Searched refs:md_len (Results 1 - 16 of 16) sorted by relevance

/netbsd-6-1-5-RELEASE/external/ibm-public/postfix/dist/src/tls/
H A Dtls_verify.c502 unsigned int md_len; local
511 if (X509_digest(peercert, md_alg, md_buf, &md_len) == 0)
516 if (md_len > EVP_MAX_MD_SIZE || md_len >= INT_MAX / 3)
518 myname, dgst, md_len);
520 result = mymalloc(md_len * 3);
521 for (i = 0; i < md_len; i++) {
524 result[(i * 3) + 2] = (i + 1 != md_len) ? ':' : '\0';
H A Dtls_client.c294 unsigned int md_len; local
343 if ((md_len = EVP_MD_size(md_alg)) > EVP_MAX_MD_SIZE) {
345 " disabling TLS support", props->fpt_dgst, md_len);
H A Dtls_server.c292 unsigned int md_len; local
352 if ((md_len = EVP_MD_size(md_alg)) > EVP_MAX_MD_SIZE) {
354 " disabling TLS support", props->fpt_dgst, md_len);
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/hcrypto/
H A Dhmac.h82 const void *data, size_t n, void *md, unsigned int *md_len);
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/crypto/hmac/
H A Dhmac.h101 unsigned int *md_len);
H A Dhmac.c227 unsigned int *md_len)
238 if (!HMAC_Final(&c,md,md_len))
225 HMAC(const EVP_MD *evp_md, const void *key, int key_len, const unsigned char *d, size_t n, unsigned char *md, unsigned int *md_len) argument
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/crypto/sha/
H A Dsha.h145 unsigned int num,md_len; member in struct:SHA256state_st
195 unsigned int num,md_len; member in struct:SHA512state_st
H A Dsha256.c26 c->md_len=SHA224_DIGEST_LENGTH;
37 c->md_len=SHA256_DIGEST_LENGTH;
88 switch ((c)->md_len) \
98 if ((c)->md_len > SHA256_DIGEST_LENGTH) \
100 for (nn=0;nn<(c)->md_len/4;nn++) \
H A Dsha512.c74 c->num=0; c->md_len=SHA384_DIGEST_LENGTH;
90 c->num=0; c->md_len=SHA512_DIGEST_LENGTH;
137 switch (c->md_len)
170 /* ... as well as make sure md_len is not abused. */
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/crypto/pkcs7/
H A Dpk7_doit.c711 unsigned int md_len; local
725 if (!EVP_DigestFinal_ex(mctx, md_data,&md_len))
730 if (!PKCS7_add1_attrib_digest(si, md_data, md_len))
872 unsigned int md_len; local
876 if (!EVP_DigestFinal_ex(mdc,md_data,&md_len))
878 M_ASN1_OCTET_STRING_set(p7->d.digest->digest, md_data, md_len);
1078 unsigned int md_len; local
1082 if (!EVP_DigestFinal_ex(&mdc_tmp,md_dat,&md_len))
1091 if ((message_digest->length != (int)md_len) ||
1092 (memcmp(message_digest->data,md_dat,md_len)))
[all...]
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/gssapi/netlogon/
H A Dcrypto.c356 unsigned int md_len = MD5_DIGEST_LENGTH; local
388 digest, sizeof(digest), digest, &md_len); local
402 unsigned int md_len = SHA256_DIGEST_LENGTH; local
436 HMAC_Final(&hmac, digest, &md_len);
/netbsd-6-1-5-RELEASE/lib/libradius/
H A Dradlib.c178 u_int md_len; local
191 HMAC_Final(&ctx, md, &md_len);
195 (size_t)md_len);
216 u_int md_len; local
275 HMAC_Final(&hctx, md, &md_len);
/netbsd-6-1-5-RELEASE/crypto/external/cpl/trousers/dist/src/tspi/daa/daa_issuer/
H A Dkey_correctness_proof.c85 int *md_len,
148 EVP_DigestFinal_ex(&mdctx, md_value, md_len);
84 generateMessageDigest(BYTE *md_value, int *md_len, const TSS_DAA_PK_internal *pk, bi_array_ptr *commitments, const int commitments_size ) argument
/netbsd-6-1-5-RELEASE/usr.sbin/syslogd/
H A Dsign.c737 unsigned md_len = 0; local
743 SSL_CHECK_ONE(EVP_DigestFinal_ex(GlobalSign.mdctx, md_value, &md_len));
745 b64_ntop(md_value, md_len, (char *)md_b64, EVP_MAX_MD_SIZE*2);
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/crypto/pem/
H A Dpem.h192 int md_len; /* length of md_data */ member in struct:pem_ctx_st
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/ssl/
H A Ds3_clnt.c2729 unsigned int md_len; local
2771 EVP_DigestFinal_ex(ukm_hash, shared_ukm, &md_len);

Completed in 369 milliseconds