/external/vboot_reference/host/lib21/include/ |
H A D | host_key2.h | 18 enum vb2_hash_algorithm hash_alg; /* Hash algorithm */ member in struct:vb2_private_key 121 * @param hash_alg Hash algorithm to use 125 enum vb2_hash_algorithm hash_alg); 163 * not set the hash_alg, guid, or desc fields, since those are not contained in 210 * @param hash_alg Hash algorithm to use 214 enum vb2_hash_algorithm hash_alg);
|
/external/vboot_reference/firmware/2lib/ |
H A D | 2sha_utility.c | 63 int vb2_digest_size(enum vb2_hash_algorithm hash_alg) argument 65 switch (hash_alg) { 84 enum vb2_hash_algorithm hash_alg) 86 dc->hash_alg = hash_alg; 89 switch (dc->hash_alg) { 114 switch (dc->hash_alg) { 139 if (digest_size < vb2_digest_size(dc->hash_alg)) 142 switch (dc->hash_alg) { 83 vb2_digest_init(struct vb2_digest_context *dc, enum vb2_hash_algorithm hash_alg) argument
|
H A D | 2stub.c | 41 int vb2ex_hwcrypto_digest_init(enum vb2_hash_algorithm hash_alg, argument
|
/external/vboot_reference/firmware/2lib/include/ |
H A D | 2rsa.h | 21 enum vb2_hash_algorithm hash_alg; /* Hash algorithm */ member in struct:vb2_public_key
|
H A D | 2sha.h | 80 enum vb2_hash_algorithm hash_alg; member in struct:vb2_digest_context 136 * @param hash_alg Hash algorithm 139 int vb2_digest_size(enum vb2_hash_algorithm hash_alg); 145 * @param hash_alg Hash algorithm 149 enum vb2_hash_algorithm hash_alg);
|
/external/libchrome/crypto/ |
H A D | hmac_nss.cc | 24 HMAC::HMAC(HashAlgorithm hash_alg) argument 25 : hash_alg_(hash_alg), plat_(new HMACPlatformData()) {
|
H A D | signature_creator_nss.cc | 21 SECOidTag ToNSSSigOid(SignatureCreator::HashAlgorithm hash_alg) { argument 22 switch (hash_alg) { 31 SECOidTag ToNSSHashOid(SignatureCreator::HashAlgorithm hash_alg) { argument 32 switch (hash_alg) { 52 HashAlgorithm hash_alg) { 54 result->sign_context_ = SGN_NewContext(ToNSSSigOid(hash_alg), key->key()); 71 HashAlgorithm hash_alg, 81 SECStatus rv = SGN_Digest(key->key(), ToNSSHashOid(hash_alg), &signature_item, 51 Create(RSAPrivateKey* key, HashAlgorithm hash_alg) argument 70 Sign(RSAPrivateKey* key, HashAlgorithm hash_alg, const uint8_t* data, int data_len, std::vector<uint8_t>* signature) argument
|
H A D | signature_verifier_nss.cc | 23 HASH_HashType ToNSSHashType(SignatureVerifier::HashAlgorithm hash_alg) { argument 24 switch (hash_alg) { 125 bool SignatureVerifier::VerifyInitRSAPSS(HashAlgorithm hash_alg, argument 143 hash_alg_ = hash_alg;
|
/external/openssh/ |
H A D | kexecdh.c | 51 int hash_alg, 66 if (*hashlen < ssh_digest_bytes(hash_alg)) 89 if (ssh_digest_buffer(hash_alg, b, hash, *hashlen) != 0) { 94 *hashlen = ssh_digest_bytes(hash_alg); 50 kex_ecdh_hash( int hash_alg, const EC_GROUP *ec_group, const char *client_version_string, const char *server_version_string, const u_char *ckexinit, size_t ckexinitlen, const u_char *skexinit, size_t skexinitlen, const u_char *serverhostkeyblob, size_t sbloblen, const EC_POINT *client_dh_pub, const EC_POINT *server_dh_pub, const BIGNUM *shared_secret, u_char *hash, size_t *hashlen) argument
|
H A D | kexc25519.c | 86 int hash_alg, 100 if (*hashlen < ssh_digest_bytes(hash_alg)) 123 if (ssh_digest_buffer(hash_alg, b, hash, *hashlen) != 0) { 128 *hashlen = ssh_digest_bytes(hash_alg); 85 kex_c25519_hash( int hash_alg, const char *client_version_string, const char *server_version_string, const char *ckexinit, size_t ckexinitlen, const char *skexinit, size_t skexinitlen, const u_char *serverhostkeyblob, size_t sbloblen, const u_char client_dh_pub[CURVE25519_SIZE], const u_char server_dh_pub[CURVE25519_SIZE], const u_char *shared_secret, size_t secretlen, u_char *hash, size_t *hashlen) argument
|
H A D | kexgex.c | 46 int hash_alg, 91 if (ssh_digest_buffer(hash_alg, b, hash, *hashlen) != 0) { 96 *hashlen = ssh_digest_bytes(hash_alg); 45 kexgex_hash( int hash_alg, const char *client_version_string, const char *server_version_string, const u_char *ckexinit, size_t ckexinitlen, const u_char *skexinit, size_t skexinitlen, const u_char *serverhostkeyblob, size_t sbloblen, int min, int wantbits, int max, const BIGNUM *prime, const BIGNUM *gen, const BIGNUM *client_dh_pub, const BIGNUM *server_dh_pub, const BIGNUM *shared_secret, u_char *hash, size_t *hashlen) argument
|
H A D | ssh-ecdsa.c | 52 int hash_alg; local 67 if ((hash_alg = sshkey_ec_nid_to_hash_alg(key->ecdsa_nid)) == -1 || 68 (dlen = ssh_digest_bytes(hash_alg)) == 0) 70 if ((ret = ssh_digest_memory(hash_alg, data, datalen, 118 int hash_alg; local 129 if ((hash_alg = sshkey_ec_nid_to_hash_alg(key->ecdsa_nid)) == -1 || 130 (dlen = ssh_digest_bytes(hash_alg)) == 0) 164 if ((ret = ssh_digest_memory(hash_alg, data, datalen,
|
H A D | ssh-rsa.c | 44 int hash_alg; local 64 hash_alg = SSH_DIGEST_SHA1; 66 if ((dlen = ssh_digest_bytes(hash_alg)) == 0) 68 if ((ret = ssh_digest_memory(hash_alg, data, datalen, 125 int hash_alg, ret = SSH_ERR_INTERNAL_ERROR; local 170 hash_alg = SSH_DIGEST_SHA1; 171 if ((dlen = ssh_digest_bytes(hash_alg)) == 0) { 175 if ((ret = ssh_digest_memory(hash_alg, data, datalen, 179 ret = openssh_RSA_verify(hash_alg, digest, dlen, sigblob, len, 213 openssh_RSA_verify(int hash_alg, u_cha argument [all...] |
/external/vboot_reference/tests/ |
H A D | vb2_sha_tests.c | 18 enum vb2_hash_algorithm hash_alg, 25 rv = vb2_digest_init(&dc, hash_alg); 136 dc.hash_alg = VB2_HASH_INVALID; 16 vb2_digest(const uint8_t *buf, uint32_t size, enum vb2_hash_algorithm hash_alg, uint8_t *digest, uint32_t digest_size) argument
|
H A D | vb21_host_sig_tests.c | 24 enum vb2_hash_algorithm hash_alg; member in struct:alg_combo 64 prik->hash_alg = combo->hash_alg; 70 pubk->hash_alg = combo->hash_alg; 73 TEST_SUCC(vb2_private_key_hash(&prihash, combo->hash_alg), 75 TEST_SUCC(vb2_public_key_hash(&pubhash, combo->hash_alg),
|
/external/vboot_reference/host/lib21/ |
H A D | host_signature.c | 23 * @param hash_alg Hash algorithm 28 static int vb2_digest_info(enum vb2_hash_algorithm hash_alg, argument 35 switch (hash_alg) { 91 .hash_alg = key->hash_alg, 113 s.sig_size = vb2_sig_size(key->sig_alg, key->hash_alg); 121 if (vb2_digest_info(s.hash_alg, &info, &info_size)) 125 digest_size = vb2_digest_size(key->hash_alg); 139 if (vb2_digest_init(&dc, s.hash_alg)) { 187 uint32_t size = vb2_sig_size(key->sig_alg, key->hash_alg); [all...] |
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | pkcs1.c | 198 const struct asn1_oid *hash_alg, 273 if (!asn1_oid_equal(&oid, hash_alg)) { 276 asn1_oid_to_str(hash_alg, txt2, sizeof(txt2)); 196 pkcs1_v15_sig_ver(struct crypto_public_key *pk, const u8 *s, size_t s_len, const struct asn1_oid *hash_alg, const u8 *hash, size_t hash_len) argument
|
H A D | tlsv1_record.h | 45 enum crypto_hash_alg hash_alg; member in struct:tlsv1_record_layer
|
/external/wpa_supplicant_8/src/tls/ |
H A D | pkcs1.c | 198 const struct asn1_oid *hash_alg, 273 if (!asn1_oid_equal(&oid, hash_alg)) { 276 asn1_oid_to_str(hash_alg, txt2, sizeof(txt2)); 196 pkcs1_v15_sig_ver(struct crypto_public_key *pk, const u8 *s, size_t s_len, const struct asn1_oid *hash_alg, const u8 *hash, size_t hash_len) argument
|
H A D | tlsv1_record.h | 45 enum crypto_hash_alg hash_alg; member in struct:tlsv1_record_layer
|
/external/wpa_supplicant_8/wpa_supplicant/src/tls/ |
H A D | pkcs1.c | 198 const struct asn1_oid *hash_alg, 273 if (!asn1_oid_equal(&oid, hash_alg)) { 276 asn1_oid_to_str(hash_alg, txt2, sizeof(txt2)); 196 pkcs1_v15_sig_ver(struct crypto_public_key *pk, const u8 *s, size_t s_len, const struct asn1_oid *hash_alg, const u8 *hash, size_t hash_len) argument
|
H A D | tlsv1_record.h | 45 enum crypto_hash_alg hash_alg; member in struct:tlsv1_record_layer
|
/external/e2fsprogs/debugfs/ |
H A D | htree.c | 46 int hash_alg; local 67 hash_alg = rootnode->hash_version; 68 if ((hash_alg <= EXT2_HASH_TEA) && 70 hash_alg += 3; 92 errcode = ext2fs_dirhash(hash_alg, name, 335 com_err(argv[0], 0, "usage: dx_hash [-h hash_alg] "
|
/external/vboot_reference/firmware/lib21/ |
H A D | common.c | 130 enum vb2_hash_algorithm hash_alg) 132 uint32_t digest_size = vb2_digest_size(hash_alg); 145 const struct vb2_guid *vb2_hash_guid(enum vb2_hash_algorithm hash_alg) argument 147 switch(hash_alg) { 210 expect_sig_size = vb2_sig_size(sig->sig_alg, sig->hash_alg); 232 uint32_t key_sig_size = vb2_sig_size(key->sig_alg, key->hash_alg); 239 if (key->sig_alg != sig->sig_alg || key->hash_alg != sig->hash_alg) 278 digest_size = vb2_digest_size(key->hash_alg); 291 rv = vb2_digest_init(dc, key->hash_alg); 129 vb2_sig_size(enum vb2_signature_algorithm sig_alg, enum vb2_hash_algorithm hash_alg) argument [all...] |
/external/vboot_reference/firmware/lib21/include/ |
H A D | vb2_struct.h | 135 uint16_t hash_alg; member in struct:vb2_packed_key 177 uint16_t hash_alg; member in struct:vb2_packed_private_key 215 uint16_t hash_alg; member in struct:vb2_signature
|