/third_party/node/deps/openssl/openssl/ssl/ |
D | tls13_enc.c | 46 size_t hashlen; in tls13_hkdf_expand() local 75 hashlen = (size_t)ret; in tls13_hkdf_expand() 81 (unsigned char *)secret, hashlen); in tls13_hkdf_expand() 265 size_t len = 0, hashlen; in tls13_final_finish_mac() local 278 if (!ssl_handshake_hash(s, hash, sizeof(hash), &hashlen)) { in tls13_final_finish_mac() 290 finsecret, hashlen)) in tls13_final_finish_mac() 296 params, key, hashlen, hash, hashlen, in tls13_final_finish_mac() 344 size_t hashlen; in derive_secret_key_and_iv() local 351 hashlen = (size_t)hashleni; in derive_secret_key_and_iv() 353 if (!tls13_hkdf_expand(s, md, insecret, label, labellen, hash, hashlen, in derive_secret_key_and_iv() [all …]
|
D | t1_enc.c | 610 size_t hashlen; in tls1_final_finish_mac() local 622 if (!ssl_handshake_hash(s, hash, sizeof(hash), &hashlen)) { in tls1_final_finish_mac() 627 if (!tls1_PRF(s, str, slen, hash, hashlen, NULL, 0, NULL, 0, NULL, 0, in tls1_final_finish_mac() 633 OPENSSL_cleanse(hash, hashlen); in tls1_final_finish_mac() 642 size_t hashlen; in tls1_generate_master_secret() local 649 || !ssl_handshake_hash(s, hash, sizeof(hash), &hashlen)) { in tls1_generate_master_secret() 655 BIO_dump(trc_out, (char *)hash, hashlen); in tls1_generate_master_secret() 660 hash, hashlen, in tls1_generate_master_secret() 668 OPENSSL_cleanse(hash, hashlen); in tls1_generate_master_secret()
|
/third_party/openssl/ssl/ |
D | tls13_enc.c | 46 size_t hashlen; in tls13_hkdf_expand() local 75 hashlen = (size_t)ret; in tls13_hkdf_expand() 81 (unsigned char *)secret, hashlen); in tls13_hkdf_expand() 265 size_t len = 0, hashlen; in tls13_final_finish_mac() local 278 if (!ssl_handshake_hash(s, hash, sizeof(hash), &hashlen)) { in tls13_final_finish_mac() 290 finsecret, hashlen)) in tls13_final_finish_mac() 296 params, key, hashlen, hash, hashlen, in tls13_final_finish_mac() 344 size_t hashlen; in derive_secret_key_and_iv() local 351 hashlen = (size_t)hashleni; in derive_secret_key_and_iv() 353 if (!tls13_hkdf_expand(s, md, insecret, label, labellen, hash, hashlen, in derive_secret_key_and_iv() [all …]
|
D | t1_enc.c | 610 size_t hashlen; in tls1_final_finish_mac() local 622 if (!ssl_handshake_hash(s, hash, sizeof(hash), &hashlen)) { in tls1_final_finish_mac() 627 if (!tls1_PRF(s, str, slen, hash, hashlen, NULL, 0, NULL, 0, NULL, 0, in tls1_final_finish_mac() 633 OPENSSL_cleanse(hash, hashlen); in tls1_final_finish_mac() 642 size_t hashlen; in tls1_generate_master_secret() local 649 || !ssl_handshake_hash(s, hash, sizeof(hash), &hashlen)) { in tls1_generate_master_secret() 655 BIO_dump(trc_out, (char *)hash, hashlen); in tls1_generate_master_secret() 660 hash, hashlen, in tls1_generate_master_secret() 668 OPENSSL_cleanse(hash, hashlen); in tls1_generate_master_secret()
|
/third_party/ffmpeg/libavutil/ |
D | hmac.c | 46 int blocklen, hashlen; member 80 c->hashlen = 16; in av_hmac_alloc() 88 c->hashlen = 20; in av_hmac_alloc() 96 c->hashlen = 28; in av_hmac_alloc() 104 c->hashlen = 32; in av_hmac_alloc() 112 c->hashlen = 48; in av_hmac_alloc() 120 c->hashlen = 64; in av_hmac_alloc() 153 c->keylen = c->hashlen; in av_hmac_init() 175 if (outlen < c->hashlen) in av_hmac_final() 184 c->update(c->hash, out, c->hashlen); in av_hmac_final() [all …]
|
/third_party/mbedtls/library/ |
D | rsa.c | 1655 unsigned int hashlen, in rsa_rsassa_pss_sign() argument 1667 if ((md_alg != MBEDTLS_MD_NONE || hashlen != 0) && hash == NULL) { in rsa_rsassa_pss_sign() 1688 if (hashlen != exp_hashlen) { in rsa_rsassa_pss_sign() 1736 ret = hash_mprime(hash, hashlen, salt, slen, p, (mbedtls_md_type_t)ctx->hash_id); in rsa_rsassa_pss_sign() 1770 unsigned int hashlen, in mbedtls_rsa_rsassa_pss_sign_ext() argument 1776 hashlen, hash, saltlen, sig); in mbedtls_rsa_rsassa_pss_sign_ext() 1787 unsigned int hashlen, in mbedtls_rsa_rsassa_pss_sign() argument 1792 hashlen, hash, MBEDTLS_RSA_SALT_LEN_ANY, sig); in mbedtls_rsa_rsassa_pss_sign() 1819 unsigned int hashlen, in rsa_rsassa_pkcs1_v15_encode() argument 1840 if (hashlen != md_size) { in rsa_rsassa_pkcs1_v15_encode() [all …]
|
D | ssl_tls12_client.c | 2288 size_t sig_len, hashlen; in ssl_parse_server_key_exchange() local 2370 ret = mbedtls_ssl_get_key_exchange_md_tls1_2(ssl, hash, &hashlen, in ssl_parse_server_key_exchange() 2381 MBEDTLS_SSL_DEBUG_BUF(3, "parameters hash", hash, hashlen); in ssl_parse_server_key_exchange() 2413 md_alg, hash, hashlen, in ssl_parse_server_key_exchange() 2418 md_alg, hash, hashlen, p, sig_len, rs_ctx); in ssl_parse_server_key_exchange() 3243 size_t hashlen; in ssl_write_certificate_verify() local 3294 ret = ssl->handshake->calc_verify(ssl, hash, &hashlen); in ssl_write_certificate_verify() 3326 hashlen = 0; in ssl_write_certificate_verify() 3336 md_alg, hash_start, hashlen, in ssl_write_certificate_verify()
|
D | pkcs7.c | 748 size_t hashlen) in mbedtls_pkcs7_signed_hash_verify() argument 753 return mbedtls_pkcs7_data_or_hash_verify(pkcs7, cert, hash, hashlen, 1); in mbedtls_pkcs7_signed_hash_verify()
|
D | ssl_tls12_server.c | 3045 size_t hashlen = 0; in ssl_prepare_server_key_exchange() local 3080 ret = mbedtls_ssl_get_key_exchange_md_tls1_2(ssl, hash, &hashlen, in ssl_prepare_server_key_exchange() 3092 MBEDTLS_SSL_DEBUG_BUF(3, "parameters hash", hash, hashlen); in ssl_prepare_server_key_exchange() 3120 md_alg, hash, hashlen); in ssl_prepare_server_key_exchange() 3149 md_alg, hash, hashlen, in ssl_prepare_server_key_exchange() 4022 size_t hashlen; in ssl_parse_certificate_verify() local 4108 hashlen = 0; in ssl_parse_certificate_verify() 4156 md_alg, hash_start, hashlen, in ssl_parse_certificate_verify()
|
/third_party/mbedtls/include/mbedtls/ |
D | rsa.h | 842 unsigned int hashlen, 874 unsigned int hashlen, 925 unsigned int hashlen, 975 unsigned int hashlen, 1007 unsigned int hashlen, 1032 unsigned int hashlen, 1067 unsigned int hashlen, 1107 unsigned int hashlen,
|
D | pkcs7.h | 239 const unsigned char *hash, size_t hashlen);
|
D | pk.h | 261 mbedtls_md_type_t md_alg, unsigned int hashlen,
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/ |
D | eap_gpsk_common.c | 43 size_t i, n, hashlen, left, clen; in eap_gpsk_gkdf_cmac() local 48 hashlen = sizeof(hash); in eap_gpsk_gkdf_cmac() 57 n = (len + hashlen - 1) / hashlen; in eap_gpsk_gkdf_cmac() 62 clen = left > hashlen ? hashlen : left; in eap_gpsk_gkdf_cmac() 78 size_t i, n, hashlen, left, clen; in eap_gpsk_gkdf_sha256() local 83 hashlen = SHA256_MAC_LEN; in eap_gpsk_gkdf_sha256() 92 n = (len + hashlen - 1) / hashlen; in eap_gpsk_gkdf_sha256() 97 clen = left > hashlen ? hashlen : left; in eap_gpsk_gkdf_sha256()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/ |
D | eap_gpsk_common.c | 43 size_t i, n, hashlen, left, clen; in eap_gpsk_gkdf_cmac() local 48 hashlen = sizeof(hash); in eap_gpsk_gkdf_cmac() 57 n = (len + hashlen - 1) / hashlen; in eap_gpsk_gkdf_cmac() 62 clen = left > hashlen ? hashlen : left; in eap_gpsk_gkdf_cmac() 78 size_t i, n, hashlen, left, clen; in eap_gpsk_gkdf_sha256() local 83 hashlen = SHA256_MAC_LEN; in eap_gpsk_gkdf_sha256() 92 n = (len + hashlen - 1) / hashlen; in eap_gpsk_gkdf_sha256() 97 clen = left > hashlen ? hashlen : left; in eap_gpsk_gkdf_sha256()
|
/third_party/mbedtls/docs/architecture/psa-migration/ |
D | psa-limitations.md | 129 - salt length can be either "standard" (<= hashlen, see note) or "any" 131 - salt length: always <= hashlen (see note) and random salt 133 - salt length: either <= hashlen (see note), or any depending on algorithm 135 Note: above, "<= hashlen" means that hashlen is used if possible, but if it 171 OpenSSL picks saltlen = keylen - hashlen - 2 (tested with openssl 1.1.1f). 172 The `certtool` command provided by GnuTLS seems to be picking saltlen = hashlen 174 hashlen. 248 all using saltlen = keylen - hashlen - 2, except for server9-defaults which is 249 using saltlen = hashlen. 279 all using saltlen = keylen - hashlen - 2. [all …]
|
/third_party/ffmpeg/libavutil/tests/ |
D | hmac.c | 64 test(hmac, key1, hmac->hashlen, data1, sizeof(data1)); in main() 66 test(hmac, key3, hmac->hashlen, data3, sizeof(data3)); in main()
|
/third_party/openssl/test/ |
D | tls13secretstest.c | 138 size_t *hashlen) in ssl_handshake_hash() argument 146 *hashlen = sizeof(hs_full_hash); in ssl_handshake_hash() 149 *hashlen = sizeof(hs_start_hash); in ssl_handshake_hash()
|
/third_party/openssl/ssl/statem/ |
D | statem_lib.c | 229 size_t hashlen; in get_cert_verify_tbs_data() local 249 hashlen = s->cert_verify_hash_len; in get_cert_verify_tbs_data() 251 EVP_MAX_MD_SIZE, &hashlen)) { in get_cert_verify_tbs_data() 257 *hdatalen = TLS13_TBS_PREAMBLE_SIZE + hashlen; in get_cert_verify_tbs_data() 2187 size_t hashlen, const unsigned char *hrr, in create_synthetic_message_hash() argument 2197 hashlen = 0; in create_synthetic_message_hash() 2201 &hashlen)) { in create_synthetic_message_hash() 2215 msghdr[SSL3_HM_HEADER_LENGTH - 1] = (unsigned char)hashlen; in create_synthetic_message_hash() 2217 || !ssl3_finish_mac(s, hashval, hashlen)) { in create_synthetic_message_hash()
|
D | extensions_srvr.c | 1725 size_t startlen, ciphlen, totcookielen, hashlen, hmaclen, appcookielen; in tls_construct_stoc_cookie() local 1763 || !ssl_handshake_hash(s, hashval1, EVP_MAX_MD_SIZE, &hashlen)) { in tls_construct_stoc_cookie() 1768 if (!WPACKET_allocate_bytes(pkt, hashlen, &hashval2) in tls_construct_stoc_cookie()
|
D | statem_clnt.c | 2595 size_t hashlen; in tls_process_new_session_ticket() local 2603 hashlen = (size_t)hashleni; in tls_process_new_session_ticket() 2611 hashlen, 1)) { in tls_process_new_session_ticket() 2615 s->session->master_key_length = hashlen; in tls_process_new_session_ticket()
|
/third_party/node/deps/openssl/openssl/ssl/statem/ |
D | statem_lib.c | 250 size_t hashlen; in get_cert_verify_tbs_data() local 270 hashlen = s->cert_verify_hash_len; in get_cert_verify_tbs_data() 272 EVP_MAX_MD_SIZE, &hashlen)) { in get_cert_verify_tbs_data() 278 *hdatalen = TLS13_TBS_PREAMBLE_SIZE + hashlen; in get_cert_verify_tbs_data() 2222 size_t hashlen, const unsigned char *hrr, in create_synthetic_message_hash() argument 2232 hashlen = 0; in create_synthetic_message_hash() 2236 &hashlen)) { in create_synthetic_message_hash() 2250 msghdr[SSL3_HM_HEADER_LENGTH - 1] = (unsigned char)hashlen; in create_synthetic_message_hash() 2252 || !ssl3_finish_mac(s, hashval, hashlen)) { in create_synthetic_message_hash()
|
D | extensions_srvr.c | 1759 size_t startlen, ciphlen, totcookielen, hashlen, hmaclen, appcookielen; in tls_construct_stoc_cookie() local 1797 || !ssl_handshake_hash(s, hashval1, EVP_MAX_MD_SIZE, &hashlen)) { in tls_construct_stoc_cookie() 1802 if (!WPACKET_allocate_bytes(pkt, hashlen, &hashval2) in tls_construct_stoc_cookie()
|
D | statem_srvr.c | 3930 size_t i, hashlen; in tls_construct_new_session_ticket() local 3941 hashlen = (size_t)hashleni; in tls_construct_new_session_ticket() 3983 hashlen, 1)) { in tls_construct_new_session_ticket() 3987 s->session->master_key_length = hashlen; in tls_construct_new_session_ticket()
|
/third_party/gstreamer/gstplugins_bad/gst/rtmp2/rtmp/ |
D | rtmpclient.c | 524 gsize hashlen = sizeof hash; in do_adobe_auth() local 537 g_checksum_get_digest (md5, hash, &hashlen); in do_adobe_auth() 538 g_warn_if_fail (hashlen == sizeof hash); in do_adobe_auth() 555 g_checksum_get_digest (md5, hash, &hashlen); in do_adobe_auth() 556 g_warn_if_fail (hashlen == sizeof hash); in do_adobe_auth()
|
/third_party/mbedtls/tests/suites/ |
D | test_suite_x509write.function | 24 mbedtls_md_type_t md_alg, unsigned int hashlen, 28 md_alg, hashlen, hash, sig);
|