/third_party/openssl/test/recipes/ |
D | 15-test_gendhparam.t | 19 algorithm => 'DHX', 25 algorithm => 'DH', 31 algorithm => 'DHX', 37 algorithm => 'DHX', 43 algorithm => 'DHX', 49 algorithm => 'DH', 55 algorithm => 'DH', 61 algorithm => 'DH', 67 algorithm => 'DH', 73 algorithm => 'DH', [all …]
|
/third_party/node/lib/internal/crypto/ |
D | sig.js | 33 function Sign(algorithm, options) { argument 35 return new Sign(algorithm, options); 36 validateString(algorithm, 'algorithm'); 38 this[kHandle].init(algorithm); 120 function signOneShot(algorithm, data, key) { argument 121 if (algorithm != null) 122 validateString(algorithm, 'algorithm'); 150 algorithm, rsaPadding, pssSaltLength, dsaSigEnc); 153 function Verify(algorithm, options) { argument 155 return new Verify(algorithm, options); [all …]
|
/third_party/node/deps/npm/node_modules/ssri/ |
D | index.js | 42 this.algorithm = match[1] 62 SPEC_ALGORITHMS.some(x => x === this.algorithm) && 79 return `${this.algorithm}-${this.digest}${options}` 145 } else if (sri.algorithm && sri.digest) { 147 fullSri[sri.algorithm] = [sri] 162 if (hash.algorithm && hash.digest) { 163 const algo = hash.algorithm 174 if (obj.algorithm && obj.digest) { 184 function fromHex (hexDigest, algorithm, opts) { argument 190 `${algorithm}-${ [all …]
|
/third_party/ltp/testcases/kernel/security/integrity/ima/tests/ |
D | ima_setup.sh | 26 local algorithm="$1" 30 digest="$(${algorithm}sum $file 2>/dev/null | cut -f1 -d ' ')" 36 digest="$(openssl $algorithm $file 2>/dev/null | cut -f2 -d ' ')" 43 local arg="$algorithm" 44 case "$algorithm" in 244 local algorithm digest 259 algorithm=$(echo "$digest" | cut -d $delimiter -f 1) 263 32) algorithm="md5" ;; 264 40) algorithm="sha1" ;; 270 if [ -z "$algorithm" ]; then [all …]
|
D | ima_selinux.sh | 65 local policy_digest expected_policy_digest algorithm 84 algorithm=$(echo "$line" | cut -d' ' -f4 | cut -d':' -f1) 87 expected_policy_digest="$(compute_digest $algorithm $SELINUX_DIR/policy)" || \ 88 tst_brk TCONF "cannot compute digest for $algorithm" 107 local digest expected_digest algorithm 126 algorithm=$(echo "$line" | cut -d' ' -f4 | cut -d':' -f1) 130 expected_digest="$(compute_digest $algorithm $state_file)" || \ 131 tst_brk TCONF "cannot compute digest for $algorithm"
|
/third_party/openssl/crypto/asn1/ |
D | x_algor.c | 19 ASN1_SIMPLE(X509_ALGOR, algorithm, ASN1_OBJECT), 43 ASN1_OBJECT_free(alg->algorithm); 44 alg->algorithm = aobj; 60 *paobj = algor->algorithm; in X509_ALGOR_get0() 90 rv = OBJ_cmp(a->algorithm, b->algorithm); in X509_ALGOR_cmp() 103 if (dest->algorithm) in X509_ALGOR_copy() 104 ASN1_OBJECT_free(dest->algorithm); in X509_ALGOR_copy() 105 dest->algorithm = NULL; in X509_ALGOR_copy() 111 if (src->algorithm) in X509_ALGOR_copy() 112 if ((dest->algorithm = OBJ_dup(src->algorithm)) == NULL) in X509_ALGOR_copy() [all …]
|
/third_party/node/test/parallel/ |
D | test-crypto-aes-wrap.js | 11 algorithm: 'aes128-wrap', property 17 algorithm: 'id-aes128-wrap-pad', property 23 algorithm: 'aes192-wrap', property 29 algorithm: 'id-aes192-wrap-pad', property 35 algorithm: 'aes256-wrap', property 41 algorithm: 'id-aes256-wrap-pad', property 50 data.algorithm, 56 data.algorithm, 61 assert.strictEqual(msg, data.text, `${data.algorithm} test case failed`);
|
/third_party/node/deps/npm/node_modules/sshpk/lib/ |
D | fingerprint.js | 21 assert.string(opts.algorithm, 'options.algorithm'); 23 this.algorithm = opts.algorithm.toLowerCase(); 24 if (algs.hashAlgs[this.algorithm] !== true) 25 throw (new InvalidAlgorithmError(this.algorithm)); 33 if (this.algorithm === 'md5') 44 return (sshBase64Format(this.algorithm, 60 var theirHash = other.hash(this.algorithm); 61 var theirHash2 = crypto.createHash(this.algorithm). 65 this.hash2 = crypto.createHash(this.algorithm). 127 algorithm: alg, property
|
/third_party/ffmpeg/doc/ |
D | scaler.texi | 17 algorithm. Only a single algorithm should be selected. Default 23 Select fast bilinear scaling algorithm. 26 Select bilinear scaling algorithm. 29 Select bicubic scaling algorithm. 32 Select experimental scaling algorithm. 35 Select nearest neighbor rescaling algorithm. 38 Select averaging area rescaling algorithm. 41 Select bicubic scaling algorithm for the luma component, bilinear for 45 Select Gaussian rescaling algorithm. 48 Select sinc rescaling algorithm. [all …]
|
/third_party/openssl/doc/man1/ |
D | openssl-genpkey.pod.in | 22 [B<-algorithm> I<alg>] 64 This option encrypts the private key with the supplied cipher. Any algorithm 67 =item B<-algorithm> I<alg> 69 Public key algorithm to use such as RSA, DSA, DH or DHX. If used this option must 70 precede any B<-pkeyopt> options. The options B<-paramfile> and B<-algorithm> 74 Valid built-in algorithm names for private key generation are RSA, RSA-PSS, EC, 77 Valid built-in algorithm names for parameter generation (see the B<-genparam> 80 Note that the algorithm name X9.42 DH may be used as a synonym for DHX keys and 85 Set the public key algorithm option I<opt> to I<value>. The precise set of 86 options supported depends on the public key algorithm used and its [all …]
|
D | openssl-speed.pod.in | 28 [I<algorithm> ...] 50 Use the specified cipher or message digest algorithm via the EVP interface. 73 Time the HMAC algorithm using the specified message digest. 77 Time the CMAC algorithm using the specified cipher e.g. 95 is only effective if RSA algorithm is specified to test. 117 =item I<algorithm> ... 119 If any I<algorithm> is given, then those algorithms are tested, otherwise a 126 The I<algorithm> can be selected only from a pre-compiled subset of things 128 or cipher algorithm supported by OpenSSL use the C<-evp> option.
|
D | openssl-pkeyutl.pod.in | 6 openssl-pkeyutl - public key algorithm command 14 [B<-digest> I<algorithm>] 31 [B<-kdf> I<algorithm>] 45 operations using any supported algorithm. 63 message digest algorithm. The user can specify a digest algorithm by using 67 =item B<-digest> I<algorithm> 69 This specifies the digest algorithm which is used to hash the input data before 71 signature algorithm does not require one (for instance, EdDSA). If this option 72 is omitted but the signature algorithm requires one, a default value will be 74 default digest algorithm. For SM2, it will be SM3. If this option is present, [all …]
|
/third_party/node/deps/npm/node_modules/sha/ |
D | index.js | 56 var algorithm = options.algorithm || 'sha1' 57 var hash = crypto.createHash(algorithm) 78 var algorithm = options.algorithm || 'sha1' 79 var hash = crypto.createHash(algorithm) 88 var algorithm = options.algorithm || 'sha1' 89 var hash = crypto.createHash(algorithm)
|
/third_party/openssl/doc/man3/ |
D | EVP_PBE_CipherInit.pod | 35 I<pass> of length I<passlen>. The PBE algorithm type and parameters are extracted 39 I<libctx> and property query I<propq> to select appropriate algorithm 42 =head2 PBE algorithm search 44 EVP_PBE_find() and EVP_PBE_find_ex() search for a matching algorithm using two parameters: 46 1. An algorithm type I<type> which can be: 52 EVP_PBE_TYPE_OUTER - A PBE algorithm 64 2. A I<pbe_nid> which can represent the algorithm identifier with parameters e.g. 65 B<NID_pbeWithSHA1AndRC2_CBC> or an algorithm class e.g. B<NID_pbes2>. 67 They return the algorithm's cipher ID I<pcnid>, digest ID I<pmnid> and a key 68 generation function for the algorithm I<pkeygen>. EVP_PBE_CipherInit_ex() also [all …]
|
D | PKCS12_pack_p7encdata.pod | 23 type from the set of safeBags I<bags>. The algorithm ID in I<pbe_nid> can be 24 a PKCS#12 or PKCS#5 password based encryption algorithm, or a cipher algorithm. 25 If a cipher algorithm is passed, the PKCS#5 PBES2 algorithm will be used with 32 algorithm implementation.
|
/third_party/node/deps/npm/node_modules/http-signature/lib/ |
D | signer.js | 41 if (options.algorithm !== undefined) { 42 assert.string(options.algorithm, 'options.algorithm'); 43 alg = validateAlgorithm(options.algorithm); 188 assert.string(sig.algorithm, 'signature.algorithm'); 190 alg = validateAlgorithm(sig.algorithm); 194 sig.algorithm, 289 assert.optionalString(options.algorithm, 'options.algorithm'); 302 if (options.algorithm) { 303 options.algorithm = options.algorithm.toLowerCase(); 304 alg = validateAlgorithm(options.algorithm); [all …]
|
D | parser.js | 227 if (!parsed.params.algorithm) 234 parsed.params.algorithm = parsed.params.algorithm.toLowerCase(); 236 validateAlgorithm(parsed.params.algorithm); 239 throw (new InvalidParamsError(parsed.params.algorithm + ' is not ' + 305 if (options.algorithms.indexOf(parsed.params.algorithm) === -1) 306 throw new InvalidParamsError(parsed.params.algorithm + 310 parsed.algorithm = parsed.params.algorithm.toUpperCase();
|
/third_party/openssl/doc/man7/ |
D | openssl-glossary.pod | 17 implementation for any given algorithm available for use. 34 the algorithm implementations in the Base Provider are also available in the 41 A decoder is a type of algorithm used for decoding keys and parameters from some 48 An OpenSSL Provider that contains the most commmon OpenSSL algorithm 50 the algorithm implementations in the Base Provider are also available in the 67 An encoder is a type of algorithm used for encoding keys and parameters to some 75 where a function call is made to obtain an algorithm object representing an 80 Fetching is the process of looking through the available algorithm 90 An OpenSSL Provider that contains OpenSSL algorithm implementations that have 98 where an algorithm object with no associated implementation is used such as the [all …]
|
/third_party/node/test/fixtures/x509-escaping/ |
D | create-certs.js | 284 algorithm: oid.sha256WithRSAEncryption, property 308 algorithm: { property 309 algorithm: oid.rsaEncryption, property 334 algorithm: oid.sha256WithRSAEncryption, property 438 algorithm: oid.sha256WithRSAEncryption, property 462 algorithm: { property 463 algorithm: oid.rsaEncryption, property 488 algorithm: oid.sha256WithRSAEncryption, property 594 algorithm: oid.sha256WithRSAEncryption, property 610 algorithm: { property [all …]
|
/third_party/node/deps/npm/node_modules/request/lib/ |
D | hawk.js | 12 function calculatePayloadHash (payload, algorithm, contentType) { argument 13 var hash = crypto.createHash(algorithm) 41 var hmac = crypto.createHmac(credentials.algorithm, credentials.key).update(normalized) 49 if (!credentials || !credentials.id || !credentials.key || !credentials.algorithm) { 53 if (['sha1', 'sha256'].indexOf(credentials.algorithm) === -1) { 71 artifacts.hash = calculatePayloadHash(opts.payload, credentials.algorithm, opts.contentType)
|
D | auth.js | 81 var ha1Compute = function (algorithm, user, realm, pass, nonce, cnonce) { argument 83 if (algorithm && algorithm.toLowerCase() === 'md5-sess') { 93 …var ha1 = ha1Compute(challenge.algorithm, self.user, challenge.realm, self.pass, challenge.nonce, … 107 algorithm: challenge.algorithm, property
|
/third_party/ltp/testcases/kernel/crypto/ |
D | crypto_user02.c | 54 static const char* algorithm = NULL; variable 78 algorithm = ALGORITHM_CANDIDATES[i]; in setup() 83 if (!algorithm) in setup() 93 strcpy(alg.cru_driver_name, algorithm); in run() 97 algorithm); in run()
|
/third_party/node/benchmark/zlib/ |
D | pipe.js | 10 algorithm: ['gzip', 'brotli'] property 18 function main({ inputLen, duration, type, algorithm }) { field 22 const input = algorithm === 'gzip' ? 24 const output = algorithm === 'gzip' ?
|
/third_party/node/lib/ |
D | crypto.js | 113 function createHash(algorithm, options) { argument 114 return new Hash(algorithm, options); 149 function createSign(algorithm, options) { argument 150 return new Sign(algorithm, options); 153 function createVerify(algorithm, options) { argument 154 return new Verify(algorithm, options);
|
/third_party/skia/third_party/externals/abseil-cpp/absl/algorithm/ |
D | BUILD.bazel | 30 name = "algorithm", 31 hdrs = ["algorithm.h"], 46 ":algorithm", 58 ":algorithm", 72 ":algorithm",
|