Home
last modified time | relevance | path

Searched refs:alg (Results 276 - 300 of 1227) sorted by relevance

1...<<11121314151617181920>>...50

/third_party/mbedtls/include/psa/
H A Dcrypto_builtin_composites.h47 psa_algorithm_t MBEDTLS_PRIVATE(alg);
58 psa_algorithm_t MBEDTLS_PRIVATE(alg);
80 psa_algorithm_t MBEDTLS_PRIVATE(alg);
118 psa_algorithm_t MBEDTLS_PRIVATE(alg);
192 psa_algorithm_t MBEDTLS_PRIVATE(alg);
/kernel/linux/linux-6.6/crypto/
H A Dchacha20poly1305.c601 if (snprintf(inst->alg.base.cra_name, CRYPTO_MAX_ALG_NAME, in chachapoly_create()
605 if (snprintf(inst->alg.base.cra_driver_name, CRYPTO_MAX_ALG_NAME, in chachapoly_create()
610 inst->alg.base.cra_priority = (chacha->base.cra_priority + in chachapoly_create()
612 inst->alg.base.cra_blocksize = 1; in chachapoly_create()
613 inst->alg.base.cra_alignmask = chacha->base.cra_alignmask | in chachapoly_create()
615 inst->alg.base.cra_ctxsize = sizeof(struct chachapoly_ctx) + in chachapoly_create()
617 inst->alg.ivsize = ivsize; in chachapoly_create()
618 inst->alg.chunksize = crypto_skcipher_alg_chunksize(chacha); in chachapoly_create()
619 inst->alg.maxauthsize = POLY1305_DIGEST_SIZE; in chachapoly_create()
620 inst->alg in chachapoly_create()
[all...]
H A Drsa-pkcs1pad.c632 if (snprintf(inst->alg.base.cra_name, in pkcs1pad_create()
637 if (snprintf(inst->alg.base.cra_driver_name, in pkcs1pad_create()
649 if (snprintf(inst->alg.base.cra_name, CRYPTO_MAX_ALG_NAME, in pkcs1pad_create()
654 if (snprintf(inst->alg.base.cra_driver_name, in pkcs1pad_create()
661 inst->alg.base.cra_priority = rsa_alg->base.cra_priority; in pkcs1pad_create()
662 inst->alg.base.cra_ctxsize = sizeof(struct pkcs1pad_ctx); in pkcs1pad_create()
664 inst->alg.init = pkcs1pad_init_tfm; in pkcs1pad_create()
665 inst->alg.exit = pkcs1pad_exit_tfm; in pkcs1pad_create()
667 inst->alg.encrypt = pkcs1pad_encrypt; in pkcs1pad_create()
668 inst->alg in pkcs1pad_create()
[all...]
H A Dvmac.c623 struct crypto_alg *alg; in vmac_create() local
640 alg = crypto_spawn_cipher_alg(spawn); in vmac_create()
643 if (alg->cra_blocksize != VMAC_NONCEBYTES) in vmac_create()
646 err = crypto_inst_setname(shash_crypto_instance(inst), tmpl->name, alg); in vmac_create()
650 inst->alg.base.cra_priority = alg->cra_priority; in vmac_create()
651 inst->alg.base.cra_blocksize = alg->cra_blocksize; in vmac_create()
652 inst->alg.base.cra_alignmask = alg in vmac_create()
[all...]
H A Dadiantum.c551 if (snprintf(inst->alg.base.cra_name, CRYPTO_MAX_ALG_NAME, in adiantum_create()
555 if (snprintf(inst->alg.base.cra_driver_name, CRYPTO_MAX_ALG_NAME, in adiantum_create()
562 inst->alg.base.cra_blocksize = BLOCKCIPHER_BLOCK_SIZE; in adiantum_create()
563 inst->alg.base.cra_ctxsize = sizeof(struct adiantum_tfm_ctx); in adiantum_create()
564 inst->alg.base.cra_alignmask = streamcipher_alg->base.cra_alignmask | in adiantum_create()
572 inst->alg.base.cra_priority = (4 * streamcipher_alg->base.cra_priority + in adiantum_create()
576 inst->alg.setkey = adiantum_setkey; in adiantum_create()
577 inst->alg.encrypt = adiantum_encrypt; in adiantum_create()
578 inst->alg.decrypt = adiantum_decrypt; in adiantum_create()
579 inst->alg in adiantum_create()
[all...]
/third_party/libwebsockets/minimal-examples/api-tests/api-test-jose/
H A Djws.c32 *none_jose = "{\"alg\":\"none\"}",
66 &temp_len) < 0 || !jose.alg) { in test_jws_none()
71 /* confirm we used the "none" alg as expected from JOSE hdr */ in test_jws_none()
72 if (strcmp(jose.alg->alg, "none")) { in test_jws_none()
73 lwsl_err("%s: JOSE header has wrong alg\n", __func__); in test_jws_none()
102 *test1 = "{\"typ\":\"JWT\",\r\n \"alg\":\"HS256\"}",
135 &temp_len) < 0 || !jose.alg) { in test_jws_HS256()
140 /* confirm we used the "none" alg as expected from JOSE hdr */ in test_jws_HS256()
141 if (strcmp(jose.alg in test_jws_HS256()
[all...]
/kernel/linux/linux-5.10/drivers/crypto/ccp/
H A Dccp-crypto-aes.c40 struct ccp_crypto_skcipher_alg *alg = ccp_crypto_skcipher_alg(tfm); in ccp_aes_setkey() local
56 ctx->u.aes.mode = alg->mode; in ccp_aes_setkey()
313 struct skcipher_alg *alg; in ccp_register_aes_alg() local
325 alg = &ccp_alg->alg; in ccp_register_aes_alg()
326 *alg = *def->alg_defaults; in ccp_register_aes_alg()
327 snprintf(alg->base.cra_name, CRYPTO_MAX_ALG_NAME, "%s", def->name); in ccp_register_aes_alg()
328 snprintf(alg->base.cra_driver_name, CRYPTO_MAX_ALG_NAME, "%s", in ccp_register_aes_alg()
330 alg->base.cra_blocksize = def->blocksize; in ccp_register_aes_alg()
331 alg in ccp_register_aes_alg()
[all...]
/kernel/linux/linux-6.6/drivers/crypto/ccp/
H A Dccp-crypto-aes.c41 struct ccp_crypto_skcipher_alg *alg = ccp_crypto_skcipher_alg(tfm); in ccp_aes_setkey() local
57 ctx->u.aes.mode = alg->mode; in ccp_aes_setkey()
311 struct skcipher_alg *alg; in ccp_register_aes_alg() local
323 alg = &ccp_alg->alg; in ccp_register_aes_alg()
324 *alg = *def->alg_defaults; in ccp_register_aes_alg()
325 snprintf(alg->base.cra_name, CRYPTO_MAX_ALG_NAME, "%s", def->name); in ccp_register_aes_alg()
326 snprintf(alg->base.cra_driver_name, CRYPTO_MAX_ALG_NAME, "%s", in ccp_register_aes_alg()
328 alg->base.cra_blocksize = def->blocksize; in ccp_register_aes_alg()
329 alg in ccp_register_aes_alg()
[all...]
/third_party/node/deps/openssl/openssl/crypto/cms/
H A Dcms_ec.c73 X509_ALGOR *alg, ASN1_BIT_STRING *pubkey) in ecdh_cms_set_peerkey()
83 X509_ALGOR_get0(&aoid, &atype, &aval, alg); in ecdh_cms_set_peerkey()
161 X509_ALGOR *alg, *kekalg = NULL; in ecdh_cms_set_shared_info() local
170 if (!CMS_RecipientInfo_kari_get0_alg(ri, &alg, &ukm)) in ecdh_cms_set_shared_info()
173 if (!ecdh_cms_set_kdf_param(pctx, OBJ_obj2nid(alg->algorithm))) { in ecdh_cms_set_shared_info()
178 if (alg->parameter->type != V_ASN1_SEQUENCE) in ecdh_cms_set_shared_info()
181 p = alg->parameter->value.sequence->data; in ecdh_cms_set_shared_info()
182 plen = alg->parameter->value.sequence->length; in ecdh_cms_set_shared_info()
228 X509_ALGOR *alg; in ecdh_cms_decrypt() local
231 if (!CMS_RecipientInfo_kari_get0_orig_id(ri, &alg, in ecdh_cms_decrypt()
72 ecdh_cms_set_peerkey(EVP_PKEY_CTX *pctx, X509_ALGOR *alg, ASN1_BIT_STRING *pubkey) ecdh_cms_set_peerkey() argument
[all...]
/third_party/openssl/crypto/cms/
H A Dcms_ec.c73 X509_ALGOR *alg, ASN1_BIT_STRING *pubkey) in ecdh_cms_set_peerkey()
83 X509_ALGOR_get0(&aoid, &atype, &aval, alg); in ecdh_cms_set_peerkey()
161 X509_ALGOR *alg, *kekalg = NULL; in ecdh_cms_set_shared_info() local
170 if (!CMS_RecipientInfo_kari_get0_alg(ri, &alg, &ukm)) in ecdh_cms_set_shared_info()
173 if (!ecdh_cms_set_kdf_param(pctx, OBJ_obj2nid(alg->algorithm))) { in ecdh_cms_set_shared_info()
178 if (alg->parameter->type != V_ASN1_SEQUENCE) in ecdh_cms_set_shared_info()
181 p = alg->parameter->value.sequence->data; in ecdh_cms_set_shared_info()
182 plen = alg->parameter->value.sequence->length; in ecdh_cms_set_shared_info()
228 X509_ALGOR *alg; in ecdh_cms_decrypt() local
231 if (!CMS_RecipientInfo_kari_get0_orig_id(ri, &alg, in ecdh_cms_decrypt()
72 ecdh_cms_set_peerkey(EVP_PKEY_CTX *pctx, X509_ALGOR *alg, ASN1_BIT_STRING *pubkey) ecdh_cms_set_peerkey() argument
[all...]
/kernel/linux/linux-5.10/include/crypto/internal/
H A Dscompress.h40 static inline struct scomp_alg *__crypto_scomp_alg(struct crypto_alg *alg) in __crypto_scomp_alg() argument
42 return container_of(alg, struct scomp_alg, base); in __crypto_scomp_alg()
102 * @alg: algorithm definition
106 int crypto_register_scomp(struct scomp_alg *alg);
114 * @alg: algorithm definition
116 void crypto_unregister_scomp(struct scomp_alg *alg);
/kernel/linux/linux-6.6/include/crypto/internal/
H A Dkpp.h17 * to alias with @alg as needed.
18 * @alg: The &struct kpp_alg implementation provided by the instance.
27 struct kpp_alg alg; member
158 * @alg: algorithm definition
162 int crypto_register_kpp(struct kpp_alg *alg);
171 * @alg: algorithm definition
173 void crypto_unregister_kpp(struct kpp_alg *alg);
224 return container_of(spawn->base.alg, struct kpp_alg, base); in crypto_spawn_kpp_alg()
H A Dscompress.h50 static inline struct scomp_alg *__crypto_scomp_alg(struct crypto_alg *alg) in __crypto_scomp_alg() argument
52 return container_of(alg, struct scomp_alg, base); in __crypto_scomp_alg()
108 * @alg: algorithm definition
112 int crypto_register_scomp(struct scomp_alg *alg);
120 * @alg: algorithm definition
122 void crypto_unregister_scomp(struct scomp_alg *alg);
/third_party/libwebsockets/include/libwebsockets/
H A Dlws-jose.h85 const char *alg; /* the JWA enc alg name, eg "ES512" */ member
125 const struct lws_jose_jwe_alg *alg; member
148 * lws_gencrypto_jws_alg_to_definition() - look up a jws alg name
150 * \param alg: the jws alg name
156 lws_gencrypto_jws_alg_to_definition(const char *alg,
160 * lws_gencrypto_jwe_alg_to_definition() - look up a jwe alg name
162 * \param alg: the jwe alg nam
[all...]
/third_party/mbedtls/library/
H A Dpsa_crypto_aead.h38 * \param alg The AEAD algorithm to compute.
43 * PSA_AEAD_NONCE_LENGTH(key_type, alg) where
61 * PSA_AEAD_ENCRYPT_OUTPUT_SIZE(key_type, alg,
73 * \p alg is not supported.
82 psa_algorithm_t alg,
100 * \param alg The AEAD algorithm to compute.
105 * PSA_AEAD_NONCE_LENGTH(key_type, alg) where
122 * PSA_AEAD_DECRYPT_OUTPUT_SIZE(key_type, alg,
136 * \p alg is not supported.
145 psa_algorithm_t alg,
[all...]
H A Dpsa_crypto_rsa.h150 * \param[in] alg A signature algorithm that is compatible with
164 * \p alg) where \c key_bits is the bit-size of the RSA key.
174 psa_algorithm_t alg, const uint8_t *hash, size_t hash_length,
190 * \param[in] alg A signature algorithm that is compatible with
210 psa_algorithm_t alg, const uint8_t *hash, size_t hash_length,
242 * #PSA_ASYMMETRIC_ENCRYPT_OUTPUT_SIZE(\c key_type, \c key_bits, \p alg)
260 psa_algorithm_t alg,
299 * #PSA_ASYMMETRIC_DECRYPT_OUTPUT_SIZE(\c key_type, \c key_bits, \p alg)
318 psa_algorithm_t alg,
/third_party/mbedtls/programs/psa/
H A Dhmac_demo.c108 const psa_algorithm_t alg = PSA_ALG_HMAC(PSA_ALG_SHA_256); in hmac_demo() local
110 /* PSA_MAC_LENGTH(PSA_KEY_TYPE_HMAC, 8 * sizeof( key_bytes ), alg) in hmac_demo()
118 psa_set_key_algorithm(&attributes, alg); in hmac_demo()
133 PSA_CHECK(psa_mac_sign_setup(&op, key, alg)); in hmac_demo()
140 PSA_CHECK(psa_mac_sign_setup(&op, key, alg)); in hmac_demo()
/third_party/mbedtls/tests/include/test/drivers/
H A Dasymmetric_encryption.h56 size_t key_buffer_size, psa_algorithm_t alg, const uint8_t *input,
62 size_t key_length, psa_algorithm_t alg, const uint8_t *input,
68 size_t key_buffer_size, psa_algorithm_t alg, const uint8_t *input,
74 size_t key_length, psa_algorithm_t alg, const uint8_t *input,
/kernel/linux/linux-5.10/crypto/
H A Dvmac.c622 struct crypto_alg *alg; in vmac_create() local
639 alg = crypto_spawn_cipher_alg(spawn); in vmac_create()
642 if (alg->cra_blocksize != VMAC_NONCEBYTES) in vmac_create()
645 err = crypto_inst_setname(shash_crypto_instance(inst), tmpl->name, alg); in vmac_create()
649 inst->alg.base.cra_priority = alg->cra_priority; in vmac_create()
650 inst->alg.base.cra_blocksize = alg->cra_blocksize; in vmac_create()
651 inst->alg.base.cra_alignmask = alg in vmac_create()
[all...]
H A Dadiantum.c551 if (snprintf(inst->alg.base.cra_name, CRYPTO_MAX_ALG_NAME, in adiantum_create()
555 if (snprintf(inst->alg.base.cra_driver_name, CRYPTO_MAX_ALG_NAME, in adiantum_create()
562 inst->alg.base.cra_blocksize = BLOCKCIPHER_BLOCK_SIZE; in adiantum_create()
563 inst->alg.base.cra_ctxsize = sizeof(struct adiantum_tfm_ctx); in adiantum_create()
564 inst->alg.base.cra_alignmask = streamcipher_alg->base.cra_alignmask | in adiantum_create()
572 inst->alg.base.cra_priority = (4 * streamcipher_alg->base.cra_priority + in adiantum_create()
576 inst->alg.setkey = adiantum_setkey; in adiantum_create()
577 inst->alg.encrypt = adiantum_encrypt; in adiantum_create()
578 inst->alg.decrypt = adiantum_decrypt; in adiantum_create()
579 inst->alg in adiantum_create()
[all...]
/kernel/linux/linux-5.10/tools/testing/selftests/net/
H A Dipsec.c843 struct xfrm_algo alg; in xfrm_state_pack_algo() member
848 } alg = {}; in xfrm_state_pack_algo() local
864 strncpy(alg.u.alg.alg_name, desc->a_algo, ALGO_LEN - 1); in xfrm_state_pack_algo()
865 if (xfrm_fill_key(desc->a_algo, alg.u.alg.alg_key, in xfrm_state_pack_algo()
866 sizeof(alg.buf), &alg.u.alg.alg_key_len)) in xfrm_state_pack_algo()
875 strncpy(alg in xfrm_state_pack_algo()
[all...]
/kernel/linux/linux-5.10/drivers/crypto/qce/
H A Dcipher.h51 struct skcipher_alg *alg = crypto_skcipher_alg(tfm); in to_cipher_tmpl() local
52 return container_of(alg, struct qce_alg_template, alg.skcipher); in to_cipher_tmpl()
/kernel/linux/linux-6.6/drivers/crypto/qce/
H A Dcipher.h50 struct skcipher_alg *alg = crypto_skcipher_alg(tfm); in to_cipher_tmpl() local
51 return container_of(alg, struct qce_alg_template, alg.skcipher); in to_cipher_tmpl()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/
H A Dikev2_common.c56 int ikev2_integ_hash(int alg, const u8 *key, size_t key_len, const u8 *data, in ikev2_integ_hash() argument
61 switch (alg) { in ikev2_integ_hash()
97 int ikev2_prf_hash(int alg, const u8 *key, size_t key_len, in ikev2_prf_hash() argument
101 switch (alg) { in ikev2_prf_hash()
113 int ikev2_prf_plus(int alg, const u8 *key, size_t key_len, in ikev2_prf_plus() argument
125 prf = ikev2_get_prf(alg); in ikev2_prf_plus()
143 res = ikev2_prf_hash(alg, key, key_len, 2, &addr[1], in ikev2_prf_plus()
146 res = ikev2_prf_hash(alg, key, key_len, 3, addr, len, in ikev2_prf_plus()
175 int ikev2_encr_encrypt(int alg, const u8 *key, size_t key_len, const u8 *iv, in ikev2_encr_encrypt() argument
181 switch (alg) { in ikev2_encr_encrypt()
210 ikev2_encr_decrypt(int alg, const u8 *key, size_t key_len, const u8 *iv, const u8 *crypt, u8 *plain, size_t len) ikev2_encr_decrypt() argument
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/
H A Dpkcs5.c25 } alg; member
48 static int pkcs5_is_oid(struct asn1_oid *oid, unsigned long alg) in pkcs5_is_oid() argument
54 oid->oid[6] == alg; in pkcs5_is_oid()
58 static int enc_alg_is_oid(struct asn1_oid *oid, unsigned long alg) in enc_alg_is_oid() argument
63 oid->oid[5] == alg; in enc_alg_is_oid()
67 static int pkcs12_is_pbe_oid(struct asn1_oid *oid, unsigned long alg) in pkcs12_is_pbe_oid() argument
74 oid->oid[7] == alg; in pkcs12_is_pbe_oid()
299 params->alg = pkcs5_get_alg(&oid); in pkcs5_get_params()
300 if (params->alg == PKCS5_ALG_UNKNOWN) { in pkcs5_get_params()
306 if (params->alg in pkcs5_get_params()
[all...]

Completed in 16 milliseconds

1...<<11121314151617181920>>...50