Searched refs:hashlen (Results 1 - 25 of 25) sorted by relevance

/freebsd-10-stable/crypto/openssh/
H A Dkexdh.c55 u_char *hash, size_t *hashlen)
60 if (*hashlen < ssh_digest_bytes(hash_alg))
83 if (ssh_digest_buffer(hash_alg, b, hash, *hashlen) != 0) {
88 *hashlen = ssh_digest_bytes(hash_alg);
90 dump_digest("hash", hash, *hashlen);
45 kex_dh_hash( int hash_alg, const char *client_version_string, const char *server_version_string, const u_char *ckexinit, size_t ckexinitlen, const u_char *skexinit, size_t skexinitlen, const u_char *serverhostkeyblob, size_t sbloblen, const BIGNUM *client_dh_pub, const BIGNUM *server_dh_pub, const BIGNUM *shared_secret, u_char *hash, size_t *hashlen) argument
H A Dkexgex.c58 u_char *hash, size_t *hashlen)
63 if (*hashlen < ssh_digest_bytes(SSH_DIGEST_SHA1))
91 if (ssh_digest_buffer(hash_alg, b, hash, *hashlen) != 0) {
96 *hashlen = ssh_digest_bytes(hash_alg);
98 dump_digest("hash", hash, *hashlen);
45 kexgex_hash( int hash_alg, const char *client_version_string, const char *server_version_string, const u_char *ckexinit, size_t ckexinitlen, const u_char *skexinit, size_t skexinitlen, const u_char *serverhostkeyblob, size_t sbloblen, int min, int wantbits, int max, const BIGNUM *prime, const BIGNUM *gen, const BIGNUM *client_dh_pub, const BIGNUM *server_dh_pub, const BIGNUM *shared_secret, u_char *hash, size_t *hashlen) argument
H A Dkexecdh.c61 u_char *hash, size_t *hashlen)
66 if (*hashlen < ssh_digest_bytes(hash_alg))
89 if (ssh_digest_buffer(hash_alg, b, hash, *hashlen) != 0) {
94 *hashlen = ssh_digest_bytes(hash_alg);
96 dump_digest("hash", hash, *hashlen);
50 kex_ecdh_hash( int hash_alg, const EC_GROUP *ec_group, const char *client_version_string, const char *server_version_string, const u_char *ckexinit, size_t ckexinitlen, const u_char *skexinit, size_t skexinitlen, const u_char *serverhostkeyblob, size_t sbloblen, const EC_POINT *client_dh_pub, const EC_POINT *server_dh_pub, const BIGNUM *shared_secret, u_char *hash, size_t *hashlen) argument
H A Dkexc25519.c95 u_char *hash, size_t *hashlen)
100 if (*hashlen < ssh_digest_bytes(hash_alg))
123 if (ssh_digest_buffer(hash_alg, b, hash, *hashlen) != 0) {
128 *hashlen = ssh_digest_bytes(hash_alg);
130 dump_digest("hash", hash, *hashlen);
85 kex_c25519_hash( int hash_alg, const char *client_version_string, const char *server_version_string, const u_char *ckexinit, size_t ckexinitlen, const u_char *skexinit, size_t skexinitlen, const u_char *serverhostkeyblob, size_t sbloblen, const u_char client_dh_pub[CURVE25519_SIZE], const u_char server_dh_pub[CURVE25519_SIZE], const u_char *shared_secret, size_t secretlen, u_char *hash, size_t *hashlen) argument
H A Dkexc25519c.c81 size_t slen, pklen, sbloblen, hashlen; local
130 hashlen = sizeof(hash);
141 hash, &hashlen)) < 0)
144 if ((r = sshkey_verify(server_host_key, signature, slen, hash, hashlen,
150 kex->session_id_len = hashlen;
159 if ((r = kex_derive_keys(ssh, hash, hashlen, shared_secret)) == 0)
H A Dkexecdhs.c75 size_t klen = 0, hashlen; local
145 hashlen = sizeof(hash);
157 hash, &hashlen)) != 0)
162 kex->session_id_len = hashlen;
173 &slen, hash, hashlen, kex->hostkey_alg, ssh->compat)) < 0)
187 if ((r = kex_derive_keys_bn(ssh, hash, hashlen, shared_secret)) == 0)
H A Dkexc25519s.c66 size_t slen, pklen, sbloblen, hashlen; local
111 hashlen = sizeof(hash);
122 hash, &hashlen)) < 0)
127 kex->session_id_len = hashlen;
138 &slen, hash, hashlen, kex->hostkey_alg, ssh->compat)) < 0)
149 if ((r = kex_derive_keys(ssh, hash, hashlen, shared_secret)) == 0)
H A Dkexgexc.c154 size_t klen = 0, slen, sbloblen, hashlen; local
222 hashlen = sizeof(hash);
235 hash, &hashlen)) != 0)
239 hashlen, ssh->compat)) != 0)
244 kex->session_id_len = hashlen;
253 if ((r = kex_derive_keys_bn(ssh, hash, hashlen, shared_secret)) == 0)
H A Dkexecdhc.c111 size_t klen = 0, hashlen; local
176 hashlen = sizeof(hash);
188 hash, &hashlen)) != 0)
192 hashlen, ssh->compat)) != 0)
197 kex->session_id_len = hashlen;
206 if ((r = kex_derive_keys_bn(ssh, hash, hashlen, shared_secret)) == 0)
H A Dkexgexs.c132 size_t klen = 0, hashlen; local
195 hashlen = sizeof(hash);
208 hash, &hashlen)) != 0)
213 kex->session_id_len = hashlen;
224 &slen, hash, hashlen, kex->hostkey_alg, ssh->compat)) < 0)
237 if ((r = kex_derive_keys_bn(ssh, hash, hashlen, shared_secret)) == 0)
H A Dkexdhs.c103 size_t klen = 0, hashlen; local
166 hashlen = sizeof(hash);
177 hash, &hashlen)) != 0)
182 kex->session_id_len = hashlen;
193 &slen, hash, hashlen, kex->hostkey_alg, ssh->compat)) < 0)
206 if ((r = kex_derive_keys_bn(ssh, hash, hashlen, shared_secret)) == 0)
H A Dkexdhc.c111 size_t klen = 0, slen, sbloblen, hashlen; local
172 hashlen = sizeof(hash);
183 hash, &hashlen)) != 0)
186 if ((r = sshkey_verify(server_host_key, signature, slen, hash, hashlen,
192 kex->session_id_len = hashlen;
201 if ((r = kex_derive_keys_bn(ssh, hash, hashlen, shared_secret)) == 0)
H A Dkex.c863 derive_key(struct ssh *ssh, int id, u_int need, u_char *hash, u_int hashlen, argument
884 ssh_digest_update(hashctx, hash, hashlen) != 0 ||
903 ssh_digest_update(hashctx, hash, hashlen) != 0 ||
927 kex_derive_keys(struct ssh *ssh, u_char *hash, u_int hashlen, argument
936 if ((r = derive_key(ssh, 'A'+i, kex->we_need, hash, hashlen,
955 kex_derive_keys_bn(struct ssh *ssh, u_char *hash, u_int hashlen, argument
964 r = kex_derive_keys(ssh, hash, hashlen, shared_secret);
H A Dssh-rsa.c307 openssh_RSA_verify(int hash_alg, u_char *hash, size_t hashlen, argument
319 if (hashlen != hlen) {
/freebsd-10-stable/contrib/wpa/src/eap_common/
H A Deap_gpsk_common.c43 size_t i, n, hashlen, left, clen; local
48 hashlen = sizeof(hash);
57 n = (len + hashlen - 1) / hashlen;
62 clen = left > hashlen ? hashlen : left;
78 size_t i, n, hashlen, left, clen; local
83 hashlen = SHA256_MAC_LEN;
92 n = (len + hashlen - 1) / hashlen;
[all...]
/freebsd-10-stable/sys/mips/nlm/hal/
H A Dnlmsaelib.h260 * hashlen : hash length in bytes
263 nlm_crypto_form_pkt_desc1(unsigned int cipherlen, unsigned int hashlen) argument
266 left_shift64_mask((hashlen - 1), 0, 32));
499 * hashlen : hash length in bytes
509 unsigned int hashoff, unsigned int hashlen, unsigned int hmacpad,
514 param->desc1 = nlm_crypto_form_pkt_desc1(cipherlen, hashlen);
552 * hashlen : hash length in bytes
559 unsigned int hashlen, unsigned int hmacpad, unsigned char *hashdst_addr)
563 param->desc1 = nlm_crypto_form_pkt_desc1(1, hashlen);
506 nlm_crypto_fill_cipher_auth_pkt_param(struct nlm_crypto_pkt_ctrl *ctrl, struct nlm_crypto_pkt_param *param, unsigned int encrypt, unsigned int hash_source, unsigned int ivoff, unsigned int ivlen, unsigned int hashoff, unsigned int hashlen, unsigned int hmacpad, unsigned int cipheroff, unsigned int cipherlen, unsigned char *hashdst_addr) argument
557 nlm_crypto_fill_auth_pkt_param(struct nlm_crypto_pkt_ctrl *ctrl, struct nlm_crypto_pkt_param *param, unsigned int hashoff, unsigned int hashlen, unsigned int hmacpad, unsigned char *hashdst_addr) argument
/freebsd-10-stable/contrib/opie/libopie/
H A DMakefile.in17 OBJS=md4c.o md5c.o atob8.o btoa8.o btoh.o challenge.o getsequence.o hash.o hashlen.o keycrunch.o lock.o lookup.o newseed.o parsechallenge.o passcheck.o passwd.o randomchallenge.o readpass.o unlock.o verify.o version.o btoe.o accessfile.o generator.o insecure.o getutmpentry.o readrec.o writerec.o login.o open.o logwtmp.o # sha.o
/freebsd-10-stable/sys/mips/nlm/dev/sec/
H A Dnlmseclib.h106 uint32_t hashlen; member in struct:xlp_sec_command
H A Dnlmseclib.c202 cmd->hashoff, cmd->hashlen, cmd->hmacpad,
242 cmd->ivoff, cmd->ivlen, cmd->hashoff, cmd->hashlen,
H A Dnlmsec.c254 printf("hashlen :%d\n",cmd->hashlen);
779 cmd->hashlen = cmd->maccrd->crd_len;
823 cmd->hashlen = cmd->maccrd->crd_len;
/freebsd-10-stable/contrib/unbound/validator/
H A Dval_nsec3.h295 * @param hashlen: length of hash
303 size_t nsec3_hash_to_b32(uint8_t* hash, size_t hashlen, uint8_t* zone,
H A Dval_secalgo.c1085 int hashlen = sechash.len; local
1086 if(prefixlen+hashlen > sizeof(hash2)) {
1092 sechash.len = prefixlen+hashlen;
1094 memmove(sechash.data+prefixlen, hash, hashlen);
H A Dval_nsec3.c250 size_t nsec3_hash_to_b32(uint8_t* hash, size_t hashlen, uint8_t* zone, argument
255 if(max < hashlen*2+1) /* quick approx of b32, as if hexb16 */
257 ret = sldns_b32_ntop_extended_hex(hash, hashlen, (char*)buf+1, max-1);
/freebsd-10-stable/sys/dev/sec/
H A Dsec.c121 u_int *eu, u_int *mode, u_int *hashlen);
1549 u_int eu, mode, hashlen; local
1558 error = sec_mdeu_config(mac, &eu, &mode, &hashlen);
1604 hashlen, buftype);
1751 sec_mdeu_config(struct cryptodesc *crd, u_int *eu, u_int *mode, u_int *hashlen) argument
1764 *hashlen = MD5_HASH_LEN;
1772 *hashlen = SHA1_HASH_LEN;
1791 *hashlen = SEC_HMAC_HASH_LEN;
1813 u_int eu, mode, hashlen; local
1823 error = sec_mdeu_config(mac, &eu, &mode, &hashlen);
[all...]
/freebsd-10-stable/cddl/contrib/opensolaris/common/ctf/
H A Dctf_create.c57 const ulong_t hashlen = 128; local
58 ctf_dtdef_t **hash = ctf_alloc(hashlen * sizeof (ctf_dtdef_t *));
74 ctf_free(hash, hashlen * sizeof (ctf_dtdef_t *));
79 fp->ctf_dthashlen = hashlen;
80 bzero(hash, hashlen * sizeof (ctf_dtdef_t *));

Completed in 121 milliseconds