/freebsd/contrib/ntp/libntp/ |
H A D | ssl_init.c | 96 u_int digest_len; 148 digest_len = (md) ? EVP_MD_size(md) : 0; in keytype_from_text() 150 if (!md || digest_len <= 0) { in keytype_from_text() 153 digest_len = CMAC_LENGTH; in keytype_from_text() 172 if (digest_len > max_digest_len) { in keytype_from_text() 175 keytype_name(key_type), digest_len, in keytype_from_text() 179 keytype_name(key_type), digest_len, in keytype_from_text() 184 digest_len = MD5_LENGTH; in keytype_from_text() 186 *pdigest_len = digest_len; in keytype_from_text() 103 u_int digest_len; keytype_from_text() local
|
/freebsd/sys/contrib/openzfs/module/icp/io/ |
H A D | sha2_mod.c | 210 ulong_t digest_len, uchar_t *digest_scratch) in sha2_digest_final_uio() argument 233 if (offset + digest_len <= in sha2_digest_final_uio() 240 if (digest_len != SHA512_DIGEST_LENGTH) { in sha2_digest_final_uio() 250 digest_scratch, digest_len); in sha2_digest_final_uio() 266 size_t length = digest_len; in sha2_digest_final_uio() 461 uint32_t digest_len, sha_digest_len; in sha2_mac_final() local 468 sha_digest_len = digest_len = SHA512_DIGEST_LENGTH; in sha2_mac_final() 478 if ((mac->cd_length == 0) || (mac->cd_length < digest_len)) { in sha2_mac_final() 479 mac->cd_length = digest_len; in sha2_mac_final() 501 if (digest_len != sha_digest_len) { in sha2_mac_final() [all …]
|
/freebsd/crypto/openssl/demos/digest/ |
H A D | EVP_MD_xof.c | 50 unsigned int digest_len = 20; in main() local 62 digest_len = (unsigned int)digest_len_i; in main() 98 digest = OPENSSL_malloc(digest_len); in main() 105 if (EVP_DigestFinalXOF(ctx, digest, digest_len) == 0) { in main() 111 BIO_dump_indent_fp(stdout, digest, digest_len, 2); in main() 114 if (digest_len == 20) { in main()
|
/freebsd/crypto/openssh/ |
H A D | dns.c | 82 u_char **digest, size_t *digest_len, struct sshkey *key) in dns_read_key() argument 120 digest_len)) != 0) in dns_read_key() 125 *digest_len = 0; in dns_read_key() 136 u_char **digest, size_t *digest_len, u_char *rdata, int rdata_len) in dns_read_rdata() argument 146 *digest_len = rdata_len - 2; in dns_read_rdata() 148 if (*digest_len > 0) { in dns_read_rdata() 149 *digest = xmalloc(*digest_len); in dns_read_rdata() 150 memcpy(*digest, rdata + 2, *digest_len); in dns_read_rdata()
|
H A D | digest-openssl.c | 53 size_t digest_len; member 104 return digest == NULL ? 0 : digest->digest_len; in ssh_digest_bytes() 166 if (dlen < digest->digest_len) /* No truncation allowed */ in ssh_digest_final() 170 if (l != digest->digest_len) /* sanity */ in ssh_digest_final() 194 if (dlen < digest->digest_len) in ssh_digest_memory()
|
H A D | digest-libc.c | 66 size_t digest_len; member 162 return digest == NULL ? 0 : digest->digest_len; in ssh_digest_bytes() 227 if (dlen < digest->digest_len) /* No truncation allowed */ in ssh_digest_final()
|
H A D | pkcs11.h | 865 unsigned long *digest_len)); 874 unsigned long *digest_len));
|
/freebsd/usr.sbin/uefisign/ |
H A D | uefisign.c | 151 magic(PKCS7 *pkcs7, const char *digest, size_t digest_len) in magic() argument 161 digest_hex = bin2hex(digest, digest_len); in magic() 248 size_t digest_len, signature_len; in sign() local 254 receive_chunk(&digest, &digest_len, pipefd); in sign() 256 bio = BIO_new_mem_buf(digest, digest_len); in sign() 287 magic(pkcs7, digest, digest_len); in sign()
|
/freebsd/crypto/openssl/demos/mac/ |
H A D | siphash.c | 53 unsigned int digest_len = 8, c_rounds = 2, d_rounds = 4; in main() local 77 *p++ = OSSL_PARAM_construct_uint(OSSL_MAC_PARAM_SIZE, &digest_len); in main()
|
/freebsd/sys/security/mac_veriexec/ |
H A D | mac_veriexec.h | 119 size_t digest_len; member 149 .digest_len = _digest_len, \
|
H A D | veriexec_fingerprint.c | 171 for (offset = 0; offset < ip->ops->digest_len; offset++) in evaluate_fingerprint() 198 return memcmp(ip->fingerprint, digest, ip->ops->digest_len); in fingerprintcmp() 385 if (fpops->type == NULL || fpops->digest_len == 0 || in mac_veriexec_fingerprint_add_ops()
|
H A D | veriexec_metadata.c | 560 len = ip->ops->digest_len; in mac_veriexec_metadata_fetch_fingerprint_status() 681 fpops->digest_len); in mac_veriexec_metadata_add_file() 737 memcpy(ip->fingerprint, fingerprint, fpops->digest_len); in mac_veriexec_metadata_add_file() 753 for (offset = 0; offset < fpops->digest_len; offset++) in mac_veriexec_metadata_add_file()
|
H A D | mac_veriexec.c | 992 ip->ops->digest_len); in mac_veriexec_syscall() 1006 ip->ops->digest_len); in mac_veriexec_syscall()
|
/freebsd/crypto/heimdal/lib/roken/ |
H A D | resolve-test.c | 169 (unsigned long)ds->digest_len); in main() 170 for (i = 0; i < ds->digest_len; i++) in main()
|
H A D | resolve.c | 367 size_t digest_len; in parse_record() local 374 digest_len = size - 4; in parse_record() 376 rr->u.ds = malloc (sizeof(*rr->u.ds) + digest_len - 1); in parse_record() 385 rr->u.ds->digest_len = digest_len; in parse_record() 386 memcpy (rr->u.ds->digest_data, p + 4, digest_len); in parse_record() 854 rr->u.ds->digest_len = pRec->Data.DS.wDigestLength; in parse_dns_record()
|
H A D | resolve.h | 179 size_t digest_len; member
|
/freebsd/tools/tools/crypto/ |
H A D | cryptocheck.c | 580 u_int digest_len; in run_hash_test() local 593 digest_len = sizeof(control_digest); in run_hash_test() 594 if (!openssl_hash(alg, md, buffer, size, control_digest, &digest_len)) in run_hash_test() 659 u_int key_len, digest_len; in run_hmac_test() local 674 digest_len = sizeof(control_digest); in run_hmac_test() 676 (u_char *)control_digest, &digest_len) == NULL) { in run_hmac_test() 956 u_int iv_len, auth_key_len, cipher_key_len, digest_len; in run_eta_test() local 1007 digest_len = sizeof(control_digest); in run_eta_test() 1009 aad_len + size, (u_char *)control_digest, &digest_len) == NULL) { in run_eta_test()
|
/freebsd/contrib/ntp/ntpdc/ |
H A D | ntpdc.c | 1766 size_t digest_len; in keytype() local 1777 digest_len = 0; in keytype() 1778 key_type = keytype_from_text(digest_name, &digest_len); in keytype() 1791 info_auth_hashlen = digest_len; in keytype()
|
/freebsd/crypto/openssl/apps/ |
H A D | ts.c | 534 long digest_len; in create_digest() local 536 *md_value = OPENSSL_hexstr2buf(digest, &digest_len); in create_digest() 537 if (*md_value == NULL || md_value_len != digest_len) { in create_digest()
|
/freebsd/sys/dev/ice/ |
H A D | virtchnl_inline_ipsec.h |
|
/freebsd/tests/sys/kern/ |
H A D | ktls_test.c | 367 u_int *digest_len) in compute_hash() argument 395 if (HMAC_Final(ctx, digest, digest_len) != 1) { in compute_hash() 410 u_int digest_len; in verify_hash() local 413 &digest_len)) in verify_hash() 415 if (memcmp(digest, digest2, digest_len) != 0) { in verify_hash() 996 u_int digest_len, i; in encrypt_tls_aes_cbc_mte() local 1032 &aad, sizeof(aad), src, len, buf + hdr_len + len, &digest_len)); in encrypt_tls_aes_cbc_mte() 1033 ATF_REQUIRE_INTEQ(mac_len, digest_len); in encrypt_tls_aes_cbc_mte()
|
/freebsd/crypto/heimdal/lib/hx509/ref/ |
H A D | pkcs11.h | 865 unsigned long *digest_len)); 874 unsigned long *digest_len));
|
/freebsd/crypto/openssl/test/ |
H A D | acvp_test.c | 626 unsigned int digest_len; in dsa_sigver_test() local 646 digest, &digest_len, md, NULL))) in dsa_sigver_test() 652 || !TEST_int_eq(EVP_PKEY_verify(ctx, sig, sig_len, digest, digest_len), in dsa_sigver_test()
|
/freebsd/contrib/ntp/ntpq/ |
H A D | ntpq.c | 2649 size_t digest_len; in keytype() 2660 digest_len = 0; in keytype() 2661 key_type = keytype_from_text(digest_name, &digest_len); in keytype() 2674 info_auth_hashlen = digest_len; in keytype() 2653 size_t digest_len; keytype() local
|