/external/vboot_reference/firmware/2lib/ |
2sha_utility.c | 63 int vb2_digest_size(enum vb2_hash_algorithm hash_alg) 65 switch (hash_alg) { 84 enum vb2_hash_algorithm hash_alg) 86 dc->hash_alg = hash_alg; 89 switch (dc->hash_alg) { 114 switch (dc->hash_alg) { 139 if (digest_size < vb2_digest_size(dc->hash_alg)) 142 switch (dc->hash_alg) {
|
/external/libchrome/crypto/ |
signature_creator_nss.cc | 21 SECOidTag ToNSSSigOid(SignatureCreator::HashAlgorithm hash_alg) { 22 switch (hash_alg) { 31 SECOidTag ToNSSHashOid(SignatureCreator::HashAlgorithm hash_alg) { 32 switch (hash_alg) { 52 HashAlgorithm hash_alg) { 54 result->sign_context_ = SGN_NewContext(ToNSSSigOid(hash_alg), key->key()); 71 HashAlgorithm hash_alg, 81 SECStatus rv = SGN_Digest(key->key(), ToNSSHashOid(hash_alg), &signature_item,
|
signature_creator.h | 45 HashAlgorithm hash_alg); 47 // Signs the precomputed |hash_alg| digest |data| using private |key| as 50 HashAlgorithm hash_alg,
|
/external/openssh/ |
kexdh.c | 46 int hash_alg, 60 if (*hashlen < ssh_digest_bytes(hash_alg)) 83 if (ssh_digest_buffer(hash_alg, b, hash, *hashlen) != 0) { 88 *hashlen = ssh_digest_bytes(hash_alg);
|
ssh-rsa.c | 40 rsa_hash_alg_ident(int hash_alg) 42 switch (hash_alg) { 89 int nid, hash_alg, ret = SSH_ERR_INTERNAL_ERROR; local 98 hash_alg = SSH_DIGEST_SHA1; 100 hash_alg = rsa_hash_alg_from_ident(alg_ident); 101 if (key == NULL || key->rsa == NULL || hash_alg == -1 || 110 nid = rsa_hash_alg_nid(hash_alg); 111 if ((dlen = ssh_digest_bytes(hash_alg)) == 0) 113 if ((ret = ssh_digest_memory(hash_alg, data, datalen, 139 if ((ret = sshbuf_put_cstring(b, rsa_hash_alg_ident(hash_alg))) != 0 | 168 int hash_alg, ret = SSH_ERR_INTERNAL_ERROR; local [all...] |
ssh-ecdsa.c | 52 int hash_alg; local 67 if ((hash_alg = sshkey_ec_nid_to_hash_alg(key->ecdsa_nid)) == -1 || 68 (dlen = ssh_digest_bytes(hash_alg)) == 0) 70 if ((ret = ssh_digest_memory(hash_alg, data, datalen, 116 int hash_alg; local 128 if ((hash_alg = sshkey_ec_nid_to_hash_alg(key->ecdsa_nid)) == -1 || 129 (dlen = ssh_digest_bytes(hash_alg)) == 0) 163 if ((ret = ssh_digest_memory(hash_alg, data, datalen,
|
kexecdh.c | 51 int hash_alg, 66 if (*hashlen < ssh_digest_bytes(hash_alg)) 89 if (ssh_digest_buffer(hash_alg, b, hash, *hashlen) != 0) { 94 *hashlen = ssh_digest_bytes(hash_alg);
|
kexgex.c | 46 int hash_alg, 91 if (ssh_digest_buffer(hash_alg, b, hash, *hashlen) != 0) { 96 *hashlen = ssh_digest_bytes(hash_alg);
|
kexc25519.c | 86 int hash_alg, 100 if (*hashlen < ssh_digest_bytes(hash_alg)) 123 if (ssh_digest_buffer(hash_alg, b, hash, *hashlen) != 0) { 128 *hashlen = ssh_digest_bytes(hash_alg);
|
/external/vboot_reference/tests/futility/ |
test_create.sh | 18 ${FUTILITY} --vb1 create --hash_alg "${hash}" \ 32 ${FUTILITY} --vb21 create --hash_alg "${hash}" \
|
/external/vboot_reference/host/lib21/include/ |
host_key2.h | 18 enum vb2_hash_algorithm hash_alg; /* Hash algorithm */ member in struct:vb2_private_key 121 * @param hash_alg Hash algorithm to use 125 enum vb2_hash_algorithm hash_alg); 163 * not set the hash_alg, guid, or desc fields, since those are not contained in 210 * @param hash_alg Hash algorithm to use 214 enum vb2_hash_algorithm hash_alg);
|
/external/vboot_reference/firmware/lib20/ |
api.c | 104 rv = vb2ex_hwcrypto_digest_init(key.hash_alg, 107 VB2_DEBUG("Using HW crypto engine for hash_alg %d\n", 108 key.hash_alg); 109 dc->hash_alg = key.hash_alg; 115 VB2_DEBUG("HW crypto for hash_alg %d not supported, using SW\n", 116 key.hash_alg); 121 return vb2_digest_init(dc, key.hash_alg); 132 uint32_t digest_size = vb2_digest_size(dc->hash_alg);
|
packed_key.c | 48 key->hash_alg = vb2_crypto_to_hash(packed_key->algorithm); 49 if (key->hash_alg == VB2_HASH_INVALID) {
|
/external/vboot_reference/firmware/lib21/ |
api.c | 97 rv = vb2ex_hwcrypto_digest_init(sig->hash_alg, sig->data_size); 99 VB2_DEBUG("Using HW crypto engine for hash_alg %d\n", 100 sig->hash_alg); 101 dc->hash_alg = sig->hash_alg; 107 VB2_DEBUG("HW crypto for hash_alg %d not supported, using SW\n", 108 sig->hash_alg); 113 return vb2_digest_init(dc, sig->hash_alg); 124 uint32_t digest_size = vb2_digest_size(dc->hash_alg);
|
packed_key.c | 78 key->hash_alg = pkey->hash_alg; 79 if (!vb2_digest_size(key->hash_alg))
|
common.c | 130 enum vb2_hash_algorithm hash_alg) 132 uint32_t digest_size = vb2_digest_size(hash_alg); 145 const struct vb2_guid *vb2_hash_guid(enum vb2_hash_algorithm hash_alg) 147 switch(hash_alg) { 210 expect_sig_size = vb2_sig_size(sig->sig_alg, sig->hash_alg); 232 uint32_t key_sig_size = vb2_sig_size(key->sig_alg, key->hash_alg); 239 if (key->sig_alg != sig->sig_alg || key->hash_alg != sig->hash_alg) 278 digest_size = vb2_digest_size(key->hash_alg); 291 rv = vb2_digest_init(dc, key->hash_alg); [all...] |
/external/vboot_reference/tests/ |
vb21_host_key_tests.c | 24 enum vb2_hash_algorithm hash_alg; member in struct:alg_combo 73 key->hash_alg = combo->hash_alg; 88 TEST_EQ(k2->hash_alg, key->hash_alg, " hash alg"); 156 TEST_SUCC(vb2_private_key_hash(&ckey, combo->hash_alg), "Hash key"); 158 TEST_EQ(ckey->hash_alg, combo->hash_alg, " hash_alg"); 160 TEST_EQ(memcmp(&ckey->guid, vb2_hash_guid(combo->hash_alg), [all...] |
vb21_host_keyblock_tests.c | 43 pubk2048->hash_alg = VB2_HASH_SHA256; 49 pubk4096->hash_alg = VB2_HASH_SHA256; 55 pubk8192->hash_alg = VB2_HASH_SHA512; 62 prik4096->hash_alg = VB2_HASH_SHA256; 69 prik8192->hash_alg = VB2_HASH_SHA512; 108 prik8192->hash_alg = VB2_HASH_INVALID;
|
/external/vboot_reference/firmware/2lib/include/ |
2sha.h | 80 enum vb2_hash_algorithm hash_alg; member in struct:vb2_digest_context 136 * @param hash_alg Hash algorithm 139 int vb2_digest_size(enum vb2_hash_algorithm hash_alg); 145 * @param hash_alg Hash algorithm 149 enum vb2_hash_algorithm hash_alg);
|
2rsa.h | 21 enum vb2_hash_algorithm hash_alg; /* Hash algorithm */ member in struct:vb2_public_key
|
2common.h | 167 * @param hash_alg Hash algorithm 171 enum vb2_hash_algorithm hash_alg); 176 * @param hash_alg Hash algorithm to return key for 180 const struct vb2_guid *vb2_hash_guid(enum vb2_hash_algorithm hash_alg);
|
/external/vboot_reference/firmware/lib21/include/ |
vb2_struct.h | 135 uint16_t hash_alg; member in struct:vb2_packed_key 177 uint16_t hash_alg; member in struct:vb2_packed_private_key 215 uint16_t hash_alg; member in struct:vb2_signature
|
/external/vboot_reference/host/lib21/ |
host_key.c | 130 key->hash_alg = pkey->hash_alg; 239 .hash_alg = key->hash_alg, 287 enum vb2_hash_algorithm hash_alg) 291 switch (hash_alg) { 296 .hash_alg = VB2_HASH_SHA1, 309 .hash_alg = VB2_HASH_SHA256, 322 .hash_alg = VB2_HASH_SHA512, 486 key.hash_alg = pubk->hash_alg [all...] |
host_signature.c | 23 * @param hash_alg Hash algorithm 28 static int vb2_digest_info(enum vb2_hash_algorithm hash_alg, 35 switch (hash_alg) { 91 .hash_alg = key->hash_alg, 113 s.sig_size = vb2_sig_size(key->sig_alg, key->hash_alg); 121 if (vb2_digest_info(s.hash_alg, &info, &info_size)) 125 digest_size = vb2_digest_size(key->hash_alg); 139 if (vb2_digest_init(&dc, s.hash_alg)) { 187 uint32_t size = vb2_sig_size(key->sig_alg, key->hash_alg); [all...] |
/external/wpa_supplicant_8/src/tls/ |
pkcs1.h | 26 const struct asn1_oid *hash_alg,
|