/third_party/mbedtls/include/psa/ |
H A D | crypto_builtin_composites.h | 47 psa_algorithm_t MBEDTLS_PRIVATE(alg); 58 psa_algorithm_t MBEDTLS_PRIVATE(alg); 80 psa_algorithm_t MBEDTLS_PRIVATE(alg); 118 psa_algorithm_t MBEDTLS_PRIVATE(alg); 192 psa_algorithm_t MBEDTLS_PRIVATE(alg);
|
/kernel/linux/linux-6.6/crypto/ |
H A D | chacha20poly1305.c | 601 if (snprintf(inst->alg.base.cra_name, CRYPTO_MAX_ALG_NAME, in chachapoly_create() 605 if (snprintf(inst->alg.base.cra_driver_name, CRYPTO_MAX_ALG_NAME, in chachapoly_create() 610 inst->alg.base.cra_priority = (chacha->base.cra_priority + in chachapoly_create() 612 inst->alg.base.cra_blocksize = 1; in chachapoly_create() 613 inst->alg.base.cra_alignmask = chacha->base.cra_alignmask | in chachapoly_create() 615 inst->alg.base.cra_ctxsize = sizeof(struct chachapoly_ctx) + in chachapoly_create() 617 inst->alg.ivsize = ivsize; in chachapoly_create() 618 inst->alg.chunksize = crypto_skcipher_alg_chunksize(chacha); in chachapoly_create() 619 inst->alg.maxauthsize = POLY1305_DIGEST_SIZE; in chachapoly_create() 620 inst->alg in chachapoly_create() [all...] |
H A D | rsa-pkcs1pad.c | 632 if (snprintf(inst->alg.base.cra_name, in pkcs1pad_create() 637 if (snprintf(inst->alg.base.cra_driver_name, in pkcs1pad_create() 649 if (snprintf(inst->alg.base.cra_name, CRYPTO_MAX_ALG_NAME, in pkcs1pad_create() 654 if (snprintf(inst->alg.base.cra_driver_name, in pkcs1pad_create() 661 inst->alg.base.cra_priority = rsa_alg->base.cra_priority; in pkcs1pad_create() 662 inst->alg.base.cra_ctxsize = sizeof(struct pkcs1pad_ctx); in pkcs1pad_create() 664 inst->alg.init = pkcs1pad_init_tfm; in pkcs1pad_create() 665 inst->alg.exit = pkcs1pad_exit_tfm; in pkcs1pad_create() 667 inst->alg.encrypt = pkcs1pad_encrypt; in pkcs1pad_create() 668 inst->alg in pkcs1pad_create() [all...] |
H A D | vmac.c | 623 struct crypto_alg *alg; in vmac_create() local 640 alg = crypto_spawn_cipher_alg(spawn); in vmac_create() 643 if (alg->cra_blocksize != VMAC_NONCEBYTES) in vmac_create() 646 err = crypto_inst_setname(shash_crypto_instance(inst), tmpl->name, alg); in vmac_create() 650 inst->alg.base.cra_priority = alg->cra_priority; in vmac_create() 651 inst->alg.base.cra_blocksize = alg->cra_blocksize; in vmac_create() 652 inst->alg.base.cra_alignmask = alg in vmac_create() [all...] |
H A D | adiantum.c | 551 if (snprintf(inst->alg.base.cra_name, CRYPTO_MAX_ALG_NAME, in adiantum_create() 555 if (snprintf(inst->alg.base.cra_driver_name, CRYPTO_MAX_ALG_NAME, in adiantum_create() 562 inst->alg.base.cra_blocksize = BLOCKCIPHER_BLOCK_SIZE; in adiantum_create() 563 inst->alg.base.cra_ctxsize = sizeof(struct adiantum_tfm_ctx); in adiantum_create() 564 inst->alg.base.cra_alignmask = streamcipher_alg->base.cra_alignmask | in adiantum_create() 572 inst->alg.base.cra_priority = (4 * streamcipher_alg->base.cra_priority + in adiantum_create() 576 inst->alg.setkey = adiantum_setkey; in adiantum_create() 577 inst->alg.encrypt = adiantum_encrypt; in adiantum_create() 578 inst->alg.decrypt = adiantum_decrypt; in adiantum_create() 579 inst->alg in adiantum_create() [all...] |
/third_party/libwebsockets/minimal-examples/api-tests/api-test-jose/ |
H A D | jws.c | 32 *none_jose = "{\"alg\":\"none\"}", 66 &temp_len) < 0 || !jose.alg) { in test_jws_none() 71 /* confirm we used the "none" alg as expected from JOSE hdr */ in test_jws_none() 72 if (strcmp(jose.alg->alg, "none")) { in test_jws_none() 73 lwsl_err("%s: JOSE header has wrong alg\n", __func__); in test_jws_none() 102 *test1 = "{\"typ\":\"JWT\",\r\n \"alg\":\"HS256\"}", 135 &temp_len) < 0 || !jose.alg) { in test_jws_HS256() 140 /* confirm we used the "none" alg as expected from JOSE hdr */ in test_jws_HS256() 141 if (strcmp(jose.alg in test_jws_HS256() [all...] |
/kernel/linux/linux-5.10/drivers/crypto/ccp/ |
H A D | ccp-crypto-aes.c | 40 struct ccp_crypto_skcipher_alg *alg = ccp_crypto_skcipher_alg(tfm); in ccp_aes_setkey() local 56 ctx->u.aes.mode = alg->mode; in ccp_aes_setkey() 313 struct skcipher_alg *alg; in ccp_register_aes_alg() local 325 alg = &ccp_alg->alg; in ccp_register_aes_alg() 326 *alg = *def->alg_defaults; in ccp_register_aes_alg() 327 snprintf(alg->base.cra_name, CRYPTO_MAX_ALG_NAME, "%s", def->name); in ccp_register_aes_alg() 328 snprintf(alg->base.cra_driver_name, CRYPTO_MAX_ALG_NAME, "%s", in ccp_register_aes_alg() 330 alg->base.cra_blocksize = def->blocksize; in ccp_register_aes_alg() 331 alg in ccp_register_aes_alg() [all...] |
/kernel/linux/linux-6.6/drivers/crypto/ccp/ |
H A D | ccp-crypto-aes.c | 41 struct ccp_crypto_skcipher_alg *alg = ccp_crypto_skcipher_alg(tfm); in ccp_aes_setkey() local 57 ctx->u.aes.mode = alg->mode; in ccp_aes_setkey() 311 struct skcipher_alg *alg; in ccp_register_aes_alg() local 323 alg = &ccp_alg->alg; in ccp_register_aes_alg() 324 *alg = *def->alg_defaults; in ccp_register_aes_alg() 325 snprintf(alg->base.cra_name, CRYPTO_MAX_ALG_NAME, "%s", def->name); in ccp_register_aes_alg() 326 snprintf(alg->base.cra_driver_name, CRYPTO_MAX_ALG_NAME, "%s", in ccp_register_aes_alg() 328 alg->base.cra_blocksize = def->blocksize; in ccp_register_aes_alg() 329 alg in ccp_register_aes_alg() [all...] |
/third_party/node/deps/openssl/openssl/crypto/cms/ |
H A D | cms_ec.c | 73 X509_ALGOR *alg, ASN1_BIT_STRING *pubkey) in ecdh_cms_set_peerkey() 83 X509_ALGOR_get0(&aoid, &atype, &aval, alg); in ecdh_cms_set_peerkey() 161 X509_ALGOR *alg, *kekalg = NULL; in ecdh_cms_set_shared_info() local 170 if (!CMS_RecipientInfo_kari_get0_alg(ri, &alg, &ukm)) in ecdh_cms_set_shared_info() 173 if (!ecdh_cms_set_kdf_param(pctx, OBJ_obj2nid(alg->algorithm))) { in ecdh_cms_set_shared_info() 178 if (alg->parameter->type != V_ASN1_SEQUENCE) in ecdh_cms_set_shared_info() 181 p = alg->parameter->value.sequence->data; in ecdh_cms_set_shared_info() 182 plen = alg->parameter->value.sequence->length; in ecdh_cms_set_shared_info() 228 X509_ALGOR *alg; in ecdh_cms_decrypt() local 231 if (!CMS_RecipientInfo_kari_get0_orig_id(ri, &alg, in ecdh_cms_decrypt() 72 ecdh_cms_set_peerkey(EVP_PKEY_CTX *pctx, X509_ALGOR *alg, ASN1_BIT_STRING *pubkey) ecdh_cms_set_peerkey() argument [all...] |
/third_party/openssl/crypto/cms/ |
H A D | cms_ec.c | 73 X509_ALGOR *alg, ASN1_BIT_STRING *pubkey) in ecdh_cms_set_peerkey() 83 X509_ALGOR_get0(&aoid, &atype, &aval, alg); in ecdh_cms_set_peerkey() 161 X509_ALGOR *alg, *kekalg = NULL; in ecdh_cms_set_shared_info() local 170 if (!CMS_RecipientInfo_kari_get0_alg(ri, &alg, &ukm)) in ecdh_cms_set_shared_info() 173 if (!ecdh_cms_set_kdf_param(pctx, OBJ_obj2nid(alg->algorithm))) { in ecdh_cms_set_shared_info() 178 if (alg->parameter->type != V_ASN1_SEQUENCE) in ecdh_cms_set_shared_info() 181 p = alg->parameter->value.sequence->data; in ecdh_cms_set_shared_info() 182 plen = alg->parameter->value.sequence->length; in ecdh_cms_set_shared_info() 228 X509_ALGOR *alg; in ecdh_cms_decrypt() local 231 if (!CMS_RecipientInfo_kari_get0_orig_id(ri, &alg, in ecdh_cms_decrypt() 72 ecdh_cms_set_peerkey(EVP_PKEY_CTX *pctx, X509_ALGOR *alg, ASN1_BIT_STRING *pubkey) ecdh_cms_set_peerkey() argument [all...] |
/kernel/linux/linux-5.10/include/crypto/internal/ |
H A D | scompress.h | 40 static inline struct scomp_alg *__crypto_scomp_alg(struct crypto_alg *alg) in __crypto_scomp_alg() argument 42 return container_of(alg, struct scomp_alg, base); in __crypto_scomp_alg() 102 * @alg: algorithm definition 106 int crypto_register_scomp(struct scomp_alg *alg); 114 * @alg: algorithm definition 116 void crypto_unregister_scomp(struct scomp_alg *alg);
|
/kernel/linux/linux-6.6/include/crypto/internal/ |
H A D | kpp.h | 17 * to alias with @alg as needed. 18 * @alg: The &struct kpp_alg implementation provided by the instance. 27 struct kpp_alg alg; member 158 * @alg: algorithm definition 162 int crypto_register_kpp(struct kpp_alg *alg); 171 * @alg: algorithm definition 173 void crypto_unregister_kpp(struct kpp_alg *alg); 224 return container_of(spawn->base.alg, struct kpp_alg, base); in crypto_spawn_kpp_alg()
|
H A D | scompress.h | 50 static inline struct scomp_alg *__crypto_scomp_alg(struct crypto_alg *alg) in __crypto_scomp_alg() argument 52 return container_of(alg, struct scomp_alg, base); in __crypto_scomp_alg() 108 * @alg: algorithm definition 112 int crypto_register_scomp(struct scomp_alg *alg); 120 * @alg: algorithm definition 122 void crypto_unregister_scomp(struct scomp_alg *alg);
|
/third_party/libwebsockets/include/libwebsockets/ |
H A D | lws-jose.h | 85 const char *alg; /* the JWA enc alg name, eg "ES512" */ member 125 const struct lws_jose_jwe_alg *alg; member 148 * lws_gencrypto_jws_alg_to_definition() - look up a jws alg name 150 * \param alg: the jws alg name 156 lws_gencrypto_jws_alg_to_definition(const char *alg, 160 * lws_gencrypto_jwe_alg_to_definition() - look up a jwe alg name 162 * \param alg: the jwe alg nam [all...] |
/third_party/mbedtls/library/ |
H A D | psa_crypto_aead.h | 38 * \param alg The AEAD algorithm to compute. 43 * PSA_AEAD_NONCE_LENGTH(key_type, alg) where 61 * PSA_AEAD_ENCRYPT_OUTPUT_SIZE(key_type, alg, 73 * \p alg is not supported. 82 psa_algorithm_t alg, 100 * \param alg The AEAD algorithm to compute. 105 * PSA_AEAD_NONCE_LENGTH(key_type, alg) where 122 * PSA_AEAD_DECRYPT_OUTPUT_SIZE(key_type, alg, 136 * \p alg is not supported. 145 psa_algorithm_t alg, [all...] |
H A D | psa_crypto_rsa.h | 150 * \param[in] alg A signature algorithm that is compatible with 164 * \p alg) where \c key_bits is the bit-size of the RSA key. 174 psa_algorithm_t alg, const uint8_t *hash, size_t hash_length, 190 * \param[in] alg A signature algorithm that is compatible with 210 psa_algorithm_t alg, const uint8_t *hash, size_t hash_length, 242 * #PSA_ASYMMETRIC_ENCRYPT_OUTPUT_SIZE(\c key_type, \c key_bits, \p alg) 260 psa_algorithm_t alg, 299 * #PSA_ASYMMETRIC_DECRYPT_OUTPUT_SIZE(\c key_type, \c key_bits, \p alg) 318 psa_algorithm_t alg,
|
/third_party/mbedtls/programs/psa/ |
H A D | hmac_demo.c | 108 const psa_algorithm_t alg = PSA_ALG_HMAC(PSA_ALG_SHA_256); in hmac_demo() local 110 /* PSA_MAC_LENGTH(PSA_KEY_TYPE_HMAC, 8 * sizeof( key_bytes ), alg) in hmac_demo() 118 psa_set_key_algorithm(&attributes, alg); in hmac_demo() 133 PSA_CHECK(psa_mac_sign_setup(&op, key, alg)); in hmac_demo() 140 PSA_CHECK(psa_mac_sign_setup(&op, key, alg)); in hmac_demo()
|
/third_party/mbedtls/tests/include/test/drivers/ |
H A D | asymmetric_encryption.h | 56 size_t key_buffer_size, psa_algorithm_t alg, const uint8_t *input, 62 size_t key_length, psa_algorithm_t alg, const uint8_t *input, 68 size_t key_buffer_size, psa_algorithm_t alg, const uint8_t *input, 74 size_t key_length, psa_algorithm_t alg, const uint8_t *input,
|
/kernel/linux/linux-5.10/crypto/ |
H A D | vmac.c | 622 struct crypto_alg *alg; in vmac_create() local 639 alg = crypto_spawn_cipher_alg(spawn); in vmac_create() 642 if (alg->cra_blocksize != VMAC_NONCEBYTES) in vmac_create() 645 err = crypto_inst_setname(shash_crypto_instance(inst), tmpl->name, alg); in vmac_create() 649 inst->alg.base.cra_priority = alg->cra_priority; in vmac_create() 650 inst->alg.base.cra_blocksize = alg->cra_blocksize; in vmac_create() 651 inst->alg.base.cra_alignmask = alg in vmac_create() [all...] |
H A D | adiantum.c | 551 if (snprintf(inst->alg.base.cra_name, CRYPTO_MAX_ALG_NAME, in adiantum_create() 555 if (snprintf(inst->alg.base.cra_driver_name, CRYPTO_MAX_ALG_NAME, in adiantum_create() 562 inst->alg.base.cra_blocksize = BLOCKCIPHER_BLOCK_SIZE; in adiantum_create() 563 inst->alg.base.cra_ctxsize = sizeof(struct adiantum_tfm_ctx); in adiantum_create() 564 inst->alg.base.cra_alignmask = streamcipher_alg->base.cra_alignmask | in adiantum_create() 572 inst->alg.base.cra_priority = (4 * streamcipher_alg->base.cra_priority + in adiantum_create() 576 inst->alg.setkey = adiantum_setkey; in adiantum_create() 577 inst->alg.encrypt = adiantum_encrypt; in adiantum_create() 578 inst->alg.decrypt = adiantum_decrypt; in adiantum_create() 579 inst->alg in adiantum_create() [all...] |
/kernel/linux/linux-5.10/tools/testing/selftests/net/ |
H A D | ipsec.c | 843 struct xfrm_algo alg; in xfrm_state_pack_algo() member 848 } alg = {}; in xfrm_state_pack_algo() local 864 strncpy(alg.u.alg.alg_name, desc->a_algo, ALGO_LEN - 1); in xfrm_state_pack_algo() 865 if (xfrm_fill_key(desc->a_algo, alg.u.alg.alg_key, in xfrm_state_pack_algo() 866 sizeof(alg.buf), &alg.u.alg.alg_key_len)) in xfrm_state_pack_algo() 875 strncpy(alg in xfrm_state_pack_algo() [all...] |
/kernel/linux/linux-5.10/drivers/crypto/qce/ |
H A D | cipher.h | 51 struct skcipher_alg *alg = crypto_skcipher_alg(tfm); in to_cipher_tmpl() local 52 return container_of(alg, struct qce_alg_template, alg.skcipher); in to_cipher_tmpl()
|
/kernel/linux/linux-6.6/drivers/crypto/qce/ |
H A D | cipher.h | 50 struct skcipher_alg *alg = crypto_skcipher_alg(tfm); in to_cipher_tmpl() local 51 return container_of(alg, struct qce_alg_template, alg.skcipher); in to_cipher_tmpl()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/ |
H A D | ikev2_common.c | 56 int ikev2_integ_hash(int alg, const u8 *key, size_t key_len, const u8 *data, in ikev2_integ_hash() argument 61 switch (alg) { in ikev2_integ_hash() 97 int ikev2_prf_hash(int alg, const u8 *key, size_t key_len, in ikev2_prf_hash() argument 101 switch (alg) { in ikev2_prf_hash() 113 int ikev2_prf_plus(int alg, const u8 *key, size_t key_len, in ikev2_prf_plus() argument 125 prf = ikev2_get_prf(alg); in ikev2_prf_plus() 143 res = ikev2_prf_hash(alg, key, key_len, 2, &addr[1], in ikev2_prf_plus() 146 res = ikev2_prf_hash(alg, key, key_len, 3, addr, len, in ikev2_prf_plus() 175 int ikev2_encr_encrypt(int alg, const u8 *key, size_t key_len, const u8 *iv, in ikev2_encr_encrypt() argument 181 switch (alg) { in ikev2_encr_encrypt() 210 ikev2_encr_decrypt(int alg, const u8 *key, size_t key_len, const u8 *iv, const u8 *crypt, u8 *plain, size_t len) ikev2_encr_decrypt() argument [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/ |
H A D | pkcs5.c | 25 } alg; member 48 static int pkcs5_is_oid(struct asn1_oid *oid, unsigned long alg) in pkcs5_is_oid() argument 54 oid->oid[6] == alg; in pkcs5_is_oid() 58 static int enc_alg_is_oid(struct asn1_oid *oid, unsigned long alg) in enc_alg_is_oid() argument 63 oid->oid[5] == alg; in enc_alg_is_oid() 67 static int pkcs12_is_pbe_oid(struct asn1_oid *oid, unsigned long alg) in pkcs12_is_pbe_oid() argument 74 oid->oid[7] == alg; in pkcs12_is_pbe_oid() 299 params->alg = pkcs5_get_alg(&oid); in pkcs5_get_params() 300 if (params->alg == PKCS5_ALG_UNKNOWN) { in pkcs5_get_params() 306 if (params->alg in pkcs5_get_params() [all...] |