| /external/iptables/extensions/ |
| D | libxt_string.t | 2 # ERROR: cannot find: iptables -I INPUT -m string --algo bm --string "test" 3 # -m string --algo bm --string "test";=;OK 4 # ERROR: cannot find: iptables -I INPUT -m string --algo kmp --string "test") 5 # -m string --algo kmp --string "test";=;OK 6 # ERROR: cannot find: iptables -I INPUT -m string --algo kmp ! --string "test" 7 # -m string --algo kmp ! --string "test";=;OK 8 # cannot find: iptables -I INPUT -m string --algo bm --string "xxxxxxxxxxx" ....] 9 # -m string --algo bm --string "xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx… 10 # ERROR: cannot load: iptables -A INPUT -m string --algo bm --string "xxxx" 11 # -m string --algo bm --string "xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx… [all …]
|
| /external/arm-trusted-firmware/drivers/nxp/auth/csf_hdr_parser/ |
| D | csf_hdr_parser.c | 56 enum hash_algo algo = SHA256; in deploy_rotpk_hash_table() local 68 ret = hash_init(algo, &ctx); in deploy_rotpk_hash_table() 74 ret = hash_update(algo, ctx, (uint8_t *)((uint8_t *)srk_buffer), in deploy_rotpk_hash_table() 81 ret = hash_final(algo, ctx, hash, digest_size); in deploy_rotpk_hash_table() 109 ret = hash_init(algo, &ctx); in deploy_rotpk_hash_table() 115 ret = hash_update(algo, ctx, srktbl[i].pkey, srktbl[i].key_len); in deploy_rotpk_hash_table() 121 ret = hash_final(algo, ctx, rotpk_hash_table[i], digest_size); in deploy_rotpk_hash_table() 147 enum hash_algo algo = SHA256; in calc_img_hash() local 149 ret = hash_init(algo, &ctx); in calc_img_hash() 156 ret = hash_update(algo, ctx, (uint8_t *)hdr, sizeof(struct csf_hdr)); in calc_img_hash() [all …]
|
| /external/pigweed/pw_kvs/ |
| D | checksum_test.cc | 32 ChecksumAlgorithm& algo = crc16_algo; in TEST() local 34 algo.Update(kString.data(), kString.size()); in TEST() 35 EXPECT_EQ(OkStatus(), algo.Verify(as_bytes(span(&kStringCrc, 1)))); in TEST() 39 ChecksumCrc16 algo; in TEST() local 40 EXPECT_EQ(Status::DataLoss(), algo.Verify(as_bytes(span(kString.data(), 2)))); in TEST() 44 ChecksumCrc16 algo; in TEST() local 45 EXPECT_EQ(Status::InvalidArgument(), algo.Verify({})); in TEST() 47 algo.Verify(as_bytes(span(kString.substr(0, 1))))); in TEST() 52 ChecksumCrc16 algo; in TEST() local 53 ASSERT_GT(sizeof(crc), algo.size_bytes()); in TEST() [all …]
|
| /external/arm-trusted-firmware/drivers/nxp/crypto/caam/src/auth/ |
| D | hash.c | 42 int hash_init(enum hash_algo algo, void **ctx) in hash_init() argument 47 glbl_ctx.algo = algo; in hash_init() 64 int hash_update(enum hash_algo algo, void *context, void *data_ptr, in hash_update() argument 76 if (ctx->algo != algo) { in hash_update() 111 int hash_final(enum hash_algo algo, void *context, void *hash_ptr, in hash_final() argument 123 if (ctx->algo != algo) { in hash_final()
|
| D | nxp_crypto.c | 82 enum hash_algo algo = SHA256; in verify_hash() local 88 ret = hash_init(algo, &ctx); in verify_hash() 94 ret = hash_update(algo, ctx, data_ptr, data_len); in verify_hash() 100 ret = hash_final(algo, ctx, hash, digest_size); in verify_hash()
|
| /external/cronet/crypto/ |
| D | unexportable_key_metrics.cc | 61 std::string GetHistogramSuffixForAlgo(internal::TPMSupport algo) { in GetHistogramSuffixForAlgo() argument 62 switch (algo) { in GetHistogramSuffixForAlgo() 93 internal::TPMSupport algo, in ReportUmaLatency() argument 99 GetHistogramSuffixForAlgo(algo); in ReportUmaLatency() 104 internal::TPMSupport algo, in ReportUmaOperationSuccess() argument 110 GetHistogramSuffixForAlgo(algo); in ReportUmaOperationSuccess() 115 internal::TPMSupport algo, in ReportUmaTpmOperation() argument 119 ReportUmaOperationSuccess(operation, algo, status, type); in ReportUmaTpmOperation() 123 ReportUmaLatency(operation, algo, latency, type); in ReportUmaTpmOperation() 136 auto algo = virtual_provider->SelectAlgorithm(kAllAlgorithms); in MeasureVirtualTpmOperations() local [all …]
|
| D | unexportable_key_unittest.cc | 32 const crypto::SignatureVerifier::SignatureAlgorithm algo = in TEST_P() local 36 switch (algo) { in TEST_P() 47 SCOPED_TRACE(static_cast<int>(algo)); in TEST_P() 55 const crypto::SignatureVerifier::SignatureAlgorithm algorithms[] = {algo}; in TEST_P() 75 ASSERT_EQ(key->Algorithm(), algo); in TEST_P() 86 ASSERT_TRUE(verifier.VerifyInit(algo, *sig, spki)); in TEST_P() 102 ASSERT_TRUE(verifier2.VerifyInit(algo, *sig2, spki)); in TEST_P()
|
| /external/cronet/net/data/ssl/scripts/ |
| D | generate-weak-test-chains.sh | 76 algo=$(echo "$key_type" | sed -E 's/.+-//') 78 if [ ecdsa = $algo ] 83 try openssl $(generate_key_command $algo) \ 90 algo=$(echo "$key_type" | sed -E 's/.+-//') 92 if [ ecdsa = $algo ] 99 try openssl $(generate_key_command $algo) \ 108 algo=$(echo "$key_type" | sed -E 's/.+-//') 110 CA_COMMON_NAME="$key_size $algo Test intermediate CA" \ 114 ALGO=$algo \ 145 algo=$(echo "$key_type" | sed -E 's/.+-//') [all …]
|
| /external/libnl/lib/route/cls/ematch/ |
| D | text.c | 85 void rtnl_ematch_text_set_algo(struct rtnl_ematch *e, const char *algo) in rtnl_ematch_text_set_algo() argument 89 _nl_strncpy_trunc(t->cfg.algo, algo, sizeof(t->cfg.algo)); in rtnl_ematch_text_set_algo() 96 return t->cfg.algo[0] ? t->cfg.algo : NULL; in rtnl_ematch_text_get_algo() 126 t->cfg.algo[0] ? t->cfg.algo : "no-algo", in text_dump()
|
| /external/boringssl/src/util/fipstools/acvp/acvptool/subprocess/ |
| D | keyedMac.go | 57 algo string member 125 result, err := m.Transact(k.algo, 1, outputBytes, key, msg) 127 return nil, fmt.Errorf("wrapper %s operation failed: %s", k.algo, err) 132 return nil, fmt.Errorf("%s operation returned incorrect length value", k.algo) 145 result, err := m.Transact(k.algo+"/verify", 1, key, msg, expectedMAC) 147 return nil, fmt.Errorf("wrapper %s operation failed: %s", k.algo, err) 151 return nil, fmt.Errorf("wrapper %s returned invalid success flag: %x", k.algo, result[0])
|
| D | hash.go | 60 algo string member 92 result, err := m.Transact(h.algo, 1, msg) 94 panic(h.algo + " hash operation failed: " + err.Error()) 111 result, err := m.Transact(h.algo+"/MCT", 1, digest) 113 panic(h.algo + " hash operation failed: " + err.Error())
|
| D | ecdsa.go | 70 algo string member 103 result, err := m.Transact(e.algo+"/"+"keyGen", 3, []byte(group.Curve)) 120 result, err := m.Transact(e.algo+"/"+"keyVer", 1, []byte(group.Curve), qx, qy) 145 result, err := m.Transact(e.algo+"/"+"keyGen", 3, []byte(group.Curve)) 159 op := e.algo + "/" + "sigGen" 200 …result, err := m.Transact(e.algo+"/"+"sigVer", 1, []byte(group.Curve), []byte(group.HashAlgo), msg…
|
| /external/cronet/third_party/boringssl/src/util/fipstools/acvp/acvptool/subprocess/ |
| D | keyedMac.go | 57 algo string member 125 result, err := m.Transact(k.algo, 1, outputBytes, key, msg) 127 return nil, fmt.Errorf("wrapper %s operation failed: %s", k.algo, err) 132 return nil, fmt.Errorf("%s operation returned incorrect length value", k.algo) 145 result, err := m.Transact(k.algo+"/verify", 1, key, msg, expectedMAC) 147 return nil, fmt.Errorf("wrapper %s operation failed: %s", k.algo, err) 151 return nil, fmt.Errorf("wrapper %s returned invalid success flag: %x", k.algo, result[0])
|
| D | hash.go | 60 algo string member 92 result, err := m.Transact(h.algo, 1, msg) 94 panic(h.algo + " hash operation failed: " + err.Error()) 111 result, err := m.Transact(h.algo+"/MCT", 1, digest) 113 panic(h.algo + " hash operation failed: " + err.Error())
|
| D | ecdsa.go | 70 algo string member 103 result, err := m.Transact(e.algo+"/"+"keyGen", 3, []byte(group.Curve)) 120 result, err := m.Transact(e.algo+"/"+"keyVer", 1, []byte(group.Curve), qx, qy) 145 result, err := m.Transact(e.algo+"/"+"keyGen", 3, []byte(group.Curve)) 159 op := e.algo + "/" + "sigGen" 200 …result, err := m.Transact(e.algo+"/"+"sigVer", 1, []byte(group.Curve), []byte(group.HashAlgo), msg…
|
| /external/arm-trusted-firmware/include/drivers/nxp/crypto/caam/ |
| D | hash.h | 75 enum hash_algo algo; member 79 int hash_init(enum hash_algo algo, void **ctx); 80 int hash_update(enum hash_algo algo, void *context, void *data_ptr, 82 int hash_final(enum hash_algo algo, void *context, void *hash_ptr,
|
| /external/libaom/test/ |
| D | coding_path_sync.cc | 31 aom_codec_iface_t *algo = aom_codec_av1_cx(); in CompressedSource() local 35 aom_codec_enc_config_default(algo, &cfg, 1); in CompressedSource() 37 aom_codec_enc_config_default(algo, &cfg, 0); in CompressedSource() 79 aom_codec_enc_init(&enc_, algo, &cfg, 0); in CompressedSource() 148 aom_codec_iface_t *algo = aom_codec_av1_dx(); in Decoder() local 153 aom_codec_dec_init(&dec_, algo, &cfg, 0); in Decoder()
|
| /external/boringssl/src/util/fipstools/acvp/acvptool/ |
| D | acvp.go | 232 algo, ok := algoInterface.(string) 236 algos[algo] = struct{}{} 260 algo := commonFields.Algo 261 if _, ok := algos[algo]; !ok { 262 return fmt.Errorf("vector set #%d contains unsupported algorithm %q", i+1, algo) 265 replyGroups, err := middle.Process(algo, element) 273 "algorithm": algo, 572 for _, algo := range supportedAlgos { 573 if value, ok := algo["acvptoolTestOnly"]; ok { 582 nonTestAlgos = append(nonTestAlgos, algo) [all …]
|
| /external/cronet/third_party/boringssl/src/util/fipstools/acvp/acvptool/ |
| D | acvp.go | 232 algo, ok := algoInterface.(string) 236 algos[algo] = struct{}{} 260 algo := commonFields.Algo 261 if _, ok := algos[algo]; !ok { 262 return fmt.Errorf("vector set #%d contains unsupported algorithm %q", i+1, algo) 265 replyGroups, err := middle.Process(algo, element) 273 "algorithm": algo, 572 for _, algo := range supportedAlgos { 573 if value, ok := algo["acvptoolTestOnly"]; ok { 582 nonTestAlgos = append(nonTestAlgos, algo) [all …]
|
| /external/kernel-headers/original/uapi/linux/ |
| D | virtio_crypto.h | 66 __le32 algo; member 88 __le32 algo; member 125 __le32 algo; member 153 __le32 algo; member 171 __le32 algo; member 222 __le32 algo; member 338 __le32 algo; member
|
| /external/libese/ready_se/google/keymint/KM300/Applet/AndroidSEProviderLib/src/com/android/javacard/seprovider/ |
| D | KMPoolManager.java | 559 byte algo = mapAlgorithm(alg, secretLength); in getKeyObjectFromPool() 567 keyObject = createKeyObjectInstance(algo); in getKeyObjectFromPool() 574 if (algo == keyObject.algorithm) { in getKeyObjectFromPool() 587 byte algo = 0; in mapAlgorithm() 594 algo = AES_128; in mapAlgorithm() 596 algo = AES_256; in mapAlgorithm() 603 algo = KMType.DES; in mapAlgorithm() 613 algo = KMType.RSA; in mapAlgorithm() 618 algo = KMType.EC; in mapAlgorithm() 621 algo = KMType.HMAC; in mapAlgorithm() [all …]
|
| /external/libese/ready_se/google/keymint/KM200/Applet/AndroidSEProviderLib/src/com/android/javacard/seprovider/ |
| D | KMPoolManager.java | 567 byte algo = mapAlgorithm(alg, secretLength); in getKeyObjectFromPool() 575 keyObject = createKeyObjectInstance(algo); in getKeyObjectFromPool() 582 if (algo == keyObject.algorithm) { in getKeyObjectFromPool() 595 byte algo = 0; in mapAlgorithm() 602 algo = AES_128; in mapAlgorithm() 604 algo = AES_256; in mapAlgorithm() 611 algo = KMType.DES; in mapAlgorithm() 621 algo = KMType.RSA; in mapAlgorithm() 626 algo = KMType.EC; in mapAlgorithm() 629 algo = KMType.HMAC; in mapAlgorithm() [all …]
|
| /external/tensorflow/tensorflow/compiler/xla/stream_executor/cuda/ |
| D | cublasLt_11_0.inc | 47 cublasLtMatrixLayout_t Ddesc, const cublasLtMatmulAlgo_t *algo, 58 Cdesc, D, Ddesc, algo, workspace, workspaceSizeInBytes, 326 cublasLtMatmulAlgo_t *algo) { 334 Dtype, algoId, algo); 341 const cublasLtMatmulAlgo_t *algo, ///< may point to result->algo 346 const cublasLtMatmulAlgo_t *, ///< may point to result->algo 350 return func_ptr(lightHandle, operationDesc, Adesc, Bdesc, Cdesc, Ddesc, algo, 355 const cublasLtMatmulAlgo_t *algo, cublasLtMatmulAlgoCapAttributes_t attr, 363 return func_ptr(algo, attr, buf, sizeInBytes, sizeWritten); 367 cublasLtMatmulAlgo_t *algo, cublasLtMatmulAlgoConfigAttributes_t attr, [all …]
|
| /external/iproute2/ip/ |
| D | ipxfrm.c | 498 static void __xfrm_algo_print(struct xfrm_algo *algo, int type, int len, in __xfrm_algo_print() argument 509 if (len < sizeof(*algo)) { in __xfrm_algo_print() 513 len -= sizeof(*algo); in __xfrm_algo_print() 515 fprintf(fp, "%s ", algo->alg_name); in __xfrm_algo_print() 517 keylen = algo->alg_key_len / 8; in __xfrm_algo_print() 526 fprintf(fp, "%.2x", (unsigned char)algo->alg_key[i]); in __xfrm_algo_print() 529 fprintf(fp, " (%d bits)", algo->alg_key_len); in __xfrm_algo_print() 537 static inline void xfrm_algo_print(struct xfrm_algo *algo, int type, int len, in xfrm_algo_print() argument 540 return __xfrm_algo_print(algo, type, len, fp, prefix, 1); in xfrm_algo_print() 543 static void xfrm_aead_print(struct xfrm_algo_aead *algo, int len, in xfrm_aead_print() argument [all …]
|
| /external/curl/lib/vauth/ |
| D | digest.c | 598 digest->algo = ALGO_MD5SESS; in Curl_auth_decode_digest_http_message() 600 digest->algo = ALGO_MD5; in Curl_auth_decode_digest_http_message() 602 digest->algo = ALGO_SHA256; in Curl_auth_decode_digest_http_message() 604 digest->algo = ALGO_SHA256SESS; in Curl_auth_decode_digest_http_message() 606 digest->algo = ALGO_SHA512_256; in Curl_auth_decode_digest_http_message() 608 digest->algo = ALGO_SHA512_256SESS; in Curl_auth_decode_digest_http_message() 644 if(!digest->qop && (digest->algo & SESSION_ALGO)) in Curl_auth_decode_digest_http_message() 745 if(digest->algo & SESSION_ALGO) { in auth_create_digest_http_message() 954 if(digest->algo <= ALGO_MD5SESS) in Curl_auth_create_digest_http_message() 960 DEBUGASSERT(digest->algo <= ALGO_SHA512_256SESS); in Curl_auth_create_digest_http_message() [all …]
|