| /third_party/ltp/include/ |
| D | tst_af_alg.h | 22 * Create an AF_ALG algorithm socket. 24 * This creates an AF_ALG algorithm socket that is initially not bound to any 25 * particular algorithm. On failure, tst_brk() is called with TCONF if the 28 * @return a new AF_ALG algorithm socket 33 * Bind an AF_ALG algorithm socket to an algorithm. 35 * @param algfd An AF_ALG algorithm socket 36 * @param addr A structure which specifies the algorithm to use 39 * specified algorithm, otherwise TBROK. 44 * Bind an AF_ALG algorithm socket to an algorithm. 46 * @param algfd An AF_ALG algorithm socket [all …]
|
| /third_party/mbedtls/include/psa/ |
| D | crypto_values.h | 70 * parameter such as a key type, algorithm, etc. is not recognized. 240 * an algorithm with a randomized result, as well as functions that 342 /** \defgroup crypto_types Key and algorithm types 435 * The key policy determines which underlying hash algorithm the key can be 440 * \c alg is the HMAC algorithm or the underlying hash algorithm. */ 451 * The key policy determines which key derivation algorithm the key 474 * The key policy determines which key derivation algorithm the key can be 481 * The key policy determines which key derivation algorithm the key 489 * The key policy determines which key derivation algorithm the key 494 /** Key for a cipher, AEAD or MAC algorithm based on the AES block cipher. [all …]
|
| D | crypto_sizes.h | 52 * \param alg A hash algorithm (\c PSA_ALG_XXX value such that 53 * #PSA_ALG_IS_HASH(\p alg) is true), or an HMAC algorithm 55 * hash algorithm). 57 * \return The hash size for the specified hash algorithm. 58 * If the hash algorithm is not recognized, return 0. 77 /** The input block size of a hash algorithm, in bytes. 84 * \param alg A hash algorithm (\c PSA_ALG_XXX value such that 87 * \return The block size in bytes for the specified hash algorithm. 88 * If the hash algorithm is not recognized, return 0. 90 * hash algorithm that it recognizes, but does not support. [all …]
|
| D | crypto_extra.h | 39 /** \brief Declare the enrollment algorithm for a key. 41 * An operation on a key may indifferently use the algorithm set with 45 * \param alg2 A second algorithm that the key may be used 46 * for, in addition to the algorithm set with 49 * \warning Setting an enrollment algorithm is not recommended, because 65 /** Retrieve the enrollment algorithm policy from key attributes. 69 * \return The enrollment algorithm stored in the attribute structure. 359 * \param hash_alg A hash algorithm (\c PSA_ALG_XXX value such that 362 * when specifying the algorithm in a usage policy. 364 * \return The corresponding DSA signature algorithm. [all …]
|
| /third_party/openssl/test/recipes/30-test_evp_data/ |
| D | evpmac_common.txt | 19 Algorithm = MD5 28 Algorithm = MD5 36 Algorithm = MD5 47 Algorithm = SHA1 55 Algorithm = SHA1 62 Algorithm = SHA1 71 Algorithm = SHA224 79 Algorithm = SHA224 85 Algorithm = SHA224 91 Algorithm = SHA256 [all …]
|
| /third_party/openssl/test/ssl-tests/ |
| D | 20-cert-select.cnf | 9 test-4 = 4-P-256 CipherString and Signature Algorithm Selection 11 test-6 = 6-ECDSA Signature Algorithm Selection 12 test-7 = 7-ECDSA Signature Algorithm Selection SHA384 13 test-8 = 8-ECDSA Signature Algorithm Selection compressed point 14 test-9 = 9-ECDSA Signature Algorithm Selection, no ECDSA certificate 15 test-10 = 10-RSA Signature Algorithm Selection 16 test-11 = 11-RSA-PSS Signature Algorithm Selection 18 test-13 = 13-Suite B P-256 Hash Algorithm Selection 19 test-14 = 14-Suite B P-384 Hash Algorithm Selection 20 test-15 = 15-Ed25519 CipherString and Signature Algorithm Selection [all …]
|
| /third_party/mbedtls/docs/architecture/psa-migration/ |
| D | psa-limitations.md | 96 the hash algorithm potentially used to hash the message being signed: 97 - a hash algorithm used for the encoding function 99 - most commonly MGF1, which in turn is parametrized by a hash algorithm 135 - algorithm specification: 141 - salt length: either <= hashlen (see note), or any depending on algorithm 165 - encoding hash = message hashing algorithm (may differ from MGF1 hash) 190 algorithm identifiers (for SHA-256, SHA-384 and SHA-512), depending of what 196 - the length of the salt MUST be equal to the length of the digest algorithm 215 Hash Algorithm: sha256 216 Mask Algorithm: mgf1 with sha224 [all …]
|
| /third_party/pcre2/pcre2/doc/ |
| D | pcre2matching.3 | 9 string. The "standard" algorithm is the one provided by the \fBpcre2_match()\fP 18 An alternative algorithm is provided by the \fBpcre2_dfa_match()\fP function; 20 has advantages and disadvantages compared with the standard algorithm, and 33 there are three possible answers. The standard algorithm finds only one of 34 them, whereas the alternative algorithm finds all three. 48 .SH "THE STANDARD MATCHING ALGORITHM" 52 the standard algorithm is an "NFA algorithm". It conducts a depth-first search 55 the algorithm tries any alternatives at the current point, and if they all 62 the algorithm stops. Thus, if there is more than one possible match, this 63 algorithm returns the first one that it finds. Whether this is the shortest, [all …]
|
| /third_party/openssl/test/recipes/ |
| D | 15-test_dsaparam.t | 27 ./util/opensslwrap.sh genpkey -genparam -algorithm DSA -pkeyopt dsa_paramgen_bits:1024 -pkeyopt qbi… 28 ./util/opensslwrap.sh genpkey -genparam -algorithm DSA -pkeyopt dsa_paramgen_bits:2048 -pkeyopt qbi… 29 ./util/opensslwrap.sh genpkey -genparam -algorithm DSA -pkeyopt dsa_paramgen_bits:2048 -pkeyopt qbi… 30 ./util/opensslwrap.sh genpkey -genparam -algorithm DSA -pkeyopt dsa_paramgen_bits:3072 -pkeyopt qbi… 32 ./util/opensslwrap.sh genpkey -genparam -algorithm DSA -pkeyopt dsa_paramgen_bits:1024 -pkeyopt qbi… 33 ./util/opensslwrap.sh genpkey -genparam -algorithm DSA -pkeyopt dsa_paramgen_bits:2048 -pkeyopt qbi… 34 ./util/opensslwrap.sh genpkey -genparam -algorithm DSA -pkeyopt dsa_paramgen_bits:2048 -pkeyopt qbi… 35 ./util/opensslwrap.sh genpkey -genparam -algorithm DSA -pkeyopt dsa_paramgen_bits:3072 -pkeyopt qbi… 37 ./util/opensslwrap.sh genpkey -genparam -algorithm DSA -pkeyopt dsa_paramgen_bits:1024 -pkeyopt qbi… 38 ./util/opensslwrap.sh genpkey -genparam -algorithm DSA -pkeyopt dsa_paramgen_bits:1024 -pkeyopt qbi… [all …]
|
| D | 15-test_gendhparam.t | 19 algorithm => 'DHX', 25 algorithm => 'DH', 31 algorithm => 'DHX', 37 algorithm => 'DHX', 43 algorithm => 'DHX', 49 algorithm => 'DH', 55 algorithm => 'DH', 61 algorithm => 'DH', 67 algorithm => 'DH', 73 algorithm => 'DH', [all …]
|
| D | 20-test_dhparam_check.t | 31 ./util/opensslwrap.sh genpkey -genparam -algorithm DH -pkeyopt dh_rfc5114:1 -out $TESTDIR/dh_5114_1… 32 ./util/opensslwrap.sh genpkey -genparam -algorithm DH -pkeyopt dh_rfc5114:2 -out $TESTDIR/dh_5114_2… 33 ./util/opensslwrap.sh genpkey -genparam -algorithm DH -pkeyopt dh_rfc5114:3 -out $TESTDIR/dh_5114_3… 34 ./util/opensslwrap.sh genpkey -genparam -algorithm DHX -pkeyopt dh_rfc5114:2 -out $TESTDIR/dhx_5114… 36 ./util/opensslwrap.sh genpkey -genparam -algorithm DHX -pkeyopt pbits:1024 -pkeyopt qbits:160 -pkey… 37 ./util/opensslwrap.sh genpkey -genparam -algorithm DHX -pkeyopt pbits:1024 -pkeyopt qbits:224 -pkey… 38 ./util/opensslwrap.sh genpkey -genparam -algorithm DHX -pkeyopt pbits:1024 -pkeyopt qbits:256 -pkey… 40 ./util/opensslwrap.sh genpkey -genparam -algorithm DHX -pkeyopt pbits:1024 -pkeyopt qbits:160 -pkey… 42 ./util/opensslwrap.sh genpkey -genparam -algorithm DHX -pkeyopt pbits:2048 -pkeyopt qbits:160 -pkey… 43 ./util/opensslwrap.sh genpkey -genparam -algorithm DHX -pkeyopt pbits:2048 -pkeyopt qbits:224 -pkey… [all …]
|
| /third_party/openssl/doc/man1/ |
| D | openssl-genpkey.pod.in | 22 [B<-algorithm> I<alg>] 64 This option encrypts the private key with the supplied cipher. Any algorithm 67 =item B<-algorithm> I<alg> 69 Public key algorithm to use such as RSA, DSA, DH or DHX. If used this option must 70 precede any B<-pkeyopt> options. The options B<-paramfile> and B<-algorithm> 74 Valid built-in algorithm names for private key generation are RSA, RSA-PSS, EC, 77 Valid built-in algorithm names for parameter generation (see the B<-genparam> 80 Note that the algorithm name X9.42 DH may be used as a synonym for DHX keys and 85 Set the public key algorithm option I<opt> to I<value>. The precise set of 86 options supported depends on the public key algorithm used and its [all …]
|
| D | openssl-pkeyutl.pod.in | 6 openssl-pkeyutl - public key algorithm command 14 [B<-digest> I<algorithm>] 31 [B<-kdf> I<algorithm>] 45 operations using any supported algorithm. 63 message digest algorithm. The user can specify a digest algorithm by using 67 =item B<-digest> I<algorithm> 69 This specifies the digest algorithm which is used to hash the input data before 71 signature algorithm does not require one (for instance, EdDSA). If this option 72 is omitted but the signature algorithm requires one, a default value will be 74 default digest algorithm. For SM2, it will be SM3. If this option is present, [all …]
|
| /third_party/pcre2/pcre2/doc/html/ |
| D | pcre2matching.html | 18 <li><a name="TOC3" href="#SEC3">THE STANDARD MATCHING ALGORITHM</a> 19 <li><a name="TOC4" href="#SEC4">THE ALTERNATIVE MATCHING ALGORITHM</a> 20 <li><a name="TOC5" href="#SEC5">ADVANTAGES OF THE ALTERNATIVE ALGORITHM</a> 21 <li><a name="TOC6" href="#SEC6">DISADVANTAGES OF THE ALTERNATIVE ALGORITHM</a> 29 string. The "standard" algorithm is the one provided by the <b>pcre2_match()</b> 37 An alternative algorithm is provided by the <b>pcre2_dfa_match()</b> function; 39 has advantages and disadvantages compared with the standard algorithm, and 53 there are three possible answers. The standard algorithm finds only one of 54 them, whereas the alternative algorithm finds all three. 65 <br><a name="SEC3" href="#TOC1">THE STANDARD MATCHING ALGORITHM</a><br> [all …]
|
| /third_party/mbedtls/library/ |
| D | psa_crypto_cipher.h | 15 /** Get Mbed TLS cipher information given the cipher algorithm PSA identifier 17 * algorithm. 19 * \param[in] alg PSA cipher algorithm identifier 24 * \param[out] cipher_id Mbed TLS cipher algorithm identifier 28 * \c PSA_ERROR_NOT_SUPPORTED is returned if the cipher algorithm is not 37 /** Get Mbed TLS cipher information given the cipher algorithm PSA identifier 39 * algorithm. 41 * \param alg PSA cipher algorithm identifier 44 * \param[out] cipher_id Mbed TLS cipher algorithm identifier 46 * \return The Mbed TLS cipher information of the cipher algorithm. [all …]
|
| /third_party/ffmpeg/doc/ |
| D | scaler.texi | 17 algorithm. Only a single algorithm should be selected. Default 23 Select fast bilinear scaling algorithm. 26 Select bilinear scaling algorithm. 29 Select bicubic scaling algorithm. 32 Select experimental scaling algorithm. 35 Select nearest neighbor rescaling algorithm. 38 Select averaging area rescaling algorithm. 41 Select bicubic scaling algorithm for the luma component, bilinear for 45 Select Gaussian rescaling algorithm. 48 Select sinc rescaling algorithm. [all …]
|
| /third_party/openssl/crypto/asn1/ |
| D | x_algor.c | 19 ASN1_SIMPLE(X509_ALGOR, algorithm, ASN1_OBJECT), 43 ASN1_OBJECT_free(alg->algorithm); 44 alg->algorithm = aobj; 60 *paobj = algor->algorithm; in X509_ALGOR_get0() 90 rv = OBJ_cmp(a->algorithm, b->algorithm); in X509_ALGOR_cmp() 103 if (dest->algorithm) in X509_ALGOR_copy() 104 ASN1_OBJECT_free(dest->algorithm); in X509_ALGOR_copy() 105 dest->algorithm = NULL; in X509_ALGOR_copy() 111 if (src->algorithm) in X509_ALGOR_copy() 112 if ((dest->algorithm = OBJ_dup(src->algorithm)) == NULL) in X509_ALGOR_copy() [all …]
|
| /third_party/openssl/doc/man7/ |
| D | openssl-glossary.pod | 13 =item Algorithm 17 implementation for any given algorithm available for use. 34 the algorithm implementations in the Base Provider are also available in the 41 A decoder is a type of algorithm used for decoding keys and parameters from some 48 An OpenSSL Provider that contains the most commmon OpenSSL algorithm 50 the algorithm implementations in the Base Provider are also available in the 67 An encoder is a type of algorithm used for encoding keys and parameters to some 75 where a function call is made to obtain an algorithm object representing an 80 Fetching is the process of looking through the available algorithm 90 An OpenSSL Provider that contains OpenSSL algorithm implementations that have [all …]
|
| D | crypto.pod | 27 referred to in OpenSSL as "algorithms". Each algorithm may have multiple 28 implementations available for use. For example the RSA algorithm is available as 40 encryption operation using AES (or any other encryption algorithm) you would use 47 A provider in OpenSSL is a component that collects together algorithm 48 implementations. In order to use an algorithm you must have at least one 78 See also L</ALGORITHM FETCHING>. 100 =head1 ALGORITHM FETCHING 102 In order to use an algorithm an implementation for it must first be "fetched". 112 When fetching an algorithm it is possible to specify a property query string to 115 algorithm implementations in the default provider. [all …]
|
| /third_party/openssl/doc/man3/ |
| D | OSSL_ALGORITHM.pod | 5 OSSL_ALGORITHM - OpenSSL Core type to define a fetchable algorithm 22 algorithm that a L<provider(7)> provides. Arrays of this type are returned 41 L<EVP_MD_fetch(3)>, etc) to find the desired algorithm. 43 Multiple names / identities allow a specific algorithm implementation to be 44 fetched multiple ways. For example, the RSA algorithm has the following 57 This is the name of the algorithm's OBJECT IDENTIFIER (OID), as given by the 72 The OpenSSL libraries use the first of the algorithm names as the main 73 or canonical name, on a per algorithm implementation basis. 75 See the notes L</On the subject of algorithm names> below for a more in 82 algorithm implementation, and is used by the appropriate fetching [all …]
|
| D | EVP_PBE_CipherInit.pod | 35 I<pass> of length I<passlen>. The PBE algorithm type and parameters are extracted 39 I<libctx> and property query I<propq> to select appropriate algorithm 42 =head2 PBE algorithm search 44 EVP_PBE_find() and EVP_PBE_find_ex() search for a matching algorithm using two parameters: 46 1. An algorithm type I<type> which can be: 52 EVP_PBE_TYPE_OUTER - A PBE algorithm 64 2. A I<pbe_nid> which can represent the algorithm identifier with parameters e.g. 65 B<NID_pbeWithSHA1AndRC2_CBC> or an algorithm class e.g. B<NID_pbes2>. 67 They return the algorithm's cipher ID I<pcnid>, digest ID I<pmnid> and a key 68 generation function for the algorithm I<pkeygen>. EVP_PBE_CipherInit_ex() also [all …]
|
| /third_party/ltp/testcases/kernel/security/integrity/ima/tests/ |
| D | ima_setup.sh | 25 local algorithm="$1" 29 digest="$(${algorithm}sum $file 2>/dev/null | cut -f1 -d ' ')" 35 digest="$(openssl $algorithm $file 2>/dev/null | cut -f2 -d ' ')" 42 local arg="$algorithm" 43 case "$algorithm" in 229 local algorithm digest 244 algorithm=$(echo "$digest" | cut -d $delimiter -f 1) 248 32) algorithm="md5" ;; 249 40) algorithm="sha1" ;; 251 echo "algorithm must be either md5 or sha1 (digest: '$digest')" [all …]
|
| /third_party/ltp/testcases/kernel/crypto/ |
| D | crypto_user02.c | 12 * the NETLINK_CRYPTO interface to try to delete a "larval" algorithm, which is 13 * a kernel-internal marker for an algorithm which has been registered but isn't 16 * CRYPTO_MSG_NEWALG will create such a larval algorithm. However, it waits 32 * The algorithm has to be valid (i.e. the drivers must exists 35 * The first algorithm, that fullfils the criteria is used for the test. 54 static const char* algorithm = NULL; variable 65 /* find an algorithm, that is not in use */ in setup() 78 algorithm = ALGORITHM_CANDIDATES[i]; in setup() 83 if (!algorithm) in setup() 84 tst_brk(TCONF, "No viable algorithm found"); in setup() [all …]
|
| /third_party/mindspore/mindspore-src/source/mindspore/core/ops/ |
| D | fake_quant_param.h | 50 /// \param[in] quant_dtype Define quant data type of quant algorithm. 51 …/// \param[in] quant_algo_name Define the name of quant algorithm. Use `kAttrKeyLinearQuantAlgoNam… 52 /// algorithm. 58 /// \param[in] quant_dtype Define quant data type of quant algorithm. 63 /// \return a TypeId represents quant data type of quant algorithm. 68 …/// \param[in] quant_algo_name Define the name of quant algorithm. Use `kAttrKeyLinearQuantAlgoNam… 69 /// algorithm. 74 /// \return a string represents name of quant algorithm. 100 /// \brief Method to set quant parameter named `scale` for linear algorithm. 105 /// \brief Method to get quant parameters named `scale` for linear algorithm. [all …]
|
| /third_party/skia/third_party/externals/harfbuzz/docs/ |
| D | repacker.md | 32 [includes a repacking algorithm](https://github.com/harfbuzz/harfbuzz/blob/main/src/hb-repacker.hh) 34 document provides a deep dive into how the harfbuzz repacking algorithm works. 46 be easily modified to test new ordering's and strategies as the repacking algorithm iterates. 48 * [Topological sorting algorithm](https://en.wikipedia.org/wiki/Topological_sorting): an algorithm 60 # High Level Algorithm 82 * [Kahn's Algorithm](https://en.wikipedia.org/wiki/Topological_sorting#Kahn's_algorithm) 85 Kahn's algorithm is approximately twice as fast as the shortest distance sort so that is attempted 91 This algorithm orders the nodes based on total distance to each node. Nodes with a shorter distance 103 [Djikstra's algorithm](https://en.wikipedia.org/wiki/Dijkstra%27s_algorithm). Then the topological 104 ordering is produce by applying a modified version of Kahn's algorithm that uses a priority queue [all …]
|