Searched refs:hashlen (Results 1 - 21 of 21) sorted by relevance

/external/openssh/
H A Dkexdhc.c55 u_int klen, slen, sbloblen, hashlen; local
140 &hash, &hashlen
146 if (key_verify(server_host_key, signature, slen, hash, hashlen) != 1)
153 kex->session_id_len = hashlen;
158 kex_derive_keys(kex, hash, hashlen, shared_secret);
H A Dkexgex.c52 u_char **hash, u_int *hashlen)
94 *hashlen = EVP_MD_size(evp_md);
96 dump_digest("hash", digest, *hashlen);
41 kexgex_hash( const EVP_MD *evp_md, char *client_version_string, char *server_version_string, char *ckexinit, int ckexinitlen, char *skexinit, int skexinitlen, u_char *serverhostkeyblob, int sbloblen, int min, int wantbits, int max, BIGNUM *prime, BIGNUM *gen, BIGNUM *client_dh_pub, BIGNUM *server_dh_pub, BIGNUM *shared_secret, u_char **hash, u_int *hashlen) argument
H A Dkexdh.c50 u_char **hash, u_int *hashlen)
87 *hashlen = EVP_MD_size(evp_md);
41 kex_dh_hash( char *client_version_string, char *server_version_string, char *ckexinit, int ckexinitlen, char *skexinit, int skexinitlen, u_char *serverhostkeyblob, int sbloblen, BIGNUM *client_dh_pub, BIGNUM *server_dh_pub, BIGNUM *shared_secret, u_char **hash, u_int *hashlen) argument
H A Dkexdhs.c57 u_int sbloblen, klen, hashlen, slen; local
135 &hash, &hashlen
141 kex->session_id_len = hashlen;
148 hashlen)) < 0)
165 kex_derive_keys(kex, hash, hashlen, shared_secret);
H A Dkexecdhc.c59 u_int klen, slen, sbloblen, hashlen; local
140 &hash, &hashlen
146 if (key_verify(server_host_key, signature, slen, hash, hashlen) != 1)
153 kex->session_id_len = hashlen;
158 kex_derive_keys(kex, hash, hashlen, shared_secret);
H A Dkexecdhs.c61 u_int klen, slen, sbloblen, hashlen; local
133 &hash, &hashlen
139 kex->session_id_len = hashlen;
146 hash, hashlen)) < 0)
163 kex_derive_keys(kex, hash, hashlen, shared_secret);
H A Dkexgexc.c56 u_int klen, slen, sbloblen, hashlen; local
184 &hash, &hashlen
192 if (key_verify(server_host_key, signature, slen, hash, hashlen) != 1)
199 kex->session_id_len = hashlen;
203 kex_derive_keys(kex, hash, hashlen, shared_secret);
H A Dkexgexs.c60 u_int sbloblen, klen, slen, hashlen; local
178 &hash, &hashlen
184 kex->session_id_len = hashlen;
191 hashlen)) < 0)
209 kex_derive_keys(kex, hash, hashlen, shared_secret);
H A Dkexecdh.c78 u_char **hash, u_int *hashlen)
114 *hashlen = EVP_MD_size(evp_md);
67 kex_ecdh_hash( const EVP_MD *evp_md, const EC_GROUP *ec_group, char *client_version_string, char *server_version_string, char *ckexinit, int ckexinitlen, char *skexinit, int skexinitlen, u_char *serverhostkeyblob, int sbloblen, const EC_POINT *client_dh_pub, const EC_POINT *server_dh_pub, const BIGNUM *shared_secret, u_char **hash, u_int *hashlen) argument
H A Dssh-rsa.c210 openssh_RSA_verify(int type, u_char *hash, u_int hashlen, argument
233 if (hashlen != hlen) {
234 error("bad hashlen");
H A Dkex.c478 derive_key(Kex *kex, int id, u_int need, u_char *hash, u_int hashlen, argument
499 EVP_DigestUpdate(&md, hash, hashlen);
513 EVP_DigestUpdate(&md, hash, hashlen);
529 kex_derive_keys(Kex *kex, u_char *hash, u_int hashlen, BIGNUM *shared_secret) argument
535 keys[i] = derive_key(kex, 'A'+i, kex->we_need, hash, hashlen,
/external/dropbear/libtomcrypt/src/pk/dsa/
H A Ddsa_verify_hash.c26 @param hashlen The length of the hash that was signed
32 const unsigned char *hash, unsigned long hashlen,
61 if ((err = mp_read_unsigned_bin(u1, (unsigned char *)hash, hashlen)) != CRYPT_OK) { goto error; }
89 @param hashlen The length of the hash that was signed
95 const unsigned char *hash, unsigned long hashlen,
114 err = dsa_verify_hash_raw(r, s, hash, hashlen, stat, key);
31 dsa_verify_hash_raw( void *r, void *s, const unsigned char *hash, unsigned long hashlen, int *stat, dsa_key *key) argument
94 dsa_verify_hash(const unsigned char *sig, unsigned long siglen, const unsigned char *hash, unsigned long hashlen, int *stat, dsa_key *key) argument
/external/dropbear/libtomcrypt/src/pk/rsa/
H A Drsa_verify_hash.c25 @param hashlen The length of the hash of the message that was signed (octets)
34 const unsigned char *hash, unsigned long hashlen,
95 err = pkcs_1_pss_decode(hash, hashlen, tmpbuf, x, saltlen, hash_idx, modulus_bitlen, stat);
144 (siginfo[1].size == hashlen) &&
145 (XMEMCMP(siginfo[1].data, hash, hashlen) == 0)) {
33 rsa_verify_hash_ex(const unsigned char *sig, unsigned long siglen, const unsigned char *hash, unsigned long hashlen, int padding, int hash_idx, unsigned long saltlen, int *stat, rsa_key *key) argument
/external/wpa_supplicant_8/hostapd/src/eap_common/
H A Deap_gpsk_common.c43 size_t i, n, hashlen, left, clen; local
48 hashlen = sizeof(hash);
57 n = (len + hashlen - 1) / hashlen;
62 clen = left > hashlen ? hashlen : left;
78 size_t i, n, hashlen, left, clen; local
83 hashlen = SHA256_MAC_LEN;
92 n = (len + hashlen - 1) / hashlen;
[all...]
/external/wpa_supplicant_8/src/eap_common/
H A Deap_gpsk_common.c43 size_t i, n, hashlen, left, clen; local
48 hashlen = sizeof(hash);
57 n = (len + hashlen - 1) / hashlen;
62 clen = left > hashlen ? hashlen : left;
78 size_t i, n, hashlen, left, clen; local
83 hashlen = SHA256_MAC_LEN;
92 n = (len + hashlen - 1) / hashlen;
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/
H A Deap_gpsk_common.c43 size_t i, n, hashlen, left, clen; local
48 hashlen = sizeof(hash);
57 n = (len + hashlen - 1) / hashlen;
62 clen = left > hashlen ? hashlen : left;
78 size_t i, n, hashlen, left, clen; local
83 hashlen = SHA256_MAC_LEN;
92 n = (len + hashlen - 1) / hashlen;
[all...]
/external/ipsec-tools/src/racoon/
H A Dalgorithm.h136 int (*hashlen) __P((void)); member in struct:hmac_algorithm
147 int (*hashlen) __P((void)); member in struct:hash_algorithm
H A Dalgorithm.c347 if (f == NULL || f->hashlen == NULL)
350 return (f->hashlen)();
374 if (f == NULL || f->hashlen == NULL)
660 if (f == NULL || f->hashlen == NULL)
663 return (f->hashlen)();
/external/dropbear/libtomcrypt/src/pk/ecc/
H A Decc_verify_hash.c41 @param hashlen The length of the hash (octets)
47 const unsigned char *hash, unsigned long hashlen,
103 if ((err = mp_read_unsigned_bin(e, (unsigned char *)hash, (int)hashlen)) != CRYPT_OK) { goto error; }
46 ecc_verify_hash(const unsigned char *sig, unsigned long siglen, const unsigned char *hash, unsigned long hashlen, int *stat, ecc_key *key) argument
/external/dropbear/libtomcrypt/src/headers/
H A Dtomcrypt_pk.h80 const unsigned char *hash, unsigned long hashlen,
245 const unsigned char *hash, unsigned long hashlen,
337 const unsigned char *hash, unsigned long hashlen,
341 const unsigned char *hash, unsigned long hashlen,
/external/dropbear/libtomcrypt/
H A Dcrypt.tex3472 unsigned long hashlen,
3930 unsigned long hashlen,
3936 pointed to by the array \textit{hash} of length \textit{hashlen}. It will store a non--zero value in \textit{stat} if the signature is valid. Note:

Completed in 1336 milliseconds