/freebsd-10.0-release/crypto/openssh/ |
H A D | kexdhc.c | 55 u_int klen, slen, sbloblen, hashlen; local 140 &hash, &hashlen 146 if (key_verify(server_host_key, signature, slen, hash, hashlen) != 1) 153 kex->session_id_len = hashlen; 158 kex_derive_keys(kex, hash, hashlen, shared_secret);
|
H A D | kexecdhc.c | 59 u_int klen, slen, sbloblen, hashlen; local 137 &hash, &hashlen 143 if (key_verify(server_host_key, signature, slen, hash, hashlen) != 1) 150 kex->session_id_len = hashlen; 155 kex_derive_keys(kex, hash, hashlen, shared_secret);
|
H A D | kexgex.c | 52 u_char **hash, u_int *hashlen) 94 *hashlen = EVP_MD_size(evp_md); 96 dump_digest("hash", digest, *hashlen); 41 kexgex_hash( const EVP_MD *evp_md, char *client_version_string, char *server_version_string, char *ckexinit, int ckexinitlen, char *skexinit, int skexinitlen, u_char *serverhostkeyblob, int sbloblen, int min, int wantbits, int max, BIGNUM *prime, BIGNUM *gen, BIGNUM *client_dh_pub, BIGNUM *server_dh_pub, BIGNUM *shared_secret, u_char **hash, u_int *hashlen) argument
|
H A D | kexdh.c | 50 u_char **hash, u_int *hashlen) 87 *hashlen = EVP_MD_size(evp_md); 41 kex_dh_hash( char *client_version_string, char *server_version_string, char *ckexinit, int ckexinitlen, char *skexinit, int skexinitlen, u_char *serverhostkeyblob, int sbloblen, BIGNUM *client_dh_pub, BIGNUM *server_dh_pub, BIGNUM *shared_secret, u_char **hash, u_int *hashlen) argument
|
H A D | kexecdh.c | 60 u_char **hash, u_int *hashlen) 96 *hashlen = EVP_MD_size(evp_md); 49 kex_ecdh_hash( const EVP_MD *evp_md, const EC_GROUP *ec_group, char *client_version_string, char *server_version_string, char *ckexinit, int ckexinitlen, char *skexinit, int skexinitlen, u_char *serverhostkeyblob, int sbloblen, const EC_POINT *client_dh_pub, const EC_POINT *server_dh_pub, const BIGNUM *shared_secret, u_char **hash, u_int *hashlen) argument
|
H A D | kexdhs.c | 57 u_int sbloblen, klen, hashlen, slen; local 132 &hash, &hashlen 138 kex->session_id_len = hashlen; 145 hash, hashlen); 161 kex_derive_keys(kex, hash, hashlen, shared_secret);
|
H A D | kexecdhs.c | 61 u_int klen, slen, sbloblen, hashlen; local 127 &hash, &hashlen 133 kex->session_id_len = hashlen; 140 hash, hashlen); 156 kex_derive_keys(kex, hash, hashlen, shared_secret);
|
H A D | kexgexc.c | 56 u_int klen, slen, sbloblen, hashlen; local 184 &hash, &hashlen 192 if (key_verify(server_host_key, signature, slen, hash, hashlen) != 1) 199 kex->session_id_len = hashlen; 203 kex_derive_keys(kex, hash, hashlen, shared_secret);
|
H A D | kexgexs.c | 60 u_int sbloblen, klen, slen, hashlen; local 174 &hash, &hashlen 180 kex->session_id_len = hashlen; 187 hash, hashlen); 204 kex_derive_keys(kex, hash, hashlen, shared_secret);
|
H A D | ssh-rsa.c | 210 openssh_RSA_verify(int type, u_char *hash, u_int hashlen, argument 233 if (hashlen != hlen) { 234 error("bad hashlen");
|
H A D | kex.c | 550 derive_key(Kex *kex, int id, u_int need, u_char *hash, u_int hashlen, argument 571 EVP_DigestUpdate(&md, hash, hashlen); 585 EVP_DigestUpdate(&md, hash, hashlen); 601 kex_derive_keys(Kex *kex, u_char *hash, u_int hashlen, BIGNUM *shared_secret) argument 607 keys[i] = derive_key(kex, 'A'+i, kex->we_need, hash, hashlen,
|
/freebsd-10.0-release/contrib/wpa/src/eap_common/ |
H A D | eap_gpsk_common.c | 43 size_t i, n, hashlen, left, clen; local 48 hashlen = sizeof(hash); 57 n = (len + hashlen - 1) / hashlen; 62 clen = left > hashlen ? hashlen : left; 78 size_t i, n, hashlen, left, clen; local 83 hashlen = SHA256_MAC_LEN; 92 n = (len + hashlen - 1) / hashlen; [all...] |
/freebsd-10.0-release/sys/mips/nlm/hal/ |
H A D | nlmsaelib.h | 260 * hashlen : hash length in bytes 263 nlm_crypto_form_pkt_desc1(unsigned int cipherlen, unsigned int hashlen) argument 266 left_shift64_mask((hashlen - 1), 0, 32)); 499 * hashlen : hash length in bytes 509 unsigned int hashoff, unsigned int hashlen, unsigned int hmacpad, 514 param->desc1 = nlm_crypto_form_pkt_desc1(cipherlen, hashlen); 552 * hashlen : hash length in bytes 559 unsigned int hashlen, unsigned int hmacpad, unsigned char *hashdst_addr) 563 param->desc1 = nlm_crypto_form_pkt_desc1(1, hashlen); 506 nlm_crypto_fill_cipher_auth_pkt_param(struct nlm_crypto_pkt_ctrl *ctrl, struct nlm_crypto_pkt_param *param, unsigned int encrypt, unsigned int hash_source, unsigned int ivoff, unsigned int ivlen, unsigned int hashoff, unsigned int hashlen, unsigned int hmacpad, unsigned int cipheroff, unsigned int cipherlen, unsigned char *hashdst_addr) argument 557 nlm_crypto_fill_auth_pkt_param(struct nlm_crypto_pkt_ctrl *ctrl, struct nlm_crypto_pkt_param *param, unsigned int hashoff, unsigned int hashlen, unsigned int hmacpad, unsigned char *hashdst_addr) argument
|
/freebsd-10.0-release/contrib/opie/libopie/ |
H A D | Makefile.in | 17 OBJS=md4c.o md5c.o atob8.o btoa8.o btoh.o challenge.o getsequence.o hash.o hashlen.o keycrunch.o lock.o lookup.o newseed.o parsechallenge.o passcheck.o passwd.o randomchallenge.o readpass.o unlock.o verify.o version.o btoe.o accessfile.o generator.o insecure.o getutmpentry.o readrec.o writerec.o login.o open.o logwtmp.o # sha.o
|
/freebsd-10.0-release/contrib/unbound/validator/ |
H A D | val_nsec3.h | 294 * @param hashlen: length of hash 302 size_t nsec3_hash_to_b32(uint8_t* hash, size_t hashlen, uint8_t* zone,
|
H A D | val_secalgo.c | 1029 int hashlen = sechash.len; local 1030 if(prefixlen+hashlen > sizeof(hash2)) { 1036 sechash.len = prefixlen+hashlen; 1038 memmove(sechash.data+prefixlen, hash, hashlen);
|
H A D | val_nsec3.c | 255 size_t nsec3_hash_to_b32(uint8_t* hash, size_t hashlen, uint8_t* zone, argument 260 if(max < hashlen*2+1) /* quick approx of b32, as if hexb16 */ 262 ret = ldns_b32_ntop_extended_hex(hash, hashlen, (char*)buf+1, max-1);
|
/freebsd-10.0-release/sys/mips/nlm/dev/sec/ |
H A D | nlmseclib.h | 106 uint32_t hashlen; member in struct:xlp_sec_command
|
H A D | nlmseclib.c | 202 cmd->hashoff, cmd->hashlen, cmd->hmacpad, 242 cmd->ivoff, cmd->ivlen, cmd->hashoff, cmd->hashlen,
|
H A D | nlmsec.c | 254 printf("hashlen :%d\n",cmd->hashlen); 779 cmd->hashlen = cmd->maccrd->crd_len; 823 cmd->hashlen = cmd->maccrd->crd_len;
|
/freebsd-10.0-release/sys/dev/sec/ |
H A D | sec.c | 121 u_int *eu, u_int *mode, u_int *hashlen); 1546 u_int eu, mode, hashlen; local 1555 error = sec_mdeu_config(mac, &eu, &mode, &hashlen); 1601 hashlen, buftype); 1748 sec_mdeu_config(struct cryptodesc *crd, u_int *eu, u_int *mode, u_int *hashlen) argument 1761 *hashlen = MD5_HASH_LEN; 1769 *hashlen = SHA1_HASH_LEN; 1788 *hashlen = SEC_HMAC_HASH_LEN; 1810 u_int eu, mode, hashlen; local 1820 error = sec_mdeu_config(mac, &eu, &mode, &hashlen); [all...] |
/freebsd-10.0-release/cddl/contrib/opensolaris/common/ctf/ |
H A D | ctf_create.c | 57 const ulong_t hashlen = 128; local 58 ctf_dtdef_t **hash = ctf_alloc(hashlen * sizeof (ctf_dtdef_t *)); 74 ctf_free(hash, hashlen * sizeof (ctf_dtdef_t *)); 79 fp->ctf_dthashlen = hashlen; 80 bzero(hash, hashlen * sizeof (ctf_dtdef_t *));
|