/dragonfly/crypto/openssh/ |
H A D | ssh-rsa.c | 43 rsa_hash_alg_ident(int hash_alg) in rsa_hash_alg_ident() argument 45 switch (hash_alg) { in rsa_hash_alg_ident() 171 int nid, hash_alg, ret = SSH_ERR_INTERNAL_ERROR; in ssh_rsa_sign() local 180 hash_alg = SSH_DIGEST_SHA1; in ssh_rsa_sign() 182 hash_alg = rsa_hash_id_from_keyname(alg_ident); in ssh_rsa_sign() 194 nid = rsa_hash_alg_nid(hash_alg); in ssh_rsa_sign() 195 if ((dlen = ssh_digest_bytes(hash_alg)) == 0) in ssh_rsa_sign() 283 if (hash_alg != want_alg) { in ssh_rsa_verify() 313 if ((dlen = ssh_digest_bytes(hash_alg)) == 0) { in ssh_rsa_verify() 383 switch (hash_alg) { in rsa_hash_alg_oid() [all …]
|
H A D | ssh-ecdsa.c | 55 int hash_alg; in ssh_ecdsa_sign() local 70 if ((hash_alg = sshkey_ec_nid_to_hash_alg(key->ecdsa_nid)) == -1 || in ssh_ecdsa_sign() 71 (dlen = ssh_digest_bytes(hash_alg)) == 0) in ssh_ecdsa_sign() 73 if ((ret = ssh_digest_memory(hash_alg, data, datalen, in ssh_ecdsa_sign() 120 int hash_alg; in ssh_ecdsa_verify() local 132 if ((hash_alg = sshkey_ec_nid_to_hash_alg(key->ecdsa_nid)) == -1 || in ssh_ecdsa_verify() 133 (dlen = ssh_digest_bytes(hash_alg)) == 0) in ssh_ecdsa_verify() 173 if ((ret = ssh_digest_memory(hash_alg, data, datalen, in ssh_ecdsa_verify()
|
H A D | kexgen.c | 49 int hash_alg, in kex_gen_hash() argument 63 if (*hashlen < ssh_digest_bytes(hash_alg)) in kex_gen_hash() 86 if (ssh_digest_buffer(hash_alg, b, hash, *hashlen) != 0) { in kex_gen_hash() 91 *hashlen = ssh_digest_bytes(hash_alg); in kex_gen_hash() 205 kex->hash_alg, in input_kex_gen_reply() 329 kex->hash_alg, in input_kex_gen_init()
|
H A D | kexgex.c | 48 int hash_alg, in kexgex_hash() argument 93 if (ssh_digest_buffer(hash_alg, b, hash, *hashlen) != 0) { in kexgex_hash() 98 *hashlen = ssh_digest_bytes(hash_alg); in kexgex_hash()
|
H A D | kexsntrup761x25519.c | 129 if ((r = ssh_digest_buffer(kex->hash_alg, buf, hash, sizeof(hash))) != 0) in kex_kem_sntrup761x25519_enc() 142 ssh_digest_bytes(kex->hash_alg))) != 0) in kex_kem_sntrup761x25519_enc() 197 if ((r = ssh_digest_buffer(kex->hash_alg, buf, hash, sizeof(hash))) != 0) in kex_kem_sntrup761x25519_dec() 206 ssh_digest_bytes(kex->hash_alg))) != 0) in kex_kem_sntrup761x25519_dec()
|
H A D | hostfile.h | 57 int store_hash, int quiet, int hash_alg);
|
H A D | kex.c | 86 int hash_alg; member 855 k->hash_alg = kexalg->hash_alg; in choose_kex() 1049 if ((mdsz = ssh_digest_bytes(kex->hash_alg)) == 0) in derive_key() 1057 if ((hashctx = ssh_digest_start(kex->hash_alg)) == NULL || in derive_key() 1076 if ((hashctx = ssh_digest_start(kex->hash_alg)) == NULL || in derive_key()
|
H A D | kex.h | 160 int hash_alg; member
|
H A D | kexgexs.c | 170 kex->hash_alg, in input_kex_dh_gex_init()
|
H A D | kexgexc.c | 191 kex->hash_alg, in input_kex_dh_gex_reply()
|
H A D | hostfile.c | 587 struct sshkey **keys, size_t nkeys, int store_hash, int quiet, int hash_alg) in hostfile_replace_entries() argument 647 if ((fp = sshkey_fingerprint(keys[i], hash_alg, in hostfile_replace_entries()
|
/dragonfly/contrib/wpa_supplicant/src/tls/ |
H A D | tlsv1_record.c | 45 rl->hash_alg = CRYPTO_HASH_ALG_HMAC_MD5; in tlsv1_record_set_cipher_suite() 48 rl->hash_alg = CRYPTO_HASH_ALG_HMAC_SHA1; in tlsv1_record_set_cipher_suite() 51 rl->hash_alg = CRYPTO_HASH_ALG_HMAC_SHA256; in tlsv1_record_set_cipher_suite() 207 hmac = crypto_hash_init(rl->hash_alg, rl->write_mac_secret, in tlsv1_record_send() 436 hmac = crypto_hash_init(rl->hash_alg, rl->read_mac_secret, in tlsv1_record_receive()
|
H A D | pkcs1.c | 198 const struct asn1_oid *hash_alg, in pkcs1_v15_sig_ver() argument 273 if (!asn1_oid_equal(&oid, hash_alg)) { in pkcs1_v15_sig_ver() 276 asn1_oid_to_str(hash_alg, txt2, sizeof(txt2)); in pkcs1_v15_sig_ver()
|
H A D | pkcs1.h | 26 const struct asn1_oid *hash_alg,
|
H A D | tlsv1_record.h | 45 enum crypto_hash_alg hash_alg; member
|
H A D | tlsv1_common.c | 338 int tlsv12_key_x_server_params_hash(u16 tls_version, u8 hash_alg, in tlsv12_key_x_server_params_hash() argument 348 switch (hash_alg) { in tlsv12_key_x_server_params_hash()
|
/dragonfly/crypto/libressl/crypto/ct/ |
H A D | ct_oct.c | 78 uint8_t hash_alg, sig_alg; in o2i_SCT_signature() local 90 if (!CBS_get_u8(cbs, &hash_alg)) in o2i_SCT_signature() 106 sct->hash_alg = hash_alg; in o2i_SCT_signature() 248 *p++ = sct->hash_alg; in i2o_SCT_signature()
|
H A D | ct_sct.c | 190 sct->hash_alg = 4; /* XXX */ in SCT_set_signature_nid() 195 sct->hash_alg = 4; /* XXX */ in SCT_set_signature_nid() 293 if (sct->hash_alg == 4) { in SCT_get_signature_nid()
|
H A D | ct_local.h | 111 unsigned char hash_alg; member
|
H A D | ct_prn.c | 105 BIO_printf(out, "%02X%02X", sct->hash_alg, sct->sig_alg); in SCT_signature_algorithms_print()
|
/dragonfly/crypto/libressl/crypto/ts/ |
H A D | ts_local.h | 220 X509_ALGOR *hash_alg; /* Default SHA-256. */ member
|
H A D | ts_rsp_verify.c | 419 if (cid->hash_alg != NULL) in TS_find_cert_v2() 420 md = EVP_get_digestbyobj(cid->hash_alg->algorithm); in TS_find_cert_v2()
|
H A D | ts_asn1.c | 855 .offset = offsetof(ESS_CERT_ID_V2, hash_alg),
|