SHA256_DIGEST_LENGTH
SHA256_DIGEST_LENGTH,
#define SHA256_DIGEST_STRING_LENGTH (SHA256_DIGEST_LENGTH * 2 + 1)
void SHA256Final(u_int8_t [SHA256_DIGEST_LENGTH], SHA2_CTX *)
__attribute__((__bounded__(__minbytes__,1,SHA256_DIGEST_LENGTH)));
SHA256Final(u_int8_t digest[SHA256_DIGEST_LENGTH], SHA2_CTX *context)
memcpy(digest, context->state.st32, SHA256_DIGEST_LENGTH);
#define CT_V1_HASHLEN SHA256_DIGEST_LENGTH
if (*hash != NULL && *hash_len >= SHA256_DIGEST_LENGTH) {
md = malloc(SHA256_DIGEST_LENGTH);
*hash_len = SHA256_DIGEST_LENGTH;
unsigned char seed[SHA256_DIGEST_LENGTH];
unsigned char md[SHA256_DIGEST_LENGTH];
unsigned char buf[SHA256_DIGEST_LENGTH], buf2[SHA256_DIGEST_LENGTH];
qsize != SHA256_DIGEST_LENGTH)
.md_size = SHA256_DIGEST_LENGTH,
c->md_len = SHA256_DIGEST_LENGTH;
case SHA256_DIGEST_LENGTH:
for (nn = 0; nn < SHA256_DIGEST_LENGTH / 4; nn++) {
if (c->md_len > SHA256_DIGEST_LENGTH)
if (dgst->len < SHA256_DIGEST_LENGTH ||
dgst->len = SHA256_DIGEST_LENGTH;
unsigned char dgst[SHA256_DIGEST_LENGTH];
&dgst_len) == NULL || dgst_len != SHA256_DIGEST_LENGTH)
unsigned char dgst[SHA256_DIGEST_LENGTH];
dgst_len != SHA256_DIGEST_LENGTH) {
unsigned char expected_hash[SHA256_DIGEST_LENGTH];
SHA256_DIGEST_LENGTH));
if (dgst->len != SHA256_DIGEST_LENGTH ||
unsigned char buf[SHA256_DIGEST_LENGTH];
uint8_t dgst[SHA256_DIGEST_LENGTH];
hkdf_sha256(key->ptr + SHA256_DIGEST_LENGTH, aes_info,
HKDF(key, SHA256_DIGEST_LENGTH, md, secret->ptr, secret->len, salt,
size_t keylen = SHA256_DIGEST_LENGTH;
key->len = SHA256_DIGEST_LENGTH;
key->len = 2 * SHA256_DIGEST_LENGTH;
u_char dgst[SHA256_DIGEST_LENGTH];
uint8_t buf[32 + 2 + sizeof(uint32_t) + SHA256_DIGEST_LENGTH];
unsigned char dgst[SHA256_DIGEST_LENGTH];
if ((digest->ptr = calloc(1, SHA256_DIGEST_LENGTH)) == NULL)
digest->len = SHA256_DIGEST_LENGTH;
unsigned char cdh[SHA256_DIGEST_LENGTH];
if (sizeof(name->body) != SHA256_DIGEST_LENGTH ||
unsigned char challenge[SHA256_DIGEST_LENGTH];
unsigned char application[SHA256_DIGEST_LENGTH];
SHA256_DIGEST_LENGTH)) == NULL ||
unsigned char challenge[SHA256_DIGEST_LENGTH];
unsigned char rp_id_hash[SHA256_DIGEST_LENGTH];
SHA256_DIGEST_LENGTH + sizeof(key_id_len) + key_id_len))) == NULL ||
unsigned char rp_id_hash[SHA256_DIGEST_LENGTH];
if (cdh->len != SHA256_DIGEST_LENGTH || key_id->len > UINT8_MAX ||
SHA256_DIGEST_LENGTH + sizeof(key_id_len) + key_id_len))) == NULL ||
unsigned char rp_id_hash[SHA256_DIGEST_LENGTH];
cred->rp.id == NULL || cred->cdh.len != SHA256_DIGEST_LENGTH) {
SHA256_DIGEST_LENGTH)) == NULL ||
unsigned char clientdata_hash[SHA256_DIGEST_LENGTH];
unsigned char rp_id_hash[SHA256_DIGEST_LENGTH];
SHA256_DIGEST_LENGTH)) == NULL ||
uint8_t sha256_digest[SHA256_DIGEST_LENGTH];
print_hex(output, SHA256_DIGEST_LENGTH);
print_hex(output, SHA256_DIGEST_LENGTH);
print_hex(output, SHA256_DIGEST_LENGTH);
uint8_t apphash[SHA256_DIGEST_LENGTH];
uint8_t sighash[SHA256_DIGEST_LENGTH];
if (message_len != SHA256_DIGEST_LENGTH) {
uint8_t apphash[SHA256_DIGEST_LENGTH];
sizeof(counter) + SHA256_DIGEST_LENGTH];
if (message_len != SHA256_DIGEST_LENGTH) {
char h[SHA256_DIGEST_LENGTH];
char hash[SHA256_DIGEST_LENGTH];
char hash[SHA256_DIGEST_LENGTH];
length = SHA256_DIGEST_LENGTH;
length = SHA256_DIGEST_LENGTH;
#if defined(SHA256_DIGEST_LENGTH) && defined(USE_ECDSA)
return SHA256_DIGEST_LENGTH;
ctx->key_len = SHA256_DIGEST_LENGTH;
HMAC_SHA256_Final(u_int8_t digest[SHA256_DIGEST_LENGTH], HMAC_SHA256_CTX *ctx)
SHA256Update(&ctx->ctx, digest, SHA256_DIGEST_LENGTH);
void HMAC_SHA256_Final(u_int8_t [SHA256_DIGEST_LENGTH], HMAC_SHA256_CTX *)
__attribute__((__bounded__(__minbytes__,1,SHA256_DIGEST_LENGTH)));
SHA256_DIGEST_LENGTH);
memcpy(digest, context->state.st32, SHA256_DIGEST_LENGTH);
#define SHA256_DIGEST_STRING_LENGTH (SHA256_DIGEST_LENGTH * 2 + 1)
void SHA256Final(u_int8_t[SHA256_DIGEST_LENGTH], SHA2_CTX *)
__attribute__((__bounded__(__minbytes__,1,SHA256_DIGEST_LENGTH)));
if (bcmp(mine->kern_hash, disk->kern_hash, SHA256_DIGEST_LENGTH) != 0) {
SHA256Final(u_int8_t digest[SHA256_DIGEST_LENGTH], SHA2_CTX *context)
memcpy(digest, context->state.st32, SHA256_DIGEST_LENGTH);
#define SHA256_DIGEST_STRING_LENGTH (SHA256_DIGEST_LENGTH * 2 + 1)
void SHA256Final(u_int8_t [SHA256_DIGEST_LENGTH], SHA2_CTX *)
__attribute__((__bounded__(__minbytes__,1,SHA256_DIGEST_LENGTH)));
u_int8_t digest[SHA256_DIGEST_LENGTH];
if (len < SHA256_DIGEST_LENGTH) {
output += SHA256_DIGEST_LENGTH;
len -= SHA256_DIGEST_LENGTH;
u_int8_t digest[SHA256_DIGEST_LENGTH];
u_int8_t kern_hash[SHA256_DIGEST_LENGTH];
SHA256_DIGEST_LENGTH,
#if defined(SHA256_DIGEST_LENGTH) && defined(SSL_TXT_CHACHA20)
unsigned char hash[SHA256_DIGEST_LENGTH];
return memcmp(a->hash, b->hash, SHA256_DIGEST_LENGTH);
unsigned char mfthash[SHA256_DIGEST_LENGTH]; /* of the parent mft */
unsigned char hash[SHA256_DIGEST_LENGTH]; /* sha256 of body */
unsigned char mfthash[SHA256_DIGEST_LENGTH];
unsigned char crlhash[SHA256_DIGEST_LENGTH];
unsigned char hash[SHA256_DIGEST_LENGTH]; /* the digest */
char hash[SHA256_DIGEST_LENGTH];
char filehash[SHA256_DIGEST_LENGTH];
char hash[SHA256_DIGEST_LENGTH];
if (length != SHA256_DIGEST_LENGTH) {
io_simple_buffer(b, p->files[i].hash, SHA256_DIGEST_LENGTH);
io_read_buf(b, p->files[i].hash, SHA256_DIGEST_LENGTH);
cached_mft->mfthash, SHA256_DIGEST_LENGTH) != 0) {
entp->datasz != SHA256_DIGEST_LENGTH) {
if (base64_encode(ccr_mft->hash, SHA256_DIGEST_LENGTH, &hash)
unsigned char m[SHA256_DIGEST_LENGTH];
char h[SHA256_DIGEST_LENGTH];
char hash[SHA256_DIGEST_LENGTH];
char hash[SHA256_DIGEST_LENGTH];
char *uri = NULL, hash[SHA256_DIGEST_LENGTH];
char delta_hash[SHA256_DIGEST_LENGTH];
char hash[SHA256_DIGEST_LENGTH];
char snapshot_hash[SHA256_DIGEST_LENGTH];
const char hash[SHA256_DIGEST_LENGTH], long long serial)
if (length != SHA256_DIGEST_LENGTH) {
char filehash[SHA256_DIGEST_LENGTH];
char filehash[SHA256_DIGEST_LENGTH];
static unsigned char sha256[SHA256_DIGEST_LENGTH];
#if defined(SHA256_DIGEST_LENGTH) && defined(USE_ECDSA)
return SHA256_DIGEST_LENGTH;