| /src/crypto/external/apache2/openssl/dist/crypto/ct/ |
| ct_sct_ctx.c | 206 unsigned int md_len; local 226 if (!EVP_Digest(der, der_len, md, &md_len, sha256, NULL))
|
| /src/crypto/external/apache2/openssl/dist/crypto/rsa/ |
| rsa_pk1.c | 291 unsigned int md_len; local 352 md_len = SHA256_DIGEST_LENGTH; 354 if (HMAC_Final(hmac, hmac_out, &md_len) <= 0) { 360 if (HMAC_Final(hmac, to + pos, &md_len) <= 0) {
|
| rsa_ossl.c | 436 unsigned int md_len = SHA256_DIGEST_LENGTH; local 502 md_len = SHA256_DIGEST_LENGTH; 503 if (HMAC_Final(hmac, kdk, &md_len) <= 0) {
|
| /src/crypto/external/bsd/openssl/dist/crypto/ct/ |
| ct_sct_ctx.c | 210 unsigned int md_len; local 230 if (!EVP_Digest(der, der_len, md, &md_len, sha256, NULL))
|
| /src/crypto/external/bsd/openssl.old/dist/crypto/ct/ |
| ct_sct_ctx.c | 200 unsigned int md_len; local 216 if (!EVP_Digest(der, der_len, md, &md_len, EVP_sha256(), NULL))
|
| /src/crypto/external/bsd/openssl.old/dist/include/openssl/ |
| sha.h | 60 unsigned int num, md_len; member in struct:SHA256state_st 107 unsigned int num, md_len; member in struct:SHA512state_st
|
| /src/external/ibm-public/postfix/dist/src/tls/ |
| tls_fprint.c | 20 /* char *tls_digest_encode(md_buf, md_len) 22 /* const char *md_len; 70 /* .IP md_len 248 unsigned int md_len; local 310 CHECK_OK_AND(EVP_DigestFinal_ex(mdctx, md_buf, &md_len)); 316 if (md_len > EVP_MAX_MD_SIZE) 317 msg_panic("unexpectedly large %s digest size: %u", mdalg, md_len); 330 result = vstring_alloc(strlen(props->serverid) + 1 + 2 * md_len); 333 for (i = 0; i < md_len; i++) { 343 char *tls_digest_encode(const unsigned char *md_buf, int md_len) 367 unsigned int md_len; local [all...] |
| /src/crypto/external/apache2/openssl/dist/crypto/slh_dsa/ |
| slh_dsa.c | 18 #define MD_LEN(params) (((params)->k * (params)->a + 7) >> 3) 52 const uint8_t *md; /* The first md_len bytes of m_digest */ 53 size_t md_len = MD_LEN(params); /* The size of the digest |md| */ local 101 /* Grab the first md_len bytes of m_digest to use in fors_sign() */ 102 || !PACKET_get_bytes(rpkt, &md, md_len) 161 size_t md_len = MD_LEN(params); /* 21..40 bytes */ local 191 * Get md (the first md_len bytes of m_digest to use in 196 || !PACKET_get_bytes(m_digest_rpkt, &md, md_len) [all...] |
| /src/crypto/external/apache2/openssl/dist/include/openssl/ |
| sha.h | 66 unsigned int num, md_len; member in struct:SHA256state_st 117 unsigned int num, md_len; member in struct:SHA512state_st
|
| /src/crypto/external/apache2/openssl/dist/ssl/ |
| s3_enc.c | 94 size_t md_len; local 121 md_len = (size_t)mdi; 127 n = md_len + md_len; 133 n = md_len; 135 n += md_len + key_len; 151 md_len, ciph, 0, NID_undef, md, comp, NULL)) {
|
| /src/crypto/external/bsd/openssl/dist/include/openssl/ |
| sha.h | 70 unsigned int num, md_len; member in struct:SHA256state_st 120 unsigned int num, md_len; member in struct:SHA512state_st
|
| /src/usr.sbin/syslogd/ |
| sign.c | 748 unsigned md_len = 0; local 754 SSL_CHECK_ONE(EVP_DigestFinal_ex(GlobalSign.mdctx, md_value, &md_len)); 756 b64_ntop(md_value, md_len, (char *)md_b64, EVP_MAX_MD_SIZE*2);
|
| /src/crypto/external/apache2/openssl/dist/fuzz/ |
| provider.c | 549 unsigned int md_len; local 570 if (!EVP_DigestFinal_ex(mdctx, md_value, &md_len)) {
|
| /src/crypto/external/bsd/openssl/dist/crypto/pkcs7/ |
| pk7_doit.c | 700 unsigned int md_len; local 711 if (!EVP_DigestFinal_ex(mctx, md_data, &md_len)) { 715 if (!PKCS7_add1_attrib_digest(si, md_data, md_len)) { 865 unsigned int md_len; local 869 if (!EVP_DigestFinal_ex(mdc, md_data, &md_len)) 871 if (!ASN1_OCTET_STRING_set(p7->d.digest->digest, md_data, md_len)) 1077 unsigned int md_len; local 1081 if (!EVP_DigestFinal_ex(mdc_tmp, md_dat, &md_len)) 1088 if ((message_digest->length != (int)md_len) || 1089 (memcmp(message_digest->data, md_dat, md_len))) { [all...] |
| /src/crypto/external/bsd/openssl.old/dist/crypto/pkcs7/ |
| pk7_doit.c | 618 unsigned int md_len; local 629 if (!EVP_DigestFinal_ex(mctx, md_data, &md_len)) { 633 if (!PKCS7_add1_attrib_digest(si, md_data, md_len)) { 778 unsigned int md_len; local 782 if (!EVP_DigestFinal_ex(mdc, md_data, &md_len)) 784 if (!ASN1_OCTET_STRING_set(p7->d.digest->digest, md_data, md_len)) 997 unsigned int md_len; local 1001 if (!EVP_DigestFinal_ex(mdc_tmp, md_dat, &md_len)) 1009 if ((message_digest->length != (int)md_len) || 1010 (memcmp(message_digest->data, md_dat, md_len))) { [all...] |
| /src/crypto/external/apache2/openssl/dist/crypto/pkcs7/ |
| pk7_doit.c | 743 unsigned int md_len; local 754 if (!EVP_DigestFinal_ex(mctx, md_data, &md_len)) { 758 if (!PKCS7_add1_attrib_digest(si, md_data, md_len)) { 907 unsigned int md_len; local 911 if (!EVP_DigestFinal_ex(mdc, md_data, &md_len)) 913 if (!ASN1_OCTET_STRING_set(p7->d.digest->digest, md_data, md_len)) 1125 unsigned int md_len; local 1129 if (!EVP_DigestFinal_ex(mdc_tmp, md_dat, &md_len)) 1136 if ((message_digest->length != (int)md_len) || (memcmp(message_digest->data, md_dat, md_len))) { [all...] |
| /src/external/bsd/openldap/dist/libraries/libldap/ |
| tls_g.c | 827 int sign_algo, md_len, rc; local 865 md_len = gnutls_hash_get_len( md ); 866 if ( md_len == 0 || md_len > buf->bv_len ) 873 buf->bv_len = md_len; 875 return md_len;
|
| /src/lib/libradius/ |
| radlib.c | 178 u_int md_len; local 191 HMAC_Final(ctx, md, &md_len); 194 (size_t)md_len); 215 u_int md_len; local 274 HMAC_Final(hctx, md, &md_len);
|
| /src/crypto/external/bsd/openssl/dist/ssl/statem/ |
| statem_lib.c | 789 size_t md_len; local 824 md_len = s->s3.tmp.peer_finish_md_len; 826 if (md_len != PACKET_remaining(pkt)) { 832 md_len) != 0) { 840 if (!ossl_assert(md_len <= EVP_MAX_MD_SIZE)) { 846 md_len); 847 s->s3.previous_client_finished_len = md_len; 850 md_len); 851 s->s3.previous_server_finished_len = md_len;
|
| statem_clnt.c | 3019 unsigned int md_len; local 3078 || EVP_DigestFinal_ex(ukm_hash, shared_ukm, &md_len) <= 0) { 3136 unsigned int md_len; local 3146 || EVP_DigestFinal_ex(hash, dgst_buf, &md_len) <= 0) {
|
| /src/crypto/external/bsd/openssl.old/dist/ssl/statem/ |
| statem_lib.c | 764 size_t md_len; local 801 md_len = s->s3->tmp.peer_finish_md_len; 803 if (md_len != PACKET_remaining(pkt)) { 810 md_len) != 0) { 819 if (!ossl_assert(md_len <= EVP_MAX_MD_SIZE)) { 826 md_len); 827 s->s3->previous_client_finished_len = md_len; 830 md_len); 831 s->s3->previous_server_finished_len = md_len;
|
| statem_clnt.c | 3183 unsigned int md_len; local 3244 || EVP_DigestFinal_ex(ukm_hash, shared_ukm, &md_len) <= 0) {
|
| /src/crypto/external/apache2/openssl/dist/ssl/statem/ |
| statem_clnt.c | 3302 unsigned int md_len; local 3363 || EVP_DigestFinal_ex(ukm_hash, shared_ukm, &md_len) <= 0) { 3422 unsigned int md_len; local 3434 || EVP_DigestFinal_ex(hash, dgst_buf, &md_len) <= 0) {
|
| statem_lib.c | 845 size_t md_len; local 885 md_len = s->s3.tmp.peer_finish_md_len; 887 if (md_len != PACKET_remaining(pkt)) { 893 md_len); 909 if (!ossl_assert(md_len <= EVP_MAX_MD_SIZE)) { 915 md_len); 916 s->s3.previous_client_finished_len = md_len; 919 md_len); 920 s->s3.previous_server_finished_len = md_len;
|
| /src/crypto/external/bsd/openssl.old/dist/test/ |
| evp_extra_test.c | 1801 unsigned int md_len; local 1830 || !TEST_true(EVP_DigestFinal_ex(mdctx, md_value, &md_len))
|