/freebsd-13-stable/contrib/ntp/libntp/ |
H A D | ssl_init.c | 103 u_int digest_len; local 155 digest_len = (md) ? EVP_MD_size(md) : 0; 157 if (!md || digest_len <= 0) { 160 digest_len = CMAC_LENGTH; 179 if (digest_len > max_digest_len) { 182 keytype_name(key_type), digest_len, 186 keytype_name(key_type), digest_len, 191 digest_len = MD5_LENGTH; 193 *pdigest_len = digest_len;
|
/freebsd-13-stable/sys/contrib/openzfs/module/icp/io/ |
H A D | sha2_mod.c | 343 * digest_len is the length of the desired digest. If digest_len 350 ulong_t digest_len, uchar_t *digest_scratch) 373 if (offset + digest_len <= 380 (digest_len != SHA256_DIGEST_LENGTH)) || 382 (digest_len != SHA512_DIGEST_LENGTH))) { 392 digest_len); 408 size_t length = digest_len; 879 uint32_t digest_len, sha_digest_len; local 886 sha_digest_len = digest_len 349 sha2_digest_final_uio(SHA2_CTX *sha2_ctx, crypto_data_t *digest, ulong_t digest_len, uchar_t *digest_scratch) argument 943 mac->cd_offset, digest_len); local 996 uint32_t sha_digest_len, digest_len, sha_hmac_block_size; local 1100 mac->cd_offset, digest_len); local 1134 uint32_t sha_digest_len, digest_len, sha_hmac_block_size; local [all...] |
H A D | sha1_mod.c | 320 * digest_len is the length of the desired digest. If digest_len 327 ulong_t digest_len, uchar_t *digest_scratch) 350 if (offset + digest_len <= 356 if (digest_len != SHA1_DIGEST_LENGTH) { 365 digest_len); 380 size_t length = digest_len; 792 uint32_t digest_len = SHA1_DIGEST_LENGTH; local 798 digest_len = PROV_SHA1_HMAC_CTX(ctx)->hc_digest_len; 804 if ((mac->cd_length == 0) || (mac->cd_length < digest_len)) { 326 sha1_digest_final_uio(SHA1_CTX *sha1_ctx, crypto_data_t *digest, ulong_t digest_len, uchar_t *digest_scratch) argument 836 mac->cd_offset, digest_len); local 890 uint32_t digest_len = SHA1_DIGEST_LENGTH; local 967 mac->cd_offset, digest_len); local 1006 uint32_t digest_len = SHA1_DIGEST_LENGTH; local [all...] |
/freebsd-13-stable/crypto/openssh/ |
H A D | dns.c | 82 u_char **digest, size_t *digest_len, struct sshkey *key) 131 digest_len)) != 0) 137 *digest_len = 0; 149 u_char **digest, size_t *digest_len, u_char *rdata, int rdata_len) 159 *digest_len = rdata_len - 2; 161 if (*digest_len > 0) { 162 *digest = xmalloc(*digest_len); 163 memcpy(*digest, rdata + 2, *digest_len); 81 dns_read_key(u_int8_t *algorithm, u_int8_t *digest_type, u_char **digest, size_t *digest_len, struct sshkey *key) argument 148 dns_read_rdata(u_int8_t *algorithm, u_int8_t *digest_type, u_char **digest, size_t *digest_len, u_char *rdata, int rdata_len) argument
|
H A D | digest-openssl.c | 52 size_t digest_len; member in struct:ssh_digest 103 return digest == NULL ? 0 : digest->digest_len; 165 if (dlen < digest->digest_len) /* No truncation allowed */ 169 if (l != digest->digest_len) /* sanity */ 193 if (dlen < digest->digest_len)
|
H A D | digest-libc.c | 52 size_t digest_len; member in struct:ssh_digest 148 return digest == NULL ? 0 : digest->digest_len; 213 if (dlen < digest->digest_len) /* No truncation allowed */
|
H A D | pkcs11.h | 865 unsigned long *digest_len)); 874 unsigned long *digest_len));
|
/freebsd-13-stable/sys/security/mac_veriexec/ |
H A D | mac_veriexec.h | 96 size_t digest_len; member in struct:mac_veriexec_fpops 126 .digest_len = _digest_len, \
|
H A D | veriexec_fingerprint.c | 168 for (offset = 0; offset < ip->ops->digest_len; offset++) 195 return memcmp(ip->fingerprint, digest, ip->ops->digest_len); 364 if (fpops->type == NULL || fpops->digest_len == 0 ||
|
H A D | veriexec_metadata.c | 557 len = ip->ops->digest_len; 653 fpops->digest_len); 707 memcpy(ip->fingerprint, fingerprint, fpops->digest_len); 727 for (offset = 0; offset < fpops->digest_len; offset++)
|
/freebsd-13-stable/usr.sbin/uefisign/ |
H A D | uefisign.c | 153 magic(PKCS7 *pkcs7, const char *digest, size_t digest_len) argument 163 digest_hex = bin2hex(digest, digest_len); 250 size_t digest_len, signature_len; local 256 receive_chunk(&digest, &digest_len, pipefd); 258 bio = BIO_new_mem_buf(digest, digest_len); 289 magic(pkcs7, digest, digest_len);
|
/freebsd-13-stable/crypto/heimdal/lib/roken/ |
H A D | resolve-test.c | 169 (unsigned long)ds->digest_len); 170 for (i = 0; i < ds->digest_len; i++)
|
H A D | resolve.h | 179 size_t digest_len; member in struct:rk_ds_record
|
H A D | resolve.c | 367 size_t digest_len; local 374 digest_len = size - 4; 376 rr->u.ds = malloc (sizeof(*rr->u.ds) + digest_len - 1); 385 rr->u.ds->digest_len = digest_len; 386 memcpy (rr->u.ds->digest_data, p + 4, digest_len); 854 rr->u.ds->digest_len = pRec->Data.DS.wDigestLength;
|
/freebsd-13-stable/tools/tools/crypto/ |
H A D | cryptocheck.c | 534 u_int digest_len; local 547 digest_len = sizeof(control_digest); 548 openssl_hash(alg, md, buffer, size, control_digest, &digest_len); 612 u_int key_len, digest_len; local 627 digest_len = sizeof(control_digest); 629 (u_char *)control_digest, &digest_len) == NULL) 886 u_int iv_len, auth_key_len, cipher_key_len, digest_len; local 934 digest_len = sizeof(control_digest); 936 aad_len + size, (u_char *)control_digest, &digest_len) == NULL)
|
/freebsd-13-stable/sys/dev/ice/ |
H A D | virtchnl_inline_ipsec.h | 223 u16 digest_len; member in struct:virtchnl_ipsec_crypto_cfg_item
|
/freebsd-13-stable/contrib/ntp/ntpdc/ |
H A D | ntpdc.c | 1748 size_t digest_len; local 1759 digest_len = 0; 1760 key_type = keytype_from_text(digest_name, &digest_len); 1773 info_auth_hashlen = digest_len;
|
/freebsd-13-stable/crypto/openssl/apps/ |
H A D | ts.c | 507 long digest_len; local 508 *md_value = OPENSSL_hexstr2buf(digest, &digest_len); 509 if (!*md_value || md_value_len != digest_len) {
|
/freebsd-13-stable/crypto/heimdal/lib/hx509/ref/ |
H A D | pkcs11.h | 867 unsigned long *digest_len)); 876 unsigned long *digest_len));
|
/freebsd-13-stable/contrib/ntp/ntpq/ |
H A D | ntpq.c | 2602 size_t digest_len; local 2613 digest_len = 0; 2614 key_type = keytype_from_text(digest_name, &digest_len); 2627 info_auth_hashlen = digest_len;
|