/dports/security/pam_ssh/pam_ssh-8.0/openssh/ |
H A D | ssh-rsa.c | 50 case SSH_DIGEST_SHA512: in rsa_hash_alg_ident() 68 return SSH_DIGEST_SHA512; in rsa_hash_id_from_ident() 89 return SSH_DIGEST_SHA512; in rsa_hash_id_from_keyname() 101 case SSH_DIGEST_SHA512: in rsa_hash_alg_nid() 392 case SSH_DIGEST_SHA512: in rsa_hash_alg_oid()
|
H A D | hash.c | 23 if ((r = ssh_digest_memory(SSH_DIGEST_SHA512, in, inlen, out, in crypto_hash_sha512()
|
H A D | mac.c | 63 { "hmac-sha2-512", SSH_DIGEST, SSH_DIGEST_SHA512, 0, 0, 0, 0 }, 75 { "hmac-sha2-512-etm@openssh.com", SSH_DIGEST, SSH_DIGEST_SHA512, 0, 0, 0, 1 },
|
H A D | digest.h | 29 #define SSH_DIGEST_SHA512 4 macro
|
H A D | digest-openssl.c | 62 { SSH_DIGEST_SHA512, "SHA512", 64, EVP_sha512 },
|
H A D | kex.c | 91 { KEX_DH16_SHA512, KEX_DH_GRP16_SHA512, 0, SSH_DIGEST_SHA512 }, 92 { KEX_DH18_SHA512, KEX_DH_GRP18_SHA512, 0, SSH_DIGEST_SHA512 }, 104 SSH_DIGEST_SHA512 }, 112 SSH_DIGEST_SHA512 },
|
H A D | auth2.c | 230 size_t len = ssh_digest_bytes(SSH_DIGEST_SHA512); 236 if (ssh_digest_memory(SSH_DIGEST_SHA512, b, strlen(b), hash, len) != 0)
|
/dports/security/openssh-portable/openssh-8.8p1/ |
H A D | ssh-rsa.c | 50 case SSH_DIGEST_SHA512: in rsa_hash_alg_ident() 68 return SSH_DIGEST_SHA512; in rsa_hash_id_from_ident() 89 return SSH_DIGEST_SHA512; in rsa_hash_id_from_keyname() 101 case SSH_DIGEST_SHA512: in rsa_hash_alg_nid() 392 case SSH_DIGEST_SHA512: in rsa_hash_alg_oid()
|
H A D | mac.c | 63 { "hmac-sha2-512", SSH_DIGEST, SSH_DIGEST_SHA512, 0, 0, 0, 0 }, 73 { "hmac-sha2-512-etm@openssh.com", SSH_DIGEST, SSH_DIGEST_SHA512, 0, 0, 0, 1 },
|
H A D | digest.h | 29 #define SSH_DIGEST_SHA512 4 macro
|
H A D | digest-openssl.c | 63 { SSH_DIGEST_SHA512, "SHA512", 64, EVP_sha512 },
|
H A D | digest-libc.c | 106 SSH_DIGEST_SHA512,
|
H A D | kex.c | 93 { KEX_DH16_SHA512, KEX_DH_GRP16_SHA512, 0, SSH_DIGEST_SHA512 }, 94 { KEX_DH18_SHA512, KEX_DH_GRP18_SHA512, 0, SSH_DIGEST_SHA512 }, 106 SSH_DIGEST_SHA512 }, 115 SSH_DIGEST_SHA512 },
|
H A D | auth2.c | 226 size_t len = ssh_digest_bytes(SSH_DIGEST_SHA512); in user_specific_delay() 232 if (ssh_digest_memory(SSH_DIGEST_SHA512, b, strlen(b), hash, len) != 0) in user_specific_delay()
|
/dports/security/gnome-ssh-askpass/openssh-6.6p1/ |
H A D | mac.c | 69 { "hmac-sha2-512", SSH_DIGEST, SSH_DIGEST_SHA512, 0, 0, 0, 0 }, 83 { "hmac-sha2-512-etm@openssh.com", SSH_DIGEST, SSH_DIGEST_SHA512, 0, 0, 0, 1 },
|
H A D | digest.h | 30 #define SSH_DIGEST_SHA512 5 macro
|
H A D | digest-openssl.c | 52 { SSH_DIGEST_SHA512, "SHA512", 64, EVP_sha512 },
|
H A D | digest-libc.c | 107 SSH_DIGEST_SHA512,
|
/dports/security/ncrack/ncrack-0.7/opensshlib/ |
H A D | mac.c | 63 { "hmac-sha2-512", SSH_DIGEST, SSH_DIGEST_SHA512, 0, 0, 0, 0 }, 75 { "hmac-sha2-512-etm@openssh.com", SSH_DIGEST, SSH_DIGEST_SHA512, 0, 0, 0, 1 },
|
H A D | digest.h | 29 #define SSH_DIGEST_SHA512 4 macro
|
H A D | digest-openssl.c | 62 { SSH_DIGEST_SHA512, "SHA512", 64, EVP_sha512 },
|
H A D | digest-libc.c | 102 SSH_DIGEST_SHA512,
|
/dports/security/libssh/libssh-0.9.6/src/ |
H A D | pki.c | 234 case SSH_DIGEST_SHA512: in ssh_key_signature_to_char() 247 case SSH_DIGEST_SHA512: in ssh_key_signature_to_char() 322 return SSH_DIGEST_SHA512; in ssh_key_hash_from_name() 328 return SSH_DIGEST_SHA512; in ssh_key_hash_from_name() 414 return SSH_DIGEST_SHA512; in ssh_key_type_to_hash() 433 return SSH_DIGEST_SHA512; in ssh_key_type_to_hash() 2205 hash_type == SSH_DIGEST_SHA512) in pki_key_check_hash_compatible() 2224 if (hash_type == SSH_DIGEST_SHA512) { in pki_key_check_hash_compatible()
|
/dports/security/libssh/libssh-0.9.6/tests/unittests/ |
H A D | torture_pki_ecdsa.c | 633 sign = pki_do_sign(key, INPUT, sizeof(INPUT), SSH_DIGEST_SHA512); in torture_pki_generate_key_ecdsa() 655 sign = pki_do_sign(key, INPUT, sizeof(INPUT), SSH_DIGEST_SHA512); in torture_pki_generate_key_ecdsa() 811 bad_sig = pki_sign_data(key, SSH_DIGEST_SHA512, INPUT, sizeof(INPUT)); in torture_pki_fail_sign_with_incompatible_hash() 815 sig->hash_type = SSH_DIGEST_SHA512; in torture_pki_fail_sign_with_incompatible_hash()
|
H A D | torture_pki.c | 273 hash <= SSH_DIGEST_SHA512; in torture_pki_verify_mismatch()
|