Symbol: SHA_DIGEST_LENGTH
lib/libcrypto/asn1/t_x509.c
299
unsigned char SHA1md[SHA_DIGEST_LENGTH];
lib/libcrypto/asn1/t_x509.c
314
for (i = 0; i < SHA_DIGEST_LENGTH; i++) {
lib/libcrypto/asn1/t_x509.c
330
for (i = 0; i < SHA_DIGEST_LENGTH; i++) {
lib/libcrypto/dsa/dsa_gen.c
120
if (qsize != SHA_DIGEST_LENGTH && qsize != SHA224_DIGEST_LENGTH &&
lib/libcrypto/evp/m_md5_sha1.c
76
.md_size = MD5_DIGEST_LENGTH + SHA_DIGEST_LENGTH,
lib/libcrypto/evp/m_sha1.c
97
.md_size = SHA_DIGEST_LENGTH,
lib/libcrypto/ocsp/ocsp_srv.c
254
unsigned char md[SHA_DIGEST_LENGTH];
lib/libcrypto/ocsp/ocsp_srv.c
260
SHA_DIGEST_LENGTH)))
lib/libcrypto/ocsp/ocsp_vfy.c
223
unsigned char tmphash[SHA_DIGEST_LENGTH];
lib/libcrypto/ocsp/ocsp_vfy.c
237
if (ASN1_STRING_length(byKey) != SHA_DIGEST_LENGTH)
lib/libcrypto/ocsp/ocsp_vfy.c
244
if (!memcmp(keyhash, tmphash, SHA_DIGEST_LENGTH))
lib/libcrypto/rsa/rsa_ameth.c
748
if (saltlen != SHA_DIGEST_LENGTH) {
lib/libcrypto/x509/x509_cmp.c
266
unsigned char md[SHA_DIGEST_LENGTH];
lib/libcrypto/x509/x509_local.h
69
#define TS_HASH_LEN SHA_DIGEST_LENGTH
lib/libfido2/src/tpm.c
153
if ((dgst->size = sizeof(dgst->body)) != SHA_DIGEST_LENGTH ||
lib/libfido2/src/tpm.c
382
if (dgst->len < SHA_DIGEST_LENGTH ||
lib/libfido2/src/tpm.c
387
dgst->len = SHA_DIGEST_LENGTH;
lib/libssl/ssl_clnt.c
2089
if (!ECDSA_sign(0, &data[MD5_DIGEST_LENGTH], SHA_DIGEST_LENGTH,
lib/libssl/ssl_srvr.c
1996
MD5_DIGEST_LENGTH + SHA_DIGEST_LENGTH, CBS_data(&signature),
lib/libssl/ssl_srvr.c
2018
SHA_DIGEST_LENGTH, CBS_data(&signature),
regress/lib/libcrypto/ec/ec_asn1_test.c
2494
char md[SHA_DIGEST_LENGTH];
regress/lib/libcrypto/ec/ec_asn1_test.c
2557
if (seed_len != SHA_DIGEST_LENGTH) {
regress/lib/libcrypto/ec/ec_asn1_test.c
2559
"want %d, got %zu\n", __func__, SHA_DIGEST_LENGTH, seed_len);
regress/lib/libcrypto/ec/ec_asn1_test.c
2611
if (!BN_lshift(r, r, 8 * SHA_DIGEST_LENGTH))
regress/lib/libcrypto/ecdh/ecdhtest.c
101
if (*outlen < SHA_DIGEST_LENGTH)
regress/lib/libcrypto/ecdh/ecdhtest.c
103
*outlen = SHA_DIGEST_LENGTH;
regress/lib/libcrypto/ecdh/ecdhtest.c
114
int len = SHA_DIGEST_LENGTH;
sbin/iked/ca.c
1108
ibuf_size(env->sc_certreq) / SHA_DIGEST_LENGTH,
sbin/iked/ca.c
1109
ibuf_size(env->sc_certreq) == SHA_DIGEST_LENGTH ?
sbin/iked/ca.c
1358
if (*size < SHA_DIGEST_LENGTH)
sbin/iked/ca.c
805
if (len == 0 || len % SHA_DIGEST_LENGTH) {
sbin/iked/ca.c
815
for (i = 0; i < len; i += SHA_DIGEST_LENGTH) {
sbin/iked/ca.c
817
SHA_DIGEST_LENGTH)) == NULL)
sbin/iked/chap_ms.c
157
uint8_t md[SHA_DIGEST_LENGTH];
sbin/iked/chap_ms.c
203
uint8_t md[SHA_DIGEST_LENGTH], *ptr;
sbin/iked/chap_ms.c
253
for (i = 0; i < SHA_DIGEST_LENGTH; i++) {
sbin/iked/chap_ms.c
263
uint8_t md[SHA_DIGEST_LENGTH];
sbin/iked/chap_ms.c
290
uint8_t md[SHA_DIGEST_LENGTH];
sbin/iked/crypto.c
194
length = SHA_DIGEST_LENGTH;
sbin/iked/crypto.c
229
length = SHA_DIGEST_LENGTH;
sbin/iked/ikev2.c
2326
uint8_t md[SHA_DIGEST_LENGTH];
sbin/iked/ikev2_pld.c
1053
uint8_t *buf, md[SHA_DIGEST_LENGTH];
sbin/iked/ikev2_pld.c
914
if ((len % SHA_DIGEST_LENGTH) != 0) {
sbin/unwind/libunbound/sldns/keyraw.c
217
if(len < (size_t)1 + SHA_DIGEST_LENGTH + 3*length)
sbin/unwind/libunbound/sldns/keyraw.c
220
*q = BN_bin2bn(key+offset, SHA_DIGEST_LENGTH, NULL);
sbin/unwind/libunbound/sldns/keyraw.c
221
offset += SHA_DIGEST_LENGTH;
sbin/unwind/libunbound/validator/val_neg.c
47
#define NSEC3_SHA_LEN SHA_DIGEST_LENGTH
sbin/unwind/libunbound/validator/val_secalgo.c
123
return SHA_DIGEST_LENGTH;
sbin/unwind/libunbound/validator/val_secalgo.c
239
return SHA_DIGEST_LENGTH;
sbin/unwind/libunbound/validator/val_secalgo.c
414
if(origlen < 1 + 2*SHA_DIGEST_LENGTH)
sbin/unwind/libunbound/validator/val_secalgo.c
418
(void) BN_bin2bn(orig + 1, SHA_DIGEST_LENGTH, R);
sbin/unwind/libunbound/validator/val_secalgo.c
421
(void) BN_bin2bn(orig + 21, SHA_DIGEST_LENGTH, S);
sbin/unwind/libunbound/validator/val_secalgo.c
762
sigblock_len == 1+2*SHA_DIGEST_LENGTH) {
usr.bin/openssl/speed.c
1003
if (*outlen < SHA_DIGEST_LENGTH)
usr.bin/openssl/speed.c
1006
*outlen = SHA_DIGEST_LENGTH;
usr.bin/openssl/x509.c
1509
if (*md_len < SHA_DIGEST_LENGTH)
usr.sbin/ldapd/auth.c
214
unsigned char md[SHA_DIGEST_LENGTH];
usr.sbin/ldapd/auth.c
225
if (sz != SHA_DIGEST_LENGTH)
usr.sbin/ldapd/auth.c
230
return (bcmp(md, tmp, SHA_DIGEST_LENGTH) == 0 ? 1 : 0);
usr.sbin/ldapd/auth.c
233
if (sz <= SHA_DIGEST_LENGTH)
usr.sbin/ldapd/auth.c
235
salt = tmp + SHA_DIGEST_LENGTH;
usr.sbin/ldapd/auth.c
238
SHA1_Update(&ctx, salt, sz - SHA_DIGEST_LENGTH);
usr.sbin/ldapd/auth.c
240
return (bcmp(md, tmp, SHA_DIGEST_LENGTH) == 0 ? 1 : 0);
usr.sbin/ldapd/btree.c
117
unsigned char hash[SHA_DIGEST_LENGTH];
usr.sbin/ldapd/btree.c
975
unsigned char hash[SHA_DIGEST_LENGTH];
usr.sbin/ldapd/btree.c
991
if (bcmp(hash, m->hash, SHA_DIGEST_LENGTH) != 0) {
usr.sbin/npppd/npppd/chap_ms.c
152
u_int8_t md[SHA_DIGEST_LENGTH];
usr.sbin/npppd/npppd/chap_ms.c
196
u_int8_t md[SHA_DIGEST_LENGTH], *ptr;
usr.sbin/npppd/npppd/chap_ms.c
244
for (i = 0; i < SHA_DIGEST_LENGTH; i++) {
usr.sbin/npppd/npppd/chap_ms.c
254
u_int8_t md[SHA_DIGEST_LENGTH];
usr.sbin/npppd/npppd/chap_ms.c
279
u_int8_t md[SHA_DIGEST_LENGTH];
usr.sbin/nsd/iterated_hash.c
24
iterated_hash(unsigned char out[SHA_DIGEST_LENGTH],
usr.sbin/nsd/iterated_hash.c
66
inlength=SHA_DIGEST_LENGTH;
usr.sbin/nsd/iterated_hash.c
72
return SHA_DIGEST_LENGTH;
usr.sbin/nsd/iterated_hash.h
18
int iterated_hash(unsigned char out[SHA_DIGEST_LENGTH],
usr.sbin/nsd/nsec3.c
109
char b32[SHA_DIGEST_LENGTH*2+1];
usr.sbin/nsd/nsec3.c
110
b32_ntop(hash, SHA_DIGEST_LENGTH, b32, sizeof(b32));
usr.sbin/radiusctl/chap_ms.c
152
u_int8_t md[SHA_DIGEST_LENGTH];
usr.sbin/radiusctl/chap_ms.c
196
u_int8_t md[SHA_DIGEST_LENGTH], *ptr;
usr.sbin/radiusctl/chap_ms.c
244
for (i = 0; i < SHA_DIGEST_LENGTH; i++) {
usr.sbin/radiusctl/chap_ms.c
254
u_int8_t md[SHA_DIGEST_LENGTH];
usr.sbin/radiusctl/chap_ms.c
279
u_int8_t md[SHA_DIGEST_LENGTH];
usr.sbin/radiusd/chap_ms.c
152
u_int8_t md[SHA_DIGEST_LENGTH];
usr.sbin/radiusd/chap_ms.c
196
u_int8_t md[SHA_DIGEST_LENGTH], *ptr;
usr.sbin/radiusd/chap_ms.c
244
for (i = 0; i < SHA_DIGEST_LENGTH; i++) {
usr.sbin/radiusd/chap_ms.c
254
u_int8_t md[SHA_DIGEST_LENGTH];
usr.sbin/radiusd/chap_ms.c
279
u_int8_t md[SHA_DIGEST_LENGTH];
usr.sbin/rpki-client/ccr.c
1477
if (ASN1_STRING_length(rk->ski) != SHA_DIGEST_LENGTH) {
usr.sbin/rpki-client/ccr.c
579
static char hbuf[SHA_DIGEST_LENGTH] = { 0 };
usr.sbin/rpki-client/ccr.c
691
return memcmp(a->keyid, b->keyid, SHA_DIGEST_LENGTH);
usr.sbin/rpki-client/cert.c
503
if (length != SHA_DIGEST_LENGTH) {
usr.sbin/rpki-client/cert.c
506
fn, SHA_DIGEST_LENGTH, length);
usr.sbin/rpki-client/crl.c
111
if (dsz != SHA_DIGEST_LENGTH) {
usr.sbin/rpki-client/crl.c
114
fn, SHA_DIGEST_LENGTH, dsz);
usr.sbin/rpki-client/extern.h
437
unsigned char ski[SHA_DIGEST_LENGTH];
usr.sbin/rpki-client/extern.h
445
char aki[SHA_DIGEST_LENGTH];
usr.sbin/rpki-client/extern.h
461
unsigned char keyid[SHA_DIGEST_LENGTH];
usr.sbin/rpki-client/print.c
828
aki = hex_encode(ccr_mft->aki, SHA_DIGEST_LENGTH);
usr.sbin/rpki-client/print.c
842
ski = hex_encode(sub->ski, SHA_DIGEST_LENGTH);
usr.sbin/rpki-client/print.c
865
ski = hex_encode(sub->ski, SHA_DIGEST_LENGTH);
usr.sbin/sasyncd/net.c
328
u_int8_t hash[SHA_DIGEST_LENGTH];
usr.sbin/sasyncd/net.c
666
u_int8_t *msg, *blob, *rhash, *iv, hash[SHA_DIGEST_LENGTH];
usr.sbin/smtpd/srs.c
107
base64_encode_rfc3548(srs_hash(env->sc_srs_key, tmp), SHA_DIGEST_LENGTH,
usr.sbin/smtpd/srs.c
124
char md[SHA_DIGEST_LENGTH*4+1];
usr.sbin/smtpd/srs.c
139
base64_encode_rfc3548(srs_hash(env->sc_srs_key, tmp), SHA_DIGEST_LENGTH,
usr.sbin/smtpd/srs.c
156
char md[SHA_DIGEST_LENGTH*4+1];
usr.sbin/smtpd/srs.c
178
base64_encode_rfc3548(srs_hash(env->sc_srs_key, tmp + 5), SHA_DIGEST_LENGTH,
usr.sbin/smtpd/srs.c
204
char md[SHA_DIGEST_LENGTH*4+1];
usr.sbin/smtpd/srs.c
216
base64_encode_rfc3548(srs_hash(env->sc_srs_key, rcpt+5), SHA_DIGEST_LENGTH,
usr.sbin/smtpd/srs.c
224
SHA_DIGEST_LENGTH, md, sizeof md);
usr.sbin/smtpd/srs.c
272
char md[SHA_DIGEST_LENGTH*4+1];
usr.sbin/smtpd/srs.c
284
base64_encode_rfc3548(srs_hash(env->sc_srs_key, rcpt+5), SHA_DIGEST_LENGTH,
usr.sbin/smtpd/srs.c
292
SHA_DIGEST_LENGTH, md, sizeof md);
usr.sbin/smtpd/srs.c
72
static unsigned char md[SHA_DIGEST_LENGTH];
usr.sbin/smtpd/srs.c
86
char md[SHA_DIGEST_LENGTH*4+1];
usr.sbin/unbound/sldns/keyraw.c
217
if(len < (size_t)1 + SHA_DIGEST_LENGTH + 3*length)
usr.sbin/unbound/sldns/keyraw.c
220
*q = BN_bin2bn(key+offset, SHA_DIGEST_LENGTH, NULL);
usr.sbin/unbound/sldns/keyraw.c
221
offset += SHA_DIGEST_LENGTH;
usr.sbin/unbound/validator/val_neg.c
47
#define NSEC3_SHA_LEN SHA_DIGEST_LENGTH
usr.sbin/unbound/validator/val_secalgo.c
123
return SHA_DIGEST_LENGTH;
usr.sbin/unbound/validator/val_secalgo.c
239
return SHA_DIGEST_LENGTH;
usr.sbin/unbound/validator/val_secalgo.c
414
if(origlen < 1 + 2*SHA_DIGEST_LENGTH)
usr.sbin/unbound/validator/val_secalgo.c
418
(void) BN_bin2bn(orig + 1, SHA_DIGEST_LENGTH, R);
usr.sbin/unbound/validator/val_secalgo.c
421
(void) BN_bin2bn(orig + 21, SHA_DIGEST_LENGTH, S);
usr.sbin/unbound/validator/val_secalgo.c
762
sigblock_len == 1+2*SHA_DIGEST_LENGTH) {