/freebsd-11-stable/contrib/ntp/libntp/ |
H A D | ssl_init.c | 103 u_int digest_len; local 155 digest_len = (md) ? EVP_MD_size(md) : 0; 157 if (!md || digest_len <= 0) { 160 digest_len = CMAC_LENGTH; 179 if (digest_len > max_digest_len) { 182 keytype_name(key_type), digest_len, 186 keytype_name(key_type), digest_len, 191 digest_len = MD5_LENGTH; 193 *pdigest_len = digest_len;
|
/freebsd-11-stable/crypto/openssh/ |
H A D | dns.c | 82 u_char **digest, size_t *digest_len, struct sshkey *key) 126 digest_len)) != 0) 132 *digest_len = 0; 144 u_char **digest, size_t *digest_len, u_char *rdata, int rdata_len) 154 *digest_len = rdata_len - 2; 156 if (*digest_len > 0) { 157 *digest = xmalloc(*digest_len); 158 memcpy(*digest, rdata + 2, *digest_len); 81 dns_read_key(u_int8_t *algorithm, u_int8_t *digest_type, u_char **digest, size_t *digest_len, struct sshkey *key) argument 143 dns_read_rdata(u_int8_t *algorithm, u_int8_t *digest_type, u_char **digest, size_t *digest_len, u_char *rdata, int rdata_len) argument
|
H A D | digest-openssl.c | 52 size_t digest_len; member in struct:ssh_digest 104 return digest == NULL ? 0 : digest->digest_len; 163 if (dlen < digest->digest_len) /* No truncation allowed */ 167 if (l != digest->digest_len) /* sanity */ 192 if (dlen < digest->digest_len)
|
H A D | digest-libc.c | 52 size_t digest_len; member in struct:ssh_digest 158 return digest == NULL ? 0 : digest->digest_len; 223 if (dlen < digest->digest_len) /* No truncation allowed */
|
H A D | pkcs11.h | 865 unsigned long *digest_len)); 874 unsigned long *digest_len));
|
/freebsd-11-stable/usr.sbin/uefisign/ |
H A D | uefisign.c | 154 magic(PKCS7 *pkcs7, const char *digest, size_t digest_len) argument 164 digest_hex = bin2hex(digest, digest_len); 251 size_t digest_len, signature_len; local 257 receive_chunk(&digest, &digest_len, pipefd); 259 bio = BIO_new_mem_buf(digest, digest_len); 290 magic(pkcs7, digest, digest_len);
|
/freebsd-11-stable/crypto/heimdal/lib/roken/ |
H A D | resolve-test.c | 169 (unsigned long)ds->digest_len); 170 for (i = 0; i < ds->digest_len; i++)
|
H A D | resolve.h | 179 size_t digest_len; member in struct:rk_ds_record
|
H A D | resolve.c | 367 size_t digest_len; local 374 digest_len = size - 4; 376 rr->u.ds = malloc (sizeof(*rr->u.ds) + digest_len - 1); 385 rr->u.ds->digest_len = digest_len; 386 memcpy (rr->u.ds->digest_data, p + 4, digest_len); 854 rr->u.ds->digest_len = pRec->Data.DS.wDigestLength;
|
/freebsd-11-stable/tools/tools/crypto/ |
H A D | cryptocheck.c | 393 u_int key_len, digest_len; local 408 digest_len = sizeof(control_digest); 410 (u_char *)control_digest, &digest_len) == NULL) 679 u_int iv_len, auth_key_len, cipher_key_len, digest_len; local 717 digest_len = sizeof(control_digest); 719 aad_len + size, (u_char *)control_digest, &digest_len) == NULL)
|
/freebsd-11-stable/contrib/ntp/ntpdc/ |
H A D | ntpdc.c | 1748 size_t digest_len; local 1759 digest_len = 0; 1760 key_type = keytype_from_text(digest_name, &digest_len); 1773 info_auth_hashlen = digest_len;
|
/freebsd-11-stable/crypto/openssl/apps/ |
H A D | ts.c | 597 long digest_len; local 598 *md_value = string_to_hex(digest, &digest_len); 599 if (!*md_value || md_value_len != digest_len) {
|
/freebsd-11-stable/crypto/heimdal/lib/hx509/ref/ |
H A D | pkcs11.h | 867 unsigned long *digest_len)); 876 unsigned long *digest_len));
|
/freebsd-11-stable/contrib/ntp/ntpq/ |
H A D | ntpq.c | 2602 size_t digest_len; local 2613 digest_len = 0; 2614 key_type = keytype_from_text(digest_name, &digest_len); 2627 info_auth_hashlen = digest_len;
|