/external/openssh/ |
H A D | kexdh.c | 55 u_char *hash, size_t *hashlen) 60 if (*hashlen < ssh_digest_bytes(hash_alg)) 83 if (ssh_digest_buffer(hash_alg, b, hash, *hashlen) != 0) { 88 *hashlen = ssh_digest_bytes(hash_alg); 90 dump_digest("hash", hash, *hashlen); 45 kex_dh_hash( int hash_alg, const char *client_version_string, const char *server_version_string, const u_char *ckexinit, size_t ckexinitlen, const u_char *skexinit, size_t skexinitlen, const u_char *serverhostkeyblob, size_t sbloblen, const BIGNUM *client_dh_pub, const BIGNUM *server_dh_pub, const BIGNUM *shared_secret, u_char *hash, size_t *hashlen) argument
|
H A D | kexecdh.c | 61 u_char *hash, size_t *hashlen) 66 if (*hashlen < ssh_digest_bytes(hash_alg)) 89 if (ssh_digest_buffer(hash_alg, b, hash, *hashlen) != 0) { 94 *hashlen = ssh_digest_bytes(hash_alg); 96 dump_digest("hash", hash, *hashlen); 50 kex_ecdh_hash( int hash_alg, const EC_GROUP *ec_group, const char *client_version_string, const char *server_version_string, const u_char *ckexinit, size_t ckexinitlen, const u_char *skexinit, size_t skexinitlen, const u_char *serverhostkeyblob, size_t sbloblen, const EC_POINT *client_dh_pub, const EC_POINT *server_dh_pub, const BIGNUM *shared_secret, u_char *hash, size_t *hashlen) argument
|
H A D | kexgex.c | 58 u_char *hash, size_t *hashlen) 63 if (*hashlen < ssh_digest_bytes(SSH_DIGEST_SHA1)) 91 if (ssh_digest_buffer(hash_alg, b, hash, *hashlen) != 0) { 96 *hashlen = ssh_digest_bytes(hash_alg); 98 dump_digest("hash", hash, *hashlen); 45 kexgex_hash( int hash_alg, const char *client_version_string, const char *server_version_string, const u_char *ckexinit, size_t ckexinitlen, const u_char *skexinit, size_t skexinitlen, const u_char *serverhostkeyblob, size_t sbloblen, int min, int wantbits, int max, const BIGNUM *prime, const BIGNUM *gen, const BIGNUM *client_dh_pub, const BIGNUM *server_dh_pub, const BIGNUM *shared_secret, u_char *hash, size_t *hashlen) argument
|
H A D | kexc25519.c | 95 u_char *hash, size_t *hashlen) 100 if (*hashlen < ssh_digest_bytes(hash_alg)) 123 if (ssh_digest_buffer(hash_alg, b, hash, *hashlen) != 0) { 128 *hashlen = ssh_digest_bytes(hash_alg); 130 dump_digest("hash", hash, *hashlen); 85 kex_c25519_hash( int hash_alg, const char *client_version_string, const char *server_version_string, const u_char *ckexinit, size_t ckexinitlen, const u_char *skexinit, size_t skexinitlen, const u_char *serverhostkeyblob, size_t sbloblen, const u_char client_dh_pub[CURVE25519_SIZE], const u_char server_dh_pub[CURVE25519_SIZE], const u_char *shared_secret, size_t secretlen, u_char *hash, size_t *hashlen) argument
|
H A D | kexc25519c.c | 81 size_t slen, pklen, sbloblen, hashlen; local 130 hashlen = sizeof(hash); 141 hash, &hashlen)) < 0) 144 if ((r = sshkey_verify(server_host_key, signature, slen, hash, hashlen, 150 kex->session_id_len = hashlen; 159 if ((r = kex_derive_keys(ssh, hash, hashlen, shared_secret)) == 0)
|
H A D | kexc25519s.c | 66 size_t slen, pklen, sbloblen, hashlen; local 111 hashlen = sizeof(hash); 122 hash, &hashlen)) < 0) 127 kex->session_id_len = hashlen; 138 &slen, hash, hashlen, kex->hostkey_alg, ssh->compat)) < 0) 149 if ((r = kex_derive_keys(ssh, hash, hashlen, shared_secret)) == 0)
|
H A D | kexecdhs.c | 75 size_t klen = 0, hashlen; local 145 hashlen = sizeof(hash); 157 hash, &hashlen)) != 0) 162 kex->session_id_len = hashlen; 173 &slen, hash, hashlen, kex->hostkey_alg, ssh->compat)) < 0) 187 if ((r = kex_derive_keys_bn(ssh, hash, hashlen, shared_secret)) == 0)
|
H A D | kexdhc.c | 111 size_t klen = 0, slen, sbloblen, hashlen; local 172 hashlen = sizeof(hash); 183 hash, &hashlen)) != 0) 186 if ((r = sshkey_verify(server_host_key, signature, slen, hash, hashlen, 192 kex->session_id_len = hashlen; 201 if ((r = kex_derive_keys_bn(ssh, hash, hashlen, shared_secret)) == 0)
|
H A D | kexdhs.c | 103 size_t klen = 0, hashlen; local 166 hashlen = sizeof(hash); 177 hash, &hashlen)) != 0) 182 kex->session_id_len = hashlen; 193 &slen, hash, hashlen, kex->hostkey_alg, ssh->compat)) < 0) 206 if ((r = kex_derive_keys_bn(ssh, hash, hashlen, shared_secret)) == 0)
|
H A D | kexecdhc.c | 111 size_t klen = 0, hashlen; local 176 hashlen = sizeof(hash); 188 hash, &hashlen)) != 0) 192 hashlen, ssh->compat)) != 0) 197 kex->session_id_len = hashlen; 206 if ((r = kex_derive_keys_bn(ssh, hash, hashlen, shared_secret)) == 0)
|
H A D | kexgexc.c | 154 size_t klen = 0, slen, sbloblen, hashlen; local 222 hashlen = sizeof(hash); 235 hash, &hashlen)) != 0) 239 hashlen, ssh->compat)) != 0) 244 kex->session_id_len = hashlen; 253 if ((r = kex_derive_keys_bn(ssh, hash, hashlen, shared_secret)) == 0)
|
H A D | kexgexs.c | 132 size_t klen = 0, hashlen; local 195 hashlen = sizeof(hash); 208 hash, &hashlen)) != 0) 213 kex->session_id_len = hashlen; 224 &slen, hash, hashlen, kex->hostkey_alg, ssh->compat)) < 0) 237 if ((r = kex_derive_keys_bn(ssh, hash, hashlen, shared_secret)) == 0)
|
H A D | kex.c | 884 derive_key(struct ssh *ssh, int id, u_int need, u_char *hash, u_int hashlen, argument 905 ssh_digest_update(hashctx, hash, hashlen) != 0 || 924 ssh_digest_update(hashctx, hash, hashlen) != 0 || 948 kex_derive_keys(struct ssh *ssh, u_char *hash, u_int hashlen, argument 957 if ((r = derive_key(ssh, 'A'+i, kex->we_need, hash, hashlen, 976 kex_derive_keys_bn(struct ssh *ssh, u_char *hash, u_int hashlen, argument 985 r = kex_derive_keys(ssh, hash, hashlen, shared_secret);
|
H A D | ssh-rsa.c | 307 openssh_RSA_verify(int hash_alg, u_char *hash, size_t hashlen, argument 319 if (hashlen != hlen) {
|
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_gpsk_common.c | 43 size_t i, n, hashlen, left, clen; local 48 hashlen = sizeof(hash); 57 n = (len + hashlen - 1) / hashlen; 62 clen = left > hashlen ? hashlen : left; 78 size_t i, n, hashlen, left, clen; local 83 hashlen = SHA256_MAC_LEN; 92 n = (len + hashlen - 1) / hashlen; [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_gpsk_common.c | 43 size_t i, n, hashlen, left, clen; local 48 hashlen = sizeof(hash); 57 n = (len + hashlen - 1) / hashlen; 62 clen = left > hashlen ? hashlen : left; 78 size_t i, n, hashlen, left, clen; local 83 hashlen = SHA256_MAC_LEN; 92 n = (len + hashlen - 1) / hashlen; [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_gpsk_common.c | 43 size_t i, n, hashlen, left, clen; local 48 hashlen = sizeof(hash); 57 n = (len + hashlen - 1) / hashlen; 62 clen = left > hashlen ? hashlen : left; 78 size_t i, n, hashlen, left, clen; local 83 hashlen = SHA256_MAC_LEN; 92 n = (len + hashlen - 1) / hashlen; [all...] |
/external/ipsec-tools/src/racoon/ |
H A D | algorithm.h | 136 int (*hashlen) __P((void)); member in struct:hmac_algorithm 147 int (*hashlen) __P((void)); member in struct:hash_algorithm
|
H A D | algorithm.c | 347 if (f == NULL || f->hashlen == NULL) 350 return (f->hashlen)(); 374 if (f == NULL || f->hashlen == NULL) 660 if (f == NULL || f->hashlen == NULL) 663 return (f->hashlen)();
|
/external/vboot_reference/scripts/ |
H A D | genpadding.sh | 91 eval hashlen=${hashalgo}_T_Len 92 let nums=rsalen-hashlen-3
|
/external/libcups/cups/ |
H A D | ppd-cache.c | 109 ssize_t hashlen; /* Length of hash */ local 111 if ((hashlen = cupsHashData(keyword, password, strlen(password), hash, sizeof(hash))) > 0) 112 attr = ippAddOctetString(request, IPP_TAG_OPERATION, "job-password", hash, (int)hashlen);
|