/external/wpa_supplicant_6/wpa_supplicant/src/eap_common/ |
D | eap_gpsk_common.c | 52 size_t i, n, hashlen, left, clen; in eap_gpsk_gkdf_cmac() local 57 hashlen = sizeof(hash); in eap_gpsk_gkdf_cmac() 66 n = (len + hashlen - 1) / hashlen; in eap_gpsk_gkdf_cmac() 71 clen = left > hashlen ? hashlen : left; in eap_gpsk_gkdf_cmac() 87 size_t i, n, hashlen, left, clen; in eap_gpsk_gkdf_sha256() local 92 hashlen = SHA256_MAC_LEN; in eap_gpsk_gkdf_sha256() 101 n = (len + hashlen - 1) / hashlen; in eap_gpsk_gkdf_sha256() 105 clen = left > hashlen ? hashlen : left; in eap_gpsk_gkdf_sha256()
|
/external/wpa_supplicant_8/src/eap_common/ |
D | eap_gpsk_common.c | 43 size_t i, n, hashlen, left, clen; in eap_gpsk_gkdf_cmac() local 48 hashlen = sizeof(hash); in eap_gpsk_gkdf_cmac() 57 n = (len + hashlen - 1) / hashlen; in eap_gpsk_gkdf_cmac() 62 clen = left > hashlen ? hashlen : left; in eap_gpsk_gkdf_cmac() 78 size_t i, n, hashlen, left, clen; in eap_gpsk_gkdf_sha256() local 83 hashlen = SHA256_MAC_LEN; in eap_gpsk_gkdf_sha256() 92 n = (len + hashlen - 1) / hashlen; in eap_gpsk_gkdf_sha256() 96 clen = left > hashlen ? hashlen : left; in eap_gpsk_gkdf_sha256()
|
/external/openssh/ |
D | kexdhc.c | 55 u_int klen, slen, sbloblen, hashlen; in kexdh_client() local 140 &hash, &hashlen in kexdh_client() 146 if (key_verify(server_host_key, signature, slen, hash, hashlen) != 1) in kexdh_client() 153 kex->session_id_len = hashlen; in kexdh_client() 158 kex_derive_keys(kex, hash, hashlen, shared_secret); in kexdh_client()
|
D | kexecdhc.c | 59 u_int klen, slen, sbloblen, hashlen; in kexecdh_client() local 140 &hash, &hashlen in kexecdh_client() 146 if (key_verify(server_host_key, signature, slen, hash, hashlen) != 1) in kexecdh_client() 153 kex->session_id_len = hashlen; in kexecdh_client() 158 kex_derive_keys(kex, hash, hashlen, shared_secret); in kexecdh_client()
|
D | kexdhs.c | 57 u_int sbloblen, klen, hashlen, slen; in kexdh_server() local 135 &hash, &hashlen in kexdh_server() 141 kex->session_id_len = hashlen; in kexdh_server() 148 hashlen)) < 0) in kexdh_server() 165 kex_derive_keys(kex, hash, hashlen, shared_secret); in kexdh_server()
|
D | kexecdhs.c | 61 u_int klen, slen, sbloblen, hashlen; in kexecdh_server() local 133 &hash, &hashlen in kexecdh_server() 139 kex->session_id_len = hashlen; in kexecdh_server() 146 hash, hashlen)) < 0) in kexecdh_server() 163 kex_derive_keys(kex, hash, hashlen, shared_secret); in kexecdh_server()
|
D | kexgexs.c | 60 u_int sbloblen, klen, slen, hashlen; in kexgex_server() local 178 &hash, &hashlen in kexgex_server() 184 kex->session_id_len = hashlen; in kexgex_server() 191 hashlen)) < 0) in kexgex_server() 209 kex_derive_keys(kex, hash, hashlen, shared_secret); in kexgex_server()
|
D | kexgexc.c | 56 u_int klen, slen, sbloblen, hashlen; in kexgex_client() local 184 &hash, &hashlen in kexgex_client() 192 if (key_verify(server_host_key, signature, slen, hash, hashlen) != 1) in kexgex_client() 199 kex->session_id_len = hashlen; in kexgex_client() 203 kex_derive_keys(kex, hash, hashlen, shared_secret); in kexgex_client()
|
D | kexgex.c | 52 u_char **hash, u_int *hashlen) in kexgex_hash() argument 94 *hashlen = EVP_MD_size(evp_md); in kexgex_hash() 96 dump_digest("hash", digest, *hashlen); in kexgex_hash()
|
D | kexdh.c | 50 u_char **hash, u_int *hashlen) in kex_dh_hash() argument 87 *hashlen = EVP_MD_size(evp_md); in kex_dh_hash()
|
D | kexecdh.c | 78 u_char **hash, u_int *hashlen) in kex_ecdh_hash() argument 114 *hashlen = EVP_MD_size(evp_md); in kex_ecdh_hash()
|
D | kex.c | 478 derive_key(Kex *kex, int id, u_int need, u_char *hash, u_int hashlen, in derive_key() argument 499 EVP_DigestUpdate(&md, hash, hashlen); in derive_key() 513 EVP_DigestUpdate(&md, hash, hashlen); in derive_key() 529 kex_derive_keys(Kex *kex, u_char *hash, u_int hashlen, BIGNUM *shared_secret) in kex_derive_keys() argument 535 keys[i] = derive_key(kex, 'A'+i, kex->we_need, hash, hashlen, in kex_derive_keys()
|
D | ssh-rsa.c | 210 openssh_RSA_verify(int type, u_char *hash, u_int hashlen, in openssh_RSA_verify() argument 233 if (hashlen != hlen) { in openssh_RSA_verify()
|
/external/dropbear/libtomcrypt/src/pk/dsa/ |
D | dsa_verify_hash.c | 32 const unsigned char *hash, unsigned long hashlen, in dsa_verify_hash_raw() argument 61 …if ((err = mp_read_unsigned_bin(u1, (unsigned char *)hash, hashlen)) != CRYPT_OK) { goto erro… in dsa_verify_hash_raw() 95 const unsigned char *hash, unsigned long hashlen, in dsa_verify_hash() argument 114 err = dsa_verify_hash_raw(r, s, hash, hashlen, stat, key); in dsa_verify_hash()
|
/external/dropbear/libtomcrypt/src/pk/rsa/ |
D | rsa_verify_hash.c | 34 const unsigned char *hash, unsigned long hashlen, in rsa_verify_hash_ex() argument 95 err = pkcs_1_pss_decode(hash, hashlen, tmpbuf, x, saltlen, hash_idx, modulus_bitlen, stat); in rsa_verify_hash_ex() 144 (siginfo[1].size == hashlen) && in rsa_verify_hash_ex() 145 (XMEMCMP(siginfo[1].data, hash, hashlen) == 0)) { in rsa_verify_hash_ex()
|
/external/ipsec-tools/src/racoon/ |
D | algorithm.h | 136 int (*hashlen) __P((void)); member 147 int (*hashlen) __P((void)); member
|
D | algorithm.c | 347 if (f == NULL || f->hashlen == NULL) 350 return (f->hashlen)(); 374 if (f == NULL || f->hashlen == NULL) 660 if (f == NULL || f->hashlen == NULL) 663 return (f->hashlen)();
|
/external/dropbear/libtomcrypt/src/pk/ecc/ |
D | ecc_verify_hash.c | 47 const unsigned char *hash, unsigned long hashlen, in ecc_verify_hash() argument 103 …if ((err = mp_read_unsigned_bin(e, (unsigned char *)hash, (int)hashlen)) != CRYPT_OK) … in ecc_verify_hash()
|
/external/dropbear/libtomcrypt/src/headers/ |
D | tomcrypt_pk.h | 80 const unsigned char *hash, unsigned long hashlen, 245 const unsigned char *hash, unsigned long hashlen, 337 const unsigned char *hash, unsigned long hashlen, 341 const unsigned char *hash, unsigned long hashlen,
|
/external/dropbear/libtomcrypt/ |
D | crypt.tex | 3472 unsigned long hashlen, 3930 unsigned long hashlen, 3936 pointed to by the array \textit{hash} of length \textit{hashlen}. It will store a non--zero value …
|