| /third_party/ltp/include/ |
| D | tst_af_alg.h | 22 * Create an AF_ALG algorithm socket. 24 * This creates an AF_ALG algorithm socket that is initially not bound to any 25 * particular algorithm. On failure, tst_brk() is called with TCONF if the 28 * @return a new AF_ALG algorithm socket 33 * Bind an AF_ALG algorithm socket to an algorithm. 35 * @param algfd An AF_ALG algorithm socket 36 * @param addr A structure which specifies the algorithm to use 39 * specified algorithm, otherwise TBROK. 44 * Bind an AF_ALG algorithm socket to an algorithm. 46 * @param algfd An AF_ALG algorithm socket [all …]
|
| /third_party/mbedtls/include/psa/ |
| D | crypto_values.h | 70 * parameter such as a key type, algorithm, etc. is not recognized. 240 * an algorithm with a randomized result, as well as functions that 342 /** \defgroup crypto_types Key and algorithm types 435 * The key policy determines which underlying hash algorithm the key can be 440 * \c alg is the HMAC algorithm or the underlying hash algorithm. */ 451 * The key policy determines which key derivation algorithm the key 474 * The key policy determines which key derivation algorithm the key can be 481 * The key policy determines which key derivation algorithm the key 489 * The key policy determines which key derivation algorithm the key 494 /** Key for a cipher, AEAD or MAC algorithm based on the AES block cipher. [all …]
|
| D | crypto_sizes.h | 52 * \param alg A hash algorithm (\c PSA_ALG_XXX value such that 53 * #PSA_ALG_IS_HASH(\p alg) is true), or an HMAC algorithm 55 * hash algorithm). 57 * \return The hash size for the specified hash algorithm. 58 * If the hash algorithm is not recognized, return 0. 77 /** The input block size of a hash algorithm, in bytes. 84 * \param alg A hash algorithm (\c PSA_ALG_XXX value such that 87 * \return The block size in bytes for the specified hash algorithm. 88 * If the hash algorithm is not recognized, return 0. 90 * hash algorithm that it recognizes, but does not support. [all …]
|
| /third_party/openhitls/include/bsl/ |
| D | bsl_obj.h | 35 * All algorithm ID 40 BSL_CID_RC4 = 1, /* identifies the RC4 algorithm */ 41 BSL_CID_DES_ECB = 2, /* identifies DES algorithm in ECB mode */ 42 BSL_CID_DES_CBC = 3, /* identifies DES algorithm in CBC mode */ 43 BSL_CID_DES_OFB = 4, /* identifies DES algorithm in OFB mode */ 44 BSL_CID_DES_CFB = 5, /* identifies DES algorithm in CFB mode */ 45 BSL_CID_SCB2_128_ECB = 6, /* identifies SCB2-128 algorithm in ECB mode */ 46 BSL_CID_SCB2_128_CBC = 7, /* identifies SCB2-128 algorithm in CBC mode */ 47 BSL_CID_SCB2_256_ECB = 8, /* identifies SCB2-256 algorithm in ECB mode */ 50 BSL_CID_DES_EDE_ECB = 10, /* identifies 2 key triple DES algorithm in ECB mode */ [all …]
|
| /third_party/openssl/test/recipes/30-test_evp_data/ |
| D | evpmac_common.txt | 19 Algorithm = MD5 28 Algorithm = MD5 36 Algorithm = MD5 47 Algorithm = SHA1 55 Algorithm = SHA1 62 Algorithm = SHA1 71 Algorithm = SHA224 79 Algorithm = SHA224 85 Algorithm = SHA224 91 Algorithm = SHA256 [all …]
|
| /third_party/openhitls/docs/en/6_Appendix/ |
| D | 1_Terms.md | 3 |/|Symmetric Encryption|An algorithm that uses the same key for encryption and decryption, which is… 4 |/|Public Key Encryption|An algorithm that uses a pair of public and private keys for encryption an… 9 …r used to measure the cryptographic algorithm strength. Generally, the longer the key, the more se… 10 …ore TLS communication starts. The handshake process includes encryption algorithm negotiation, ide… 12 |/|Key Exchange Algorithm|An algorithm used during a TLS handshake to securely exchange cryptograph… 13 |/|Block Cipher|A symmetric encryption algorithm used to encrypt and decrypt data in TLS. Common bl… 14 |/|Stream Cipher|A symmetric encryption algorithm used to encrypt and decrypt data in TLS. The inpu… 17 …server negotiate security parameters such as the encryption algorithm, key exchange algorithm, and… 22 …tric encryption algorithm that is widely used in fields such as data encryption and network securi… 25 …ellman|A key exchange algorithm that is widely used in fields such as network security and VPN. Th… [all …]
|
| /third_party/skia/m133/toolchain/linux_trampolines/ |
| D | IWYU_mapping.imp | 2 { include: ["<__algorithm/adjacent_find.h>", "private", "<algorithm>", "public"] }, 3 { include: ["<__algorithm/all_of.h>", "private", "<algorithm>", "public"] }, 4 { include: ["<__algorithm/any_of.h>", "private", "<algorithm>", "public"] }, 5 { include: ["<__algorithm/binary_search.h>", "private", "<algorithm>", "public"] }, 6 { include: ["<__algorithm/clamp.h>", "private", "<algorithm>", "public"] }, 7 { include: ["<__algorithm/comp.h>", "private", "<algorithm>", "public"] }, 8 { include: ["<__algorithm/comp_ref_type.h>", "private", "<algorithm>", "public"] }, 9 { include: ["<__algorithm/copy.h>", "private", "<algorithm>", "public"] }, 10 { include: ["<__algorithm/copy_backward.h>", "private", "<algorithm>", "public"] }, 11 { include: ["<__algorithm/copy_if.h>", "private", "<algorithm>", "public"] }, [all …]
|
| /third_party/openssl/test/ssl-tests/ |
| D | 20-cert-select.cnf | 9 test-4 = 4-P-256 CipherString and Signature Algorithm Selection 11 test-6 = 6-ECDSA Signature Algorithm Selection 12 test-7 = 7-ECDSA Signature Algorithm Selection SHA384 13 test-8 = 8-ECDSA Signature Algorithm Selection compressed point 14 test-9 = 9-ECDSA Signature Algorithm Selection, no ECDSA certificate 15 test-10 = 10-RSA Signature Algorithm Selection 16 test-11 = 11-RSA-PSS Signature Algorithm Selection 18 test-13 = 13-Suite B P-256 Hash Algorithm Selection 19 test-14 = 14-Suite B P-384 Hash Algorithm Selection 20 test-15 = 15-Ed25519 CipherString and Signature Algorithm Selection [all …]
|
| /third_party/grpc/include/grpc/ |
| D | compression.h | 31 /** Return if an algorithm is message compression algorithm. */ 33 grpc_compression_algorithm algorithm); 35 /** Return if an algorithm is stream compression algorithm. */ 37 grpc_compression_algorithm algorithm); 40 * algorithm. Returns 1 upon success, 0 otherwise. */ 42 grpc_slice name, grpc_compression_algorithm* algorithm); 45 * algorithm. Note that \a name is statically allocated and must *not* be freed. 48 grpc_compression_algorithm algorithm, const char** name); 50 /** Returns the compression algorithm corresponding to \a level for the 57 /** Mark \a algorithm as enabled in \a opts. */ [all …]
|
| /third_party/pcre2/pcre2/doc/ |
| D | pcre2matching.3 | 9 string. The "standard" algorithm is the one provided by the \fBpcre2_match()\fP 18 An alternative algorithm is provided by the \fBpcre2_dfa_match()\fP function; 20 has advantages and disadvantages compared with the standard algorithm, and 33 there are three possible answers. The standard algorithm finds only one of 34 them, whereas the alternative algorithm finds all three. 48 .SH "THE STANDARD MATCHING ALGORITHM" 52 the standard algorithm is an "NFA algorithm". It conducts a depth-first search 55 the algorithm tries any alternatives at the current point, and if they all 62 the algorithm stops. Thus, if there is more than one possible match, this 63 algorithm returns the first one that it finds. Whether this is the shortest, [all …]
|
| /third_party/openssl/test/recipes/ |
| D | 15-test_dsaparam.t | 27 ./util/opensslwrap.sh genpkey -genparam -algorithm DSA -pkeyopt dsa_paramgen_bits:1024 -pkeyopt qbi… 28 ./util/opensslwrap.sh genpkey -genparam -algorithm DSA -pkeyopt dsa_paramgen_bits:2048 -pkeyopt qbi… 29 ./util/opensslwrap.sh genpkey -genparam -algorithm DSA -pkeyopt dsa_paramgen_bits:2048 -pkeyopt qbi… 30 ./util/opensslwrap.sh genpkey -genparam -algorithm DSA -pkeyopt dsa_paramgen_bits:3072 -pkeyopt qbi… 32 ./util/opensslwrap.sh genpkey -genparam -algorithm DSA -pkeyopt dsa_paramgen_bits:1024 -pkeyopt qbi… 33 ./util/opensslwrap.sh genpkey -genparam -algorithm DSA -pkeyopt dsa_paramgen_bits:2048 -pkeyopt qbi… 34 ./util/opensslwrap.sh genpkey -genparam -algorithm DSA -pkeyopt dsa_paramgen_bits:2048 -pkeyopt qbi… 35 ./util/opensslwrap.sh genpkey -genparam -algorithm DSA -pkeyopt dsa_paramgen_bits:3072 -pkeyopt qbi… 37 ./util/opensslwrap.sh genpkey -genparam -algorithm DSA -pkeyopt dsa_paramgen_bits:1024 -pkeyopt qbi… 38 ./util/opensslwrap.sh genpkey -genparam -algorithm DSA -pkeyopt dsa_paramgen_bits:1024 -pkeyopt qbi… [all …]
|
| D | 15-test_gendhparam.t | 19 algorithm => 'DHX', 25 algorithm => 'DH', 31 algorithm => 'DHX', 37 algorithm => 'DHX', 43 algorithm => 'DHX', 49 algorithm => 'DH', 55 algorithm => 'DH', 61 algorithm => 'DH', 67 algorithm => 'DH', 73 algorithm => 'DH', [all …]
|
| D | 20-test_dhparam_check.t | 31 ./util/opensslwrap.sh genpkey -genparam -algorithm DH -pkeyopt dh_rfc5114:1 -out $TESTDIR/dh_5114_1… 32 ./util/opensslwrap.sh genpkey -genparam -algorithm DH -pkeyopt dh_rfc5114:2 -out $TESTDIR/dh_5114_2… 33 ./util/opensslwrap.sh genpkey -genparam -algorithm DH -pkeyopt dh_rfc5114:3 -out $TESTDIR/dh_5114_3… 34 ./util/opensslwrap.sh genpkey -genparam -algorithm DHX -pkeyopt dh_rfc5114:2 -out $TESTDIR/dhx_5114… 36 ./util/opensslwrap.sh genpkey -genparam -algorithm DHX -pkeyopt pbits:1024 -pkeyopt qbits:160 -pkey… 37 ./util/opensslwrap.sh genpkey -genparam -algorithm DHX -pkeyopt pbits:1024 -pkeyopt qbits:224 -pkey… 38 ./util/opensslwrap.sh genpkey -genparam -algorithm DHX -pkeyopt pbits:1024 -pkeyopt qbits:256 -pkey… 40 ./util/opensslwrap.sh genpkey -genparam -algorithm DHX -pkeyopt pbits:1024 -pkeyopt qbits:160 -pkey… 42 ./util/opensslwrap.sh genpkey -genparam -algorithm DHX -pkeyopt pbits:2048 -pkeyopt qbits:160 -pkey… 43 ./util/opensslwrap.sh genpkey -genparam -algorithm DHX -pkeyopt pbits:2048 -pkeyopt qbits:224 -pkey… [all …]
|
| /third_party/mbedtls/docs/architecture/psa-migration/ |
| D | psa-limitations.md | 96 the hash algorithm potentially used to hash the message being signed: 97 - a hash algorithm used for the encoding function 99 - most commonly MGF1, which in turn is parametrized by a hash algorithm 135 - algorithm specification: 141 - salt length: either <= hashlen (see note), or any depending on algorithm 165 - encoding hash = message hashing algorithm (may differ from MGF1 hash) 190 algorithm identifiers (for SHA-256, SHA-384 and SHA-512), depending of what 196 - the length of the salt MUST be equal to the length of the digest algorithm 215 Hash Algorithm: sha256 216 Mask Algorithm: mgf1 with sha224 [all …]
|
| /third_party/openhitls/tls/include/ |
| D | cipher_suite.h | 56 /* algorithm type */ 57 HITLS_CipherAlgo cipherAlg; /**< Symmetric-key algorithm */ 58 HITLS_KeyExchAlgo kxAlg; /**< key exchange algorithm */ 59 HITLS_AuthAlgo authAlg; /**< server authorization algorithm */ 60 HITLS_MacAlgo macAlg; /**< mac algorithm */ 61 HITLS_HashAlgo hashAlg; /**< hash algorithm */ 64 * Signature combination, including the hash algorithm and signature algorithm: 70 …uint8_t fixedIvLength; /**< If the AEAD algorithm is used, the value is the implicit IV length… 72 uint8_t macKeyLen; /**< If the AEAD algorithm is used, the MAC key length is 0 */ 77 …uint8_t macLen; /**< The length of the MAC address. If the AEAD algorithm is used, this … [all …]
|
| /third_party/cups/cups/ |
| D | hash.c | 39 static ssize_t hash_data(const char *algorithm, unsigned char *hash, size_t hashsize, const void *a… 45 // This function performs a hash function on the given data. The "algorithm" 57 cupsHashData(const char *algorithm, // I - Algorithm name in cupsHashData() argument 63 if (!algorithm || !data || datalen == 0 || !hash || hashsize == 0) in cupsHashData() 69 return (hash_data(algorithm, hash, hashsize, data, datalen, NULL, 0)); in cupsHashData() 119 // The "algorithm" argument can be any of the registered, non-deprecated IPP 131 const char *algorithm, // I - Hash algorithm in cupsHMACData() argument 148 if (!algorithm || !key || keylen == 0 || !data || datalen == 0 || !hmac || hmacsize < 32) in cupsHMACData() 152 if (!strcmp(algorithm, "sha2-384") || !strncmp(algorithm, "sha2-512", 8)) in cupsHMACData() 161 if ((hashlen = hash_data(algorithm, hkey, sizeof(hkey), key, keylen, NULL, 0)) < 0) in cupsHMACData() [all …]
|
| /third_party/grpc/test/core/compression/ |
| D | compression_test.cc | 45 grpc_compression_algorithm algorithm; in TEST() local 47 grpc_slice_from_static_string(valid_name), &algorithm); in TEST() 49 ASSERT_EQ(algorithm, valid_algorithms[i]); in TEST() 54 grpc_compression_algorithm algorithm; in TEST() local 57 grpc_slice_from_static_string(invalid_name), &algorithm); in TEST() 59 // the value of "algorithm" is undefined upon failure in TEST() 210 grpc_compression_algorithm algorithm; in TEST() local 215 for (algorithm = GRPC_COMPRESS_NONE; in TEST() 216 algorithm < GRPC_COMPRESS_ALGORITHMS_COUNT; in TEST() 217 algorithm = static_cast<grpc_compression_algorithm>( in TEST() [all …]
|
| /third_party/openssl/doc/man1/ |
| D | openssl-genpkey.pod.in | 22 [B<-algorithm> I<alg>] 64 This option encrypts the private key with the supplied cipher. Any algorithm 67 =item B<-algorithm> I<alg> 69 Public key algorithm to use such as RSA, DSA, DH or DHX. If used this option must 70 precede any B<-pkeyopt> options. The options B<-paramfile> and B<-algorithm> 74 Valid built-in algorithm names for private key generation are RSA, RSA-PSS, EC, 77 Valid built-in algorithm names for parameter generation (see the B<-genparam> 80 Note that the algorithm name X9.42 DH may be used as a synonym for DHX keys and 85 Set the public key algorithm option I<opt> to I<value>. The precise set of 86 options supported depends on the public key algorithm used and its [all …]
|
| /third_party/pcre2/pcre2/doc/html/ |
| D | pcre2matching.html | 18 <li><a name="TOC3" href="#SEC3">THE STANDARD MATCHING ALGORITHM</a> 19 <li><a name="TOC4" href="#SEC4">THE ALTERNATIVE MATCHING ALGORITHM</a> 20 <li><a name="TOC5" href="#SEC5">ADVANTAGES OF THE ALTERNATIVE ALGORITHM</a> 21 <li><a name="TOC6" href="#SEC6">DISADVANTAGES OF THE ALTERNATIVE ALGORITHM</a> 29 string. The "standard" algorithm is the one provided by the <b>pcre2_match()</b> 37 An alternative algorithm is provided by the <b>pcre2_dfa_match()</b> function; 39 has advantages and disadvantages compared with the standard algorithm, and 53 there are three possible answers. The standard algorithm finds only one of 54 them, whereas the alternative algorithm finds all three. 65 <br><a name="SEC3" href="#TOC1">THE STANDARD MATCHING ALGORITHM</a><br> [all …]
|
| /third_party/ffmpeg/doc/ |
| D | scaler.texi | 17 algorithm. Only a single algorithm should be selected. Default 23 Select fast bilinear scaling algorithm. 26 Select bilinear scaling algorithm. 29 Select bicubic scaling algorithm. 32 Select experimental scaling algorithm. 35 Select nearest neighbor rescaling algorithm. 38 Select averaging area rescaling algorithm. 41 Select bicubic scaling algorithm for the luma component, bilinear for 45 Select Gaussian rescaling algorithm. 48 Select sinc rescaling algorithm. [all …]
|
| /third_party/openhitls/include/tls/ |
| D | hitls_crypt_type.h | 19 * @brief Algorithm related interfaces to be registered 37 …* @brief Key handle, which is converted into the corresponding structure based on the algorithm … 44 * @brief Hash context. The user converts the structure based on the algorithm library. 51 * based on the algorithm library. 58 * based on the algorithm library. 66 * @brief Enumerated value of the symmetric encryption algorithm type. 76 * @brief Enumerated value of the symmetric encryption algorithm. 91 HITLS_CIPHER_BUTT = BSL_CID_UNKNOWN // Represents an unrecognized algorithm type 96 * @brief Hash algorithm enumeration 107 HITLS_HASH_BUTT = BSL_CID_UNKNOWN // Represents an unrecognized algorithm type [all …]
|
| /third_party/mbedtls/library/ |
| D | psa_crypto_cipher.h | 15 /** Get Mbed TLS cipher information given the cipher algorithm PSA identifier 17 * algorithm. 19 * \param[in] alg PSA cipher algorithm identifier 24 * \param[out] cipher_id Mbed TLS cipher algorithm identifier 28 * \c PSA_ERROR_NOT_SUPPORTED is returned if the cipher algorithm is not 37 /** Get Mbed TLS cipher information given the cipher algorithm PSA identifier 39 * algorithm. 41 * \param alg PSA cipher algorithm identifier 44 * \param[out] cipher_id Mbed TLS cipher algorithm identifier 46 * \return The Mbed TLS cipher information of the cipher algorithm. [all …]
|
| /third_party/openssl/crypto/asn1/ |
| D | x_algor.c | 19 ASN1_SIMPLE(X509_ALGOR, algorithm, ASN1_OBJECT), 43 ASN1_OBJECT_free(alg->algorithm); 44 alg->algorithm = aobj; 60 *paobj = algor->algorithm; in X509_ALGOR_get0() 90 rv = OBJ_cmp(a->algorithm, b->algorithm); in X509_ALGOR_cmp() 103 if (dest->algorithm) in X509_ALGOR_copy() 104 ASN1_OBJECT_free(dest->algorithm); in X509_ALGOR_copy() 105 dest->algorithm = NULL; in X509_ALGOR_copy() 111 if (src->algorithm) in X509_ALGOR_copy() 112 if ((dest->algorithm = OBJ_dup(src->algorithm)) == NULL) in X509_ALGOR_copy() [all …]
|
| /third_party/openhitls/docs/en/5_Developer Guide/ |
| D | 4_provider Development Guide.md | 97 ### 2.4 Algorithm Query and Invocation 101 …er querying suitable algorithms. See the corresponding headers for each algorithm for more details. 127 - `operaId`: Algorithm category ID (see "crypt_eal_implprovider.h"). 128 - `algId`: Algorithm ID (see "crypt_eal_implprovider.h"). 131 …t `NULL`, it retrieves the `provCtx` from the provider manager context where the algorithm resides. 156 …on during handshakes. Each `group` must support either a `kex` or `kem` algorithm. Through this me… 163 - `CRYPT_PARAM_CAP_TLS_GROUP_ALG_ID`: Type `BSL_PARAM_TYPE_INT32`, algorithm ID for the group, pass… 166 …_CAP_TLS_GROUP_IS_KEM`: Type `BSL_PARAM_TYPE_BOOL`, indicates whether the group is a KEM algorithm. 177 …ignature algorithm` supported by a provider can be declared through the callback passed to `CRYPT_… 181 …M_CAP_TLS_SIGNALG_KEY_TYPE`: Type `BSL_PARAM_TYPE_INT32`, key type used by the signature algorithm. [all …]
|
| /third_party/grpc/src/core/lib/compression/ |
| D | compression.cc | 41 grpc_compression_algorithm* algorithm) { in grpc_compression_algorithm_parse() argument 46 *algorithm = alg.value(); in grpc_compression_algorithm_parse() 52 int grpc_compression_algorithm_name(grpc_compression_algorithm algorithm, in grpc_compression_algorithm_name() argument 55 << "grpc_compression_algorithm_name(algorithm=" << (int)algorithm in grpc_compression_algorithm_name() 57 const char* result = grpc_core::CompressionAlgorithmAsString(algorithm); in grpc_compression_algorithm_name() 78 grpc_compression_options* opts, grpc_compression_algorithm algorithm) { in grpc_compression_options_enable_algorithm() argument 79 grpc_core::SetBit(&opts->enabled_algorithms_bitset, algorithm); in grpc_compression_options_enable_algorithm() 83 grpc_compression_options* opts, grpc_compression_algorithm algorithm) { in grpc_compression_options_disable_algorithm() argument 84 grpc_core::ClearBit(&opts->enabled_algorithms_bitset, algorithm); in grpc_compression_options_disable_algorithm() 89 grpc_compression_algorithm algorithm) { in grpc_compression_options_is_algorithm_enabled() argument [all …]
|