Home
last modified time | relevance | path

Searched refs:md_len (Results 1 – 19 of 19) sorted by relevance

/third_party/mbedtls/library/
Dhmac_drbg.c66 size_t md_len = mbedtls_md_get_size( ctx->md_ctx.md_info ); in mbedtls_hmac_drbg_update() local
78 ctx->V, md_len ) ) != 0 ) in mbedtls_hmac_drbg_update()
93 if( ( ret = mbedtls_md_hmac_starts( &ctx->md_ctx, K, md_len ) ) != 0 ) in mbedtls_hmac_drbg_update()
96 ctx->V, md_len ) ) != 0 ) in mbedtls_hmac_drbg_update()
325 size_t md_len = mbedtls_md_get_size( ctx->md_ctx.md_info ); in mbedtls_hmac_drbg_random_with_add() local
359 size_t use_len = left > md_len ? md_len : left; in mbedtls_hmac_drbg_random_with_add()
364 ctx->V, md_len ) ) != 0 ) in mbedtls_hmac_drbg_random_with_add()
Dssl_tls.c469 size_t i, j, k, md_len; in tls_prf_generic() local
482 md_len = mbedtls_md_get_size( md_info ); in tls_prf_generic()
484 tmp_len = md_len + strlen( label ) + rlen; in tls_prf_generic()
493 memcpy( tmp + md_len, label, nb ); in tls_prf_generic()
494 memcpy( tmp + md_len + nb, random, rlen ); in tls_prf_generic()
506 ret = mbedtls_md_hmac_update( &md_ctx, tmp + md_len, nb ); in tls_prf_generic()
513 for( i = 0; i < dlen; i += md_len ) in tls_prf_generic()
518 ret = mbedtls_md_hmac_update( &md_ctx, tmp, md_len + nb ); in tls_prf_generic()
528 ret = mbedtls_md_hmac_update( &md_ctx, tmp, md_len ); in tls_prf_generic()
535 k = ( i + md_len > dlen ) ? dlen % md_len : md_len; in tls_prf_generic()
/third_party/openssl/include/openssl/
Dsha.h55 unsigned int num, md_len; member
102 unsigned int num, md_len; member
Dhmac.h41 unsigned int *md_len);
/third_party/openssl/crypto/pkcs7/
Dpk7_doit.c618 unsigned int md_len; in do_pkcs7_signed_attrib() local
629 if (!EVP_DigestFinal_ex(mctx, md_data, &md_len)) { in do_pkcs7_signed_attrib()
633 if (!PKCS7_add1_attrib_digest(si, md_data, md_len)) { in do_pkcs7_signed_attrib()
778 unsigned int md_len; in PKCS7_dataFinal() local
782 if (!EVP_DigestFinal_ex(mdc, md_data, &md_len)) in PKCS7_dataFinal()
784 if (!ASN1_OCTET_STRING_set(p7->d.digest->digest, md_data, md_len)) in PKCS7_dataFinal()
997 unsigned int md_len; in PKCS7_signatureVerify() local
1001 if (!EVP_DigestFinal_ex(mdc_tmp, md_dat, &md_len)) in PKCS7_signatureVerify()
1009 if ((message_digest->length != (int)md_len) || in PKCS7_signatureVerify()
1010 (memcmp(message_digest->data, md_dat, md_len))) { in PKCS7_signatureVerify()
/third_party/openssl/crypto/sha/
Dsha256.c30 c->md_len = SHA224_DIGEST_LENGTH; in SHA224_Init()
45 c->md_len = SHA256_DIGEST_LENGTH; in SHA256_Init()
104 switch ((c)->md_len) \
114 if ((c)->md_len > SHA256_DIGEST_LENGTH) \
116 for (nn=0;nn<(c)->md_len/4;nn++) \
Dsha512.c77 c->md_len = SHA224_DIGEST_LENGTH; in sha512_224_init()
95 c->md_len = SHA256_DIGEST_LENGTH; in sha512_256_init()
113 c->md_len = SHA384_DIGEST_LENGTH; in SHA384_Init()
131 c->md_len = SHA512_DIGEST_LENGTH; in SHA512_Init()
181 switch (c->md_len) { in SHA512_Final()
/third_party/openssl/crypto/ct/
Dct_sct_ctx.c200 unsigned int md_len; in ct_public_key_hash() local
216 if (!EVP_Digest(der, der_len, md, &md_len, EVP_sha256(), NULL)) in ct_public_key_hash()
/third_party/openssl/crypto/hmac/
Dhmac.c213 unsigned int *md_len) in HMAC() argument
233 if (!HMAC_Final(c, md, md_len)) in HMAC()
/third_party/openssl/ssl/statem/
Dstatem_lib.c764 size_t md_len; in tls_process_finished() local
801 md_len = s->s3->tmp.peer_finish_md_len; in tls_process_finished()
803 if (md_len != PACKET_remaining(pkt)) { in tls_process_finished()
810 md_len) != 0) { in tls_process_finished()
819 if (!ossl_assert(md_len <= EVP_MAX_MD_SIZE)) { in tls_process_finished()
826 md_len); in tls_process_finished()
827 s->s3->previous_client_finished_len = md_len; in tls_process_finished()
830 md_len); in tls_process_finished()
831 s->s3->previous_server_finished_len = md_len; in tls_process_finished()
Dstatem_clnt.c3178 unsigned int md_len; in tls_construct_cke_gost() local
3239 || EVP_DigestFinal_ex(ukm_hash, shared_ukm, &md_len) <= 0) { in tls_construct_cke_gost()
/third_party/openssl/doc/man3/
DHMAC.pod25 unsigned char *md, unsigned int *md_len);
63 the output is placed in B<md_len>, unless it is B<NULL>. Note: passing a NULL
DEVP_DigestInit.pod384 unsigned int md_len, i;
401 EVP_DigestFinal_ex(mdctx, md_value, &md_len);
405 for (i = 0; i < md_len; i++)
/third_party/python/Modules/
D_hashopenssl.c1437 unsigned int md_len = 0; in _hashlib_hmac_singleshot_impl() local
1462 md, &md_len in _hashlib_hmac_singleshot_impl()
1471 return PyBytes_FromStringAndSize((const char*)md, md_len); in _hashlib_hmac_singleshot_impl()
/third_party/python/Lib/test/
Dtest_hashlib.py670 def blake2_rfc7693(self, constructor, md_len, in_len): argument
682 for outlen in md_len:
/third_party/ltp/testcases/kernel/fs/scsi/ltpscsi/
Dscsimain.c3661 int sg_fd, k, num, len, md_len, bd_len, longlba, page_num; in show_scsi_modes() local
3731 md_len = rsp_buff[0] + 1; in show_scsi_modes()
3738 md_len = (rsp_buff[0] << 8) + rsp_buff[1] + 2; in show_scsi_modes()
3747 " param=0x%.2x, longlba=%d\n", md_len, medium_type, in show_scsi_modes()
3749 if (md_len > rsp_buff_size) { in show_scsi_modes()
3753 md_len = rsp_buff_size; in show_scsi_modes()
3785 md_len -= bd_len + headerlen; /* length of mode page(s) */ in show_scsi_modes()
3786 while (md_len > 0) { /* got mode page(s) */ in show_scsi_modes()
3825 md_len -= len; in show_scsi_modes()
/third_party/openssl/test/
Devp_extra_test.c1801 unsigned int md_len; in test_custom_md_meth() local
1830 || !TEST_true(EVP_DigestFinal_ex(mdctx, md_value, &md_len)) in test_custom_md_meth()
/third_party/node/src/
Dnode_crypto.cc4258 unsigned int md_len = 0; in HmacDigest() local
4261 HMAC_Final(hmac->ctx_.get(), md_value, &md_len); in HmacDigest()
4269 md_len, in HmacDigest()
/third_party/openssl/
DCHANGES13261 *) Change type of another md_len variable in pk7_doit.c:PKCS7_dataFinal()