev2_prf_hash(int alg, const u8 *key, size_t key_len, in ikev2_prf_hash() argument 101 switch (alg) { in ikev2_prf_hash() 113 int ikev2_prf_plus(int alg, const u8 *key, size_t key_len, in ikev2_prf_plus() argument 125 prf = ikev2_get_prf(alg); in ikev2_prf_plus() 143 res = ikev2_prf_hash(alg, key, key_len, 2, &addr[1], in ikev2_prf_plus() 146 res = ikev2_prf_hash(alg, key, key_len, 3, addr, len, in ikev2_prf_plus() 175 int ikev2_encr_encrypt(int alg, const u8 *key, size_t key_len, const u8 *iv, in ikev2_encr_encrypt() argument 181 switch (alg) { in ikev2_encr_encrypt() 210 ikev2_encr_decrypt(int alg, const u8 *key, size_t key_len, const u8 *iv, const u8 *crypt, u8 *plain, size_t len) ikev2_encr_decrypt() argument [all...] |
/third_party/libwebsockets/include/libwebsockets/ |
H A D | lws-jose.h | 85 const char *alg; /* the JWA enc alg name, eg "ES512" */ member 125 const struct lws_jose_jwe_alg *alg; member 148 * lws_gencrypto_jws_alg_to_definition() - look up a jws alg name 150 * \param alg: the jws alg name 156 lws_gencrypto_jws_alg_to_definition(const char *alg, 160 * lws_gencrypto_jwe_alg_to_definition() - look up a jwe alg name 162 * \param alg: the jwe alg nam [all...] |
/third_party/mbedtls/library/ |
H A D | psa_crypto_aead.h | 38 * \param alg The AEAD algorithm to compute. 43 * PSA_AEAD_NONCE_LENGTH(key_type, alg) where 61 * PSA_AEAD_ENCRYPT_OUTPUT_SIZE(key_type, alg, 73 * \p alg is not supported. 82 psa_algorithm_t alg, 100 * \param alg The AEAD algorithm to compute. 105 * PSA_AEAD_NONCE_LENGTH(key_type, alg) where 122 * PSA_AEAD_DECRYPT_OUTPUT_SIZE(key_type, alg, 136 * \p alg is not supported. 145 psa_algorithm_t alg, [all...] |
H A D | psa_crypto_rsa.h | 150 * \param[in] alg A signature algorithm that is compatible with 164 * \p alg) where \c key_bits is the bit-size of the RSA key. 174 psa_algorithm_t alg, const uint8_t *hash, size_t hash_length, 190 * \param[in] alg A signature algorithm that is compatible with 210 psa_algorithm_t alg, const uint8_t *hash, size_t hash_length, 242 * #PSA_ASYMMETRIC_ENCRYPT_OUTPUT_SIZE(\c key_type, \c key_bits, \p alg) 260 psa_algorithm_t alg, 299 * #PSA_ASYMMETRIC_DECRYPT_OUTPUT_SIZE(\c key_type, \c key_bits, \p alg) 318 psa_algorithm_t alg,
|
H A D | ssl_ticket.c | 94 psa_set_key_algorithm(&attributes, key->alg); in ssl_ticket_gen_key() 183 psa_set_key_algorithm(&attributes, key->alg); in mbedtls_ssl_ticket_rotate() 223 psa_algorithm_t alg; in mbedtls_ssl_ticket_setup() local 231 &alg, &key_type, &key_bits) != PSA_SUCCESS) { in mbedtls_ssl_ticket_setup() 235 if (PSA_ALG_IS_AEAD(alg) == 0) { in mbedtls_ssl_ticket_setup() 260 ctx->keys[0].alg = alg; in mbedtls_ssl_ticket_setup() 264 ctx->keys[1].alg = alg; in mbedtls_ssl_ticket_setup() 360 if ((status = psa_aead_encrypt(key->key, key->alg, i in mbedtls_ssl_ticket_write() [all...] |
H A D | pk.c | 247 int mbedtls_pk_can_do_ext(const mbedtls_pk_context *ctx, psa_algorithm_t alg, in mbedtls_pk_can_do_ext() argument 260 if (PSA_ALG_IS_ECDSA(alg) == 0 && in mbedtls_pk_can_do_ext() 261 PSA_ALG_IS_RSA_PKCS1V15_SIGN(alg) == 0 && in mbedtls_pk_can_do_ext() 262 PSA_ALG_IS_RSA_PSS(alg) == 0 && in mbedtls_pk_can_do_ext() 263 alg != PSA_ALG_RSA_PKCS1V15_CRYPT && in mbedtls_pk_can_do_ext() 264 PSA_ALG_IS_ECDH(alg) == 0) { in mbedtls_pk_can_do_ext() 277 if (PSA_ALG_IS_SIGN_HASH(alg) && in mbedtls_pk_can_do_ext() 278 PSA_ALG_SIGN_GET_HASH(alg) == PSA_ALG_ANY_HASH) { in mbedtls_pk_can_do_ext() 285 if (PSA_ALG_IS_ECDSA(alg) || PSA_ALG_IS_ECDH(alg)) { in mbedtls_pk_can_do_ext() 481 psa_algorithm_t alg = 0; mbedtls_pk_get_psa_attributes() local [all...] |
H A D | psa_crypto_mac.h | 40 * \param alg The MAC algorithm to use (\c PSA_ALG_XXX value 41 * such that #PSA_ALG_IS_MAC(\p alg) is true). 52 * \p alg is not supported. 62 psa_algorithm_t alg, 85 * \param alg The MAC algorithm to use (\c PSA_ALG_XXX value 86 * such that #PSA_ALG_IS_MAC(\p alg) is true). 91 * \p alg is not supported. 102 psa_algorithm_t alg); 120 * \param alg The MAC algorithm to use (\c PSA_ALG_XXX value 121 * such that #PSA_ALG_IS_MAC(\p alg) i [all...] |
H A D | asn1parse.c | 353 mbedtls_asn1_buf *alg, mbedtls_asn1_buf *params) in mbedtls_asn1_get_alg() 367 alg->tag = **p; in mbedtls_asn1_get_alg() 370 if ((ret = mbedtls_asn1_get_tag(p, end, &alg->len, MBEDTLS_ASN1_OID)) != 0) { in mbedtls_asn1_get_alg() 374 alg->p = *p; in mbedtls_asn1_get_alg() 375 *p += alg->len; in mbedtls_asn1_get_alg() 401 mbedtls_asn1_buf *alg) in mbedtls_asn1_get_alg_null() 408 if ((ret = mbedtls_asn1_get_alg(p, end, alg, ¶ms)) != 0) { in mbedtls_asn1_get_alg_null() 351 mbedtls_asn1_get_alg(unsigned char **p, const unsigned char *end, mbedtls_asn1_buf *alg, mbedtls_asn1_buf *params) mbedtls_asn1_get_alg() argument 399 mbedtls_asn1_get_alg_null(unsigned char **p, const unsigned char *end, mbedtls_asn1_buf *alg) mbedtls_asn1_get_alg_null() argument
|
/third_party/mbedtls/programs/psa/ |
H A D | hmac_demo.c | 108 const psa_algorithm_t alg = PSA_ALG_HMAC(PSA_ALG_SHA_256); in hmac_demo() local 110 /* PSA_MAC_LENGTH(PSA_KEY_TYPE_HMAC, 8 * sizeof( key_bytes ), alg) in hmac_demo() 118 psa_set_key_algorithm(&attributes, alg); in hmac_demo() 133 PSA_CHECK(psa_mac_sign_setup(&op, key, alg)); in hmac_demo() 140 PSA_CHECK(psa_mac_sign_setup(&op, key, alg)); in hmac_demo()
|
/third_party/mbedtls/tests/include/test/drivers/ |
H A D | asymmetric_encryption.h | 56 size_t key_buffer_size, psa_algorithm_t alg, const uint8_t *input, 62 size_t key_length, psa_algorithm_t alg, const uint8_t *input, 68 size_t key_buffer_size, psa_algorithm_t alg, const uint8_t *input, 74 size_t key_length, psa_algorithm_t alg, const uint8_t *input,
|
/third_party/node/deps/openssl/openssl/crypto/perlasm/ |
H A D | sparcv9_modes.pl | 42 my ($alg,$bits) = @_; 45 .globl ${alg}${bits}_t4_cbc_encrypt 47 ${alg}${bits}_t4_cbc_encrypt: 75 call _${alg}${bits}_load_enckey 115 call _${alg}${bits}_encrypt_1x 224 call _${alg}${bits}_encrypt_1x 254 .type ${alg}${bits}_t4_cbc_encrypt,#function 255 .size ${alg}${bits}_t4_cbc_encrypt,.-${alg}${bits}_t4_cbc_encrypt 260 my ($alg, [all...] |
/third_party/openssl/crypto/perlasm/ |
H A D | sparcv9_modes.pl | 42 my ($alg,$bits) = @_; 45 .globl ${alg}${bits}_t4_cbc_encrypt 47 ${alg}${bits}_t4_cbc_encrypt: 75 call _${alg}${bits}_load_enckey 115 call _${alg}${bits}_encrypt_1x 224 call _${alg}${bits}_encrypt_1x 254 .type ${alg}${bits}_t4_cbc_encrypt,#function 255 .size ${alg}${bits}_t4_cbc_encrypt,.-${alg}${bits}_t4_cbc_encrypt 260 my ($alg, [all...] |
/third_party/node/test/parallel/ |
H A D | test-webcrypto-export-import-cfrg.js | 204 alg: keyData[name].jwsAlg, 215 alg: keyData[name].jwsAlg, 255 assert.strictEqual(pubJwk.alg, 'EdDSA'); 256 assert.strictEqual(pvtJwk.alg, 'EdDSA'); 258 assert.strictEqual(pubJwk.alg, undefined); 259 assert.strictEqual(pvtJwk.alg, undefined); 288 { kty: jwk.kty, x: jwk.x, crv: jwk.crv, alg: 'foo' }, 292 { message: 'JWK "alg" does not match the requested algorithm' }); 297 { ...jwk, alg: 'foo' }, 301 { message: 'JWK "alg" doe [all...] |
/third_party/node/deps/openssl/openssl/crypto/ess/ |
H A D | ess_lib.c | 144 X509_ALGOR *alg = NULL; in ESS_CERT_ID_V2_new_init() local 152 alg = X509_ALGOR_new(); in ESS_CERT_ID_V2_new_init() 153 if (alg == NULL) in ESS_CERT_ID_V2_new_init() 155 X509_ALGOR_set_md(alg, hash_alg); in ESS_CERT_ID_V2_new_init() 156 if (alg->algorithm == NULL) in ESS_CERT_ID_V2_new_init() 158 cid->hash_alg = alg; in ESS_CERT_ID_V2_new_init() 159 alg = NULL; in ESS_CERT_ID_V2_new_init() 190 X509_ALGOR_free(alg); in ESS_CERT_ID_V2_new_init()
|
/third_party/node/deps/openssl/openssl/crypto/cmp/ |
H A D | cmp_protect.c | 188 static int set_pbmac_algor(const OSSL_CMP_CTX *ctx, X509_ALGOR **alg) in set_pbmac_algor() argument 210 if (*alg == NULL && (*alg = X509_ALGOR_new()) == NULL) in set_pbmac_algor() 214 X509_ALGOR_set0(*alg, OBJ_nid2obj(NID_id_PasswordBasedMAC), in set_pbmac_algor() 226 static int set_sig_algor(const OSSL_CMP_CTX *ctx, X509_ALGOR **alg) in set_sig_algor() argument 238 if (*alg == NULL && (*alg = X509_ALGOR_new()) == NULL) in set_sig_algor() 241 if (X509_ALGOR_set0(*alg, algo, V_ASN1_UNDEF, NULL)) in set_sig_algor()
|
/third_party/openssl/crypto/ess/ |
H A D | ess_lib.c | 144 X509_ALGOR *alg = NULL; in ESS_CERT_ID_V2_new_init() local 152 alg = X509_ALGOR_new(); in ESS_CERT_ID_V2_new_init() 153 if (alg == NULL) in ESS_CERT_ID_V2_new_init() 155 X509_ALGOR_set_md(alg, hash_alg); in ESS_CERT_ID_V2_new_init() 156 if (alg->algorithm == NULL) in ESS_CERT_ID_V2_new_init() 158 cid->hash_alg = alg; in ESS_CERT_ID_V2_new_init() 159 alg = NULL; in ESS_CERT_ID_V2_new_init() 190 X509_ALGOR_free(alg); in ESS_CERT_ID_V2_new_init()
|
/third_party/openssl/crypto/cmp/ |
H A D | cmp_protect.c | 188 static int set_pbmac_algor(const OSSL_CMP_CTX *ctx, X509_ALGOR **alg) in set_pbmac_algor() argument 210 if (*alg == NULL && (*alg = X509_ALGOR_new()) == NULL) in set_pbmac_algor() 214 X509_ALGOR_set0(*alg, OBJ_nid2obj(NID_id_PasswordBasedMAC), in set_pbmac_algor() 226 static int set_sig_algor(const OSSL_CMP_CTX *ctx, X509_ALGOR **alg) in set_sig_algor() argument 238 if (*alg == NULL && (*alg = X509_ALGOR_new()) == NULL) in set_sig_algor() 241 if (X509_ALGOR_set0(*alg, algo, V_ASN1_UNDEF, NULL)) in set_sig_algor()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
H A D | crypto_internal-cipher.c | 18 enum crypto_cipher_alg alg; member 43 struct crypto_cipher * crypto_cipher_init(enum crypto_cipher_alg alg, in crypto_cipher_init() argument 53 ctx->alg = alg; in crypto_cipher_init() 55 switch (alg) { in crypto_cipher_init() 108 switch (ctx->alg) { in crypto_cipher_encrypt() 172 switch (ctx->alg) { in crypto_cipher_decrypt() 232 switch (ctx->alg) { in crypto_cipher_deinit()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
H A D | crypto_internal-cipher.c | 18 enum crypto_cipher_alg alg; member 43 struct crypto_cipher * crypto_cipher_init(enum crypto_cipher_alg alg, in crypto_cipher_init() argument 53 ctx->alg = alg; in crypto_cipher_init() 55 switch (alg) { in crypto_cipher_init() 108 switch (ctx->alg) { in crypto_cipher_encrypt() 172 switch (ctx->alg) { in crypto_cipher_decrypt() 232 switch (ctx->alg) { in crypto_cipher_deinit()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/ |
H A D | tlsv1_client_ocsp.c | 67 static unsigned int ocsp_hash_data(struct asn1_oid *alg, const u8 *data, in ocsp_hash_data() argument 74 if (x509_sha1_oid(alg)) { in ocsp_hash_data() 81 if (x509_sha256_oid(alg)) { in ocsp_hash_data() 88 if (x509_sha384_oid(alg)) { in ocsp_hash_data() 95 if (x509_sha512_oid(alg)) { in ocsp_hash_data() 103 asn1_oid_to_str(alg, buf, sizeof(buf)); in ocsp_hash_data() 104 wpa_printf(MSG_DEBUG, "OCSP: Could not calculate hash with alg %s", in ocsp_hash_data() 118 struct x509_algorithm_identifier alg; in tls_process_ocsp_single_response() local 157 if (x509_parse_algorithm_identifier(pos, end - pos, &alg, &pos)) in tls_process_ocsp_single_response() 175 hash_len = ocsp_hash_data(&alg in tls_process_ocsp_single_response() 354 struct x509_algorithm_identifier alg; tls_process_basic_ocsp_response() local [all...] |
/third_party/libcoap/include/coap3/ |
H A D | coap_crypto_internal.h | 60 cose_alg_t alg; /**< The COSE algorith to use */ member 71 * @param alg The COSE algorithm to check. 75 int coap_crypto_check_cipher_alg(cose_alg_t alg); 143 * @param alg The hash algorithm. 151 int coap_crypto_hash(cose_alg_t alg,
|