HomeSort by relevance Sort by last modified time
    Searched refs:hash_idx (Results 1 - 23 of 23) sorted by null

  /external/dropbear/libtomcrypt/src/misc/pkcs5/
pkcs_5_1.c 24 @param hash_idx The index of the hash desired
31 int iteration_count, int hash_idx,
45 if ((err = hash_is_valid(hash_idx)) != CRYPT_OK) {
63 if ((err = hash_descriptor[hash_idx].init(md)) != CRYPT_OK) {
66 if ((err = hash_descriptor[hash_idx].process(md, password, password_len)) != CRYPT_OK) {
69 if ((err = hash_descriptor[hash_idx].process(md, salt, 8)) != CRYPT_OK) {
72 if ((err = hash_descriptor[hash_idx].done(md, buf)) != CRYPT_OK) {
79 if ((err = hash_memory(hash_idx, buf, hash_descriptor[hash_idx].hashsize, buf, &x)) != CRYPT_OK) {
85 for (x = 0; x < hash_descriptor[hash_idx].hashsize && x < *outlen; x++)
    [all...]
pkcs_5_2.c 26 @param hash_idx The index of the hash desired
33 int iteration_count, int hash_idx,
48 if ((err = hash_is_valid(hash_idx)) != CRYPT_OK) {
78 if ((err = hmac_init(hmac, hash_idx, password, password_len)) != CRYPT_OK) {
95 if ((err = hmac_memory(hash_idx, password, password_len, buf[0], x, buf[0], &x)) != CRYPT_OK) {
  /external/dropbear/libtomcrypt/src/headers/
tomcrypt_pkcs.h 19 int pkcs_1_mgf1( int hash_idx,
48 int prng_idx, int hash_idx,
53 unsigned long modulus_bitlen, int hash_idx,
59 int prng_idx, int hash_idx,
65 unsigned long saltlen, int hash_idx,
76 int iteration_count, int hash_idx,
82 int iteration_count, int hash_idx,
tomcrypt_pk.h 64 prng_state *prng, int prng_idx, int hash_idx, int padding, rsa_key *key);
69 int hash_idx, int padding,
76 int hash_idx, unsigned long saltlen,
82 int hash_idx, unsigned long saltlen,
132 prng_state *prng, int prng_idx, int hash_idx, katja_key *key);
137 int hash_idx, int *stat,
  /external/dropbear/libtomcrypt/src/pk/pkcs1/
pkcs_1_mgf1.c 24 @param hash_idx The index of the hash desired
29 int pkcs_1_mgf1(int hash_idx,
43 if ((err = hash_is_valid(hash_idx)) != CRYPT_OK) {
48 hLen = hash_descriptor[hash_idx].hashsize;
72 if ((err = hash_descriptor[hash_idx].init(md)) != CRYPT_OK) {
75 if ((err = hash_descriptor[hash_idx].process(md, seed, seedlen)) != CRYPT_OK) {
78 if ((err = hash_descriptor[hash_idx].process(md, buf, 4)) != CRYPT_OK) {
81 if ((err = hash_descriptor[hash_idx].done(md, buf)) != CRYPT_OK) {
pkcs_1_oaep_encode.c 29 @param hash_idx The index of the hash desired
37 int prng_idx, int hash_idx,
49 if ((err = hash_is_valid(hash_idx)) != CRYPT_OK) {
58 hLen = hash_descriptor[hash_idx].hashsize;
87 if ((err = hash_memory(hash_idx, lparam, lparamlen, DB, &x)) != CRYPT_OK) {
92 if ((err = hash_memory(hash_idx, DB, 0, DB, &x)) != CRYPT_OK) {
117 if ((err = pkcs_1_mgf1(hash_idx, seed, hLen, mask, modulus_len - hLen - 1)) != CRYPT_OK) {
127 if ((err = pkcs_1_mgf1(hash_idx, DB, modulus_len - hLen - 1, mask, hLen)) != CRYPT_OK) {
pkcs_1_pss_decode.c 27 @param hash_idx The index of the hash desired
34 unsigned long saltlen, int hash_idx,
49 if ((err = hash_is_valid(hash_idx)) != CRYPT_OK) {
53 hLen = hash_descriptor[hash_idx].hashsize;
105 if ((err = pkcs_1_mgf1(hash_idx, hash, hLen, mask, modulus_len - hLen - 1)) != CRYPT_OK) {
134 if ((err = hash_descriptor[hash_idx].init(&md)) != CRYPT_OK) {
138 if ((err = hash_descriptor[hash_idx].process(&md, mask, 8)) != CRYPT_OK) {
141 if ((err = hash_descriptor[hash_idx].process(&md, msghash, msghashlen)) != CRYPT_OK) {
144 if ((err = hash_descriptor[hash_idx].process(&md, DB+x, saltlen)) != CRYPT_OK) {
147 if ((err = hash_descriptor[hash_idx].done(&md, mask)) != CRYPT_OK)
    [all...]
pkcs_1_pss_encode.c 27 @param hash_idx The index of the hash desired
35 int prng_idx, int hash_idx,
49 if ((err = hash_is_valid(hash_idx)) != CRYPT_OK) {
56 hLen = hash_descriptor[hash_idx].hashsize;
95 if ((err = hash_descriptor[hash_idx].init(&md)) != CRYPT_OK) {
99 if ((err = hash_descriptor[hash_idx].process(&md, DB, 8)) != CRYPT_OK) {
102 if ((err = hash_descriptor[hash_idx].process(&md, msghash, msghashlen)) != CRYPT_OK) {
105 if ((err = hash_descriptor[hash_idx].process(&md, salt, saltlen)) != CRYPT_OK) {
108 if ((err = hash_descriptor[hash_idx].done(&md, hash)) != CRYPT_OK) {
121 if ((err = pkcs_1_mgf1(hash_idx, hash, hLen, mask, modulus_len - hLen - 1)) != CRYPT_OK)
    [all...]
pkcs_1_oaep_decode.c 27 @param hash_idx The index of the hash desired
35 unsigned long modulus_bitlen, int hash_idx,
52 if ((err = hash_is_valid(hash_idx)) != CRYPT_OK) {
55 hLen = hash_descriptor[hash_idx].hashsize;
104 if ((err = pkcs_1_mgf1(hash_idx, DB, modulus_len - hLen - 1, mask, hLen)) != CRYPT_OK) {
114 if ((err = pkcs_1_mgf1(hash_idx, seed, hLen, mask, modulus_len - hLen - 1)) != CRYPT_OK) {
128 if ((err = hash_memory(hash_idx, lparam, lparamlen, seed, &x)) != CRYPT_OK) {
133 if ((err = hash_memory(hash_idx, DB, 0, seed, &x)) != CRYPT_OK) {
  /external/dropbear/libtomcrypt/testprof/
pkcs_1_test.c 8 int res1, res2, res3, prng_idx, hash_idx, err; local
13 hash_idx = find_hash("sha1");
16 if (hash_idx == -1 || prng_idx == -1) {
41 DO(pkcs_1_oaep_encode(buf[0], l3, lparam, lparamlen, modlen, &yarrow_prng, prng_idx, hash_idx, buf[1], &l1));
45 DO(pkcs_1_oaep_decode(buf[1], l1, lparam, lparamlen, modlen, hash_idx, buf[2], &l2, &res1));
63 DO(pkcs_1_pss_encode(buf[0], l3, saltlen, &yarrow_prng, prng_idx, hash_idx, modlen, buf[1], &l1));
64 DO(pkcs_1_pss_decode(buf[0], l3, buf[1], l1, saltlen, hash_idx, modlen, &res1));
67 DO(pkcs_1_pss_decode(buf[0], l3, buf[1], l1, saltlen, hash_idx, modlen, &res2));
71 pkcs_1_pss_decode(buf[0], l3, buf[1], l1, saltlen, hash_idx, modlen, &res3);
katja_test.c 9 int hash_idx, prng_idx, stat, stat2, size; local
13 hash_idx = find_hash("sha1");
15 if (hash_idx == -1 || prng_idx == -1) {
69 DO(katja_encrypt_key(in, kat_msgsize, out, &len, NULL, 0, &yarrow_prng, prng_idx, hash_idx, &key));
72 DO(katja_decrypt_key(out, len, tmp, &len2, NULL, 0, hash_idx, &stat2, &key));
81 DO(katja_decrypt_key(out, len, tmp, &len2, NULL, 0, hash_idx, &stat, &key));
114 DO(katja_encrypt_key(in, kat_msgsize, out, &len, lparam, sizeof(lparam), &yarrow_prng, prng_idx, hash_idx, &key));
117 DO(katja_decrypt_key(out, len, tmp, &len2, lparam, sizeof(lparam), hash_idx, &stat2, &key));
126 DO(katja_decrypt_key(out, len, tmp, &len2, lparam, sizeof(lparam), hash_idx, &stat, &key));
141 DO(katja_sign_hash(in, 20, out, &len, &yarrow_prng, prng_idx, hash_idx, 0, &key))
    [all...]
rsa_test.c 129 int hash_idx, prng_idx, stat, stat2; local
137 hash_idx = find_hash("sha1");
139 if (hash_idx == -1 || prng_idx == -1) {
192 DO(rsa_encrypt_key(in, rsa_msgsize, out, &len, NULL, 0, &yarrow_prng, prng_idx, hash_idx, &key));
195 DO(rsa_decrypt_key(out, len, tmp, &len2, NULL, 0, hash_idx, &stat2, &key));
204 DO(rsa_decrypt_key(out, len, tmp, &len2, NULL, 0, hash_idx, &stat, &key));
237 DO(rsa_encrypt_key(in, rsa_msgsize, out, &len, lparam, sizeof(lparam), &yarrow_prng, prng_idx, hash_idx, &key));
240 DO(rsa_decrypt_key(out, len, tmp, &len2, lparam, sizeof(lparam), hash_idx, &stat2, &key));
249 DO(rsa_decrypt_key(out, len, tmp, &len2, lparam, sizeof(lparam), hash_idx, &stat, &key));
280 DO(rsa_sign_hash(in, 20, out, &len, &yarrow_prng, prng_idx, hash_idx, 0, &key))
    [all...]
x86_prof.c 1155 int err, cipher_idx, hash_idx; local
1166 hash_idx = find_hash("sha1");
1168 if (cipher_idx == -1 || hash_idx == -1) {
    [all...]
  /external/dropbear/libtomcrypt/src/pk/katja/
katja_encrypt_key.c 30 @param hash_idx The index of the desired hash
37 prng_state *prng, int prng_idx, int hash_idx, katja_key *key)
51 if ((err = hash_is_valid(hash_idx)) != CRYPT_OK) {
74 lparamlen, modulus_bitlen, prng, prng_idx, hash_idx,
katja_decrypt_key.c 28 @param hash_idx The index of the hash desired
36 int hash_idx, int *stat,
52 if ((err = hash_is_valid(hash_idx)) != CRYPT_OK) {
90 err = pkcs_1_oaep_decode(tmp, x, lparam, lparamlen, modulus_bitlen, hash_idx,
  /external/dropbear/libtomcrypt/src/pk/rsa/
rsa_sign_hash.c 29 @param hash_idx The index of the hash desired
38 int hash_idx, unsigned long saltlen,
59 if ((err = hash_is_valid(hash_idx)) != CRYPT_OK) {
78 hash_idx, modulus_bitlen, out, &x)) != CRYPT_OK) {
87 if (hash_descriptor[hash_idx].OIDlen == 0) {
99 LTC_SET_ASN1(digestinfo, 0, LTC_ASN1_OBJECT_IDENTIFIER, hash_descriptor[hash_idx].OID, hash_descriptor[hash_idx].OIDlen);
rsa_verify_hash.c 27 @param hash_idx The index of the desired hash
36 int hash_idx, unsigned long saltlen,
60 if ((err = hash_is_valid(hash_idx)) != CRYPT_OK) {
95 err = pkcs_1_pss_decode(hash, hashlen, tmpbuf, x, saltlen, hash_idx, modulus_bitlen, stat);
104 if (hash_descriptor[hash_idx].OIDlen == 0) {
142 if ((digestinfo[0].size == hash_descriptor[hash_idx].OIDlen) &&
143 (XMEMCMP(digestinfo[0].data, hash_descriptor[hash_idx].OID, sizeof(unsigned long) * hash_descriptor[hash_idx].OIDlen) == 0) &&
rsa_decrypt_key.c 28 @param hash_idx The index of the hash desired
37 int hash_idx, int padding,
61 if ((err = hash_is_valid(hash_idx)) != CRYPT_OK) {
90 err = pkcs_1_oaep_decode(tmp, x, lparam, lparamlen, modulus_bitlen, hash_idx,
rsa_encrypt_key.c 30 @param hash_idx The index of the desired hash
38 prng_state *prng, int prng_idx, int hash_idx, int padding, rsa_key *key)
61 if ((err = hash_is_valid(hash_idx)) != CRYPT_OK) {
80 lparamlen, modulus_bitlen, prng, prng_idx, hash_idx,
  /external/dropbear/libtomcrypt/demos/
encrypt.c 102 int cipher_idx, hash_idx, ks; local
145 hash_idx = find_hash("sha256");
146 if (hash_idx == -1) {
152 ks = hash_descriptor[hash_idx].hashsize;
161 if ((errno = hash_memory(hash_idx,tmpkey,strlen((char *)tmpkey),key,&outlen)) != CRYPT_OK) {
  /external/blktrace/
blkparse.c 541 const int hash_idx = ppm_hash_pid(pid); local
544 ppm = ppm_hash_table[hash_idx];
557 const int hash_idx = ppm_hash_pid(pid); local
566 ppm->hash_next = ppm_hash_table[hash_idx];
567 ppm_hash_table[hash_idx] = ppm;
655 const int hash_idx = ppi_hash(ppi); local
657 ppi->hash_next = ppi_hash_table[hash_idx];
658 ppi_hash_table[hash_idx] = ppi;
670 const int hash_idx = ppi_hash_name(name); local
673 ppi = ppi_hash_table[hash_idx];
688 const int hash_idx = ppi_hash_pid(pid); local
    [all...]
  /external/elfutils/src/
elflint.c 3411 size_t hash_idx = 0; local
    [all...]
  /external/dropbear/libtomcrypt/
crypt.tex     [all...]

Completed in 4226 milliseconds