/external/openssh/ |
D | kexdh.c | 55 u_char *hash, size_t *hashlen) in kex_dh_hash() argument 60 if (*hashlen < ssh_digest_bytes(hash_alg)) in kex_dh_hash() 83 if (ssh_digest_buffer(hash_alg, b, hash, *hashlen) != 0) { in kex_dh_hash() 88 *hashlen = ssh_digest_bytes(hash_alg); in kex_dh_hash() 90 dump_digest("hash", hash, *hashlen); in kex_dh_hash()
|
D | kexecdh.c | 61 u_char *hash, size_t *hashlen) in kex_ecdh_hash() argument 66 if (*hashlen < ssh_digest_bytes(hash_alg)) in kex_ecdh_hash() 89 if (ssh_digest_buffer(hash_alg, b, hash, *hashlen) != 0) { in kex_ecdh_hash() 94 *hashlen = ssh_digest_bytes(hash_alg); in kex_ecdh_hash() 96 dump_digest("hash", hash, *hashlen); in kex_ecdh_hash()
|
D | kexgex.c | 58 u_char *hash, size_t *hashlen) in kexgex_hash() argument 63 if (*hashlen < ssh_digest_bytes(SSH_DIGEST_SHA1)) in kexgex_hash() 91 if (ssh_digest_buffer(hash_alg, b, hash, *hashlen) != 0) { in kexgex_hash() 96 *hashlen = ssh_digest_bytes(hash_alg); in kexgex_hash() 98 dump_digest("hash", hash, *hashlen); in kexgex_hash()
|
D | kexc25519s.c | 66 size_t slen, pklen, sbloblen, hashlen; in input_kex_c25519_init() local 111 hashlen = sizeof(hash); in input_kex_c25519_init() 122 hash, &hashlen)) < 0) in input_kex_c25519_init() 127 kex->session_id_len = hashlen; in input_kex_c25519_init() 138 &slen, hash, hashlen, kex->hostkey_alg, ssh->compat)) < 0) in input_kex_c25519_init() 149 if ((r = kex_derive_keys(ssh, hash, hashlen, shared_secret)) == 0) in input_kex_c25519_init()
|
D | kexc25519c.c | 81 size_t slen, pklen, sbloblen, hashlen; in input_kex_c25519_reply() local 130 hashlen = sizeof(hash); in input_kex_c25519_reply() 141 hash, &hashlen)) < 0) in input_kex_c25519_reply() 144 if ((r = sshkey_verify(server_host_key, signature, slen, hash, hashlen, in input_kex_c25519_reply() 150 kex->session_id_len = hashlen; in input_kex_c25519_reply() 159 if ((r = kex_derive_keys(ssh, hash, hashlen, shared_secret)) == 0) in input_kex_c25519_reply()
|
D | kexc25519.c | 95 u_char *hash, size_t *hashlen) in kex_c25519_hash() argument 100 if (*hashlen < ssh_digest_bytes(hash_alg)) in kex_c25519_hash() 123 if (ssh_digest_buffer(hash_alg, b, hash, *hashlen) != 0) { in kex_c25519_hash() 128 *hashlen = ssh_digest_bytes(hash_alg); in kex_c25519_hash() 130 dump_digest("hash", hash, *hashlen); in kex_c25519_hash()
|
D | kexecdhs.c | 75 size_t klen = 0, hashlen; in input_kex_ecdh_init() local 145 hashlen = sizeof(hash); in input_kex_ecdh_init() 157 hash, &hashlen)) != 0) in input_kex_ecdh_init() 162 kex->session_id_len = hashlen; in input_kex_ecdh_init() 173 &slen, hash, hashlen, kex->hostkey_alg, ssh->compat)) < 0) in input_kex_ecdh_init() 187 if ((r = kex_derive_keys_bn(ssh, hash, hashlen, shared_secret)) == 0) in input_kex_ecdh_init()
|
D | kexecdhc.c | 111 size_t klen = 0, hashlen; in input_kex_ecdh_reply() local 176 hashlen = sizeof(hash); in input_kex_ecdh_reply() 188 hash, &hashlen)) != 0) in input_kex_ecdh_reply() 192 hashlen, ssh->compat)) != 0) in input_kex_ecdh_reply() 197 kex->session_id_len = hashlen; in input_kex_ecdh_reply() 206 if ((r = kex_derive_keys_bn(ssh, hash, hashlen, shared_secret)) == 0) in input_kex_ecdh_reply()
|
D | kexdhs.c | 103 size_t klen = 0, hashlen; in input_kex_dh_init() local 166 hashlen = sizeof(hash); in input_kex_dh_init() 177 hash, &hashlen)) != 0) in input_kex_dh_init() 182 kex->session_id_len = hashlen; in input_kex_dh_init() 193 &slen, hash, hashlen, kex->hostkey_alg, ssh->compat)) < 0) in input_kex_dh_init() 206 if ((r = kex_derive_keys_bn(ssh, hash, hashlen, shared_secret)) == 0) in input_kex_dh_init()
|
D | kexdhc.c | 111 size_t klen = 0, slen, sbloblen, hashlen; in input_kex_dh() local 172 hashlen = sizeof(hash); in input_kex_dh() 183 hash, &hashlen)) != 0) in input_kex_dh() 186 if ((r = sshkey_verify(server_host_key, signature, slen, hash, hashlen, in input_kex_dh() 192 kex->session_id_len = hashlen; in input_kex_dh() 201 if ((r = kex_derive_keys_bn(ssh, hash, hashlen, shared_secret)) == 0) in input_kex_dh()
|
D | kexgexs.c | 132 size_t klen = 0, hashlen; in input_kex_dh_gex_init() local 195 hashlen = sizeof(hash); in input_kex_dh_gex_init() 208 hash, &hashlen)) != 0) in input_kex_dh_gex_init() 213 kex->session_id_len = hashlen; in input_kex_dh_gex_init() 224 &slen, hash, hashlen, kex->hostkey_alg, ssh->compat)) < 0) in input_kex_dh_gex_init() 237 if ((r = kex_derive_keys_bn(ssh, hash, hashlen, shared_secret)) == 0) in input_kex_dh_gex_init()
|
D | kexgexc.c | 154 size_t klen = 0, slen, sbloblen, hashlen; in input_kex_dh_gex_reply() local 222 hashlen = sizeof(hash); in input_kex_dh_gex_reply() 235 hash, &hashlen)) != 0) in input_kex_dh_gex_reply() 239 hashlen, ssh->compat)) != 0) in input_kex_dh_gex_reply() 244 kex->session_id_len = hashlen; in input_kex_dh_gex_reply() 253 if ((r = kex_derive_keys_bn(ssh, hash, hashlen, shared_secret)) == 0) in input_kex_dh_gex_reply()
|
D | kex.c | 884 derive_key(struct ssh *ssh, int id, u_int need, u_char *hash, u_int hashlen, in derive_key() argument 905 ssh_digest_update(hashctx, hash, hashlen) != 0 || in derive_key() 924 ssh_digest_update(hashctx, hash, hashlen) != 0 || in derive_key() 948 kex_derive_keys(struct ssh *ssh, u_char *hash, u_int hashlen, in kex_derive_keys() argument 957 if ((r = derive_key(ssh, 'A'+i, kex->we_need, hash, hashlen, in kex_derive_keys() 976 kex_derive_keys_bn(struct ssh *ssh, u_char *hash, u_int hashlen, in kex_derive_keys_bn() argument 985 r = kex_derive_keys(ssh, hash, hashlen, shared_secret); in kex_derive_keys_bn()
|
D | ssh-rsa.c | 307 openssh_RSA_verify(int hash_alg, u_char *hash, size_t hashlen, in openssh_RSA_verify() argument 319 if (hashlen != hlen) { in openssh_RSA_verify()
|
/external/wpa_supplicant_8/src/eap_common/ |
D | eap_gpsk_common.c | 43 size_t i, n, hashlen, left, clen; in eap_gpsk_gkdf_cmac() local 48 hashlen = sizeof(hash); in eap_gpsk_gkdf_cmac() 57 n = (len + hashlen - 1) / hashlen; in eap_gpsk_gkdf_cmac() 62 clen = left > hashlen ? hashlen : left; in eap_gpsk_gkdf_cmac() 78 size_t i, n, hashlen, left, clen; in eap_gpsk_gkdf_sha256() local 83 hashlen = SHA256_MAC_LEN; in eap_gpsk_gkdf_sha256() 92 n = (len + hashlen - 1) / hashlen; in eap_gpsk_gkdf_sha256() 97 clen = left > hashlen ? hashlen : left; in eap_gpsk_gkdf_sha256()
|
/external/ipsec-tools/src/racoon/ |
D | algorithm.h | 136 int (*hashlen) __P((void)); member 147 int (*hashlen) __P((void)); member
|
D | algorithm.c | 347 if (f == NULL || f->hashlen == NULL) 350 return (f->hashlen)(); 374 if (f == NULL || f->hashlen == NULL) 660 if (f == NULL || f->hashlen == NULL) 663 return (f->hashlen)();
|
/external/vboot_reference/scripts/ |
D | genpadding.sh | 91 eval hashlen=${hashalgo}_T_Len 92 let nums=rsalen-hashlen-3
|
/external/libcups/cups/ |
D | ppd-cache.c | 111 ssize_t hashlen; /* Length of hash */ in _cupsConvertOptions() local 113 if ((hashlen = cupsHashData(keyword, password, strlen(password), hash, sizeof(hash))) > 0) in _cupsConvertOptions() 114 attr = ippAddOctetString(request, IPP_TAG_OPERATION, "job-password", hash, (int)hashlen); in _cupsConvertOptions()
|