/third_party/openssl/crypto/rsa/ |
D | rsa_oaep.c | 51 int mdlen, dbmask_len = 0; in RSA_padding_add_PKCS1_OAEP_mgf1() local 58 mdlen = EVP_MD_size(md); in RSA_padding_add_PKCS1_OAEP_mgf1() 60 if (flen > emlen - 2 * mdlen - 1) { in RSA_padding_add_PKCS1_OAEP_mgf1() 66 if (emlen < 2 * mdlen + 1) { in RSA_padding_add_PKCS1_OAEP_mgf1() 74 db = to + mdlen + 1; in RSA_padding_add_PKCS1_OAEP_mgf1() 78 memset(db + mdlen, 0, emlen - flen - 2 * mdlen - 1); in RSA_padding_add_PKCS1_OAEP_mgf1() 79 db[emlen - flen - mdlen - 1] = 0x01; in RSA_padding_add_PKCS1_OAEP_mgf1() 80 memcpy(db + emlen - flen - mdlen, from, (unsigned int)flen); in RSA_padding_add_PKCS1_OAEP_mgf1() 81 if (RAND_bytes(seed, mdlen) <= 0) in RSA_padding_add_PKCS1_OAEP_mgf1() 84 dbmask_len = emlen - mdlen; in RSA_padding_add_PKCS1_OAEP_mgf1() [all …]
|
/third_party/openssl/crypto/ec/ |
D | ecdh_kdf.c | 27 size_t mdlen; in ecdh_KDF_X9_63() local 35 mdlen = EVP_MD_size(md); in ecdh_KDF_X9_63() 50 if (outlen >= mdlen) { in ecdh_KDF_X9_63() 53 outlen -= mdlen; in ecdh_KDF_X9_63() 56 out += mdlen; in ecdh_KDF_X9_63() 61 OPENSSL_cleanse(mtmp, mdlen); in ecdh_KDF_X9_63()
|
/third_party/openssl/crypto/cms/ |
D | cms_dd.c | 59 unsigned int mdlen; in cms_DigestedData_do_final() local 73 if (EVP_DigestFinal_ex(mctx, md, &mdlen) <= 0) in cms_DigestedData_do_final() 77 if (mdlen != (unsigned int)dd->digest->length) { in cms_DigestedData_do_final() 83 if (memcmp(md, dd->digest->data, mdlen)) in cms_DigestedData_do_final() 89 if (!ASN1_STRING_set(dd->digest, md, mdlen)) in cms_DigestedData_do_final()
|
D | cms_sd.c | 585 unsigned int mdlen; in cms_SignerInfo_content_sign() local 586 if (!EVP_DigestFinal_ex(mctx, md, &mdlen)) in cms_SignerInfo_content_sign() 589 V_ASN1_OCTET_STRING, md, mdlen)) in cms_SignerInfo_content_sign() 601 unsigned int mdlen; in cms_SignerInfo_content_sign() local 603 if (!EVP_DigestFinal_ex(mctx, md, &mdlen)) in cms_SignerInfo_content_sign() 611 if (EVP_PKEY_sign(pctx, sig, &siglen, md, mdlen) <= 0) { in cms_SignerInfo_content_sign()
|
/third_party/openssl/crypto/dh/ |
D | dh_kdf.c | 106 size_t mdlen; in DH_KDF_X9_42() local 114 mdlen = EVP_MD_size(md); in DH_KDF_X9_42() 129 if (outlen >= mdlen) { in DH_KDF_X9_42() 132 outlen -= mdlen; in DH_KDF_X9_42() 135 out += mdlen; in DH_KDF_X9_42() 140 OPENSSL_cleanse(mtmp, mdlen); in DH_KDF_X9_42()
|
/third_party/openssl/crypto/evp/ |
D | m_sigver.c | 125 unsigned int mdlen = 0; in EVP_DigestSignFinal() local 130 r = EVP_DigestFinal_ex(ctx, md, &mdlen); in EVP_DigestSignFinal() 143 r = EVP_DigestFinal_ex(tmp_ctx, md, &mdlen); in EVP_DigestSignFinal() 148 if (EVP_PKEY_sign(ctx->pctx, sigret, siglen, md, mdlen) <= 0) in EVP_DigestSignFinal() 178 unsigned int mdlen = 0; in EVP_DigestVerifyFinal() local 189 r = EVP_DigestFinal_ex(ctx, md, &mdlen); in EVP_DigestVerifyFinal() 202 r = EVP_DigestFinal_ex(tmp_ctx, md, &mdlen); in EVP_DigestVerifyFinal() 207 return EVP_PKEY_verify(ctx->pctx, sig, siglen, md, mdlen); in EVP_DigestVerifyFinal()
|
D | p5_crpt2.c | 37 int cplen, j, k, tkeylen, mdlen; in PKCS5_PBKDF2_HMAC() local 41 mdlen = EVP_MD_size(digest); in PKCS5_PBKDF2_HMAC() 42 if (mdlen < 0) in PKCS5_PBKDF2_HMAC() 66 if (tkeylen > mdlen) in PKCS5_PBKDF2_HMAC() 67 cplen = mdlen; in PKCS5_PBKDF2_HMAC() 97 if (!HMAC_Update(hctx, digtmp, mdlen) in PKCS5_PBKDF2_HMAC()
|
/third_party/openssl/crypto/ocsp/ |
D | ocsp_vfy.c | 283 int mdlen; in ocsp_match_issuerid() local 292 mdlen = EVP_MD_size(dgst); in ocsp_match_issuerid() 293 if (mdlen < 0) in ocsp_match_issuerid() 295 if ((cid->issuerNameHash.length != mdlen) || in ocsp_match_issuerid() 296 (cid->issuerKeyHash.length != mdlen)) in ocsp_match_issuerid() 301 if (memcmp(md, cid->issuerNameHash.data, mdlen)) in ocsp_match_issuerid() 304 if (memcmp(md, cid->issuerKeyHash.data, mdlen)) in ocsp_match_issuerid()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/ |
D | eap_pwd_common.c | 51 size_t resultbytelen, len = 0, mdlen; in eap_pwd_kdf() local 68 mdlen = SHA256_MAC_LEN; in eap_pwd_kdf() 69 if (crypto_hash_finish(hash, digest, &mdlen) < 0) in eap_pwd_kdf() 71 if ((len + mdlen) > resultbytelen) in eap_pwd_kdf() 74 os_memcpy(result + len, digest, mdlen); in eap_pwd_kdf() 75 len += mdlen; in eap_pwd_kdf()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/ |
D | eap_pwd_common.c | 51 size_t resultbytelen, len = 0, mdlen; in eap_pwd_kdf() local 68 mdlen = SHA256_MAC_LEN; in eap_pwd_kdf() 69 if (crypto_hash_finish(hash, digest, &mdlen) < 0) in eap_pwd_kdf() 71 if ((len + mdlen) > resultbytelen) in eap_pwd_kdf() 74 os_memcpy(result + len, digest, mdlen); in eap_pwd_kdf() 75 len += mdlen; in eap_pwd_kdf()
|
/third_party/openssl/ssl/ |
D | tls13_enc.c | 171 size_t mdlen, prevsecretlen; in tls13_generate_secret() local 195 mdlen = (size_t)mdleni; in tls13_generate_secret() 199 insecretlen = mdlen; in tls13_generate_secret() 223 sizeof(derived_secret_label) - 1, hash, mdlen, in tls13_generate_secret() 224 preextractsec, mdlen, 1)) { in tls13_generate_secret() 231 prevsecretlen = mdlen; in tls13_generate_secret() 241 || EVP_PKEY_derive(pctx, outsecret, &mdlen) in tls13_generate_secret() 250 OPENSSL_cleanse(preextractsec, mdlen); in tls13_generate_secret()
|
/third_party/openssl/crypto/pkcs7/ |
D | pk7_attr.c | 108 const unsigned char *md, int mdlen) in PKCS7_add1_attrib_digest() argument 114 if (!ASN1_STRING_set(os, md, mdlen) in PKCS7_add1_attrib_digest()
|
/third_party/openssl/doc/man3/ |
D | EVP_PKEY_verify.pod | 56 size_t mdlen, siglen; 60 * NB: assumes verify_key, sig, siglen md and mdlen are already set up 74 ret = EVP_PKEY_verify(ctx, sig, siglen, md, mdlen);
|
D | EVP_PKEY_sign.pod | 59 size_t mdlen = 32, siglen; 78 if (EVP_PKEY_sign(ctx, NULL, &siglen, md, mdlen) <= 0) 86 if (EVP_PKEY_sign(ctx, sig, &siglen, md, mdlen) <= 0)
|
D | BIO_f_md.pod | 120 int mdlen; 132 mdlen = BIO_gets(mdtmp, mdbuf, EVP_MAX_MD_SIZE); 133 for (i = 0; i < mdlen; i++) printf(":%02X", mdbuf[i]);
|
/third_party/openssl/crypto/sm2/ |
D | sm2_pmeth.c | 266 int mdlen = EVP_MD_size(md); in pkey_sm2_digest_custom() local 278 if (mdlen < 0) { in pkey_sm2_digest_custom() 287 return EVP_DigestUpdate(mctx, z, (size_t)mdlen); in pkey_sm2_digest_custom()
|
/third_party/NuttX/include/nuttx/ |
D | scsi.h | 712 uint8_t mdlen; /* 0: Mode data length */ member 951 uint8_t mdlen[2]; /* 0-1: Mode data length */ member
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
D | crypto_openssl.c | 1040 unsigned int mdlen; in crypto_hash_finish() local 1052 mdlen = *len; in crypto_hash_finish() 1053 res = HMAC_Final(ctx->ctx, mac, &mdlen); in crypto_hash_finish() 1061 *len = mdlen; in crypto_hash_finish() 1072 unsigned int mdlen) in openssl_hmac_vector() argument 1091 res = HMAC_Final(ctx, mac, &mdlen); in openssl_hmac_vector()
|
D | crypto_wolfssl.c | 162 unsigned int mdlen) in wolfssl_hmac_vector() argument 167 (void) mdlen; in wolfssl_hmac_vector()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
D | crypto_openssl.c | 1113 unsigned int mdlen; in crypto_hash_finish() local 1125 mdlen = *len; in crypto_hash_finish() 1126 res = HMAC_Final(ctx->ctx, mac, &mdlen); in crypto_hash_finish() 1134 *len = mdlen; in crypto_hash_finish() 1145 unsigned int mdlen) in openssl_hmac_vector() argument 1164 res = HMAC_Final(ctx, mac, &mdlen); in openssl_hmac_vector()
|
D | crypto_wolfssl.c | 162 unsigned int mdlen) in wolfssl_hmac_vector() argument 167 (void) mdlen; in wolfssl_hmac_vector()
|
/third_party/openssl/include/openssl/ |
D | pkcs7.h | 309 const unsigned char *md, int mdlen);
|
/third_party/nghttp2/src/ |
D | util.cc | 1477 unsigned int mdlen = EVP_MD_size(meth); in message_digest() local 1479 rv = EVP_DigestFinal_ex(ctx, res, &mdlen); in message_digest()
|