Searched refs:SHA1_HASH_SIZE (Results 1 – 12 of 12) sorted by relevance
/external/dropbear/ |
D | dss.c | 167 unsigned char msghash[SHA1_HASH_SIZE]; in buf_dss_verify() 184 if (stringlen != 2*SHA1_HASH_SIZE) { in buf_dss_verify() 196 bytes_to_mp(&val1, &string[SHA1_HASH_SIZE], SHA1_HASH_SIZE); in buf_dss_verify() 209 bytes_to_mp(&val1, msghash, SHA1_HASH_SIZE); in buf_dss_verify() 218 bytes_to_mp(&val1, &string[0], SHA1_HASH_SIZE); in buf_dss_verify() 298 unsigned char msghash[SHA1_HASH_SIZE]; in buf_put_dss_sign() 338 sha512_process(&hs, msghash, SHA1_HASH_SIZE); in buf_put_dss_sign() 354 bytes_to_mp(&dss_m, msghash, SHA1_HASH_SIZE); in buf_put_dss_sign() 385 buf_putint(buf, 2*SHA1_HASH_SIZE); in buf_put_dss_sign() 388 dropbear_assert(writelen <= SHA1_HASH_SIZE); in buf_put_dss_sign() [all …]
|
D | common-kex.c | 228 unsigned char k2[SHA1_HASH_SIZE]; /* used to extending */ in hashkeys() 232 sha1_process(&hs2, ses.session_id, SHA1_HASH_SIZE); in hashkeys() 234 if (SHA1_HASH_SIZE < outlen) { in hashkeys() 237 sha1_process(&hs2, out, SHA1_HASH_SIZE); in hashkeys() 239 memcpy(&out[SHA1_HASH_SIZE], k2, outlen - SHA1_HASH_SIZE); in hashkeys() 272 sha1_process(&hs, ses.hash, SHA1_HASH_SIZE); in gen_new_keys() 273 m_burn(ses.hash, SHA1_HASH_SIZE); in gen_new_keys() 295 hashkeys(C2S_IV, SHA1_HASH_SIZE, &hs, 'A'); in gen_new_keys() 296 hashkeys(S2C_IV, SHA1_HASH_SIZE, &hs, 'B'); in gen_new_keys() 575 ses.session_id = (unsigned char*)m_malloc(SHA1_HASH_SIZE); in kexdh_comb_key() [all …]
|
D | random.c | 37 static unsigned char hashpool[SHA1_HASH_SIZE]; 182 unsigned char hash[SHA1_HASH_SIZE]; in genrandom() 200 copylen = MIN(len, SHA1_HASH_SIZE); in genrandom()
|
D | options.h | 292 #define SHA1_HASH_SIZE 20 macro 299 #define MAX_MAC_LEN SHA1_HASH_SIZE
|
D | cli-authpubkey.c | 161 sigbuf = buf_new(4 + SHA1_HASH_SIZE + ses.writepayload->len); in send_msg_userauth_pubkey() 162 buf_putstring(sigbuf, ses.session_id, SHA1_HASH_SIZE); in send_msg_userauth_pubkey()
|
D | signkey.c | 316 unsigned char hash[SHA1_HASH_SIZE]; in sign_key_sha1_fingerprint() 328 buflen = 5 + 3*SHA1_HASH_SIZE; in sign_key_sha1_fingerprint() 333 for (i = 0; i < SHA1_HASH_SIZE; i++) { in sign_key_sha1_fingerprint()
|
D | rsa.c | 401 while(rsa_EM->pos != rsa_EM->size - RSA_ASN1_MAGIC_LEN - SHA1_HASH_SIZE) { in rsa_pad_em() 412 sha1_done(&hs, buf_getwriteptr(rsa_EM, SHA1_HASH_SIZE)); in rsa_pad_em() 413 buf_incrwritepos(rsa_EM, SHA1_HASH_SIZE); in rsa_pad_em()
|
D | dss.h | 33 #define DSS_SIGNATURE_SIZE 4+SSH_SIGNKEY_DSS_LEN+4+2*SHA1_HASH_SIZE
|
D | svr-authpubkey.c | 97 signbuf = buf_new(ses.payload->pos + 4 + SHA1_HASH_SIZE); in svr_auth_pubkey() 98 buf_putstring(signbuf, ses.session_id, SHA1_HASH_SIZE); in svr_auth_pubkey()
|
D | svr-kex.c | 99 ses.newkeys->algo_hostkey, ses.hash, SHA1_HASH_SIZE); in send_msg_kexdh_reply()
|
D | session.h | 136 unsigned char hash[SHA1_HASH_SIZE]; /* the hash*/
|
D | cli-kex.c | 102 if (buf_verify(ses.payload, hostkey, ses.hash, SHA1_HASH_SIZE) in recv_msg_kexdh_reply()
|