/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
H A D | crypto_linux.c | 57 static int linux_af_alg_hash_vector(const char *alg, const u8 *key, in linux_af_alg_hash_vector() argument 67 s = linux_af_alg_socket("hash", alg); in linux_af_alg_hash_vector() 239 struct crypto_hash * crypto_hash_init(enum crypto_hash_alg alg, const u8 *key, in crypto_hash_init() argument 249 switch (alg) { in crypto_hash_init() 415 linux_af_alg_skcipher(const char *alg, const u8 *key, size_t key_len) in linux_af_alg_skcipher() argument 424 skcipher->s = linux_af_alg_socket("skcipher", alg); in linux_af_alg_skcipher() 858 struct crypto_cipher * crypto_cipher_init(enum crypto_cipher_alg alg, in crypto_cipher_init() argument 875 switch (alg) { in crypto_cipher_init()
|
/kernel/linux/linux-5.10/drivers/net/wireless/intersil/orinoco/ |
H A D | wext.c | 31 enum orinoco_alg alg, const u8 *key, int key_len, in orinoco_set_key() 59 switch (alg) { in orinoco_set_key() 727 int idx, alg = ext->alg, set_key = 1; in orinoco_ioctl_set_encodeext() local 744 alg = IW_ENCODE_ALG_NONE; in orinoco_ioctl_set_encodeext() 746 if (priv->has_wpa && (alg != IW_ENCODE_ALG_TKIP)) { in orinoco_ioctl_set_encodeext() 753 set_key = ((alg == IW_ENCODE_ALG_TKIP) || in orinoco_ioctl_set_encodeext() 759 switch (alg) { in orinoco_ioctl_set_encodeext() 846 ext->alg = IW_ENCODE_ALG_NONE; in orinoco_ioctl_get_encodeext() 851 ext->alg in orinoco_ioctl_get_encodeext() 30 orinoco_set_key(struct orinoco_private *priv, int index, enum orinoco_alg alg, const u8 *key, int key_len, const u8 *seq, int seq_len) orinoco_set_key() argument [all...] |
/kernel/linux/linux-6.6/drivers/net/wireless/intersil/orinoco/ |
H A D | wext.c | 31 enum orinoco_alg alg, const u8 *key, int key_len, in orinoco_set_key() 59 switch (alg) { in orinoco_set_key() 741 int idx, alg = ext->alg, set_key = 1; in orinoco_ioctl_set_encodeext() local 758 alg = IW_ENCODE_ALG_NONE; in orinoco_ioctl_set_encodeext() 760 if (priv->has_wpa && (alg != IW_ENCODE_ALG_TKIP)) { in orinoco_ioctl_set_encodeext() 767 set_key = ((alg == IW_ENCODE_ALG_TKIP) || in orinoco_ioctl_set_encodeext() 773 switch (alg) { in orinoco_ioctl_set_encodeext() 860 ext->alg = IW_ENCODE_ALG_NONE; in orinoco_ioctl_get_encodeext() 865 ext->alg in orinoco_ioctl_get_encodeext() 30 orinoco_set_key(struct orinoco_private *priv, int index, enum orinoco_alg alg, const u8 *key, int key_len, const u8 *seq, int seq_len) orinoco_set_key() argument [all...] |
/third_party/mbedtls/library/ |
H A D | pk_wrap.c | 168 int mbedtls_pk_psa_rsa_sign_ext(psa_algorithm_t alg, in mbedtls_pk_psa_rsa_sign_ext() argument 200 psa_set_key_algorithm(&attributes, alg); in mbedtls_pk_psa_rsa_sign_ext() 210 status = psa_sign_hash(key_id, alg, hash, hash_len, in mbedtls_pk_psa_rsa_sign_ext() 1473 psa_algorithm_t alg; in rsa_opaque_decrypt() local 1487 alg = psa_get_key_algorithm(&attributes); in rsa_opaque_decrypt() 1494 status = psa_asymmetric_decrypt(pk->priv_id, alg, input, ilen, NULL, 0, output, osize, olen); in rsa_opaque_decrypt() 1510 psa_algorithm_t alg; in rsa_opaque_sign_wrap() local 1524 alg = psa_get_key_algorithm(&attributes); in rsa_opaque_sign_wrap() 1528 alg = (alg in rsa_opaque_sign_wrap() [all...] |
/base/security/crypto_framework/test/unittest/src/ |
H A D | crypto_dsa_verify_test.cpp | 72 const char *alg = verify->getAlgoName(verify); in HWTEST_F() local 73 ASSERT_STREQ(alg, "DSA2048|NoHash"); in HWTEST_F()
|
/base/security/dlp_permission_service/interfaces/inner_api/dlp_parse/include/ |
H A D | dlp_crypt.h | 121 int32_t DlpOpensslHash(uint32_t alg, const struct DlpBlob* msg, struct DlpBlob* hash); 123 int32_t DlpOpensslHashInit(void** cryptoCtx, uint32_t alg);
|
/base/security/huks/interfaces/inner_api/huks_lite/ |
H A D | hks_client.h | 260 * alg: hks_alg_hmac(HKS_ALG_HASH_SHA_256) or 264 * when alg is hks_alg_hmac(HKS_ALG_HASH_SHA_256), output->size must be 266 * when alg is hks_alg_hmac(HKS_ALG_HASH_SHA_512), output->size must be 271 const uint32_t alg, const struct hks_blob *src_data, 276 * alg: Hash algorithm, Only spuuort SHA256/SHA512 280 * when alg is HKS_ALG_HASH_SHA_256, hash->size must be 282 * when alg is HKS_ALG_HASH_SHA_512, hash->size must be 286 HKS_DLL_API_PUBLIC int32_t hks_hash(const uint32_t alg,
|
/base/security/huks/utils/crypto_adapter/ |
H A D | hks_client_service_adapter_common.c | 51 static int32_t TranslateToInnerCurve25519Format(const uint32_t alg, const struct HksBlob *key,
in TranslateToInnerCurve25519Format() argument 65 curve25519Key->keyAlg = (enum HksKeyAlg)alg;
in TranslateToInnerCurve25519Format() 121 HKS_IF_NOT_SUCC_LOGE_RETURN(ret, HKS_ERROR_CHECK_GET_ALG_FAIL, "get alg param failed")
in GetHksPubKeyInnerFormat()
|
/kernel/linux/linux-5.10/lib/ |
H A D | crc-t10dif.c | 26 struct crypto_alg *alg = data; in crc_t10dif_notify() local 29 strcmp(alg->cra_name, CRC_T10DIF_STRING)) in crc_t10dif_notify()
|
/kernel/linux/linux-5.10/net/mac80211/ |
H A D | aead_api.c | 86 aead_key_setup_encrypt(const char *alg, const u8 key[], in aead_key_setup_encrypt() argument 92 tfm = crypto_alloc_aead(alg, 0, CRYPTO_ALG_ASYNC); in aead_key_setup_encrypt()
|
/kernel/linux/linux-5.10/include/linux/crush/ |
H A D | crush.h | 120 extern const char *crush_bucket_alg_name(int alg); 134 __u8 alg; /* one of CRUSH_BUCKET_* */ member
|
/kernel/linux/linux-6.6/fs/verity/ |
H A D | fsverity_private.h | 93 const u8 *fsverity_prepare_hash_state(const struct fsverity_hash_alg *alg, 97 int fsverity_hash_buffer(const struct fsverity_hash_alg *alg,
|
/kernel/linux/linux-6.6/include/linux/crush/ |
H A D | crush.h | 120 extern const char *crush_bucket_alg_name(int alg); 134 __u8 alg; /* one of CRUSH_BUCKET_* */ member
|
/kernel/linux/linux-6.6/lib/ |
H A D | crc-t10dif.c | 26 struct crypto_alg *alg = data; in crc_t10dif_notify() local 29 strcmp(alg->cra_name, CRC_T10DIF_STRING)) in crc_t10dif_notify()
|
H A D | crc64-rocksoft.c | 20 struct crypto_alg *alg = data; in crc64_rocksoft_notify() local 23 strcmp(alg->cra_name, CRC64_ROCKSOFT_STRING)) in crc64_rocksoft_notify()
|
/kernel/linux/linux-6.6/net/mac80211/ |
H A D | aead_api.c | 86 aead_key_setup_encrypt(const char *alg, const u8 key[], in aead_key_setup_encrypt() argument 92 tfm = crypto_alloc_aead(alg, 0, CRYPTO_ALG_ASYNC); in aead_key_setup_encrypt()
|
/third_party/mbedtls/include/mbedtls/ |
H A D | asn1.h | 556 * \param alg The buffer to receive the OID. 564 mbedtls_asn1_buf *alg, mbedtls_asn1_buf *params); 577 * \param alg The buffer to receive the OID. 583 mbedtls_asn1_buf *alg);
|
/third_party/node/lib/internal/crypto/ |
H A D | mac.js | 140 if (keyData.alg !== undefined) { 141 if (keyData.alg !== getAlgorithmName(algorithm.hash.name)) 143 'JWK "alg" does not match the requested algorithm',
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/drivers/ |
H A D | driver_openbsd.c | 72 wpa_driver_openbsd_set_key(const char *ifname, void *priv, enum wpa_alg alg, in wpa_driver_openbsd_set_key() argument 79 if (alg != WPA_ALG_PMK || key_len > IEEE80211_PMK_LEN) in wpa_driver_openbsd_set_key()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/ |
H A D | ap_mlme.c | 23 static const char * mlme_auth_alg_str(int alg) in mlme_auth_alg_str() argument 25 switch (alg) { in mlme_auth_alg_str()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/ |
H A D | ap_mlme.c | 23 static const char * mlme_auth_alg_str(int alg) in mlme_auth_alg_str() argument 25 switch (alg) { in mlme_auth_alg_str()
|
/kernel/linux/linux-5.10/drivers/crypto/ |
H A D | sa2ul.c | 132 * @alg: Union of crypto algorithm definitions. 141 } alg; member 1275 struct crypto_alg *alg = req->base.tfm->__crt_alg; in sa_cipher_run() local 1282 if (req->cryptlen % alg->cra_blocksize) in sa_cipher_run() 1953 .alg.skcipher = { 1976 .alg.skcipher = { 1998 .alg.skcipher = { 2021 .alg.skcipher = { 2043 .alg.ahash = { 2072 .alg [all...] |
/kernel/linux/linux-6.6/drivers/crypto/ |
H A D | sa2ul.c | 152 * @alg: Union of crypto algorithm definitions. 161 } alg; member 1301 struct crypto_alg *alg = req->base.tfm->__crt_alg; in sa_cipher_run() local 1307 if (req->cryptlen % alg->cra_blocksize) in sa_cipher_run() 1974 .alg.skcipher = { 1997 .alg.skcipher = { 2019 .alg.skcipher = { 2042 .alg.skcipher = { 2064 .alg.ahash = { 2093 .alg [all...] |
/base/security/huks/frameworks/huks_standard/main/common/src/ |
H A D | hks_crypto_adapter.c | 182 HKS_IF_NOT_SUCC_LOGE_RETURN(ret, false, "check sm4 get alg param failed!")
in HksIsAlgorithmSm4() 191 HKS_IF_NOT_SUCC_LOGE_RETURN(ret, false, "check 3DES get alg param failed!")
in HksIsNeedIv3DES() 206 HKS_IF_NOT_SUCC_LOGE_RETURN(ret, false, "check DES get alg param failed!")
in HksIsNeedIvDES() 603 int32_t HksSetKeyToMaterial(uint32_t alg, bool isPubKey, const struct HksBlob *key, struct HksBlob *keyMaterial)
in HksSetKeyToMaterial() argument 605 switch (alg) {
in HksSetKeyToMaterial() 624 HKS_LOG_E("alg not support");
in HksSetKeyToMaterial() 629 int32_t HksGetKeyFromMaterial(uint32_t alg, bool isPubKey, const struct HksBlob *keyMaterial, struct HksBlob *key)
in HksGetKeyFromMaterial() argument 631 switch (alg) {
in HksGetKeyFromMaterial() 636 HKS_LOG_E("alg not support");
in HksGetKeyFromMaterial() 641 int32_t HksFormatKeyFromMaterial(uint32_t alg, cons argument [all...] |
/base/security/huks/frameworks/huks_standard/main/crypto_engine/openssl/src/ |
H A D | hks_openssl_engine.c | 130 const EVP_MD *GetOpensslAlg(uint32_t alg) in GetOpensslAlg() argument 132 switch (alg) { in GetOpensslAlg() 273 int32_t HksCryptoHalHash(uint32_t alg, const struct HksBlob *msg, struct HksBlob *hash) in HksCryptoHalHash() argument 277 return func(alg, msg, hash); in HksCryptoHalHash() 280 int32_t HksCryptoHalHashInit(uint32_t alg, void **ctx) in HksCryptoHalHashInit() argument 285 return func(ctx, alg); in HksCryptoHalHashInit() 454 HKS_IF_NULL_LOGE_RETURN(func, HKS_ERROR_INVALID_ARGUMENT, "Unsupport alg now!") in HksCryptoHalDecrypt() 480 HKS_IF_NULL_LOGE_RETURN(func, HKS_ERROR_INVALID_ARGUMENT, "Unsupport alg now!") in HksCryptoHalDecryptUpdate()
|