Symbol: SHA256_DIGEST_LENGTH
crypto/krb5/src/lib/crypto/builtin/hash_provider/hash_sha2.c
45
if (output->length != SHA256_DIGEST_LENGTH)
crypto/krb5/src/lib/crypto/builtin/hash_provider/hash_sha2.c
80
SHA256_DIGEST_LENGTH,
crypto/openssh/digest-libc.c
99
SHA256_DIGEST_LENGTH,
crypto/openssh/openbsd-compat/sha2.c
614
SHA256Final(u_int8_t digest[SHA256_DIGEST_LENGTH], SHA2_CTX *context)
crypto/openssh/openbsd-compat/sha2.c
625
memcpy(digest, context->state.st32, SHA256_DIGEST_LENGTH);
crypto/openssh/openbsd-compat/sha2.h
101
void SHA256Final(u_int8_t [SHA256_DIGEST_LENGTH], SHA2_CTX *)
crypto/openssh/openbsd-compat/sha2.h
102
__attribute__((__bounded__(__minbytes__,1,SHA256_DIGEST_LENGTH)));
crypto/openssh/openbsd-compat/sha2.h
53
#define SHA256_DIGEST_STRING_LENGTH (SHA256_DIGEST_LENGTH * 2 + 1)
crypto/openssh/regress/misc/sk-dummy/sk-dummy.c
321
uint8_t apphash[SHA256_DIGEST_LENGTH];
crypto/openssh/regress/misc/sk-dummy/sk-dummy.c
322
uint8_t sighash[SHA256_DIGEST_LENGTH];
crypto/openssh/regress/misc/sk-dummy/sk-dummy.c
344
if (message_len != SHA256_DIGEST_LENGTH) {
crypto/openssh/regress/misc/sk-dummy/sk-dummy.c
412
uint8_t apphash[SHA256_DIGEST_LENGTH];
crypto/openssh/regress/misc/sk-dummy/sk-dummy.c
414
sizeof(counter) + SHA256_DIGEST_LENGTH];
crypto/openssh/regress/misc/sk-dummy/sk-dummy.c
423
if (message_len != SHA256_DIGEST_LENGTH) {
crypto/openssl/apps/speed.c
1566
unsigned char md[SHA256_DIGEST_LENGTH] = { 0 };
crypto/openssl/apps/speed.c
1567
size_t md_len = SHA256_DIGEST_LENGTH;
crypto/openssl/apps/speed.c
1591
unsigned char md[SHA256_DIGEST_LENGTH] = { 0 };
crypto/openssl/apps/speed.c
1592
size_t md_len = SHA256_DIGEST_LENGTH;
crypto/openssl/apps/speed.c
4319
unsigned char md[SHA256_DIGEST_LENGTH];
crypto/openssl/apps/speed.c
4322
size_t md_len = SHA256_DIGEST_LENGTH;
crypto/openssl/apps/speed.c
4329
memset(md, 0, SHA256_DIGEST_LENGTH);
crypto/openssl/apps/speed.c
4431
memset(md, 0, SHA256_DIGEST_LENGTH);
crypto/openssl/crypto/ct/ct_sct_ctx.c
213
if (*hash != NULL && *hash_len >= SHA256_DIGEST_LENGTH) {
crypto/openssl/crypto/ct/ct_sct_ctx.c
216
md = OPENSSL_malloc(SHA256_DIGEST_LENGTH);
crypto/openssl/crypto/ct/ct_sct_ctx.c
232
*hash_len = SHA256_DIGEST_LENGTH;
crypto/openssl/crypto/evp/e_aes_cbc_hmac_sha256.c
442
else if (len != ((plen + SHA256_DIGEST_LENGTH + AES_BLOCK_SIZE) & -AES_BLOCK_SIZE))
crypto/openssl/crypto/evp/e_aes_cbc_hmac_sha256.c
489
SHA256_Update(&key->md, out + plen, SHA256_DIGEST_LENGTH);
crypto/openssl/crypto/evp/e_aes_cbc_hmac_sha256.c
493
plen += SHA256_DIGEST_LENGTH;
crypto/openssl/crypto/evp/e_aes_cbc_hmac_sha256.c
505
unsigned int u[SHA256_DIGEST_LENGTH / sizeof(unsigned int)];
crypto/openssl/crypto/evp/e_aes_cbc_hmac_sha256.c
506
unsigned char c[64 + SHA256_DIGEST_LENGTH];
crypto/openssl/crypto/evp/e_aes_cbc_hmac_sha256.c
529
if (len < (iv + SHA256_DIGEST_LENGTH + 1))
crypto/openssl/crypto/evp/e_aes_cbc_hmac_sha256.c
538
maxpad = len - (SHA256_DIGEST_LENGTH + 1);
crypto/openssl/crypto/evp/e_aes_cbc_hmac_sha256.c
552
inp_len = len - (SHA256_DIGEST_LENGTH + pad + 1);
crypto/openssl/crypto/evp/e_aes_cbc_hmac_sha256.c
562
len -= SHA256_DIGEST_LENGTH; /* amend mac */
crypto/openssl/crypto/evp/e_aes_cbc_hmac_sha256.c
669
len += SHA256_DIGEST_LENGTH;
crypto/openssl/crypto/evp/e_aes_cbc_hmac_sha256.c
689
SHA256_Update(&key->md, pmac->c, SHA256_DIGEST_LENGTH);
crypto/openssl/crypto/evp/e_aes_cbc_hmac_sha256.c
697
unsigned char *p = out + len - 1 - maxpad - SHA256_DIGEST_LENGTH;
crypto/openssl/crypto/evp/e_aes_cbc_hmac_sha256.c
701
for (res = 0, i = 0, j = 0; j < maxpad + SHA256_DIGEST_LENGTH;
crypto/openssl/crypto/evp/e_aes_cbc_hmac_sha256.c
704
cmask = ((int)(j - off - SHA256_DIGEST_LENGTH)) >> (sizeof(int) * 8 - 1);
crypto/openssl/crypto/evp/e_aes_cbc_hmac_sha256.c
715
for (res = 0, i = 0; i < SHA256_DIGEST_LENGTH; i++)
crypto/openssl/crypto/evp/e_aes_cbc_hmac_sha256.c
797
return (int)(((len + SHA256_DIGEST_LENGTH + AES_BLOCK_SIZE) & -AES_BLOCK_SIZE)
crypto/openssl/crypto/evp/e_aes_cbc_hmac_sha256.c
803
return SHA256_DIGEST_LENGTH;
crypto/openssl/crypto/evp/legacy_sha.c
123
SHA256_DIGEST_LENGTH,
crypto/openssl/crypto/evp/legacy_sha.c
153
SHA256_DIGEST_LENGTH,
crypto/openssl/crypto/ffc/ffc_params_generate.c
543
N = (L >= 2048 ? SHA256_DIGEST_LENGTH : SHA_DIGEST_LENGTH) * 8;
crypto/openssl/crypto/ffc/ffc_params_generate.c
815
unsigned char seed[SHA256_DIGEST_LENGTH];
crypto/openssl/crypto/ffc/ffc_params_generate.c
816
unsigned char buf[SHA256_DIGEST_LENGTH];
crypto/openssl/crypto/ffc/ffc_params_generate.c
839
N = (L >= 2048 ? SHA256_DIGEST_LENGTH : SHA_DIGEST_LENGTH) * 8;
crypto/openssl/crypto/ffc/ffc_params_generate.c
867
&& qsize != SHA256_DIGEST_LENGTH) {
crypto/openssl/crypto/hmac/hmac_s390x.c
273
res_len = SHA256_DIGEST_LENGTH;
crypto/openssl/crypto/hpke/hpke_util.c
105
{ OSSL_HPKE_KDF_ID_HKDF_SHA256, LN_sha256, SHA256_DIGEST_LENGTH },
crypto/openssl/crypto/hpke/hpke_util.c
66
LN_sha256, SHA256_DIGEST_LENGTH, 65, 65, 32, 0xFF },
crypto/openssl/crypto/hpke/hpke_util.c
73
LN_sha256, SHA256_DIGEST_LENGTH,
crypto/openssl/crypto/rsa/rsa_ossl.c
436
unsigned int md_len = SHA256_DIGEST_LENGTH;
crypto/openssl/crypto/rsa/rsa_ossl.c
437
unsigned char d_hash[SHA256_DIGEST_LENGTH] = { 0 };
crypto/openssl/crypto/rsa/rsa_ossl.c
502
md_len = SHA256_DIGEST_LENGTH;
crypto/openssl/crypto/rsa/rsa_ossl.c
521
unsigned char kdk[SHA256_DIGEST_LENGTH] = { 0 };
crypto/openssl/crypto/rsa/rsa_pk1.c
290
unsigned char hmac_out[SHA256_DIGEST_LENGTH];
crypto/openssl/crypto/rsa/rsa_pk1.c
320
if (HMAC_Init_ex(hmac, kdk, SHA256_DIGEST_LENGTH, md, NULL) <= 0) {
crypto/openssl/crypto/rsa/rsa_pk1.c
325
for (pos = 0; pos < tlen; pos += SHA256_DIGEST_LENGTH, iter++) {
crypto/openssl/crypto/rsa/rsa_pk1.c
352
md_len = SHA256_DIGEST_LENGTH;
crypto/openssl/crypto/rsa/rsa_pk1.c
353
if (pos + SHA256_DIGEST_LENGTH > tlen) {
crypto/openssl/crypto/rsa/rsa_sign.c
150
ENCODE_DIGESTINFO_SHA(sha256, 0x01, SHA256_DIGEST_LENGTH)
crypto/openssl/crypto/rsa/rsa_sign.c
155
ENCODE_DIGESTINFO_SHA(sha512_256, 0x06, SHA256_DIGEST_LENGTH)
crypto/openssl/crypto/rsa/rsa_sign.c
157
ENCODE_DIGESTINFO_SHA(sha3_256, 0x08, SHA256_DIGEST_LENGTH)
crypto/openssl/crypto/rsa/rsa_sign.c
231
MD_NID_CASE(sha256, SHA256_DIGEST_LENGTH)
crypto/openssl/crypto/rsa/rsa_sign.c
235
MD_NID_CASE(sha512_256, SHA256_DIGEST_LENGTH)
crypto/openssl/crypto/rsa/rsa_sign.c
237
MD_NID_CASE(sha3_256, SHA256_DIGEST_LENGTH)
crypto/openssl/crypto/sha/sha1_one.c
58
static unsigned char m[SHA256_DIGEST_LENGTH];
crypto/openssl/crypto/sha/sha256.c
105
case SHA256_DIGEST_LENGTH: \
crypto/openssl/crypto/sha/sha256.c
106
for (nn = 0; nn < SHA256_DIGEST_LENGTH / 4; nn++) { \
crypto/openssl/crypto/sha/sha256.c
112
if ((c)->md_len > SHA256_DIGEST_LENGTH) \
crypto/openssl/crypto/sha/sha256.c
53
c->md_len = SHA256_DIGEST_LENGTH;
crypto/openssl/crypto/sha/sha512.c
106
c->md_len = SHA256_DIGEST_LENGTH;
crypto/openssl/crypto/sha/sha512.c
224
case SHA256_DIGEST_LENGTH:
crypto/openssl/crypto/sha/sha512.c
225
for (n = 0; n < SHA256_DIGEST_LENGTH / 8; n++) {
crypto/openssl/engines/e_ossltest.c
134
|| !EVP_MD_meth_set_result_size(md, SHA256_DIGEST_LENGTH)
crypto/openssl/engines/e_ossltest.c
631
fill_known_data(md, SHA256_DIGEST_LENGTH);
crypto/openssl/include/openssl/ct.h
41
#define CT_V1_HASHLEN SHA256_DIGEST_LENGTH
crypto/openssl/providers/implementations/ciphers/cipher_aes_cbc_hmac_sha256_hw.c
415
else if (len != ((plen + SHA256_DIGEST_LENGTH + AES_BLOCK_SIZE) & -AES_BLOCK_SIZE))
crypto/openssl/providers/implementations/ciphers/cipher_aes_cbc_hmac_sha256_hw.c
461
sha256_update(&sctx->md, out + plen, SHA256_DIGEST_LENGTH);
crypto/openssl/providers/implementations/ciphers/cipher_aes_cbc_hmac_sha256_hw.c
465
plen += SHA256_DIGEST_LENGTH;
crypto/openssl/providers/implementations/ciphers/cipher_aes_cbc_hmac_sha256_hw.c
477
unsigned int u[SHA256_DIGEST_LENGTH / sizeof(unsigned int)];
crypto/openssl/providers/implementations/ciphers/cipher_aes_cbc_hmac_sha256_hw.c
478
unsigned char c[64 + SHA256_DIGEST_LENGTH];
crypto/openssl/providers/implementations/ciphers/cipher_aes_cbc_hmac_sha256_hw.c
501
if (len < (iv + SHA256_DIGEST_LENGTH + 1))
crypto/openssl/providers/implementations/ciphers/cipher_aes_cbc_hmac_sha256_hw.c
510
maxpad = len - (SHA256_DIGEST_LENGTH + 1);
crypto/openssl/providers/implementations/ciphers/cipher_aes_cbc_hmac_sha256_hw.c
524
inp_len = len - (SHA256_DIGEST_LENGTH + pad + 1);
crypto/openssl/providers/implementations/ciphers/cipher_aes_cbc_hmac_sha256_hw.c
534
len -= SHA256_DIGEST_LENGTH; /* amend mac */
crypto/openssl/providers/implementations/ciphers/cipher_aes_cbc_hmac_sha256_hw.c
641
len += SHA256_DIGEST_LENGTH;
crypto/openssl/providers/implementations/ciphers/cipher_aes_cbc_hmac_sha256_hw.c
643
sha256_update(&sctx->md, pmac->c, SHA256_DIGEST_LENGTH);
crypto/openssl/providers/implementations/ciphers/cipher_aes_cbc_hmac_sha256_hw.c
651
unsigned char *p = out + len - 1 - maxpad - SHA256_DIGEST_LENGTH;
crypto/openssl/providers/implementations/ciphers/cipher_aes_cbc_hmac_sha256_hw.c
656
j < maxpad + SHA256_DIGEST_LENGTH;
crypto/openssl/providers/implementations/ciphers/cipher_aes_cbc_hmac_sha256_hw.c
659
cmask = ((int)(j - off - SHA256_DIGEST_LENGTH)) >> (sizeof(int) * 8 - 1);
crypto/openssl/providers/implementations/ciphers/cipher_aes_cbc_hmac_sha256_hw.c
66
vctx->removetlsfixed = SHA256_DIGEST_LENGTH + AES_BLOCK_SIZE;
crypto/openssl/providers/implementations/ciphers/cipher_aes_cbc_hmac_sha256_hw.c
735
ctx->tls_aad_pad = (int)(((len + SHA256_DIGEST_LENGTH + AES_BLOCK_SIZE) & -AES_BLOCK_SIZE)
crypto/openssl/providers/implementations/ciphers/cipher_aes_cbc_hmac_sha256_hw.c
741
ctx->tls_aad_pad = SHA256_DIGEST_LENGTH;
crypto/openssl/providers/implementations/digests/sha2_prov.c
72
SHA256_CBLOCK, SHA256_DIGEST_LENGTH, SHA2_FLAGS,
crypto/openssl/providers/implementations/digests/sha2_prov.c
97
SHA512_CBLOCK, SHA256_DIGEST_LENGTH, SHA2_FLAGS,
crypto/openssl/ssl/quic/quic_srt_gen.c
68
unsigned char mac[SHA256_DIGEST_LENGTH];
crypto/openssl/ssl/ssl_local.h
1078
unsigned char cookie_hmac_key[SHA256_DIGEST_LENGTH];
crypto/openssl/ssl/statem/extensions_srvr.c
1013
unsigned char hmac[SHA256_DIGEST_LENGTH];
crypto/openssl/ssl/statem/extensions_srvr.c
1033
if (rawlen < SHA256_DIGEST_LENGTH
crypto/openssl/ssl/statem/extensions_srvr.c
1034
|| !PACKET_forward(&raw, rawlen - SHA256_DIGEST_LENGTH)) {
crypto/openssl/ssl/statem/extensions_srvr.c
1053
hmaclen = SHA256_DIGEST_LENGTH;
crypto/openssl/ssl/statem/extensions_srvr.c
1058
rawlen - SHA256_DIGEST_LENGTH)
crypto/openssl/ssl/statem/extensions_srvr.c
1060
|| hmaclen != SHA256_DIGEST_LENGTH) {
crypto/openssl/ssl/statem/extensions_srvr.c
1070
if (CRYPTO_memcmp(hmac, mdin, SHA256_DIGEST_LENGTH) != 0) {
crypto/openssl/ssl/statem/extensions_srvr.c
1124
|| PACKET_remaining(&cookie) != SHA256_DIGEST_LENGTH) {
crypto/openssl/ssl/statem/extensions_srvr.c
2135
|| !WPACKET_reserve_bytes(pkt, SHA256_DIGEST_LENGTH, &hmac)) {
crypto/openssl/ssl/statem/extensions_srvr.c
2139
hmaclen = SHA256_DIGEST_LENGTH;
crypto/openssl/ssl/statem/extensions_srvr.c
2142
if (!ossl_assert(totcookielen <= MAX_COOKIE_SIZE - SHA256_DIGEST_LENGTH)) {
crypto/openssl/ssl/statem/extensions_srvr.c
26
+ SSL_COOKIE_LENGTH + SHA256_DIGEST_LENGTH)
crypto/openssl/test/evp_fetch_prov_test.c
173
&& TEST_int_eq(EVP_MD_get_size(md), SHA256_DIGEST_LENGTH)
crypto/openssl/test/evp_fetch_prov_test.c
60
unsigned char out[SHA256_DIGEST_LENGTH];
crypto/openssl/test/evp_fetch_prov_test.c
68
|| !TEST_mem_eq(out, SHA256_DIGEST_LENGTH, exptd,
crypto/openssl/test/evp_fetch_prov_test.c
69
SHA256_DIGEST_LENGTH)
crypto/openssl/test/evp_kdf_test.c
268
|| !TEST_size_t_eq(sz, expand_only ? SHA256_DIGEST_LENGTH : SIZE_MAX))
crypto/openssl/test/evp_pkey_provided_test.c
2198
|| !TEST_size_t_eq(len, SHA256_DIGEST_LENGTH)
crypto/openssl/test/evp_pkey_provided_test.c
2200
|| !TEST_size_t_eq(dlen, SHA256_DIGEST_LENGTH))
crypto/openssl/test/helpers/ssltestlib.c
1458
} else if (mdsize == SHA256_DIGEST_LENGTH) {
crypto/openssl/test/sha_test.c
62
static const unsigned char output[SHA256_DIGEST_LENGTH] = {
crypto/openssl/test/sha_test.c
69
return test_static_sha_common("abc", SHA256_DIGEST_LENGTH, output, &SHA256);
crypto/openssl/test/sslapitest.c
3992
: SHA256_DIGEST_LENGTH)))
sbin/hastd/hast_checksum.c
42
#define MAX_HASH_SIZE SHA256_DIGEST_LENGTH
sbin/hastd/hast_checksum.c
67
*hsizep = SHA256_DIGEST_LENGTH;
sbin/veriexec/manifest_parser.y
53
#ifndef SHA256_DIGEST_LENGTH
sbin/veriexec/manifest_parser.y
73
{ "sha256", SHA256_DIGEST_LENGTH },
sys/crypto/openssl/ossl_sha256.c
54
c->md_len = SHA256_DIGEST_LENGTH;
sys/crypto/openssl/ossl_sha256.c
80
case SHA256_DIGEST_LENGTH: \
sys/crypto/openssl/ossl_sha256.c
81
for (nn=0; nn < SHA256_DIGEST_LENGTH / 4; nn++) \
sys/crypto/openssl/ossl_sha512.c
135
case SHA256_DIGEST_LENGTH:
sys/crypto/openssl/ossl_sha512.c
136
for (n = 0; n < SHA256_DIGEST_LENGTH / 8; n++) {
sys/crypto/sha2/sha256.h
36
#define SHA256_DIGEST_STRING_LENGTH (SHA256_DIGEST_LENGTH * 2 + 1)
sys/crypto/sha2/sha256.h
81
void SHA256_Final(unsigned char [__min_size(SHA256_DIGEST_LENGTH)],
sys/crypto/sha2/sha256c.c
316
SHA256_Final(unsigned char digest[static SHA256_DIGEST_LENGTH], SHA256_CTX *ctx)
sys/crypto/sha2/sha256c.c
323
be32enc_vect(digest, ctx->state, SHA256_DIGEST_LENGTH);
sys/dev/qat/qat_api/qat_utils/src/QatUtilsCrypto.c
40
bcopy(&ctx, out, SHA256_DIGEST_LENGTH);
sys/dev/qat/qat_api/qat_utils/src/QatUtilsCrypto.c
52
bcopy(&ctx, out, SHA256_DIGEST_LENGTH);
sys/geom/eli/g_eli.h
135
#define G_ELI_AUTH_SECKEYLEN SHA256_DIGEST_LENGTH
sys/geom/eli/g_eli_hmac.c
141
u_char hash[SHA256_DIGEST_LENGTH];
sys/kern/kern_shutdown.c
1128
uint8_t hash[SHA256_DIGEST_LENGTH];
sys/libkern/arc4random.c
122
_Static_assert(sizeof(key) == SHA256_DIGEST_LENGTH,
sys/netinet6/in6_ifattach.c
419
uint8_t digest[SHA256_DIGEST_LENGTH];
sys/security/mac_veriexec/mac_veriexec_sha256.c
38
MAC_VERIEXEC_FPMOD(SHA256, SHA256_DIGEST_LENGTH, sizeof(SHA256_CTX),
sys/security/mac_veriexec_parser/mac_veriexec_parser.c
224
unsigned char hash[SHA256_DIGEST_LENGTH];
sys/security/mac_veriexec_parser/mac_veriexec_parser.c
230
return (memcmp(expected_hash, hash, SHA256_DIGEST_LENGTH));
sys/security/mac_veriexec_parser/mac_veriexec_parser.c
447
if (strlen(manifest_hash) != 2 * SHA256_DIGEST_LENGTH)
sys/security/mac_veriexec_parser/mac_veriexec_parser.c
58
{"sha256=", SHA256_DIGEST_LENGTH},