/kernel/linux/linux-6.6/drivers/crypto/ |
H A D | sa2ul.c | 152 * @alg: Union of crypto algorithm definitions. 161 } alg; member 1301 struct crypto_alg *alg = req->base.tfm->__crt_alg; in sa_cipher_run() local 1307 if (req->cryptlen % alg->cra_blocksize) in sa_cipher_run() 1974 .alg.skcipher = { 1997 .alg.skcipher = { 2019 .alg.skcipher = { 2042 .alg.skcipher = { 2064 .alg.ahash = { 2093 .alg [all...] |
/kernel/linux/linux-5.10/drivers/staging/rtl8188eu/os_dep/ |
H A D | ioctl_linux.c | 353 param->u.crypt.alg[IEEE_CRYPT_ALG_NAME_LEN - 1] = '\0'; in wpa_set_encryption() 370 if (strcmp(param->u.crypt.alg, "WEP") == 0) { in wpa_set_encryption() 371 RT_TRACE(_module_rtl871x_ioctl_os_c, _drv_err_, ("%s, crypt.alg = WEP\n", __func__)); in wpa_set_encryption() 372 DBG_88E("%s, crypt.alg = WEP\n", __func__); in wpa_set_encryption() 437 if (strcmp(param->u.crypt.alg, "none") != 0) in wpa_set_encryption() 447 if (strcmp(param->u.crypt.alg, "TKIP") == 0) { /* set mic key */ in wpa_set_encryption() 473 if (strcmp(param->u.crypt.alg, "none") != 0) in wpa_set_encryption() 1861 switch (pext->alg) { in rtw_wx_set_enc_ext() 1881 strlcpy((char *)param->u.crypt.alg, alg_name, IEEE_CRYPT_ALG_NAME_LEN); in rtw_wx_set_enc_ext() 1889 if ((pext->alg ! in rtw_wx_set_enc_ext() 2086 set_group_key(struct adapter *padapter, u8 *key, u8 alg, int keyid) set_group_key() argument 2147 u8 alg; set_wep_key() local [all...] |
/test/xts/acts/security_lite/huks/common/ |
H A D | hks_test_cipher.c | 484 encryptStruct->cipherParms->setAlg, encryptStruct->cipherParms->alg,
in Encrypt() 509 encryptStruct->cipherParms->setAlg, encryptStruct->cipherParms->alg,
in Encrypt() 543 decryptStruct->cipherParms->decryptParamSetParams.alg,
in DecryptCipher() 557 decryptStruct->cipherParms->decryptParamSetParams.alg,
in DecryptCipher() 588 onlyDecryptStruct->cipherParms->setAlg, onlyDecryptStruct->cipherParms->alg,
in Decrypt() 613 onlyDecryptStruct->cipherParms->setAlg, onlyDecryptStruct->cipherParms->alg,
in Decrypt()
|
/device/soc/hisilicon/hi3516dv300/sdk_linux/drv/interdrv/common/cipher/src/drv/cipher_v1.0/drivers/extend/include/ |
H A D | ext_alg.h | 65 * brief SYMC alg and mode 131 * brief SYMC alg and mode 134 * param alg Symmetric cipher alg 139 hi_void ext_mbedtls_symc_setmode(hi_void *ctx, symc_alg alg, symc_mode mode, symc_width width); 204 * brief sm4 alg and mode 207 * param alg Symmetric cipher alg 212 hi_void ext_sm4_setmode(hi_void *ctx, symc_alg alg, symc_mode mode, symc_width width);
|
/device/soc/hisilicon/hi3861v100/sdk_liteos/include/ |
H A D | hks_client.h | 511 * @param alg [IN] type #const uint32_t,HMAC algorithm hks_alg_hmac(HKS_ALG_HASH_SHA_256) or 518 when alg is hks_alg_hmac(HKS_ALG_HASH_SHA_256), output->size must be greater than or 519 equal to 32 when alg is hks_alg_hmac(HKS_ALG_HASH_SHA_512), output->size must be greater than or equal to 64 521 当alg为hks_alg_hmac(HKS_ALG_HASH_SHA_256)时,output-> size必须大于或 522 当alg为hks_alg_hmac(HKS_ALG_HASH_SHA_512)时等于32,则output-> size必须大于或等于64。CNend 530 const uint32_t alg, const struct hks_blob *src_data, 543 * @param alg [IN] type #const uint32_t,Hash algorithm, Only spuuort SHA256/SHA512. 549 when alg is HKS_ALG_HASH_SHA_256, hash->size must be greater than or equal to 32 when alg is HKS_ALG_HASH_SHA_512, 551 CNcomment:生成的消息验证码,hash和hash-> data不能为null约束条件:当alg为HKS_ALG_HASH_SHA_25 [all...] |
/device/soc/hisilicon/hi3861v100/sdk_liteos/third_party/mbedtls/include/mbedtls/ |
H A D | asn1.h | 301 * \param alg The buffer to receive the OID 308 mbedtls_asn1_buf *alg, mbedtls_asn1_buf *params ); 318 * \param alg The buffer to receive the OID 324 mbedtls_asn1_buf *alg );
|
/kernel/linux/linux-5.10/lib/ |
H A D | crc-t10dif.c | 26 struct crypto_alg *alg = data; in crc_t10dif_notify() local 29 strcmp(alg->cra_name, CRC_T10DIF_STRING)) in crc_t10dif_notify()
|
/kernel/linux/linux-5.10/net/mac80211/ |
H A D | aead_api.c | 86 aead_key_setup_encrypt(const char *alg, const u8 key[], in aead_key_setup_encrypt() argument 92 tfm = crypto_alloc_aead(alg, 0, CRYPTO_ALG_ASYNC); in aead_key_setup_encrypt()
|
/kernel/linux/linux-5.10/include/linux/crush/ |
H A D | crush.h | 120 extern const char *crush_bucket_alg_name(int alg); 134 __u8 alg; /* one of CRUSH_BUCKET_* */ member
|
/kernel/linux/linux-6.6/fs/verity/ |
H A D | fsverity_private.h | 93 const u8 *fsverity_prepare_hash_state(const struct fsverity_hash_alg *alg, 97 int fsverity_hash_buffer(const struct fsverity_hash_alg *alg,
|
/kernel/linux/linux-6.6/include/linux/crush/ |
H A D | crush.h | 120 extern const char *crush_bucket_alg_name(int alg); 134 __u8 alg; /* one of CRUSH_BUCKET_* */ member
|
/kernel/linux/linux-6.6/lib/ |
H A D | crc-t10dif.c | 26 struct crypto_alg *alg = data; in crc_t10dif_notify() local 29 strcmp(alg->cra_name, CRC_T10DIF_STRING)) in crc_t10dif_notify()
|
H A D | crc64-rocksoft.c | 20 struct crypto_alg *alg = data; in crc64_rocksoft_notify() local 23 strcmp(alg->cra_name, CRC64_ROCKSOFT_STRING)) in crc64_rocksoft_notify()
|
/kernel/linux/linux-6.6/net/mac80211/ |
H A D | aead_api.c | 86 aead_key_setup_encrypt(const char *alg, const u8 key[], in aead_key_setup_encrypt() argument 92 tfm = crypto_alloc_aead(alg, 0, CRYPTO_ALG_ASYNC); in aead_key_setup_encrypt()
|
/third_party/mbedtls/include/mbedtls/ |
H A D | asn1.h | 556 * \param alg The buffer to receive the OID. 564 mbedtls_asn1_buf *alg, mbedtls_asn1_buf *params); 577 * \param alg The buffer to receive the OID. 583 mbedtls_asn1_buf *alg);
|
/third_party/node/lib/internal/crypto/ |
H A D | mac.js | 140 if (keyData.alg !== undefined) { 141 if (keyData.alg !== getAlgorithmName(algorithm.hash.name)) 143 'JWK "alg" does not match the requested algorithm',
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/drivers/ |
H A D | driver_openbsd.c | 72 wpa_driver_openbsd_set_key(const char *ifname, void *priv, enum wpa_alg alg, in wpa_driver_openbsd_set_key() argument 79 if (alg != WPA_ALG_PMK || key_len > IEEE80211_PMK_LEN) in wpa_driver_openbsd_set_key()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/ |
H A D | ap_mlme.c | 23 static const char * mlme_auth_alg_str(int alg) in mlme_auth_alg_str() argument 25 switch (alg) { in mlme_auth_alg_str()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/ |
H A D | ap_mlme.c | 23 static const char * mlme_auth_alg_str(int alg) in mlme_auth_alg_str() argument 25 switch (alg) { in mlme_auth_alg_str()
|
/third_party/mbedtls/library/ |
H A D | ssl_tls.c | 2247 psa_algorithm_t alg = PSA_ALG_NONE; in mbedtls_ssl_set_hs_psk() local 2265 alg = PSA_ALG_TLS12_PSK_TO_MS(PSA_ALG_SHA_384); in mbedtls_ssl_set_hs_psk() 2267 alg = PSA_ALG_TLS12_PSK_TO_MS(PSA_ALG_SHA_256); in mbedtls_ssl_set_hs_psk() 2275 alg = PSA_ALG_HKDF_EXTRACT(PSA_ALG_ANY_HASH); in mbedtls_ssl_set_hs_psk() 2281 psa_set_key_algorithm(&key_attributes, alg); in mbedtls_ssl_set_hs_psk() 2362 psa_algorithm_t alg) in mbedtls_ssl_get_base_mode() 2365 if (alg == PSA_ALG_CBC_NO_PADDING) { in mbedtls_ssl_get_base_mode() 2369 if (PSA_ALG_IS_AEAD(alg)) { in mbedtls_ssl_get_base_mode() 2443 psa_algorithm_t alg; in mbedtls_ssl_get_mode_from_ciphersuite() local 2447 0, &alg, in mbedtls_ssl_get_mode_from_ciphersuite() 2361 mbedtls_ssl_get_base_mode( psa_algorithm_t alg) mbedtls_ssl_get_base_mode() argument 2469 mbedtls_ssl_cipher_to_psa(mbedtls_cipher_type_t mbedtls_cipher_type, size_t taglen, psa_algorithm_t *alg, psa_key_type_t *key_type, size_t *key_size) mbedtls_ssl_cipher_to_psa() argument 6679 setup_psa_key_derivation(psa_key_derivation_operation_t *derivation, mbedtls_svc_key_id_t key, psa_algorithm_t alg, const unsigned char *raw_psk, size_t raw_psk_length, const unsigned char *seed, size_t seed_length, const unsigned char *label, size_t label_length, const unsigned char *other_secret, size_t other_secret_length, size_t capacity) setup_psa_key_derivation() argument 6753 psa_algorithm_t alg; tls_prf_generic() local 7070 psa_algorithm_t alg; ssl_compute_master() local 7139 psa_algorithm_t alg = PSA_ALG_TLS12_ECJPAKE_TO_PMS; ssl_compute_master() local 8820 psa_algorithm_t alg; ssl_tls12_populate_transform() local [all...] |
H A D | cipher.c | 271 psa_algorithm_t alg; in mbedtls_cipher_setup_psa() local 280 alg = mbedtls_psa_translate_cipher_mode(((mbedtls_cipher_mode_t) cipher_info->mode), taglen); in mbedtls_cipher_setup_psa() 281 if (alg == 0) { in mbedtls_cipher_setup_psa() 294 cipher_psa->alg = alg; in mbedtls_cipher_setup_psa() 354 psa_set_key_algorithm(&attributes, cipher_psa->alg); in mbedtls_cipher_setkey() 1331 cipher_psa->alg); in mbedtls_cipher_crypt() 1335 cipher_psa->alg); in mbedtls_cipher_crypt() 1428 cipher_psa->alg, in mbedtls_cipher_aead_encrypt() 1505 cipher_psa->alg, in mbedtls_cipher_aead_decrypt() [all...] |
/third_party/node/deps/openssl/openssl/providers/implementations/keymgmt/ |
H A D | ecx_kmgmt.c | 797 #define MAKE_KEYMGMT_FUNCTIONS(alg) \ 798 const OSSL_DISPATCH ossl_##alg##_keymgmt_functions[] = { \ 799 { OSSL_FUNC_KEYMGMT_NEW, (void (*)(void))alg##_new_key }, \ 801 { OSSL_FUNC_KEYMGMT_GET_PARAMS, (void (*) (void))alg##_get_params }, \ 802 { OSSL_FUNC_KEYMGMT_GETTABLE_PARAMS, (void (*) (void))alg##_gettable_params }, \ 803 { OSSL_FUNC_KEYMGMT_SET_PARAMS, (void (*) (void))alg##_set_params }, \ 804 { OSSL_FUNC_KEYMGMT_SETTABLE_PARAMS, (void (*) (void))alg##_settable_params }, \ 807 { OSSL_FUNC_KEYMGMT_VALIDATE, (void (*)(void))alg##_validate }, \ 812 { OSSL_FUNC_KEYMGMT_GEN_INIT, (void (*)(void))alg##_gen_init }, \ 816 { OSSL_FUNC_KEYMGMT_GEN, (void (*)(void))alg##_ge [all...] |
/third_party/openssl/providers/implementations/keymgmt/ |
H A D | ecx_kmgmt.c | 794 #define MAKE_KEYMGMT_FUNCTIONS(alg) \ 795 const OSSL_DISPATCH ossl_##alg##_keymgmt_functions[] = { \ 796 { OSSL_FUNC_KEYMGMT_NEW, (void (*)(void))alg##_new_key }, \ 798 { OSSL_FUNC_KEYMGMT_GET_PARAMS, (void (*) (void))alg##_get_params }, \ 799 { OSSL_FUNC_KEYMGMT_GETTABLE_PARAMS, (void (*) (void))alg##_gettable_params }, \ 800 { OSSL_FUNC_KEYMGMT_SET_PARAMS, (void (*) (void))alg##_set_params }, \ 801 { OSSL_FUNC_KEYMGMT_SETTABLE_PARAMS, (void (*) (void))alg##_settable_params }, \ 804 { OSSL_FUNC_KEYMGMT_VALIDATE, (void (*)(void))alg##_validate }, \ 809 { OSSL_FUNC_KEYMGMT_GEN_INIT, (void (*)(void))alg##_gen_init }, \ 813 { OSSL_FUNC_KEYMGMT_GEN, (void (*)(void))alg##_ge [all...] |
/kernel/linux/linux-5.10/crypto/ |
H A D | drbg.c | 2047 static inline void __init drbg_fill_array(struct rng_alg *alg, in drbg_fill_array() argument 2053 memcpy(alg->base.cra_name, "stdrng", 6); in drbg_fill_array() 2055 memcpy(alg->base.cra_driver_name, "drbg_pr_", 8); in drbg_fill_array() 2058 memcpy(alg->base.cra_driver_name, "drbg_nopr_", 10); in drbg_fill_array() 2061 memcpy(alg->base.cra_driver_name + pos, core->cra_name, in drbg_fill_array() 2064 alg->base.cra_priority = priority; in drbg_fill_array() 2072 alg->base.cra_priority += 200; in drbg_fill_array() 2074 alg->base.cra_ctxsize = sizeof(struct drbg_state); in drbg_fill_array() 2075 alg->base.cra_module = THIS_MODULE; in drbg_fill_array() 2076 alg in drbg_fill_array() [all...] |
/kernel/linux/linux-6.6/drivers/crypto/marvell/octeontx2/ |
H A D | otx2_cptvf_algs.c | 512 struct crypto_alg *alg) in cpt_skcipher_fallback_init() 514 if (alg->cra_flags & CRYPTO_ALG_NEED_FALLBACK) { in cpt_skcipher_fallback_init() 516 crypto_alloc_skcipher(alg->cra_name, 0, in cpt_skcipher_fallback_init() 521 __func__, alg->cra_name); in cpt_skcipher_fallback_init() 532 struct crypto_alg *alg = tfm->__crt_alg; in otx2_cpt_enc_dec_init() local 544 return cpt_skcipher_fallback_init(ctx, alg); in otx2_cpt_enc_dec_init() 558 struct crypto_alg *alg) in cpt_aead_fallback_init() 560 if (alg->cra_flags & CRYPTO_ALG_NEED_FALLBACK) { in cpt_aead_fallback_init() 562 crypto_alloc_aead(alg->cra_name, 0, in cpt_aead_fallback_init() 567 __func__, alg in cpt_aead_fallback_init() 511 cpt_skcipher_fallback_init(struct otx2_cpt_enc_ctx *ctx, struct crypto_alg *alg) cpt_skcipher_fallback_init() argument 557 cpt_aead_fallback_init(struct otx2_cpt_aead_ctx *ctx, struct crypto_alg *alg) cpt_aead_fallback_init() argument 578 struct crypto_alg *alg = tfm->__crt_alg; cpt_aead_init() local 734 alloc_sdesc(struct crypto_shash *alg) alloc_sdesc() argument [all...] |