/third_party/node/deps/openssl/openssl/crypto/perlasm/ |
H A D | sparcv9_modes.pl | 42 my ($alg,$bits) = @_; 45 .globl ${alg}${bits}_t4_cbc_encrypt 47 ${alg}${bits}_t4_cbc_encrypt: 75 call _${alg}${bits}_load_enckey 115 call _${alg}${bits}_encrypt_1x 224 call _${alg}${bits}_encrypt_1x 254 .type ${alg}${bits}_t4_cbc_encrypt,#function 255 .size ${alg}${bits}_t4_cbc_encrypt,.-${alg}${bits}_t4_cbc_encrypt 260 my ($alg, [all...] |
/third_party/openssl/crypto/perlasm/ |
H A D | sparcv9_modes.pl | 42 my ($alg,$bits) = @_; 45 .globl ${alg}${bits}_t4_cbc_encrypt 47 ${alg}${bits}_t4_cbc_encrypt: 75 call _${alg}${bits}_load_enckey 115 call _${alg}${bits}_encrypt_1x 224 call _${alg}${bits}_encrypt_1x 254 .type ${alg}${bits}_t4_cbc_encrypt,#function 255 .size ${alg}${bits}_t4_cbc_encrypt,.-${alg}${bits}_t4_cbc_encrypt 260 my ($alg, [all...] |
/kernel/linux/linux-5.10/arch/x86/crypto/ |
H A D | crc32c-intel_glue.c | 196 static struct shash_alg alg = { variable 229 alg.update = crc32c_pcl_intel_update; in crc32c_intel_mod_init() 230 alg.finup = crc32c_pcl_intel_finup; in crc32c_intel_mod_init() 231 alg.digest = crc32c_pcl_intel_digest; in crc32c_intel_mod_init() 234 return crypto_register_shash(&alg); in crc32c_intel_mod_init() 239 crypto_unregister_shash(&alg); in crc32c_intel_mod_fini()
|
H A D | twofish_glue.c | 64 static struct crypto_alg alg = { variable 86 return crypto_register_alg(&alg); in init() 91 crypto_unregister_alg(&alg); in fini()
|
/kernel/linux/linux-5.10/drivers/crypto/rockchip/ |
H A D | rk3288_crypto.c | 107 &rk_cipher_algs[i]->alg.skcipher); in rk_crypto_register() 110 &rk_cipher_algs[i]->alg.hash); in rk_crypto_register() 119 crypto_unregister_skcipher(&rk_cipher_algs[k]->alg.skcipher); in rk_crypto_register() 121 crypto_unregister_ahash(&rk_cipher_algs[i]->alg.hash); in rk_crypto_register() 132 crypto_unregister_skcipher(&rk_cipher_algs[i]->alg.skcipher); in rk_crypto_unregister() 134 crypto_unregister_ahash(&rk_cipher_algs[i]->alg.hash); in rk_crypto_unregister() 236 dev_err(dev, "err in register alg"); in rk_crypto_probe()
|
/kernel/linux/linux-6.6/arch/x86/crypto/ |
H A D | crc32c-intel_glue.c | 196 static struct shash_alg alg = { variable 229 alg.update = crc32c_pcl_intel_update; in crc32c_intel_mod_init() 230 alg.finup = crc32c_pcl_intel_finup; in crc32c_intel_mod_init() 231 alg.digest = crc32c_pcl_intel_digest; in crc32c_intel_mod_init() 234 return crypto_register_shash(&alg); in crc32c_intel_mod_init() 239 crypto_unregister_shash(&alg); in crc32c_intel_mod_fini()
|
H A D | twofish_glue.c | 64 static struct crypto_alg alg = { variable 86 return crypto_register_alg(&alg); in twofish_glue_init() 91 crypto_unregister_alg(&alg); in twofish_glue_fini()
|
/kernel/linux/linux-5.10/drivers/crypto/bcm/ |
H A D | spu.c | 321 * SPU message for a given cipher and hash alg context. 350 * SPU message for a given cipher and hash alg context. 549 * alg: The hash algorithm 556 u32 spum_digest_size(u32 alg_digest_size, enum hash_alg alg, in spum_digest_size() argument 565 if (alg == HASH_ALG_SHA224) in spum_digest_size() 567 else if (alg == HASH_ALG_SHA384) in spum_digest_size() 637 if ((hash_parms->alg == HASH_ALG_AES) && in spum_create_request() 646 flow_log(" %s. cipher alg:%u mode:%u type %u\n", in spum_create_request() 647 spu_alg_name(cipher_parms->alg, cipher_parms->mode), in spum_create_request() 648 cipher_parms->alg, cipher_parm in spum_create_request() [all...] |
/kernel/linux/linux-5.10/net/mac80211/ |
H A D | rate.c | 120 struct rate_control_alg *alg; in ieee80211_rate_control_register() local 126 list_for_each_entry(alg, &rate_ctrl_algs, list) { in ieee80211_rate_control_register() 127 if (!strcmp(alg->ops->name, ops->name)) { in ieee80211_rate_control_register() 135 alg = kzalloc(sizeof(*alg), GFP_KERNEL); in ieee80211_rate_control_register() 136 if (alg == NULL) { in ieee80211_rate_control_register() 140 alg->ops = ops; in ieee80211_rate_control_register() 142 list_add_tail(&alg->list, &rate_ctrl_algs); in ieee80211_rate_control_register() 151 struct rate_control_alg *alg; in ieee80211_rate_control_unregister() local 154 list_for_each_entry(alg, in ieee80211_rate_control_unregister() 168 struct rate_control_alg *alg; ieee80211_try_rate_control_ops_get() local [all...] |
/kernel/linux/linux-6.6/drivers/crypto/bcm/ |
H A D | spu.c | 319 * SPU message for a given cipher and hash alg context. 348 * SPU message for a given cipher and hash alg context. 547 * @alg: The hash algorithm 554 u32 spum_digest_size(u32 alg_digest_size, enum hash_alg alg, in spum_digest_size() argument 563 if (alg == HASH_ALG_SHA224) in spum_digest_size() 565 else if (alg == HASH_ALG_SHA384) in spum_digest_size() 635 if ((hash_parms->alg == HASH_ALG_AES) && in spum_create_request() 644 flow_log(" %s. cipher alg:%u mode:%u type %u\n", in spum_create_request() 645 spu_alg_name(cipher_parms->alg, cipher_parms->mode), in spum_create_request() 646 cipher_parms->alg, cipher_parm in spum_create_request() [all...] |
/kernel/linux/linux-6.6/tools/testing/selftests/tpm2/ |
H A D | tpm2.py | 204 def __init__(self, alg): 205 self.alg = alg 208 return '0x%0x' % (alg) 220 def __init__(self, alg): 221 self.alg = alg 224 return '0x%0x' % (alg) 325 def get_digest_size(alg): 326 ds = ALG_DIGEST_SIZE_MAP.get(alg) [all...] |
/kernel/linux/linux-6.6/net/mac80211/ |
H A D | rate.c | 128 struct rate_control_alg *alg; in ieee80211_rate_control_register() local 134 list_for_each_entry(alg, &rate_ctrl_algs, list) { in ieee80211_rate_control_register() 135 if (!strcmp(alg->ops->name, ops->name)) { in ieee80211_rate_control_register() 143 alg = kzalloc(sizeof(*alg), GFP_KERNEL); in ieee80211_rate_control_register() 144 if (alg == NULL) { in ieee80211_rate_control_register() 148 alg->ops = ops; in ieee80211_rate_control_register() 150 list_add_tail(&alg->list, &rate_ctrl_algs); in ieee80211_rate_control_register() 159 struct rate_control_alg *alg; in ieee80211_rate_control_unregister() local 162 list_for_each_entry(alg, in ieee80211_rate_control_unregister() 176 struct rate_control_alg *alg; ieee80211_try_rate_control_ops_get() local [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/ |
H A D | tlsv1_client_ocsp.c | 67 static unsigned int ocsp_hash_data(struct asn1_oid *alg, const u8 *data, in ocsp_hash_data() argument 74 if (x509_sha1_oid(alg)) { in ocsp_hash_data() 81 if (x509_sha256_oid(alg)) { in ocsp_hash_data() 88 if (x509_sha384_oid(alg)) { in ocsp_hash_data() 95 if (x509_sha512_oid(alg)) { in ocsp_hash_data() 103 asn1_oid_to_str(alg, buf, sizeof(buf)); in ocsp_hash_data() 104 wpa_printf(MSG_DEBUG, "OCSP: Could not calculate hash with alg %s", in ocsp_hash_data() 118 struct x509_algorithm_identifier alg; in tls_process_ocsp_single_response() local 161 if (x509_parse_algorithm_identifier(pos, end - pos, &alg, &pos)) in tls_process_ocsp_single_response() 181 hash_len = ocsp_hash_data(&alg in tls_process_ocsp_single_response() 363 struct x509_algorithm_identifier alg; tls_process_basic_ocsp_response() local [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/ |
H A D | tlsv1_client_ocsp.c | 67 static unsigned int ocsp_hash_data(struct asn1_oid *alg, const u8 *data, in ocsp_hash_data() argument 74 if (x509_sha1_oid(alg)) { in ocsp_hash_data() 81 if (x509_sha256_oid(alg)) { in ocsp_hash_data() 88 if (x509_sha384_oid(alg)) { in ocsp_hash_data() 95 if (x509_sha512_oid(alg)) { in ocsp_hash_data() 103 asn1_oid_to_str(alg, buf, sizeof(buf)); in ocsp_hash_data() 104 wpa_printf(MSG_DEBUG, "OCSP: Could not calculate hash with alg %s", in ocsp_hash_data() 118 struct x509_algorithm_identifier alg; in tls_process_ocsp_single_response() local 157 if (x509_parse_algorithm_identifier(pos, end - pos, &alg, &pos)) in tls_process_ocsp_single_response() 175 hash_len = ocsp_hash_data(&alg in tls_process_ocsp_single_response() 354 struct x509_algorithm_identifier alg; tls_process_basic_ocsp_response() local [all...] |
/third_party/mbedtls/library/ |
H A D | pk.c | 247 int mbedtls_pk_can_do_ext(const mbedtls_pk_context *ctx, psa_algorithm_t alg, in mbedtls_pk_can_do_ext() argument 260 if (PSA_ALG_IS_ECDSA(alg) == 0 && in mbedtls_pk_can_do_ext() 261 PSA_ALG_IS_RSA_PKCS1V15_SIGN(alg) == 0 && in mbedtls_pk_can_do_ext() 262 PSA_ALG_IS_RSA_PSS(alg) == 0 && in mbedtls_pk_can_do_ext() 263 alg != PSA_ALG_RSA_PKCS1V15_CRYPT && in mbedtls_pk_can_do_ext() 264 PSA_ALG_IS_ECDH(alg) == 0) { in mbedtls_pk_can_do_ext() 277 if (PSA_ALG_IS_SIGN_HASH(alg) && in mbedtls_pk_can_do_ext() 278 PSA_ALG_SIGN_GET_HASH(alg) == PSA_ALG_ANY_HASH) { in mbedtls_pk_can_do_ext() 285 if (PSA_ALG_IS_ECDSA(alg) || PSA_ALG_IS_ECDH(alg)) { in mbedtls_pk_can_do_ext() 481 psa_algorithm_t alg = 0; mbedtls_pk_get_psa_attributes() local [all...] |
/base/security/huks/test/unittest/huks_standard_test/three_stage_test/src/ |
H A D | hks_import_sign_verify_test.cpp | 334 static int32_t CopyToInner(uint32_t alg, uint32_t importType, struct HksBlob *outKey) in CopyToInner() argument 338 dataBlob.data = (alg == HKS_ALG_ED25519) ? (uint8_t *)g_ed25519PriData : (uint8_t *)g_x25519PriData; in CopyToInner() 339 dataBlob.size = (alg == HKS_ALG_ED25519) ? sizeof(g_ed25519PriData) : sizeof(g_x25519PriData); in CopyToInner() 341 dataBlob.data = (alg == HKS_ALG_ED25519) ? (uint8_t *)g_ed25519PubData : (uint8_t *)g_x25519PubData; in CopyToInner() 342 dataBlob.size = (alg == HKS_ALG_ED25519) ? sizeof(g_ed25519PubData) : sizeof(g_x25519PubData); in CopyToInner() 348 static int32_t ConstructImportedCurve25519Key(uint32_t alg, uint32_t keySize, uint32_t importType, in ConstructImportedCurve25519Key() argument 352 return CopyToInner(alg, importType, outKey); in ConstructImportedCurve25519Key() 356 privKeyBlob.data = (alg == HKS_ALG_ED25519) ? (uint8_t *)g_ed25519PriData : (uint8_t *)g_x25519PriData; in ConstructImportedCurve25519Key() 357 privKeyBlob.size = (alg == HKS_ALG_ED25519) ? sizeof(g_ed25519PriData) : sizeof(g_x25519PriData); in ConstructImportedCurve25519Key() 358 pubKeyBlob.data = (alg in ConstructImportedCurve25519Key() 732 ConstructImportedKey(uint32_t alg, uint32_t keySize, uint32_t importType, struct HksBlob *outKey, bool sm2CompabilityTest) ConstructImportedKey() argument 754 ModifyImportParams(uint32_t alg, uint32_t purpose, uint32_t keySize, uint32_t digest, uint32_t importType) ModifyImportParams() argument 763 ModifyinitOp1Params(uint32_t alg, uint32_t purpose, uint32_t keySize, uint32_t digest) ModifyinitOp1Params() argument 771 ModifyinitOp2Params(uint32_t alg, uint32_t purpose, uint32_t keySize, uint32_t digest) ModifyinitOp2Params() argument 904 ImportPlainKeyTest(uint32_t alg, uint32_t keySize, uint32_t digest, bool sm2CompabilityTest) ImportPlainKeyTest() argument 952 ImportInvalidPurposePlainKeyTest(uint32_t alg, uint32_t keySize, uint32_t digest, uint32_t purpose, bool sm2CompabilityTest) ImportInvalidPurposePlainKeyTest() argument [all...] |
/base/security/huks/frameworks/huks_standard/main/common/include/ |
H A D | hks_crypto_adapter.h | 50 int32_t HksSetKeyToMaterial(uint32_t alg, bool isPubKey, const struct HksBlob *key, struct HksBlob *keyMaterial);
52 int32_t HksGetKeyFromMaterial(uint32_t alg, bool isPubKey, const struct HksBlob *keyMaterial, struct HksBlob *key);
54 int32_t HksFormatKeyFromMaterial(uint32_t alg, const struct HksBlob *keyMaterial, struct HksParamSet *paramSetOut);
|
/kernel/linux/linux-6.6/arch/arm/crypto/ |
H A D | sha1_glue.c | 51 static struct shash_alg alg = { variable 70 return crypto_register_shash(&alg); in sha1_mod_init() 76 crypto_unregister_shash(&alg); in sha1_mod_fini()
|
/kernel/linux/linux-6.6/fs/verity/ |
H A D | measure.c | 65 * @alg: (out) the digest's algorithm, as a FS_VERITY_HASH_ALG_* value 73 * @alg or @halg. (The caller can choose which one of @alg or @halg to use.) 85 u8 *alg, enum hash_algo *halg) in fsverity_get_digest() 96 if (alg) in fsverity_get_digest() 97 *alg = hash_alg - fsverity_hash_algs; in fsverity_get_digest() 83 fsverity_get_digest(struct inode *inode, u8 raw_digest[FS_VERITY_MAX_DIGEST_SIZE], u8 *alg, enum hash_algo *halg) fsverity_get_digest() argument
|
/third_party/mbedtls/3rdparty/p256-m/ |
H A D | p256-m_driver_entrypoints.h | 112 * \param[in] alg A key agreement algorithm that is 135 psa_algorithm_t alg, 149 * \param[in] alg A signature algorithm that is compatible 171 psa_algorithm_t alg, 193 * \param[in] alg A signature algorithm that is compatible with 213 psa_algorithm_t alg,
|
/base/security/dlp_permission_service/interfaces/inner_api/dlp_parse/src/ |
H A D | dlp_crypt.cpp | 731 static bool CheckDigestAlg(uint32_t alg) in CheckDigestAlg() argument 733 switch (alg) { in CheckDigestAlg() 743 const EVP_MD* GetOpensslAlg(uint32_t alg) in GetOpensslAlg() argument 745 switch (alg) { in GetOpensslAlg() 757 static uint32_t GetHashLen(uint32_t alg) in GetHashLen() argument 759 if (alg == DLP_DIGEST_SHA256) { in GetHashLen() 761 } else if (alg == DLP_DIGEST_SHA384) { in GetHashLen() 768 static bool HashCheckParam(uint32_t alg, const struct DlpBlob* msg, struct DlpBlob* hash) in HashCheckParam() argument 770 if (!CheckDigestAlg(alg)) { in HashCheckParam() 771 DLP_LOG_ERROR(LABEL, "Check hash param fail, alg typ in HashCheckParam() 794 DlpOpensslHash(uint32_t alg, const struct DlpBlob* msg, struct DlpBlob* hash) DlpOpensslHash() argument 815 DlpOpensslHashInit(void** cryptoCtx, uint32_t alg) DlpOpensslHashInit() argument [all...] |
/kernel/linux/linux-5.10/drivers/staging/rtl8192e/ |
H A D | rtllib_wx.c | 519 const char *alg, *module; in rtllib_wx_set_encode_ext() local 539 if (idx != 0 && ext->alg != IW_ENCODE_ALG_WEP) in rtllib_wx_set_encode_ext() 549 ext->alg == IW_ENCODE_ALG_NONE) { in rtllib_wx_set_encode_ext() 566 switch (ext->alg) { in rtllib_wx_set_encode_ext() 568 alg = "R-WEP"; in rtllib_wx_set_encode_ext() 572 alg = "R-TKIP"; in rtllib_wx_set_encode_ext() 576 alg = "R-CCMP"; in rtllib_wx_set_encode_ext() 580 netdev_dbg(ieee->dev, "Unknown crypto alg %d\n", ext->alg); in rtllib_wx_set_encode_ext() 584 netdev_dbg(dev, "alg nam in rtllib_wx_set_encode_ext() [all...] |
/kernel/linux/linux-6.6/drivers/staging/rtl8192e/ |
H A D | rtllib_wx.c | 476 const char *alg, *module; in rtllib_wx_set_encode_ext() local 496 if (idx != 0 && ext->alg != IW_ENCODE_ALG_WEP) in rtllib_wx_set_encode_ext() 506 ext->alg == IW_ENCODE_ALG_NONE) { in rtllib_wx_set_encode_ext() 523 switch (ext->alg) { in rtllib_wx_set_encode_ext() 525 alg = "R-WEP"; in rtllib_wx_set_encode_ext() 529 alg = "R-TKIP"; in rtllib_wx_set_encode_ext() 533 alg = "R-CCMP"; in rtllib_wx_set_encode_ext() 537 netdev_dbg(ieee->dev, "Unknown crypto alg %d\n", ext->alg); in rtllib_wx_set_encode_ext() 541 netdev_dbg(dev, "alg nam in rtllib_wx_set_encode_ext() [all...] |
/kernel/linux/linux-5.10/crypto/ |
H A D | lzo-rle.c | 110 static struct crypto_alg alg = { variable 139 ret = crypto_register_alg(&alg); in lzorle_mod_init() 145 crypto_unregister_alg(&alg); in lzorle_mod_init() 154 crypto_unregister_alg(&alg); in lzorle_mod_fini()
|
H A D | lzo.c | 110 static struct crypto_alg alg = { variable 139 ret = crypto_register_alg(&alg); in lzo_mod_init() 145 crypto_unregister_alg(&alg); in lzo_mod_init() 154 crypto_unregister_alg(&alg); in lzo_mod_fini()
|