| /src/crypto/external/bsd/openssl.old/dist/crypto/rsa/ |
| rsa_oaep.c | 51 int mdlen, dbmask_len = 0; local 58 mdlen = EVP_MD_size(md); 60 if (flen > emlen - 2 * mdlen - 1) { 66 if (emlen < 2 * mdlen + 1) { 74 db = to + mdlen + 1; 78 memset(db + mdlen, 0, emlen - flen - 2 * mdlen - 1); 79 db[emlen - flen - mdlen - 1] = 0x01; 80 memcpy(db + emlen - flen - mdlen, from, (unsigned int)flen); 81 if (RAND_bytes(seed, mdlen) <= 0 131 int mdlen; local 280 int mdlen; local [all...] |
| /src/crypto/external/apache2/openssl/dist/crypto/rsa/ |
| rsa_oaep.c | 66 int mdlen, dbmask_len = 0; local 91 mdlen = EVP_MD_get_size(md); 92 if (mdlen <= 0) { 98 if (flen > emlen - 2 * mdlen - 1) { 103 if (emlen < 2 * mdlen + 1) { 111 db = to + mdlen + 1; 117 memset(db + mdlen, 0, emlen - flen - 2 * mdlen - 1); 119 db[emlen - flen - mdlen - 1] = 0x01; 120 memcpy(db + emlen - flen - mdlen, from, (unsigned int)flen) 183 int mdlen; local 357 int mdlen; local [all...] |
| /src/crypto/external/bsd/openssl/dist/crypto/rsa/ |
| rsa_oaep.c | 66 int mdlen, dbmask_len = 0; local 79 mdlen = EVP_MD_get_size(md); 80 if (mdlen <= 0) { 86 if (flen > emlen - 2 * mdlen - 1) { 91 if (emlen < 2 * mdlen + 1) { 99 db = to + mdlen + 1; 105 memset(db + mdlen, 0, emlen - flen - 2 * mdlen - 1); 107 db[emlen - flen - mdlen - 1] = 0x01; 108 memcpy(db + emlen - flen - mdlen, from, (unsigned int)flen) 173 int mdlen; local 339 int mdlen; local [all...] |
| /src/crypto/external/bsd/openssl.old/dist/crypto/ec/ |
| ecdh_kdf.c | 27 size_t mdlen; local 35 mdlen = EVP_MD_size(md); 50 if (outlen >= mdlen) { 53 outlen -= mdlen; 56 out += mdlen; 61 OPENSSL_cleanse(mtmp, mdlen);
|
| /src/crypto/external/apache2/openssl/dist/crypto/cms/ |
| cms_dd.c | 64 unsigned int mdlen; local 78 if (EVP_DigestFinal_ex(mctx, md, &mdlen) <= 0) 82 if (mdlen != (unsigned int)dd->digest->length) { 87 if (memcmp(md, dd->digest->data, mdlen)) 92 if (!ASN1_STRING_set(dd->digest, md, mdlen))
|
| /src/crypto/external/bsd/openssl/dist/crypto/cms/ |
| cms_dd.c | 64 unsigned int mdlen; local 78 if (EVP_DigestFinal_ex(mctx, md, &mdlen) <= 0) 82 if (mdlen != (unsigned int)dd->digest->length) { 87 if (memcmp(md, dd->digest->data, mdlen)) 92 if (!ASN1_STRING_set(dd->digest, md, mdlen))
|
| /src/crypto/external/bsd/openssl.old/dist/crypto/cms/ |
| cms_dd.c | 59 unsigned int mdlen; local 73 if (EVP_DigestFinal_ex(mctx, md, &mdlen) <= 0) 77 if (mdlen != (unsigned int)dd->digest->length) { 83 if (memcmp(md, dd->digest->data, mdlen)) 89 if (!ASN1_STRING_set(dd->digest, md, mdlen))
|
| /src/crypto/external/bsd/openssl.old/dist/crypto/dh/ |
| dh_kdf.c | 106 size_t mdlen; local 114 mdlen = EVP_MD_size(md); 129 if (outlen >= mdlen) { 132 outlen -= mdlen; 135 out += mdlen; 140 OPENSSL_cleanse(mtmp, mdlen);
|
| /src/crypto/external/bsd/openssl.old/dist/crypto/evp/ |
| m_sigver.c | 125 unsigned int mdlen = 0; local 130 r = EVP_DigestFinal_ex(ctx, md, &mdlen); 143 r = EVP_DigestFinal_ex(tmp_ctx, md, &mdlen); 148 if (EVP_PKEY_sign(ctx->pctx, sigret, siglen, md, mdlen) <= 0) 178 unsigned int mdlen = 0; local 189 r = EVP_DigestFinal_ex(ctx, md, &mdlen); 202 r = EVP_DigestFinal_ex(tmp_ctx, md, &mdlen); 207 return EVP_PKEY_verify(ctx->pctx, sig, siglen, md, mdlen);
|
| p5_crpt2.c | 37 int cplen, j, k, tkeylen, mdlen; local 41 mdlen = EVP_MD_size(digest); 42 if (mdlen < 0) 66 if (tkeylen > mdlen) 67 cplen = mdlen; 97 if (!HMAC_Update(hctx, digtmp, mdlen)
|
| /src/crypto/external/bsd/openssl/dist/providers/implementations/kdfs/ |
| pbkdf2.c | 281 int cplen, k, tkeylen, mdlen; local 286 mdlen = EVP_MD_get_size(digest); 287 if (mdlen <= 0) 291 * This check should always be done because keylen / mdlen >= (2^32 - 1) 294 if ((keylen / mdlen) >= KDF_PBKDF2_MAX_KEY_LEN_DIGEST_RATIO) { 325 if (tkeylen > mdlen) 326 cplen = mdlen; 347 if (!HMAC_Update(hctx, digtmp, mdlen)
|
| /src/crypto/external/bsd/openssh/dist/ |
| digest-openssl.c | 174 u_int mdlen; local 182 mdlen = dlen; 183 if (!EVP_Digest(m, mlen, d, &mdlen, digest->mdfunc(), NULL))
|
| /src/crypto/external/bsd/openssl/dist/crypto/pkcs7/ |
| pk7_attr.c | 117 const unsigned char *md, int mdlen) 123 if (!ASN1_STRING_set(os, md, mdlen)
|
| /src/crypto/external/bsd/openssl.old/dist/crypto/pkcs7/ |
| pk7_attr.c | 108 const unsigned char *md, int mdlen) 114 if (!ASN1_STRING_set(os, md, mdlen)
|
| /src/crypto/external/apache2/openssl/dist/include/internal/ |
| sha3.h | 54 size_t typelen, size_t mdlen);
|
| /src/crypto/external/apache2/openssl/dist/crypto/ocsp/ |
| ocsp_vfy.c | 312 int mdlen; local 329 mdlen = EVP_MD_get_size(dgst); 330 if (mdlen <= 0) { 334 if (cid->issuerNameHash.length != mdlen || cid->issuerKeyHash.length != mdlen) { 341 if (memcmp(md, cid->issuerNameHash.data, mdlen) != 0) { 349 ret = memcmp(md, cid->issuerKeyHash.data, mdlen) == 0;
|
| /src/crypto/external/apache2/openssl/dist/providers/implementations/kdfs/ |
| pbkdf2.c | 384 int cplen, k, tkeylen, mdlen; local 389 mdlen = EVP_MD_get_size(digest); 390 if (mdlen <= 0) 394 * This check should always be done because keylen / mdlen >= (2^32 - 1) 397 if ((keylen / mdlen) >= KDF_PBKDF2_MAX_KEY_LEN_DIGEST_RATIO) { 429 if (tkeylen > mdlen) 430 cplen = mdlen; 451 if (!HMAC_Update(hctx, digtmp, mdlen)
|
| /src/crypto/external/bsd/openssl/dist/crypto/ocsp/ |
| ocsp_vfy.c | 313 int mdlen; local 330 mdlen = EVP_MD_get_size(dgst); 331 if (mdlen < 0) { 335 if (cid->issuerNameHash.length != mdlen || 336 cid->issuerKeyHash.length != mdlen) { 343 if (memcmp(md, cid->issuerNameHash.data, mdlen) != 0) { 351 ret = memcmp(md, cid->issuerKeyHash.data, mdlen) == 0;
|
| /src/crypto/external/bsd/openssl.old/dist/crypto/ocsp/ |
| ocsp_vfy.c | 283 int mdlen; local 292 mdlen = EVP_MD_size(dgst); 293 if (mdlen < 0) 295 if ((cid->issuerNameHash.length != mdlen) || 296 (cid->issuerKeyHash.length != mdlen)) 301 if (memcmp(md, cid->issuerNameHash.data, mdlen)) 304 if (memcmp(md, cid->issuerKeyHash.data, mdlen))
|
| /src/crypto/external/apache2/openssl/dist/providers/implementations/signature/ |
| eddsa_sig.c | 391 size_t mdlen; local 432 tbs, tbslen, md, &mdlen) 433 || mdlen != EDDSA_PREHASH_OUTPUT_LEN) { 438 tbslen = mdlen; 500 size_t mdlen = sizeof(md); local 538 if (!ed448_shake256(peddsactx->libctx, NULL, tbs, tbslen, md, mdlen)) 541 tbslen = mdlen; 576 size_t mdlen; local 599 tbs, tbslen, md, &mdlen) 600 || mdlen != EDDSA_PREHASH_OUTPUT_LEN) 634 size_t mdlen = sizeof(md); local [all...] |
| /src/external/bsd/wpa/dist/src/eap_common/ |
| eap_pwd_common.c | 51 size_t resultbytelen, len = 0, mdlen; local 68 mdlen = SHA256_MAC_LEN; 69 if (crypto_hash_finish(hash, digest, &mdlen) < 0) 71 if ((len + mdlen) > resultbytelen) 74 os_memcpy(result + len, digest, mdlen); 75 len += mdlen;
|
| /src/crypto/external/apache2/openssl/dist/crypto/pkcs7/ |
| pk7_attr.c | 124 const unsigned char *md, int mdlen) 130 if (!ASN1_STRING_set(os, md, mdlen)
|
| /src/crypto/external/apache2/openssl/dist/crypto/sha/ |
| sha3.c | 43 int ossl_keccak_init(KECCAK1600_CTX *ctx, unsigned char pad, size_t bitlen, size_t mdlen) 48 ctx->md_size = mdlen / 8;
|
| /src/crypto/external/bsd/openssl/dist/crypto/evp/ |
| m_sigver.c | 526 unsigned int mdlen = 0; local 532 r = EVP_DigestFinal_ex(ctx, md, &mdlen); 546 r = EVP_DigestFinal_ex(tmp_ctx, md, &mdlen); 551 if (EVP_PKEY_sign(pctx, sigret, siglen, md, mdlen) <= 0) 597 unsigned int mdlen = 0; local 639 r = EVP_DigestFinal_ex(ctx, md, &mdlen); 652 r = EVP_DigestFinal_ex(tmp_ctx, md, &mdlen); 657 return EVP_PKEY_verify(pctx, sig, siglen, md, mdlen);
|
| /src/crypto/external/bsd/openssl.old/dist/crypto/sm2/ |
| sm2_pmeth.c | 266 int mdlen = EVP_MD_size(md); local 278 if (mdlen < 0) { 287 return EVP_DigestUpdate(mctx, z, (size_t)mdlen);
|