Home
last modified time | relevance | path

Searched refs:alg (Results 576 - 600 of 1138) sorted by relevance

1...<<21222324252627282930>>...46

/kernel/linux/linux-6.6/drivers/crypto/
H A Dsa2ul.c152 * @alg: Union of crypto algorithm definitions.
161 } alg; member
1301 struct crypto_alg *alg = req->base.tfm->__crt_alg; in sa_cipher_run() local
1307 if (req->cryptlen % alg->cra_blocksize) in sa_cipher_run()
1974 .alg.skcipher = {
1997 .alg.skcipher = {
2019 .alg.skcipher = {
2042 .alg.skcipher = {
2064 .alg.ahash = {
2093 .alg
[all...]
/kernel/linux/linux-5.10/drivers/staging/rtl8188eu/os_dep/
H A Dioctl_linux.c353 param->u.crypt.alg[IEEE_CRYPT_ALG_NAME_LEN - 1] = '\0'; in wpa_set_encryption()
370 if (strcmp(param->u.crypt.alg, "WEP") == 0) { in wpa_set_encryption()
371 RT_TRACE(_module_rtl871x_ioctl_os_c, _drv_err_, ("%s, crypt.alg = WEP\n", __func__)); in wpa_set_encryption()
372 DBG_88E("%s, crypt.alg = WEP\n", __func__); in wpa_set_encryption()
437 if (strcmp(param->u.crypt.alg, "none") != 0) in wpa_set_encryption()
447 if (strcmp(param->u.crypt.alg, "TKIP") == 0) { /* set mic key */ in wpa_set_encryption()
473 if (strcmp(param->u.crypt.alg, "none") != 0) in wpa_set_encryption()
1861 switch (pext->alg) { in rtw_wx_set_enc_ext()
1881 strlcpy((char *)param->u.crypt.alg, alg_name, IEEE_CRYPT_ALG_NAME_LEN); in rtw_wx_set_enc_ext()
1889 if ((pext->alg ! in rtw_wx_set_enc_ext()
2086 set_group_key(struct adapter *padapter, u8 *key, u8 alg, int keyid) set_group_key() argument
2147 u8 alg; set_wep_key() local
[all...]
/test/xts/acts/security_lite/huks/common/
H A Dhks_test_cipher.c484 encryptStruct->cipherParms->setAlg, encryptStruct->cipherParms->alg, in Encrypt()
509 encryptStruct->cipherParms->setAlg, encryptStruct->cipherParms->alg, in Encrypt()
543 decryptStruct->cipherParms->decryptParamSetParams.alg, in DecryptCipher()
557 decryptStruct->cipherParms->decryptParamSetParams.alg, in DecryptCipher()
588 onlyDecryptStruct->cipherParms->setAlg, onlyDecryptStruct->cipherParms->alg, in Decrypt()
613 onlyDecryptStruct->cipherParms->setAlg, onlyDecryptStruct->cipherParms->alg, in Decrypt()
/device/soc/hisilicon/hi3516dv300/sdk_linux/drv/interdrv/common/cipher/src/drv/cipher_v1.0/drivers/extend/include/
H A Dext_alg.h65 * brief SYMC alg and mode
131 * brief SYMC alg and mode
134 * param alg Symmetric cipher alg
139 hi_void ext_mbedtls_symc_setmode(hi_void *ctx, symc_alg alg, symc_mode mode, symc_width width);
204 * brief sm4 alg and mode
207 * param alg Symmetric cipher alg
212 hi_void ext_sm4_setmode(hi_void *ctx, symc_alg alg, symc_mode mode, symc_width width);
/device/soc/hisilicon/hi3861v100/sdk_liteos/include/
H A Dhks_client.h511 * @param alg [IN] type #const uint32_t,HMAC algorithm hks_alg_hmac(HKS_ALG_HASH_SHA_256) or
518 when alg is hks_alg_hmac(HKS_ALG_HASH_SHA_256), output->size must be greater than or
519 equal to 32 when alg is hks_alg_hmac(HKS_ALG_HASH_SHA_512), output->size must be greater than or equal to 64
521alg为hks_alg_hmac(HKS_ALG_HASH_SHA_256)时,output-> size必须大于或
522alg为hks_alg_hmac(HKS_ALG_HASH_SHA_512)时等于32,则output-> size必须大于或等于64。CNend
530 const uint32_t alg, const struct hks_blob *src_data,
543 * @param alg [IN] type #const uint32_t,Hash algorithm, Only spuuort SHA256/SHA512.
549 when alg is HKS_ALG_HASH_SHA_256, hash->size must be greater than or equal to 32 when alg is HKS_ALG_HASH_SHA_512,
551 CNcomment:生成的消息验证码,hash和hash-> data不能为null约束条件:当alg为HKS_ALG_HASH_SHA_25
[all...]
/device/soc/hisilicon/hi3861v100/sdk_liteos/third_party/mbedtls/include/mbedtls/
H A Dasn1.h301 * \param alg The buffer to receive the OID
308 mbedtls_asn1_buf *alg, mbedtls_asn1_buf *params );
318 * \param alg The buffer to receive the OID
324 mbedtls_asn1_buf *alg );
/kernel/linux/linux-5.10/lib/
H A Dcrc-t10dif.c26 struct crypto_alg *alg = data; in crc_t10dif_notify() local
29 strcmp(alg->cra_name, CRC_T10DIF_STRING)) in crc_t10dif_notify()
/kernel/linux/linux-5.10/net/mac80211/
H A Daead_api.c86 aead_key_setup_encrypt(const char *alg, const u8 key[], in aead_key_setup_encrypt() argument
92 tfm = crypto_alloc_aead(alg, 0, CRYPTO_ALG_ASYNC); in aead_key_setup_encrypt()
/kernel/linux/linux-5.10/include/linux/crush/
H A Dcrush.h120 extern const char *crush_bucket_alg_name(int alg);
134 __u8 alg; /* one of CRUSH_BUCKET_* */ member
/kernel/linux/linux-6.6/fs/verity/
H A Dfsverity_private.h93 const u8 *fsverity_prepare_hash_state(const struct fsverity_hash_alg *alg,
97 int fsverity_hash_buffer(const struct fsverity_hash_alg *alg,
/kernel/linux/linux-6.6/include/linux/crush/
H A Dcrush.h120 extern const char *crush_bucket_alg_name(int alg);
134 __u8 alg; /* one of CRUSH_BUCKET_* */ member
/kernel/linux/linux-6.6/lib/
H A Dcrc-t10dif.c26 struct crypto_alg *alg = data; in crc_t10dif_notify() local
29 strcmp(alg->cra_name, CRC_T10DIF_STRING)) in crc_t10dif_notify()
H A Dcrc64-rocksoft.c20 struct crypto_alg *alg = data; in crc64_rocksoft_notify() local
23 strcmp(alg->cra_name, CRC64_ROCKSOFT_STRING)) in crc64_rocksoft_notify()
/kernel/linux/linux-6.6/net/mac80211/
H A Daead_api.c86 aead_key_setup_encrypt(const char *alg, const u8 key[], in aead_key_setup_encrypt() argument
92 tfm = crypto_alloc_aead(alg, 0, CRYPTO_ALG_ASYNC); in aead_key_setup_encrypt()
/third_party/mbedtls/include/mbedtls/
H A Dasn1.h556 * \param alg The buffer to receive the OID.
564 mbedtls_asn1_buf *alg, mbedtls_asn1_buf *params);
577 * \param alg The buffer to receive the OID.
583 mbedtls_asn1_buf *alg);
/third_party/node/lib/internal/crypto/
H A Dmac.js140 if (keyData.alg !== undefined) {
141 if (keyData.alg !== getAlgorithmName(algorithm.hash.name))
143 'JWK "alg" does not match the requested algorithm',
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/drivers/
H A Ddriver_openbsd.c72 wpa_driver_openbsd_set_key(const char *ifname, void *priv, enum wpa_alg alg, in wpa_driver_openbsd_set_key() argument
79 if (alg != WPA_ALG_PMK || key_len > IEEE80211_PMK_LEN) in wpa_driver_openbsd_set_key()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/
H A Dap_mlme.c23 static const char * mlme_auth_alg_str(int alg) in mlme_auth_alg_str() argument
25 switch (alg) { in mlme_auth_alg_str()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/
H A Dap_mlme.c23 static const char * mlme_auth_alg_str(int alg) in mlme_auth_alg_str() argument
25 switch (alg) { in mlme_auth_alg_str()
/third_party/mbedtls/library/
H A Dssl_tls.c2247 psa_algorithm_t alg = PSA_ALG_NONE; in mbedtls_ssl_set_hs_psk() local
2265 alg = PSA_ALG_TLS12_PSK_TO_MS(PSA_ALG_SHA_384); in mbedtls_ssl_set_hs_psk()
2267 alg = PSA_ALG_TLS12_PSK_TO_MS(PSA_ALG_SHA_256); in mbedtls_ssl_set_hs_psk()
2275 alg = PSA_ALG_HKDF_EXTRACT(PSA_ALG_ANY_HASH); in mbedtls_ssl_set_hs_psk()
2281 psa_set_key_algorithm(&key_attributes, alg); in mbedtls_ssl_set_hs_psk()
2362 psa_algorithm_t alg) in mbedtls_ssl_get_base_mode()
2365 if (alg == PSA_ALG_CBC_NO_PADDING) { in mbedtls_ssl_get_base_mode()
2369 if (PSA_ALG_IS_AEAD(alg)) { in mbedtls_ssl_get_base_mode()
2443 psa_algorithm_t alg; in mbedtls_ssl_get_mode_from_ciphersuite() local
2447 0, &alg, in mbedtls_ssl_get_mode_from_ciphersuite()
2361 mbedtls_ssl_get_base_mode( psa_algorithm_t alg) mbedtls_ssl_get_base_mode() argument
2469 mbedtls_ssl_cipher_to_psa(mbedtls_cipher_type_t mbedtls_cipher_type, size_t taglen, psa_algorithm_t *alg, psa_key_type_t *key_type, size_t *key_size) mbedtls_ssl_cipher_to_psa() argument
6679 setup_psa_key_derivation(psa_key_derivation_operation_t *derivation, mbedtls_svc_key_id_t key, psa_algorithm_t alg, const unsigned char *raw_psk, size_t raw_psk_length, const unsigned char *seed, size_t seed_length, const unsigned char *label, size_t label_length, const unsigned char *other_secret, size_t other_secret_length, size_t capacity) setup_psa_key_derivation() argument
6753 psa_algorithm_t alg; tls_prf_generic() local
7070 psa_algorithm_t alg; ssl_compute_master() local
7139 psa_algorithm_t alg = PSA_ALG_TLS12_ECJPAKE_TO_PMS; ssl_compute_master() local
8820 psa_algorithm_t alg; ssl_tls12_populate_transform() local
[all...]
H A Dcipher.c271 psa_algorithm_t alg; in mbedtls_cipher_setup_psa() local
280 alg = mbedtls_psa_translate_cipher_mode(((mbedtls_cipher_mode_t) cipher_info->mode), taglen); in mbedtls_cipher_setup_psa()
281 if (alg == 0) { in mbedtls_cipher_setup_psa()
294 cipher_psa->alg = alg; in mbedtls_cipher_setup_psa()
354 psa_set_key_algorithm(&attributes, cipher_psa->alg); in mbedtls_cipher_setkey()
1331 cipher_psa->alg); in mbedtls_cipher_crypt()
1335 cipher_psa->alg); in mbedtls_cipher_crypt()
1428 cipher_psa->alg, in mbedtls_cipher_aead_encrypt()
1505 cipher_psa->alg, in mbedtls_cipher_aead_decrypt()
[all...]
/third_party/node/deps/openssl/openssl/providers/implementations/keymgmt/
H A Decx_kmgmt.c797 #define MAKE_KEYMGMT_FUNCTIONS(alg) \
798 const OSSL_DISPATCH ossl_##alg##_keymgmt_functions[] = { \
799 { OSSL_FUNC_KEYMGMT_NEW, (void (*)(void))alg##_new_key }, \
801 { OSSL_FUNC_KEYMGMT_GET_PARAMS, (void (*) (void))alg##_get_params }, \
802 { OSSL_FUNC_KEYMGMT_GETTABLE_PARAMS, (void (*) (void))alg##_gettable_params }, \
803 { OSSL_FUNC_KEYMGMT_SET_PARAMS, (void (*) (void))alg##_set_params }, \
804 { OSSL_FUNC_KEYMGMT_SETTABLE_PARAMS, (void (*) (void))alg##_settable_params }, \
807 { OSSL_FUNC_KEYMGMT_VALIDATE, (void (*)(void))alg##_validate }, \
812 { OSSL_FUNC_KEYMGMT_GEN_INIT, (void (*)(void))alg##_gen_init }, \
816 { OSSL_FUNC_KEYMGMT_GEN, (void (*)(void))alg##_ge
[all...]
/third_party/openssl/providers/implementations/keymgmt/
H A Decx_kmgmt.c794 #define MAKE_KEYMGMT_FUNCTIONS(alg) \
795 const OSSL_DISPATCH ossl_##alg##_keymgmt_functions[] = { \
796 { OSSL_FUNC_KEYMGMT_NEW, (void (*)(void))alg##_new_key }, \
798 { OSSL_FUNC_KEYMGMT_GET_PARAMS, (void (*) (void))alg##_get_params }, \
799 { OSSL_FUNC_KEYMGMT_GETTABLE_PARAMS, (void (*) (void))alg##_gettable_params }, \
800 { OSSL_FUNC_KEYMGMT_SET_PARAMS, (void (*) (void))alg##_set_params }, \
801 { OSSL_FUNC_KEYMGMT_SETTABLE_PARAMS, (void (*) (void))alg##_settable_params }, \
804 { OSSL_FUNC_KEYMGMT_VALIDATE, (void (*)(void))alg##_validate }, \
809 { OSSL_FUNC_KEYMGMT_GEN_INIT, (void (*)(void))alg##_gen_init }, \
813 { OSSL_FUNC_KEYMGMT_GEN, (void (*)(void))alg##_ge
[all...]
/kernel/linux/linux-5.10/crypto/
H A Ddrbg.c2047 static inline void __init drbg_fill_array(struct rng_alg *alg, in drbg_fill_array() argument
2053 memcpy(alg->base.cra_name, "stdrng", 6); in drbg_fill_array()
2055 memcpy(alg->base.cra_driver_name, "drbg_pr_", 8); in drbg_fill_array()
2058 memcpy(alg->base.cra_driver_name, "drbg_nopr_", 10); in drbg_fill_array()
2061 memcpy(alg->base.cra_driver_name + pos, core->cra_name, in drbg_fill_array()
2064 alg->base.cra_priority = priority; in drbg_fill_array()
2072 alg->base.cra_priority += 200; in drbg_fill_array()
2074 alg->base.cra_ctxsize = sizeof(struct drbg_state); in drbg_fill_array()
2075 alg->base.cra_module = THIS_MODULE; in drbg_fill_array()
2076 alg in drbg_fill_array()
[all...]
/kernel/linux/linux-6.6/drivers/crypto/marvell/octeontx2/
H A Dotx2_cptvf_algs.c512 struct crypto_alg *alg) in cpt_skcipher_fallback_init()
514 if (alg->cra_flags & CRYPTO_ALG_NEED_FALLBACK) { in cpt_skcipher_fallback_init()
516 crypto_alloc_skcipher(alg->cra_name, 0, in cpt_skcipher_fallback_init()
521 __func__, alg->cra_name); in cpt_skcipher_fallback_init()
532 struct crypto_alg *alg = tfm->__crt_alg; in otx2_cpt_enc_dec_init() local
544 return cpt_skcipher_fallback_init(ctx, alg); in otx2_cpt_enc_dec_init()
558 struct crypto_alg *alg) in cpt_aead_fallback_init()
560 if (alg->cra_flags & CRYPTO_ALG_NEED_FALLBACK) { in cpt_aead_fallback_init()
562 crypto_alloc_aead(alg->cra_name, 0, in cpt_aead_fallback_init()
567 __func__, alg in cpt_aead_fallback_init()
511 cpt_skcipher_fallback_init(struct otx2_cpt_enc_ctx *ctx, struct crypto_alg *alg) cpt_skcipher_fallback_init() argument
557 cpt_aead_fallback_init(struct otx2_cpt_aead_ctx *ctx, struct crypto_alg *alg) cpt_aead_fallback_init() argument
578 struct crypto_alg *alg = tfm->__crt_alg; cpt_aead_init() local
734 alloc_sdesc(struct crypto_shash *alg) alloc_sdesc() argument
[all...]

Completed in 30 milliseconds

1...<<21222324252627282930>>...46