Home
last modified time | relevance | path

Searched refs:alg (Results 251 - 275 of 1111) sorted by relevance

1...<<11121314151617181920>>...45

/third_party/libwebsockets/lib/jose/jwe/
H A Djwe-ecdh-es-aeskw.c52 * value. The "alg" (algorithm) Header Parameter value "ECDH-ES" is
60 * The following "alg" (algorithm) Header Parameter values are used to
66 * | "alg" Param | Key Management Algorithm |
139 * "alg" (algorithm) Header Parameter value.
183 * - ECDH-ES[-variant] comes in the jose "alg" and just covers key agreement.
205 // kw_hlen = lws_genhash_size(jwe->jose.alg->hash_type), in lws_jwe_encrypt_ecdh()
207 ekbytes = 32; //jwe->jose.alg->keybits_fixed / 8; in lws_jwe_encrypt_ecdh()
267 jwe->jose.alg->algtype_crypto == LWS_JOSE_ENCTYPE_NONE, in lws_jwe_encrypt_ecdh()
290 if (jwe->jose.alg->algtype_crypto != LWS_JOSE_ENCTYPE_NONE) { in lws_jwe_encrypt_ecdh()
341 "{\"alg\" in lws_jwe_encrypt_ecdh()
[all...]
/third_party/openssl/test/
H A Dalgorithmid_test.c26 X509_ALGOR *alg = NULL; in test_spki_aid() local
43 if (!TEST_true(X509_PUBKEY_get0_param(NULL, NULL, NULL, &alg, pubkey)) in test_spki_aid()
47 if (!TEST_int_ge(algid_legacy_len = i2d_X509_ALGOR(alg, &algid_legacy), 0)) in test_spki_aid()
50 X509_ALGOR_get0(&oid, NULL, NULL, alg); in test_spki_aid()
114 const X509_ALGOR *alg = NULL; in test_x509_sig_aid() local
131 X509_get0_signature(NULL, &alg, eecert); in test_x509_sig_aid()
132 X509_ALGOR_get0(&sig_oid, NULL, NULL, alg); in test_x509_sig_aid()
133 if (!TEST_int_eq(X509_ALGOR_cmp(alg, X509_get0_tbs_sigalg(eecert)), 0)) in test_x509_sig_aid()
149 if (!TEST_int_ge(algid_legacy_len = i2d_X509_ALGOR(alg, &algid_legacy), 0)) in test_x509_sig_aid()
/kernel/linux/linux-5.10/crypto/
H A Dcfb.c203 struct crypto_alg *alg; in crypto_cfb_create() local
210 alg = skcipher_ialg_simple(inst); in crypto_cfb_create()
213 inst->alg.base.cra_blocksize = 1; in crypto_cfb_create()
219 inst->alg.chunksize = alg->cra_blocksize; in crypto_cfb_create()
221 inst->alg.encrypt = crypto_cfb_encrypt; in crypto_cfb_create()
222 inst->alg.decrypt = crypto_cfb_decrypt; in crypto_cfb_create()
H A Dvmac.c622 struct crypto_alg *alg; in vmac_create() local
639 alg = crypto_spawn_cipher_alg(spawn); in vmac_create()
642 if (alg->cra_blocksize != VMAC_NONCEBYTES) in vmac_create()
645 err = crypto_inst_setname(shash_crypto_instance(inst), tmpl->name, alg); in vmac_create()
649 inst->alg.base.cra_priority = alg->cra_priority; in vmac_create()
650 inst->alg.base.cra_blocksize = alg->cra_blocksize; in vmac_create()
651 inst->alg.base.cra_alignmask = alg in vmac_create()
[all...]
/kernel/linux/linux-6.6/drivers/mmc/host/
H A Dcqhci-crypto.c16 enum cqhci_crypto_alg alg; member
20 .alg = CQHCI_CRYPTO_ALG_AES_XTS,
69 const struct cqhci_crypto_alg_entry *alg = in cqhci_crypto_keyslot_program() local
79 if (ccap_array[i].algorithm_id == alg->alg && in cqhci_crypto_keyslot_program()
80 ccap_array[i].key_size == alg->key_size && in cqhci_crypto_keyslot_program()
148 if (cqhci_crypto_algs[i].alg == cap.algorithm_id && in cqhci_find_blk_crypto_mode()
/kernel/linux/linux-6.6/crypto/
H A Dcfb.c204 struct crypto_alg *alg; in crypto_cfb_create() local
211 alg = skcipher_ialg_simple(inst); in crypto_cfb_create()
214 inst->alg.base.cra_blocksize = 1; in crypto_cfb_create()
220 inst->alg.chunksize = alg->cra_blocksize; in crypto_cfb_create()
222 inst->alg.encrypt = crypto_cfb_encrypt; in crypto_cfb_create()
223 inst->alg.decrypt = crypto_cfb_decrypt; in crypto_cfb_create()
H A Dcipher.c97 struct crypto_alg *alg = tfm->__crt_alg; in crypto_clone_cipher() local
101 if (alg->cra_init) in crypto_clone_cipher()
104 if (unlikely(!crypto_mod_get(alg))) in crypto_clone_cipher()
107 ntfm = __crypto_alloc_tfmgfp(alg, CRYPTO_ALG_TYPE_CIPHER, in crypto_clone_cipher()
110 crypto_mod_put(alg); in crypto_clone_cipher()
H A Dchacha20poly1305.c601 if (snprintf(inst->alg.base.cra_name, CRYPTO_MAX_ALG_NAME, in chachapoly_create()
605 if (snprintf(inst->alg.base.cra_driver_name, CRYPTO_MAX_ALG_NAME, in chachapoly_create()
610 inst->alg.base.cra_priority = (chacha->base.cra_priority + in chachapoly_create()
612 inst->alg.base.cra_blocksize = 1; in chachapoly_create()
613 inst->alg.base.cra_alignmask = chacha->base.cra_alignmask | in chachapoly_create()
615 inst->alg.base.cra_ctxsize = sizeof(struct chachapoly_ctx) + in chachapoly_create()
617 inst->alg.ivsize = ivsize; in chachapoly_create()
618 inst->alg.chunksize = crypto_skcipher_alg_chunksize(chacha); in chachapoly_create()
619 inst->alg.maxauthsize = POLY1305_DIGEST_SIZE; in chachapoly_create()
620 inst->alg in chachapoly_create()
[all...]
H A Drsa-pkcs1pad.c632 if (snprintf(inst->alg.base.cra_name, in pkcs1pad_create()
637 if (snprintf(inst->alg.base.cra_driver_name, in pkcs1pad_create()
649 if (snprintf(inst->alg.base.cra_name, CRYPTO_MAX_ALG_NAME, in pkcs1pad_create()
654 if (snprintf(inst->alg.base.cra_driver_name, in pkcs1pad_create()
661 inst->alg.base.cra_priority = rsa_alg->base.cra_priority; in pkcs1pad_create()
662 inst->alg.base.cra_ctxsize = sizeof(struct pkcs1pad_ctx); in pkcs1pad_create()
664 inst->alg.init = pkcs1pad_init_tfm; in pkcs1pad_create()
665 inst->alg.exit = pkcs1pad_exit_tfm; in pkcs1pad_create()
667 inst->alg.encrypt = pkcs1pad_encrypt; in pkcs1pad_create()
668 inst->alg in pkcs1pad_create()
[all...]
H A Dvmac.c623 struct crypto_alg *alg; in vmac_create() local
640 alg = crypto_spawn_cipher_alg(spawn); in vmac_create()
643 if (alg->cra_blocksize != VMAC_NONCEBYTES) in vmac_create()
646 err = crypto_inst_setname(shash_crypto_instance(inst), tmpl->name, alg); in vmac_create()
650 inst->alg.base.cra_priority = alg->cra_priority; in vmac_create()
651 inst->alg.base.cra_blocksize = alg->cra_blocksize; in vmac_create()
652 inst->alg.base.cra_alignmask = alg in vmac_create()
[all...]
/third_party/mbedtls/library/
H A Dpsa_crypto_core.h403 * \param[in] alg A signature algorithm that is compatible with
416 * #PSA_SIGN_OUTPUT_SIZE(\c key_type, \c key_bits, \p alg)
428 psa_algorithm_t alg, const uint8_t *input, size_t input_length,
446 * \param[in] alg A signature algorithm that is compatible with
465 psa_algorithm_t alg, const uint8_t *input, size_t input_length,
479 * \param[in] alg A signature algorithm that is compatible with
492 * #PSA_SIGN_OUTPUT_SIZE(\c key_type, \c key_bits, \p alg)
504 psa_algorithm_t alg, const uint8_t *hash, size_t hash_length,
519 * \param[in] alg A signature algorithm that is compatible with
539 psa_algorithm_t alg, cons
[all...]
H A Dpsa_crypto_aead.h38 * \param alg The AEAD algorithm to compute.
43 * PSA_AEAD_NONCE_LENGTH(key_type, alg) where
61 * PSA_AEAD_ENCRYPT_OUTPUT_SIZE(key_type, alg,
73 * \p alg is not supported.
82 psa_algorithm_t alg,
100 * \param alg The AEAD algorithm to compute.
105 * PSA_AEAD_NONCE_LENGTH(key_type, alg) where
122 * PSA_AEAD_DECRYPT_OUTPUT_SIZE(key_type, alg,
136 * \p alg is not supported.
145 psa_algorithm_t alg,
[all...]
/third_party/mbedtls/scripts/mbedtls_dev/
H A Dpsa_storage.py108 usage: Exprable, alg: Exprable, alg2: Exprable,
117 self.alg = as_expr(alg) #type: Expr
157 self.usage, self.alg, self.alg2)
183 usage=0x00000300, alg=0x05500200, alg2=0x04c01000,
194 usage=0, alg=0, alg2=0,
202 usage=0, alg=0, alg2=0,
/third_party/mbedtls/include/psa/
H A Dcrypto_struct.h19 * operation structure contains a `psa_algorithm_t alg` field which indicates
21 * use, `alg` is 0. Most of the structure consists of a union which is
22 * discriminated by `alg`.
31 * Note that when `alg` or `id` is 0, the content of other fields is undefined.
171 psa_algorithm_t MBEDTLS_PRIVATE(alg);
206 psa_algorithm_t MBEDTLS_PRIVATE(alg);
244 psa_algorithm_t MBEDTLS_PRIVATE(alg);
382 psa_algorithm_t alg) in psa_set_key_algorithm()
384 attributes->MBEDTLS_PRIVATE(policy).MBEDTLS_PRIVATE(alg) = alg; in psa_set_key_algorithm()
381 psa_set_key_algorithm(psa_key_attributes_t *attributes, psa_algorithm_t alg) psa_set_key_algorithm() argument
[all...]
H A Dcrypto_builtin_composites.h47 psa_algorithm_t MBEDTLS_PRIVATE(alg);
58 psa_algorithm_t MBEDTLS_PRIVATE(alg);
80 psa_algorithm_t MBEDTLS_PRIVATE(alg);
118 psa_algorithm_t MBEDTLS_PRIVATE(alg);
192 psa_algorithm_t MBEDTLS_PRIVATE(alg);
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/common/
H A Ddefs.h210 static inline int wpa_auth_alg_fils(int alg) in wpa_auth_alg_fils() argument
212 return !!(alg & (WPA_AUTH_ALG_FILS | WPA_AUTH_ALG_FILS_SK_PFS)); in wpa_auth_alg_fils()
231 static inline int wpa_alg_bip(enum wpa_alg alg) in wpa_alg_bip() argument
233 return alg == WPA_ALG_BIP_CMAC_128 || in wpa_alg_bip()
234 alg == WPA_ALG_BIP_GMAC_128 || in wpa_alg_bip()
235 alg == WPA_ALG_BIP_GMAC_256 || in wpa_alg_bip()
236 alg == WPA_ALG_BIP_CMAC_256; in wpa_alg_bip()
/third_party/libwebsockets/minimal-examples/api-tests/api-test-jose/
H A Djws.c32 *none_jose = "{\"alg\":\"none\"}",
66 &temp_len) < 0 || !jose.alg) { in test_jws_none()
71 /* confirm we used the "none" alg as expected from JOSE hdr */ in test_jws_none()
72 if (strcmp(jose.alg->alg, "none")) { in test_jws_none()
73 lwsl_err("%s: JOSE header has wrong alg\n", __func__); in test_jws_none()
102 *test1 = "{\"typ\":\"JWT\",\r\n \"alg\":\"HS256\"}",
135 &temp_len) < 0 || !jose.alg) { in test_jws_HS256()
140 /* confirm we used the "none" alg as expected from JOSE hdr */ in test_jws_HS256()
141 if (strcmp(jose.alg in test_jws_HS256()
[all...]
/kernel/linux/linux-5.10/drivers/crypto/ccp/
H A Dccp-crypto-aes.c40 struct ccp_crypto_skcipher_alg *alg = ccp_crypto_skcipher_alg(tfm); in ccp_aes_setkey() local
56 ctx->u.aes.mode = alg->mode; in ccp_aes_setkey()
313 struct skcipher_alg *alg; in ccp_register_aes_alg() local
325 alg = &ccp_alg->alg; in ccp_register_aes_alg()
326 *alg = *def->alg_defaults; in ccp_register_aes_alg()
327 snprintf(alg->base.cra_name, CRYPTO_MAX_ALG_NAME, "%s", def->name); in ccp_register_aes_alg()
328 snprintf(alg->base.cra_driver_name, CRYPTO_MAX_ALG_NAME, "%s", in ccp_register_aes_alg()
330 alg->base.cra_blocksize = def->blocksize; in ccp_register_aes_alg()
331 alg in ccp_register_aes_alg()
[all...]
/kernel/linux/linux-6.6/drivers/crypto/ccp/
H A Dccp-crypto-aes.c41 struct ccp_crypto_skcipher_alg *alg = ccp_crypto_skcipher_alg(tfm); in ccp_aes_setkey() local
57 ctx->u.aes.mode = alg->mode; in ccp_aes_setkey()
311 struct skcipher_alg *alg; in ccp_register_aes_alg() local
323 alg = &ccp_alg->alg; in ccp_register_aes_alg()
324 *alg = *def->alg_defaults; in ccp_register_aes_alg()
325 snprintf(alg->base.cra_name, CRYPTO_MAX_ALG_NAME, "%s", def->name); in ccp_register_aes_alg()
326 snprintf(alg->base.cra_driver_name, CRYPTO_MAX_ALG_NAME, "%s", in ccp_register_aes_alg()
328 alg->base.cra_blocksize = def->blocksize; in ccp_register_aes_alg()
329 alg in ccp_register_aes_alg()
[all...]
/third_party/node/deps/openssl/openssl/crypto/cms/
H A Dcms_ec.c73 X509_ALGOR *alg, ASN1_BIT_STRING *pubkey) in ecdh_cms_set_peerkey()
83 X509_ALGOR_get0(&aoid, &atype, &aval, alg); in ecdh_cms_set_peerkey()
161 X509_ALGOR *alg, *kekalg = NULL; in ecdh_cms_set_shared_info() local
170 if (!CMS_RecipientInfo_kari_get0_alg(ri, &alg, &ukm)) in ecdh_cms_set_shared_info()
173 if (!ecdh_cms_set_kdf_param(pctx, OBJ_obj2nid(alg->algorithm))) { in ecdh_cms_set_shared_info()
178 if (alg->parameter->type != V_ASN1_SEQUENCE) in ecdh_cms_set_shared_info()
181 p = alg->parameter->value.sequence->data; in ecdh_cms_set_shared_info()
182 plen = alg->parameter->value.sequence->length; in ecdh_cms_set_shared_info()
228 X509_ALGOR *alg; in ecdh_cms_decrypt() local
231 if (!CMS_RecipientInfo_kari_get0_orig_id(ri, &alg, in ecdh_cms_decrypt()
72 ecdh_cms_set_peerkey(EVP_PKEY_CTX *pctx, X509_ALGOR *alg, ASN1_BIT_STRING *pubkey) ecdh_cms_set_peerkey() argument
[all...]
/third_party/openssl/crypto/cms/
H A Dcms_ec.c73 X509_ALGOR *alg, ASN1_BIT_STRING *pubkey) in ecdh_cms_set_peerkey()
83 X509_ALGOR_get0(&aoid, &atype, &aval, alg); in ecdh_cms_set_peerkey()
161 X509_ALGOR *alg, *kekalg = NULL; in ecdh_cms_set_shared_info() local
170 if (!CMS_RecipientInfo_kari_get0_alg(ri, &alg, &ukm)) in ecdh_cms_set_shared_info()
173 if (!ecdh_cms_set_kdf_param(pctx, OBJ_obj2nid(alg->algorithm))) { in ecdh_cms_set_shared_info()
178 if (alg->parameter->type != V_ASN1_SEQUENCE) in ecdh_cms_set_shared_info()
181 p = alg->parameter->value.sequence->data; in ecdh_cms_set_shared_info()
182 plen = alg->parameter->value.sequence->length; in ecdh_cms_set_shared_info()
228 X509_ALGOR *alg; in ecdh_cms_decrypt() local
231 if (!CMS_RecipientInfo_kari_get0_orig_id(ri, &alg, in ecdh_cms_decrypt()
72 ecdh_cms_set_peerkey(EVP_PKEY_CTX *pctx, X509_ALGOR *alg, ASN1_BIT_STRING *pubkey) ecdh_cms_set_peerkey() argument
[all...]
/kernel/linux/linux-5.10/include/crypto/internal/
H A Dscompress.h40 static inline struct scomp_alg *__crypto_scomp_alg(struct crypto_alg *alg) in __crypto_scomp_alg() argument
42 return container_of(alg, struct scomp_alg, base); in __crypto_scomp_alg()
102 * @alg: algorithm definition
106 int crypto_register_scomp(struct scomp_alg *alg);
114 * @alg: algorithm definition
116 void crypto_unregister_scomp(struct scomp_alg *alg);
/kernel/linux/linux-6.6/include/crypto/internal/
H A Dkpp.h17 * to alias with @alg as needed.
18 * @alg: The &struct kpp_alg implementation provided by the instance.
27 struct kpp_alg alg; member
158 * @alg: algorithm definition
162 int crypto_register_kpp(struct kpp_alg *alg);
171 * @alg: algorithm definition
173 void crypto_unregister_kpp(struct kpp_alg *alg);
224 return container_of(spawn->base.alg, struct kpp_alg, base); in crypto_spawn_kpp_alg()
H A Dscompress.h50 static inline struct scomp_alg *__crypto_scomp_alg(struct crypto_alg *alg) in __crypto_scomp_alg() argument
52 return container_of(alg, struct scomp_alg, base); in __crypto_scomp_alg()
108 * @alg: algorithm definition
112 int crypto_register_scomp(struct scomp_alg *alg);
120 * @alg: algorithm definition
122 void crypto_unregister_scomp(struct scomp_alg *alg);
/third_party/libwebsockets/include/libwebsockets/
H A Dlws-jose.h85 const char *alg; /* the JWA enc alg name, eg "ES512" */ member
125 const struct lws_jose_jwe_alg *alg; member
148 * lws_gencrypto_jws_alg_to_definition() - look up a jws alg name
150 * \param alg: the jws alg name
156 lws_gencrypto_jws_alg_to_definition(const char *alg,
160 * lws_gencrypto_jwe_alg_to_definition() - look up a jwe alg name
162 * \param alg: the jwe alg nam
[all...]

Completed in 16 milliseconds

1...<<11121314151617181920>>...45