Searched refs:hash_alg (Results 1 - 19 of 19) sorted by relevance

/freebsd-10.1-release/crypto/openssh/
H A Dkexecdh.c51 int hash_alg,
86 if (ssh_digest_buffer(hash_alg, &b, digest, sizeof(digest)) != 0)
92 dump_digest("hash", digest, ssh_digest_bytes(hash_alg));
95 *hashlen = ssh_digest_bytes(hash_alg);
50 kex_ecdh_hash( int hash_alg, const EC_GROUP *ec_group, char *client_version_string, char *server_version_string, char *ckexinit, int ckexinitlen, char *skexinit, int skexinitlen, u_char *serverhostkeyblob, int sbloblen, const EC_POINT *client_dh_pub, const EC_POINT *server_dh_pub, const BIGNUM *shared_secret, u_char **hash, u_int *hashlen) argument
H A Dkexgex.c44 int hash_alg,
88 if (ssh_digest_buffer(hash_alg, &b, digest, sizeof(digest)) != 0)
94 dump_digest("hash", digest, ssh_digest_bytes(hash_alg));
97 *hashlen = ssh_digest_bytes(hash_alg);
43 kexgex_hash( int hash_alg, char *client_version_string, char *server_version_string, char *ckexinit, int ckexinitlen, char *skexinit, int skexinitlen, u_char *serverhostkeyblob, int sbloblen, int min, int wantbits, int max, BIGNUM *prime, BIGNUM *gen, BIGNUM *client_dh_pub, BIGNUM *server_dh_pub, BIGNUM *shared_secret, u_char **hash, u_int *hashlen) argument
H A Dssh-ecdsa.c52 int hash_alg; local
63 hash_alg = key_ec_nid_to_hash_alg(key->ecdsa_nid);
64 if ((dlen = ssh_digest_bytes(hash_alg)) == 0) {
65 error("%s: bad hash algorithm %d", __func__, hash_alg);
68 if (ssh_digest_memory(hash_alg, data, datalen,
107 int hash_alg; local
157 hash_alg = key_ec_nid_to_hash_alg(key->ecdsa_nid);
158 if ((dlen = ssh_digest_bytes(hash_alg)) == 0) {
159 error("%s: bad hash algorithm %d", __func__, hash_alg);
162 if (ssh_digest_memory(hash_alg, dat
[all...]
H A Dssh-rsa.c44 int hash_alg; local
57 hash_alg = SSH_DIGEST_SHA1;
59 if ((dlen = ssh_digest_bytes(hash_alg)) == 0) {
60 error("%s: bad hash algorithm %d", __func__, hash_alg);
63 if (ssh_digest_memory(hash_alg, data, datalen,
116 int hash_alg; local
168 hash_alg = SSH_DIGEST_SHA1;
169 if ((dlen = ssh_digest_bytes(hash_alg)) == 0) {
170 error("%s: bad hash algorithm %d", __func__, hash_alg);
173 if (ssh_digest_memory(hash_alg, dat
207 openssh_RSA_verify(int hash_alg, u_char *hash, u_int hashlen, u_char *sigbuf, u_int siglen, RSA *rsa) argument
[all...]
H A Dkexc25519.c78 int hash_alg,
112 if (ssh_digest_buffer(hash_alg, &b, digest, sizeof(digest)) != 0)
118 dump_digest("hash", digest, ssh_digest_bytes(hash_alg));
121 *hashlen = ssh_digest_bytes(hash_alg);
77 kex_c25519_hash( int hash_alg, char *client_version_string, char *server_version_string, char *ckexinit, int ckexinitlen, char *skexinit, int skexinitlen, u_char *serverhostkeyblob, int sbloblen, const u_char client_dh_pub[CURVE25519_SIZE], const u_char server_dh_pub[CURVE25519_SIZE], const u_char *shared_secret, u_int secretlen, u_char **hash, u_int *hashlen) argument
H A Dschnorr.c64 * using the hash function defined by "hash_alg". Returns signature as
69 int hash_alg, const BIGNUM *g_v, const BIGNUM *g_x,
95 if (hash_buffer(buffer_ptr(&b), buffer_len(&b), hash_alg,
120 * using the hash function "hash_alg".
130 int hash_alg, const BIGNUM *x, const BIGNUM *g_x,
180 if ((h = schnorr_hash(grp_p, grp_q, grp_g, hash_alg, g_v, g_x,
255 * 'grp_g' using hash "hash_alg".
261 int hash_alg, const BIGNUM *g_x, const u_char *id, u_int idlen,
309 if ((h = schnorr_hash(grp_p, grp_q, grp_g, hash_alg, e, g_x,
457 hash_buffer(const u_char *buf, u_int len, int hash_alg, argument
68 schnorr_hash(const BIGNUM *p, const BIGNUM *q, const BIGNUM *g, int hash_alg, const BIGNUM *g_v, const BIGNUM *g_x, const u_char *id, u_int idlen) argument
129 schnorr_sign(const BIGNUM *grp_p, const BIGNUM *grp_q, const BIGNUM *grp_g, int hash_alg, const BIGNUM *x, const BIGNUM *g_x, const u_char *id, u_int idlen, BIGNUM **r_p, BIGNUM **e_p) argument
260 schnorr_verify(const BIGNUM *grp_p, const BIGNUM *grp_q, const BIGNUM *grp_g, int hash_alg, const BIGNUM *g_x, const u_char *id, u_int idlen, const BIGNUM *r, const BIGNUM *e) argument
[all...]
H A Dkex.c71 int hash_alg; member in struct:kexalg
420 k->hash_alg = kexalg->hash_alg;
571 if ((mdsz = ssh_digest_bytes(kex->hash_alg)) == 0)
579 if ((hashctx = ssh_digest_start(kex->hash_alg)) == NULL)
597 if ((hashctx = ssh_digest_start(kex->hash_alg)) == NULL)
H A Dkexc25519c.c101 kex->hash_alg,
H A Dkexc25519s.c85 kex->hash_alg,
H A Dkexecdhc.c127 kex->hash_alg,
H A Dkex.h137 int hash_alg; member in struct:Kex
H A Dkexecdhs.c112 kex->hash_alg,
H A Dkexgexc.c173 kex->hash_alg,
H A Dkexgexs.c163 kex->hash_alg,
H A Dkey.c365 int nlen, elen, hash_alg = -1; local
372 hash_alg = SSH_DIGEST_MD5;
375 hash_alg = SSH_DIGEST_SHA1;
378 hash_alg = SSH_DIGEST_SHA256;
415 if ((ssh_digest_memory(hash_alg, blob, len,
420 *dgst_raw_length = ssh_digest_bytes(hash_alg);
/freebsd-10.1-release/contrib/wpa/src/tls/
H A Dtlsv1_record.h45 enum crypto_hash_alg hash_alg; member in struct:tlsv1_record_layer
H A Dtlsv1_record.c45 rl->hash_alg = CRYPTO_HASH_ALG_HMAC_MD5;
48 rl->hash_alg = CRYPTO_HASH_ALG_HMAC_SHA1;
51 rl->hash_alg = CRYPTO_HASH_ALG_HMAC_SHA256;
207 hmac = crypto_hash_init(rl->hash_alg, rl->write_mac_secret,
436 hmac = crypto_hash_init(rl->hash_alg, rl->read_mac_secret,
/freebsd-10.1-release/crypto/openssl/ssl/
H A Dt1_lib.c2462 const EVP_MD *tls12_get_hash(unsigned char hash_alg) argument
2464 switch (hash_alg) {
2509 unsigned char hash_alg = data[i], sig_alg = data[i + 1]; local
2532 md = tls12_get_hash(hash_alg);
H A Dssl_locl.h1187 const EVP_MD *tls12_get_hash(unsigned char hash_alg);

Completed in 90 milliseconds