Searched refs:hashlen (Results 1 - 22 of 22) sorted by relevance

/freebsd-10.0-release/crypto/openssh/
H A Dkexdhc.c55 u_int klen, slen, sbloblen, hashlen; local
140 &hash, &hashlen
146 if (key_verify(server_host_key, signature, slen, hash, hashlen) != 1)
153 kex->session_id_len = hashlen;
158 kex_derive_keys(kex, hash, hashlen, shared_secret);
H A Dkexecdhc.c59 u_int klen, slen, sbloblen, hashlen; local
137 &hash, &hashlen
143 if (key_verify(server_host_key, signature, slen, hash, hashlen) != 1)
150 kex->session_id_len = hashlen;
155 kex_derive_keys(kex, hash, hashlen, shared_secret);
H A Dkexgex.c52 u_char **hash, u_int *hashlen)
94 *hashlen = EVP_MD_size(evp_md);
96 dump_digest("hash", digest, *hashlen);
41 kexgex_hash( const EVP_MD *evp_md, char *client_version_string, char *server_version_string, char *ckexinit, int ckexinitlen, char *skexinit, int skexinitlen, u_char *serverhostkeyblob, int sbloblen, int min, int wantbits, int max, BIGNUM *prime, BIGNUM *gen, BIGNUM *client_dh_pub, BIGNUM *server_dh_pub, BIGNUM *shared_secret, u_char **hash, u_int *hashlen) argument
H A Dkexdh.c50 u_char **hash, u_int *hashlen)
87 *hashlen = EVP_MD_size(evp_md);
41 kex_dh_hash( char *client_version_string, char *server_version_string, char *ckexinit, int ckexinitlen, char *skexinit, int skexinitlen, u_char *serverhostkeyblob, int sbloblen, BIGNUM *client_dh_pub, BIGNUM *server_dh_pub, BIGNUM *shared_secret, u_char **hash, u_int *hashlen) argument
H A Dkexecdh.c60 u_char **hash, u_int *hashlen)
96 *hashlen = EVP_MD_size(evp_md);
49 kex_ecdh_hash( const EVP_MD *evp_md, const EC_GROUP *ec_group, char *client_version_string, char *server_version_string, char *ckexinit, int ckexinitlen, char *skexinit, int skexinitlen, u_char *serverhostkeyblob, int sbloblen, const EC_POINT *client_dh_pub, const EC_POINT *server_dh_pub, const BIGNUM *shared_secret, u_char **hash, u_int *hashlen) argument
H A Dkexdhs.c57 u_int sbloblen, klen, hashlen, slen; local
132 &hash, &hashlen
138 kex->session_id_len = hashlen;
145 hash, hashlen);
161 kex_derive_keys(kex, hash, hashlen, shared_secret);
H A Dkexecdhs.c61 u_int klen, slen, sbloblen, hashlen; local
127 &hash, &hashlen
133 kex->session_id_len = hashlen;
140 hash, hashlen);
156 kex_derive_keys(kex, hash, hashlen, shared_secret);
H A Dkexgexc.c56 u_int klen, slen, sbloblen, hashlen; local
184 &hash, &hashlen
192 if (key_verify(server_host_key, signature, slen, hash, hashlen) != 1)
199 kex->session_id_len = hashlen;
203 kex_derive_keys(kex, hash, hashlen, shared_secret);
H A Dkexgexs.c60 u_int sbloblen, klen, slen, hashlen; local
174 &hash, &hashlen
180 kex->session_id_len = hashlen;
187 hash, hashlen);
204 kex_derive_keys(kex, hash, hashlen, shared_secret);
H A Dssh-rsa.c210 openssh_RSA_verify(int type, u_char *hash, u_int hashlen, argument
233 if (hashlen != hlen) {
234 error("bad hashlen");
H A Dkex.c550 derive_key(Kex *kex, int id, u_int need, u_char *hash, u_int hashlen, argument
571 EVP_DigestUpdate(&md, hash, hashlen);
585 EVP_DigestUpdate(&md, hash, hashlen);
601 kex_derive_keys(Kex *kex, u_char *hash, u_int hashlen, BIGNUM *shared_secret) argument
607 keys[i] = derive_key(kex, 'A'+i, kex->we_need, hash, hashlen,
/freebsd-10.0-release/contrib/wpa/src/eap_common/
H A Deap_gpsk_common.c43 size_t i, n, hashlen, left, clen; local
48 hashlen = sizeof(hash);
57 n = (len + hashlen - 1) / hashlen;
62 clen = left > hashlen ? hashlen : left;
78 size_t i, n, hashlen, left, clen; local
83 hashlen = SHA256_MAC_LEN;
92 n = (len + hashlen - 1) / hashlen;
[all...]
/freebsd-10.0-release/sys/mips/nlm/hal/
H A Dnlmsaelib.h260 * hashlen : hash length in bytes
263 nlm_crypto_form_pkt_desc1(unsigned int cipherlen, unsigned int hashlen) argument
266 left_shift64_mask((hashlen - 1), 0, 32));
499 * hashlen : hash length in bytes
509 unsigned int hashoff, unsigned int hashlen, unsigned int hmacpad,
514 param->desc1 = nlm_crypto_form_pkt_desc1(cipherlen, hashlen);
552 * hashlen : hash length in bytes
559 unsigned int hashlen, unsigned int hmacpad, unsigned char *hashdst_addr)
563 param->desc1 = nlm_crypto_form_pkt_desc1(1, hashlen);
506 nlm_crypto_fill_cipher_auth_pkt_param(struct nlm_crypto_pkt_ctrl *ctrl, struct nlm_crypto_pkt_param *param, unsigned int encrypt, unsigned int hash_source, unsigned int ivoff, unsigned int ivlen, unsigned int hashoff, unsigned int hashlen, unsigned int hmacpad, unsigned int cipheroff, unsigned int cipherlen, unsigned char *hashdst_addr) argument
557 nlm_crypto_fill_auth_pkt_param(struct nlm_crypto_pkt_ctrl *ctrl, struct nlm_crypto_pkt_param *param, unsigned int hashoff, unsigned int hashlen, unsigned int hmacpad, unsigned char *hashdst_addr) argument
/freebsd-10.0-release/contrib/opie/libopie/
H A DMakefile.in17 OBJS=md4c.o md5c.o atob8.o btoa8.o btoh.o challenge.o getsequence.o hash.o hashlen.o keycrunch.o lock.o lookup.o newseed.o parsechallenge.o passcheck.o passwd.o randomchallenge.o readpass.o unlock.o verify.o version.o btoe.o accessfile.o generator.o insecure.o getutmpentry.o readrec.o writerec.o login.o open.o logwtmp.o # sha.o
/freebsd-10.0-release/contrib/unbound/validator/
H A Dval_nsec3.h294 * @param hashlen: length of hash
302 size_t nsec3_hash_to_b32(uint8_t* hash, size_t hashlen, uint8_t* zone,
H A Dval_secalgo.c1029 int hashlen = sechash.len; local
1030 if(prefixlen+hashlen > sizeof(hash2)) {
1036 sechash.len = prefixlen+hashlen;
1038 memmove(sechash.data+prefixlen, hash, hashlen);
H A Dval_nsec3.c255 size_t nsec3_hash_to_b32(uint8_t* hash, size_t hashlen, uint8_t* zone, argument
260 if(max < hashlen*2+1) /* quick approx of b32, as if hexb16 */
262 ret = ldns_b32_ntop_extended_hex(hash, hashlen, (char*)buf+1, max-1);
/freebsd-10.0-release/sys/mips/nlm/dev/sec/
H A Dnlmseclib.h106 uint32_t hashlen; member in struct:xlp_sec_command
H A Dnlmseclib.c202 cmd->hashoff, cmd->hashlen, cmd->hmacpad,
242 cmd->ivoff, cmd->ivlen, cmd->hashoff, cmd->hashlen,
H A Dnlmsec.c254 printf("hashlen :%d\n",cmd->hashlen);
779 cmd->hashlen = cmd->maccrd->crd_len;
823 cmd->hashlen = cmd->maccrd->crd_len;
/freebsd-10.0-release/sys/dev/sec/
H A Dsec.c121 u_int *eu, u_int *mode, u_int *hashlen);
1546 u_int eu, mode, hashlen; local
1555 error = sec_mdeu_config(mac, &eu, &mode, &hashlen);
1601 hashlen, buftype);
1748 sec_mdeu_config(struct cryptodesc *crd, u_int *eu, u_int *mode, u_int *hashlen) argument
1761 *hashlen = MD5_HASH_LEN;
1769 *hashlen = SHA1_HASH_LEN;
1788 *hashlen = SEC_HMAC_HASH_LEN;
1810 u_int eu, mode, hashlen; local
1820 error = sec_mdeu_config(mac, &eu, &mode, &hashlen);
[all...]
/freebsd-10.0-release/cddl/contrib/opensolaris/common/ctf/
H A Dctf_create.c57 const ulong_t hashlen = 128; local
58 ctf_dtdef_t **hash = ctf_alloc(hashlen * sizeof (ctf_dtdef_t *));
74 ctf_free(hash, hashlen * sizeof (ctf_dtdef_t *));
79 fp->ctf_dthashlen = hashlen;
80 bzero(hash, hashlen * sizeof (ctf_dtdef_t *));

Completed in 367 milliseconds