/third_party/node/deps/openssl/openssl/crypto/evp/ |
H A D | kdf_meth.c | 187 void *alg; in EVP_KDF_gettable_ctx_params() local 191 alg = ossl_provider_ctx(EVP_KDF_get0_provider(kdf)); in EVP_KDF_gettable_ctx_params() 192 return kdf->gettable_ctx_params(NULL, alg); in EVP_KDF_gettable_ctx_params() 197 void *alg; in EVP_KDF_settable_ctx_params() local 201 alg = ossl_provider_ctx(EVP_KDF_get0_provider(kdf)); in EVP_KDF_settable_ctx_params() 202 return kdf->settable_ctx_params(NULL, alg); in EVP_KDF_settable_ctx_params() 207 void *alg; in EVP_KDF_CTX_gettable_params() local 211 alg = ossl_provider_ctx(EVP_KDF_get0_provider(ctx->meth)); in EVP_KDF_CTX_gettable_params() 212 return ctx->meth->gettable_ctx_params(ctx->algctx, alg); in EVP_KDF_CTX_gettable_params() 217 void *alg; in EVP_KDF_CTX_settable_params() local [all...] |
H A D | mac_meth.c | 201 void *alg; in EVP_MAC_gettable_ctx_params() local 205 alg = ossl_provider_ctx(EVP_MAC_get0_provider(mac)); in EVP_MAC_gettable_ctx_params() 206 return mac->gettable_ctx_params(NULL, alg); in EVP_MAC_gettable_ctx_params() 211 void *alg; in EVP_MAC_settable_ctx_params() local 215 alg = ossl_provider_ctx(EVP_MAC_get0_provider(mac)); in EVP_MAC_settable_ctx_params() 216 return mac->settable_ctx_params(NULL, alg); in EVP_MAC_settable_ctx_params() 221 void *alg; in EVP_MAC_CTX_gettable_params() local 225 alg = ossl_provider_ctx(EVP_MAC_get0_provider(ctx->meth)); in EVP_MAC_CTX_gettable_params() 226 return ctx->meth->gettable_ctx_params(ctx->algctx, alg); in EVP_MAC_CTX_gettable_params() 231 void *alg; in EVP_MAC_CTX_settable_params() local [all...] |
/third_party/openssl/crypto/evp/ |
H A D | kdf_meth.c | 187 void *alg; in EVP_KDF_gettable_ctx_params() local 191 alg = ossl_provider_ctx(EVP_KDF_get0_provider(kdf)); in EVP_KDF_gettable_ctx_params() 192 return kdf->gettable_ctx_params(NULL, alg); in EVP_KDF_gettable_ctx_params() 197 void *alg; in EVP_KDF_settable_ctx_params() local 201 alg = ossl_provider_ctx(EVP_KDF_get0_provider(kdf)); in EVP_KDF_settable_ctx_params() 202 return kdf->settable_ctx_params(NULL, alg); in EVP_KDF_settable_ctx_params() 207 void *alg; in EVP_KDF_CTX_gettable_params() local 211 alg = ossl_provider_ctx(EVP_KDF_get0_provider(ctx->meth)); in EVP_KDF_CTX_gettable_params() 212 return ctx->meth->gettable_ctx_params(ctx->algctx, alg); in EVP_KDF_CTX_gettable_params() 217 void *alg; in EVP_KDF_CTX_settable_params() local [all...] |
H A D | mac_meth.c | 201 void *alg; in EVP_MAC_gettable_ctx_params() local 205 alg = ossl_provider_ctx(EVP_MAC_get0_provider(mac)); in EVP_MAC_gettable_ctx_params() 206 return mac->gettable_ctx_params(NULL, alg); in EVP_MAC_gettable_ctx_params() 211 void *alg; in EVP_MAC_settable_ctx_params() local 215 alg = ossl_provider_ctx(EVP_MAC_get0_provider(mac)); in EVP_MAC_settable_ctx_params() 216 return mac->settable_ctx_params(NULL, alg); in EVP_MAC_settable_ctx_params() 221 void *alg; in EVP_MAC_CTX_gettable_params() local 225 alg = ossl_provider_ctx(EVP_MAC_get0_provider(ctx->meth)); in EVP_MAC_CTX_gettable_params() 226 return ctx->meth->gettable_ctx_params(ctx->algctx, alg); in EVP_MAC_CTX_gettable_params() 231 void *alg; in EVP_MAC_CTX_settable_params() local [all...] |
/kernel/linux/linux-5.10/include/crypto/ |
H A D | kpp.h | 112 static inline struct kpp_alg *__crypto_kpp_alg(struct crypto_alg *alg) in __crypto_kpp_alg() argument 114 return container_of(alg, struct kpp_alg, base); in __crypto_kpp_alg() 271 * Function invokes the specific kpp operation for a given alg. 286 struct kpp_alg *alg = crypto_kpp_alg(tfm); in crypto_kpp_set_secret() local 291 ret = alg->set_secret(tfm, buffer, len); in crypto_kpp_set_secret() 312 struct kpp_alg *alg = crypto_kpp_alg(tfm); in crypto_kpp_generate_public_key() local 317 ret = alg->generate_public_key(req); in crypto_kpp_generate_public_key() 335 struct kpp_alg *alg = crypto_kpp_alg(tfm); in crypto_kpp_compute_shared_secret() local 340 ret = alg->compute_shared_secret(req); in crypto_kpp_compute_shared_secret() 357 struct kpp_alg *alg in crypto_kpp_maxsize() local [all...] |
H A D | acompress.h | 133 static inline struct acomp_alg *__crypto_acomp_alg(struct crypto_alg *alg) in __crypto_acomp_alg() argument 135 return container_of(alg, struct acomp_alg, base); in __crypto_acomp_alg() 264 struct crypto_alg *alg = tfm->base.__crt_alg; in crypto_acomp_compress() local 268 crypto_stats_get(alg); in crypto_acomp_compress() 270 crypto_stats_compress(slen, ret, alg); in crypto_acomp_compress() 286 struct crypto_alg *alg = tfm->base.__crt_alg; in crypto_acomp_decompress() local 290 crypto_stats_get(alg); in crypto_acomp_decompress() 292 crypto_stats_decompress(slen, ret, alg); in crypto_acomp_decompress()
|
/third_party/libwebsockets/lib/tls/ |
H A D | lws-gencrypto-common.c | 38 * "alg" value "none" and is formatted identically to other JWSs, but 258 * RSAES-PKCS1-v1_5 [RFC3447]. The "alg" (algorithm) Header Parameter 328 * used as the JWE Encrypted Key value. The "alg" (algorithm) Header 361 * value. The "alg" (algorithm) Header Parameter value "ECDH-ES" is 576 lws_gencrypto_jws_alg_to_definition(const char *alg, in lws_gencrypto_jws_alg_to_definition() argument 581 while (a->alg) { in lws_gencrypto_jws_alg_to_definition() 582 if (!strcmp(alg, a->alg)) { in lws_gencrypto_jws_alg_to_definition() 594 lws_gencrypto_jwe_alg_to_definition(const char *alg, in lws_gencrypto_jwe_alg_to_definition() argument 599 while (a->alg) { in lws_gencrypto_jwe_alg_to_definition() [all...] |
/kernel/linux/linux-5.10/crypto/ |
H A D | skcipher.c | 627 struct crypto_alg *alg = tfm->base.__crt_alg; in crypto_skcipher_encrypt() local 631 crypto_stats_get(alg); in crypto_skcipher_encrypt() 636 crypto_stats_skcipher_encrypt(cryptlen, ret, alg); in crypto_skcipher_encrypt() 644 struct crypto_alg *alg = tfm->base.__crt_alg; in crypto_skcipher_decrypt() local 648 crypto_stats_get(alg); in crypto_skcipher_decrypt() 653 crypto_stats_skcipher_decrypt(cryptlen, ret, alg); in crypto_skcipher_decrypt() 661 struct skcipher_alg *alg = crypto_skcipher_alg(skcipher); in crypto_skcipher_exit_tfm() local 663 alg->exit(skcipher); in crypto_skcipher_exit_tfm() 669 struct skcipher_alg *alg = crypto_skcipher_alg(skcipher); in crypto_skcipher_init_tfm() local 673 if (alg in crypto_skcipher_init_tfm() 692 crypto_skcipher_show(struct seq_file *m, struct crypto_alg *alg) crypto_skcipher_show() argument 709 crypto_skcipher_report(struct sk_buff *skb, struct crypto_alg *alg) crypto_skcipher_report() argument 729 crypto_skcipher_report(struct sk_buff *skb, struct crypto_alg *alg) crypto_skcipher_report() argument 795 skcipher_prepare_alg(struct skcipher_alg *alg) skcipher_prepare_alg() argument 815 crypto_register_skcipher(struct skcipher_alg *alg) crypto_register_skcipher() argument 828 crypto_unregister_skcipher(struct skcipher_alg *alg) crypto_unregister_skcipher() argument [all...] |
H A D | echainiv.c | 124 if (inst->alg.ivsize & (sizeof(u64) - 1) || !inst->alg.ivsize) in echainiv_aead_create() 127 inst->alg.encrypt = echainiv_encrypt; in echainiv_aead_create() 128 inst->alg.decrypt = echainiv_decrypt; in echainiv_aead_create() 130 inst->alg.init = aead_init_geniv; in echainiv_aead_create() 131 inst->alg.exit = aead_exit_geniv; in echainiv_aead_create() 133 inst->alg.base.cra_ctxsize = sizeof(struct aead_geniv_ctx); in echainiv_aead_create() 134 inst->alg.base.cra_ctxsize += inst->alg.ivsize; in echainiv_aead_create()
|
/kernel/linux/linux-5.10/drivers/crypto/allwinner/sun4i-ss/ |
H A D | sun4i-ss-core.c | 37 .alg.hash = { 64 .alg.hash = { 90 .alg.crypto = { 112 .alg.crypto = { 133 .alg.crypto = { 155 .alg.crypto = { 176 .alg.crypto = { 198 .alg.crypto = { 221 .alg.rng = { 433 err = crypto_register_skcipher(&ss_algs[i].alg in sun4i_ss_probe() [all...] |
/third_party/mbedtls/tests/src/drivers/ |
H A D | test_driver_key_agreement.c | 35 psa_algorithm_t alg, in mbedtls_test_transparent_key_agreement() 60 if (PSA_ALG_IS_ECDH(alg)) { in mbedtls_test_transparent_key_agreement() 66 alg, peer_key, peer_key_length, in mbedtls_test_transparent_key_agreement() 73 alg, peer_key, peer_key_length, in mbedtls_test_transparent_key_agreement() 88 if (PSA_ALG_IS_FFDH(alg)) { in mbedtls_test_transparent_key_agreement() 128 psa_algorithm_t alg, in mbedtls_test_opaque_key_agreement() 138 (void) alg; in mbedtls_test_opaque_key_agreement() 31 mbedtls_test_transparent_key_agreement( const psa_key_attributes_t *attributes, const uint8_t *key_buffer, size_t key_buffer_size, psa_algorithm_t alg, const uint8_t *peer_key, size_t peer_key_length, uint8_t *shared_secret, size_t shared_secret_size, size_t *shared_secret_length) mbedtls_test_transparent_key_agreement() argument 124 mbedtls_test_opaque_key_agreement( const psa_key_attributes_t *attributes, const uint8_t *key_buffer, size_t key_buffer_size, psa_algorithm_t alg, const uint8_t *peer_key, size_t peer_key_length, uint8_t *shared_secret, size_t shared_secret_size, size_t *shared_secret_length) mbedtls_test_opaque_key_agreement() argument
|
H A D | hash.c | 23 psa_algorithm_t alg, in mbedtls_test_transparent_hash_compute() 37 alg, input, input_length, in mbedtls_test_transparent_hash_compute() 42 alg, input, input_length, in mbedtls_test_transparent_hash_compute() 45 (void) alg; in mbedtls_test_transparent_hash_compute() 60 psa_algorithm_t alg) in mbedtls_test_transparent_hash_setup() 71 libtestdriver1_mbedtls_psa_hash_setup(operation, alg); in mbedtls_test_transparent_hash_setup() 74 mbedtls_psa_hash_setup(operation, alg); in mbedtls_test_transparent_hash_setup() 77 (void) alg; in mbedtls_test_transparent_hash_setup() 22 mbedtls_test_transparent_hash_compute( psa_algorithm_t alg, const uint8_t *input, size_t input_length, uint8_t *hash, size_t hash_size, size_t *hash_length) mbedtls_test_transparent_hash_compute() argument 58 mbedtls_test_transparent_hash_setup( mbedtls_transparent_test_driver_hash_operation_t *operation, psa_algorithm_t alg) mbedtls_test_transparent_hash_setup() argument
|
/kernel/linux/linux-6.6/drivers/crypto/allwinner/sun8i-ce/ |
H A D | sun8i-ce-core.c | 283 .alg.skcipher.base = { 305 .alg.skcipher.op = { 313 .alg.skcipher.base = { 334 .alg.skcipher.op = { 342 .alg.skcipher.base = { 364 .alg.skcipher.op = { 372 .alg.skcipher.base = { 393 .alg.skcipher.op = { 400 .alg.hash.base = { 427 .alg [all...] |
H A D | sun8i-ce-hash.c | 29 struct ahash_alg *alg = crypto_ahash_alg(tfm); in sun8i_ce_hash_init_tfm() local 33 algt = container_of(alg, struct sun8i_ce_alg_template, alg.hash.base); in sun8i_ce_hash_init_tfm() 123 struct ahash_alg *alg = crypto_ahash_alg(tfm); in sun8i_ce_hash_final() local 125 algt = container_of(alg, struct sun8i_ce_alg_template, in sun8i_ce_hash_final() 126 alg.hash.base); in sun8i_ce_hash_final() 166 struct ahash_alg *alg = crypto_ahash_alg(tfm); in sun8i_ce_hash_finup() local 168 algt = container_of(alg, struct sun8i_ce_alg_template, in sun8i_ce_hash_finup() 169 alg.hash.base); in sun8i_ce_hash_finup() 194 struct ahash_alg *alg in sun8i_ce_hash_digest_fb() local 209 struct ahash_alg *alg = __crypto_ahash_alg(tfm->base.__crt_alg); sun8i_ce_hash_need_fallback() local 242 struct ahash_alg *alg = __crypto_ahash_alg(tfm->base.__crt_alg); sun8i_ce_hash_digest() local 334 struct ahash_alg *alg = __crypto_ahash_alg(tfm->base.__crt_alg); sun8i_ce_hash_run() local [all...] |
/third_party/mbedtls/scripts/mbedtls_dev/ |
H A D | crypto_knowledge.py | 206 def can_do(self, alg: 'Algorithm') -> bool: 212 if not alg.is_valid_for_operation(): 214 if self.head == 'HMAC' and alg.head == 'HMAC': 218 return alg.head in [ 223 alg.head in frozenset.union(BLOCK_MAC_MODES, 226 if alg.head in ['CMAC', 'OFB'] and \ 230 if self.head == 'CHACHA20' and alg.head == 'CHACHA20_POLY1305': 233 alg.head == 'STREAM_CIPHER': 235 if self.head == 'RSA' and alg.head.startswith('RSA_'): 237 if alg [all...] |
/kernel/linux/linux-5.10/drivers/crypto/allwinner/sun8i-ss/ |
H A D | sun8i-ss-core.c | 170 .alg.skcipher = { 197 .alg.skcipher = { 223 .alg.skcipher = { 250 .alg.skcipher = { 275 .alg.rng = { 294 .alg.hash = { 324 .alg.hash = { 354 .alg.hash = { 384 .alg.hash = { 430 ss_algs[i].alg in sun8i_ss_debugfs_show() [all...] |
H A D | sun8i-ss-hash.c | 24 struct ahash_alg *alg = __crypto_ahash_alg(tfm->__crt_alg); in sun8i_ss_hash_crainit() local 30 algt = container_of(alg, struct sun8i_ss_alg_template, alg.hash); in sun8i_ss_hash_crainit() 45 if (algt->alg.hash.halg.statesize < crypto_ahash_statesize(op->fallback_tfm)) in sun8i_ss_hash_crainit() 46 algt->alg.hash.halg.statesize = crypto_ahash_statesize(op->fallback_tfm); in sun8i_ss_hash_crainit() 117 struct ahash_alg *alg = __crypto_ahash_alg(tfm->base.__crt_alg); in sun8i_ss_hash_final() local 127 algt = container_of(alg, struct sun8i_ss_alg_template, alg.hash); in sun8i_ss_hash_final() 155 struct ahash_alg *alg = __crypto_ahash_alg(tfm->base.__crt_alg); in sun8i_ss_hash_finup() local 167 algt = container_of(alg, struc in sun8i_ss_hash_finup() 180 struct ahash_alg *alg = __crypto_ahash_alg(tfm->base.__crt_alg); sun8i_ss_hash_digest_fb() local 285 struct ahash_alg *alg = __crypto_ahash_alg(tfm->base.__crt_alg); sun8i_ss_hash_digest() local 322 struct ahash_alg *alg = __crypto_ahash_alg(tfm->base.__crt_alg); sun8i_ss_hash_run() local [all...] |
/third_party/mbedtls/tests/include/test/drivers/ |
H A D | signature.h | 57 psa_algorithm_t alg, 68 psa_algorithm_t alg, 79 psa_algorithm_t alg, 89 psa_algorithm_t alg, 98 psa_algorithm_t alg, 105 psa_algorithm_t alg, 112 psa_algorithm_t alg, 119 psa_algorithm_t alg,
|
H A D | cipher.h | 49 psa_algorithm_t alg, 57 psa_algorithm_t alg, 65 psa_algorithm_t alg); 71 psa_algorithm_t alg); 95 psa_algorithm_t alg, 103 psa_algorithm_t alg, 111 psa_algorithm_t alg); 117 psa_algorithm_t alg);
|
/base/security/huks/services/huks_standard/huks_engine/main/core/src/ |
H A D | hks_core_service_key_operate_three_stage.c | 97 static int32_t GetPurposeAndAlgorithm(const struct HksParamSet *paramSet, uint32_t *pur, uint32_t *alg) in GetPurposeAndAlgorithm() argument 110 *alg = paramSet->params[i].uint32Param; in GetPurposeAndAlgorithm() 113 if (*pur != 0 && *alg != 0) { in GetPurposeAndAlgorithm() 114 HKS_LOG_E("found purpose : %" LOG_PUBLIC "u, algorithm : %" LOG_PUBLIC "u", *pur, *alg); in GetPurposeAndAlgorithm() 124 if (*alg == HKS_ALG_HMAC || *alg == HKS_ALG_SM3 || *pur == HKS_KEY_PURPOSE_SIGN || *pur == HKS_KEY_PURPOSE_VERIFY) { in GetPurposeAndAlgorithm() 127 *alg = paramSet->params[i].uint32Param; in GetPurposeAndAlgorithm() 185 uint32_t pur, uint32_t alg) in HksCoreInitProcess() 196 ret = g_hksCoreInitHandler[i].handler(keyNode, paramSet, alg); in HksCoreInitProcess() 216 uint32_t alg in HksCoreUpdateProcess() local 184 HksCoreInitProcess(const struct HuksKeyNode *keyNode, const struct HksParamSet *paramSet, uint32_t pur, uint32_t alg) HksCoreInitProcess() argument 251 uint32_t alg = 0; HksCoreFinishProcess() local 328 uint32_t alg = 0; HksCoreInit() local 428 uint32_t alg = 0; HksBatchUpdate() local 540 uint32_t alg = 0; HksCoreAbort() local [all...] |
/kernel/linux/linux-6.6/drivers/crypto/rockchip/ |
H A D | rk3288_crypto_skcipher.c | 26 struct skcipher_alg *alg = crypto_skcipher_alg(tfm); in rk_cipher_need_fallback() local 27 struct rk_crypto_tmp *algt = container_of(alg, struct rk_crypto_tmp, alg.skcipher.base); in rk_cipher_need_fallback() 73 struct skcipher_alg *alg = crypto_skcipher_alg(tfm); in rk_cipher_fallback() local 74 struct rk_crypto_tmp *algt = container_of(alg, struct rk_crypto_tmp, alg.skcipher.base); in rk_cipher_fallback() 313 struct skcipher_alg *alg = crypto_skcipher_alg(tfm); in rk_cipher_run() local 314 struct rk_crypto_tmp *algt = container_of(alg, struct rk_crypto_tmp, alg.skcipher.base); in rk_cipher_run() 438 struct skcipher_alg *alg in rk_cipher_tfm_init() local [all...] |
/base/security/huks/frameworks/huks_standard/main/common/src/ |
H A D | hks_base_check.c | 1141 static int32_t GetInvalidPurpose(uint32_t alg, uint32_t *inputPurpose, uint32_t keyFlag)
in GetInvalidPurpose() argument 1149 if (alg == g_invalidPurpose[i][0]) {
in GetInvalidPurpose() 1161 if (alg == g_invalidImportKeyPurpose[i][0]) {
in GetInvalidPurpose() 1169 static int32_t CheckPurposeValid(uint32_t alg, uint32_t inputPurpose, uint32_t keyFlag)
in CheckPurposeValid() argument 1173 int32_t result = GetInvalidPurpose(alg, &invalidPurpose, keyFlag);
in CheckPurposeValid() 1252 static int32_t InitInputParamsByAlgOne(uint32_t alg, enum CheckKeyType checkType, struct ParamsValues *inputParams)
in InitInputParamsByAlgOne() argument 1254 switch (alg) {
in InitInputParamsByAlgOne() 1280 static int32_t InitInputParamsByAlg(uint32_t alg, enum CheckKeyType checkType, struct ParamsValues *inputParams)
in InitInputParamsByAlg() argument 1282 switch (alg) {
in InitInputParamsByAlg() 1321 return InitInputParamsByAlgOne(alg, checkTyp in InitInputParamsByAlg() 1338 GetExpectParamsByAlg(uint32_t alg, enum CheckKeyType checkType, struct ExpectParamsValues *expectValues) GetExpectParamsByAlg() argument 1366 GetExpectParams(uint32_t alg, enum CheckKeyType checkType, struct ExpectParamsValues *expectValues) GetExpectParams() argument 1657 CheckBlockCipherData(uint32_t cmdId, const struct ParamsValues *inputParams, const struct HksBlob *inData, const struct HksBlob *outData, uint32_t alg) CheckBlockCipherData() argument 1925 HksCheckGenKeyPurpose(uint32_t alg, uint32_t inputPurpose, uint32_t keyFlag) HksCheckGenKeyPurpose() argument 1954 HksGetKeySize(uint32_t alg, const struct HksBlob *key, uint32_t *keySize) HksGetKeySize() argument 2007 HksGetInputParmasByAlg(uint32_t alg, enum CheckKeyType checkType, const struct HksParamSet *paramSet, struct ParamsValues *inputParams) HksGetInputParmasByAlg() argument 2048 HksCheckOptionalParam(uint32_t tag, uint32_t alg, uint32_t purpose, bool isAbsent, struct HksParam *param) HksCheckOptionalParam() argument 2092 HksCheckFixedParams(uint32_t alg, enum CheckKeyType checkType, const struct ParamsValues *inputParams) HksCheckFixedParams() argument 2127 HksCheckGenKeyMutableParams(uint32_t alg, const struct ParamsValues *inputParams) HksCheckGenKeyMutableParams() argument 2174 CheckImportMutableParams(uint32_t alg, const struct ParamsValues *params) CheckImportMutableParams() argument 2219 HksCheckSignature(uint32_t cmdId, uint32_t alg, uint32_t keySize, const struct HksBlob *signature) HksCheckSignature() argument 2263 HksCheckSignVerifyMutableParams(uint32_t cmdId, uint32_t alg, const struct ParamsValues *inputParams) HksCheckSignVerifyMutableParams() argument 2304 HksCheckCipherMutableParamsByAlg(uint32_t alg, const struct ParamsValues *inputParams) HksCheckCipherMutableParamsByAlg() argument 2326 HksCheckCipherMutableParams(uint32_t cmdId, uint32_t alg, const struct ParamsValues *inputParams) HksCheckCipherMutableParams() argument 2378 HksCheckCipherData(uint32_t cmdId, uint32_t alg, const struct ParamsValues *inputParams, const struct HksBlob *inData, const struct HksBlob *outData) HksCheckCipherData() argument 2411 HksCheckCipherMaterialParams(uint32_t alg, const struct ParamsValues *inputParams, const struct HksParamSet *paramSet) HksCheckCipherMaterialParams() argument 2521 HksCheckNeedCache(uint32_t alg, uint32_t digest) HksCheckNeedCache() argument [all...] |
/kernel/linux/linux-6.6/crypto/ |
H A D | echainiv.c | 124 if (inst->alg.ivsize & (sizeof(u64) - 1) || !inst->alg.ivsize) in echainiv_aead_create() 127 inst->alg.encrypt = echainiv_encrypt; in echainiv_aead_create() 128 inst->alg.decrypt = echainiv_decrypt; in echainiv_aead_create() 130 inst->alg.init = aead_init_geniv; in echainiv_aead_create() 131 inst->alg.exit = aead_exit_geniv; in echainiv_aead_create() 133 inst->alg.base.cra_ctxsize = sizeof(struct aead_geniv_ctx); in echainiv_aead_create() 134 inst->alg.base.cra_ctxsize += inst->alg.ivsize; in echainiv_aead_create()
|
/third_party/mbedtls/include/psa/ |
H A D | crypto_extra.h | 388 #define PSA_ALG_IS_DSA(alg) \ 389 (((alg) & ~PSA_ALG_HASH_MASK & ~PSA_ALG_DSA_DETERMINISTIC_FLAG) == \ 391 #define PSA_ALG_DSA_IS_DETERMINISTIC(alg) \ 392 (((alg) & PSA_ALG_DSA_DETERMINISTIC_FLAG) != 0) 393 #define PSA_ALG_IS_DETERMINISTIC_DSA(alg) \ 394 (PSA_ALG_IS_DSA(alg) && PSA_ALG_DSA_IS_DETERMINISTIC(alg)) 395 #define PSA_ALG_IS_RANDOMIZED_DSA(alg) \ 396 (PSA_ALG_IS_DSA(alg) && !PSA_ALG_DSA_IS_DETERMINISTIC(alg)) [all...] |
/kernel/linux/linux-5.10/drivers/crypto/ |
H A D | picoxcell_crypto.c | 95 struct aead_alg alg; member 138 struct skcipher_alg alg; member 177 static inline struct spacc_alg *to_spacc_skcipher(struct skcipher_alg *alg) in to_spacc_skcipher() argument 179 return alg ? container_of(alg, struct spacc_alg, alg) : NULL; in to_spacc_skcipher() 182 static inline struct spacc_aead *to_spacc_aead(struct aead_alg *alg) in to_spacc_aead() argument 184 return container_of(alg, struct spacc_aead, alg); in to_spacc_aead() 511 struct aead_alg *alg in spacc_aead_need_fallback() local 559 struct aead_alg *alg = crypto_aead_alg(aead); spacc_aead_submit() local 630 struct aead_alg *alg = crypto_aead_alg(aead); spacc_aead_setup() local 676 struct spacc_aead *alg = to_spacc_aead(crypto_aead_alg(aead)); spacc_aead_encrypt() local 684 struct spacc_aead *alg = to_spacc_aead(crypto_aead_alg(aead)); spacc_aead_decrypt() local 696 struct aead_alg *alg = crypto_aead_alg(tfm); spacc_aead_cra_init() local 868 struct skcipher_alg *alg = crypto_skcipher_alg(tfm); spacc_ablk_submit() local 927 struct skcipher_alg *alg = crypto_skcipher_alg(tfm); spacc_ablk_setup() local 1004 struct skcipher_alg *alg = crypto_skcipher_alg(tfm); spacc_ablk_init_tfm() local 1042 struct skcipher_alg *alg = crypto_skcipher_alg(cipher); spacc_ablk_encrypt() local 1051 struct skcipher_alg *alg = crypto_skcipher_alg(cipher); spacc_ablk_decrypt() local 1131 struct crypto_alg *alg = req->req->tfm->__crt_alg; spacc_req_submit() local 1769 struct spacc_alg *alg, *next; spacc_remove() local [all...] |