Symbol: SHA256_DIGEST_LENGTH
bin/md5/md5.c
357
SHA256_DIGEST_LENGTH,
include/sha2.h
47
#define SHA256_DIGEST_STRING_LENGTH (SHA256_DIGEST_LENGTH * 2 + 1)
include/sha2.h
92
void SHA256Final(u_int8_t [SHA256_DIGEST_LENGTH], SHA2_CTX *)
include/sha2.h
93
__attribute__((__bounded__(__minbytes__,1,SHA256_DIGEST_LENGTH)));
lib/libc/hash/sha2.c
602
SHA256Final(u_int8_t digest[SHA256_DIGEST_LENGTH], SHA2_CTX *context)
lib/libc/hash/sha2.c
613
memcpy(digest, context->state.st32, SHA256_DIGEST_LENGTH);
lib/libcrypto/ct/ct.h
72
#define CT_V1_HASHLEN SHA256_DIGEST_LENGTH
lib/libcrypto/ct/ct_sct_ctx.c
259
if (*hash != NULL && *hash_len >= SHA256_DIGEST_LENGTH) {
lib/libcrypto/ct/ct_sct_ctx.c
262
md = malloc(SHA256_DIGEST_LENGTH);
lib/libcrypto/ct/ct_sct_ctx.c
278
*hash_len = SHA256_DIGEST_LENGTH;
lib/libcrypto/dsa/dsa_gen.c
108
unsigned char seed[SHA256_DIGEST_LENGTH];
lib/libcrypto/dsa/dsa_gen.c
109
unsigned char md[SHA256_DIGEST_LENGTH];
lib/libcrypto/dsa/dsa_gen.c
110
unsigned char buf[SHA256_DIGEST_LENGTH], buf2[SHA256_DIGEST_LENGTH];
lib/libcrypto/dsa/dsa_gen.c
121
qsize != SHA256_DIGEST_LENGTH)
lib/libcrypto/evp/m_sha1.c
182
.md_size = SHA256_DIGEST_LENGTH,
lib/libcrypto/sha/sha256.c
352
c->md_len = SHA256_DIGEST_LENGTH;
lib/libcrypto/sha/sha256.c
460
case SHA256_DIGEST_LENGTH:
lib/libcrypto/sha/sha256.c
461
for (nn = 0; nn < SHA256_DIGEST_LENGTH / 4; nn++) {
lib/libcrypto/sha/sha256.c
468
if (c->md_len > SHA256_DIGEST_LENGTH)
lib/libfido2/src/assert.c
391
if (dgst->len < SHA256_DIGEST_LENGTH ||
lib/libfido2/src/assert.c
401
dgst->len = SHA256_DIGEST_LENGTH;
lib/libfido2/src/cbor.c
693
unsigned char dgst[SHA256_DIGEST_LENGTH];
lib/libfido2/src/cbor.c
713
&dgst_len) == NULL || dgst_len != SHA256_DIGEST_LENGTH)
lib/libfido2/src/cbor.c
738
unsigned char dgst[SHA256_DIGEST_LENGTH];
lib/libfido2/src/cbor.c
764
dgst_len != SHA256_DIGEST_LENGTH) {
lib/libfido2/src/cred.c
229
unsigned char expected_hash[SHA256_DIGEST_LENGTH];
lib/libfido2/src/cred.c
240
SHA256_DIGEST_LENGTH));
lib/libfido2/src/cred.c
254
if (dgst->len != SHA256_DIGEST_LENGTH ||
lib/libfido2/src/cred.c
330
unsigned char buf[SHA256_DIGEST_LENGTH];
lib/libfido2/src/credman.c
398
uint8_t dgst[SHA256_DIGEST_LENGTH];
lib/libfido2/src/ecdh.c
100
hkdf_sha256(key->ptr + SHA256_DIGEST_LENGTH, aes_info,
lib/libfido2/src/ecdh.c
27
HKDF(key, SHA256_DIGEST_LENGTH, md, secret->ptr, secret->len, salt,
lib/libfido2/src/ecdh.c
40
size_t keylen = SHA256_DIGEST_LENGTH;
lib/libfido2/src/ecdh.c
88
key->len = SHA256_DIGEST_LENGTH;
lib/libfido2/src/ecdh.c
97
key->len = 2 * SHA256_DIGEST_LENGTH;
lib/libfido2/src/largeblob.c
389
u_char dgst[SHA256_DIGEST_LENGTH];
lib/libfido2/src/largeblob.c
466
uint8_t buf[32 + 2 + sizeof(uint32_t) + SHA256_DIGEST_LENGTH];
lib/libfido2/src/largeblob.c
571
unsigned char dgst[SHA256_DIGEST_LENGTH];
lib/libfido2/src/pin.c
21
if ((digest->ptr = calloc(1, SHA256_DIGEST_LENGTH)) == NULL)
lib/libfido2/src/pin.c
24
digest->len = SHA256_DIGEST_LENGTH;
lib/libfido2/src/touch.c
17
unsigned char cdh[SHA256_DIGEST_LENGTH];
lib/libfido2/src/tpm.c
176
if (sizeof(name->body) != SHA256_DIGEST_LENGTH ||
lib/libfido2/src/u2f.c
146
unsigned char challenge[SHA256_DIGEST_LENGTH];
lib/libfido2/src/u2f.c
147
unsigned char application[SHA256_DIGEST_LENGTH];
lib/libfido2/src/u2f.c
156
SHA256_DIGEST_LENGTH)) == NULL ||
lib/libfido2/src/u2f.c
195
unsigned char challenge[SHA256_DIGEST_LENGTH];
lib/libfido2/src/u2f.c
196
unsigned char rp_id_hash[SHA256_DIGEST_LENGTH];
lib/libfido2/src/u2f.c
221
SHA256_DIGEST_LENGTH + sizeof(key_id_len) + key_id_len))) == NULL ||
lib/libfido2/src/u2f.c
301
unsigned char rp_id_hash[SHA256_DIGEST_LENGTH];
lib/libfido2/src/u2f.c
311
if (cdh->len != SHA256_DIGEST_LENGTH || key_id->len > UINT8_MAX ||
lib/libfido2/src/u2f.c
329
SHA256_DIGEST_LENGTH + sizeof(key_id_len) + key_id_len))) == NULL ||
lib/libfido2/src/u2f.c
645
unsigned char rp_id_hash[SHA256_DIGEST_LENGTH];
lib/libfido2/src/u2f.c
658
cred->rp.id == NULL || cred->cdh.len != SHA256_DIGEST_LENGTH) {
lib/libfido2/src/u2f.c
689
SHA256_DIGEST_LENGTH)) == NULL ||
lib/libfido2/src/u2f.c
837
unsigned char clientdata_hash[SHA256_DIGEST_LENGTH];
lib/libfido2/src/u2f.c
838
unsigned char rp_id_hash[SHA256_DIGEST_LENGTH];
lib/libfido2/src/u2f.c
853
SHA256_DIGEST_LENGTH)) == NULL ||
regress/lib/libc/hash/hash_test.c
850
uint8_t sha256_digest[SHA256_DIGEST_LENGTH];
regress/sys/crypto/hmac/hmac_test.c
78
print_hex(output, SHA256_DIGEST_LENGTH);
regress/sys/crypto/hmac/hmac_test.c
83
print_hex(output, SHA256_DIGEST_LENGTH);
regress/sys/crypto/hmac/hmac_test.c
89
print_hex(output, SHA256_DIGEST_LENGTH);
regress/usr.bin/ssh/misc/sk-dummy/sk-dummy.c
302
uint8_t apphash[SHA256_DIGEST_LENGTH];
regress/usr.bin/ssh/misc/sk-dummy/sk-dummy.c
303
uint8_t sighash[SHA256_DIGEST_LENGTH];
regress/usr.bin/ssh/misc/sk-dummy/sk-dummy.c
325
if (message_len != SHA256_DIGEST_LENGTH) {
regress/usr.bin/ssh/misc/sk-dummy/sk-dummy.c
390
uint8_t apphash[SHA256_DIGEST_LENGTH];
regress/usr.bin/ssh/misc/sk-dummy/sk-dummy.c
392
sizeof(counter) + SHA256_DIGEST_LENGTH];
regress/usr.bin/ssh/misc/sk-dummy/sk-dummy.c
401
if (message_len != SHA256_DIGEST_LENGTH) {
regress/usr.sbin/rpki-client/test-rrdp.c
246
char h[SHA256_DIGEST_LENGTH];
regress/usr.sbin/rpki-client/test-rrdp.c
278
char hash[SHA256_DIGEST_LENGTH];
regress/usr.sbin/rpki-client/test-rrdp.c
71
char hash[SHA256_DIGEST_LENGTH];
sbin/iked/crypto.c
198
length = SHA256_DIGEST_LENGTH;
sbin/iked/crypto.c
234
length = SHA256_DIGEST_LENGTH;
sbin/unwind/libunbound/util/net_help.c
1278
#if defined(SHA256_DIGEST_LENGTH) && defined(USE_ECDSA)
sbin/unwind/libunbound/validator/val_secalgo.c
246
return SHA256_DIGEST_LENGTH;
sys/crypto/hmac.c
150
ctx->key_len = SHA256_DIGEST_LENGTH;
sys/crypto/hmac.c
174
HMAC_SHA256_Final(u_int8_t digest[SHA256_DIGEST_LENGTH], HMAC_SHA256_CTX *ctx)
sys/crypto/hmac.c
188
SHA256Update(&ctx->ctx, digest, SHA256_DIGEST_LENGTH);
sys/crypto/hmac.h
60
void HMAC_SHA256_Final(u_int8_t [SHA256_DIGEST_LENGTH], HMAC_SHA256_CTX *)
sys/crypto/hmac.h
61
__attribute__((__bounded__(__minbytes__,1,SHA256_DIGEST_LENGTH)));
sys/crypto/sha2.c
260
SHA256_DIGEST_LENGTH);
sys/crypto/sha2.c
524
memcpy(digest, context->state.st32, SHA256_DIGEST_LENGTH);
sys/crypto/sha2.h
44
#define SHA256_DIGEST_STRING_LENGTH (SHA256_DIGEST_LENGTH * 2 + 1)
sys/crypto/sha2.h
67
void SHA256Final(u_int8_t[SHA256_DIGEST_LENGTH], SHA2_CTX *)
sys/crypto/sha2.h
68
__attribute__((__bounded__(__minbytes__,1,SHA256_DIGEST_LENGTH)));
sys/kern/subr_hibernate.c
961
if (bcmp(mine->kern_hash, disk->kern_hash, SHA256_DIGEST_LENGTH) != 0) {
sys/lib/libsa/sha2.c
594
SHA256Final(u_int8_t digest[SHA256_DIGEST_LENGTH], SHA2_CTX *context)
sys/lib/libsa/sha2.c
605
memcpy(digest, context->state.st32, SHA256_DIGEST_LENGTH);
sys/lib/libsa/sha2.h
47
#define SHA256_DIGEST_STRING_LENGTH (SHA256_DIGEST_LENGTH * 2 + 1)
sys/lib/libsa/sha2.h
92
void SHA256Final(u_int8_t [SHA256_DIGEST_LENGTH], SHA2_CTX *)
sys/lib/libsa/sha2.h
93
__attribute__((__bounded__(__minbytes__,1,SHA256_DIGEST_LENGTH)));
sys/net80211/ieee80211_crypto.c
360
u_int8_t digest[SHA256_DIGEST_LENGTH];
sys/net80211/ieee80211_crypto.c
371
if (len < SHA256_DIGEST_LENGTH) {
sys/net80211/ieee80211_crypto.c
378
output += SHA256_DIGEST_LENGTH;
sys/net80211/ieee80211_crypto.c
379
len -= SHA256_DIGEST_LENGTH;
sys/net80211/ieee80211_crypto.c
438
u_int8_t digest[SHA256_DIGEST_LENGTH];
sys/sys/hibernate.h
103
u_int8_t kern_hash[SHA256_DIGEST_LENGTH];
usr.bin/ssh/digest-libc.c
78
SHA256_DIGEST_LENGTH,
usr.sbin/nsd/server.c
2211
#if defined(SHA256_DIGEST_LENGTH) && defined(SSL_TXT_CHACHA20)
usr.sbin/rpki-client/ccr.c
226
unsigned char hash[SHA256_DIGEST_LENGTH];
usr.sbin/rpki-client/ccr.c
738
return memcmp(a->hash, b->hash, SHA256_DIGEST_LENGTH);
usr.sbin/rpki-client/extern.h
147
unsigned char mfthash[SHA256_DIGEST_LENGTH]; /* of the parent mft */
usr.sbin/rpki-client/extern.h
221
unsigned char hash[SHA256_DIGEST_LENGTH]; /* sha256 of body */
usr.sbin/rpki-client/extern.h
236
unsigned char mfthash[SHA256_DIGEST_LENGTH];
usr.sbin/rpki-client/extern.h
238
unsigned char crlhash[SHA256_DIGEST_LENGTH];
usr.sbin/rpki-client/extern.h
279
unsigned char hash[SHA256_DIGEST_LENGTH]; /* the digest */
usr.sbin/rpki-client/extern.h
444
char hash[SHA256_DIGEST_LENGTH];
usr.sbin/rpki-client/filemode.c
436
char filehash[SHA256_DIGEST_LENGTH];
usr.sbin/rpki-client/main.c
748
char hash[SHA256_DIGEST_LENGTH];
usr.sbin/rpki-client/mft.c
174
if (length != SHA256_DIGEST_LENGTH) {
usr.sbin/rpki-client/mft.c
500
io_simple_buffer(b, p->files[i].hash, SHA256_DIGEST_LENGTH);
usr.sbin/rpki-client/mft.c
541
io_read_buf(b, p->files[i].hash, SHA256_DIGEST_LENGTH);
usr.sbin/rpki-client/parser.c
468
cached_mft->mfthash, SHA256_DIGEST_LENGTH) != 0) {
usr.sbin/rpki-client/parser.c
896
entp->datasz != SHA256_DIGEST_LENGTH) {
usr.sbin/rpki-client/print.c
825
if (base64_encode(ccr_mft->hash, SHA256_DIGEST_LENGTH, &hash)
usr.sbin/rpki-client/repo.c
231
unsigned char m[SHA256_DIGEST_LENGTH];
usr.sbin/rpki-client/rrdp.c
509
char h[SHA256_DIGEST_LENGTH];
usr.sbin/rpki-client/rrdp.c
65
char hash[SHA256_DIGEST_LENGTH];
usr.sbin/rpki-client/rrdp.h
42
char hash[SHA256_DIGEST_LENGTH];
usr.sbin/rpki-client/rrdp_delta.c
114
char *uri = NULL, hash[SHA256_DIGEST_LENGTH];
usr.sbin/rpki-client/rrdp_notification.c
266
char delta_hash[SHA256_DIGEST_LENGTH];
usr.sbin/rpki-client/rrdp_notification.c
46
char hash[SHA256_DIGEST_LENGTH];
usr.sbin/rpki-client/rrdp_notification.c
60
char snapshot_hash[SHA256_DIGEST_LENGTH];
usr.sbin/rpki-client/rrdp_notification.c
72
const char hash[SHA256_DIGEST_LENGTH], long long serial)
usr.sbin/rpki-client/rsc.c
260
if (length != SHA256_DIGEST_LENGTH) {
usr.sbin/rpki-client/validate.c
176
char filehash[SHA256_DIGEST_LENGTH];
usr.sbin/rpki-client/validate.c
203
char filehash[SHA256_DIGEST_LENGTH];
usr.sbin/snmpd/parse.y
143
static unsigned char sha256[SHA256_DIGEST_LENGTH];
usr.sbin/unbound/util/net_help.c
1278
#if defined(SHA256_DIGEST_LENGTH) && defined(USE_ECDSA)
usr.sbin/unbound/validator/val_secalgo.c
246
return SHA256_DIGEST_LENGTH;