| /freebsd/crypto/openssl/crypto/ess/ |
| H A D | ess_lib.c | 20 static ESS_CERT_ID_V2 *ESS_CERT_ID_V2_new_init(const EVP_MD *hash_alg, 125 ESS_SIGNING_CERT_V2 *OSSL_ESS_signing_cert_v2_new_init(const EVP_MD *hash_alg, in OSSL_ESS_signing_cert_v2_new_init() argument 138 cid = ESS_CERT_ID_V2_new_init(hash_alg, signcert, set_issuer_serial); in OSSL_ESS_signing_cert_v2_new_init() 152 if ((cid = ESS_CERT_ID_V2_new_init(hash_alg, cert, 1)) == NULL) { in OSSL_ESS_signing_cert_v2_new_init() 170 static ESS_CERT_ID_V2 *ESS_CERT_ID_V2_new_init(const EVP_MD *hash_alg, in ESS_CERT_ID_V2_new_init() argument 187 if (!EVP_MD_is_a(hash_alg, SN_sha256)) { in ESS_CERT_ID_V2_new_init() 193 X509_ALGOR_set_md(alg, hash_alg); in ESS_CERT_ID_V2_new_init() 198 cid->hash_alg = alg; in ESS_CERT_ID_V2_new_init() 201 cid->hash_alg = NULL; in ESS_CERT_ID_V2_new_init() 204 if (!X509_digest(cert, hash_alg, hash, &hash_len)) { in ESS_CERT_ID_V2_new_init() [all …]
|
| H A D | ess_asn1.c | 44 ASN1_OPT(ESS_CERT_ID_V2, hash_alg, X509_ALGOR),
|
| /freebsd/crypto/openssh/ |
| H A D | ssh-rsa.c | 313 rsa_hash_alg_ident(int hash_alg) in rsa_hash_alg_ident() argument 315 switch (hash_alg) { in rsa_hash_alg_ident() 412 int hash_alg, ret = SSH_ERR_INTERNAL_ERROR; in ssh_rsa_sign() local 421 hash_alg = SSH_DIGEST_SHA1; in ssh_rsa_sign() 423 hash_alg = rsa_hash_id_from_keyname(alg); in ssh_rsa_sign() 425 if (key == NULL || key->pkey == NULL || hash_alg == -1 || in ssh_rsa_sign() 434 if ((ret = sshkey_pkey_digest_sign(key->pkey, hash_alg, &sig, &len, in ssh_rsa_sign() 451 if ((ret = sshbuf_put_cstring(b, rsa_hash_alg_ident(hash_alg))) != 0 || in ssh_rsa_sign() 478 int hash_alg, want_alg, ret = SSH_ERR_INTERNAL_ERROR; in ssh_rsa_verify() local 496 if ((hash_alg = rsa_hash_id_from_ident(sigtype)) == -1) { in ssh_rsa_verify() [all …]
|
| H A D | kexgex.c | 48 int hash_alg, in kexgex_hash() argument 93 if (ssh_digest_buffer(hash_alg, b, hash, *hashlen) != 0) { in kexgex_hash() 98 *hashlen = ssh_digest_bytes(hash_alg); in kexgex_hash()
|
| H A D | kexgen.c | 49 int hash_alg, in kex_gen_hash() argument 63 if (*hashlen < ssh_digest_bytes(hash_alg)) in kex_gen_hash() 86 if (ssh_digest_buffer(hash_alg, b, hash, *hashlen) != 0) { in kex_gen_hash() 91 *hashlen = ssh_digest_bytes(hash_alg); in kex_gen_hash() 212 kex->hash_alg, in input_kex_gen_reply() 342 kex->hash_alg, in input_kex_gen_init()
|
| H A D | kexsntrup761x25519.c | 133 if ((r = ssh_digest_buffer(kex->hash_alg, buf, hash, sizeof(hash))) != 0) in kex_kem_sntrup761x25519_enc() 146 ssh_digest_bytes(kex->hash_alg))) != 0) in kex_kem_sntrup761x25519_enc() 201 if ((r = ssh_digest_buffer(kex->hash_alg, buf, hash, sizeof(hash))) != 0) in kex_kem_sntrup761x25519_dec() 210 ssh_digest_bytes(kex->hash_alg))) != 0) in kex_kem_sntrup761x25519_dec()
|
| H A D | ssh-ecdsa.c | 329 int hash_alg; in ssh_ecdsa_sign() local 343 if ((hash_alg = sshkey_ec_nid_to_hash_alg(key->ecdsa_nid)) == -1) in ssh_ecdsa_sign() 346 if ((ret = sshkey_pkey_digest_sign(key->pkey, hash_alg, &sigb, &slen, in ssh_ecdsa_sign() 393 int hash_alg, len = 0; in ssh_ecdsa_verify() local 404 if ((hash_alg = sshkey_ec_nid_to_hash_alg(key->ecdsa_nid)) == -1) in ssh_ecdsa_verify() 459 if ((ret = sshkey_pkey_digest_verify(key->pkey, hash_alg, in ssh_ecdsa_verify()
|
| H A D | kexmlkem768x25519.c | 156 if ((r = ssh_digest_buffer(kex->hash_alg, buf, hash, sizeof(hash))) != 0) in kex_kem_mlkem768x25519_enc() 169 ssh_digest_bytes(kex->hash_alg))) != 0) in kex_kem_mlkem768x25519_enc() 235 if ((r = ssh_digest_buffer(kex->hash_alg, buf, in kex_kem_mlkem768x25519_dec() 245 ssh_digest_bytes(kex->hash_alg))) != 0) in kex_kem_mlkem768x25519_dec()
|
| H A D | kex-names.c | 52 int hash_alg; member 150 return k->hash_alg; in kex_hash_from_name()
|
| H A D | hostfile.h | 57 int store_hash, int quiet, int hash_alg);
|
| H A D | kexgexs.c | 169 kex->hash_alg, in input_kex_dh_gex_init()
|
| /freebsd/lib/libsecureboot/openpgp/ |
| H A D | opgp_sig.c | 142 sig->hash_alg = *ptr++; 146 sig->hash_alg = *ptr++; 205 get_hname(int hash_alg) 210 if (hmp->halg == hash_alg) 321 } else if (!(hname = get_hname(sig->hash_alg))) { 322 warnx("unsupported hash algorithm: %d", sig->hash_alg); 331 switch (sig->hash_alg) { /* see hash_algs above */
|
| H A D | packet.h | 57 int hash_alg; member
|
| /freebsd/contrib/wpa/src/tls/ |
| H A D | tlsv1_record.c | 45 rl->hash_alg = CRYPTO_HASH_ALG_HMAC_MD5; in tlsv1_record_set_cipher_suite() 48 rl->hash_alg = CRYPTO_HASH_ALG_HMAC_SHA1; in tlsv1_record_set_cipher_suite() 51 rl->hash_alg = CRYPTO_HASH_ALG_HMAC_SHA256; in tlsv1_record_set_cipher_suite() 207 hmac = crypto_hash_init(rl->hash_alg, rl->write_mac_secret, in tlsv1_record_send() 436 hmac = crypto_hash_init(rl->hash_alg, rl->read_mac_secret, in tlsv1_record_receive()
|
| H A D | pkcs1.c | 202 const struct asn1_oid *hash_alg, in pkcs1_v15_sig_ver() argument 294 if (!asn1_oid_equal(&oid, hash_alg)) { in pkcs1_v15_sig_ver() 297 asn1_oid_to_str(hash_alg, txt2, sizeof(txt2)); in pkcs1_v15_sig_ver()
|
| H A D | pkcs1.h | 26 const struct asn1_oid *hash_alg,
|
| H A D | tlsv1_record.h | 45 enum crypto_hash_alg hash_alg; member
|
| H A D | tlsv1_common.c | 338 int tlsv12_key_x_server_params_hash(u16 tls_version, u8 hash_alg, in tlsv12_key_x_server_params_hash() argument 348 switch (hash_alg) { in tlsv12_key_x_server_params_hash()
|
| /freebsd/crypto/openssl/crypto/ct/ |
| H A D | ct_sct.c | 123 sct->hash_alg = TLSEXT_hash_sha256; in SCT_set_signature_nid() 128 sct->hash_alg = TLSEXT_hash_sha256; in SCT_set_signature_nid() 210 if (sct->hash_alg == TLSEXT_hash_sha256) { in SCT_get_signature_nid()
|
| H A D | ct_oct.c | 48 sct->hash_alg = *p++; in o2i_SCT_signature() 186 *p++ = sct->hash_alg; in i2o_SCT_signature()
|
| H A D | ct_local.h | 74 unsigned char hash_alg; member
|
| H A D | ct_prn.c | 24 BIO_printf(out, "%02X%02X", sct->hash_alg, sct->sig_alg); in SCT_signature_algorithms_print()
|
| /freebsd/crypto/openssl/include/crypto/ |
| H A D | ess.h | 59 X509_ALGOR *hash_alg; /* Default: SHA-256 */ member
|
| /freebsd/crypto/openssl/doc/man3/ |
| H A D | OSSL_ESS_check_signing_certs.pod | 17 ESS_SIGNING_CERT_V2 *OSSL_ESS_signing_cert_v2_new_init(const EVP_MD *hash_alg, 37 OSSL_ESS_signing_cert_new_init() except that it uses the given I<hash_alg> and
|
| /freebsd/crypto/openssl/include/openssl/ |
| H A D | ess.h.in | 72 ESS_SIGNING_CERT_V2 *OSSL_ESS_signing_cert_v2_new_init(const EVP_MD *hash_alg,
|