/external/openssh/ |
D | kexgen.c | 58 u_char *hash, size_t *hashlen) in kex_gen_hash() argument 63 if (*hashlen < ssh_digest_bytes(hash_alg)) in kex_gen_hash() 86 if (ssh_digest_buffer(hash_alg, b, hash, *hashlen) != 0) { in kex_gen_hash() 91 *hashlen = ssh_digest_bytes(hash_alg); in kex_gen_hash() 93 dump_digest("hash", hash, *hashlen); in kex_gen_hash() 148 size_t slen, hashlen; in input_kex_gen_reply() local 200 hashlen = sizeof(hash); in input_kex_gen_reply() 211 hash, &hashlen)) != 0) in input_kex_gen_reply() 214 if ((r = sshkey_verify(server_host_key, signature, slen, hash, hashlen, in input_kex_gen_reply() 218 if ((r = kex_derive_keys(ssh, hash, hashlen, shared_secret)) == 0) in input_kex_gen_reply() [all …]
|
D | kexgex.c | 60 u_char *hash, size_t *hashlen) in kexgex_hash() argument 65 if (*hashlen < ssh_digest_bytes(SSH_DIGEST_SHA1)) in kexgex_hash() 93 if (ssh_digest_buffer(hash_alg, b, hash, *hashlen) != 0) { in kexgex_hash() 98 *hashlen = ssh_digest_bytes(hash_alg); in kexgex_hash() 100 dump_digest("hash", hash, *hashlen); in kexgex_hash()
|
D | kexgexs.c | 136 size_t slen, hashlen; in input_kex_dh_gex_init() local 163 hashlen = sizeof(hash); in input_kex_dh_gex_init() 176 hash, &hashlen)) != 0) in input_kex_dh_gex_init() 181 &signature, &slen, hash, hashlen, kex->hostkey_alg)) < 0) in input_kex_dh_gex_init() 192 if ((r = kex_derive_keys(ssh, hash, hashlen, shared_secret)) == 0) in input_kex_dh_gex_init()
|
D | kexgexc.c | 153 size_t slen, hashlen; in input_kex_dh_gex_reply() local 185 hashlen = sizeof(hash); in input_kex_dh_gex_reply() 198 hash, &hashlen)) != 0) in input_kex_dh_gex_reply() 202 hashlen, kex->hostkey_alg, ssh->compat, NULL)) != 0) in input_kex_dh_gex_reply() 205 if ((r = kex_derive_keys(ssh, hash, hashlen, shared_secret)) == 0) in input_kex_dh_gex_reply()
|
D | ssh-rsa.c | 405 openssh_RSA_verify(int hash_alg, u_char *hash, size_t hashlen, in openssh_RSA_verify() argument 417 if (hashlen != hlen) { in openssh_RSA_verify()
|
D | kex.c | 994 derive_key(struct ssh *ssh, int id, u_int need, u_char *hash, u_int hashlen, in derive_key() argument 1015 ssh_digest_update(hashctx, hash, hashlen) != 0 || in derive_key() 1035 ssh_digest_update(hashctx, hash, hashlen) != 0 || in derive_key() 1060 kex_derive_keys(struct ssh *ssh, u_char *hash, u_int hashlen, in kex_derive_keys() argument 1070 kex->session_id_len = hashlen; in kex_derive_keys() 1077 if ((r = derive_key(ssh, 'A'+i, kex->we_need, hash, hashlen, in kex_derive_keys()
|
/external/wpa_supplicant_8/src/eap_common/ |
D | eap_gpsk_common.c | 43 size_t i, n, hashlen, left, clen; in eap_gpsk_gkdf_cmac() local 48 hashlen = sizeof(hash); in eap_gpsk_gkdf_cmac() 57 n = (len + hashlen - 1) / hashlen; in eap_gpsk_gkdf_cmac() 62 clen = left > hashlen ? hashlen : left; in eap_gpsk_gkdf_cmac() 78 size_t i, n, hashlen, left, clen; in eap_gpsk_gkdf_sha256() local 83 hashlen = SHA256_MAC_LEN; in eap_gpsk_gkdf_sha256() 92 n = (len + hashlen - 1) / hashlen; in eap_gpsk_gkdf_sha256() 97 clen = left > hashlen ? hashlen : left; in eap_gpsk_gkdf_sha256()
|
/external/ipsec-tools/src/racoon/ |
D | algorithm.h | 136 int (*hashlen) __P((void)); member 147 int (*hashlen) __P((void)); member
|
D | algorithm.c | 347 if (f == NULL || f->hashlen == NULL) 350 return (f->hashlen)(); 374 if (f == NULL || f->hashlen == NULL) 660 if (f == NULL || f->hashlen == NULL) 663 return (f->hashlen)();
|
/external/vboot_reference/scripts/ |
D | genpadding.sh | 91 eval hashlen=${hashalgo}_T_Len 92 let nums=rsalen-hashlen-3
|
/external/python/cryptography/docs/hazmat/primitives/ |
D | key-derivation-functions.rst | 363 Maximum is ``hashlen * (2^32 -1)``. 449 is ``hashlen * (2^32 -1)``. 548 Maximum is ``hashlen * (2^32 -1)``.
|
/external/libcups/cups/ |
D | ppd-cache.c | 111 ssize_t hashlen; /* Length of hash */ in _cupsConvertOptions() local 113 if ((hashlen = cupsHashData(keyword, password, strlen(password), hash, sizeof(hash))) > 0) in _cupsConvertOptions() 114 attr = ippAddOctetString(request, IPP_TAG_OPERATION, "job-password", hash, (int)hashlen); in _cupsConvertOptions()
|