/openssl-master/crypto/rsa/ |
A D | rsa_oaep.c | 66 int mdlen, dbmask_len = 0; in ossl_rsa_padding_add_PKCS1_OAEP_mgf1_ex() local 80 if (mdlen <= 0) { in ossl_rsa_padding_add_PKCS1_OAEP_mgf1_ex() 99 db = to + mdlen + 1; in ossl_rsa_padding_add_PKCS1_OAEP_mgf1_ex() 105 memset(db + mdlen, 0, emlen - flen - 2 * mdlen - 1); in ossl_rsa_padding_add_PKCS1_OAEP_mgf1_ex() 113 dbmask_len = emlen - mdlen; in ossl_rsa_padding_add_PKCS1_OAEP_mgf1_ex() 131 for (i = 0; i < mdlen; i++) in ossl_rsa_padding_add_PKCS1_OAEP_mgf1_ex() 173 int mdlen; in RSA_padding_check_PKCS1_OAEP_mgf1() local 204 dblen = num - mdlen - 1; in RSA_padding_check_PKCS1_OAEP_mgf1() 339 int mdlen; in PKCS1_MGF1() local 345 if (mdlen < 0) in PKCS1_MGF1() [all …]
|
/openssl-master/crypto/cms/ |
A D | cms_dd.c | 64 unsigned int mdlen; in ossl_cms_DigestedData_do_final() local 78 if (EVP_DigestFinal_ex(mctx, md, &mdlen) <= 0) in ossl_cms_DigestedData_do_final() 82 if (mdlen != (unsigned int)dd->digest->length) { in ossl_cms_DigestedData_do_final() 87 if (memcmp(md, dd->digest->data, mdlen)) in ossl_cms_DigestedData_do_final() 92 if (!ASN1_STRING_set(dd->digest, md, mdlen)) in ossl_cms_DigestedData_do_final()
|
A D | cms_sd.c | 700 unsigned int mdlen; in cms_SignerInfo_content_sign() local 702 if (!EVP_DigestFinal_ex(mctx, md, &mdlen)) in cms_SignerInfo_content_sign() 705 V_ASN1_OCTET_STRING, md, mdlen)) in cms_SignerInfo_content_sign() 717 unsigned int mdlen; in cms_SignerInfo_content_sign() local 720 if (!EVP_DigestFinal_ex(mctx, md, &mdlen)) in cms_SignerInfo_content_sign() 728 if (EVP_PKEY_sign(pctx, sig, &siglen, md, mdlen) <= 0) { in cms_SignerInfo_content_sign()
|
/openssl-master/providers/implementations/kdfs/ |
A D | pbkdf2.c | 279 int cplen, k, tkeylen, mdlen; in pbkdf2_derive() local 284 mdlen = EVP_MD_get_size(digest); in pbkdf2_derive() 285 if (mdlen <= 0) in pbkdf2_derive() 292 if ((keylen / mdlen) >= KDF_PBKDF2_MAX_KEY_LEN_DIGEST_RATIO) { in pbkdf2_derive() 323 if (tkeylen > mdlen) in pbkdf2_derive() 324 cplen = mdlen; in pbkdf2_derive() 345 if (!HMAC_Update(hctx, digtmp, mdlen) in pbkdf2_derive()
|
A D | hkdf.c | 589 size_t mdlen; in prov_tls13_hkdf_generate_secret() local 599 mdlen = (size_t)ret; in prov_tls13_hkdf_generate_secret() 603 insecretlen = mdlen; in prov_tls13_hkdf_generate_secret() 622 if (!prov_tls13_hkdf_expand(md, prevsecret, mdlen, in prov_tls13_hkdf_generate_secret() 624 hash, mdlen, preextractsec, mdlen)) in prov_tls13_hkdf_generate_secret() 627 prevsecretlen = mdlen; in prov_tls13_hkdf_generate_secret() 634 OPENSSL_cleanse(preextractsec, mdlen); in prov_tls13_hkdf_generate_secret()
|
/openssl-master/crypto/ocsp/ |
A D | ocsp_vfy.c | 312 int mdlen; in ocsp_match_issuerid() local 329 mdlen = EVP_MD_get_size(dgst); in ocsp_match_issuerid() 330 if (mdlen < 0) { in ocsp_match_issuerid() 334 if (cid->issuerNameHash.length != mdlen || in ocsp_match_issuerid() 335 cid->issuerKeyHash.length != mdlen) { in ocsp_match_issuerid() 342 if (memcmp(md, cid->issuerNameHash.data, mdlen) != 0) { in ocsp_match_issuerid() 350 ret = memcmp(md, cid->issuerKeyHash.data, mdlen) == 0; in ocsp_match_issuerid()
|
/openssl-master/crypto/evp/ |
A D | m_sigver.c | 526 unsigned int mdlen = 0; in EVP_DigestSignFinal() local 532 r = EVP_DigestFinal_ex(ctx, md, &mdlen); in EVP_DigestSignFinal() 546 r = EVP_DigestFinal_ex(tmp_ctx, md, &mdlen); in EVP_DigestSignFinal() 551 if (EVP_PKEY_sign(pctx, sigret, siglen, md, mdlen) <= 0) in EVP_DigestSignFinal() 597 unsigned int mdlen = 0; in EVP_DigestVerifyFinal() local 639 r = EVP_DigestFinal_ex(ctx, md, &mdlen); in EVP_DigestVerifyFinal() 652 r = EVP_DigestFinal_ex(tmp_ctx, md, &mdlen); in EVP_DigestVerifyFinal() 657 return EVP_PKEY_verify(pctx, sig, siglen, md, mdlen); in EVP_DigestVerifyFinal()
|
A D | digest.c | 637 unsigned char *md, size_t *mdlen) in EVP_Q_digest() argument 647 if (mdlen != NULL) in EVP_Q_digest() 648 *mdlen = temp; in EVP_Q_digest()
|
/openssl-master/crypto/pkcs7/ |
A D | pk7_attr.c | 107 const unsigned char *md, int mdlen) in PKCS7_add1_attrib_digest() argument 113 if (!ASN1_STRING_set(os, md, mdlen) in PKCS7_add1_attrib_digest()
|
/openssl-master/doc/man3/ |
A D | EVP_PKEY_verify.pod | 64 size_t mdlen, siglen; 68 * NB: assumes verify_key, sig, siglen md and mdlen are already set up 82 ret = EVP_PKEY_verify(ctx, sig, siglen, md, mdlen);
|
A D | EVP_PKEY_sign.pod | 67 size_t mdlen = 32, siglen; 86 if (EVP_PKEY_sign(ctx, NULL, &siglen, md, mdlen) <= 0) 94 if (EVP_PKEY_sign(ctx, sig, &siglen, md, mdlen) <= 0)
|
A D | BIO_f_md.pod | 120 int mdlen; 132 mdlen = BIO_gets(mdtmp, mdbuf, EVP_MAX_MD_SIZE); 133 for (i = 0; i < mdlen; i++) printf(":%02X", mdbuf[i]);
|
A D | EVP_DigestInit.pod | 56 unsigned char *md, size_t *mdlen); 240 The digest value is placed in I<md> and its length is written at I<mdlen>
|
/openssl-master/ssl/ |
A D | tls13_enc.c | 165 size_t mdlen; in tls13_generate_secret() local 194 mdlen = (size_t)mdleni; in tls13_generate_secret() 205 (unsigned char *)prevsecret, mdlen); in tls13_generate_secret() 214 ret = EVP_KDF_derive(kctx, outsecret, mdlen, params) <= 0; in tls13_generate_secret()
|
/openssl-master/include/openssl/ |
A D | pkcs7.h.in | 345 const unsigned char *md, int mdlen);
|
A D | evp.h | 719 unsigned char *md, size_t *mdlen);
|