/third_party/mbedtls/library/ |
D | hmac_drbg.c | 66 size_t md_len = mbedtls_md_get_size( ctx->md_ctx.md_info ); in mbedtls_hmac_drbg_update() local 78 ctx->V, md_len ) ) != 0 ) in mbedtls_hmac_drbg_update() 93 if( ( ret = mbedtls_md_hmac_starts( &ctx->md_ctx, K, md_len ) ) != 0 ) in mbedtls_hmac_drbg_update() 96 ctx->V, md_len ) ) != 0 ) in mbedtls_hmac_drbg_update() 325 size_t md_len = mbedtls_md_get_size( ctx->md_ctx.md_info ); in mbedtls_hmac_drbg_random_with_add() local 359 size_t use_len = left > md_len ? md_len : left; in mbedtls_hmac_drbg_random_with_add() 364 ctx->V, md_len ) ) != 0 ) in mbedtls_hmac_drbg_random_with_add()
|
D | ssl_tls.c | 469 size_t i, j, k, md_len; in tls_prf_generic() local 482 md_len = mbedtls_md_get_size( md_info ); in tls_prf_generic() 484 tmp_len = md_len + strlen( label ) + rlen; in tls_prf_generic() 493 memcpy( tmp + md_len, label, nb ); in tls_prf_generic() 494 memcpy( tmp + md_len + nb, random, rlen ); in tls_prf_generic() 506 ret = mbedtls_md_hmac_update( &md_ctx, tmp + md_len, nb ); in tls_prf_generic() 513 for( i = 0; i < dlen; i += md_len ) in tls_prf_generic() 518 ret = mbedtls_md_hmac_update( &md_ctx, tmp, md_len + nb ); in tls_prf_generic() 528 ret = mbedtls_md_hmac_update( &md_ctx, tmp, md_len ); in tls_prf_generic() 535 k = ( i + md_len > dlen ) ? dlen % md_len : md_len; in tls_prf_generic()
|
/third_party/openssl/include/openssl/ |
D | sha.h | 55 unsigned int num, md_len; member 102 unsigned int num, md_len; member
|
D | hmac.h | 41 unsigned int *md_len);
|
/third_party/openssl/crypto/pkcs7/ |
D | pk7_doit.c | 618 unsigned int md_len; in do_pkcs7_signed_attrib() local 629 if (!EVP_DigestFinal_ex(mctx, md_data, &md_len)) { in do_pkcs7_signed_attrib() 633 if (!PKCS7_add1_attrib_digest(si, md_data, md_len)) { in do_pkcs7_signed_attrib() 778 unsigned int md_len; in PKCS7_dataFinal() local 782 if (!EVP_DigestFinal_ex(mdc, md_data, &md_len)) in PKCS7_dataFinal() 784 if (!ASN1_OCTET_STRING_set(p7->d.digest->digest, md_data, md_len)) in PKCS7_dataFinal() 997 unsigned int md_len; in PKCS7_signatureVerify() local 1001 if (!EVP_DigestFinal_ex(mdc_tmp, md_dat, &md_len)) in PKCS7_signatureVerify() 1009 if ((message_digest->length != (int)md_len) || in PKCS7_signatureVerify() 1010 (memcmp(message_digest->data, md_dat, md_len))) { in PKCS7_signatureVerify()
|
/third_party/openssl/crypto/sha/ |
D | sha256.c | 30 c->md_len = SHA224_DIGEST_LENGTH; in SHA224_Init() 45 c->md_len = SHA256_DIGEST_LENGTH; in SHA256_Init() 104 switch ((c)->md_len) \ 114 if ((c)->md_len > SHA256_DIGEST_LENGTH) \ 116 for (nn=0;nn<(c)->md_len/4;nn++) \
|
D | sha512.c | 77 c->md_len = SHA224_DIGEST_LENGTH; in sha512_224_init() 95 c->md_len = SHA256_DIGEST_LENGTH; in sha512_256_init() 113 c->md_len = SHA384_DIGEST_LENGTH; in SHA384_Init() 131 c->md_len = SHA512_DIGEST_LENGTH; in SHA512_Init() 181 switch (c->md_len) { in SHA512_Final()
|
/third_party/openssl/crypto/ct/ |
D | ct_sct_ctx.c | 200 unsigned int md_len; in ct_public_key_hash() local 216 if (!EVP_Digest(der, der_len, md, &md_len, EVP_sha256(), NULL)) in ct_public_key_hash()
|
/third_party/openssl/crypto/hmac/ |
D | hmac.c | 213 unsigned int *md_len) in HMAC() argument 233 if (!HMAC_Final(c, md, md_len)) in HMAC()
|
/third_party/openssl/ssl/statem/ |
D | statem_lib.c | 764 size_t md_len; in tls_process_finished() local 801 md_len = s->s3->tmp.peer_finish_md_len; in tls_process_finished() 803 if (md_len != PACKET_remaining(pkt)) { in tls_process_finished() 810 md_len) != 0) { in tls_process_finished() 819 if (!ossl_assert(md_len <= EVP_MAX_MD_SIZE)) { in tls_process_finished() 826 md_len); in tls_process_finished() 827 s->s3->previous_client_finished_len = md_len; in tls_process_finished() 830 md_len); in tls_process_finished() 831 s->s3->previous_server_finished_len = md_len; in tls_process_finished()
|
D | statem_clnt.c | 3178 unsigned int md_len; in tls_construct_cke_gost() local 3239 || EVP_DigestFinal_ex(ukm_hash, shared_ukm, &md_len) <= 0) { in tls_construct_cke_gost()
|
/third_party/openssl/doc/man3/ |
D | HMAC.pod | 25 unsigned char *md, unsigned int *md_len); 63 the output is placed in B<md_len>, unless it is B<NULL>. Note: passing a NULL
|
D | EVP_DigestInit.pod | 384 unsigned int md_len, i; 401 EVP_DigestFinal_ex(mdctx, md_value, &md_len); 405 for (i = 0; i < md_len; i++)
|
/third_party/python/Modules/ |
D | _hashopenssl.c | 1437 unsigned int md_len = 0; in _hashlib_hmac_singleshot_impl() local 1462 md, &md_len in _hashlib_hmac_singleshot_impl() 1471 return PyBytes_FromStringAndSize((const char*)md, md_len); in _hashlib_hmac_singleshot_impl()
|
/third_party/python/Lib/test/ |
D | test_hashlib.py | 670 def blake2_rfc7693(self, constructor, md_len, in_len): argument 682 for outlen in md_len:
|
/third_party/ltp/testcases/kernel/fs/scsi/ltpscsi/ |
D | scsimain.c | 3661 int sg_fd, k, num, len, md_len, bd_len, longlba, page_num; in show_scsi_modes() local 3731 md_len = rsp_buff[0] + 1; in show_scsi_modes() 3738 md_len = (rsp_buff[0] << 8) + rsp_buff[1] + 2; in show_scsi_modes() 3747 " param=0x%.2x, longlba=%d\n", md_len, medium_type, in show_scsi_modes() 3749 if (md_len > rsp_buff_size) { in show_scsi_modes() 3753 md_len = rsp_buff_size; in show_scsi_modes() 3785 md_len -= bd_len + headerlen; /* length of mode page(s) */ in show_scsi_modes() 3786 while (md_len > 0) { /* got mode page(s) */ in show_scsi_modes() 3825 md_len -= len; in show_scsi_modes()
|
/third_party/openssl/test/ |
D | evp_extra_test.c | 1801 unsigned int md_len; in test_custom_md_meth() local 1830 || !TEST_true(EVP_DigestFinal_ex(mdctx, md_value, &md_len)) in test_custom_md_meth()
|
/third_party/node/src/ |
D | node_crypto.cc | 4258 unsigned int md_len = 0; in HmacDigest() local 4261 HMAC_Final(hmac->ctx_.get(), md_value, &md_len); in HmacDigest() 4269 md_len, in HmacDigest()
|
/third_party/openssl/ |
D | CHANGES | 13261 *) Change type of another md_len variable in pk7_doit.c:PKCS7_dataFinal()
|