Home | History | Annotate | Download | only in wpa_supplicant

Lines Matching full:hash

961 	u8 hash[MD5_MAC_LEN + SHA1_MAC_LEN];
1018 crypto_hash_finish(conn->verify_md5_server, hash, &hlen) < 0) {
1029 crypto_hash_finish(conn->verify_sha1_server, hash + MD5_MAC_LEN,
1039 "server finished", hash, MD5_MAC_LEN + SHA1_MAC_LEN,
1437 u8 hash[MD5_MAC_LEN + SHA1_MAC_LEN], *hpos;
1469 * The hash values are calculated over all handshake messages sent or
1475 hpos = hash;
1507 wpa_hexdump(MSG_MSGDUMP, "TLSv1: CertificateVerify hash", hash, hlen);
1511 * In digital signing, one-way hash functions are used as input for a
1523 if (crypto_private_key_sign_pkcs1(conn->client_key, hash, hlen,
1525 wpa_printf(MSG_DEBUG, "TLSv1: Failed to sign hash (PKCS #1)");
1593 u8 hash[MD5_MAC_LEN + SHA1_MAC_LEN];
1603 crypto_hash_finish(conn->verify_md5_client, hash, &hlen) < 0) {
1614 crypto_hash_finish(conn->verify_sha1_client, hash + MD5_MAC_LEN,
1624 "client finished", hash, MD5_MAC_LEN + SHA1_MAC_LEN,
2092 "hash");
2224 "hash");