/netbsd-current/external/ibm-public/postfix/dist/src/tls/ |
H A D | tls_fprint.c | 20 /* char *tls_digest_encode(md_buf, md_len) 22 /* const char *md_len; 72 /* .IP md_len 250 unsigned int md_len; local 309 CHECK_OK_AND(EVP_DigestFinal_ex(mdctx, md_buf, &md_len)); 315 if (md_len > EVP_MAX_MD_SIZE) 316 msg_panic("unexpectedly large %s digest size: %u", mdalg, md_len); 329 result = vstring_alloc(strlen(props->serverid) + 1 + 2 * md_len); 332 for (i = 0; i < md_len; i++) { 342 char *tls_digest_encode(const unsigned char *md_buf, int md_len) argument 366 unsigned int md_len; local [all...] |
/netbsd-current/crypto/external/bsd/heimdal/dist/lib/hcrypto/ |
H A D | hmac.h | 82 const void *data, size_t n, void *md, unsigned int *md_len);
|
/netbsd-current/crypto/external/bsd/openssl.old/dist/include/openssl/ |
H A D | hmac.h | 41 unsigned int *md_len);
|
H A D | sha.h | 60 unsigned int num, md_len; member in struct:SHA256state_st 107 unsigned int num, md_len; member in struct:SHA512state_st
|
/netbsd-current/crypto/external/bsd/openssl/dist/include/openssl/ |
H A D | sha.h | 70 unsigned int num, md_len; member in struct:SHA256state_st 120 unsigned int num, md_len; member in struct:SHA512state_st
|
H A D | hmac.h | 56 unsigned char *md, unsigned int *md_len);
|
/netbsd-current/crypto/external/bsd/openssl/dist/crypto/hmac/ |
H A D | hmac.c | 223 unsigned char *md, unsigned int *md_len) 234 if (md_len != NULL) 235 *md_len = (unsigned int)temp_md_len; 221 HMAC(const EVP_MD *evp_md, const void *key, int key_len, const unsigned char *data, size_t data_len, unsigned char *md, unsigned int *md_len) argument
|
/netbsd-current/crypto/external/bsd/openssl.old/dist/crypto/pkcs7/ |
H A D | pk7_doit.c | 618 unsigned int md_len; local 629 if (!EVP_DigestFinal_ex(mctx, md_data, &md_len)) { 633 if (!PKCS7_add1_attrib_digest(si, md_data, md_len)) { 778 unsigned int md_len; local 782 if (!EVP_DigestFinal_ex(mdc, md_data, &md_len)) 784 if (!ASN1_OCTET_STRING_set(p7->d.digest->digest, md_data, md_len)) 997 unsigned int md_len; local 1001 if (!EVP_DigestFinal_ex(mdc_tmp, md_dat, &md_len)) 1009 if ((message_digest->length != (int)md_len) || 1010 (memcmp(message_digest->data, md_dat, md_len))) { [all...] |
/netbsd-current/crypto/external/bsd/openssl.old/dist/crypto/hmac/ |
H A D | hmac.c | 213 unsigned int *md_len) 233 if (!HMAC_Final(c, md, md_len)) 211 HMAC(const EVP_MD *evp_md, const void *key, int key_len, const unsigned char *d, size_t n, unsigned char *md, unsigned int *md_len) argument
|
/netbsd-current/crypto/external/bsd/openssl.old/dist/crypto/ct/ |
H A D | ct_sct_ctx.c | 200 unsigned int md_len; local 216 if (!EVP_Digest(der, der_len, md, &md_len, EVP_sha256(), NULL))
|
/netbsd-current/crypto/external/bsd/openssl/dist/crypto/ct/ |
H A D | ct_sct_ctx.c | 210 unsigned int md_len; local 230 if (!EVP_Digest(der, der_len, md, &md_len, sha256, NULL))
|
/netbsd-current/crypto/external/bsd/openssl.old/dist/crypto/sha/ |
H A D | sha256.c | 30 c->md_len = SHA224_DIGEST_LENGTH; 45 c->md_len = SHA256_DIGEST_LENGTH; 104 switch ((c)->md_len) \ 114 if ((c)->md_len > SHA256_DIGEST_LENGTH) \ 116 for (nn=0;nn<(c)->md_len/4;nn++) \
|
H A D | sha512.c | 77 c->md_len = SHA224_DIGEST_LENGTH; 95 c->md_len = SHA256_DIGEST_LENGTH; 113 c->md_len = SHA384_DIGEST_LENGTH; 131 c->md_len = SHA512_DIGEST_LENGTH; 181 switch (c->md_len) { 251 /* ... as well as make sure md_len is not abused. */
|
/netbsd-current/crypto/external/bsd/openssl/dist/crypto/sha/ |
H A D | sha256.c | 37 c->md_len = SHA224_DIGEST_LENGTH; 52 c->md_len = SHA256_DIGEST_LENGTH; 83 switch ((c)->md_len) \ 93 if ((c)->md_len > SHA256_DIGEST_LENGTH) \ 95 for (nn=0;nn<(c)->md_len/4;nn++) \
|
H A D | sha512.c | 92 c->md_len = SHA224_DIGEST_LENGTH; 110 c->md_len = SHA256_DIGEST_LENGTH; 128 c->md_len = SHA384_DIGEST_LENGTH; 146 c->md_len = SHA512_DIGEST_LENGTH; 196 switch (c->md_len) { 266 /* ... as well as make sure md_len is not abused. */
|
/netbsd-current/crypto/external/bsd/openssl/dist/crypto/pkcs7/ |
H A D | pk7_doit.c | 700 unsigned int md_len; local 711 if (!EVP_DigestFinal_ex(mctx, md_data, &md_len)) { 715 if (!PKCS7_add1_attrib_digest(si, md_data, md_len)) { 865 unsigned int md_len; local 869 if (!EVP_DigestFinal_ex(mdc, md_data, &md_len)) 871 if (!ASN1_OCTET_STRING_set(p7->d.digest->digest, md_data, md_len)) 1076 unsigned int md_len; local 1080 if (!EVP_DigestFinal_ex(mdc_tmp, md_dat, &md_len)) 1087 if ((message_digest->length != (int)md_len) || 1088 (memcmp(message_digest->data, md_dat, md_len))) { [all...] |
/netbsd-current/external/bsd/openldap/dist/libraries/libldap/ |
H A D | tls_g.c | 807 int sign_algo, md_len, rc; local 845 md_len = gnutls_hash_get_len( md ); 846 if ( md_len == 0 || md_len > buf->bv_len ) 853 buf->bv_len = md_len; 855 return md_len;
|
H A D | tls_o.c | 1008 unsigned int md_len; local 1039 if ( !X509_digest( cert, md, (unsigned char *) (buf->bv_val), &md_len )) 1042 buf->bv_len = md_len; 1044 return md_len;
|
/netbsd-current/crypto/external/bsd/openssl.old/dist/ssl/statem/ |
H A D | statem_lib.c | 764 size_t md_len; local 801 md_len = s->s3->tmp.peer_finish_md_len; 803 if (md_len != PACKET_remaining(pkt)) { 810 md_len) != 0) { 819 if (!ossl_assert(md_len <= EVP_MAX_MD_SIZE)) { 826 md_len); 827 s->s3->previous_client_finished_len = md_len; 830 md_len); 831 s->s3->previous_server_finished_len = md_len;
|
/netbsd-current/crypto/external/bsd/openssl/dist/ssl/statem/ |
H A D | statem_lib.c | 785 size_t md_len; local 820 md_len = s->s3.tmp.peer_finish_md_len; 822 if (md_len != PACKET_remaining(pkt)) { 828 md_len) != 0) { 836 if (!ossl_assert(md_len <= EVP_MAX_MD_SIZE)) { 842 md_len); 843 s->s3.previous_client_finished_len = md_len; 846 md_len); 847 s->s3.previous_server_finished_len = md_len;
|
H A D | statem_clnt.c | 3019 unsigned int md_len; local 3078 || EVP_DigestFinal_ex(ukm_hash, shared_ukm, &md_len) <= 0) { 3136 unsigned int md_len; local 3146 || EVP_DigestFinal_ex(hash, dgst_buf, &md_len) <= 0) {
|
/netbsd-current/external/bsd/libfido2/dist/fuzz/ |
H A D | wrap.c | 438 unsigned int *md_len), 440 (evp_md, key, key_len, d, n, md, md_len),
|
/netbsd-current/lib/libradius/ |
H A D | radlib.c | 178 u_int md_len; local 191 HMAC_Final(ctx, md, &md_len); 194 (size_t)md_len); 215 u_int md_len; local 274 HMAC_Final(hctx, md, &md_len);
|
/netbsd-current/crypto/external/cpl/trousers/dist/src/tspi/daa/daa_issuer/ |
H A D | key_correctness_proof.c | 85 int *md_len, 148 EVP_DigestFinal_ex(mdctx, md_value, md_len); 84 generateMessageDigest(BYTE *md_value, int *md_len, const TSS_DAA_PK_internal *pk, bi_array_ptr *commitments, const int commitments_size ) argument
|
/netbsd-current/usr.sbin/syslogd/ |
H A D | sign.c | 748 unsigned md_len = 0; local 754 SSL_CHECK_ONE(EVP_DigestFinal_ex(GlobalSign.mdctx, md_value, &md_len)); 756 b64_ntop(md_value, md_len, (char *)md_b64, EVP_MAX_MD_SIZE*2);
|