Home
last modified time | relevance | path

Searched full:algorithm (Results 1 – 25 of 6849) sorted by relevance

12345678910>>...274

/third_party/ltp/include/
Dtst_af_alg.h22 * Create an AF_ALG algorithm socket.
24 * This creates an AF_ALG algorithm socket that is initially not bound to any
25 * particular algorithm. On failure, tst_brk() is called with TCONF if the
28 * @return a new AF_ALG algorithm socket
33 * Bind an AF_ALG algorithm socket to an algorithm.
35 * @param algfd An AF_ALG algorithm socket
36 * @param addr A structure which specifies the algorithm to use
39 * specified algorithm, otherwise TBROK.
44 * Bind an AF_ALG algorithm socket to an algorithm.
46 * @param algfd An AF_ALG algorithm socket
[all …]
/third_party/mbedtls/include/psa/
Dcrypto_values.h70 * parameter such as a key type, algorithm, etc. is not recognized.
240 * an algorithm with a randomized result, as well as functions that
342 /** \defgroup crypto_types Key and algorithm types
435 * The key policy determines which underlying hash algorithm the key can be
440 * \c alg is the HMAC algorithm or the underlying hash algorithm. */
451 * The key policy determines which key derivation algorithm the key
474 * The key policy determines which key derivation algorithm the key can be
481 * The key policy determines which key derivation algorithm the key
489 * The key policy determines which key derivation algorithm the key
494 /** Key for a cipher, AEAD or MAC algorithm based on the AES block cipher.
[all …]
Dcrypto_sizes.h52 * \param alg A hash algorithm (\c PSA_ALG_XXX value such that
53 * #PSA_ALG_IS_HASH(\p alg) is true), or an HMAC algorithm
55 * hash algorithm).
57 * \return The hash size for the specified hash algorithm.
58 * If the hash algorithm is not recognized, return 0.
77 /** The input block size of a hash algorithm, in bytes.
84 * \param alg A hash algorithm (\c PSA_ALG_XXX value such that
87 * \return The block size in bytes for the specified hash algorithm.
88 * If the hash algorithm is not recognized, return 0.
90 * hash algorithm that it recognizes, but does not support.
[all …]
/third_party/openhitls/include/bsl/
Dbsl_obj.h35 * All algorithm ID
40 BSL_CID_RC4 = 1, /* identifies the RC4 algorithm */
41 BSL_CID_DES_ECB = 2, /* identifies DES algorithm in ECB mode */
42 BSL_CID_DES_CBC = 3, /* identifies DES algorithm in CBC mode */
43 BSL_CID_DES_OFB = 4, /* identifies DES algorithm in OFB mode */
44 BSL_CID_DES_CFB = 5, /* identifies DES algorithm in CFB mode */
45 BSL_CID_SCB2_128_ECB = 6, /* identifies SCB2-128 algorithm in ECB mode */
46 BSL_CID_SCB2_128_CBC = 7, /* identifies SCB2-128 algorithm in CBC mode */
47 BSL_CID_SCB2_256_ECB = 8, /* identifies SCB2-256 algorithm in ECB mode */
50 BSL_CID_DES_EDE_ECB = 10, /* identifies 2 key triple DES algorithm in ECB mode */
[all …]
/third_party/openssl/test/recipes/30-test_evp_data/
Devpmac_common.txt19 Algorithm = MD5
28 Algorithm = MD5
36 Algorithm = MD5
47 Algorithm = SHA1
55 Algorithm = SHA1
62 Algorithm = SHA1
71 Algorithm = SHA224
79 Algorithm = SHA224
85 Algorithm = SHA224
91 Algorithm = SHA256
[all …]
/third_party/openhitls/docs/en/6_Appendix/
D1_Terms.md3 |/|Symmetric Encryption|An algorithm that uses the same key for encryption and decryption, which is…
4 |/|Public Key Encryption|An algorithm that uses a pair of public and private keys for encryption an…
9 …r used to measure the cryptographic algorithm strength. Generally, the longer the key, the more se…
10 …ore TLS communication starts. The handshake process includes encryption algorithm negotiation, ide…
12 |/|Key Exchange Algorithm|An algorithm used during a TLS handshake to securely exchange cryptograph…
13 |/|Block Cipher|A symmetric encryption algorithm used to encrypt and decrypt data in TLS. Common bl…
14 |/|Stream Cipher|A symmetric encryption algorithm used to encrypt and decrypt data in TLS. The inpu…
17 …server negotiate security parameters such as the encryption algorithm, key exchange algorithm, and…
22 …tric encryption algorithm that is widely used in fields such as data encryption and network securi…
25 …ellman|A key exchange algorithm that is widely used in fields such as network security and VPN. Th…
[all …]
/third_party/skia/m133/toolchain/linux_trampolines/
DIWYU_mapping.imp2 { include: ["<__algorithm/adjacent_find.h>", "private", "<algorithm>", "public"] },
3 { include: ["<__algorithm/all_of.h>", "private", "<algorithm>", "public"] },
4 { include: ["<__algorithm/any_of.h>", "private", "<algorithm>", "public"] },
5 { include: ["<__algorithm/binary_search.h>", "private", "<algorithm>", "public"] },
6 { include: ["<__algorithm/clamp.h>", "private", "<algorithm>", "public"] },
7 { include: ["<__algorithm/comp.h>", "private", "<algorithm>", "public"] },
8 { include: ["<__algorithm/comp_ref_type.h>", "private", "<algorithm>", "public"] },
9 { include: ["<__algorithm/copy.h>", "private", "<algorithm>", "public"] },
10 { include: ["<__algorithm/copy_backward.h>", "private", "<algorithm>", "public"] },
11 { include: ["<__algorithm/copy_if.h>", "private", "<algorithm>", "public"] },
[all …]
/third_party/openssl/test/ssl-tests/
D20-cert-select.cnf9 test-4 = 4-P-256 CipherString and Signature Algorithm Selection
11 test-6 = 6-ECDSA Signature Algorithm Selection
12 test-7 = 7-ECDSA Signature Algorithm Selection SHA384
13 test-8 = 8-ECDSA Signature Algorithm Selection compressed point
14 test-9 = 9-ECDSA Signature Algorithm Selection, no ECDSA certificate
15 test-10 = 10-RSA Signature Algorithm Selection
16 test-11 = 11-RSA-PSS Signature Algorithm Selection
18 test-13 = 13-Suite B P-256 Hash Algorithm Selection
19 test-14 = 14-Suite B P-384 Hash Algorithm Selection
20 test-15 = 15-Ed25519 CipherString and Signature Algorithm Selection
[all …]
/third_party/grpc/include/grpc/
Dcompression.h31 /** Return if an algorithm is message compression algorithm. */
33 grpc_compression_algorithm algorithm);
35 /** Return if an algorithm is stream compression algorithm. */
37 grpc_compression_algorithm algorithm);
40 * algorithm. Returns 1 upon success, 0 otherwise. */
42 grpc_slice name, grpc_compression_algorithm* algorithm);
45 * algorithm. Note that \a name is statically allocated and must *not* be freed.
48 grpc_compression_algorithm algorithm, const char** name);
50 /** Returns the compression algorithm corresponding to \a level for the
57 /** Mark \a algorithm as enabled in \a opts. */
[all …]
/third_party/pcre2/pcre2/doc/
Dpcre2matching.39 string. The "standard" algorithm is the one provided by the \fBpcre2_match()\fP
18 An alternative algorithm is provided by the \fBpcre2_dfa_match()\fP function;
20 has advantages and disadvantages compared with the standard algorithm, and
33 there are three possible answers. The standard algorithm finds only one of
34 them, whereas the alternative algorithm finds all three.
48 .SH "THE STANDARD MATCHING ALGORITHM"
52 the standard algorithm is an "NFA algorithm". It conducts a depth-first search
55 the algorithm tries any alternatives at the current point, and if they all
62 the algorithm stops. Thus, if there is more than one possible match, this
63 algorithm returns the first one that it finds. Whether this is the shortest,
[all …]
/third_party/openssl/test/recipes/
D15-test_dsaparam.t27 ./util/opensslwrap.sh genpkey -genparam -algorithm DSA -pkeyopt dsa_paramgen_bits:1024 -pkeyopt qbi…
28 ./util/opensslwrap.sh genpkey -genparam -algorithm DSA -pkeyopt dsa_paramgen_bits:2048 -pkeyopt qbi…
29 ./util/opensslwrap.sh genpkey -genparam -algorithm DSA -pkeyopt dsa_paramgen_bits:2048 -pkeyopt qbi…
30 ./util/opensslwrap.sh genpkey -genparam -algorithm DSA -pkeyopt dsa_paramgen_bits:3072 -pkeyopt qbi…
32 ./util/opensslwrap.sh genpkey -genparam -algorithm DSA -pkeyopt dsa_paramgen_bits:1024 -pkeyopt qbi…
33 ./util/opensslwrap.sh genpkey -genparam -algorithm DSA -pkeyopt dsa_paramgen_bits:2048 -pkeyopt qbi…
34 ./util/opensslwrap.sh genpkey -genparam -algorithm DSA -pkeyopt dsa_paramgen_bits:2048 -pkeyopt qbi…
35 ./util/opensslwrap.sh genpkey -genparam -algorithm DSA -pkeyopt dsa_paramgen_bits:3072 -pkeyopt qbi…
37 ./util/opensslwrap.sh genpkey -genparam -algorithm DSA -pkeyopt dsa_paramgen_bits:1024 -pkeyopt qbi…
38 ./util/opensslwrap.sh genpkey -genparam -algorithm DSA -pkeyopt dsa_paramgen_bits:1024 -pkeyopt qbi…
[all …]
D15-test_gendhparam.t19 algorithm => 'DHX',
25 algorithm => 'DH',
31 algorithm => 'DHX',
37 algorithm => 'DHX',
43 algorithm => 'DHX',
49 algorithm => 'DH',
55 algorithm => 'DH',
61 algorithm => 'DH',
67 algorithm => 'DH',
73 algorithm => 'DH',
[all …]
D20-test_dhparam_check.t31 ./util/opensslwrap.sh genpkey -genparam -algorithm DH -pkeyopt dh_rfc5114:1 -out $TESTDIR/dh_5114_1…
32 ./util/opensslwrap.sh genpkey -genparam -algorithm DH -pkeyopt dh_rfc5114:2 -out $TESTDIR/dh_5114_2…
33 ./util/opensslwrap.sh genpkey -genparam -algorithm DH -pkeyopt dh_rfc5114:3 -out $TESTDIR/dh_5114_3…
34 ./util/opensslwrap.sh genpkey -genparam -algorithm DHX -pkeyopt dh_rfc5114:2 -out $TESTDIR/dhx_5114…
36 ./util/opensslwrap.sh genpkey -genparam -algorithm DHX -pkeyopt pbits:1024 -pkeyopt qbits:160 -pkey…
37 ./util/opensslwrap.sh genpkey -genparam -algorithm DHX -pkeyopt pbits:1024 -pkeyopt qbits:224 -pkey…
38 ./util/opensslwrap.sh genpkey -genparam -algorithm DHX -pkeyopt pbits:1024 -pkeyopt qbits:256 -pkey…
40 ./util/opensslwrap.sh genpkey -genparam -algorithm DHX -pkeyopt pbits:1024 -pkeyopt qbits:160 -pkey…
42 ./util/opensslwrap.sh genpkey -genparam -algorithm DHX -pkeyopt pbits:2048 -pkeyopt qbits:160 -pkey…
43 ./util/opensslwrap.sh genpkey -genparam -algorithm DHX -pkeyopt pbits:2048 -pkeyopt qbits:224 -pkey…
[all …]
/third_party/mbedtls/docs/architecture/psa-migration/
Dpsa-limitations.md96 the hash algorithm potentially used to hash the message being signed:
97 - a hash algorithm used for the encoding function
99 - most commonly MGF1, which in turn is parametrized by a hash algorithm
135 - algorithm specification:
141 - salt length: either <= hashlen (see note), or any depending on algorithm
165 - encoding hash = message hashing algorithm (may differ from MGF1 hash)
190 algorithm identifiers (for SHA-256, SHA-384 and SHA-512), depending of what
196 - the length of the salt MUST be equal to the length of the digest algorithm
215 Hash Algorithm: sha256
216 Mask Algorithm: mgf1 with sha224
[all …]
/third_party/openhitls/tls/include/
Dcipher_suite.h56 /* algorithm type */
57 HITLS_CipherAlgo cipherAlg; /**< Symmetric-key algorithm */
58 HITLS_KeyExchAlgo kxAlg; /**< key exchange algorithm */
59 HITLS_AuthAlgo authAlg; /**< server authorization algorithm */
60 HITLS_MacAlgo macAlg; /**< mac algorithm */
61 HITLS_HashAlgo hashAlg; /**< hash algorithm */
64 * Signature combination, including the hash algorithm and signature algorithm:
70 …uint8_t fixedIvLength; /**< If the AEAD algorithm is used, the value is the implicit IV length…
72 uint8_t macKeyLen; /**< If the AEAD algorithm is used, the MAC key length is 0 */
77 …uint8_t macLen; /**< The length of the MAC address. If the AEAD algorithm is used, this …
[all …]
/third_party/cups/cups/
Dhash.c39 static ssize_t hash_data(const char *algorithm, unsigned char *hash, size_t hashsize, const void *a…
45 // This function performs a hash function on the given data. The "algorithm"
57 cupsHashData(const char *algorithm, // I - Algorithm name in cupsHashData() argument
63 if (!algorithm || !data || datalen == 0 || !hash || hashsize == 0) in cupsHashData()
69 return (hash_data(algorithm, hash, hashsize, data, datalen, NULL, 0)); in cupsHashData()
119 // The "algorithm" argument can be any of the registered, non-deprecated IPP
131 const char *algorithm, // I - Hash algorithm in cupsHMACData() argument
148 if (!algorithm || !key || keylen == 0 || !data || datalen == 0 || !hmac || hmacsize < 32) in cupsHMACData()
152 if (!strcmp(algorithm, "sha2-384") || !strncmp(algorithm, "sha2-512", 8)) in cupsHMACData()
161 if ((hashlen = hash_data(algorithm, hkey, sizeof(hkey), key, keylen, NULL, 0)) < 0) in cupsHMACData()
[all …]
/third_party/grpc/test/core/compression/
Dcompression_test.cc45 grpc_compression_algorithm algorithm; in TEST() local
47 grpc_slice_from_static_string(valid_name), &algorithm); in TEST()
49 ASSERT_EQ(algorithm, valid_algorithms[i]); in TEST()
54 grpc_compression_algorithm algorithm; in TEST() local
57 grpc_slice_from_static_string(invalid_name), &algorithm); in TEST()
59 // the value of "algorithm" is undefined upon failure in TEST()
210 grpc_compression_algorithm algorithm; in TEST() local
215 for (algorithm = GRPC_COMPRESS_NONE; in TEST()
216 algorithm < GRPC_COMPRESS_ALGORITHMS_COUNT; in TEST()
217 algorithm = static_cast<grpc_compression_algorithm>( in TEST()
[all …]
/third_party/openssl/doc/man1/
Dopenssl-genpkey.pod.in22 [B<-algorithm> I<alg>]
64 This option encrypts the private key with the supplied cipher. Any algorithm
67 =item B<-algorithm> I<alg>
69 Public key algorithm to use such as RSA, DSA, DH or DHX. If used this option must
70 precede any B<-pkeyopt> options. The options B<-paramfile> and B<-algorithm>
74 Valid built-in algorithm names for private key generation are RSA, RSA-PSS, EC,
77 Valid built-in algorithm names for parameter generation (see the B<-genparam>
80 Note that the algorithm name X9.42 DH may be used as a synonym for DHX keys and
85 Set the public key algorithm option I<opt> to I<value>. The precise set of
86 options supported depends on the public key algorithm used and its
[all …]
/third_party/pcre2/pcre2/doc/html/
Dpcre2matching.html18 <li><a name="TOC3" href="#SEC3">THE STANDARD MATCHING ALGORITHM</a>
19 <li><a name="TOC4" href="#SEC4">THE ALTERNATIVE MATCHING ALGORITHM</a>
20 <li><a name="TOC5" href="#SEC5">ADVANTAGES OF THE ALTERNATIVE ALGORITHM</a>
21 <li><a name="TOC6" href="#SEC6">DISADVANTAGES OF THE ALTERNATIVE ALGORITHM</a>
29 string. The "standard" algorithm is the one provided by the <b>pcre2_match()</b>
37 An alternative algorithm is provided by the <b>pcre2_dfa_match()</b> function;
39 has advantages and disadvantages compared with the standard algorithm, and
53 there are three possible answers. The standard algorithm finds only one of
54 them, whereas the alternative algorithm finds all three.
65 <br><a name="SEC3" href="#TOC1">THE STANDARD MATCHING ALGORITHM</a><br>
[all …]
/third_party/ffmpeg/doc/
Dscaler.texi17 algorithm. Only a single algorithm should be selected. Default
23 Select fast bilinear scaling algorithm.
26 Select bilinear scaling algorithm.
29 Select bicubic scaling algorithm.
32 Select experimental scaling algorithm.
35 Select nearest neighbor rescaling algorithm.
38 Select averaging area rescaling algorithm.
41 Select bicubic scaling algorithm for the luma component, bilinear for
45 Select Gaussian rescaling algorithm.
48 Select sinc rescaling algorithm.
[all …]
/third_party/openhitls/include/tls/
Dhitls_crypt_type.h19 * @brief Algorithm related interfaces to be registered
37 …* @brief Key handle, which is converted into the corresponding structure based on the algorithm
44 * @brief Hash context. The user converts the structure based on the algorithm library.
51 * based on the algorithm library.
58 * based on the algorithm library.
66 * @brief Enumerated value of the symmetric encryption algorithm type.
76 * @brief Enumerated value of the symmetric encryption algorithm.
91 HITLS_CIPHER_BUTT = BSL_CID_UNKNOWN // Represents an unrecognized algorithm type
96 * @brief Hash algorithm enumeration
107 HITLS_HASH_BUTT = BSL_CID_UNKNOWN // Represents an unrecognized algorithm type
[all …]
/third_party/mbedtls/library/
Dpsa_crypto_cipher.h15 /** Get Mbed TLS cipher information given the cipher algorithm PSA identifier
17 * algorithm.
19 * \param[in] alg PSA cipher algorithm identifier
24 * \param[out] cipher_id Mbed TLS cipher algorithm identifier
28 * \c PSA_ERROR_NOT_SUPPORTED is returned if the cipher algorithm is not
37 /** Get Mbed TLS cipher information given the cipher algorithm PSA identifier
39 * algorithm.
41 * \param alg PSA cipher algorithm identifier
44 * \param[out] cipher_id Mbed TLS cipher algorithm identifier
46 * \return The Mbed TLS cipher information of the cipher algorithm.
[all …]
/third_party/openssl/crypto/asn1/
Dx_algor.c19 ASN1_SIMPLE(X509_ALGOR, algorithm, ASN1_OBJECT),
43 ASN1_OBJECT_free(alg->algorithm);
44 alg->algorithm = aobj;
60 *paobj = algor->algorithm; in X509_ALGOR_get0()
90 rv = OBJ_cmp(a->algorithm, b->algorithm); in X509_ALGOR_cmp()
103 if (dest->algorithm) in X509_ALGOR_copy()
104 ASN1_OBJECT_free(dest->algorithm); in X509_ALGOR_copy()
105 dest->algorithm = NULL; in X509_ALGOR_copy()
111 if (src->algorithm) in X509_ALGOR_copy()
112 if ((dest->algorithm = OBJ_dup(src->algorithm)) == NULL) in X509_ALGOR_copy()
[all …]
/third_party/openhitls/docs/en/5_Developer Guide/
D4_provider Development Guide.md97 ### 2.4 Algorithm Query and Invocation
101 …er querying suitable algorithms. See the corresponding headers for each algorithm for more details.
127 - `operaId`: Algorithm category ID (see "crypt_eal_implprovider.h").
128 - `algId`: Algorithm ID (see "crypt_eal_implprovider.h").
131 …t `NULL`, it retrieves the `provCtx` from the provider manager context where the algorithm resides.
156 …on during handshakes. Each `group` must support either a `kex` or `kem` algorithm. Through this me…
163 - `CRYPT_PARAM_CAP_TLS_GROUP_ALG_ID`: Type `BSL_PARAM_TYPE_INT32`, algorithm ID for the group, pass…
166 …_CAP_TLS_GROUP_IS_KEM`: Type `BSL_PARAM_TYPE_BOOL`, indicates whether the group is a KEM algorithm.
177 …ignature algorithm` supported by a provider can be declared through the callback passed to `CRYPT_…
181 …M_CAP_TLS_SIGNALG_KEY_TYPE`: Type `BSL_PARAM_TYPE_INT32`, key type used by the signature algorithm.
[all …]
/third_party/grpc/src/core/lib/compression/
Dcompression.cc41 grpc_compression_algorithm* algorithm) { in grpc_compression_algorithm_parse() argument
46 *algorithm = alg.value(); in grpc_compression_algorithm_parse()
52 int grpc_compression_algorithm_name(grpc_compression_algorithm algorithm, in grpc_compression_algorithm_name() argument
55 << "grpc_compression_algorithm_name(algorithm=" << (int)algorithm in grpc_compression_algorithm_name()
57 const char* result = grpc_core::CompressionAlgorithmAsString(algorithm); in grpc_compression_algorithm_name()
78 grpc_compression_options* opts, grpc_compression_algorithm algorithm) { in grpc_compression_options_enable_algorithm() argument
79 grpc_core::SetBit(&opts->enabled_algorithms_bitset, algorithm); in grpc_compression_options_enable_algorithm()
83 grpc_compression_options* opts, grpc_compression_algorithm algorithm) { in grpc_compression_options_disable_algorithm() argument
84 grpc_core::ClearBit(&opts->enabled_algorithms_bitset, algorithm); in grpc_compression_options_disable_algorithm()
89 grpc_compression_algorithm algorithm) { in grpc_compression_options_is_algorithm_enabled() argument
[all …]

12345678910>>...274