/third_party/openssl/ssl/ |
D | tls13_enc.c | 46 size_t hashlen; in tls13_hkdf_expand() local 75 hashlen = (size_t)ret; in tls13_hkdf_expand() 81 (unsigned char *)secret, hashlen); in tls13_hkdf_expand() 265 size_t len = 0, hashlen; in tls13_final_finish_mac() local 278 if (!ssl_handshake_hash(s, hash, sizeof(hash), &hashlen)) { in tls13_final_finish_mac() 290 finsecret, hashlen)) in tls13_final_finish_mac() 296 params, key, hashlen, hash, hashlen, in tls13_final_finish_mac() 344 size_t hashlen; in derive_secret_key_and_iv() local 351 hashlen = (size_t)hashleni; in derive_secret_key_and_iv() 353 if (!tls13_hkdf_expand(s, md, insecret, label, labellen, hash, hashlen, in derive_secret_key_and_iv() [all …]
|
D | t1_enc.c | 610 size_t hashlen; in tls1_final_finish_mac() local 622 if (!ssl_handshake_hash(s, hash, sizeof(hash), &hashlen)) { in tls1_final_finish_mac() 627 if (!tls1_PRF(s, str, slen, hash, hashlen, NULL, 0, NULL, 0, NULL, 0, in tls1_final_finish_mac() 633 OPENSSL_cleanse(hash, hashlen); in tls1_final_finish_mac() 642 size_t hashlen; in tls1_generate_master_secret() local 649 || !ssl_handshake_hash(s, hash, sizeof(hash), &hashlen)) { in tls1_generate_master_secret() 655 BIO_dump(trc_out, (char *)hash, hashlen); in tls1_generate_master_secret() 660 hash, hashlen, in tls1_generate_master_secret() 668 OPENSSL_cleanse(hash, hashlen); in tls1_generate_master_secret()
|
D | ssl_local.h | 2725 size_t *hashlen);
|
D | ssl_lib.c | 4807 size_t *hashlen) in ssl_handshake_hash() argument 4831 *hashlen = hashleni; in ssl_handshake_hash()
|
/third_party/ffmpeg/libavutil/ |
D | hmac.c | 46 int blocklen, hashlen; member 80 c->hashlen = 16; in av_hmac_alloc() 88 c->hashlen = 20; in av_hmac_alloc() 96 c->hashlen = 28; in av_hmac_alloc() 104 c->hashlen = 32; in av_hmac_alloc() 112 c->hashlen = 48; in av_hmac_alloc() 120 c->hashlen = 64; in av_hmac_alloc() 153 c->keylen = c->hashlen; in av_hmac_init() 175 if (outlen < c->hashlen) in av_hmac_final() 184 c->update(c->hash, out, c->hashlen); in av_hmac_final() [all …]
|
/third_party/mbedtls/library/ |
D | rsa.c | 1546 unsigned int hashlen, in rsa_rsassa_pss_sign() argument 1561 hashlen == 0 ) || in rsa_rsassa_pss_sign() 1580 if( hashlen != mbedtls_md_get_size( md_info ) ) in rsa_rsassa_pss_sign() 1639 if( ( ret = mbedtls_md_update( &md_ctx, hash, hashlen ) ) != 0 ) in rsa_rsassa_pss_sign() 1678 unsigned int hashlen, in mbedtls_rsa_rsassa_pss_sign_ext() argument 1684 hashlen, hash, saltlen, sig ); in mbedtls_rsa_rsassa_pss_sign_ext() 1695 unsigned int hashlen, in mbedtls_rsa_rsassa_pss_sign() argument 1700 hashlen, hash, MBEDTLS_RSA_SALT_LEN_ANY, sig ); in mbedtls_rsa_rsassa_pss_sign() 1727 unsigned int hashlen, in rsa_rsassa_pkcs1_v15_encode() argument 1747 if( hashlen != mbedtls_md_get_size( md_info ) ) in rsa_rsassa_pkcs1_v15_encode() [all …]
|
D | ssl_cli.c | 3085 size_t sig_len, hashlen; in ssl_parse_server_key_exchange() local 3170 ret = mbedtls_ssl_get_key_exchange_md_tls1_2( ssl, hash, &hashlen, in ssl_parse_server_key_exchange() 3183 MBEDTLS_SSL_DEBUG_BUF( 3, "parameters hash", hash, hashlen ); in ssl_parse_server_key_exchange() 3216 md_alg, hash, hashlen, p, sig_len, rs_ctx ) ) != 0 ) in ssl_parse_server_key_exchange() 3930 size_t hashlen; in ssl_write_certificate_verify() local 3984 ssl->handshake->calc_verify( ssl, hash, &hashlen ); in ssl_write_certificate_verify() 4018 hashlen = 0; in ssl_write_certificate_verify() 4034 md_alg, hash_start, hashlen, in ssl_write_certificate_verify()
|
D | ssl_srv.c | 3100 size_t hashlen = 0; in ssl_prepare_server_key_exchange() local 3148 ret = mbedtls_ssl_get_key_exchange_md_tls1_2( ssl, hash, &hashlen, in ssl_prepare_server_key_exchange() 3162 MBEDTLS_SSL_DEBUG_BUF( 3, "parameters hash", hash, hashlen ); in ssl_prepare_server_key_exchange() 3198 md_alg, hash, hashlen ); in ssl_prepare_server_key_exchange() 3229 md_alg, hash, hashlen, in ssl_prepare_server_key_exchange() 4011 size_t hashlen; in ssl_parse_certificate_verify() local 4109 hashlen = 0; in ssl_parse_certificate_verify() 4164 md_alg, hash_start, hashlen, in ssl_parse_certificate_verify()
|
D | ssl_misc.h | 1400 unsigned char *hash, size_t *hashlen,
|
D | ssl_tls.c | 6969 unsigned char *hash, size_t *hashlen, in mbedtls_ssl_get_key_exchange_md_tls1_2() argument 7001 hashlen ) ) != PSA_SUCCESS ) in mbedtls_ssl_get_key_exchange_md_tls1_2() 7031 unsigned char *hash, size_t *hashlen, in mbedtls_ssl_get_key_exchange_md_tls1_2() argument 7038 *hashlen = mbedtls_md_get_size( md_info ); in mbedtls_ssl_get_key_exchange_md_tls1_2()
|
/third_party/mbedtls/include/mbedtls/ |
D | rsa.h | 821 unsigned int hashlen, 853 unsigned int hashlen, 904 unsigned int hashlen, 954 unsigned int hashlen, 986 unsigned int hashlen, 1011 unsigned int hashlen, 1046 unsigned int hashlen, 1086 unsigned int hashlen,
|
D | pk.h | 254 mbedtls_md_type_t md_alg, unsigned int hashlen,
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/ |
D | eap_gpsk_common.c | 43 size_t i, n, hashlen, left, clen; in eap_gpsk_gkdf_cmac() local 48 hashlen = sizeof(hash); in eap_gpsk_gkdf_cmac() 57 n = (len + hashlen - 1) / hashlen; in eap_gpsk_gkdf_cmac() 62 clen = left > hashlen ? hashlen : left; in eap_gpsk_gkdf_cmac() 78 size_t i, n, hashlen, left, clen; in eap_gpsk_gkdf_sha256() local 83 hashlen = SHA256_MAC_LEN; in eap_gpsk_gkdf_sha256() 92 n = (len + hashlen - 1) / hashlen; in eap_gpsk_gkdf_sha256() 97 clen = left > hashlen ? hashlen : left; in eap_gpsk_gkdf_sha256()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/ |
D | eap_gpsk_common.c | 43 size_t i, n, hashlen, left, clen; in eap_gpsk_gkdf_cmac() local 48 hashlen = sizeof(hash); in eap_gpsk_gkdf_cmac() 57 n = (len + hashlen - 1) / hashlen; in eap_gpsk_gkdf_cmac() 62 clen = left > hashlen ? hashlen : left; in eap_gpsk_gkdf_cmac() 78 size_t i, n, hashlen, left, clen; in eap_gpsk_gkdf_sha256() local 83 hashlen = SHA256_MAC_LEN; in eap_gpsk_gkdf_sha256() 92 n = (len + hashlen - 1) / hashlen; in eap_gpsk_gkdf_sha256() 97 clen = left > hashlen ? hashlen : left; in eap_gpsk_gkdf_sha256()
|
/third_party/openssl/test/ |
D | tls13secretstest.c | 138 size_t *hashlen) in ssl_handshake_hash() argument 146 *hashlen = sizeof(hs_full_hash); in ssl_handshake_hash() 149 *hashlen = sizeof(hs_start_hash); in ssl_handshake_hash()
|
/third_party/ffmpeg/libavutil/tests/ |
D | hmac.c | 64 test(hmac, key1, hmac->hashlen, data1, sizeof(data1)); in main() 66 test(hmac, key3, hmac->hashlen, data3, sizeof(data3)); in main()
|
/third_party/openssl/ssl/statem/ |
D | statem_lib.c | 229 size_t hashlen; in get_cert_verify_tbs_data() local 249 hashlen = s->cert_verify_hash_len; in get_cert_verify_tbs_data() 251 EVP_MAX_MD_SIZE, &hashlen)) { in get_cert_verify_tbs_data() 257 *hdatalen = TLS13_TBS_PREAMBLE_SIZE + hashlen; in get_cert_verify_tbs_data() 2186 size_t hashlen, const unsigned char *hrr, in create_synthetic_message_hash() argument 2196 hashlen = 0; in create_synthetic_message_hash() 2200 &hashlen)) { in create_synthetic_message_hash() 2214 msghdr[SSL3_HM_HEADER_LENGTH - 1] = (unsigned char)hashlen; in create_synthetic_message_hash() 2216 || !ssl3_finish_mac(s, hashval, hashlen)) { in create_synthetic_message_hash()
|
D | extensions_srvr.c | 1725 size_t startlen, ciphlen, totcookielen, hashlen, hmaclen, appcookielen; in tls_construct_stoc_cookie() local 1763 || !ssl_handshake_hash(s, hashval1, EVP_MAX_MD_SIZE, &hashlen)) { in tls_construct_stoc_cookie() 1768 if (!WPACKET_allocate_bytes(pkt, hashlen, &hashval2) in tls_construct_stoc_cookie()
|
D | statem_clnt.c | 2594 size_t hashlen; in tls_process_new_session_ticket() local 2602 hashlen = (size_t)hashleni; in tls_process_new_session_ticket() 2610 hashlen, 1)) { in tls_process_new_session_ticket() 2614 s->session->master_key_length = hashlen; in tls_process_new_session_ticket()
|
D | statem_srvr.c | 3910 size_t i, hashlen; in tls_construct_new_session_ticket() local 3921 hashlen = (size_t)hashleni; in tls_construct_new_session_ticket() 3963 hashlen, 1)) { in tls_construct_new_session_ticket() 3967 s->session->master_key_length = hashlen; in tls_construct_new_session_ticket()
|
D | statem_local.h | 68 size_t hashlen, const unsigned char *hrr,
|
/third_party/gstreamer/gstplugins_bad/gst/rtmp2/rtmp/ |
D | rtmpclient.c | 524 gsize hashlen = sizeof hash; in do_adobe_auth() local 537 g_checksum_get_digest (md5, hash, &hashlen); in do_adobe_auth() 538 g_warn_if_fail (hashlen == sizeof hash); in do_adobe_auth() 555 g_checksum_get_digest (md5, hash, &hashlen); in do_adobe_auth() 556 g_warn_if_fail (hashlen == sizeof hash); in do_adobe_auth()
|
/third_party/mbedtls/tests/suites/ |
D | test_suite_x509write.function | 19 mbedtls_md_type_t md_alg, unsigned int hashlen, 23 md_alg, hashlen, hash, sig ) );
|
D | test_suite_pk.function | 73 mbedtls_md_type_t md_alg, unsigned int hashlen, 80 md_alg, hashlen, hash, sig ) );
|
/third_party/mbedtls/docs/ |
D | 3.0-migration-guide.md | 420 All the functions in the RSA module that accept a `hashlen` parameter used to 422 data was signed. The `hashlen` parameter is now always the size that is read
|