/external/dropbear/libtomcrypt/src/pk/dsa/ |
H A D | dsa_verify_hash.c | 26 @param hashlen The length of the hash that was signed 32 const unsigned char *hash, unsigned long hashlen, 61 if ((err = mp_read_unsigned_bin(u1, (unsigned char *)hash, hashlen)) != CRYPT_OK) { goto error; } 89 @param hashlen The length of the hash that was signed 95 const unsigned char *hash, unsigned long hashlen, 114 err = dsa_verify_hash_raw(r, s, hash, hashlen, stat, key); 31 dsa_verify_hash_raw( void *r, void *s, const unsigned char *hash, unsigned long hashlen, int *stat, dsa_key *key) argument 94 dsa_verify_hash(const unsigned char *sig, unsigned long siglen, const unsigned char *hash, unsigned long hashlen, int *stat, dsa_key *key) argument
|
/external/openssh/ |
H A D | kexdhc.c | 55 u_int klen, slen, sbloblen, hashlen; local 140 &hash, &hashlen 146 if (key_verify(server_host_key, signature, slen, hash, hashlen) != 1) 153 kex->session_id_len = hashlen; 158 kex_derive_keys(kex, hash, hashlen, shared_secret);
|
H A D | kexdhs.c | 57 u_int sbloblen, klen, hashlen, slen; local 135 &hash, &hashlen 141 kex->session_id_len = hashlen; 148 hashlen)) < 0) 165 kex_derive_keys(kex, hash, hashlen, shared_secret);
|
H A D | kexecdhc.c | 59 u_int klen, slen, sbloblen, hashlen; local 140 &hash, &hashlen 146 if (key_verify(server_host_key, signature, slen, hash, hashlen) != 1) 153 kex->session_id_len = hashlen; 158 kex_derive_keys(kex, hash, hashlen, shared_secret);
|
H A D | kexdh.c | 50 u_char **hash, u_int *hashlen) 87 *hashlen = EVP_MD_size(evp_md); 41 kex_dh_hash( char *client_version_string, char *server_version_string, char *ckexinit, int ckexinitlen, char *skexinit, int skexinitlen, u_char *serverhostkeyblob, int sbloblen, BIGNUM *client_dh_pub, BIGNUM *server_dh_pub, BIGNUM *shared_secret, u_char **hash, u_int *hashlen) argument
|
H A D | kexecdhs.c | 61 u_int klen, slen, sbloblen, hashlen; local 133 &hash, &hashlen 139 kex->session_id_len = hashlen; 146 hash, hashlen)) < 0) 163 kex_derive_keys(kex, hash, hashlen, shared_secret);
|
H A D | kexgexc.c | 56 u_int klen, slen, sbloblen, hashlen; local 184 &hash, &hashlen 192 if (key_verify(server_host_key, signature, slen, hash, hashlen) != 1) 199 kex->session_id_len = hashlen; 203 kex_derive_keys(kex, hash, hashlen, shared_secret);
|
H A D | kexecdh.c | 78 u_char **hash, u_int *hashlen) 114 *hashlen = EVP_MD_size(evp_md); 67 kex_ecdh_hash( const EVP_MD *evp_md, const EC_GROUP *ec_group, char *client_version_string, char *server_version_string, char *ckexinit, int ckexinitlen, char *skexinit, int skexinitlen, u_char *serverhostkeyblob, int sbloblen, const EC_POINT *client_dh_pub, const EC_POINT *server_dh_pub, const BIGNUM *shared_secret, u_char **hash, u_int *hashlen) argument
|
H A D | kexgex.c | 52 u_char **hash, u_int *hashlen) 94 *hashlen = EVP_MD_size(evp_md); 96 dump_digest("hash", digest, *hashlen); 41 kexgex_hash( const EVP_MD *evp_md, char *client_version_string, char *server_version_string, char *ckexinit, int ckexinitlen, char *skexinit, int skexinitlen, u_char *serverhostkeyblob, int sbloblen, int min, int wantbits, int max, BIGNUM *prime, BIGNUM *gen, BIGNUM *client_dh_pub, BIGNUM *server_dh_pub, BIGNUM *shared_secret, u_char **hash, u_int *hashlen) argument
|
H A D | kexgexs.c | 60 u_int sbloblen, klen, slen, hashlen; local 178 &hash, &hashlen 184 kex->session_id_len = hashlen; 191 hashlen)) < 0) 209 kex_derive_keys(kex, hash, hashlen, shared_secret);
|
H A D | ssh-rsa.c | 210 openssh_RSA_verify(int type, u_char *hash, u_int hashlen, argument 233 if (hashlen != hlen) { 234 error("bad hashlen");
|
H A D | kex.c | 478 derive_key(Kex *kex, int id, u_int need, u_char *hash, u_int hashlen, argument 499 EVP_DigestUpdate(&md, hash, hashlen); 513 EVP_DigestUpdate(&md, hash, hashlen); 529 kex_derive_keys(Kex *kex, u_char *hash, u_int hashlen, BIGNUM *shared_secret) argument 535 keys[i] = derive_key(kex, 'A'+i, kex->we_need, hash, hashlen,
|
/external/dropbear/libtomcrypt/src/pk/ecc/ |
H A D | ecc_verify_hash.c | 41 @param hashlen The length of the hash (octets) 47 const unsigned char *hash, unsigned long hashlen, 103 if ((err = mp_read_unsigned_bin(e, (unsigned char *)hash, (int)hashlen)) != CRYPT_OK) { goto error; } 46 ecc_verify_hash(const unsigned char *sig, unsigned long siglen, const unsigned char *hash, unsigned long hashlen, int *stat, ecc_key *key) argument
|
/external/dropbear/libtomcrypt/src/pk/rsa/ |
H A D | rsa_verify_hash.c | 25 @param hashlen The length of the hash of the message that was signed (octets) 34 const unsigned char *hash, unsigned long hashlen, 95 err = pkcs_1_pss_decode(hash, hashlen, tmpbuf, x, saltlen, hash_idx, modulus_bitlen, stat); 144 (siginfo[1].size == hashlen) && 145 (XMEMCMP(siginfo[1].data, hash, hashlen) == 0)) { 33 rsa_verify_hash_ex(const unsigned char *sig, unsigned long siglen, const unsigned char *hash, unsigned long hashlen, int padding, int hash_idx, unsigned long saltlen, int *stat, rsa_key *key) argument
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
H A D | eap_gpsk_common.c | 52 size_t i, n, hashlen, left, clen; local 57 hashlen = sizeof(hash); 66 n = (len + hashlen - 1) / hashlen; 71 clen = left > hashlen ? hashlen : left; 87 size_t i, n, hashlen, left, clen; local 92 hashlen = SHA256_MAC_LEN; 101 n = (len + hashlen - 1) / hashlen; [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_gpsk_common.c | 43 size_t i, n, hashlen, left, clen; local 48 hashlen = sizeof(hash); 57 n = (len + hashlen - 1) / hashlen; 62 clen = left > hashlen ? hashlen : left; 78 size_t i, n, hashlen, left, clen; local 83 hashlen = SHA256_MAC_LEN; 92 n = (len + hashlen - 1) / hashlen; [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_gpsk_common.c | 43 size_t i, n, hashlen, left, clen; local 48 hashlen = sizeof(hash); 57 n = (len + hashlen - 1) / hashlen; 62 clen = left > hashlen ? hashlen : left; 78 size_t i, n, hashlen, left, clen; local 83 hashlen = SHA256_MAC_LEN; 92 n = (len + hashlen - 1) / hashlen; [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_gpsk_common.c | 43 size_t i, n, hashlen, left, clen; local 48 hashlen = sizeof(hash); 57 n = (len + hashlen - 1) / hashlen; 62 clen = left > hashlen ? hashlen : left; 78 size_t i, n, hashlen, left, clen; local 83 hashlen = SHA256_MAC_LEN; 92 n = (len + hashlen - 1) / hashlen; [all...] |
/external/ipsec-tools/src/racoon/ |
H A D | algorithm.h | 136 int (*hashlen) __P((void)); member in struct:hmac_algorithm 147 int (*hashlen) __P((void)); member in struct:hash_algorithm
|