/external/dropbear/libtomcrypt/src/misc/crypt/ |
crypt_find_hash_oid.c | 24 if (hash_descriptor[x].name != NULL && hash_descriptor[x].OIDlen == IDlen && !XMEMCMP(hash_descriptor[x].OID, ID, sizeof(unsigned long) * IDlen)) {
|
crypt_register_hash.c | 32 if (XMEMCMP(&hash_descriptor[x], hash, sizeof(struct ltc_hash_descriptor)) == 0) { 40 if (hash_descriptor[x].name == NULL) { 41 XMEMCPY(&hash_descriptor[x], hash, sizeof(struct ltc_hash_descriptor));
|
crypt_find_hash_any.c | 35 if (hash_descriptor[x].name == NULL) { 38 if ((int)hash_descriptor[x].hashsize >= digestlen && (int)hash_descriptor[x].hashsize < y) { 40 y = hash_descriptor[x].hashsize;
|
crypt_hash_descriptor.c | 18 struct ltc_hash_descriptor hash_descriptor[TAB_SIZE] = { variable in typeref:struct:ltc_hash_descriptor
|
crypt_find_hash.c | 29 if (hash_descriptor[x].name != NULL && XSTRCMP(hash_descriptor[x].name, name) == 0) {
|
crypt_find_hash_id.c | 28 if (hash_descriptor[x].ID == ID) { 29 x = (hash_descriptor[x].name == NULL) ? -1 : x;
|
crypt_unregister_hash.c | 32 if (XMEMCMP(&hash_descriptor[x], hash, sizeof(struct ltc_hash_descriptor)) == 0) { 33 hash_descriptor[x].name = NULL;
|
crypt_hash_is_valid.c | 26 if (idx < 0 || idx >= TAB_SIZE || hash_descriptor[idx].name == NULL) {
|
/external/dropbear/libtomcrypt/src/hashes/helper/ |
hash_filehandle.c | 44 if (*outlen < hash_descriptor[hash].hashsize) { 45 *outlen = hash_descriptor[hash].hashsize; 48 if ((err = hash_descriptor[hash].init(&md)) != CRYPT_OK) { 52 *outlen = hash_descriptor[hash].hashsize; 55 if ((err = hash_descriptor[hash].process(&md, buf, x)) != CRYPT_OK) { 59 err = hash_descriptor[hash].done(&md, out);
|
hash_memory.c | 40 if (*outlen < hash_descriptor[hash].hashsize) { 41 *outlen = hash_descriptor[hash].hashsize; 50 if ((err = hash_descriptor[hash].init(md)) != CRYPT_OK) { 53 if ((err = hash_descriptor[hash].process(md, in, inlen)) != CRYPT_OK) { 56 err = hash_descriptor[hash].done(md, out); 57 *outlen = hash_descriptor[hash].hashsize;
|
hash_memory_multi.c | 45 if (*outlen < hash_descriptor[hash].hashsize) { 46 *outlen = hash_descriptor[hash].hashsize; 55 if ((err = hash_descriptor[hash].init(md)) != CRYPT_OK) { 64 if ((err = hash_descriptor[hash].process(md, curptr, curlen)) != CRYPT_OK) { 74 err = hash_descriptor[hash].done(md, out); 75 *outlen = hash_descriptor[hash].hashsize;
|
/external/dropbear/libtomcrypt/demos/ |
hashsum.c | 28 for (x = 0; hash_descriptor[x].name != NULL; x++) { 29 printf(" %s (%d)\n", hash_descriptor[x].name, hash_descriptor[x].ID); 41 hash_descriptor[idx].init(&md); 44 hash_descriptor[idx].process(&md, hash_buffer, x); 46 hash_descriptor[idx].done(&md, hash_buffer); 47 for (x = 0; x < (int)hash_descriptor[idx].hashsize; x++) { 57 for (x = 0; x < (int)hash_descriptor[idx].hashsize; x++) {
|
/external/dropbear/libtomcrypt/src/misc/pkcs5/ |
pkcs_5_1.c | 63 if ((err = hash_descriptor[hash_idx].init(md)) != CRYPT_OK) { 66 if ((err = hash_descriptor[hash_idx].process(md, password, password_len)) != CRYPT_OK) { 69 if ((err = hash_descriptor[hash_idx].process(md, salt, 8)) != CRYPT_OK) { 72 if ((err = hash_descriptor[hash_idx].done(md, buf)) != CRYPT_OK) { 79 if ((err = hash_memory(hash_idx, buf, hash_descriptor[hash_idx].hashsize, buf, &x)) != CRYPT_OK) { 85 for (x = 0; x < hash_descriptor[hash_idx].hashsize && x < *outlen; x++) {
|
/external/dropbear/libtomcrypt/src/mac/hmac/ |
hmac_done.c | 20 #define HMAC_BLOCKSIZE hash_descriptor[hash].blocksize 45 hashsize = hash_descriptor[hash].hashsize; 61 if ((err = hash_descriptor[hash].done(&hmac->md, isha)) != CRYPT_OK) { 71 if ((err = hash_descriptor[hash].init(&hmac->md)) != CRYPT_OK) { 74 if ((err = hash_descriptor[hash].process(&hmac->md, buf, HMAC_BLOCKSIZE)) != CRYPT_OK) { 77 if ((err = hash_descriptor[hash].process(&hmac->md, isha, hashsize)) != CRYPT_OK) { 80 if ((err = hash_descriptor[hash].done(&hmac->md, buf)) != CRYPT_OK) {
|
hmac_process.c | 35 return hash_descriptor[hmac->hash].process(&hmac->md, in, inlen);
|
hmac_memory.c | 50 if (hash_descriptor[hash].hmac_block != NULL) { 51 return hash_descriptor[hash].hmac_block(key, keylen, in, inlen, out, outlen);
|
hmac_init.c | 20 #define HMAC_BLOCKSIZE hash_descriptor[hash].blocksize 45 hashsize = hash_descriptor[hash].hashsize; 88 if ((err = hash_descriptor[hash].init(&hmac->md)) != CRYPT_OK) { 92 if ((err = hash_descriptor[hash].process(&hmac->md, buf, HMAC_BLOCKSIZE)) != CRYPT_OK) {
|
/external/dropbear/libtomcrypt/src/pk/pkcs1/ |
pkcs_1_mgf1.c | 48 hLen = hash_descriptor[hash_idx].hashsize; 72 if ((err = hash_descriptor[hash_idx].init(md)) != CRYPT_OK) { 75 if ((err = hash_descriptor[hash_idx].process(md, seed, seedlen)) != CRYPT_OK) { 78 if ((err = hash_descriptor[hash_idx].process(md, buf, 4)) != CRYPT_OK) { 81 if ((err = hash_descriptor[hash_idx].done(md, buf)) != CRYPT_OK) {
|
pkcs_1_pss_decode.c | 53 hLen = hash_descriptor[hash_idx].hashsize; 134 if ((err = hash_descriptor[hash_idx].init(&md)) != CRYPT_OK) { 138 if ((err = hash_descriptor[hash_idx].process(&md, mask, 8)) != CRYPT_OK) { 141 if ((err = hash_descriptor[hash_idx].process(&md, msghash, msghashlen)) != CRYPT_OK) { 144 if ((err = hash_descriptor[hash_idx].process(&md, DB+x, saltlen)) != CRYPT_OK) { 147 if ((err = hash_descriptor[hash_idx].done(&md, mask)) != CRYPT_OK) {
|
pkcs_1_pss_encode.c | 56 hLen = hash_descriptor[hash_idx].hashsize; 95 if ((err = hash_descriptor[hash_idx].init(&md)) != CRYPT_OK) { 99 if ((err = hash_descriptor[hash_idx].process(&md, DB, 8)) != CRYPT_OK) { 102 if ((err = hash_descriptor[hash_idx].process(&md, msghash, msghashlen)) != CRYPT_OK) { 105 if ((err = hash_descriptor[hash_idx].process(&md, salt, saltlen)) != CRYPT_OK) { 108 if ((err = hash_descriptor[hash_idx].done(&md, hash)) != CRYPT_OK) {
|
/external/dropbear/libtomcrypt/src/pk/rsa/ |
rsa_sign_hash.c | 87 if (hash_descriptor[hash_idx].OIDlen == 0) { 99 LTC_SET_ASN1(digestinfo, 0, LTC_ASN1_OBJECT_IDENTIFIER, hash_descriptor[hash_idx].OID, hash_descriptor[hash_idx].OIDlen);
|
rsa_verify_hash.c | 104 if (hash_descriptor[hash_idx].OIDlen == 0) { 142 if ((digestinfo[0].size == hash_descriptor[hash_idx].OIDlen) && 143 (XMEMCMP(digestinfo[0].data, hash_descriptor[hash_idx].OID, sizeof(unsigned long) * hash_descriptor[hash_idx].OIDlen) == 0) &&
|
/external/dropbear/libtomcrypt/testprof/ |
cipher_hash_test.c | 18 for (x = 0; hash_descriptor[x].name != NULL; x++) { 19 DO(hash_descriptor[x].test());
|
/external/dropbear/libtomcrypt/src/pk/dsa/ |
dsa_encrypt_key.c | 56 if (inlen > hash_descriptor[hash].hashsize) { 112 LTC_ASN1_OBJECT_IDENTIFIER, hash_descriptor[hash].OIDlen, hash_descriptor[hash].OID,
|
/external/dropbear/libtomcrypt/src/pk/ecc/ |
ecc_encrypt_key.c | 62 if (inlen > hash_descriptor[hash].hashsize) { 112 LTC_ASN1_OBJECT_IDENTIFIER, hash_descriptor[hash].OIDlen, hash_descriptor[hash].OID,
|