Home
last modified time | relevance | path

Searched full:algorithm (Results 1 – 25 of 5714) sorted by relevance

12345678910>>...229

/third_party/ltp/include/
Dtst_af_alg.h22 * Create an AF_ALG algorithm socket.
24 * This creates an AF_ALG algorithm socket that is initially not bound to any
25 * particular algorithm. On failure, tst_brk() is called with TCONF if the
28 * @return a new AF_ALG algorithm socket
33 * Bind an AF_ALG algorithm socket to an algorithm.
35 * @param algfd An AF_ALG algorithm socket
36 * @param addr A structure which specifies the algorithm to use
39 * specified algorithm, otherwise TBROK.
44 * Bind an AF_ALG algorithm socket to an algorithm.
46 * @param algfd An AF_ALG algorithm socket
[all …]
/third_party/mbedtls/include/psa/
Dcrypto_values.h70 * parameter such as a key type, algorithm, etc. is not recognized.
240 * an algorithm with a randomized result, as well as functions that
342 /** \defgroup crypto_types Key and algorithm types
435 * The key policy determines which underlying hash algorithm the key can be
440 * \c alg is the HMAC algorithm or the underlying hash algorithm. */
451 * The key policy determines which key derivation algorithm the key
474 * The key policy determines which key derivation algorithm the key can be
481 * The key policy determines which key derivation algorithm the key
489 * The key policy determines which key derivation algorithm the key
494 /** Key for a cipher, AEAD or MAC algorithm based on the AES block cipher.
[all …]
Dcrypto_sizes.h52 * \param alg A hash algorithm (\c PSA_ALG_XXX value such that
53 * #PSA_ALG_IS_HASH(\p alg) is true), or an HMAC algorithm
55 * hash algorithm).
57 * \return The hash size for the specified hash algorithm.
58 * If the hash algorithm is not recognized, return 0.
77 /** The input block size of a hash algorithm, in bytes.
84 * \param alg A hash algorithm (\c PSA_ALG_XXX value such that
87 * \return The block size in bytes for the specified hash algorithm.
88 * If the hash algorithm is not recognized, return 0.
90 * hash algorithm that it recognizes, but does not support.
[all …]
Dcrypto_extra.h39 /** \brief Declare the enrollment algorithm for a key.
41 * An operation on a key may indifferently use the algorithm set with
45 * \param alg2 A second algorithm that the key may be used
46 * for, in addition to the algorithm set with
49 * \warning Setting an enrollment algorithm is not recommended, because
65 /** Retrieve the enrollment algorithm policy from key attributes.
69 * \return The enrollment algorithm stored in the attribute structure.
359 * \param hash_alg A hash algorithm (\c PSA_ALG_XXX value such that
362 * when specifying the algorithm in a usage policy.
364 * \return The corresponding DSA signature algorithm.
[all …]
/third_party/openssl/test/recipes/30-test_evp_data/
Devpmac_common.txt19 Algorithm = MD5
28 Algorithm = MD5
36 Algorithm = MD5
47 Algorithm = SHA1
55 Algorithm = SHA1
62 Algorithm = SHA1
71 Algorithm = SHA224
79 Algorithm = SHA224
85 Algorithm = SHA224
91 Algorithm = SHA256
[all …]
/third_party/openssl/test/ssl-tests/
D20-cert-select.cnf9 test-4 = 4-P-256 CipherString and Signature Algorithm Selection
11 test-6 = 6-ECDSA Signature Algorithm Selection
12 test-7 = 7-ECDSA Signature Algorithm Selection SHA384
13 test-8 = 8-ECDSA Signature Algorithm Selection compressed point
14 test-9 = 9-ECDSA Signature Algorithm Selection, no ECDSA certificate
15 test-10 = 10-RSA Signature Algorithm Selection
16 test-11 = 11-RSA-PSS Signature Algorithm Selection
18 test-13 = 13-Suite B P-256 Hash Algorithm Selection
19 test-14 = 14-Suite B P-384 Hash Algorithm Selection
20 test-15 = 15-Ed25519 CipherString and Signature Algorithm Selection
[all …]
/third_party/mbedtls/docs/architecture/psa-migration/
Dpsa-limitations.md96 the hash algorithm potentially used to hash the message being signed:
97 - a hash algorithm used for the encoding function
99 - most commonly MGF1, which in turn is parametrized by a hash algorithm
135 - algorithm specification:
141 - salt length: either <= hashlen (see note), or any depending on algorithm
165 - encoding hash = message hashing algorithm (may differ from MGF1 hash)
190 algorithm identifiers (for SHA-256, SHA-384 and SHA-512), depending of what
196 - the length of the salt MUST be equal to the length of the digest algorithm
215 Hash Algorithm: sha256
216 Mask Algorithm: mgf1 with sha224
[all …]
/third_party/pcre2/pcre2/doc/
Dpcre2matching.39 string. The "standard" algorithm is the one provided by the \fBpcre2_match()\fP
18 An alternative algorithm is provided by the \fBpcre2_dfa_match()\fP function;
20 has advantages and disadvantages compared with the standard algorithm, and
33 there are three possible answers. The standard algorithm finds only one of
34 them, whereas the alternative algorithm finds all three.
48 .SH "THE STANDARD MATCHING ALGORITHM"
52 the standard algorithm is an "NFA algorithm". It conducts a depth-first search
55 the algorithm tries any alternatives at the current point, and if they all
62 the algorithm stops. Thus, if there is more than one possible match, this
63 algorithm returns the first one that it finds. Whether this is the shortest,
[all …]
/third_party/openssl/test/recipes/
D15-test_dsaparam.t27 ./util/opensslwrap.sh genpkey -genparam -algorithm DSA -pkeyopt dsa_paramgen_bits:1024 -pkeyopt qbi…
28 ./util/opensslwrap.sh genpkey -genparam -algorithm DSA -pkeyopt dsa_paramgen_bits:2048 -pkeyopt qbi…
29 ./util/opensslwrap.sh genpkey -genparam -algorithm DSA -pkeyopt dsa_paramgen_bits:2048 -pkeyopt qbi…
30 ./util/opensslwrap.sh genpkey -genparam -algorithm DSA -pkeyopt dsa_paramgen_bits:3072 -pkeyopt qbi…
32 ./util/opensslwrap.sh genpkey -genparam -algorithm DSA -pkeyopt dsa_paramgen_bits:1024 -pkeyopt qbi…
33 ./util/opensslwrap.sh genpkey -genparam -algorithm DSA -pkeyopt dsa_paramgen_bits:2048 -pkeyopt qbi…
34 ./util/opensslwrap.sh genpkey -genparam -algorithm DSA -pkeyopt dsa_paramgen_bits:2048 -pkeyopt qbi…
35 ./util/opensslwrap.sh genpkey -genparam -algorithm DSA -pkeyopt dsa_paramgen_bits:3072 -pkeyopt qbi…
37 ./util/opensslwrap.sh genpkey -genparam -algorithm DSA -pkeyopt dsa_paramgen_bits:1024 -pkeyopt qbi…
38 ./util/opensslwrap.sh genpkey -genparam -algorithm DSA -pkeyopt dsa_paramgen_bits:1024 -pkeyopt qbi…
[all …]
D15-test_gendhparam.t19 algorithm => 'DHX',
25 algorithm => 'DH',
31 algorithm => 'DHX',
37 algorithm => 'DHX',
43 algorithm => 'DHX',
49 algorithm => 'DH',
55 algorithm => 'DH',
61 algorithm => 'DH',
67 algorithm => 'DH',
73 algorithm => 'DH',
[all …]
D20-test_dhparam_check.t31 ./util/opensslwrap.sh genpkey -genparam -algorithm DH -pkeyopt dh_rfc5114:1 -out $TESTDIR/dh_5114_1…
32 ./util/opensslwrap.sh genpkey -genparam -algorithm DH -pkeyopt dh_rfc5114:2 -out $TESTDIR/dh_5114_2…
33 ./util/opensslwrap.sh genpkey -genparam -algorithm DH -pkeyopt dh_rfc5114:3 -out $TESTDIR/dh_5114_3…
34 ./util/opensslwrap.sh genpkey -genparam -algorithm DHX -pkeyopt dh_rfc5114:2 -out $TESTDIR/dhx_5114…
36 ./util/opensslwrap.sh genpkey -genparam -algorithm DHX -pkeyopt pbits:1024 -pkeyopt qbits:160 -pkey…
37 ./util/opensslwrap.sh genpkey -genparam -algorithm DHX -pkeyopt pbits:1024 -pkeyopt qbits:224 -pkey…
38 ./util/opensslwrap.sh genpkey -genparam -algorithm DHX -pkeyopt pbits:1024 -pkeyopt qbits:256 -pkey…
40 ./util/opensslwrap.sh genpkey -genparam -algorithm DHX -pkeyopt pbits:1024 -pkeyopt qbits:160 -pkey…
42 ./util/opensslwrap.sh genpkey -genparam -algorithm DHX -pkeyopt pbits:2048 -pkeyopt qbits:160 -pkey…
43 ./util/opensslwrap.sh genpkey -genparam -algorithm DHX -pkeyopt pbits:2048 -pkeyopt qbits:224 -pkey…
[all …]
/third_party/openssl/doc/man1/
Dopenssl-genpkey.pod.in22 [B<-algorithm> I<alg>]
64 This option encrypts the private key with the supplied cipher. Any algorithm
67 =item B<-algorithm> I<alg>
69 Public key algorithm to use such as RSA, DSA, DH or DHX. If used this option must
70 precede any B<-pkeyopt> options. The options B<-paramfile> and B<-algorithm>
74 Valid built-in algorithm names for private key generation are RSA, RSA-PSS, EC,
77 Valid built-in algorithm names for parameter generation (see the B<-genparam>
80 Note that the algorithm name X9.42 DH may be used as a synonym for DHX keys and
85 Set the public key algorithm option I<opt> to I<value>. The precise set of
86 options supported depends on the public key algorithm used and its
[all …]
Dopenssl-pkeyutl.pod.in6 openssl-pkeyutl - public key algorithm command
14 [B<-digest> I<algorithm>]
31 [B<-kdf> I<algorithm>]
45 operations using any supported algorithm.
63 message digest algorithm. The user can specify a digest algorithm by using
67 =item B<-digest> I<algorithm>
69 This specifies the digest algorithm which is used to hash the input data before
71 signature algorithm does not require one (for instance, EdDSA). If this option
72 is omitted but the signature algorithm requires one, a default value will be
74 default digest algorithm. For SM2, it will be SM3. If this option is present,
[all …]
/third_party/pcre2/pcre2/doc/html/
Dpcre2matching.html18 <li><a name="TOC3" href="#SEC3">THE STANDARD MATCHING ALGORITHM</a>
19 <li><a name="TOC4" href="#SEC4">THE ALTERNATIVE MATCHING ALGORITHM</a>
20 <li><a name="TOC5" href="#SEC5">ADVANTAGES OF THE ALTERNATIVE ALGORITHM</a>
21 <li><a name="TOC6" href="#SEC6">DISADVANTAGES OF THE ALTERNATIVE ALGORITHM</a>
29 string. The "standard" algorithm is the one provided by the <b>pcre2_match()</b>
37 An alternative algorithm is provided by the <b>pcre2_dfa_match()</b> function;
39 has advantages and disadvantages compared with the standard algorithm, and
53 there are three possible answers. The standard algorithm finds only one of
54 them, whereas the alternative algorithm finds all three.
65 <br><a name="SEC3" href="#TOC1">THE STANDARD MATCHING ALGORITHM</a><br>
[all …]
/third_party/mbedtls/library/
Dpsa_crypto_cipher.h15 /** Get Mbed TLS cipher information given the cipher algorithm PSA identifier
17 * algorithm.
19 * \param[in] alg PSA cipher algorithm identifier
24 * \param[out] cipher_id Mbed TLS cipher algorithm identifier
28 * \c PSA_ERROR_NOT_SUPPORTED is returned if the cipher algorithm is not
37 /** Get Mbed TLS cipher information given the cipher algorithm PSA identifier
39 * algorithm.
41 * \param alg PSA cipher algorithm identifier
44 * \param[out] cipher_id Mbed TLS cipher algorithm identifier
46 * \return The Mbed TLS cipher information of the cipher algorithm.
[all …]
/third_party/ffmpeg/doc/
Dscaler.texi17 algorithm. Only a single algorithm should be selected. Default
23 Select fast bilinear scaling algorithm.
26 Select bilinear scaling algorithm.
29 Select bicubic scaling algorithm.
32 Select experimental scaling algorithm.
35 Select nearest neighbor rescaling algorithm.
38 Select averaging area rescaling algorithm.
41 Select bicubic scaling algorithm for the luma component, bilinear for
45 Select Gaussian rescaling algorithm.
48 Select sinc rescaling algorithm.
[all …]
/third_party/openssl/crypto/asn1/
Dx_algor.c19 ASN1_SIMPLE(X509_ALGOR, algorithm, ASN1_OBJECT),
43 ASN1_OBJECT_free(alg->algorithm);
44 alg->algorithm = aobj;
60 *paobj = algor->algorithm; in X509_ALGOR_get0()
90 rv = OBJ_cmp(a->algorithm, b->algorithm); in X509_ALGOR_cmp()
103 if (dest->algorithm) in X509_ALGOR_copy()
104 ASN1_OBJECT_free(dest->algorithm); in X509_ALGOR_copy()
105 dest->algorithm = NULL; in X509_ALGOR_copy()
111 if (src->algorithm) in X509_ALGOR_copy()
112 if ((dest->algorithm = OBJ_dup(src->algorithm)) == NULL) in X509_ALGOR_copy()
[all …]
/third_party/openssl/doc/man7/
Dopenssl-glossary.pod13 =item Algorithm
17 implementation for any given algorithm available for use.
34 the algorithm implementations in the Base Provider are also available in the
41 A decoder is a type of algorithm used for decoding keys and parameters from some
48 An OpenSSL Provider that contains the most commmon OpenSSL algorithm
50 the algorithm implementations in the Base Provider are also available in the
67 An encoder is a type of algorithm used for encoding keys and parameters to some
75 where a function call is made to obtain an algorithm object representing an
80 Fetching is the process of looking through the available algorithm
90 An OpenSSL Provider that contains OpenSSL algorithm implementations that have
[all …]
Dcrypto.pod27 referred to in OpenSSL as "algorithms". Each algorithm may have multiple
28 implementations available for use. For example the RSA algorithm is available as
40 encryption operation using AES (or any other encryption algorithm) you would use
47 A provider in OpenSSL is a component that collects together algorithm
48 implementations. In order to use an algorithm you must have at least one
78 See also L</ALGORITHM FETCHING>.
100 =head1 ALGORITHM FETCHING
102 In order to use an algorithm an implementation for it must first be "fetched".
112 When fetching an algorithm it is possible to specify a property query string to
115 algorithm implementations in the default provider.
[all …]
/third_party/openssl/doc/man3/
DOSSL_ALGORITHM.pod5 OSSL_ALGORITHM - OpenSSL Core type to define a fetchable algorithm
22 algorithm that a L<provider(7)> provides. Arrays of this type are returned
41 L<EVP_MD_fetch(3)>, etc) to find the desired algorithm.
43 Multiple names / identities allow a specific algorithm implementation to be
44 fetched multiple ways. For example, the RSA algorithm has the following
57 This is the name of the algorithm's OBJECT IDENTIFIER (OID), as given by the
72 The OpenSSL libraries use the first of the algorithm names as the main
73 or canonical name, on a per algorithm implementation basis.
75 See the notes L</On the subject of algorithm names> below for a more in
82 algorithm implementation, and is used by the appropriate fetching
[all …]
DEVP_PBE_CipherInit.pod35 I<pass> of length I<passlen>. The PBE algorithm type and parameters are extracted
39 I<libctx> and property query I<propq> to select appropriate algorithm
42 =head2 PBE algorithm search
44 EVP_PBE_find() and EVP_PBE_find_ex() search for a matching algorithm using two parameters:
46 1. An algorithm type I<type> which can be:
52 EVP_PBE_TYPE_OUTER - A PBE algorithm
64 2. A I<pbe_nid> which can represent the algorithm identifier with parameters e.g.
65 B<NID_pbeWithSHA1AndRC2_CBC> or an algorithm class e.g. B<NID_pbes2>.
67 They return the algorithm's cipher ID I<pcnid>, digest ID I<pmnid> and a key
68 generation function for the algorithm I<pkeygen>. EVP_PBE_CipherInit_ex() also
[all …]
/third_party/ltp/testcases/kernel/security/integrity/ima/tests/
Dima_setup.sh25 local algorithm="$1"
29 digest="$(${algorithm}sum $file 2>/dev/null | cut -f1 -d ' ')"
35 digest="$(openssl $algorithm $file 2>/dev/null | cut -f2 -d ' ')"
42 local arg="$algorithm"
43 case "$algorithm" in
229 local algorithm digest
244 algorithm=$(echo "$digest" | cut -d $delimiter -f 1)
248 32) algorithm="md5" ;;
249 40) algorithm="sha1" ;;
251 echo "algorithm must be either md5 or sha1 (digest: '$digest')"
[all …]
/third_party/ltp/testcases/kernel/crypto/
Dcrypto_user02.c12 * the NETLINK_CRYPTO interface to try to delete a "larval" algorithm, which is
13 * a kernel-internal marker for an algorithm which has been registered but isn't
16 * CRYPTO_MSG_NEWALG will create such a larval algorithm. However, it waits
32 * The algorithm has to be valid (i.e. the drivers must exists
35 * The first algorithm, that fullfils the criteria is used for the test.
54 static const char* algorithm = NULL; variable
65 /* find an algorithm, that is not in use */ in setup()
78 algorithm = ALGORITHM_CANDIDATES[i]; in setup()
83 if (!algorithm) in setup()
84 tst_brk(TCONF, "No viable algorithm found"); in setup()
[all …]
/third_party/mindspore/mindspore-src/source/mindspore/core/ops/
Dfake_quant_param.h50 /// \param[in] quant_dtype Define quant data type of quant algorithm.
51 …/// \param[in] quant_algo_name Define the name of quant algorithm. Use `kAttrKeyLinearQuantAlgoNam…
52 /// algorithm.
58 /// \param[in] quant_dtype Define quant data type of quant algorithm.
63 /// \return a TypeId represents quant data type of quant algorithm.
68 …/// \param[in] quant_algo_name Define the name of quant algorithm. Use `kAttrKeyLinearQuantAlgoNam…
69 /// algorithm.
74 /// \return a string represents name of quant algorithm.
100 /// \brief Method to set quant parameter named `scale` for linear algorithm.
105 /// \brief Method to get quant parameters named `scale` for linear algorithm.
[all …]
/third_party/skia/third_party/externals/harfbuzz/docs/
Drepacker.md32 [includes a repacking algorithm](https://github.com/harfbuzz/harfbuzz/blob/main/src/hb-repacker.hh)
34 document provides a deep dive into how the harfbuzz repacking algorithm works.
46 be easily modified to test new ordering's and strategies as the repacking algorithm iterates.
48 * [Topological sorting algorithm](https://en.wikipedia.org/wiki/Topological_sorting): an algorithm
60 # High Level Algorithm
82 * [Kahn's Algorithm](https://en.wikipedia.org/wiki/Topological_sorting#Kahn's_algorithm)
85 Kahn's algorithm is approximately twice as fast as the shortest distance sort so that is attempted
91 This algorithm orders the nodes based on total distance to each node. Nodes with a shorter distance
103 [Djikstra's algorithm](https://en.wikipedia.org/wiki/Dijkstra%27s_algorithm). Then the topological
104 ordering is produce by applying a modified version of Kahn's algorithm that uses a priority queue
[all …]

12345678910>>...229