Home
last modified time | relevance | path

Searched refs:alg (Results 401 - 425 of 1208) sorted by relevance

1...<<11121314151617181920>>...49

/kernel/linux/linux-6.6/crypto/
H A Dcrc64_rocksoft_generic.c56 static struct shash_alg alg = { variable
75 return crypto_register_shash(&alg); in crc64_rocksoft_init()
80 crypto_unregister_shash(&alg); in crc64_rocksoft_exit()
H A Dsha1_generic.c63 static struct shash_alg alg = { variable
81 return crypto_register_shash(&alg); in sha1_generic_mod_init()
86 crypto_unregister_shash(&alg); in sha1_generic_mod_fini()
H A Dxxhash_generic.c70 static struct shash_alg alg = { variable
91 return crypto_register_shash(&alg); in xxhash_mod_init()
96 crypto_unregister_shash(&alg); in xxhash_mod_fini()
H A Dcompress.h22 int crypto_acomp_report_stat(struct sk_buff *skb, struct crypto_alg *alg);
24 void comp_prepare_alg(struct comp_alg_common *alg);
/third_party/mbedtls/library/
H A Dpsa_crypto_ecp.h170 * \param[in] alg Randomized or deterministic ECDSA algorithm.
183 * \p alg) where \c key_bits is the bit-size of the ECC key.
193 psa_algorithm_t alg, const uint8_t *hash, size_t hash_length,
209 * \param[in] alg Randomized or deterministic ECDSA algorithm.
228 psa_algorithm_t alg, const uint8_t *hash, size_t hash_length,
245 * \param[in] alg A key agreement algorithm that is
262 * \p alg is not a key agreement algorithm, or
263 * \p private_key is not compatible with \p alg,
264 * or \p peer_key is not valid for \p alg or not compatible with
269 * \p alg i
[all...]
H A Dpsa_crypto_pake.c221 operation->alg = cipher_suite.algorithm; in mbedtls_psa_pake_setup()
308 if (operation->alg == PSA_ALG_JPAKE) { in mbedtls_psa_pake_output_internal()
428 if (operation->alg == PSA_ALG_JPAKE) { in mbedtls_psa_pake_input_internal()
529 if (operation->alg == PSA_ALG_JPAKE) { in mbedtls_psa_pake_get_implicit_key()
555 if (operation->alg == PSA_ALG_JPAKE) { in mbedtls_psa_pake_abort()
564 operation->alg = PSA_ALG_NONE; in mbedtls_psa_pake_abort()
/kernel/linux/linux-5.10/drivers/crypto/virtio/
H A Dvirtio_crypto_algs.c100 virtio_crypto_alg_validate_key(int key_len, uint32_t *alg) in virtio_crypto_alg_validate_key() argument
106 *alg = VIRTIO_CRYPTO_CIPHER_AES_CBC; in virtio_crypto_alg_validate_key()
116 uint32_t alg, const uint8_t *key, in virtio_crypto_alg_skcipher_init_session()
148 ctrl->header.algo = cpu_to_le32(alg); in virtio_crypto_alg_skcipher_init_session()
256 uint32_t alg; in virtio_crypto_alg_skcipher_init_sessions() local
265 if (virtio_crypto_alg_validate_key(keylen, &alg)) in virtio_crypto_alg_skcipher_init_sessions()
270 alg, key, keylen, 1); in virtio_crypto_alg_skcipher_init_sessions()
275 alg, key, keylen, 0); in virtio_crypto_alg_skcipher_init_sessions()
289 uint32_t alg; in virtio_crypto_skcipher_setkey() local
292 ret = virtio_crypto_alg_validate_key(keylen, &alg); in virtio_crypto_skcipher_setkey()
114 virtio_crypto_alg_skcipher_init_session( struct virtio_crypto_skcipher_ctx *ctx, uint32_t alg, const uint8_t *key, unsigned int keylen, int encrypt) virtio_crypto_alg_skcipher_init_session() argument
[all...]
/kernel/linux/linux-6.6/drivers/crypto/allwinner/sun4i-ss/
H A Dsun4i-ss-cipher.c38 struct skcipher_alg *alg = crypto_skcipher_alg(tfm); in sun4i_ss_opti_poll() local
55 algt = container_of(alg, struct sun4i_ss_alg_template, alg.crypto); in sun4i_ss_opti_poll()
154 struct skcipher_alg *alg = crypto_skcipher_alg(tfm); in sun4i_ss_cipher_poll_fallback() local
158 algt = container_of(alg, struct sun4i_ss_alg_template, alg.crypto); in sun4i_ss_cipher_poll_fallback()
186 struct skcipher_alg *alg = crypto_skcipher_alg(tfm); in sun4i_ss_cipher_poll() local
217 algt = container_of(alg, struct sun4i_ss_alg_template, alg.crypto); in sun4i_ss_cipher_poll()
218 if (areq->cryptlen % algt->alg in sun4i_ss_cipher_poll()
[all...]
/kernel/linux/linux-6.6/drivers/crypto/virtio/
H A Dvirtio_crypto_skcipher_algs.c97 virtio_crypto_alg_validate_key(int key_len, uint32_t *alg) in virtio_crypto_alg_validate_key() argument
103 *alg = VIRTIO_CRYPTO_CIPHER_AES_CBC; in virtio_crypto_alg_validate_key()
113 uint32_t alg, const uint8_t *key, in virtio_crypto_alg_skcipher_init_session()
145 ctrl->header.algo = cpu_to_le32(alg); in virtio_crypto_alg_skcipher_init_session()
253 uint32_t alg; in virtio_crypto_alg_skcipher_init_sessions() local
262 if (virtio_crypto_alg_validate_key(keylen, &alg)) in virtio_crypto_alg_skcipher_init_sessions()
267 alg, key, keylen, 1); in virtio_crypto_alg_skcipher_init_sessions()
272 alg, key, keylen, 0); in virtio_crypto_alg_skcipher_init_sessions()
286 uint32_t alg; in virtio_crypto_skcipher_setkey() local
289 ret = virtio_crypto_alg_validate_key(keylen, &alg); in virtio_crypto_skcipher_setkey()
111 virtio_crypto_alg_skcipher_init_session( struct virtio_crypto_skcipher_ctx *ctx, uint32_t alg, const uint8_t *key, unsigned int keylen, int encrypt) virtio_crypto_alg_skcipher_init_session() argument
[all...]
/kernel/linux/linux-5.10/drivers/staging/rtl8192u/
H A Dr8192U_wx.c718 u8 idx = 0, alg = 0, group = 0; in r8192_wx_set_enc_ext() local
720 if ((encoding->flags & IW_ENCODE_DISABLED) || ext->alg == IW_ENCODE_ALG_NONE) in r8192_wx_set_enc_ext()
725 alg = (ext->alg == IW_ENCODE_ALG_CCMP)?KEY_TYPE_CCMP:ext->alg; in r8192_wx_set_enc_ext()
731 if ((!group) || (IW_MODE_ADHOC == ieee->iw_mode) || (alg == KEY_TYPE_WEP40)) { in r8192_wx_set_enc_ext()
732 if ((ext->key_len == 13) && (alg == KEY_TYPE_WEP40)) in r8192_wx_set_enc_ext()
733 alg = KEY_TYPE_WEP104; in r8192_wx_set_enc_ext()
734 ieee->pairwise_key_type = alg; in r8192_wx_set_enc_ext()
739 if ((alg in r8192_wx_set_enc_ext()
[all...]
/kernel/linux/linux-6.6/drivers/staging/rtl8192u/
H A Dr8192U_wx.c718 u8 idx = 0, alg = 0, group = 0; in r8192_wx_set_enc_ext() local
720 if ((encoding->flags & IW_ENCODE_DISABLED) || ext->alg == IW_ENCODE_ALG_NONE) in r8192_wx_set_enc_ext()
725 alg = (ext->alg == IW_ENCODE_ALG_CCMP) ? KEY_TYPE_CCMP : ext->alg; in r8192_wx_set_enc_ext()
731 if ((!group) || (ieee->iw_mode == IW_MODE_ADHOC) || (alg == KEY_TYPE_WEP40)) { in r8192_wx_set_enc_ext()
732 if ((ext->key_len == 13) && (alg == KEY_TYPE_WEP40)) in r8192_wx_set_enc_ext()
733 alg = KEY_TYPE_WEP104; in r8192_wx_set_enc_ext()
734 ieee->pairwise_key_type = alg; in r8192_wx_set_enc_ext()
739 if ((alg in r8192_wx_set_enc_ext()
[all...]
/third_party/ltp/include/
H A Dtst_crypto.h77 * @param alg The crypto algorithm or module to add.
80 * kernel. It sends the request contained in alg and then waits for a
88 const struct crypto_user_alg *alg);
95 * @param alg The crypto algorithm to delete.
110 const struct crypto_user_alg *alg);
/kernel/linux/linux-5.10/include/crypto/
H A Daead.h202 static inline unsigned int crypto_aead_alg_ivsize(struct aead_alg *alg) in crypto_aead_alg_ivsize() argument
204 return alg->ivsize; in crypto_aead_alg_ivsize()
238 static inline unsigned int crypto_aead_alg_maxauthsize(struct aead_alg *alg) in crypto_aead_alg_maxauthsize() argument
240 return alg->maxauthsize; in crypto_aead_alg_maxauthsize()
/kernel/linux/linux-6.6/include/crypto/
H A Daead.h231 static inline unsigned int crypto_aead_alg_ivsize(struct aead_alg *alg) in crypto_aead_alg_ivsize() argument
233 return alg->ivsize; in crypto_aead_alg_ivsize()
267 static inline unsigned int crypto_aead_alg_maxauthsize(struct aead_alg *alg) in crypto_aead_alg_maxauthsize() argument
269 return alg->maxauthsize; in crypto_aead_alg_maxauthsize()
/third_party/libwebsockets/lib/jose/jwe/
H A Djwe-rsa-aescbc.c101 !strcmp(jwe->jose.alg->alg, "RSA-OAEP") ? in lws_jwe_encrypt_rsa_aes_cbc_hs()
155 !strcmp(jwe->jose.alg->alg, "RSA-OAEP") ? in lws_jwe_auth_and_decrypt_rsa_aes_cbc_hs()
H A Djwe-rsa-aesgcm.c97 !strcmp(jwe->jose.alg->alg, "RSA-OAEP") ? in lws_jwe_encrypt_rsa_aes_gcm()
146 !strcmp(jwe->jose.alg->alg, "RSA-OAEP") ? in lws_jwe_auth_and_decrypt_rsa_aes_gcm()
/third_party/ltp/testcases/kernel/device-drivers/zram/
H A Dzram_lib.sh141 for alg in $algs; do
143 echo "$alg" > $sys_path || \
144 tst_brk TFAIL "can't set '$alg' to $sys_path"
145 tst_res TINFO "$sys_path = '$alg'"
/third_party/openssl/test/
H A Dfilterprov.c30 OSSL_ALGORITHM alg[MAX_ALG_FILTERS + 1]; member
89 return globs->dispatch[i].alg; in filter_query()
109 if (globs->dispatch[i].alg == algs) in filter_unquery()
209 globs->dispatch[globs->num_dispatch].alg[algnum++] = *algs; in filter_provider_set_filter()
/kernel/linux/linux-5.10/drivers/crypto/chelsio/
H A Dchcr_algo.c169 struct aead_alg *alg = crypto_aead_alg(aead); in get_aead_subtype() local
171 container_of(alg, struct chcr_alg_template, alg.aead); in get_aead_subtype()
370 struct crypto_alg *alg = tfm->__crt_alg; in is_hmac() local
372 container_of(__crypto_ahash_alg(alg), struct chcr_alg_template, in is_hmac()
373 alg.hash); in is_hmac()
572 struct skcipher_alg *alg = crypto_skcipher_alg(tfm); in get_cryptoalg_subtype() local
574 container_of(alg, struct chcr_alg_template, alg.skcipher); in get_cryptoalg_subtype()
1475 struct skcipher_alg *alg in chcr_init_tfm() local
1494 struct skcipher_alg *alg = crypto_skcipher_alg(tfm); chcr_rfc3686_init() local
3257 struct aead_alg *alg = crypto_aead_alg(tfm); chcr_aead_cra_init() local
[all...]
/kernel/linux/linux-6.6/drivers/crypto/chelsio/
H A Dchcr_algo.c165 struct aead_alg *alg = crypto_aead_alg(aead); in get_aead_subtype() local
167 container_of(alg, struct chcr_alg_template, alg.aead); in get_aead_subtype()
366 struct crypto_alg *alg = tfm->__crt_alg; in is_hmac() local
368 container_of(__crypto_ahash_alg(alg), struct chcr_alg_template, in is_hmac()
369 alg.hash); in is_hmac()
568 struct skcipher_alg *alg = crypto_skcipher_alg(tfm); in get_cryptoalg_subtype() local
570 container_of(alg, struct chcr_alg_template, alg.skcipher); in get_cryptoalg_subtype()
1468 struct skcipher_alg *alg in chcr_init_tfm() local
1487 struct skcipher_alg *alg = crypto_skcipher_alg(tfm); chcr_rfc3686_init() local
3252 struct aead_alg *alg = crypto_aead_alg(tfm); chcr_aead_cra_init() local
[all...]
/kernel/linux/linux-6.6/drivers/firmware/cirrus/
H A Dcs_dsp.c475 ctl->offset, reg, ctl->fw_name, ctl->alg_region.alg, ctl->type, in cs_dsp_debugfs_read_controls_show()
698 cs_dsp_dbg(dsp, "Sending 0x%x to acked control alg 0x%x %s:0x%x\n", in cs_dsp_coeff_write_acked_control()
699 event_id, ctl->alg_region.alg, in cs_dsp_coeff_write_acked_control()
738 cs_dsp_warn(dsp, "Acked control @0x%x alg:0x%x %s:0x%x timed out\n", in cs_dsp_coeff_write_acked_control()
739 reg, ctl->alg_region.alg, in cs_dsp_coeff_write_acked_control()
955 "Failed to send 0x%x event to alg 0x%x (%d)\n", in cs_dsp_signal_event_controls()
956 event, ctl->alg_region.alg, ret); in cs_dsp_signal_event_controls()
978 ctl->alg_region.alg == alg_region->alg && in cs_dsp_create_control()
1245 alg_region.alg in cs_dsp_parse_coeff()
1518 cs_dsp_get_ctl(struct cs_dsp *dsp, const char *name, int type, unsigned int alg) cs_dsp_get_ctl() argument
1559 void *alg; cs_dsp_read_algs() local
[all...]
/kernel/linux/linux-5.10/fs/erofs/
H A Ddecompressor.c237 const struct z_erofs_decompressor *alg = decompressors + rq->alg; in z_erofs_decompress_generic() local
260 ret = alg->decompress(rq, dst); in z_erofs_decompress_generic()
269 ret = alg->prepare_destpages(rq, pagepool); in z_erofs_decompress_generic()
294 ret = alg->decompress(rq, dst + rq->pageofs_out); in z_erofs_decompress_generic()
345 if (rq->alg == Z_EROFS_COMPRESSION_SHIFTED) in z_erofs_decompress()
/third_party/fsverity-utils/lib/
H A Dcompute_digest.c41 next->filled += hash->alg->digest_size; in hash_one_block()
49 return block->filled + hash->alg->digest_size > block_size; in block_is_full()
109 const u32 hashes_per_block = block_size / hash->alg->digest_size; in compute_root_hash()
110 const u32 padded_salt_size = roundup(salt_size, hash->alg->block_size); in compute_root_hash()
123 memset(root_hash, 0, hash->alg->digest_size); in compute_root_hash()
222 if (WARN_ON(buffers[num_levels].filled != hash->alg->digest_size)) { in compute_root_hash()
/third_party/mbedtls/include/psa/
H A Dcrypto_se_driver.h260 * \param[in] alg The algorithm to be used to underlie the MAC
275 psa_algorithm_t alg,
287 * \param[in] alg The algorithm to be used to underlie the MAC
304 psa_algorithm_t alg,
548 * \param[in] alg A signature algorithm that is compatible
561 psa_algorithm_t alg,
575 * \param[in] alg A signature algorithm that is compatible with
587 psa_algorithm_t alg,
600 * \param[in] alg An asymmetric encryption algorithm that is
625 psa_algorithm_t alg,
[all...]
/third_party/node/deps/openssl/openssl/apps/
H A Ddhparam.c182 const char *alg = dsaparam ? "DSA" : "DH"; in dhparam_main() local
188 ctx = EVP_PKEY_CTX_new_from_name(app_get0_libctx(), alg, app_get0_propq()); in dhparam_main()
192 alg); in dhparam_main()
199 alg, num, dsaparam ? "" : "safe "); in dhparam_main()
204 alg); in dhparam_main()
224 tmppkey = app_paramgen(ctx, alg); in dhparam_main()

Completed in 23 milliseconds

1...<<11121314151617181920>>...49