/freebsd-11-stable/contrib/wpa/src/tls/ |
H A D | pkcs1.h | 27 const u8 *hash, size_t hash_len);
|
H A D | tlsv1_client_ocsp.c | 124 unsigned int hash_len; local 181 hash_len = ocsp_hash_data(&alg.oid, issuer->subject_dn, 183 if (hash_len == 0 || name_hash_len != hash_len || 184 os_memcmp(name_hash, hash, hash_len) != 0) { 187 hash, hash_len); 205 hash_len = ocsp_hash_data(&alg.oid, issuer->public_key, 207 if (hash_len == 0 || key_hash_len != hash_len || 208 os_memcmp(key_hash, hash, hash_len) ! [all...] |
H A D | pkcs1.c | 199 const u8 *hash, size_t hash_len) 300 if (hdr.length != hash_len || 196 pkcs1_v15_sig_ver(struct crypto_public_key *pk, const u8 *s, size_t s_len, const struct asn1_oid *hash_alg, const u8 *hash, size_t hash_len) argument
|
H A D | x509v3.c | 1779 size_t hash_len; local 1960 hash_len = 16; 1962 hash, hash_len); 1966 hash_len = 20; 1968 hash, hash_len); 1972 hash_len = 32; 1974 hash, hash_len); 1978 hash_len = 48; 1980 hash, hash_len); 1984 hash_len [all...] |
/freebsd-11-stable/contrib/libarchive/libarchive/ |
H A D | archive_hmac.c | 91 DWORD hash_len; local 101 status = BCryptGetProperty(hAlg, BCRYPT_HASH_LENGTH, (PUCHAR)&hash_len, 102 sizeof(hash_len), &result, 0); 107 hash = (PBYTE)HeapAlloc(GetProcessHeap(), 0, hash_len); 122 ctx->hash_len = hash_len; 138 BCryptFinishHash(ctx->hHash, ctx->hash, ctx->hash_len, 0); 139 if (ctx->hash_len == *out_len)
|
H A D | archive_hmac_private.h | 61 DWORD hash_len; member in struct:__anon12
|
/freebsd-11-stable/contrib/wpa/src/eap_common/ |
H A D | ikev2_common.c | 118 size_t hash_len; local 128 hash_len = prf->hash_len; 131 len[0] = hash_len; 150 clen = hash_len; 402 sign_len = wpabuf_len(sign_msg) + nonce_len + prf->hash_len; 411 os_memcpy(pos, hash, prf->hash_len); 416 ikev2_prf_hash(prf->id, hash, prf->hash_len, 1, 461 if (encrypted_len < iv_len + 1 + integ_alg->hash_len) { 470 integ = end - integ_alg->hash_len; [all...] |
H A D | eap_ikev2_common.c | 83 icv_len = integ->hash_len;
|
H A D | ikev2_common.h | 255 size_t hash_len; member in struct:ikev2_integ_alg 261 size_t hash_len; member in struct:ikev2_prf_alg
|
/freebsd-11-stable/contrib/wpa/src/utils/ |
H A D | http-utils.h | 25 size_t hash_len; member in struct:http_logo
|
/freebsd-11-stable/contrib/wpa/src/common/ |
H A D | dpp.c | 395 if (curve->hash_len == 32) 397 if (curve->hash_len == 48) 399 if (curve->hash_len == 64) 405 static int dpp_hkdf_expand(size_t hash_len, const u8 *secret, size_t secret_len, argument 408 if (hash_len == 32) 412 if (hash_len == 48) 416 if (hash_len == 64) 424 static int dpp_hmac_vector(size_t hash_len, const u8 *key, size_t key_len, argument 428 if (hash_len == 32) 431 if (hash_len 441 dpp_hmac(size_t hash_len, const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *mac) argument 1519 dpp_derive_k1(const u8 *Mx, size_t Mx_len, u8 *k1, unsigned int hash_len) argument 1547 dpp_derive_k2(const u8 *Nx, size_t Nx_len, u8 *k2, unsigned int hash_len) argument 1576 dpp_derive_ke(struct dpp_authentication *auth, u8 *ke, unsigned int hash_len) argument 6376 dpp_derive_pmk(const u8 *Nx, size_t Nx_len, u8 *pmk, unsigned int hash_len) argument 7167 dpp_pkex_derive_z(const u8 *mac_init, const u8 *mac_resp, const u8 *Mx, size_t Mx_len, const u8 *Nx, size_t Nx_len, const char *code, const u8 *Kx, size_t Kx_len, u8 *z, unsigned int hash_len) argument [all...] |
/freebsd-11-stable/contrib/wpa/src/eap_server/ |
H A D | eap_server.c | 703 size_t hash_len; local 709 hash_len = 32; 712 hash_len = 16; 718 hash_len = 0; 721 if (hash_len) 722 plen += 1 + hash_len; 741 wpabuf_put_data(msg, hash, hash_len); 800 size_t hash_len; local 904 hash_len = 32; 912 hash_len [all...] |
H A D | ikev2.c | 111 skeyseed, prf->hash_len); 634 if (auth_len != prf->hash_len || 640 auth_data, prf->hash_len); 1072 wpabuf_put(msg, prf->hash_len)) < 0) {
|
H A D | eap_server_aka.c | 307 size_t hash_len; local 322 hash_len = data->eap_method == EAP_TYPE_AKA_PRIME ? 325 if (checkcode_len != hash_len) { 340 if (os_memcmp_const(hash, checkcode, hash_len) != 0) {
|
/freebsd-11-stable/contrib/unbound/validator/ |
H A D | val_nsec3.c | 539 size_t i, hash_len; local 546 hash_len = nsec3_hash_algo_size_supported(algo); 547 if(hash_len == 0) { 551 if(hash_len > max) 558 sldns_buffer_write(buf, res, hash_len); 566 return hash_len; 586 c->hash_len = nsec3_hash_algo_size_supported(algo); 587 if(c->hash_len == 0) { 591 c->hash = (uint8_t*)regional_alloc(region, c->hash_len); 598 sldns_buffer_write(buf, c->hash, c->hash_len); [all...] |
H A D | val_nsec3.h | 242 size_t hash_len; member in struct:nsec3_cached_hash
|
/freebsd-11-stable/contrib/wpa/src/wps/ |
H A D | wps_attr_build.c | 418 size_t hash_len; local 425 hash_len = wpabuf_len(pubkey); 426 if (sha256_vector(1, addr, &hash_len, pubkey_hash) < 0)
|
/freebsd-11-stable/contrib/wpa/src/crypto/ |
H A D | tls.h | 56 size_t hash_len; member in struct:tls_cert_data
|
/freebsd-11-stable/contrib/wpa/src/eap_peer/ |
H A D | ikev2.c | 107 skeyseed, prf->hash_len); 566 if (auth_len != prf->hash_len || 572 auth_data, prf->hash_len); 1006 wpabuf_put(msg, prf->hash_len)) < 0) {
|
H A D | eap.c | 1795 size_t hash_len; local 1866 hash_len = 16; 1867 if (max_len < 1 + (int) hash_len) { 1882 end - ((const u8 *) hdr) - hash_len, hash) < 0) 1884 if (os_memcmp(end - hash_len, hash, hash_len) != 0) { 1890 end -= 1 + hash_len; 2091 size_t len = data->peer_cert.hash_len * 2 + 1; 2096 data->peer_cert.hash_len);
|
H A D | eap_ikev2.c | 170 icv_len = integ->hash_len;
|
H A D | eap_aka.c | 504 size_t hash_len; local 519 hash_len = data->eap_method == EAP_TYPE_AKA_PRIME ? 522 if (checkcode_len != hash_len) { 539 if (os_memcmp_const(hash, checkcode, hash_len) != 0) {
|
/freebsd-11-stable/sys/dev/cxgbe/crypto/ |
H A D | t4_crypto.c | 138 int hash_len; member in struct:ccr_session_hmac 147 int hash_len; member in struct:ccr_session_gmac 551 s->hmac.hash_len, (c_caddr_t)(cpl + 1)); 809 hash_size_in_response = s->hmac.hash_len; 1104 s->hmac.hash_len, (c_caddr_t)(cpl + 1)); 1146 hash_size_in_response = s->gmac.hash_len; 2042 s->gmac.hash_len = AES_GMAC_HASH_LEN; 2044 s->gmac.hash_len = hash->cri_mlen; 2052 s->hmac.hash_len = auth_hash->hashsize; 2054 s->hmac.hash_len [all...] |
/freebsd-11-stable/contrib/wpa/src/rsn_supp/ |
H A D | wpa.c | 4569 size_t hash_len, prime_len; local 4643 hash_len = SHA256_MAC_LEN; 4646 hash_len = SHA384_MAC_LEN; 4649 hash_len = SHA512_MAC_LEN; 4652 hash_len = 0; 4686 wpa_hexdump_key(MSG_DEBUG, "OWE: prk", prk, hash_len); 4691 res = hmac_sha256_kdf(prk, hash_len, NULL, (const u8 *) info, 4692 os_strlen(info), sm->pmk, hash_len); 4694 res = hmac_sha384_kdf(prk, hash_len, NULL, (const u8 *) info, 4695 os_strlen(info), sm->pmk, hash_len); [all...] |
/freebsd-11-stable/contrib/wpa/src/ap/ |
H A D | ieee802_11.c | 2668 size_t hash_len, prime_len; local 2719 hash_len = SHA256_MAC_LEN; 2722 hash_len = SHA384_MAC_LEN; 2725 hash_len = SHA512_MAC_LEN; 2763 wpa_hexdump_key(MSG_DEBUG, "OWE: prk", prk, hash_len); 2768 sta->owe_pmk = os_malloc(hash_len); 2775 res = hmac_sha256_kdf(prk, hash_len, NULL, (const u8 *) info, 2776 os_strlen(info), sta->owe_pmk, hash_len); 2778 res = hmac_sha384_kdf(prk, hash_len, NULL, (const u8 *) info, 2779 os_strlen(info), sta->owe_pmk, hash_len); [all...] |