/freebsd-13-stable/crypto/openssh/ |
H A D | kexdh.c | 48 int hash_alg, 62 if (*hashlen < ssh_digest_bytes(hash_alg)) 85 if (ssh_digest_buffer(hash_alg, b, hash, *hashlen) != 0) { 90 *hashlen = ssh_digest_bytes(hash_alg); 47 kex_dh_hash( int hash_alg, const char *client_version_string, const char *server_version_string, const u_char *ckexinit, size_t ckexinitlen, const u_char *skexinit, size_t skexinitlen, const u_char *serverhostkeyblob, size_t sbloblen, const BIGNUM *client_dh_pub, const BIGNUM *server_dh_pub, const BIGNUM *shared_secret, u_char *hash, size_t *hashlen) argument
|
H A D | ssh-ecdsa.c | 55 int hash_alg; local 70 if ((hash_alg = sshkey_ec_nid_to_hash_alg(key->ecdsa_nid)) == -1 || 71 (dlen = ssh_digest_bytes(hash_alg)) == 0) 73 if ((ret = ssh_digest_memory(hash_alg, data, datalen, 120 int hash_alg; local 132 if ((hash_alg = sshkey_ec_nid_to_hash_alg(key->ecdsa_nid)) == -1 || 133 (dlen = ssh_digest_bytes(hash_alg)) == 0) 175 if ((ret = ssh_digest_memory(hash_alg, data, datalen,
|
H A D | kexecdh.c | 51 int hash_alg, 66 if (*hashlen < ssh_digest_bytes(hash_alg)) 89 if (ssh_digest_buffer(hash_alg, b, hash, *hashlen) != 0) { 94 *hashlen = ssh_digest_bytes(hash_alg); 50 kex_ecdh_hash( int hash_alg, const EC_GROUP *ec_group, const char *client_version_string, const char *server_version_string, const u_char *ckexinit, size_t ckexinitlen, const u_char *skexinit, size_t skexinitlen, const u_char *serverhostkeyblob, size_t sbloblen, const EC_POINT *client_dh_pub, const EC_POINT *server_dh_pub, const BIGNUM *shared_secret, u_char *hash, size_t *hashlen) argument
|
H A D | ssh-rsa.c | 43 rsa_hash_alg_ident(int hash_alg) argument 45 switch (hash_alg) { 171 int nid, hash_alg, ret = SSH_ERR_INTERNAL_ERROR; local 180 hash_alg = SSH_DIGEST_SHA1; 182 hash_alg = rsa_hash_id_from_keyname(alg_ident); 183 if (key == NULL || key->rsa == NULL || hash_alg == -1 || 194 nid = rsa_hash_alg_nid(hash_alg); 195 if ((dlen = ssh_digest_bytes(hash_alg)) == 0) 197 if ((ret = ssh_digest_memory(hash_alg, data, datalen, 223 if ((ret = sshbuf_put_cstring(b, rsa_hash_alg_ident(hash_alg))) ! 251 int hash_alg, want_alg, ret = SSH_ERR_INTERNAL_ERROR; local 381 rsa_hash_alg_oid(int hash_alg, const u_char **oidp, size_t *oidlenp) argument 403 openssh_RSA_verify(int hash_alg, u_char *hash, size_t hashlen, u_char *sigbuf, size_t siglen, RSA *rsa) argument [all...] |
H A D | kexgex.c | 48 int hash_alg, 93 if (ssh_digest_buffer(hash_alg, b, hash, *hashlen) != 0) { 98 *hashlen = ssh_digest_bytes(hash_alg); 47 kexgex_hash( int hash_alg, const char *client_version_string, const char *server_version_string, const u_char *ckexinit, size_t ckexinitlen, const u_char *skexinit, size_t skexinitlen, const u_char *serverhostkeyblob, size_t sbloblen, int min, int wantbits, int max, const BIGNUM *prime, const BIGNUM *gen, const BIGNUM *client_dh_pub, const BIGNUM *server_dh_pub, const BIGNUM *shared_secret, u_char *hash, size_t *hashlen) argument
|
H A D | kexc25519.c | 86 int hash_alg, 100 if (*hashlen < ssh_digest_bytes(hash_alg)) 123 if (ssh_digest_buffer(hash_alg, b, hash, *hashlen) != 0) { 128 *hashlen = ssh_digest_bytes(hash_alg); 85 kex_c25519_hash( int hash_alg, const char *client_version_string, const char *server_version_string, const u_char *ckexinit, size_t ckexinitlen, const u_char *skexinit, size_t skexinitlen, const u_char *serverhostkeyblob, size_t sbloblen, const u_char client_dh_pub[CURVE25519_SIZE], const u_char server_dh_pub[CURVE25519_SIZE], const u_char *shared_secret, size_t secretlen, u_char *hash, size_t *hashlen) argument
|
H A D | hostfile.h | 49 int store_hash, int quiet, int hash_alg);
|
H A D | kex.h | 149 int hash_alg; member in struct:kex
|
H A D | kexc25519c.c | 131 kex->hash_alg,
|
H A D | kexc25519s.c | 112 kex->hash_alg,
|
H A D | kexecdhs.c | 146 kex->hash_alg,
|
H A D | kex.c | 78 int hash_alg; member in struct:kexalg 770 k->hash_alg = kexalg->hash_alg; 939 if ((mdsz = ssh_digest_bytes(kex->hash_alg)) == 0) 947 if ((hashctx = ssh_digest_start(kex->hash_alg)) == NULL || 966 if ((hashctx = ssh_digest_start(kex->hash_alg)) == NULL ||
|
/freebsd-13-stable/contrib/wpa/src/tls/ |
H A D | pkcs1.h | 26 const struct asn1_oid *hash_alg,
|
H A D | tlsv1_record.h | 45 enum crypto_hash_alg hash_alg; member in struct:tlsv1_record_layer
|
H A D | tlsv1_record.c | 45 rl->hash_alg = CRYPTO_HASH_ALG_HMAC_MD5; 48 rl->hash_alg = CRYPTO_HASH_ALG_HMAC_SHA1; 51 rl->hash_alg = CRYPTO_HASH_ALG_HMAC_SHA256; 207 hmac = crypto_hash_init(rl->hash_alg, rl->write_mac_secret, 436 hmac = crypto_hash_init(rl->hash_alg, rl->read_mac_secret,
|
H A D | pkcs1.c | 198 const struct asn1_oid *hash_alg, 273 if (!asn1_oid_equal(&oid, hash_alg)) { 276 asn1_oid_to_str(hash_alg, txt2, sizeof(txt2)); 196 pkcs1_v15_sig_ver(struct crypto_public_key *pk, const u8 *s, size_t s_len, const struct asn1_oid *hash_alg, const u8 *hash, size_t hash_len) argument
|
/freebsd-13-stable/lib/libsecureboot/openpgp/ |
H A D | packet.h | 58 int hash_alg; member in struct:OpenPGP_sig
|
H A D | opgp_sig.c | 146 sig->hash_alg = *ptr++; 150 sig->hash_alg = *ptr++; 209 get_hname(int hash_alg) argument 214 if (hmp->halg == hash_alg) 325 } else if (!(hname = get_hname(sig->hash_alg))) { 326 warnx("unsupported hash algorithm: %d", sig->hash_alg); 335 switch (sig->hash_alg) { /* see hash_algs above */
|
/freebsd-13-stable/crypto/openssl/crypto/ts/ |
H A D | ts_local.h | 144 X509_ALGOR *hash_alg; /* Default: SHA-256 */ member in struct:ESS_cert_id_v2_st
|
H A D | ts_rsp_sign.c | 38 static ESS_SIGNING_CERT_V2 *ess_signing_cert_v2_new_init(const EVP_MD *hash_alg, 42 static ESS_CERT_ID_V2 *ess_cert_id_v2_new_init(const EVP_MD *hash_alg, 864 static ESS_SIGNING_CERT_V2 *ess_signing_cert_v2_new_init(const EVP_MD *hash_alg, argument 874 if ((cid = ess_cert_id_v2_new_init(hash_alg, signcert, 0)) == NULL) 883 if ((cid = ess_cert_id_v2_new_init(hash_alg, cert, 1)) == NULL) 898 static ESS_CERT_ID_V2 *ess_cert_id_v2_new_init(const EVP_MD *hash_alg, argument 912 if (hash_alg != EVP_sha256()) { 916 X509_ALGOR_set_md(alg, hash_alg); 919 cid->hash_alg = alg; 922 cid->hash_alg [all...] |
/freebsd-13-stable/crypto/openssl/crypto/ct/ |
H A D | ct_sct.c | 128 sct->hash_alg = TLSEXT_hash_sha256; 133 sct->hash_alg = TLSEXT_hash_sha256; 219 if (sct->hash_alg == TLSEXT_hash_sha256) {
|
H A D | ct_local.h | 73 unsigned char hash_alg; member in struct:sct_st
|
H A D | ct_prn.c | 24 BIO_printf(out, "%02X%02X", sct->hash_alg, sct->sig_alg);
|
H A D | ct_oct.c | 48 sct->hash_alg = *p++; 188 *p++ = sct->hash_alg;
|
/freebsd-13-stable/sys/contrib/openzfs/module/icp/os/ |
H A D | modhash.c | 79 * hash_alg, hash_alg_data, 450 uint_t (*hash_alg)(void *, mod_hash_key_t), /* hash algorithm */ 451 void *hash_alg_data, /* pass-thru arg for hash_alg */ 457 ASSERT(hname && keycmp && hash_alg && vdtor && kdtor); 475 mod_hash->mh_hashalg = hash_alg;
|