/kernel/linux/linux-6.6/crypto/ |
H A D | crc64_rocksoft_generic.c | 56 static struct shash_alg alg = { variable 75 return crypto_register_shash(&alg); in crc64_rocksoft_init() 80 crypto_unregister_shash(&alg); in crc64_rocksoft_exit()
|
H A D | sha1_generic.c | 63 static struct shash_alg alg = { variable 81 return crypto_register_shash(&alg); in sha1_generic_mod_init() 86 crypto_unregister_shash(&alg); in sha1_generic_mod_fini()
|
H A D | xxhash_generic.c | 70 static struct shash_alg alg = { variable 91 return crypto_register_shash(&alg); in xxhash_mod_init() 96 crypto_unregister_shash(&alg); in xxhash_mod_fini()
|
H A D | compress.h | 22 int crypto_acomp_report_stat(struct sk_buff *skb, struct crypto_alg *alg); 24 void comp_prepare_alg(struct comp_alg_common *alg);
|
/third_party/mbedtls/library/ |
H A D | psa_crypto_ecp.h | 170 * \param[in] alg Randomized or deterministic ECDSA algorithm. 183 * \p alg) where \c key_bits is the bit-size of the ECC key. 193 psa_algorithm_t alg, const uint8_t *hash, size_t hash_length, 209 * \param[in] alg Randomized or deterministic ECDSA algorithm. 228 psa_algorithm_t alg, const uint8_t *hash, size_t hash_length, 245 * \param[in] alg A key agreement algorithm that is 262 * \p alg is not a key agreement algorithm, or 263 * \p private_key is not compatible with \p alg, 264 * or \p peer_key is not valid for \p alg or not compatible with 269 * \p alg i [all...] |
H A D | psa_crypto_pake.c | 221 operation->alg = cipher_suite.algorithm; in mbedtls_psa_pake_setup() 308 if (operation->alg == PSA_ALG_JPAKE) { in mbedtls_psa_pake_output_internal() 428 if (operation->alg == PSA_ALG_JPAKE) { in mbedtls_psa_pake_input_internal() 529 if (operation->alg == PSA_ALG_JPAKE) { in mbedtls_psa_pake_get_implicit_key() 555 if (operation->alg == PSA_ALG_JPAKE) { in mbedtls_psa_pake_abort() 564 operation->alg = PSA_ALG_NONE; in mbedtls_psa_pake_abort()
|
/kernel/linux/linux-5.10/drivers/crypto/virtio/ |
H A D | virtio_crypto_algs.c | 100 virtio_crypto_alg_validate_key(int key_len, uint32_t *alg) in virtio_crypto_alg_validate_key() argument 106 *alg = VIRTIO_CRYPTO_CIPHER_AES_CBC; in virtio_crypto_alg_validate_key() 116 uint32_t alg, const uint8_t *key, in virtio_crypto_alg_skcipher_init_session() 148 ctrl->header.algo = cpu_to_le32(alg); in virtio_crypto_alg_skcipher_init_session() 256 uint32_t alg; in virtio_crypto_alg_skcipher_init_sessions() local 265 if (virtio_crypto_alg_validate_key(keylen, &alg)) in virtio_crypto_alg_skcipher_init_sessions() 270 alg, key, keylen, 1); in virtio_crypto_alg_skcipher_init_sessions() 275 alg, key, keylen, 0); in virtio_crypto_alg_skcipher_init_sessions() 289 uint32_t alg; in virtio_crypto_skcipher_setkey() local 292 ret = virtio_crypto_alg_validate_key(keylen, &alg); in virtio_crypto_skcipher_setkey() 114 virtio_crypto_alg_skcipher_init_session( struct virtio_crypto_skcipher_ctx *ctx, uint32_t alg, const uint8_t *key, unsigned int keylen, int encrypt) virtio_crypto_alg_skcipher_init_session() argument [all...] |
/kernel/linux/linux-6.6/drivers/crypto/allwinner/sun4i-ss/ |
H A D | sun4i-ss-cipher.c | 38 struct skcipher_alg *alg = crypto_skcipher_alg(tfm); in sun4i_ss_opti_poll() local 55 algt = container_of(alg, struct sun4i_ss_alg_template, alg.crypto); in sun4i_ss_opti_poll() 154 struct skcipher_alg *alg = crypto_skcipher_alg(tfm); in sun4i_ss_cipher_poll_fallback() local 158 algt = container_of(alg, struct sun4i_ss_alg_template, alg.crypto); in sun4i_ss_cipher_poll_fallback() 186 struct skcipher_alg *alg = crypto_skcipher_alg(tfm); in sun4i_ss_cipher_poll() local 217 algt = container_of(alg, struct sun4i_ss_alg_template, alg.crypto); in sun4i_ss_cipher_poll() 218 if (areq->cryptlen % algt->alg in sun4i_ss_cipher_poll() [all...] |
/kernel/linux/linux-6.6/drivers/crypto/virtio/ |
H A D | virtio_crypto_skcipher_algs.c | 97 virtio_crypto_alg_validate_key(int key_len, uint32_t *alg) in virtio_crypto_alg_validate_key() argument 103 *alg = VIRTIO_CRYPTO_CIPHER_AES_CBC; in virtio_crypto_alg_validate_key() 113 uint32_t alg, const uint8_t *key, in virtio_crypto_alg_skcipher_init_session() 145 ctrl->header.algo = cpu_to_le32(alg); in virtio_crypto_alg_skcipher_init_session() 253 uint32_t alg; in virtio_crypto_alg_skcipher_init_sessions() local 262 if (virtio_crypto_alg_validate_key(keylen, &alg)) in virtio_crypto_alg_skcipher_init_sessions() 267 alg, key, keylen, 1); in virtio_crypto_alg_skcipher_init_sessions() 272 alg, key, keylen, 0); in virtio_crypto_alg_skcipher_init_sessions() 286 uint32_t alg; in virtio_crypto_skcipher_setkey() local 289 ret = virtio_crypto_alg_validate_key(keylen, &alg); in virtio_crypto_skcipher_setkey() 111 virtio_crypto_alg_skcipher_init_session( struct virtio_crypto_skcipher_ctx *ctx, uint32_t alg, const uint8_t *key, unsigned int keylen, int encrypt) virtio_crypto_alg_skcipher_init_session() argument [all...] |
/kernel/linux/linux-5.10/drivers/staging/rtl8192u/ |
H A D | r8192U_wx.c | 718 u8 idx = 0, alg = 0, group = 0; in r8192_wx_set_enc_ext() local 720 if ((encoding->flags & IW_ENCODE_DISABLED) || ext->alg == IW_ENCODE_ALG_NONE) in r8192_wx_set_enc_ext() 725 alg = (ext->alg == IW_ENCODE_ALG_CCMP)?KEY_TYPE_CCMP:ext->alg; in r8192_wx_set_enc_ext() 731 if ((!group) || (IW_MODE_ADHOC == ieee->iw_mode) || (alg == KEY_TYPE_WEP40)) { in r8192_wx_set_enc_ext() 732 if ((ext->key_len == 13) && (alg == KEY_TYPE_WEP40)) in r8192_wx_set_enc_ext() 733 alg = KEY_TYPE_WEP104; in r8192_wx_set_enc_ext() 734 ieee->pairwise_key_type = alg; in r8192_wx_set_enc_ext() 739 if ((alg in r8192_wx_set_enc_ext() [all...] |
/kernel/linux/linux-6.6/drivers/staging/rtl8192u/ |
H A D | r8192U_wx.c | 718 u8 idx = 0, alg = 0, group = 0; in r8192_wx_set_enc_ext() local 720 if ((encoding->flags & IW_ENCODE_DISABLED) || ext->alg == IW_ENCODE_ALG_NONE) in r8192_wx_set_enc_ext() 725 alg = (ext->alg == IW_ENCODE_ALG_CCMP) ? KEY_TYPE_CCMP : ext->alg; in r8192_wx_set_enc_ext() 731 if ((!group) || (ieee->iw_mode == IW_MODE_ADHOC) || (alg == KEY_TYPE_WEP40)) { in r8192_wx_set_enc_ext() 732 if ((ext->key_len == 13) && (alg == KEY_TYPE_WEP40)) in r8192_wx_set_enc_ext() 733 alg = KEY_TYPE_WEP104; in r8192_wx_set_enc_ext() 734 ieee->pairwise_key_type = alg; in r8192_wx_set_enc_ext() 739 if ((alg in r8192_wx_set_enc_ext() [all...] |
/third_party/ltp/include/ |
H A D | tst_crypto.h | 77 * @param alg The crypto algorithm or module to add. 80 * kernel. It sends the request contained in alg and then waits for a 88 const struct crypto_user_alg *alg); 95 * @param alg The crypto algorithm to delete. 110 const struct crypto_user_alg *alg);
|
/kernel/linux/linux-5.10/include/crypto/ |
H A D | aead.h | 202 static inline unsigned int crypto_aead_alg_ivsize(struct aead_alg *alg) in crypto_aead_alg_ivsize() argument 204 return alg->ivsize; in crypto_aead_alg_ivsize() 238 static inline unsigned int crypto_aead_alg_maxauthsize(struct aead_alg *alg) in crypto_aead_alg_maxauthsize() argument 240 return alg->maxauthsize; in crypto_aead_alg_maxauthsize()
|
/kernel/linux/linux-6.6/include/crypto/ |
H A D | aead.h | 231 static inline unsigned int crypto_aead_alg_ivsize(struct aead_alg *alg) in crypto_aead_alg_ivsize() argument 233 return alg->ivsize; in crypto_aead_alg_ivsize() 267 static inline unsigned int crypto_aead_alg_maxauthsize(struct aead_alg *alg) in crypto_aead_alg_maxauthsize() argument 269 return alg->maxauthsize; in crypto_aead_alg_maxauthsize()
|
/third_party/libwebsockets/lib/jose/jwe/ |
H A D | jwe-rsa-aescbc.c | 101 !strcmp(jwe->jose.alg->alg, "RSA-OAEP") ? in lws_jwe_encrypt_rsa_aes_cbc_hs() 155 !strcmp(jwe->jose.alg->alg, "RSA-OAEP") ? in lws_jwe_auth_and_decrypt_rsa_aes_cbc_hs()
|
H A D | jwe-rsa-aesgcm.c | 97 !strcmp(jwe->jose.alg->alg, "RSA-OAEP") ? in lws_jwe_encrypt_rsa_aes_gcm() 146 !strcmp(jwe->jose.alg->alg, "RSA-OAEP") ? in lws_jwe_auth_and_decrypt_rsa_aes_gcm()
|
/third_party/ltp/testcases/kernel/device-drivers/zram/ |
H A D | zram_lib.sh | 141 for alg in $algs; do 143 echo "$alg" > $sys_path || \ 144 tst_brk TFAIL "can't set '$alg' to $sys_path" 145 tst_res TINFO "$sys_path = '$alg'"
|
/third_party/openssl/test/ |
H A D | filterprov.c | 30 OSSL_ALGORITHM alg[MAX_ALG_FILTERS + 1]; member 89 return globs->dispatch[i].alg; in filter_query() 109 if (globs->dispatch[i].alg == algs) in filter_unquery() 209 globs->dispatch[globs->num_dispatch].alg[algnum++] = *algs; in filter_provider_set_filter()
|
/kernel/linux/linux-5.10/drivers/crypto/chelsio/ |
H A D | chcr_algo.c | 169 struct aead_alg *alg = crypto_aead_alg(aead); in get_aead_subtype() local 171 container_of(alg, struct chcr_alg_template, alg.aead); in get_aead_subtype() 370 struct crypto_alg *alg = tfm->__crt_alg; in is_hmac() local 372 container_of(__crypto_ahash_alg(alg), struct chcr_alg_template, in is_hmac() 373 alg.hash); in is_hmac() 572 struct skcipher_alg *alg = crypto_skcipher_alg(tfm); in get_cryptoalg_subtype() local 574 container_of(alg, struct chcr_alg_template, alg.skcipher); in get_cryptoalg_subtype() 1475 struct skcipher_alg *alg in chcr_init_tfm() local 1494 struct skcipher_alg *alg = crypto_skcipher_alg(tfm); chcr_rfc3686_init() local 3257 struct aead_alg *alg = crypto_aead_alg(tfm); chcr_aead_cra_init() local [all...] |
/kernel/linux/linux-6.6/drivers/crypto/chelsio/ |
H A D | chcr_algo.c | 165 struct aead_alg *alg = crypto_aead_alg(aead); in get_aead_subtype() local 167 container_of(alg, struct chcr_alg_template, alg.aead); in get_aead_subtype() 366 struct crypto_alg *alg = tfm->__crt_alg; in is_hmac() local 368 container_of(__crypto_ahash_alg(alg), struct chcr_alg_template, in is_hmac() 369 alg.hash); in is_hmac() 568 struct skcipher_alg *alg = crypto_skcipher_alg(tfm); in get_cryptoalg_subtype() local 570 container_of(alg, struct chcr_alg_template, alg.skcipher); in get_cryptoalg_subtype() 1468 struct skcipher_alg *alg in chcr_init_tfm() local 1487 struct skcipher_alg *alg = crypto_skcipher_alg(tfm); chcr_rfc3686_init() local 3252 struct aead_alg *alg = crypto_aead_alg(tfm); chcr_aead_cra_init() local [all...] |
/kernel/linux/linux-6.6/drivers/firmware/cirrus/ |
H A D | cs_dsp.c | 475 ctl->offset, reg, ctl->fw_name, ctl->alg_region.alg, ctl->type, in cs_dsp_debugfs_read_controls_show() 698 cs_dsp_dbg(dsp, "Sending 0x%x to acked control alg 0x%x %s:0x%x\n", in cs_dsp_coeff_write_acked_control() 699 event_id, ctl->alg_region.alg, in cs_dsp_coeff_write_acked_control() 738 cs_dsp_warn(dsp, "Acked control @0x%x alg:0x%x %s:0x%x timed out\n", in cs_dsp_coeff_write_acked_control() 739 reg, ctl->alg_region.alg, in cs_dsp_coeff_write_acked_control() 955 "Failed to send 0x%x event to alg 0x%x (%d)\n", in cs_dsp_signal_event_controls() 956 event, ctl->alg_region.alg, ret); in cs_dsp_signal_event_controls() 978 ctl->alg_region.alg == alg_region->alg && in cs_dsp_create_control() 1245 alg_region.alg in cs_dsp_parse_coeff() 1518 cs_dsp_get_ctl(struct cs_dsp *dsp, const char *name, int type, unsigned int alg) cs_dsp_get_ctl() argument 1559 void *alg; cs_dsp_read_algs() local [all...] |
/kernel/linux/linux-5.10/fs/erofs/ |
H A D | decompressor.c | 237 const struct z_erofs_decompressor *alg = decompressors + rq->alg; in z_erofs_decompress_generic() local 260 ret = alg->decompress(rq, dst); in z_erofs_decompress_generic() 269 ret = alg->prepare_destpages(rq, pagepool); in z_erofs_decompress_generic() 294 ret = alg->decompress(rq, dst + rq->pageofs_out); in z_erofs_decompress_generic() 345 if (rq->alg == Z_EROFS_COMPRESSION_SHIFTED) in z_erofs_decompress()
|
/third_party/fsverity-utils/lib/ |
H A D | compute_digest.c | 41 next->filled += hash->alg->digest_size; in hash_one_block() 49 return block->filled + hash->alg->digest_size > block_size; in block_is_full() 109 const u32 hashes_per_block = block_size / hash->alg->digest_size; in compute_root_hash() 110 const u32 padded_salt_size = roundup(salt_size, hash->alg->block_size); in compute_root_hash() 123 memset(root_hash, 0, hash->alg->digest_size); in compute_root_hash() 222 if (WARN_ON(buffers[num_levels].filled != hash->alg->digest_size)) { in compute_root_hash()
|
/third_party/mbedtls/include/psa/ |
H A D | crypto_se_driver.h | 260 * \param[in] alg The algorithm to be used to underlie the MAC 275 psa_algorithm_t alg, 287 * \param[in] alg The algorithm to be used to underlie the MAC 304 psa_algorithm_t alg, 548 * \param[in] alg A signature algorithm that is compatible 561 psa_algorithm_t alg, 575 * \param[in] alg A signature algorithm that is compatible with 587 psa_algorithm_t alg, 600 * \param[in] alg An asymmetric encryption algorithm that is 625 psa_algorithm_t alg, [all...] |
/third_party/node/deps/openssl/openssl/apps/ |
H A D | dhparam.c | 182 const char *alg = dsaparam ? "DSA" : "DH"; in dhparam_main() local 188 ctx = EVP_PKEY_CTX_new_from_name(app_get0_libctx(), alg, app_get0_propq()); in dhparam_main() 192 alg); in dhparam_main() 199 alg, num, dsaparam ? "" : "safe "); in dhparam_main() 204 alg); in dhparam_main() 224 tmppkey = app_paramgen(ctx, alg); in dhparam_main()
|