Home
last modified time | relevance | path

Searched refs:alg (Results 601 - 625 of 1208) sorted by relevance

1...<<21222324252627282930>>...49

/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/
H A Dcrypto_linux.c57 static int linux_af_alg_hash_vector(const char *alg, const u8 *key, in linux_af_alg_hash_vector() argument
67 s = linux_af_alg_socket("hash", alg); in linux_af_alg_hash_vector()
239 struct crypto_hash * crypto_hash_init(enum crypto_hash_alg alg, const u8 *key, in crypto_hash_init() argument
249 switch (alg) { in crypto_hash_init()
415 linux_af_alg_skcipher(const char *alg, const u8 *key, size_t key_len) in linux_af_alg_skcipher() argument
424 skcipher->s = linux_af_alg_socket("skcipher", alg); in linux_af_alg_skcipher()
858 struct crypto_cipher * crypto_cipher_init(enum crypto_cipher_alg alg, in crypto_cipher_init() argument
875 switch (alg) { in crypto_cipher_init()
/kernel/linux/linux-5.10/drivers/net/wireless/intersil/orinoco/
H A Dwext.c31 enum orinoco_alg alg, const u8 *key, int key_len, in orinoco_set_key()
59 switch (alg) { in orinoco_set_key()
727 int idx, alg = ext->alg, set_key = 1; in orinoco_ioctl_set_encodeext() local
744 alg = IW_ENCODE_ALG_NONE; in orinoco_ioctl_set_encodeext()
746 if (priv->has_wpa && (alg != IW_ENCODE_ALG_TKIP)) { in orinoco_ioctl_set_encodeext()
753 set_key = ((alg == IW_ENCODE_ALG_TKIP) || in orinoco_ioctl_set_encodeext()
759 switch (alg) { in orinoco_ioctl_set_encodeext()
846 ext->alg = IW_ENCODE_ALG_NONE; in orinoco_ioctl_get_encodeext()
851 ext->alg in orinoco_ioctl_get_encodeext()
30 orinoco_set_key(struct orinoco_private *priv, int index, enum orinoco_alg alg, const u8 *key, int key_len, const u8 *seq, int seq_len) orinoco_set_key() argument
[all...]
/kernel/linux/linux-6.6/drivers/net/wireless/intersil/orinoco/
H A Dwext.c31 enum orinoco_alg alg, const u8 *key, int key_len, in orinoco_set_key()
59 switch (alg) { in orinoco_set_key()
741 int idx, alg = ext->alg, set_key = 1; in orinoco_ioctl_set_encodeext() local
758 alg = IW_ENCODE_ALG_NONE; in orinoco_ioctl_set_encodeext()
760 if (priv->has_wpa && (alg != IW_ENCODE_ALG_TKIP)) { in orinoco_ioctl_set_encodeext()
767 set_key = ((alg == IW_ENCODE_ALG_TKIP) || in orinoco_ioctl_set_encodeext()
773 switch (alg) { in orinoco_ioctl_set_encodeext()
860 ext->alg = IW_ENCODE_ALG_NONE; in orinoco_ioctl_get_encodeext()
865 ext->alg in orinoco_ioctl_get_encodeext()
30 orinoco_set_key(struct orinoco_private *priv, int index, enum orinoco_alg alg, const u8 *key, int key_len, const u8 *seq, int seq_len) orinoco_set_key() argument
[all...]
/third_party/mbedtls/library/
H A Dpk_wrap.c168 int mbedtls_pk_psa_rsa_sign_ext(psa_algorithm_t alg, in mbedtls_pk_psa_rsa_sign_ext() argument
200 psa_set_key_algorithm(&attributes, alg); in mbedtls_pk_psa_rsa_sign_ext()
210 status = psa_sign_hash(key_id, alg, hash, hash_len, in mbedtls_pk_psa_rsa_sign_ext()
1473 psa_algorithm_t alg; in rsa_opaque_decrypt() local
1487 alg = psa_get_key_algorithm(&attributes); in rsa_opaque_decrypt()
1494 status = psa_asymmetric_decrypt(pk->priv_id, alg, input, ilen, NULL, 0, output, osize, olen); in rsa_opaque_decrypt()
1510 psa_algorithm_t alg; in rsa_opaque_sign_wrap() local
1524 alg = psa_get_key_algorithm(&attributes); in rsa_opaque_sign_wrap()
1528 alg = (alg in rsa_opaque_sign_wrap()
[all...]
/base/security/crypto_framework/test/unittest/src/
H A Dcrypto_dsa_verify_test.cpp72 const char *alg = verify->getAlgoName(verify); in HWTEST_F() local
73 ASSERT_STREQ(alg, "DSA2048|NoHash"); in HWTEST_F()
/base/security/dlp_permission_service/interfaces/inner_api/dlp_parse/include/
H A Ddlp_crypt.h121 int32_t DlpOpensslHash(uint32_t alg, const struct DlpBlob* msg, struct DlpBlob* hash);
123 int32_t DlpOpensslHashInit(void** cryptoCtx, uint32_t alg);
/base/security/huks/interfaces/inner_api/huks_lite/
H A Dhks_client.h260 * alg: hks_alg_hmac(HKS_ALG_HASH_SHA_256) or
264 * when alg is hks_alg_hmac(HKS_ALG_HASH_SHA_256), output->size must be
266 * when alg is hks_alg_hmac(HKS_ALG_HASH_SHA_512), output->size must be
271 const uint32_t alg, const struct hks_blob *src_data,
276 * alg: Hash algorithm, Only spuuort SHA256/SHA512
280 * when alg is HKS_ALG_HASH_SHA_256, hash->size must be
282 * when alg is HKS_ALG_HASH_SHA_512, hash->size must be
286 HKS_DLL_API_PUBLIC int32_t hks_hash(const uint32_t alg,
/base/security/huks/utils/crypto_adapter/
H A Dhks_client_service_adapter_common.c51 static int32_t TranslateToInnerCurve25519Format(const uint32_t alg, const struct HksBlob *key, in TranslateToInnerCurve25519Format() argument
65 curve25519Key->keyAlg = (enum HksKeyAlg)alg; in TranslateToInnerCurve25519Format()
121 HKS_IF_NOT_SUCC_LOGE_RETURN(ret, HKS_ERROR_CHECK_GET_ALG_FAIL, "get alg param failed") in GetHksPubKeyInnerFormat()
/kernel/linux/linux-5.10/lib/
H A Dcrc-t10dif.c26 struct crypto_alg *alg = data; in crc_t10dif_notify() local
29 strcmp(alg->cra_name, CRC_T10DIF_STRING)) in crc_t10dif_notify()
/kernel/linux/linux-5.10/net/mac80211/
H A Daead_api.c86 aead_key_setup_encrypt(const char *alg, const u8 key[], in aead_key_setup_encrypt() argument
92 tfm = crypto_alloc_aead(alg, 0, CRYPTO_ALG_ASYNC); in aead_key_setup_encrypt()
/kernel/linux/linux-5.10/include/linux/crush/
H A Dcrush.h120 extern const char *crush_bucket_alg_name(int alg);
134 __u8 alg; /* one of CRUSH_BUCKET_* */ member
/kernel/linux/linux-6.6/fs/verity/
H A Dfsverity_private.h93 const u8 *fsverity_prepare_hash_state(const struct fsverity_hash_alg *alg,
97 int fsverity_hash_buffer(const struct fsverity_hash_alg *alg,
/kernel/linux/linux-6.6/include/linux/crush/
H A Dcrush.h120 extern const char *crush_bucket_alg_name(int alg);
134 __u8 alg; /* one of CRUSH_BUCKET_* */ member
/kernel/linux/linux-6.6/lib/
H A Dcrc-t10dif.c26 struct crypto_alg *alg = data; in crc_t10dif_notify() local
29 strcmp(alg->cra_name, CRC_T10DIF_STRING)) in crc_t10dif_notify()
H A Dcrc64-rocksoft.c20 struct crypto_alg *alg = data; in crc64_rocksoft_notify() local
23 strcmp(alg->cra_name, CRC64_ROCKSOFT_STRING)) in crc64_rocksoft_notify()
/kernel/linux/linux-6.6/net/mac80211/
H A Daead_api.c86 aead_key_setup_encrypt(const char *alg, const u8 key[], in aead_key_setup_encrypt() argument
92 tfm = crypto_alloc_aead(alg, 0, CRYPTO_ALG_ASYNC); in aead_key_setup_encrypt()
/third_party/mbedtls/include/mbedtls/
H A Dasn1.h556 * \param alg The buffer to receive the OID.
564 mbedtls_asn1_buf *alg, mbedtls_asn1_buf *params);
577 * \param alg The buffer to receive the OID.
583 mbedtls_asn1_buf *alg);
/third_party/node/lib/internal/crypto/
H A Dmac.js140 if (keyData.alg !== undefined) {
141 if (keyData.alg !== getAlgorithmName(algorithm.hash.name))
143 'JWK "alg" does not match the requested algorithm',
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/drivers/
H A Ddriver_openbsd.c72 wpa_driver_openbsd_set_key(const char *ifname, void *priv, enum wpa_alg alg, in wpa_driver_openbsd_set_key() argument
79 if (alg != WPA_ALG_PMK || key_len > IEEE80211_PMK_LEN) in wpa_driver_openbsd_set_key()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/
H A Dap_mlme.c23 static const char * mlme_auth_alg_str(int alg) in mlme_auth_alg_str() argument
25 switch (alg) { in mlme_auth_alg_str()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/
H A Dap_mlme.c23 static const char * mlme_auth_alg_str(int alg) in mlme_auth_alg_str() argument
25 switch (alg) { in mlme_auth_alg_str()
/kernel/linux/linux-5.10/drivers/crypto/
H A Dsa2ul.c132 * @alg: Union of crypto algorithm definitions.
141 } alg; member
1275 struct crypto_alg *alg = req->base.tfm->__crt_alg; in sa_cipher_run() local
1282 if (req->cryptlen % alg->cra_blocksize) in sa_cipher_run()
1953 .alg.skcipher = {
1976 .alg.skcipher = {
1998 .alg.skcipher = {
2021 .alg.skcipher = {
2043 .alg.ahash = {
2072 .alg
[all...]
/kernel/linux/linux-6.6/drivers/crypto/
H A Dsa2ul.c152 * @alg: Union of crypto algorithm definitions.
161 } alg; member
1301 struct crypto_alg *alg = req->base.tfm->__crt_alg; in sa_cipher_run() local
1307 if (req->cryptlen % alg->cra_blocksize) in sa_cipher_run()
1974 .alg.skcipher = {
1997 .alg.skcipher = {
2019 .alg.skcipher = {
2042 .alg.skcipher = {
2064 .alg.ahash = {
2093 .alg
[all...]
/base/security/huks/frameworks/huks_standard/main/common/src/
H A Dhks_crypto_adapter.c182 HKS_IF_NOT_SUCC_LOGE_RETURN(ret, false, "check sm4 get alg param failed!") in HksIsAlgorithmSm4()
191 HKS_IF_NOT_SUCC_LOGE_RETURN(ret, false, "check 3DES get alg param failed!") in HksIsNeedIv3DES()
206 HKS_IF_NOT_SUCC_LOGE_RETURN(ret, false, "check DES get alg param failed!") in HksIsNeedIvDES()
603 int32_t HksSetKeyToMaterial(uint32_t alg, bool isPubKey, const struct HksBlob *key, struct HksBlob *keyMaterial) in HksSetKeyToMaterial() argument
605 switch (alg) { in HksSetKeyToMaterial()
624 HKS_LOG_E("alg not support"); in HksSetKeyToMaterial()
629 int32_t HksGetKeyFromMaterial(uint32_t alg, bool isPubKey, const struct HksBlob *keyMaterial, struct HksBlob *key) in HksGetKeyFromMaterial() argument
631 switch (alg) { in HksGetKeyFromMaterial()
636 HKS_LOG_E("alg not support"); in HksGetKeyFromMaterial()
641 int32_t HksFormatKeyFromMaterial(uint32_t alg, cons argument
[all...]
/base/security/huks/frameworks/huks_standard/main/crypto_engine/openssl/src/
H A Dhks_openssl_engine.c130 const EVP_MD *GetOpensslAlg(uint32_t alg) in GetOpensslAlg() argument
132 switch (alg) { in GetOpensslAlg()
273 int32_t HksCryptoHalHash(uint32_t alg, const struct HksBlob *msg, struct HksBlob *hash) in HksCryptoHalHash() argument
277 return func(alg, msg, hash); in HksCryptoHalHash()
280 int32_t HksCryptoHalHashInit(uint32_t alg, void **ctx) in HksCryptoHalHashInit() argument
285 return func(ctx, alg); in HksCryptoHalHashInit()
454 HKS_IF_NULL_LOGE_RETURN(func, HKS_ERROR_INVALID_ARGUMENT, "Unsupport alg now!") in HksCryptoHalDecrypt()
480 HKS_IF_NULL_LOGE_RETURN(func, HKS_ERROR_INVALID_ARGUMENT, "Unsupport alg now!") in HksCryptoHalDecryptUpdate()

Completed in 22 milliseconds

1...<<21222324252627282930>>...49