/netbsd-src/external/bsd/openldap/dist/servers/slapd/pwmods/ |
H A D | argon2.c | 78 uint32_t salt_length, hash_length; in slapd_argon2_hash() local 87 hash_length = SLAPD_ARGON2_HASH_LENGTH; in slapd_argon2_hash() 90 salt_length, hash_length, Argon2_id ); in slapd_argon2_hash() 118 salt.bv_val, salt_length, hash_length, in slapd_argon2_hash()
|
/netbsd-src/crypto/external/bsd/netpgp/dist/src/lib/ |
H A D | openssl_crypto.c | 657 pgp_dsa_verify(const uint8_t *hash, size_t hash_length, in pgp_dsa_verify() argument 667 hexdump(stderr, "input hash", hash, hash_length); in pgp_dsa_verify() 670 if ((qlen = (unsigned)BN_num_bytes(dsa->q)) < hash_length) { in pgp_dsa_verify() 671 hash_length = qlen; in pgp_dsa_verify() 673 ret = DSA_do_verify(hash, (int)hash_length, osig, odsa); in pgp_dsa_verify() 689 pgp_ecdsa_verify(const uint8_t *hash, size_t hash_length, in pgp_ecdsa_verify() argument 699 hexdump(stderr, "input hash", hash, hash_length); in pgp_ecdsa_verify() 702 ret = ECDSA_do_verify(hash, (int)hash_length, osig, oecdsa); in pgp_ecdsa_verify()
|
H A D | signature.c | 321 size_t hash_length, in rsa_verify() argument 380 if (keysize - plen - hash_length < 10) { in rsa_verify() 384 for (n = 2; n < keysize - plen - hash_length - 1; ++n) { in rsa_verify() 397 hexdump(stderr, "sig hash", &hashbuf_from_sig[n + plen], hash_length); in rsa_verify() 398 hexdump(stderr, "input hash", hash, hash_length); in rsa_verify() 401 memcmp(&hashbuf_from_sig[n + plen], hash, hash_length) == 0); in rsa_verify()
|
/netbsd-src/external/mpl/bind/dist/lib/dns/include/dns/ |
H A D | nsec3.h | 55 size_t hash_length, unsigned char *buffer, 89 size_t *hash_length, const dns_name_t *name,
|
/netbsd-src/external/mpl/dhcp/bind/dist/lib/dns/include/dns/ |
H A D | nsec3.h | 56 size_t hash_length, unsigned char *buffer, 90 size_t *hash_length, const dns_name_t *name,
|
/netbsd-src/crypto/external/bsd/netpgp/dist/src/netpgpverify/ |
H A D | rsa.c | 508 size_t hash_length) in netpgpv_dsa_verify() argument 526 if ((qlen = PGPV_BN_num_bytes(odsa.q)) < hash_length) { in netpgpv_dsa_verify() 527 hash_length = qlen; in netpgpv_dsa_verify() 529 ret = dsa_do_verify(calculated, (int)hash_length, &signature->dsa, &odsa); in netpgpv_dsa_verify()
|
/netbsd-src/crypto/external/bsd/netpgp/dist/src/librsa/ |
H A D | rsa.c | 506 … signature_t *signature, const dsa_pubkey_t *pubdsa, const uint8_t *calculated, size_t hash_length) in dsa_verify() argument 524 if ((qlen = BN_num_bytes(odsa.q)) < hash_length) { in dsa_verify() 525 hash_length = qlen; in dsa_verify() 527 ret = dsa_do_verify(calculated, (int)hash_length, &signature->dsa, &odsa); in dsa_verify()
|
/netbsd-src/external/mpl/dhcp/bind/dist/lib/dns/ |
H A D | nsec3.c | 63 size_t hash_length, unsigned char *buffer, in dns_nsec3_buildrdata() argument 79 REQUIRE(hash_length < 256U); in dns_nsec3_buildrdata() 86 REQUIRE(hash_length == ISC_SHA1_DIGESTLENGTH); in dns_nsec3_buildrdata() 104 *p++ = (unsigned char)hash_length; in dns_nsec3_buildrdata() 105 memmove(p, nexthash, hash_length); in dns_nsec3_buildrdata() 106 p += hash_length; in dns_nsec3_buildrdata() 247 size_t *hash_length, const dns_name_t *name, in dns_nsec3_hashname() argument 276 if (hash_length != NULL) { in dns_nsec3_hashname() 277 *hash_length = len; in dns_nsec3_hashname()
|
/netbsd-src/external/mpl/bind/dist/lib/dns/ |
H A D | nsec3.c | 63 size_t hash_length, unsigned char *buffer, in dns_nsec3_buildrdata() argument 79 REQUIRE(hash_length < 256U); in dns_nsec3_buildrdata() 86 REQUIRE(hash_length == ISC_SHA1_DIGESTLENGTH); in dns_nsec3_buildrdata() 104 *p++ = (unsigned char)hash_length; in dns_nsec3_buildrdata() 105 memmove(p, nexthash, hash_length); in dns_nsec3_buildrdata() 106 p += hash_length; in dns_nsec3_buildrdata() 247 size_t *hash_length, const dns_name_t *name, in dns_nsec3_hashname() argument 276 SET_IF_NOT_NULL(hash_length, len); in dns_nsec3_hashname()
|
/netbsd-src/sys/dev/pci/qat/ |
H A D | qat_hw17reg.h | 2024 uint8_t hash_length; member
|