| /src/crypto/external/bsd/netpgp/dist/src/libverify/ |
| pgpsum.c | 115 uint8_t hashalg; local 120 hashalg = hashed[3]; 130 digest_init(&hash, (const unsigned)hashalg);
|
| verify.h | 54 uint8_t hashalg; /* algorithm for digest */ member in struct:pgpv_fingerprint_t 70 uint8_t hashalg; /* hash algorithm */ member in struct:pgpv_pubkey_t 122 uint8_t hashalg; member in struct:pgpv_signature_t 159 uint8_t hashalg; member in struct:pgpv_onepass_t
|
| /src/crypto/external/bsd/netpgp/dist/src/netpgpverify/ |
| pgpsum.c | 131 uint8_t hashalg; local 136 hashalg = hashed[3]; 146 digest_init(&hash, (const unsigned)hashalg);
|
| libverify.c | 75 uint8_t hashalg; /* algorithm for digest */ member in struct:pgpv_fingerprint_t 91 uint8_t hashalg; /* hash algorithm */ member in struct:pgpv_pubkey_t 144 uint8_t hashalg; member in struct:pgpv_signature_t 183 uint8_t hashalg; member in struct:pgpv_onepass_t 811 fingerprint->hashalg = digest_get_alg(hashtype); 812 digest_init(&fphash, (unsigned)fingerprint->hashalg); 823 fingerprint->hashalg = digest_get_alg("md5"); 824 digest_init(&fphash, (unsigned)fingerprint->hashalg); 1228 sigpkt->sig.hashalg = *p++; 1238 sigpkt->sig.hashalg = *p++ [all...] |
| /src/external/mpl/bind/dist/lib/dns/rdata/generic/ |
| nsec3_50.c | 46 unsigned char hashalg; local 61 RETTOK(dns_hashalg_fromtext(&hashalg, &token.value.as_textregion)); 62 RETERR(uint8_tobuffer(hashalg, target));
|
| nsec3param_51.c | 46 unsigned char hashalg; local 59 RETTOK(dns_hashalg_fromtext(&hashalg, &token.value.as_textregion)); 60 RETERR(uint8_tobuffer(hashalg, target));
|
| /src/external/mpl/dhcp/bind/dist/lib/dns/rdata/generic/ |
| nsec3_50.c | 46 unsigned char hashalg; local 61 RETTOK(dns_hashalg_fromtext(&hashalg, &token.value.as_textregion)); 62 RETERR(uint8_tobuffer(hashalg, target));
|
| nsec3param_51.c | 46 unsigned char hashalg; local 59 RETTOK(dns_hashalg_fromtext(&hashalg, &token.value.as_textregion)); 60 RETERR(uint8_tobuffer(hashalg, target));
|
| /src/crypto/external/apache2/openssl/dist/providers/common/der/ |
| der_rsa_key.c | 288 const unsigned char *hashalg = NULL; local 336 OAEP_PSS_MD_CASE(sha1, hashalg); 337 OAEP_PSS_MD_CASE(sha224, hashalg); 338 OAEP_PSS_MD_CASE(sha256, hashalg); 339 OAEP_PSS_MD_CASE(sha384, hashalg); 340 OAEP_PSS_MD_CASE(sha512, hashalg); 341 OAEP_PSS_MD_CASE(sha512_224, hashalg); 342 OAEP_PSS_MD_CASE(sha512_256, hashalg); 353 || ossl_DER_w_precompiled(pkt, 0, hashalg, hashalg_sz))
|
| /src/crypto/external/bsd/openssl/dist/providers/common/der/ |
| der_rsa_key.c | 289 const unsigned char *hashalg = NULL; local 337 OAEP_PSS_MD_CASE(sha1, hashalg); 338 OAEP_PSS_MD_CASE(sha224, hashalg); 339 OAEP_PSS_MD_CASE(sha256, hashalg); 340 OAEP_PSS_MD_CASE(sha384, hashalg); 341 OAEP_PSS_MD_CASE(sha512, hashalg); 342 OAEP_PSS_MD_CASE(sha512_224, hashalg); 343 OAEP_PSS_MD_CASE(sha512_256, hashalg); 354 || ossl_DER_w_precompiled(pkt, 0, hashalg, hashalg_sz))
|
| /src/crypto/external/bsd/openssh/dist/ |
| ssh-keyscan.c | 82 int hashalg = -1; /* Hash for SSHFP records or -1 for all */ variable 296 export_dns_rr(host, key, stdout, 0, hashalg); 702 if (strncmp(optarg, "hashalg=", 8) != 0) 704 if ((hashalg = ssh_digest_alg_by_name(
|
| sshsig.c | 166 sshsig_wrap_sign(struct sshkey *key, const char *hashalg, 188 (r = sshbuf_put_cstring(tosign, hashalg)) != 0 || 197 if (strcmp(hashalg, "sha256") == 0) 199 else if (strcmp(hashalg, "sha512") == 0) 224 (r = sshbuf_put_cstring(blob, hashalg)) != 0 || 265 sshsig_check_hashalg(const char *hashalg) 267 if (hashalg == NULL || 268 match_pattern_list(hashalg, HASHALG_ALLOWED, 0) == 1) 270 error_f("unsupported hash algorithm \"%.100s\"", hashalg); 278 char *hashalg = NULL local 483 char *hashalg = NULL; local 611 char *hashalg = NULL; local [all...] |
| ssh-pkcs11.c | 551 int hashalg, r, diff, siglen, ret = -1; local 584 hashalg = SSH_DIGEST_SHA1; 585 else if ((hashalg = ssh_rsa_hash_id_from_keyname(alg)) == -1) 587 if ((r = rsa_hash_alg_oid(hashalg, &oid, &oid_len)) != 0) 589 if ((dgst_len = ssh_digest_bytes(hashalg)) == 0) 590 fatal_f("bad hash alg %d", hashalg); 596 if ((r = ssh_digest_memory(hashalg, data, datalen, 616 if ((ret = ssh_rsa_encode_store_sig(hashalg, sig, siglen, 643 int hashalg, ret = -1, r, siglen; local 667 if ((hashalg = sshkey_ec_nid_to_hash_alg(key->ecdsa_nid)) == -1 [all...] |
| ssh-keygen.c | 1434 if ((p = strprefix(opts[i], "hashalg=", 1)) != NULL) { 2513 const char *sig_namespace, const char *hashalg, sshsig_signer *signer, 2544 if ((r = sshsig_sign_fd(signkey, hashalg, sk_provider, pin, 2620 (p = strprefix(opts[i], "hashalg=", 1)) != NULL) { 2656 char *hashalg = NULL; local 2666 if (sig_process_opts(opts, nopts, &hashalg, NULL, NULL) != 0) 2700 sig_namespace, hashalg, signer, &agent_fd)) != 0) 2712 hashalg, signer, &agent_fd)) != 0) 2726 free(hashalg);
|
| /src/crypto/external/bsd/netpgp/dist/src/lib/ |
| netpgp.c | 1402 const char *hashalg; local 1458 hashalg = netpgp_getvar(netpgp, "hash"); 1460 hashalg = "sha1"; 1463 ret = pgp_sign_detached(io, f, out, seckey, hashalg, 1469 ret = pgp_sign_file(io, f, out, seckey, hashalg, 1532 const char *hashalg; local 1588 hashalg = netpgp_getvar(netpgp, "hash"); 1590 hashalg = "sha1"; 1595 hashalg, armored, cleartext);
|