/freebsd-10-stable/crypto/openssh/ |
H A D | kexdh.c | 55 u_char *hash, size_t *hashlen) 60 if (*hashlen < ssh_digest_bytes(hash_alg)) 83 if (ssh_digest_buffer(hash_alg, b, hash, *hashlen) != 0) { 88 *hashlen = ssh_digest_bytes(hash_alg); 90 dump_digest("hash", hash, *hashlen); 45 kex_dh_hash( int hash_alg, const char *client_version_string, const char *server_version_string, const u_char *ckexinit, size_t ckexinitlen, const u_char *skexinit, size_t skexinitlen, const u_char *serverhostkeyblob, size_t sbloblen, const BIGNUM *client_dh_pub, const BIGNUM *server_dh_pub, const BIGNUM *shared_secret, u_char *hash, size_t *hashlen) argument
|
H A D | kexgex.c | 58 u_char *hash, size_t *hashlen) 63 if (*hashlen < ssh_digest_bytes(SSH_DIGEST_SHA1)) 91 if (ssh_digest_buffer(hash_alg, b, hash, *hashlen) != 0) { 96 *hashlen = ssh_digest_bytes(hash_alg); 98 dump_digest("hash", hash, *hashlen); 45 kexgex_hash( int hash_alg, const char *client_version_string, const char *server_version_string, const u_char *ckexinit, size_t ckexinitlen, const u_char *skexinit, size_t skexinitlen, const u_char *serverhostkeyblob, size_t sbloblen, int min, int wantbits, int max, const BIGNUM *prime, const BIGNUM *gen, const BIGNUM *client_dh_pub, const BIGNUM *server_dh_pub, const BIGNUM *shared_secret, u_char *hash, size_t *hashlen) argument
|
H A D | kexecdh.c | 61 u_char *hash, size_t *hashlen) 66 if (*hashlen < ssh_digest_bytes(hash_alg)) 89 if (ssh_digest_buffer(hash_alg, b, hash, *hashlen) != 0) { 94 *hashlen = ssh_digest_bytes(hash_alg); 96 dump_digest("hash", hash, *hashlen); 50 kex_ecdh_hash( int hash_alg, const EC_GROUP *ec_group, const char *client_version_string, const char *server_version_string, const u_char *ckexinit, size_t ckexinitlen, const u_char *skexinit, size_t skexinitlen, const u_char *serverhostkeyblob, size_t sbloblen, const EC_POINT *client_dh_pub, const EC_POINT *server_dh_pub, const BIGNUM *shared_secret, u_char *hash, size_t *hashlen) argument
|
H A D | kexc25519.c | 95 u_char *hash, size_t *hashlen) 100 if (*hashlen < ssh_digest_bytes(hash_alg)) 123 if (ssh_digest_buffer(hash_alg, b, hash, *hashlen) != 0) { 128 *hashlen = ssh_digest_bytes(hash_alg); 130 dump_digest("hash", hash, *hashlen); 85 kex_c25519_hash( int hash_alg, const char *client_version_string, const char *server_version_string, const u_char *ckexinit, size_t ckexinitlen, const u_char *skexinit, size_t skexinitlen, const u_char *serverhostkeyblob, size_t sbloblen, const u_char client_dh_pub[CURVE25519_SIZE], const u_char server_dh_pub[CURVE25519_SIZE], const u_char *shared_secret, size_t secretlen, u_char *hash, size_t *hashlen) argument
|
H A D | kexc25519c.c | 81 size_t slen, pklen, sbloblen, hashlen; local 130 hashlen = sizeof(hash); 141 hash, &hashlen)) < 0) 144 if ((r = sshkey_verify(server_host_key, signature, slen, hash, hashlen, 150 kex->session_id_len = hashlen; 159 if ((r = kex_derive_keys(ssh, hash, hashlen, shared_secret)) == 0)
|
H A D | kexecdhs.c | 75 size_t klen = 0, hashlen; local 145 hashlen = sizeof(hash); 157 hash, &hashlen)) != 0) 162 kex->session_id_len = hashlen; 173 &slen, hash, hashlen, kex->hostkey_alg, ssh->compat)) < 0) 187 if ((r = kex_derive_keys_bn(ssh, hash, hashlen, shared_secret)) == 0)
|
H A D | kexc25519s.c | 66 size_t slen, pklen, sbloblen, hashlen; local 111 hashlen = sizeof(hash); 122 hash, &hashlen)) < 0) 127 kex->session_id_len = hashlen; 138 &slen, hash, hashlen, kex->hostkey_alg, ssh->compat)) < 0) 149 if ((r = kex_derive_keys(ssh, hash, hashlen, shared_secret)) == 0)
|
H A D | kexgexc.c | 154 size_t klen = 0, slen, sbloblen, hashlen; local 222 hashlen = sizeof(hash); 235 hash, &hashlen)) != 0) 239 hashlen, ssh->compat)) != 0) 244 kex->session_id_len = hashlen; 253 if ((r = kex_derive_keys_bn(ssh, hash, hashlen, shared_secret)) == 0)
|
H A D | kexecdhc.c | 111 size_t klen = 0, hashlen; local 176 hashlen = sizeof(hash); 188 hash, &hashlen)) != 0) 192 hashlen, ssh->compat)) != 0) 197 kex->session_id_len = hashlen; 206 if ((r = kex_derive_keys_bn(ssh, hash, hashlen, shared_secret)) == 0)
|
H A D | kexgexs.c | 132 size_t klen = 0, hashlen; local 195 hashlen = sizeof(hash); 208 hash, &hashlen)) != 0) 213 kex->session_id_len = hashlen; 224 &slen, hash, hashlen, kex->hostkey_alg, ssh->compat)) < 0) 237 if ((r = kex_derive_keys_bn(ssh, hash, hashlen, shared_secret)) == 0)
|
H A D | kexdhs.c | 103 size_t klen = 0, hashlen; local 166 hashlen = sizeof(hash); 177 hash, &hashlen)) != 0) 182 kex->session_id_len = hashlen; 193 &slen, hash, hashlen, kex->hostkey_alg, ssh->compat)) < 0) 206 if ((r = kex_derive_keys_bn(ssh, hash, hashlen, shared_secret)) == 0)
|
H A D | kexdhc.c | 111 size_t klen = 0, slen, sbloblen, hashlen; local 172 hashlen = sizeof(hash); 183 hash, &hashlen)) != 0) 186 if ((r = sshkey_verify(server_host_key, signature, slen, hash, hashlen, 192 kex->session_id_len = hashlen; 201 if ((r = kex_derive_keys_bn(ssh, hash, hashlen, shared_secret)) == 0)
|
H A D | kex.c | 863 derive_key(struct ssh *ssh, int id, u_int need, u_char *hash, u_int hashlen, argument 884 ssh_digest_update(hashctx, hash, hashlen) != 0 || 903 ssh_digest_update(hashctx, hash, hashlen) != 0 || 927 kex_derive_keys(struct ssh *ssh, u_char *hash, u_int hashlen, argument 936 if ((r = derive_key(ssh, 'A'+i, kex->we_need, hash, hashlen, 955 kex_derive_keys_bn(struct ssh *ssh, u_char *hash, u_int hashlen, argument 964 r = kex_derive_keys(ssh, hash, hashlen, shared_secret);
|
H A D | ssh-rsa.c | 307 openssh_RSA_verify(int hash_alg, u_char *hash, size_t hashlen, argument 319 if (hashlen != hlen) {
|
/freebsd-10-stable/contrib/wpa/src/eap_common/ |
H A D | eap_gpsk_common.c | 43 size_t i, n, hashlen, left, clen; local 48 hashlen = sizeof(hash); 57 n = (len + hashlen - 1) / hashlen; 62 clen = left > hashlen ? hashlen : left; 78 size_t i, n, hashlen, left, clen; local 83 hashlen = SHA256_MAC_LEN; 92 n = (len + hashlen - 1) / hashlen; [all...] |
/freebsd-10-stable/sys/mips/nlm/hal/ |
H A D | nlmsaelib.h | 260 * hashlen : hash length in bytes 263 nlm_crypto_form_pkt_desc1(unsigned int cipherlen, unsigned int hashlen) argument 266 left_shift64_mask((hashlen - 1), 0, 32)); 499 * hashlen : hash length in bytes 509 unsigned int hashoff, unsigned int hashlen, unsigned int hmacpad, 514 param->desc1 = nlm_crypto_form_pkt_desc1(cipherlen, hashlen); 552 * hashlen : hash length in bytes 559 unsigned int hashlen, unsigned int hmacpad, unsigned char *hashdst_addr) 563 param->desc1 = nlm_crypto_form_pkt_desc1(1, hashlen); 506 nlm_crypto_fill_cipher_auth_pkt_param(struct nlm_crypto_pkt_ctrl *ctrl, struct nlm_crypto_pkt_param *param, unsigned int encrypt, unsigned int hash_source, unsigned int ivoff, unsigned int ivlen, unsigned int hashoff, unsigned int hashlen, unsigned int hmacpad, unsigned int cipheroff, unsigned int cipherlen, unsigned char *hashdst_addr) argument 557 nlm_crypto_fill_auth_pkt_param(struct nlm_crypto_pkt_ctrl *ctrl, struct nlm_crypto_pkt_param *param, unsigned int hashoff, unsigned int hashlen, unsigned int hmacpad, unsigned char *hashdst_addr) argument
|
/freebsd-10-stable/contrib/opie/libopie/ |
H A D | Makefile.in | 17 OBJS=md4c.o md5c.o atob8.o btoa8.o btoh.o challenge.o getsequence.o hash.o hashlen.o keycrunch.o lock.o lookup.o newseed.o parsechallenge.o passcheck.o passwd.o randomchallenge.o readpass.o unlock.o verify.o version.o btoe.o accessfile.o generator.o insecure.o getutmpentry.o readrec.o writerec.o login.o open.o logwtmp.o # sha.o
|
/freebsd-10-stable/sys/mips/nlm/dev/sec/ |
H A D | nlmseclib.h | 106 uint32_t hashlen; member in struct:xlp_sec_command
|
H A D | nlmseclib.c | 202 cmd->hashoff, cmd->hashlen, cmd->hmacpad, 242 cmd->ivoff, cmd->ivlen, cmd->hashoff, cmd->hashlen,
|
H A D | nlmsec.c | 254 printf("hashlen :%d\n",cmd->hashlen); 779 cmd->hashlen = cmd->maccrd->crd_len; 823 cmd->hashlen = cmd->maccrd->crd_len;
|
/freebsd-10-stable/contrib/unbound/validator/ |
H A D | val_nsec3.h | 295 * @param hashlen: length of hash 303 size_t nsec3_hash_to_b32(uint8_t* hash, size_t hashlen, uint8_t* zone,
|
H A D | val_secalgo.c | 1085 int hashlen = sechash.len; local 1086 if(prefixlen+hashlen > sizeof(hash2)) { 1092 sechash.len = prefixlen+hashlen; 1094 memmove(sechash.data+prefixlen, hash, hashlen);
|
H A D | val_nsec3.c | 250 size_t nsec3_hash_to_b32(uint8_t* hash, size_t hashlen, uint8_t* zone, argument 255 if(max < hashlen*2+1) /* quick approx of b32, as if hexb16 */ 257 ret = sldns_b32_ntop_extended_hex(hash, hashlen, (char*)buf+1, max-1);
|
/freebsd-10-stable/sys/dev/sec/ |
H A D | sec.c | 121 u_int *eu, u_int *mode, u_int *hashlen); 1549 u_int eu, mode, hashlen; local 1558 error = sec_mdeu_config(mac, &eu, &mode, &hashlen); 1604 hashlen, buftype); 1751 sec_mdeu_config(struct cryptodesc *crd, u_int *eu, u_int *mode, u_int *hashlen) argument 1764 *hashlen = MD5_HASH_LEN; 1772 *hashlen = SHA1_HASH_LEN; 1791 *hashlen = SEC_HMAC_HASH_LEN; 1813 u_int eu, mode, hashlen; local 1823 error = sec_mdeu_config(mac, &eu, &mode, &hashlen); [all...] |
/freebsd-10-stable/cddl/contrib/opensolaris/common/ctf/ |
H A D | ctf_create.c | 57 const ulong_t hashlen = 128; local 58 ctf_dtdef_t **hash = ctf_alloc(hashlen * sizeof (ctf_dtdef_t *)); 74 ctf_free(hash, hashlen * sizeof (ctf_dtdef_t *)); 79 fp->ctf_dthashlen = hashlen; 80 bzero(hash, hashlen * sizeof (ctf_dtdef_t *));
|