/external/tpm2/ |
D | CryptSelfTest.c | 25 TPM_ALG_ID alg; in CryptRunSelfTests() local 28 for(alg = TPM_ALG_FIRST; alg <= TPM_ALG_LAST; alg++) in CryptRunSelfTests() 30 if(TEST_BIT(alg, *toTest)) in CryptRunSelfTests() 32 TPM_RC result = CryptTestAlgorithm(alg, toTest); in CryptRunSelfTests() 96 TPM_ALG_ID alg; in CryptIncrementalSelfTest() local 104 TPM_ALG_ID alg = toTest->algorithms[i]; in CryptIncrementalSelfTest() local 106 if((alg > TPM_ALG_LAST) || !TEST_BIT(alg, g_implementedAlgorithms)) in CryptIncrementalSelfTest() 108 SET_BIT(alg, toTestVector); in CryptIncrementalSelfTest() 116 for(alg = TPM_ALG_FIRST; in CryptIncrementalSelfTest() 117 toDoList->count < MAX_ALG_LIST_SIZE && alg <= TPM_ALG_LAST; in CryptIncrementalSelfTest() [all …]
|
D | EncryptDecrypt.c | 31 TPM_ALG_ID alg; in TPM2_EncryptDecrypt() local 62 alg = symKey->publicArea.parameters.symDetail.sym.algorithm; in TPM2_EncryptDecrypt() 63 blockSize = CryptGetSymmetricBlockSize(alg, keySize); in TPM2_EncryptDecrypt() 89 alg, in TPM2_EncryptDecrypt() 99 alg, in TPM2_EncryptDecrypt()
|
D | Global.h | 48 #define TEST(alg) if(TEST_BIT(alg, g_toTest)) CryptTestAlgorithm(alg, NULL) argument 53 #define TEST_HASH(alg) \ argument 54 if( TEST_BIT(alg, g_toTest) \ 55 && (alg != ALG_NULL_VALUE)) \ 56 CryptTestAlgorithm(alg, NULL)
|
/external/openssh/ |
D | digest-libc.c | 44 int alg; member 124 ssh_digest_by_alg(int alg) in ssh_digest_by_alg() argument 126 if (alg < 0 || alg >= SSH_DIGEST_MAX) in ssh_digest_by_alg() 128 if (digests[alg].id != alg) /* sanity */ in ssh_digest_by_alg() 130 return &(digests[alg]); in ssh_digest_by_alg() 136 int alg; in ssh_digest_alg_by_name() local 138 for (alg = 0; alg < SSH_DIGEST_MAX; alg++) { in ssh_digest_alg_by_name() 139 if (strcasecmp(name, digests[alg].name) == 0) in ssh_digest_alg_by_name() 140 return digests[alg].id; in ssh_digest_alg_by_name() 146 ssh_digest_alg_name(int alg) in ssh_digest_alg_name() argument [all …]
|
D | digest-openssl.c | 45 int alg; member 68 ssh_digest_by_alg(int alg) in ssh_digest_by_alg() argument 70 if (alg < 0 || alg >= SSH_DIGEST_MAX) in ssh_digest_by_alg() 72 if (digests[alg].id != alg) /* sanity */ in ssh_digest_by_alg() 74 if (digests[alg].mdfunc == NULL) in ssh_digest_by_alg() 76 return &(digests[alg]); in ssh_digest_by_alg() 82 int alg; in ssh_digest_alg_by_name() local 84 for (alg = 0; digests[alg].id != -1; alg++) { in ssh_digest_alg_by_name() 85 if (strcasecmp(name, digests[alg].name) == 0) in ssh_digest_alg_by_name() 86 return digests[alg].id; in ssh_digest_alg_by_name() [all …]
|
D | hmac.c | 28 int alg; member 37 ssh_hmac_bytes(int alg) in ssh_hmac_bytes() argument 39 return ssh_digest_bytes(alg); in ssh_hmac_bytes() 43 ssh_hmac_start(int alg) in ssh_hmac_start() argument 49 ret->alg = alg; in ssh_hmac_start() 50 if ((ret->ictx = ssh_digest_start(alg)) == NULL || in ssh_hmac_start() 51 (ret->octx = ssh_digest_start(alg)) == NULL || in ssh_hmac_start() 52 (ret->digest = ssh_digest_start(alg)) == NULL) in ssh_hmac_start() 73 else if (ssh_digest_memory(ctx->alg, key, klen, ctx->buf, in ssh_hmac_init() 109 len = ssh_digest_bytes(ctx->alg); in ssh_hmac_final()
|
D | digest.h | 40 const char *ssh_digest_alg_name(int alg); 43 size_t ssh_digest_bytes(int alg); 53 int ssh_digest_memory(int alg, const void *m, size_t mlen, 57 int ssh_digest_buffer(int alg, const struct sshbuf *b, u_char *d, size_t dlen) 61 struct ssh_digest_ctx *ssh_digest_start(int alg);
|
/external/boringssl/src/crypto/x509/ |
D | x_algor.c | 80 int X509_ALGOR_set0(X509_ALGOR *alg, const ASN1_OBJECT *aobj, int ptype, 83 if (!alg) 86 if (alg->parameter == NULL) 87 alg->parameter = ASN1_TYPE_new(); 88 if (alg->parameter == NULL) 91 if (alg) { 92 if (alg->algorithm) 93 ASN1_OBJECT_free(alg->algorithm); 94 alg->algorithm = (ASN1_OBJECT *)aobj; 99 if (alg->parameter) { [all …]
|
D | rsa_pss.c | 81 static X509_ALGOR *rsa_mgf1_decode(X509_ALGOR *alg) { 82 if (alg == NULL || alg->parameter == NULL || 83 OBJ_obj2nid(alg->algorithm) != NID_mgf1 || 84 alg->parameter->type != V_ASN1_SEQUENCE) { 88 const uint8_t *p = alg->parameter->value.sequence->data; 89 int plen = alg->parameter->value.sequence->length; 93 static RSA_PSS_PARAMS *rsa_pss_decode(const X509_ALGOR *alg, in rsa_pss_decode() argument 97 if (alg->parameter == NULL || alg->parameter->type != V_ASN1_SEQUENCE) { in rsa_pss_decode() 101 const uint8_t *p = alg->parameter->value.sequence->data; in rsa_pss_decode() 102 int plen = alg->parameter->value.sequence->length; in rsa_pss_decode() [all …]
|
/external/webrtc/webrtc/base/ |
D | messagedigest.cc | 38 MessageDigest* MessageDigestFactory::Create(const std::string& alg) { in Create() argument 40 MessageDigest* digest = new OpenSSLDigest(alg); in Create() 48 if (alg == DIGEST_MD5) { in Create() 50 } else if (alg == DIGEST_SHA_1) { in Create() 57 bool IsFips180DigestAlgorithm(const std::string& alg) { in IsFips180DigestAlgorithm() argument 63 return alg == DIGEST_SHA_1 || in IsFips180DigestAlgorithm() 64 alg == DIGEST_SHA_224 || in IsFips180DigestAlgorithm() 65 alg == DIGEST_SHA_256 || in IsFips180DigestAlgorithm() 66 alg == DIGEST_SHA_384 || in IsFips180DigestAlgorithm() 67 alg == DIGEST_SHA_512; in IsFips180DigestAlgorithm() [all …]
|
D | messagedigest.h | 43 static MessageDigest* Create(const std::string& alg); 47 bool IsFips180DigestAlgorithm(const std::string& alg); 60 size_t ComputeDigest(const std::string& alg, const void* input, size_t in_len, 68 std::string ComputeDigest(const std::string& alg, const std::string& input); 70 bool ComputeDigest(const std::string& alg, const std::string& input, 91 size_t ComputeHmac(const std::string& alg, const void* key, size_t key_len, 101 std::string ComputeHmac(const std::string& alg, const std::string& key, 104 bool ComputeHmac(const std::string& alg, const std::string& key,
|
/external/libcups/cups/ |
D | hash.c | 188 gnutls_digest_algorithm_t alg = GNUTLS_DIG_UNKNOWN; in cupsHashData() local 194 alg = GNUTLS_DIG_MD5; in cupsHashData() 196 alg = GNUTLS_DIG_SHA1; in cupsHashData() 198 alg = GNUTLS_DIG_SHA224; in cupsHashData() 200 alg = GNUTLS_DIG_SHA256; in cupsHashData() 202 alg = GNUTLS_DIG_SHA384; in cupsHashData() 204 alg = GNUTLS_DIG_SHA512; in cupsHashData() 207 alg = GNUTLS_DIG_SHA512; in cupsHashData() 212 alg = GNUTLS_DIG_SHA512; in cupsHashData() 216 if (alg != GNUTLS_DIG_UNKNOWN) in cupsHashData() [all …]
|
/external/boringssl/src/ssl/ |
D | ssl_privkey.cc | 363 const SSL_SIGNATURE_ALGORITHM *alg = get_signature_algorithm(sigalg); in pkey_supports_algorithm() local 364 if (alg == NULL || in pkey_supports_algorithm() 365 EVP_PKEY_id(pkey) != alg->pkey_type) { in pkey_supports_algorithm() 371 if (alg->pkey_type == EVP_PKEY_RSA && !alg->is_rsa_pss) { in pkey_supports_algorithm() 376 if (alg->pkey_type == EVP_PKEY_EC && in pkey_supports_algorithm() 377 (alg->curve == NID_undef || in pkey_supports_algorithm() 379 EC_KEY_get0_group(EVP_PKEY_get0_EC_KEY(pkey))) != alg->curve)) { in pkey_supports_algorithm() 394 const SSL_SIGNATURE_ALGORITHM *alg = get_signature_algorithm(sigalg); in setup_ctx() local 395 const EVP_MD *digest = alg->digest_func != NULL ? alg->digest_func() : NULL; in setup_ctx() 405 if (alg->is_rsa_pss) { in setup_ctx() [all …]
|
/external/webrtc/webrtc/modules/remote_bitrate_estimator/test/ |
D | plot_dynamics.py | 76 for alg in v.samples.keys(): 78 for series in v.samples[alg].keys(): 80 x = [sample[0] for sample in v.samples[alg][series]] 81 y = [sample[1] for sample in v.samples[alg][series]] 85 line = plt.plot(x, y, label=alg, linewidth=4.0) 101 key = alg + flow_id.group(1) 105 elif alg == 'TCP': 110 if alg.startswith('Available'):
|
/external/wpa_supplicant_8/src/crypto/ |
D | crypto_internal-cipher.c | 18 enum crypto_cipher_alg alg; member 43 struct crypto_cipher * crypto_cipher_init(enum crypto_cipher_alg alg, in crypto_cipher_init() argument 53 ctx->alg = alg; in crypto_cipher_init() 55 switch (alg) { in crypto_cipher_init() 108 switch (ctx->alg) { in crypto_cipher_encrypt() 172 switch (ctx->alg) { in crypto_cipher_decrypt() 232 switch (ctx->alg) { in crypto_cipher_deinit()
|
D | crypto_internal.c | 20 enum crypto_hash_alg alg; member 39 struct crypto_hash * crypto_hash_init(enum crypto_hash_alg alg, const u8 *key, in crypto_hash_init() argument 51 ctx->alg = alg; in crypto_hash_init() 53 switch (alg) { in crypto_hash_init() 148 switch (ctx->alg) { in crypto_hash_update() 192 switch (ctx->alg) { in crypto_hash_finish()
|
/external/wpa_supplicant_8/src/tls/ |
D | pkcs5.c | 25 } alg; member 48 static int pkcs5_is_oid(struct asn1_oid *oid, unsigned long alg) in pkcs5_is_oid() argument 54 oid->oid[6] == alg; in pkcs5_is_oid() 58 static int enc_alg_is_oid(struct asn1_oid *oid, unsigned long alg) in enc_alg_is_oid() argument 63 oid->oid[5] == alg; in enc_alg_is_oid() 67 static int pkcs12_is_pbe_oid(struct asn1_oid *oid, unsigned long alg) in pkcs12_is_pbe_oid() argument 74 oid->oid[7] == alg; in pkcs12_is_pbe_oid() 299 params->alg = pkcs5_get_alg(&oid); in pkcs5_get_params() 300 if (params->alg == PKCS5_ALG_UNKNOWN) { in pkcs5_get_params() 306 if (params->alg == PKCS5_ALG_PBES2) in pkcs5_get_params() [all …]
|
/external/vboot_reference/utility/ |
D | dev_make_keypair | 47 local alg=$2 48 local len=$(alg_to_keylen $alg) 63 --algorithm $alg 69 --algorithm $alg
|
/external/wpa_supplicant_8/src/eap_common/ |
D | ikev2_common.c | 56 int ikev2_integ_hash(int alg, const u8 *key, size_t key_len, const u8 *data, in ikev2_integ_hash() argument 61 switch (alg) { in ikev2_integ_hash() 97 int ikev2_prf_hash(int alg, const u8 *key, size_t key_len, in ikev2_prf_hash() argument 101 switch (alg) { in ikev2_prf_hash() 113 int ikev2_prf_plus(int alg, const u8 *key, size_t key_len, in ikev2_prf_plus() argument 125 prf = ikev2_get_prf(alg); in ikev2_prf_plus() 143 res = ikev2_prf_hash(alg, key, key_len, 2, &addr[1], in ikev2_prf_plus() 146 res = ikev2_prf_hash(alg, key, key_len, 3, addr, len, in ikev2_prf_plus() 175 int ikev2_encr_encrypt(int alg, const u8 *key, size_t key_len, const u8 *iv, in ikev2_encr_encrypt() argument 181 switch (alg) { in ikev2_encr_encrypt() [all …]
|
/external/vboot_reference/tests/ |
D | gen_test_keys.sh | 39 alg=$((${key_index} * 3 + ${alg_index})) 45 --algorithm ${alg} 51 --algorithm ${alg}
|
D | vb20_common2_tests.c | 200 int alg; in main() local 202 for (alg = 0; alg < kNumAlgorithms; alg++) { in main() 203 if (test_algorithm(alg, argv[1])) in main()
|
/external/ltp/testcases/network/dctcp/ |
D | dctcp01.sh | 29 local alg=$1 30 tst_resm TINFO "setting $alg" 32 tst_set_sysctl net.ipv4.tcp_congestion_control $alg safe
|
/external/autotest/server/site_tests/firmware_UpdateKernelSubkeyVersion/files/ |
D | common.sh | 58 local alg=$2 60 local len=$(alg_to_keylen $alg) 77 --algorithm $alg 83 --algorithm $alg
|
/external/autotest/server/site_tests/firmware_UpdateKernelDataKeyVersion/files/ |
D | common.sh | 58 local alg=$2 60 local len=$(alg_to_keylen $alg) 77 --algorithm $alg 83 --algorithm $alg
|
/external/autotest/server/site_tests/firmware_UpdateFirmwareDataKeyVersion/files/ |
D | common.sh | 58 local alg=$2 60 local len=$(alg_to_keylen $alg) 77 --algorithm $alg 83 --algorithm $alg
|