/netbsd-6-1-5-RELEASE/external/ibm-public/postfix/dist/src/tls/ |
H A D | tls_verify.c | 502 unsigned int md_len; local 511 if (X509_digest(peercert, md_alg, md_buf, &md_len) == 0) 516 if (md_len > EVP_MAX_MD_SIZE || md_len >= INT_MAX / 3) 518 myname, dgst, md_len); 520 result = mymalloc(md_len * 3); 521 for (i = 0; i < md_len; i++) { 524 result[(i * 3) + 2] = (i + 1 != md_len) ? ':' : '\0';
|
H A D | tls_client.c | 294 unsigned int md_len; local 343 if ((md_len = EVP_MD_size(md_alg)) > EVP_MAX_MD_SIZE) { 345 " disabling TLS support", props->fpt_dgst, md_len);
|
H A D | tls_server.c | 292 unsigned int md_len; local 352 if ((md_len = EVP_MD_size(md_alg)) > EVP_MAX_MD_SIZE) { 354 " disabling TLS support", props->fpt_dgst, md_len);
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/hcrypto/ |
H A D | hmac.h | 82 const void *data, size_t n, void *md, unsigned int *md_len);
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/crypto/hmac/ |
H A D | hmac.h | 101 unsigned int *md_len);
|
H A D | hmac.c | 227 unsigned int *md_len) 238 if (!HMAC_Final(&c,md,md_len)) 225 HMAC(const EVP_MD *evp_md, const void *key, int key_len, const unsigned char *d, size_t n, unsigned char *md, unsigned int *md_len) argument
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/crypto/sha/ |
H A D | sha.h | 145 unsigned int num,md_len; member in struct:SHA256state_st 195 unsigned int num,md_len; member in struct:SHA512state_st
|
H A D | sha256.c | 26 c->md_len=SHA224_DIGEST_LENGTH; 37 c->md_len=SHA256_DIGEST_LENGTH; 88 switch ((c)->md_len) \ 98 if ((c)->md_len > SHA256_DIGEST_LENGTH) \ 100 for (nn=0;nn<(c)->md_len/4;nn++) \
|
H A D | sha512.c | 74 c->num=0; c->md_len=SHA384_DIGEST_LENGTH; 90 c->num=0; c->md_len=SHA512_DIGEST_LENGTH; 137 switch (c->md_len) 170 /* ... as well as make sure md_len is not abused. */
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/crypto/pkcs7/ |
H A D | pk7_doit.c | 711 unsigned int md_len; local 725 if (!EVP_DigestFinal_ex(mctx, md_data,&md_len)) 730 if (!PKCS7_add1_attrib_digest(si, md_data, md_len)) 872 unsigned int md_len; local 876 if (!EVP_DigestFinal_ex(mdc,md_data,&md_len)) 878 M_ASN1_OCTET_STRING_set(p7->d.digest->digest, md_data, md_len); 1078 unsigned int md_len; local 1082 if (!EVP_DigestFinal_ex(&mdc_tmp,md_dat,&md_len)) 1091 if ((message_digest->length != (int)md_len) || 1092 (memcmp(message_digest->data,md_dat,md_len))) [all...] |
/netbsd-6-1-5-RELEASE/crypto/external/bsd/heimdal/dist/lib/gssapi/netlogon/ |
H A D | crypto.c | 356 unsigned int md_len = MD5_DIGEST_LENGTH; local 388 digest, sizeof(digest), digest, &md_len); local 402 unsigned int md_len = SHA256_DIGEST_LENGTH; local 436 HMAC_Final(&hmac, digest, &md_len);
|
/netbsd-6-1-5-RELEASE/lib/libradius/ |
H A D | radlib.c | 178 u_int md_len; local 191 HMAC_Final(&ctx, md, &md_len); 195 (size_t)md_len); 216 u_int md_len; local 275 HMAC_Final(&hctx, md, &md_len);
|
/netbsd-6-1-5-RELEASE/crypto/external/cpl/trousers/dist/src/tspi/daa/daa_issuer/ |
H A D | key_correctness_proof.c | 85 int *md_len, 148 EVP_DigestFinal_ex(&mdctx, md_value, md_len); 84 generateMessageDigest(BYTE *md_value, int *md_len, const TSS_DAA_PK_internal *pk, bi_array_ptr *commitments, const int commitments_size ) argument
|
/netbsd-6-1-5-RELEASE/usr.sbin/syslogd/ |
H A D | sign.c | 737 unsigned md_len = 0; local 743 SSL_CHECK_ONE(EVP_DigestFinal_ex(GlobalSign.mdctx, md_value, &md_len)); 745 b64_ntop(md_value, md_len, (char *)md_b64, EVP_MAX_MD_SIZE*2);
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/crypto/pem/ |
H A D | pem.h | 192 int md_len; /* length of md_data */ member in struct:pem_ctx_st
|
/netbsd-6-1-5-RELEASE/crypto/external/bsd/openssl/dist/ssl/ |
H A D | s3_clnt.c | 2729 unsigned int md_len; local 2771 EVP_DigestFinal_ex(ukm_hash, shared_ukm, &md_len);
|