/third_party/libwebsockets/lib/jose/jwe/ |
H A D | jwe-ecdh-es-aeskw.c | 52 * value. The "alg" (algorithm) Header Parameter value "ECDH-ES" is 60 * The following "alg" (algorithm) Header Parameter values are used to 66 * | "alg" Param | Key Management Algorithm | 139 * "alg" (algorithm) Header Parameter value. 183 * - ECDH-ES[-variant] comes in the jose "alg" and just covers key agreement. 205 // kw_hlen = lws_genhash_size(jwe->jose.alg->hash_type), in lws_jwe_encrypt_ecdh() 207 ekbytes = 32; //jwe->jose.alg->keybits_fixed / 8; in lws_jwe_encrypt_ecdh() 267 jwe->jose.alg->algtype_crypto == LWS_JOSE_ENCTYPE_NONE, in lws_jwe_encrypt_ecdh() 290 if (jwe->jose.alg->algtype_crypto != LWS_JOSE_ENCTYPE_NONE) { in lws_jwe_encrypt_ecdh() 341 "{\"alg\" in lws_jwe_encrypt_ecdh() [all...] |
/third_party/openssl/test/ |
H A D | algorithmid_test.c | 26 X509_ALGOR *alg = NULL; in test_spki_aid() local 43 if (!TEST_true(X509_PUBKEY_get0_param(NULL, NULL, NULL, &alg, pubkey)) in test_spki_aid() 47 if (!TEST_int_ge(algid_legacy_len = i2d_X509_ALGOR(alg, &algid_legacy), 0)) in test_spki_aid() 50 X509_ALGOR_get0(&oid, NULL, NULL, alg); in test_spki_aid() 114 const X509_ALGOR *alg = NULL; in test_x509_sig_aid() local 131 X509_get0_signature(NULL, &alg, eecert); in test_x509_sig_aid() 132 X509_ALGOR_get0(&sig_oid, NULL, NULL, alg); in test_x509_sig_aid() 133 if (!TEST_int_eq(X509_ALGOR_cmp(alg, X509_get0_tbs_sigalg(eecert)), 0)) in test_x509_sig_aid() 149 if (!TEST_int_ge(algid_legacy_len = i2d_X509_ALGOR(alg, &algid_legacy), 0)) in test_x509_sig_aid()
|
/kernel/linux/linux-5.10/crypto/ |
H A D | cfb.c | 203 struct crypto_alg *alg; in crypto_cfb_create() local 210 alg = skcipher_ialg_simple(inst); in crypto_cfb_create() 213 inst->alg.base.cra_blocksize = 1; in crypto_cfb_create() 219 inst->alg.chunksize = alg->cra_blocksize; in crypto_cfb_create() 221 inst->alg.encrypt = crypto_cfb_encrypt; in crypto_cfb_create() 222 inst->alg.decrypt = crypto_cfb_decrypt; in crypto_cfb_create()
|
H A D | vmac.c | 622 struct crypto_alg *alg; in vmac_create() local 639 alg = crypto_spawn_cipher_alg(spawn); in vmac_create() 642 if (alg->cra_blocksize != VMAC_NONCEBYTES) in vmac_create() 645 err = crypto_inst_setname(shash_crypto_instance(inst), tmpl->name, alg); in vmac_create() 649 inst->alg.base.cra_priority = alg->cra_priority; in vmac_create() 650 inst->alg.base.cra_blocksize = alg->cra_blocksize; in vmac_create() 651 inst->alg.base.cra_alignmask = alg in vmac_create() [all...] |
/kernel/linux/linux-6.6/drivers/mmc/host/ |
H A D | cqhci-crypto.c | 16 enum cqhci_crypto_alg alg; member 20 .alg = CQHCI_CRYPTO_ALG_AES_XTS, 69 const struct cqhci_crypto_alg_entry *alg = in cqhci_crypto_keyslot_program() local 79 if (ccap_array[i].algorithm_id == alg->alg && in cqhci_crypto_keyslot_program() 80 ccap_array[i].key_size == alg->key_size && in cqhci_crypto_keyslot_program() 148 if (cqhci_crypto_algs[i].alg == cap.algorithm_id && in cqhci_find_blk_crypto_mode()
|
/kernel/linux/linux-6.6/crypto/ |
H A D | cfb.c | 204 struct crypto_alg *alg; in crypto_cfb_create() local 211 alg = skcipher_ialg_simple(inst); in crypto_cfb_create() 214 inst->alg.base.cra_blocksize = 1; in crypto_cfb_create() 220 inst->alg.chunksize = alg->cra_blocksize; in crypto_cfb_create() 222 inst->alg.encrypt = crypto_cfb_encrypt; in crypto_cfb_create() 223 inst->alg.decrypt = crypto_cfb_decrypt; in crypto_cfb_create()
|
H A D | cipher.c | 97 struct crypto_alg *alg = tfm->__crt_alg; in crypto_clone_cipher() local 101 if (alg->cra_init) in crypto_clone_cipher() 104 if (unlikely(!crypto_mod_get(alg))) in crypto_clone_cipher() 107 ntfm = __crypto_alloc_tfmgfp(alg, CRYPTO_ALG_TYPE_CIPHER, in crypto_clone_cipher() 110 crypto_mod_put(alg); in crypto_clone_cipher()
|
H A D | chacha20poly1305.c | 601 if (snprintf(inst->alg.base.cra_name, CRYPTO_MAX_ALG_NAME, in chachapoly_create() 605 if (snprintf(inst->alg.base.cra_driver_name, CRYPTO_MAX_ALG_NAME, in chachapoly_create() 610 inst->alg.base.cra_priority = (chacha->base.cra_priority + in chachapoly_create() 612 inst->alg.base.cra_blocksize = 1; in chachapoly_create() 613 inst->alg.base.cra_alignmask = chacha->base.cra_alignmask | in chachapoly_create() 615 inst->alg.base.cra_ctxsize = sizeof(struct chachapoly_ctx) + in chachapoly_create() 617 inst->alg.ivsize = ivsize; in chachapoly_create() 618 inst->alg.chunksize = crypto_skcipher_alg_chunksize(chacha); in chachapoly_create() 619 inst->alg.maxauthsize = POLY1305_DIGEST_SIZE; in chachapoly_create() 620 inst->alg in chachapoly_create() [all...] |
H A D | rsa-pkcs1pad.c | 632 if (snprintf(inst->alg.base.cra_name, in pkcs1pad_create() 637 if (snprintf(inst->alg.base.cra_driver_name, in pkcs1pad_create() 649 if (snprintf(inst->alg.base.cra_name, CRYPTO_MAX_ALG_NAME, in pkcs1pad_create() 654 if (snprintf(inst->alg.base.cra_driver_name, in pkcs1pad_create() 661 inst->alg.base.cra_priority = rsa_alg->base.cra_priority; in pkcs1pad_create() 662 inst->alg.base.cra_ctxsize = sizeof(struct pkcs1pad_ctx); in pkcs1pad_create() 664 inst->alg.init = pkcs1pad_init_tfm; in pkcs1pad_create() 665 inst->alg.exit = pkcs1pad_exit_tfm; in pkcs1pad_create() 667 inst->alg.encrypt = pkcs1pad_encrypt; in pkcs1pad_create() 668 inst->alg in pkcs1pad_create() [all...] |
H A D | vmac.c | 623 struct crypto_alg *alg; in vmac_create() local 640 alg = crypto_spawn_cipher_alg(spawn); in vmac_create() 643 if (alg->cra_blocksize != VMAC_NONCEBYTES) in vmac_create() 646 err = crypto_inst_setname(shash_crypto_instance(inst), tmpl->name, alg); in vmac_create() 650 inst->alg.base.cra_priority = alg->cra_priority; in vmac_create() 651 inst->alg.base.cra_blocksize = alg->cra_blocksize; in vmac_create() 652 inst->alg.base.cra_alignmask = alg in vmac_create() [all...] |
/third_party/mbedtls/library/ |
H A D | psa_crypto_core.h | 403 * \param[in] alg A signature algorithm that is compatible with 416 * #PSA_SIGN_OUTPUT_SIZE(\c key_type, \c key_bits, \p alg) 428 psa_algorithm_t alg, const uint8_t *input, size_t input_length, 446 * \param[in] alg A signature algorithm that is compatible with 465 psa_algorithm_t alg, const uint8_t *input, size_t input_length, 479 * \param[in] alg A signature algorithm that is compatible with 492 * #PSA_SIGN_OUTPUT_SIZE(\c key_type, \c key_bits, \p alg) 504 psa_algorithm_t alg, const uint8_t *hash, size_t hash_length, 519 * \param[in] alg A signature algorithm that is compatible with 539 psa_algorithm_t alg, cons [all...] |
H A D | psa_crypto_aead.h | 38 * \param alg The AEAD algorithm to compute. 43 * PSA_AEAD_NONCE_LENGTH(key_type, alg) where 61 * PSA_AEAD_ENCRYPT_OUTPUT_SIZE(key_type, alg, 73 * \p alg is not supported. 82 psa_algorithm_t alg, 100 * \param alg The AEAD algorithm to compute. 105 * PSA_AEAD_NONCE_LENGTH(key_type, alg) where 122 * PSA_AEAD_DECRYPT_OUTPUT_SIZE(key_type, alg, 136 * \p alg is not supported. 145 psa_algorithm_t alg, [all...] |
/third_party/mbedtls/scripts/mbedtls_dev/ |
H A D | psa_storage.py | 108 usage: Exprable, alg: Exprable, alg2: Exprable, 117 self.alg = as_expr(alg) #type: Expr 157 self.usage, self.alg, self.alg2) 183 usage=0x00000300, alg=0x05500200, alg2=0x04c01000, 194 usage=0, alg=0, alg2=0, 202 usage=0, alg=0, alg2=0,
|
/third_party/mbedtls/include/psa/ |
H A D | crypto_struct.h | 19 * operation structure contains a `psa_algorithm_t alg` field which indicates 21 * use, `alg` is 0. Most of the structure consists of a union which is 22 * discriminated by `alg`. 31 * Note that when `alg` or `id` is 0, the content of other fields is undefined. 171 psa_algorithm_t MBEDTLS_PRIVATE(alg); 206 psa_algorithm_t MBEDTLS_PRIVATE(alg); 244 psa_algorithm_t MBEDTLS_PRIVATE(alg); 382 psa_algorithm_t alg) in psa_set_key_algorithm() 384 attributes->MBEDTLS_PRIVATE(policy).MBEDTLS_PRIVATE(alg) = alg; in psa_set_key_algorithm() 381 psa_set_key_algorithm(psa_key_attributes_t *attributes, psa_algorithm_t alg) psa_set_key_algorithm() argument [all...] |
H A D | crypto_builtin_composites.h | 47 psa_algorithm_t MBEDTLS_PRIVATE(alg); 58 psa_algorithm_t MBEDTLS_PRIVATE(alg); 80 psa_algorithm_t MBEDTLS_PRIVATE(alg); 118 psa_algorithm_t MBEDTLS_PRIVATE(alg); 192 psa_algorithm_t MBEDTLS_PRIVATE(alg);
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/common/ |
H A D | defs.h | 210 static inline int wpa_auth_alg_fils(int alg) in wpa_auth_alg_fils() argument 212 return !!(alg & (WPA_AUTH_ALG_FILS | WPA_AUTH_ALG_FILS_SK_PFS)); in wpa_auth_alg_fils() 231 static inline int wpa_alg_bip(enum wpa_alg alg) in wpa_alg_bip() argument 233 return alg == WPA_ALG_BIP_CMAC_128 || in wpa_alg_bip() 234 alg == WPA_ALG_BIP_GMAC_128 || in wpa_alg_bip() 235 alg == WPA_ALG_BIP_GMAC_256 || in wpa_alg_bip() 236 alg == WPA_ALG_BIP_CMAC_256; in wpa_alg_bip()
|
/third_party/libwebsockets/minimal-examples/api-tests/api-test-jose/ |
H A D | jws.c | 32 *none_jose = "{\"alg\":\"none\"}", 66 &temp_len) < 0 || !jose.alg) { in test_jws_none() 71 /* confirm we used the "none" alg as expected from JOSE hdr */ in test_jws_none() 72 if (strcmp(jose.alg->alg, "none")) { in test_jws_none() 73 lwsl_err("%s: JOSE header has wrong alg\n", __func__); in test_jws_none() 102 *test1 = "{\"typ\":\"JWT\",\r\n \"alg\":\"HS256\"}", 135 &temp_len) < 0 || !jose.alg) { in test_jws_HS256() 140 /* confirm we used the "none" alg as expected from JOSE hdr */ in test_jws_HS256() 141 if (strcmp(jose.alg in test_jws_HS256() [all...] |
/kernel/linux/linux-5.10/drivers/crypto/ccp/ |
H A D | ccp-crypto-aes.c | 40 struct ccp_crypto_skcipher_alg *alg = ccp_crypto_skcipher_alg(tfm); in ccp_aes_setkey() local 56 ctx->u.aes.mode = alg->mode; in ccp_aes_setkey() 313 struct skcipher_alg *alg; in ccp_register_aes_alg() local 325 alg = &ccp_alg->alg; in ccp_register_aes_alg() 326 *alg = *def->alg_defaults; in ccp_register_aes_alg() 327 snprintf(alg->base.cra_name, CRYPTO_MAX_ALG_NAME, "%s", def->name); in ccp_register_aes_alg() 328 snprintf(alg->base.cra_driver_name, CRYPTO_MAX_ALG_NAME, "%s", in ccp_register_aes_alg() 330 alg->base.cra_blocksize = def->blocksize; in ccp_register_aes_alg() 331 alg in ccp_register_aes_alg() [all...] |
/kernel/linux/linux-6.6/drivers/crypto/ccp/ |
H A D | ccp-crypto-aes.c | 41 struct ccp_crypto_skcipher_alg *alg = ccp_crypto_skcipher_alg(tfm); in ccp_aes_setkey() local 57 ctx->u.aes.mode = alg->mode; in ccp_aes_setkey() 311 struct skcipher_alg *alg; in ccp_register_aes_alg() local 323 alg = &ccp_alg->alg; in ccp_register_aes_alg() 324 *alg = *def->alg_defaults; in ccp_register_aes_alg() 325 snprintf(alg->base.cra_name, CRYPTO_MAX_ALG_NAME, "%s", def->name); in ccp_register_aes_alg() 326 snprintf(alg->base.cra_driver_name, CRYPTO_MAX_ALG_NAME, "%s", in ccp_register_aes_alg() 328 alg->base.cra_blocksize = def->blocksize; in ccp_register_aes_alg() 329 alg in ccp_register_aes_alg() [all...] |
/third_party/node/deps/openssl/openssl/crypto/cms/ |
H A D | cms_ec.c | 73 X509_ALGOR *alg, ASN1_BIT_STRING *pubkey) in ecdh_cms_set_peerkey() 83 X509_ALGOR_get0(&aoid, &atype, &aval, alg); in ecdh_cms_set_peerkey() 161 X509_ALGOR *alg, *kekalg = NULL; in ecdh_cms_set_shared_info() local 170 if (!CMS_RecipientInfo_kari_get0_alg(ri, &alg, &ukm)) in ecdh_cms_set_shared_info() 173 if (!ecdh_cms_set_kdf_param(pctx, OBJ_obj2nid(alg->algorithm))) { in ecdh_cms_set_shared_info() 178 if (alg->parameter->type != V_ASN1_SEQUENCE) in ecdh_cms_set_shared_info() 181 p = alg->parameter->value.sequence->data; in ecdh_cms_set_shared_info() 182 plen = alg->parameter->value.sequence->length; in ecdh_cms_set_shared_info() 228 X509_ALGOR *alg; in ecdh_cms_decrypt() local 231 if (!CMS_RecipientInfo_kari_get0_orig_id(ri, &alg, in ecdh_cms_decrypt() 72 ecdh_cms_set_peerkey(EVP_PKEY_CTX *pctx, X509_ALGOR *alg, ASN1_BIT_STRING *pubkey) ecdh_cms_set_peerkey() argument [all...] |
/third_party/openssl/crypto/cms/ |
H A D | cms_ec.c | 73 X509_ALGOR *alg, ASN1_BIT_STRING *pubkey) in ecdh_cms_set_peerkey() 83 X509_ALGOR_get0(&aoid, &atype, &aval, alg); in ecdh_cms_set_peerkey() 161 X509_ALGOR *alg, *kekalg = NULL; in ecdh_cms_set_shared_info() local 170 if (!CMS_RecipientInfo_kari_get0_alg(ri, &alg, &ukm)) in ecdh_cms_set_shared_info() 173 if (!ecdh_cms_set_kdf_param(pctx, OBJ_obj2nid(alg->algorithm))) { in ecdh_cms_set_shared_info() 178 if (alg->parameter->type != V_ASN1_SEQUENCE) in ecdh_cms_set_shared_info() 181 p = alg->parameter->value.sequence->data; in ecdh_cms_set_shared_info() 182 plen = alg->parameter->value.sequence->length; in ecdh_cms_set_shared_info() 228 X509_ALGOR *alg; in ecdh_cms_decrypt() local 231 if (!CMS_RecipientInfo_kari_get0_orig_id(ri, &alg, in ecdh_cms_decrypt() 72 ecdh_cms_set_peerkey(EVP_PKEY_CTX *pctx, X509_ALGOR *alg, ASN1_BIT_STRING *pubkey) ecdh_cms_set_peerkey() argument [all...] |
/kernel/linux/linux-5.10/include/crypto/internal/ |
H A D | scompress.h | 40 static inline struct scomp_alg *__crypto_scomp_alg(struct crypto_alg *alg) in __crypto_scomp_alg() argument 42 return container_of(alg, struct scomp_alg, base); in __crypto_scomp_alg() 102 * @alg: algorithm definition 106 int crypto_register_scomp(struct scomp_alg *alg); 114 * @alg: algorithm definition 116 void crypto_unregister_scomp(struct scomp_alg *alg);
|
/kernel/linux/linux-6.6/include/crypto/internal/ |
H A D | kpp.h | 17 * to alias with @alg as needed. 18 * @alg: The &struct kpp_alg implementation provided by the instance. 27 struct kpp_alg alg; member 158 * @alg: algorithm definition 162 int crypto_register_kpp(struct kpp_alg *alg); 171 * @alg: algorithm definition 173 void crypto_unregister_kpp(struct kpp_alg *alg); 224 return container_of(spawn->base.alg, struct kpp_alg, base); in crypto_spawn_kpp_alg()
|
H A D | scompress.h | 50 static inline struct scomp_alg *__crypto_scomp_alg(struct crypto_alg *alg) in __crypto_scomp_alg() argument 52 return container_of(alg, struct scomp_alg, base); in __crypto_scomp_alg() 108 * @alg: algorithm definition 112 int crypto_register_scomp(struct scomp_alg *alg); 120 * @alg: algorithm definition 122 void crypto_unregister_scomp(struct scomp_alg *alg);
|
/third_party/libwebsockets/include/libwebsockets/ |
H A D | lws-jose.h | 85 const char *alg; /* the JWA enc alg name, eg "ES512" */ member 125 const struct lws_jose_jwe_alg *alg; member 148 * lws_gencrypto_jws_alg_to_definition() - look up a jws alg name 150 * \param alg: the jws alg name 156 lws_gencrypto_jws_alg_to_definition(const char *alg, 160 * lws_gencrypto_jwe_alg_to_definition() - look up a jwe alg name 162 * \param alg: the jwe alg nam [all...] |