/freebsd-13-stable/crypto/openssl/crypto/sha/ |
H A D | sha1_one.c | 18 static unsigned char m[SHA_DIGEST_LENGTH];
|
/freebsd-13-stable/crypto/openssl/crypto/ocsp/ |
H A D | ocsp_srv.c | 265 unsigned char md[SHA_DIGEST_LENGTH]; 275 if (!(ASN1_OCTET_STRING_set(byKey, md, SHA_DIGEST_LENGTH))) { 289 unsigned char md[SHA_DIGEST_LENGTH]; 298 return (ASN1_STRING_length(respid->value.byKey) == SHA_DIGEST_LENGTH) 300 SHA_DIGEST_LENGTH) == 0);
|
H A D | ocsp_vfy.c | 173 unsigned char tmphash[SHA_DIGEST_LENGTH], *keyhash; 183 if (id->value.byKey->length != SHA_DIGEST_LENGTH) 190 if (!memcmp(keyhash, tmphash, SHA_DIGEST_LENGTH))
|
/freebsd-13-stable/crypto/openssl/crypto/evp/ |
H A D | m_md5_sha1.c | 54 unsigned char sha1tmp[SHA_DIGEST_LENGTH]; 126 MD5_DIGEST_LENGTH + SHA_DIGEST_LENGTH,
|
H A D | e_aes_cbc_hmac_sha1.c | 425 ((plen + SHA_DIGEST_LENGTH + 460 SHA1_Update(&key->md, out + plen, SHA_DIGEST_LENGTH); 464 plen += SHA_DIGEST_LENGTH; 476 unsigned int u[SHA_DIGEST_LENGTH / sizeof(unsigned int)]; 477 unsigned char c[32 + SHA_DIGEST_LENGTH]; 498 if (len < (AES_BLOCK_SIZE + SHA_DIGEST_LENGTH + 1)) 507 } else if (len < (SHA_DIGEST_LENGTH + 1)) 527 maxpad = len - (SHA_DIGEST_LENGTH + 1); 541 inp_len = len - (SHA_DIGEST_LENGTH + pad + 1); 574 len -= SHA_DIGEST_LENGTH; /* amen [all...] |
H A D | m_sha1.c | 38 unsigned char sha1tmp[SHA_DIGEST_LENGTH]; 97 SHA_DIGEST_LENGTH,
|
H A D | e_des3.c | 319 unsigned char icv[8], iv[8], sha1tmp[SHA_DIGEST_LENGTH]; 353 OPENSSL_cleanse(sha1tmp, SHA_DIGEST_LENGTH); 365 unsigned char sha1tmp[SHA_DIGEST_LENGTH]; 373 OPENSSL_cleanse(sha1tmp, SHA_DIGEST_LENGTH);
|
/freebsd-13-stable/lib/libulog/ |
H A D | ulog_login.c | 45 char id[SHA_DIGEST_LENGTH];
|
/freebsd-13-stable/usr.sbin/ppp/ |
H A D | chap_ms.c | 160 char Digest[SHA_DIGEST_LENGTH]; 225 u_char Digest[SHA_DIGEST_LENGTH]; 282 char Digest[SHA_DIGEST_LENGTH]; 301 char Digest[SHA_DIGEST_LENGTH]; 356 char Digest[SHA_DIGEST_LENGTH]; 374 char Digest[SHA_DIGEST_LENGTH];
|
/freebsd-13-stable/sbin/veriexec/ |
H A D | manifest_parser.y | 56 # define SHA_DIGEST_LENGTH br_sha1_SIZE 73 { "sha1", SHA_DIGEST_LENGTH },
|
/freebsd-13-stable/lib/libmd/ |
H A D | sha.h | 71 #define SHA_DIGEST_LENGTH 20 macro
|
/freebsd-13-stable/contrib/unbound/sldns/ |
H A D | keyraw.c | 213 if(len < (size_t)1 + SHA_DIGEST_LENGTH + 3*length) 216 Q = BN_bin2bn(key+offset, SHA_DIGEST_LENGTH, NULL); 217 offset += SHA_DIGEST_LENGTH;
|
/freebsd-13-stable/crypto/openssl/crypto/x509/ |
H A D | t_x509.c | 227 unsigned char SHA1md[SHA_DIGEST_LENGTH]; 244 for (i = 0; i < SHA_DIGEST_LENGTH; i++) { 266 for (i = 0; i < SHA_DIGEST_LENGTH; i++) {
|
H A D | x509_cmp.c | 149 rv = memcmp(a->sha1_hash, b->sha1_hash, SHA_DIGEST_LENGTH); 195 unsigned char md[SHA_DIGEST_LENGTH];
|
/freebsd-13-stable/crypto/openssl/include/openssl/ |
H A D | sha.h | 32 # define SHA_DIGEST_LENGTH 20 macro
|
/freebsd-13-stable/crypto/openssl/include/crypto/ |
H A D | x509.h | 107 unsigned char sha1_hash[SHA_DIGEST_LENGTH]; 182 unsigned char sha1_hash[SHA_DIGEST_LENGTH];
|
/freebsd-13-stable/crypto/openssl/crypto/srp/ |
H A D | srp_vfy.c | 532 unsigned char digv[SHA_DIGEST_LENGTH]; 533 unsigned char digs[SHA_DIGEST_LENGTH]; 556 if (RAND_priv_bytes(digv, SHA_DIGEST_LENGTH) <= 0) 568 BN_bin2bn(digs, SHA_DIGEST_LENGTH, NULL), 569 BN_bin2bn(digv, SHA_DIGEST_LENGTH, NULL)))
|
H A D | srp_lib.c | 25 unsigned char digest[SHA_DIGEST_LENGTH]; 122 unsigned char dig[SHA_DIGEST_LENGTH];
|
/freebsd-13-stable/contrib/wpa/src/crypto/ |
H A D | tls_openssl_ocsp.c | 463 unsigned char hash[SHA_DIGEST_LENGTH]; 471 if (rid->value.byKey->length != SHA_DIGEST_LENGTH) 478 SHA_DIGEST_LENGTH) == 0)
|
/freebsd-13-stable/crypto/openssl/crypto/ts/ |
H A D | ts_rsp_verify.c | 287 unsigned char cert_sha1[SHA_DIGEST_LENGTH]; 302 if (cid->hash->length == SHA_DIGEST_LENGTH 303 && memcmp(cid->hash->data, cert_sha1, SHA_DIGEST_LENGTH) == 0) {
|
/freebsd-13-stable/crypto/openssl/engines/ |
H A D | e_dasync.c | 227 || !EVP_MD_meth_set_result_size(_hidden_sha1_md, SHA_DIGEST_LENGTH) 620 return ((len + SHA_DIGEST_LENGTH + AES_BLOCK_SIZE) 623 return SHA_DIGEST_LENGTH;
|
/freebsd-13-stable/contrib/unbound/validator/ |
H A D | val_secalgo.c | 106 return SHA_DIGEST_LENGTH; 155 return SHA_DIGEST_LENGTH; 319 if(origlen < 1 + 2*SHA_DIGEST_LENGTH) 323 (void) BN_bin2bn(orig + 1, SHA_DIGEST_LENGTH, R); 326 (void) BN_bin2bn(orig + 21, SHA_DIGEST_LENGTH, S); 671 sigblock_len == 1+2*SHA_DIGEST_LENGTH) {
|
/freebsd-13-stable/contrib/ldns/ |
H A D | dnssec_sign.c | 356 sig = DSA_do_sign(sha1_hash, SHA_DIGEST_LENGTH, key); 362 data = LDNS_XMALLOC(uint8_t, 1 + 2 * SHA_DIGEST_LENGTH); 384 memset(data + 1 + SHA_DIGEST_LENGTH, 0, pad); 386 BN_bn2bin(S, (unsigned char *) (data + 1 + SHA_DIGEST_LENGTH + pad)); 389 1 + 2 * SHA_DIGEST_LENGTH, 578 result = RSA_sign(NID_sha1, sha1_hash, SHA_DIGEST_LENGTH,
|
H A D | dnssec.c | 355 if(len < (size_t)1 + SHA_DIGEST_LENGTH + 3*length) 358 Q = BN_bin2bn(key+offset, SHA_DIGEST_LENGTH, NULL); 359 offset += SHA_DIGEST_LENGTH; 1805 if(ldns_rdf_size(sig_rdf) < 1 + 2*SHA_DIGEST_LENGTH) 1811 SHA_DIGEST_LENGTH, R); 1818 SHA_DIGEST_LENGTH, S);
|
/freebsd-13-stable/crypto/heimdal/lib/krb5/ |
H A D | crypto-pk.c | 52 unsigned char shaoutput[SHA_DIGEST_LENGTH];
|