/freebsd-10.1-release/crypto/openssh/ |
H A D | kexecdh.c | 51 int hash_alg, 86 if (ssh_digest_buffer(hash_alg, &b, digest, sizeof(digest)) != 0) 92 dump_digest("hash", digest, ssh_digest_bytes(hash_alg)); 95 *hashlen = ssh_digest_bytes(hash_alg); 50 kex_ecdh_hash( int hash_alg, const EC_GROUP *ec_group, char *client_version_string, char *server_version_string, char *ckexinit, int ckexinitlen, char *skexinit, int skexinitlen, u_char *serverhostkeyblob, int sbloblen, const EC_POINT *client_dh_pub, const EC_POINT *server_dh_pub, const BIGNUM *shared_secret, u_char **hash, u_int *hashlen) argument
|
H A D | kexgex.c | 44 int hash_alg, 88 if (ssh_digest_buffer(hash_alg, &b, digest, sizeof(digest)) != 0) 94 dump_digest("hash", digest, ssh_digest_bytes(hash_alg)); 97 *hashlen = ssh_digest_bytes(hash_alg); 43 kexgex_hash( int hash_alg, char *client_version_string, char *server_version_string, char *ckexinit, int ckexinitlen, char *skexinit, int skexinitlen, u_char *serverhostkeyblob, int sbloblen, int min, int wantbits, int max, BIGNUM *prime, BIGNUM *gen, BIGNUM *client_dh_pub, BIGNUM *server_dh_pub, BIGNUM *shared_secret, u_char **hash, u_int *hashlen) argument
|
H A D | ssh-ecdsa.c | 52 int hash_alg; local 63 hash_alg = key_ec_nid_to_hash_alg(key->ecdsa_nid); 64 if ((dlen = ssh_digest_bytes(hash_alg)) == 0) { 65 error("%s: bad hash algorithm %d", __func__, hash_alg); 68 if (ssh_digest_memory(hash_alg, data, datalen, 107 int hash_alg; local 157 hash_alg = key_ec_nid_to_hash_alg(key->ecdsa_nid); 158 if ((dlen = ssh_digest_bytes(hash_alg)) == 0) { 159 error("%s: bad hash algorithm %d", __func__, hash_alg); 162 if (ssh_digest_memory(hash_alg, dat [all...] |
H A D | ssh-rsa.c | 44 int hash_alg; local 57 hash_alg = SSH_DIGEST_SHA1; 59 if ((dlen = ssh_digest_bytes(hash_alg)) == 0) { 60 error("%s: bad hash algorithm %d", __func__, hash_alg); 63 if (ssh_digest_memory(hash_alg, data, datalen, 116 int hash_alg; local 168 hash_alg = SSH_DIGEST_SHA1; 169 if ((dlen = ssh_digest_bytes(hash_alg)) == 0) { 170 error("%s: bad hash algorithm %d", __func__, hash_alg); 173 if (ssh_digest_memory(hash_alg, dat 207 openssh_RSA_verify(int hash_alg, u_char *hash, u_int hashlen, u_char *sigbuf, u_int siglen, RSA *rsa) argument [all...] |
H A D | kexc25519.c | 78 int hash_alg, 112 if (ssh_digest_buffer(hash_alg, &b, digest, sizeof(digest)) != 0) 118 dump_digest("hash", digest, ssh_digest_bytes(hash_alg)); 121 *hashlen = ssh_digest_bytes(hash_alg); 77 kex_c25519_hash( int hash_alg, char *client_version_string, char *server_version_string, char *ckexinit, int ckexinitlen, char *skexinit, int skexinitlen, u_char *serverhostkeyblob, int sbloblen, const u_char client_dh_pub[CURVE25519_SIZE], const u_char server_dh_pub[CURVE25519_SIZE], const u_char *shared_secret, u_int secretlen, u_char **hash, u_int *hashlen) argument
|
H A D | schnorr.c | 64 * using the hash function defined by "hash_alg". Returns signature as 69 int hash_alg, const BIGNUM *g_v, const BIGNUM *g_x, 95 if (hash_buffer(buffer_ptr(&b), buffer_len(&b), hash_alg, 120 * using the hash function "hash_alg". 130 int hash_alg, const BIGNUM *x, const BIGNUM *g_x, 180 if ((h = schnorr_hash(grp_p, grp_q, grp_g, hash_alg, g_v, g_x, 255 * 'grp_g' using hash "hash_alg". 261 int hash_alg, const BIGNUM *g_x, const u_char *id, u_int idlen, 309 if ((h = schnorr_hash(grp_p, grp_q, grp_g, hash_alg, e, g_x, 457 hash_buffer(const u_char *buf, u_int len, int hash_alg, argument 68 schnorr_hash(const BIGNUM *p, const BIGNUM *q, const BIGNUM *g, int hash_alg, const BIGNUM *g_v, const BIGNUM *g_x, const u_char *id, u_int idlen) argument 129 schnorr_sign(const BIGNUM *grp_p, const BIGNUM *grp_q, const BIGNUM *grp_g, int hash_alg, const BIGNUM *x, const BIGNUM *g_x, const u_char *id, u_int idlen, BIGNUM **r_p, BIGNUM **e_p) argument 260 schnorr_verify(const BIGNUM *grp_p, const BIGNUM *grp_q, const BIGNUM *grp_g, int hash_alg, const BIGNUM *g_x, const u_char *id, u_int idlen, const BIGNUM *r, const BIGNUM *e) argument [all...] |
H A D | kex.c | 71 int hash_alg; member in struct:kexalg 420 k->hash_alg = kexalg->hash_alg; 571 if ((mdsz = ssh_digest_bytes(kex->hash_alg)) == 0) 579 if ((hashctx = ssh_digest_start(kex->hash_alg)) == NULL) 597 if ((hashctx = ssh_digest_start(kex->hash_alg)) == NULL)
|
H A D | kexc25519c.c | 101 kex->hash_alg,
|
H A D | kexc25519s.c | 85 kex->hash_alg,
|
H A D | kexecdhc.c | 127 kex->hash_alg,
|
H A D | kex.h | 137 int hash_alg; member in struct:Kex
|
H A D | kexecdhs.c | 112 kex->hash_alg,
|
H A D | kexgexc.c | 173 kex->hash_alg,
|
H A D | kexgexs.c | 163 kex->hash_alg,
|
H A D | key.c | 365 int nlen, elen, hash_alg = -1; local 372 hash_alg = SSH_DIGEST_MD5; 375 hash_alg = SSH_DIGEST_SHA1; 378 hash_alg = SSH_DIGEST_SHA256; 415 if ((ssh_digest_memory(hash_alg, blob, len, 420 *dgst_raw_length = ssh_digest_bytes(hash_alg);
|
/freebsd-10.1-release/contrib/wpa/src/tls/ |
H A D | tlsv1_record.h | 45 enum crypto_hash_alg hash_alg; member in struct:tlsv1_record_layer
|
H A D | tlsv1_record.c | 45 rl->hash_alg = CRYPTO_HASH_ALG_HMAC_MD5; 48 rl->hash_alg = CRYPTO_HASH_ALG_HMAC_SHA1; 51 rl->hash_alg = CRYPTO_HASH_ALG_HMAC_SHA256; 207 hmac = crypto_hash_init(rl->hash_alg, rl->write_mac_secret, 436 hmac = crypto_hash_init(rl->hash_alg, rl->read_mac_secret,
|
/freebsd-10.1-release/crypto/openssl/ssl/ |
H A D | t1_lib.c | 2462 const EVP_MD *tls12_get_hash(unsigned char hash_alg) argument 2464 switch (hash_alg) { 2509 unsigned char hash_alg = data[i], sig_alg = data[i + 1]; local 2532 md = tls12_get_hash(hash_alg);
|
H A D | ssl_locl.h | 1187 const EVP_MD *tls12_get_hash(unsigned char hash_alg);
|