/kernel/linux/linux-5.10/drivers/crypto/ |
H A D | picoxcell_crypto.c | 95 struct aead_alg alg; member 138 struct skcipher_alg alg; member 177 static inline struct spacc_alg *to_spacc_skcipher(struct skcipher_alg *alg) in to_spacc_skcipher() argument 179 return alg ? container_of(alg, struct spacc_alg, alg) : NULL; in to_spacc_skcipher() 182 static inline struct spacc_aead *to_spacc_aead(struct aead_alg *alg) in to_spacc_aead() argument 184 return container_of(alg, struct spacc_aead, alg); in to_spacc_aead() 511 struct aead_alg *alg in spacc_aead_need_fallback() local 559 struct aead_alg *alg = crypto_aead_alg(aead); spacc_aead_submit() local 630 struct aead_alg *alg = crypto_aead_alg(aead); spacc_aead_setup() local 676 struct spacc_aead *alg = to_spacc_aead(crypto_aead_alg(aead)); spacc_aead_encrypt() local 684 struct spacc_aead *alg = to_spacc_aead(crypto_aead_alg(aead)); spacc_aead_decrypt() local 696 struct aead_alg *alg = crypto_aead_alg(tfm); spacc_aead_cra_init() local 868 struct skcipher_alg *alg = crypto_skcipher_alg(tfm); spacc_ablk_submit() local 927 struct skcipher_alg *alg = crypto_skcipher_alg(tfm); spacc_ablk_setup() local 1004 struct skcipher_alg *alg = crypto_skcipher_alg(tfm); spacc_ablk_init_tfm() local 1042 struct skcipher_alg *alg = crypto_skcipher_alg(cipher); spacc_ablk_encrypt() local 1051 struct skcipher_alg *alg = crypto_skcipher_alg(cipher); spacc_ablk_decrypt() local 1131 struct crypto_alg *alg = req->req->tfm->__crt_alg; spacc_req_submit() local 1769 struct spacc_alg *alg, *next; spacc_remove() local [all...] |
H A D | talitos.c | 834 * crypto alg 2258 } alg; member 2265 .alg.aead = { 2287 .alg.aead = { 2308 .alg.aead = { 2333 .alg.aead = { 2357 .alg.aead = { 2379 .alg.aead = { 2400 .alg.aead = { 2425 .alg 3070 struct aead_alg *alg = crypto_aead_alg(tfm); talitos_cra_init_aead() local 3082 struct skcipher_alg *alg = crypto_skcipher_alg(tfm); talitos_cra_init_skcipher() local 3094 struct crypto_alg *alg = tfm->__crt_alg; talitos_cra_init_ahash() local 3182 struct crypto_alg *alg; talitos_alg_alloc() local 3491 struct crypto_alg *alg = NULL; talitos_probe() local [all...] |
/kernel/linux/linux-5.10/crypto/ |
H A D | keywrap.c | 266 struct crypto_alg *alg; in crypto_kw_create() local 273 alg = skcipher_ialg_simple(inst); in crypto_kw_create() 277 if (alg->cra_blocksize != sizeof(struct crypto_kw_block)) in crypto_kw_create() 280 inst->alg.base.cra_blocksize = SEMIBSIZE; in crypto_kw_create() 281 inst->alg.base.cra_alignmask = 0; in crypto_kw_create() 282 inst->alg.ivsize = SEMIBSIZE; in crypto_kw_create() 284 inst->alg.encrypt = crypto_kw_encrypt; in crypto_kw_create() 285 inst->alg.decrypt = crypto_kw_decrypt; in crypto_kw_create()
|
H A D | authencesn.c | 424 if (snprintf(inst->alg.base.cra_name, CRYPTO_MAX_ALG_NAME, in crypto_authenc_esn_create() 429 if (snprintf(inst->alg.base.cra_driver_name, CRYPTO_MAX_ALG_NAME, in crypto_authenc_esn_create() 434 inst->alg.base.cra_priority = enc->base.cra_priority * 10 + in crypto_authenc_esn_create() 436 inst->alg.base.cra_blocksize = enc->base.cra_blocksize; in crypto_authenc_esn_create() 437 inst->alg.base.cra_alignmask = auth_base->cra_alignmask | in crypto_authenc_esn_create() 439 inst->alg.base.cra_ctxsize = sizeof(struct crypto_authenc_esn_ctx); in crypto_authenc_esn_create() 441 inst->alg.ivsize = crypto_skcipher_alg_ivsize(enc); in crypto_authenc_esn_create() 442 inst->alg.chunksize = crypto_skcipher_alg_chunksize(enc); in crypto_authenc_esn_create() 443 inst->alg.maxauthsize = auth->digestsize; in crypto_authenc_esn_create() 445 inst->alg in crypto_authenc_esn_create() [all...] |
/kernel/linux/linux-6.6/crypto/ |
H A D | keywrap.c | 267 struct crypto_alg *alg; in crypto_kw_create() local 274 alg = skcipher_ialg_simple(inst); in crypto_kw_create() 278 if (alg->cra_blocksize != sizeof(struct crypto_kw_block)) in crypto_kw_create() 281 inst->alg.base.cra_blocksize = SEMIBSIZE; in crypto_kw_create() 282 inst->alg.base.cra_alignmask = 0; in crypto_kw_create() 283 inst->alg.ivsize = SEMIBSIZE; in crypto_kw_create() 285 inst->alg.encrypt = crypto_kw_encrypt; in crypto_kw_create() 286 inst->alg.decrypt = crypto_kw_decrypt; in crypto_kw_create()
|
H A D | authencesn.c | 421 if (snprintf(inst->alg.base.cra_name, CRYPTO_MAX_ALG_NAME, in crypto_authenc_esn_create() 426 if (snprintf(inst->alg.base.cra_driver_name, CRYPTO_MAX_ALG_NAME, in crypto_authenc_esn_create() 431 inst->alg.base.cra_priority = enc->base.cra_priority * 10 + in crypto_authenc_esn_create() 433 inst->alg.base.cra_blocksize = enc->base.cra_blocksize; in crypto_authenc_esn_create() 434 inst->alg.base.cra_alignmask = auth_base->cra_alignmask | in crypto_authenc_esn_create() 436 inst->alg.base.cra_ctxsize = sizeof(struct crypto_authenc_esn_ctx); in crypto_authenc_esn_create() 438 inst->alg.ivsize = crypto_skcipher_alg_ivsize(enc); in crypto_authenc_esn_create() 439 inst->alg.chunksize = crypto_skcipher_alg_chunksize(enc); in crypto_authenc_esn_create() 440 inst->alg.maxauthsize = auth->digestsize; in crypto_authenc_esn_create() 442 inst->alg in crypto_authenc_esn_create() [all...] |
/kernel/linux/linux-6.6/drivers/crypto/ |
H A D | talitos.c | 835 * crypto alg 2259 } alg; member 2266 .alg.aead = { 2288 .alg.aead = { 2309 .alg.aead = { 2334 .alg.aead = { 2358 .alg.aead = { 2380 .alg.aead = { 2401 .alg.aead = { 2426 .alg 3071 struct aead_alg *alg = crypto_aead_alg(tfm); talitos_cra_init_aead() local 3083 struct skcipher_alg *alg = crypto_skcipher_alg(tfm); talitos_cra_init_skcipher() local 3095 struct crypto_alg *alg = tfm->__crt_alg; talitos_cra_init_ahash() local 3183 struct crypto_alg *alg; talitos_alg_alloc() local 3492 struct crypto_alg *alg = NULL; talitos_probe() local [all...] |
/kernel/linux/linux-6.6/drivers/crypto/aspeed/ |
H A D | aspeed-hace-crypto.c | 705 struct skcipher_alg *alg = crypto_skcipher_alg(tfm); in aspeed_crypto_cra_init() local 710 crypto_alg = container_of(alg, struct aspeed_hace_alg, alg.skcipher.base); in aspeed_crypto_cra_init() 741 .alg.skcipher.base = { 762 .alg.skcipher.op = { 767 .alg.skcipher.base = { 789 .alg.skcipher.op = { 794 .alg.skcipher.base = { 816 .alg.skcipher.op = { 821 .alg [all...] |
/kernel/linux/linux-5.10/drivers/crypto/ccp/ |
H A D | ccp-crypto-des3.c | 39 struct ccp_crypto_skcipher_alg *alg = ccp_crypto_skcipher_alg(tfm); in ccp_des3_setkey() local 51 ctx->u.des3.mode = alg->mode; in ccp_des3_setkey() 183 struct skcipher_alg *alg; in ccp_register_des3_alg() local 195 alg = &ccp_alg->alg; in ccp_register_des3_alg() 196 *alg = *def->alg_defaults; in ccp_register_des3_alg() 197 snprintf(alg->base.cra_name, CRYPTO_MAX_ALG_NAME, "%s", def->name); in ccp_register_des3_alg() 198 snprintf(alg->base.cra_driver_name, CRYPTO_MAX_ALG_NAME, "%s", in ccp_register_des3_alg() 200 alg->base.cra_blocksize = def->blocksize; in ccp_register_des3_alg() 201 alg in ccp_register_des3_alg() [all...] |
H A D | ccp-crypto-aes-galois.c | 212 struct aead_alg *alg; in ccp_register_aes_aead() local 224 alg = &ccp_aead->alg; in ccp_register_aes_aead() 225 *alg = *def->alg_defaults; in ccp_register_aes_aead() 226 snprintf(alg->base.cra_name, CRYPTO_MAX_ALG_NAME, "%s", def->name); in ccp_register_aes_aead() 227 snprintf(alg->base.cra_driver_name, CRYPTO_MAX_ALG_NAME, "%s", in ccp_register_aes_aead() 229 alg->base.cra_blocksize = def->blocksize; in ccp_register_aes_aead() 231 ret = crypto_register_aead(alg); in ccp_register_aes_aead() 234 alg->base.cra_name, ret); in ccp_register_aes_aead()
|
H A D | ccp-crypto-aes-cmac.c | 260 struct ccp_crypto_ahash_alg *alg = in ccp_aes_cmac_setkey() local 281 ctx->u.aes.mode = alg->mode; in ccp_aes_cmac_setkey() 351 struct ahash_alg *alg; in ccp_register_aes_cmac_algs() local 363 alg = &ccp_alg->alg; in ccp_register_aes_cmac_algs() 364 alg->init = ccp_aes_cmac_init; in ccp_register_aes_cmac_algs() 365 alg->update = ccp_aes_cmac_update; in ccp_register_aes_cmac_algs() 366 alg->final = ccp_aes_cmac_final; in ccp_register_aes_cmac_algs() 367 alg->finup = ccp_aes_cmac_finup; in ccp_register_aes_cmac_algs() 368 alg in ccp_register_aes_cmac_algs() [all...] |
/kernel/linux/linux-6.6/drivers/crypto/xilinx/ |
H A D | zynqmp-aes-gcm.c | 48 } alg; member 288 struct aead_alg *alg = crypto_aead_alg(aead); in zynqmp_aes_aead_encrypt() local 292 drv_ctx = container_of(alg, struct zynqmp_aead_drv_ctx, alg.aead.base); in zynqmp_aes_aead_encrypt() 301 struct aead_alg *alg = crypto_aead_alg(aead); in zynqmp_aes_aead_decrypt() local 305 drv_ctx = container_of(alg, struct zynqmp_aead_drv_ctx, alg.aead.base); in zynqmp_aes_aead_decrypt() 316 struct aead_alg *alg = crypto_aead_alg(aead); in zynqmp_aes_aead_init() local 318 drv_ctx = container_of(alg, struct zynqmp_aead_drv_ctx, alg in zynqmp_aes_aead_init() [all...] |
/kernel/linux/linux-6.6/drivers/crypto/inside-secure/ |
H A D | safexcel_hash.c | 26 u32 alg; member 115 cdesc->control_data.control0 = ctx->alg; in safexcel_context_control() 293 ctx->alg == CONTEXT_CONTROL_CRYPTO_ALG_CRC32)) { in safexcel_handle_req_result() 780 if (ctx->alg == CONTEXT_CONTROL_CRYPTO_ALG_MD5) in safexcel_ahash_final() 783 else if (ctx->alg == CONTEXT_CONTROL_CRYPTO_ALG_SHA1) in safexcel_ahash_final() 786 else if (ctx->alg == CONTEXT_CONTROL_CRYPTO_ALG_SHA224) in safexcel_ahash_final() 789 else if (ctx->alg == CONTEXT_CONTROL_CRYPTO_ALG_SHA256) in safexcel_ahash_final() 792 else if (ctx->alg == CONTEXT_CONTROL_CRYPTO_ALG_SHA384) in safexcel_ahash_final() 795 else if (ctx->alg == CONTEXT_CONTROL_CRYPTO_ALG_SHA512) in safexcel_ahash_final() 798 else if (ctx->alg in safexcel_ahash_final() 1116 __safexcel_hmac_setkey(const char *alg, const u8 *key, unsigned int keylen, void *istate, void *ostate) __safexcel_hmac_setkey() argument 1167 safexcel_hmac_setkey(struct safexcel_context *base, const u8 *key, unsigned int keylen, const char *alg, unsigned int state_sz) safexcel_hmac_setkey() argument 1190 safexcel_hmac_alg_setkey(struct crypto_ahash *tfm, const u8 *key, unsigned int keylen, const char *alg, unsigned int state_sz) safexcel_hmac_alg_setkey() argument 2723 safexcel_hmac_sha3_cra_init(struct crypto_tfm *tfm, const char *alg) safexcel_hmac_sha3_cra_init() argument [all...] |
H A D | safexcel_cipher.c | 50 enum safexcel_cipher_alg alg; member 91 if (ctx->alg == SAFEXCEL_CHACHA20) { in safexcel_skcipher_iv() 148 if (ctx->xcm == EIP197_XCM_MODE_GCM || ctx->alg == SAFEXCEL_CHACHA20) { in safexcel_aead_iv() 272 } else if (unlikely(ctx->alg == SAFEXCEL_CHACHA20 && in safexcel_aead_token() 300 if (likely(cryptlen || ctx->alg == SAFEXCEL_CHACHA20)) { in safexcel_aead_token() 411 const char *alg; in safexcel_aead_setkey() local 428 switch (ctx->alg) { in safexcel_aead_setkey() 466 alg = "safexcel-sha1"; in safexcel_aead_setkey() 469 alg = "safexcel-sha224"; in safexcel_aead_setkey() 472 alg in safexcel_aead_setkey() 2963 struct aead_alg *alg = crypto_aead_alg(aead); safexcel_aead_fallback_cra_init() local [all...] |
/kernel/linux/linux-5.10/drivers/crypto/inside-secure/ |
H A D | safexcel_cipher.c | 49 enum safexcel_cipher_alg alg; member 91 if (ctx->alg == SAFEXCEL_CHACHA20) { in safexcel_skcipher_iv() 148 if (ctx->xcm == EIP197_XCM_MODE_GCM || ctx->alg == SAFEXCEL_CHACHA20) { in safexcel_aead_iv() 272 } else if (unlikely(ctx->alg == SAFEXCEL_CHACHA20 && in safexcel_aead_token() 300 if (likely(cryptlen || ctx->alg == SAFEXCEL_CHACHA20)) { in safexcel_aead_token() 411 const char *alg; in safexcel_aead_setkey() local 428 switch (ctx->alg) { in safexcel_aead_setkey() 466 alg = "safexcel-sha1"; in safexcel_aead_setkey() 469 alg = "safexcel-sha224"; in safexcel_aead_setkey() 472 alg in safexcel_aead_setkey() 2954 struct aead_alg *alg = crypto_aead_alg(aead); safexcel_aead_fallback_cra_init() local [all...] |
/base/security/huks/test/unittest/huks_standard_test/module_test/service_test/huks_engine/core/src/ |
H A D | hks_keyblob_test.cpp | 219 uint32_t alg; in HWTEST_F() local 220 GetDeriveKeyAlg(nullptr, &alg); in HWTEST_F() 221 ASSERT_EQ(alg, HKS_ALG_HKDF); in HWTEST_F() 241 uint32_t alg; in HWTEST_F() local 242 GetDeriveKeyAlg(paramSet, &alg); in HWTEST_F() 243 ASSERT_EQ(alg, HKS_ALG_PBKDF2); in HWTEST_F() 265 uint32_t alg; in HWTEST_F() local 266 GetDeriveKeyAlg(paramSet, &alg); in HWTEST_F() 267 ASSERT_EQ(alg, HKS_ALG_HKDF); in HWTEST_F()
|
/kernel/linux/linux-6.6/drivers/crypto/ccp/ |
H A D | ccp-crypto-aes-galois.c | 212 struct aead_alg *alg; in ccp_register_aes_aead() local 224 alg = &ccp_aead->alg; in ccp_register_aes_aead() 225 *alg = *def->alg_defaults; in ccp_register_aes_aead() 226 snprintf(alg->base.cra_name, CRYPTO_MAX_ALG_NAME, "%s", def->name); in ccp_register_aes_aead() 227 snprintf(alg->base.cra_driver_name, CRYPTO_MAX_ALG_NAME, "%s", in ccp_register_aes_aead() 229 alg->base.cra_blocksize = def->blocksize; in ccp_register_aes_aead() 231 ret = crypto_register_aead(alg); in ccp_register_aes_aead() 234 alg->base.cra_name, ret); in ccp_register_aes_aead()
|
H A D | ccp-crypto-aes-cmac.c | 260 struct ccp_crypto_ahash_alg *alg = in ccp_aes_cmac_setkey() local 281 ctx->u.aes.mode = alg->mode; in ccp_aes_cmac_setkey() 352 struct ahash_alg *alg; in ccp_register_aes_cmac_algs() local 364 alg = &ccp_alg->alg; in ccp_register_aes_cmac_algs() 365 alg->init = ccp_aes_cmac_init; in ccp_register_aes_cmac_algs() 366 alg->update = ccp_aes_cmac_update; in ccp_register_aes_cmac_algs() 367 alg->final = ccp_aes_cmac_final; in ccp_register_aes_cmac_algs() 368 alg->finup = ccp_aes_cmac_finup; in ccp_register_aes_cmac_algs() 369 alg in ccp_register_aes_cmac_algs() [all...] |
/kernel/linux/linux-5.10/drivers/crypto/xilinx/ |
H A D | zynqmp-aes-gcm.c | 47 } alg; member 285 struct aead_alg *alg = crypto_aead_alg(aead); in zynqmp_aes_aead_encrypt() local 289 drv_ctx = container_of(alg, struct zynqmp_aead_drv_ctx, alg.aead); in zynqmp_aes_aead_encrypt() 298 struct aead_alg *alg = crypto_aead_alg(aead); in zynqmp_aes_aead_decrypt() local 302 drv_ctx = container_of(alg, struct zynqmp_aead_drv_ctx, alg.aead); in zynqmp_aes_aead_decrypt() 313 struct aead_alg *alg = crypto_aead_alg(aead); in zynqmp_aes_aead_init() local 315 drv_ctx = container_of(alg, struct zynqmp_aead_drv_ctx, alg in zynqmp_aes_aead_init() [all...] |
/foundation/filemanagement/file_api/interfaces/kits/js/src/mod_fileio/properties/ |
H A D | hash.cpp | 36 static HASH_ALGORITHM_TYPE GetHashAlgorithm(const unique_ptr<char[]> &alg, const size_t algLen) in GetHashAlgorithm() argument 38 if (algLen == string_view("md5").length() && string_view(alg.get()).compare("md5") == 0) { in GetHashAlgorithm() 40 } else if (algLen == string_view("sha1").length() && string_view(alg.get()).compare("sha1") == 0) { in GetHashAlgorithm() 42 } else if (algLen == string_view("sha256").length() && string_view(alg.get()).compare("sha256") == 0) { in GetHashAlgorithm() 58 auto [resGetSecondArg, alg, algLen] = NVal(env, funcArg[NARG_POS::SECOND]).ToUTF8String(); in GetHashArgs() 64 HASH_ALGORITHM_TYPE algType = GetHashAlgorithm(alg, algLen); in GetHashArgs()
|
/kernel/linux/linux-6.6/drivers/crypto/qce/ |
H A D | aead.c | 762 struct aead_alg *alg; in qce_aead_register_one() local 769 alg = &tmpl->alg.aead; in qce_aead_register_one() 771 snprintf(alg->base.cra_name, CRYPTO_MAX_ALG_NAME, "%s", def->name); in qce_aead_register_one() 772 snprintf(alg->base.cra_driver_name, CRYPTO_MAX_ALG_NAME, "%s", in qce_aead_register_one() 775 alg->base.cra_blocksize = def->blocksize; in qce_aead_register_one() 776 alg->chunksize = def->chunksize; in qce_aead_register_one() 777 alg->ivsize = def->ivsize; in qce_aead_register_one() 778 alg->maxauthsize = def->maxauthsize; in qce_aead_register_one() 780 alg in qce_aead_register_one() [all...] |
/base/security/crypto_framework/plugin/openssl_plugin/crypto_operation/signature/src/ |
H A D | ecdsa_openssl.c | 52 static bool IsDigestAlgValid(uint32_t alg) in IsDigestAlgValid() argument 54 if ((alg == HCF_OPENSSL_DIGEST_SHA1) || (alg == HCF_OPENSSL_DIGEST_SHA224) || in IsDigestAlgValid() 55 (alg == HCF_OPENSSL_DIGEST_SHA256) ||(alg == HCF_OPENSSL_DIGEST_SHA384) || in IsDigestAlgValid() 56 (alg == HCF_OPENSSL_DIGEST_SHA512)) { in IsDigestAlgValid() 59 LOGE("Invalid digest num is %u.", alg); in IsDigestAlgValid() 64 static bool IsBrainPoolDigestAlgValid(uint32_t alg) in IsBrainPoolDigestAlgValid() argument 66 if ((alg == HCF_OPENSSL_DIGEST_SHA1) || (alg in IsBrainPoolDigestAlgValid() [all...] |
/kernel/linux/common_modules/tzdriver/auth/ |
H A D | client_hash_auth.c | 383 static struct sdesc_hash *init_sdesc(struct crypto_shash *alg) in init_sdesc() argument 388 size = sizeof(struct shash_desc) + crypto_shash_descsize(alg); in init_sdesc() 392 sdesc->shash.tfm = alg; in init_sdesc() 396 static int calc_hash(struct crypto_shash *alg, in calc_hash() argument 402 sdesc = init_sdesc(alg); in calc_hash() 417 struct crypto_shash *alg; in do_sha256() local 424 alg = crypto_alloc_shash(hash_alg_name, 0, 0); in do_sha256() 425 if(IS_ERR_OR_NULL(alg)) { in do_sha256() 426 tloge("can't alloc alg %s, PTR_ERR alg i in do_sha256() [all...] |
/kernel/linux/linux-6.6/drivers/crypto/rockchip/ |
H A D | rk3288_crypto_ahash.c | 49 struct ahash_alg *alg = crypto_ahash_alg(tfm); in rk_ahash_digest_fb() local 50 struct rk_crypto_tmp *algt = container_of(alg, struct rk_crypto_tmp, alg.hash.base); in rk_ahash_digest_fb() 263 struct ahash_alg *alg = crypto_ahash_alg(tfm); in rk_hash_run() local 264 struct rk_crypto_tmp *algt = container_of(alg, struct rk_crypto_tmp, alg.hash.base); in rk_hash_run() 348 struct ahash_alg *alg = crypto_ahash_alg(tfm); in rk_hash_init_tfm() local 349 struct rk_crypto_tmp *algt = container_of(alg, struct rk_crypto_tmp, alg.hash.base); in rk_hash_init_tfm() 375 .alg [all...] |
/base/security/huks/services/huks_standard/huks_engine/main/core/include/ |
H A D | hks_core_service_key_operate_three_stage.h | 42 uint32_t alg); 48 const struct HksBlob *srcData, struct HksBlob *signature, uint32_t alg); 54 const struct HksBlob *inData, struct HksBlob *outData, uint32_t alg); 59 int32_t (*handler)(const struct HuksKeyNode *keyNode, const struct HksParamSet *paramSet, uint32_t alg);
|