/external/dropbear/libtomcrypt/src/misc/pkcs5/ |
pkcs_5_1.c | 24 @param hash_idx The index of the hash desired 31 int iteration_count, int hash_idx, 45 if ((err = hash_is_valid(hash_idx)) != CRYPT_OK) { 63 if ((err = hash_descriptor[hash_idx].init(md)) != CRYPT_OK) { 66 if ((err = hash_descriptor[hash_idx].process(md, password, password_len)) != CRYPT_OK) { 69 if ((err = hash_descriptor[hash_idx].process(md, salt, 8)) != CRYPT_OK) { 72 if ((err = hash_descriptor[hash_idx].done(md, buf)) != CRYPT_OK) { 79 if ((err = hash_memory(hash_idx, buf, hash_descriptor[hash_idx].hashsize, buf, &x)) != CRYPT_OK) { 85 for (x = 0; x < hash_descriptor[hash_idx].hashsize && x < *outlen; x++) [all...] |
pkcs_5_2.c | 26 @param hash_idx The index of the hash desired 33 int iteration_count, int hash_idx, 48 if ((err = hash_is_valid(hash_idx)) != CRYPT_OK) { 78 if ((err = hmac_init(hmac, hash_idx, password, password_len)) != CRYPT_OK) { 95 if ((err = hmac_memory(hash_idx, password, password_len, buf[0], x, buf[0], &x)) != CRYPT_OK) {
|
/external/dropbear/libtomcrypt/src/headers/ |
tomcrypt_pkcs.h | 19 int pkcs_1_mgf1( int hash_idx, 48 int prng_idx, int hash_idx, 53 unsigned long modulus_bitlen, int hash_idx, 59 int prng_idx, int hash_idx, 65 unsigned long saltlen, int hash_idx, 76 int iteration_count, int hash_idx, 82 int iteration_count, int hash_idx,
|
tomcrypt_pk.h | 64 prng_state *prng, int prng_idx, int hash_idx, int padding, rsa_key *key); 69 int hash_idx, int padding, 76 int hash_idx, unsigned long saltlen, 82 int hash_idx, unsigned long saltlen, 132 prng_state *prng, int prng_idx, int hash_idx, katja_key *key); 137 int hash_idx, int *stat,
|
/external/dropbear/libtomcrypt/src/pk/pkcs1/ |
pkcs_1_mgf1.c | 24 @param hash_idx The index of the hash desired 29 int pkcs_1_mgf1(int hash_idx, 43 if ((err = hash_is_valid(hash_idx)) != CRYPT_OK) { 48 hLen = hash_descriptor[hash_idx].hashsize; 72 if ((err = hash_descriptor[hash_idx].init(md)) != CRYPT_OK) { 75 if ((err = hash_descriptor[hash_idx].process(md, seed, seedlen)) != CRYPT_OK) { 78 if ((err = hash_descriptor[hash_idx].process(md, buf, 4)) != CRYPT_OK) { 81 if ((err = hash_descriptor[hash_idx].done(md, buf)) != CRYPT_OK) {
|
pkcs_1_oaep_encode.c | 29 @param hash_idx The index of the hash desired 37 int prng_idx, int hash_idx, 49 if ((err = hash_is_valid(hash_idx)) != CRYPT_OK) { 58 hLen = hash_descriptor[hash_idx].hashsize; 87 if ((err = hash_memory(hash_idx, lparam, lparamlen, DB, &x)) != CRYPT_OK) { 92 if ((err = hash_memory(hash_idx, DB, 0, DB, &x)) != CRYPT_OK) { 117 if ((err = pkcs_1_mgf1(hash_idx, seed, hLen, mask, modulus_len - hLen - 1)) != CRYPT_OK) { 127 if ((err = pkcs_1_mgf1(hash_idx, DB, modulus_len - hLen - 1, mask, hLen)) != CRYPT_OK) {
|
pkcs_1_pss_decode.c | 27 @param hash_idx The index of the hash desired 34 unsigned long saltlen, int hash_idx, 49 if ((err = hash_is_valid(hash_idx)) != CRYPT_OK) { 53 hLen = hash_descriptor[hash_idx].hashsize; 105 if ((err = pkcs_1_mgf1(hash_idx, hash, hLen, mask, modulus_len - hLen - 1)) != CRYPT_OK) { 134 if ((err = hash_descriptor[hash_idx].init(&md)) != CRYPT_OK) { 138 if ((err = hash_descriptor[hash_idx].process(&md, mask, 8)) != CRYPT_OK) { 141 if ((err = hash_descriptor[hash_idx].process(&md, msghash, msghashlen)) != CRYPT_OK) { 144 if ((err = hash_descriptor[hash_idx].process(&md, DB+x, saltlen)) != CRYPT_OK) { 147 if ((err = hash_descriptor[hash_idx].done(&md, mask)) != CRYPT_OK) [all...] |
pkcs_1_pss_encode.c | 27 @param hash_idx The index of the hash desired 35 int prng_idx, int hash_idx, 49 if ((err = hash_is_valid(hash_idx)) != CRYPT_OK) { 56 hLen = hash_descriptor[hash_idx].hashsize; 95 if ((err = hash_descriptor[hash_idx].init(&md)) != CRYPT_OK) { 99 if ((err = hash_descriptor[hash_idx].process(&md, DB, 8)) != CRYPT_OK) { 102 if ((err = hash_descriptor[hash_idx].process(&md, msghash, msghashlen)) != CRYPT_OK) { 105 if ((err = hash_descriptor[hash_idx].process(&md, salt, saltlen)) != CRYPT_OK) { 108 if ((err = hash_descriptor[hash_idx].done(&md, hash)) != CRYPT_OK) { 121 if ((err = pkcs_1_mgf1(hash_idx, hash, hLen, mask, modulus_len - hLen - 1)) != CRYPT_OK) [all...] |
pkcs_1_oaep_decode.c | 27 @param hash_idx The index of the hash desired 35 unsigned long modulus_bitlen, int hash_idx, 52 if ((err = hash_is_valid(hash_idx)) != CRYPT_OK) { 55 hLen = hash_descriptor[hash_idx].hashsize; 104 if ((err = pkcs_1_mgf1(hash_idx, DB, modulus_len - hLen - 1, mask, hLen)) != CRYPT_OK) { 114 if ((err = pkcs_1_mgf1(hash_idx, seed, hLen, mask, modulus_len - hLen - 1)) != CRYPT_OK) { 128 if ((err = hash_memory(hash_idx, lparam, lparamlen, seed, &x)) != CRYPT_OK) { 133 if ((err = hash_memory(hash_idx, DB, 0, seed, &x)) != CRYPT_OK) {
|
/external/dropbear/libtomcrypt/testprof/ |
pkcs_1_test.c | 8 int res1, res2, res3, prng_idx, hash_idx, err; local 13 hash_idx = find_hash("sha1"); 16 if (hash_idx == -1 || prng_idx == -1) { 41 DO(pkcs_1_oaep_encode(buf[0], l3, lparam, lparamlen, modlen, &yarrow_prng, prng_idx, hash_idx, buf[1], &l1)); 45 DO(pkcs_1_oaep_decode(buf[1], l1, lparam, lparamlen, modlen, hash_idx, buf[2], &l2, &res1)); 63 DO(pkcs_1_pss_encode(buf[0], l3, saltlen, &yarrow_prng, prng_idx, hash_idx, modlen, buf[1], &l1)); 64 DO(pkcs_1_pss_decode(buf[0], l3, buf[1], l1, saltlen, hash_idx, modlen, &res1)); 67 DO(pkcs_1_pss_decode(buf[0], l3, buf[1], l1, saltlen, hash_idx, modlen, &res2)); 71 pkcs_1_pss_decode(buf[0], l3, buf[1], l1, saltlen, hash_idx, modlen, &res3);
|
katja_test.c | 9 int hash_idx, prng_idx, stat, stat2, size; local 13 hash_idx = find_hash("sha1"); 15 if (hash_idx == -1 || prng_idx == -1) { 69 DO(katja_encrypt_key(in, kat_msgsize, out, &len, NULL, 0, &yarrow_prng, prng_idx, hash_idx, &key)); 72 DO(katja_decrypt_key(out, len, tmp, &len2, NULL, 0, hash_idx, &stat2, &key)); 81 DO(katja_decrypt_key(out, len, tmp, &len2, NULL, 0, hash_idx, &stat, &key)); 114 DO(katja_encrypt_key(in, kat_msgsize, out, &len, lparam, sizeof(lparam), &yarrow_prng, prng_idx, hash_idx, &key)); 117 DO(katja_decrypt_key(out, len, tmp, &len2, lparam, sizeof(lparam), hash_idx, &stat2, &key)); 126 DO(katja_decrypt_key(out, len, tmp, &len2, lparam, sizeof(lparam), hash_idx, &stat, &key)); 141 DO(katja_sign_hash(in, 20, out, &len, &yarrow_prng, prng_idx, hash_idx, 0, &key)) [all...] |
rsa_test.c | 129 int hash_idx, prng_idx, stat, stat2; local 137 hash_idx = find_hash("sha1"); 139 if (hash_idx == -1 || prng_idx == -1) { 192 DO(rsa_encrypt_key(in, rsa_msgsize, out, &len, NULL, 0, &yarrow_prng, prng_idx, hash_idx, &key)); 195 DO(rsa_decrypt_key(out, len, tmp, &len2, NULL, 0, hash_idx, &stat2, &key)); 204 DO(rsa_decrypt_key(out, len, tmp, &len2, NULL, 0, hash_idx, &stat, &key)); 237 DO(rsa_encrypt_key(in, rsa_msgsize, out, &len, lparam, sizeof(lparam), &yarrow_prng, prng_idx, hash_idx, &key)); 240 DO(rsa_decrypt_key(out, len, tmp, &len2, lparam, sizeof(lparam), hash_idx, &stat2, &key)); 249 DO(rsa_decrypt_key(out, len, tmp, &len2, lparam, sizeof(lparam), hash_idx, &stat, &key)); 280 DO(rsa_sign_hash(in, 20, out, &len, &yarrow_prng, prng_idx, hash_idx, 0, &key)) [all...] |
x86_prof.c | 1155 int err, cipher_idx, hash_idx; local 1166 hash_idx = find_hash("sha1"); 1168 if (cipher_idx == -1 || hash_idx == -1) { [all...] |
/external/dropbear/libtomcrypt/src/pk/katja/ |
katja_encrypt_key.c | 30 @param hash_idx The index of the desired hash 37 prng_state *prng, int prng_idx, int hash_idx, katja_key *key) 51 if ((err = hash_is_valid(hash_idx)) != CRYPT_OK) { 74 lparamlen, modulus_bitlen, prng, prng_idx, hash_idx,
|
katja_decrypt_key.c | 28 @param hash_idx The index of the hash desired 36 int hash_idx, int *stat, 52 if ((err = hash_is_valid(hash_idx)) != CRYPT_OK) { 90 err = pkcs_1_oaep_decode(tmp, x, lparam, lparamlen, modulus_bitlen, hash_idx,
|
/external/dropbear/libtomcrypt/src/pk/rsa/ |
rsa_sign_hash.c | 29 @param hash_idx The index of the hash desired 38 int hash_idx, unsigned long saltlen, 59 if ((err = hash_is_valid(hash_idx)) != CRYPT_OK) { 78 hash_idx, modulus_bitlen, out, &x)) != CRYPT_OK) { 87 if (hash_descriptor[hash_idx].OIDlen == 0) { 99 LTC_SET_ASN1(digestinfo, 0, LTC_ASN1_OBJECT_IDENTIFIER, hash_descriptor[hash_idx].OID, hash_descriptor[hash_idx].OIDlen);
|
rsa_verify_hash.c | 27 @param hash_idx The index of the desired hash 36 int hash_idx, unsigned long saltlen, 60 if ((err = hash_is_valid(hash_idx)) != CRYPT_OK) { 95 err = pkcs_1_pss_decode(hash, hashlen, tmpbuf, x, saltlen, hash_idx, modulus_bitlen, stat); 104 if (hash_descriptor[hash_idx].OIDlen == 0) { 142 if ((digestinfo[0].size == hash_descriptor[hash_idx].OIDlen) && 143 (XMEMCMP(digestinfo[0].data, hash_descriptor[hash_idx].OID, sizeof(unsigned long) * hash_descriptor[hash_idx].OIDlen) == 0) &&
|
rsa_decrypt_key.c | 28 @param hash_idx The index of the hash desired 37 int hash_idx, int padding, 61 if ((err = hash_is_valid(hash_idx)) != CRYPT_OK) { 90 err = pkcs_1_oaep_decode(tmp, x, lparam, lparamlen, modulus_bitlen, hash_idx,
|
rsa_encrypt_key.c | 30 @param hash_idx The index of the desired hash 38 prng_state *prng, int prng_idx, int hash_idx, int padding, rsa_key *key) 61 if ((err = hash_is_valid(hash_idx)) != CRYPT_OK) { 80 lparamlen, modulus_bitlen, prng, prng_idx, hash_idx,
|
/external/dropbear/libtomcrypt/demos/ |
encrypt.c | 102 int cipher_idx, hash_idx, ks; local 145 hash_idx = find_hash("sha256"); 146 if (hash_idx == -1) { 152 ks = hash_descriptor[hash_idx].hashsize; 161 if ((errno = hash_memory(hash_idx,tmpkey,strlen((char *)tmpkey),key,&outlen)) != CRYPT_OK) {
|
/external/blktrace/ |
blkparse.c | 541 const int hash_idx = ppm_hash_pid(pid); local 544 ppm = ppm_hash_table[hash_idx]; 557 const int hash_idx = ppm_hash_pid(pid); local 566 ppm->hash_next = ppm_hash_table[hash_idx]; 567 ppm_hash_table[hash_idx] = ppm; 655 const int hash_idx = ppi_hash(ppi); local 657 ppi->hash_next = ppi_hash_table[hash_idx]; 658 ppi_hash_table[hash_idx] = ppi; 670 const int hash_idx = ppi_hash_name(name); local 673 ppi = ppi_hash_table[hash_idx]; 688 const int hash_idx = ppi_hash_pid(pid); local [all...] |
/external/elfutils/src/ |
elflint.c | 3411 size_t hash_idx = 0; local [all...] |
/external/dropbear/libtomcrypt/ |
crypt.tex | [all...] |