/dragonfly/contrib/libarchive/libarchive/ |
H A D | archive_hmac.c | 91 DWORD hash_len; in __hmac_sha1_init() local 101 status = BCryptGetProperty(hAlg, BCRYPT_HASH_LENGTH, (PUCHAR)&hash_len, in __hmac_sha1_init() 102 sizeof(hash_len), &result, 0); in __hmac_sha1_init() 107 hash = (PBYTE)HeapAlloc(GetProcessHeap(), 0, hash_len); in __hmac_sha1_init() 122 ctx->hash_len = hash_len; in __hmac_sha1_init() 138 BCryptFinishHash(ctx->hHash, ctx->hash, ctx->hash_len, 0); in __hmac_sha1_final() 139 if (ctx->hash_len == *out_len) in __hmac_sha1_final()
|
H A D | archive_hmac_private.h | 61 DWORD hash_len; member
|
/dragonfly/contrib/wpa_supplicant/src/eap_common/ |
H A D | ikev2_common.c | 118 size_t hash_len; in ikev2_prf_plus() local 128 hash_len = prf->hash_len; in ikev2_prf_plus() 131 len[0] = hash_len; in ikev2_prf_plus() 150 clen = hash_len; in ikev2_prf_plus() 411 os_memcpy(pos, hash, prf->hash_len); in ikev2_derive_auth_data() 416 ikev2_prf_hash(prf->id, hash, prf->hash_len, 1, in ikev2_derive_auth_data() 461 if (encrypted_len < iv_len + 1 + integ_alg->hash_len) { in ikev2_decrypt_payload() 470 integ = end - integ_alg->hash_len; in ikev2_decrypt_payload() 594 icv = wpabuf_put(msg, integ_alg->hash_len); in ikev2_build_encrypted() 602 wpabuf_len(msg) - integ_alg->hash_len, icv); in ikev2_build_encrypted() [all …]
|
H A D | ikev2_common.h | 255 size_t hash_len; member 261 size_t hash_len; member
|
H A D | eap_ikev2_common.c | 83 icv_len = integ->hash_len; in eap_ikev2_validate_icv()
|
/dragonfly/contrib/gcc-8.0/libiberty/ |
H A D | rust-demangle.c | 93 static const size_t hash_len = 16; variable 130 if (len <= hash_prefix_len + hash_len) in rust_is_mangled() 134 len_without_hash = len - (hash_prefix_len + hash_len); in rust_is_mangled() 158 for (end = str + hash_len; str < end; str++) in is_prefixed_hash() 254 end = sym + strlen (sym) - (hash_prefix_len + hash_len); in rust_demangle_sym()
|
/dragonfly/contrib/wpa_supplicant/src/common/ |
H A D | dpp.c | 1530 if (dpp_hmac(hash_len, salt, hash_len, Mx, Mx_len, prk) < 0) in dpp_derive_k1() 1536 res = dpp_hkdf_expand(hash_len, prk, hash_len, info, k1, hash_len); in dpp_derive_k1() 1542 k1, hash_len); in dpp_derive_k1() 1558 res = dpp_hmac(hash_len, salt, hash_len, Nx, Nx_len, prk); in dpp_derive_k2() 1565 res = dpp_hkdf_expand(hash_len, prk, hash_len, info, k2, hash_len); in dpp_derive_k2() 1571 k2, hash_len); in dpp_derive_k2() 1624 res = dpp_hkdf_expand(hash_len, prk, hash_len, info_ke, ke, hash_len); in dpp_derive_ke() 1630 ke, hash_len); in dpp_derive_ke() 6387 if (dpp_hmac(hash_len, salt, hash_len, Nx, Nx_len, prk) < 0) in dpp_derive_pmk() 6393 res = dpp_hkdf_expand(hash_len, prk, hash_len, info, pmk, hash_len); in dpp_derive_pmk() [all …]
|
/dragonfly/contrib/wpa_supplicant/src/tls/ |
H A D | tlsv1_client_ocsp.c | 124 unsigned int hash_len; in tls_process_ocsp_single_response() local 181 hash_len = ocsp_hash_data(&alg.oid, issuer->subject_dn, in tls_process_ocsp_single_response() 183 if (hash_len == 0 || name_hash_len != hash_len || in tls_process_ocsp_single_response() 184 os_memcmp(name_hash, hash, hash_len) != 0) { in tls_process_ocsp_single_response() 187 hash, hash_len); in tls_process_ocsp_single_response() 205 hash_len = ocsp_hash_data(&alg.oid, issuer->public_key, in tls_process_ocsp_single_response() 207 if (hash_len == 0 || key_hash_len != hash_len || in tls_process_ocsp_single_response() 208 os_memcmp(key_hash, hash, hash_len) != 0) { in tls_process_ocsp_single_response() 211 hash, hash_len); in tls_process_ocsp_single_response()
|
H A D | x509v3.c | 1779 size_t hash_len; in x509_check_signature() local 1960 hash_len = 16; in x509_check_signature() 1962 hash, hash_len); in x509_check_signature() 1966 hash_len = 20; in x509_check_signature() 1968 hash, hash_len); in x509_check_signature() 1972 hash_len = 32; in x509_check_signature() 1974 hash, hash_len); in x509_check_signature() 1978 hash_len = 48; in x509_check_signature() 1980 hash, hash_len); in x509_check_signature() 1984 hash_len = 64; in x509_check_signature() [all …]
|
H A D | pkcs1.c | 199 const u8 *hash, size_t hash_len) in pkcs1_v15_sig_ver() argument 300 if (hdr.length != hash_len || in pkcs1_v15_sig_ver()
|
H A D | pkcs1.h | 27 const u8 *hash, size_t hash_len);
|
/dragonfly/contrib/wpa_supplicant/src/eap_server/ |
H A D | eap_server.c | 703 size_t hash_len; in erp_send_finish_reauth() local 709 hash_len = 32; in erp_send_finish_reauth() 712 hash_len = 16; in erp_send_finish_reauth() 718 hash_len = 0; in erp_send_finish_reauth() 721 if (hash_len) in erp_send_finish_reauth() 800 size_t hash_len; in SM_STATE() local 904 hash_len = 32; in SM_STATE() 912 hash_len = 16; in SM_STATE() 915 hash_len = 0; in SM_STATE() 919 if (hash_len) { in SM_STATE() [all …]
|
H A D | ikev2.c | 111 skeyseed, prf->hash_len); in ikev2_derive_keys() 634 if (auth_len != prf->hash_len || in ikev2_process_auth_secret() 640 auth_data, prf->hash_len); in ikev2_process_auth_secret() 1072 wpabuf_put(msg, prf->hash_len)) < 0) { in ikev2_build_auth()
|
H A D | eap_server_aka.c | 307 size_t hash_len; in eap_aka_verify_checkcode() local 322 hash_len = data->eap_method == EAP_TYPE_AKA_PRIME ? in eap_aka_verify_checkcode() 325 if (checkcode_len != hash_len) { in eap_aka_verify_checkcode() 340 if (os_memcmp_const(hash, checkcode, hash_len) != 0) { in eap_aka_verify_checkcode()
|
/dragonfly/crypto/libressl/crypto/ct/ |
H A D | ct_sct_ctx.c | 251 ct_public_key_hash(X509_PUBKEY *pkey, unsigned char **hash, size_t *hash_len) in ct_public_key_hash() argument 259 if (*hash != NULL && *hash_len >= SHA256_DIGEST_LENGTH) { in ct_public_key_hash() 278 *hash_len = SHA256_DIGEST_LENGTH; in ct_public_key_hash()
|
/dragonfly/contrib/wpa_supplicant/src/wps/ |
H A D | wps_attr_build.c | 418 size_t hash_len; in wps_build_oob_dev_pw() local 425 hash_len = wpabuf_len(pubkey); in wps_build_oob_dev_pw() 426 if (sha256_vector(1, addr, &hash_len, pubkey_hash) < 0) in wps_build_oob_dev_pw()
|
/dragonfly/crypto/libressl/ssl/ |
H A D | tls13_lib.c | 479 size_t hash_len; in tls13_synthetic_handshake_message() local 491 if (!tls1_transcript_hash_value(s, buf, sizeof(buf), &hash_len)) in tls13_synthetic_handshake_message() 498 if (!CBB_add_bytes(&cbb, buf, hash_len)) in tls13_synthetic_handshake_message()
|
H A D | tls13_server.c | 378 size_t hash_len; in tls13_server_engage_record_protection() local 401 if (!tls1_transcript_hash_value(s, buf, sizeof(buf), &hash_len)) in tls13_server_engage_record_protection() 404 context.len = hash_len; in tls13_server_engage_record_protection()
|
H A D | tls13_client.c | 340 size_t hash_len; in tls13_client_engage_record_protection() local 366 if (!tls1_transcript_hash_value(s, buf, sizeof(buf), &hash_len)) in tls13_client_engage_record_protection() 369 context.len = hash_len; in tls13_client_engage_record_protection()
|
/dragonfly/contrib/wpa_supplicant/src/utils/ |
H A D | http-utils.h | 25 size_t hash_len; member
|
/dragonfly/contrib/wpa_supplicant/src/eap_peer/ |
H A D | eap.c | 1795 size_t hash_len; in eap_peer_finish() local 1866 hash_len = 16; in eap_peer_finish() 1867 if (max_len < 1 + (int) hash_len) { in eap_peer_finish() 1882 end - ((const u8 *) hdr) - hash_len, hash) < 0) in eap_peer_finish() 1884 if (os_memcmp(end - hash_len, hash, hash_len) != 0) { in eap_peer_finish() 1890 end -= 1 + hash_len; in eap_peer_finish() 2091 size_t len = data->peer_cert.hash_len * 2 + 1; in eap_peer_sm_tls_event() 2096 data->peer_cert.hash_len); in eap_peer_sm_tls_event()
|
H A D | ikev2.c | 107 skeyseed, prf->hash_len); in ikev2_derive_keys() 566 if (auth_len != prf->hash_len || in ikev2_process_auth_secret() 572 auth_data, prf->hash_len); in ikev2_process_auth_secret() 1006 wpabuf_put(msg, prf->hash_len)) < 0) { in ikev2_build_auth()
|
H A D | eap_aka.c | 504 size_t hash_len; in eap_aka_verify_checkcode() local 519 hash_len = data->eap_method == EAP_TYPE_AKA_PRIME ? in eap_aka_verify_checkcode() 522 if (checkcode_len != hash_len) { in eap_aka_verify_checkcode() 539 if (os_memcmp_const(hash, checkcode, hash_len) != 0) { in eap_aka_verify_checkcode()
|
/dragonfly/contrib/wpa_supplicant/src/rsn_supp/ |
H A D | wpa.c | 4569 size_t hash_len, prime_len; in owe_process_assoc_resp() local 4643 hash_len = SHA256_MAC_LEN; in owe_process_assoc_resp() 4646 hash_len = SHA384_MAC_LEN; in owe_process_assoc_resp() 4649 hash_len = SHA512_MAC_LEN; in owe_process_assoc_resp() 4652 hash_len = 0; in owe_process_assoc_resp() 4686 wpa_hexdump_key(MSG_DEBUG, "OWE: prk", prk, hash_len); in owe_process_assoc_resp() 4691 res = hmac_sha256_kdf(prk, hash_len, NULL, (const u8 *) info, in owe_process_assoc_resp() 4692 os_strlen(info), sm->pmk, hash_len); in owe_process_assoc_resp() 4695 os_strlen(info), sm->pmk, hash_len); in owe_process_assoc_resp() 4698 os_strlen(info), sm->pmk, hash_len); in owe_process_assoc_resp() [all …]
|
/dragonfly/contrib/wpa_supplicant/src/crypto/ |
H A D | tls.h | 56 size_t hash_len; member
|