Lines Matching +full:no +full:- +full:rmd160
1 /* $OpenBSD: digest-libc.c,v 1.7 2020/02/26 13:40:09 jsg Exp $ */
12 * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
19 __RCSID("$NetBSD: digest-libc.c,v 1.8 2020/05/28 17:05:49 christos Exp $");
27 #include <rmd160.h>
128 return -1; in ssh_digest_alg_by_name()
136 return digest == NULL ? NULL : digest->name; in ssh_digest_alg_name()
144 return digest == NULL ? 0 : digest->digest_len; in ssh_digest_bytes()
150 const struct ssh_digest *digest = ssh_digest_by_alg(ctx->alg); in ssh_digest_blocksize()
152 return digest == NULL ? 0 : digest->block_len; in ssh_digest_blocksize()
163 if ((ret->mdctx = calloc(1, digest->ctx_len)) == NULL) { in ssh_digest_start()
167 ret->alg = alg; in ssh_digest_start()
168 digest->md_init(ret->mdctx); in ssh_digest_start()
175 const struct ssh_digest *digest = ssh_digest_by_alg(from->alg); in ssh_digest_copy_state()
177 if (digest == NULL || from->alg != to->alg) in ssh_digest_copy_state()
179 memcpy(to->mdctx, from->mdctx, digest->ctx_len); in ssh_digest_copy_state()
186 const struct ssh_digest *digest = ssh_digest_by_alg(ctx->alg); in ssh_digest_update()
190 digest->md_update(ctx->mdctx, m, mlen); in ssh_digest_update()
203 const struct ssh_digest *digest = ssh_digest_by_alg(ctx->alg); in ssh_digest_final()
209 if (dlen < digest->digest_len) /* No truncation allowed */ in ssh_digest_final()
211 digest->md_final(d, ctx->mdctx); in ssh_digest_final()
221 digest = ssh_digest_by_alg(ctx->alg); in ssh_digest_free()
223 explicit_bzero(ctx->mdctx, digest->ctx_len); in ssh_digest_free()
224 free(ctx->mdctx); in ssh_digest_free()