Searched refs:mdsize (Results 1 – 9 of 9) sorted by relevance
/openssl-master/providers/implementations/signature/ |
A D | sm2_sig.c | 86 size_t mdsize; member 128 ctx->mdsize = SM3_DIGEST_LENGTH; in sm2sig_newctx() 174 if (ctx->mdsize != 0 && tbslen != ctx->mdsize) in sm2sig_sign() 190 if (ctx->mdsize != 0 && tbslen != ctx->mdsize) in sm2sig_verify() 260 if ((z = OPENSSL_zalloc(ctx->mdsize)) == NULL in sm2sig_compute_z_digest() 264 || !EVP_DigestUpdate(ctx->mdctx, z, ctx->mdsize)) in sm2sig_compute_z_digest() 394 if (p != NULL && !OSSL_PARAM_set_size_t(p, psm2ctx->mdsize)) in sm2sig_get_ctx_params() 423 size_t mdsize; in sm2sig_set_ctx_params() local 455 if (p != NULL && (!OSSL_PARAM_get_size_t(p, &mdsize) in sm2sig_set_ctx_params() 456 || mdsize != psm2ctx->mdsize)) in sm2sig_set_ctx_params()
|
A D | ecdsa_sig.c | 81 size_t mdsize; member 193 if (ctx->mdsize != 0 && tbslen != ctx->mdsize) in ecdsa_sign() 209 if (!ossl_prov_is_running() || (ctx->mdsize != 0 && tbslen != ctx->mdsize)) in ecdsa_verify() 275 ctx->mdsize = EVP_MD_get_size(ctx->md); in ecdsa_setup_md() 383 ctx->mdsize = 0; in ecdsa_freectx() 451 if (p != NULL && !OSSL_PARAM_set_size_t(p, ctx->mdsize)) in ecdsa_get_ctx_params() 480 size_t mdsize = 0; in ecdsa_set_ctx_params() local 512 if (!OSSL_PARAM_get_size_t(p, &mdsize) in ecdsa_set_ctx_params() 513 || (!ctx->flag_allow_md && mdsize != ctx->mdsize)) in ecdsa_set_ctx_params() 515 ctx->mdsize = mdsize; in ecdsa_set_ctx_params()
|
A D | dsa_sig.c | 238 size_t mdsize = dsa_get_md_size(pdsactx); in dsa_sign() local 251 if (mdsize != 0 && tbslen != mdsize) in dsa_sign() 266 size_t mdsize = dsa_get_md_size(pdsactx); in dsa_verify() local 268 if (!ossl_prov_is_running() || (mdsize != 0 && tbslen != mdsize)) in dsa_verify()
|
A D | rsa_sig.c | 517 size_t mdsize = rsa_get_md_size(prsactx); in rsa_sign() local 533 if (mdsize != 0) { in rsa_sign() 534 if (tbslen != mdsize) { in rsa_sign() 785 size_t mdsize; in rsa_verify() local 791 mdsize = rsa_get_md_size(prsactx); in rsa_verify() 792 if (tbslen != mdsize) { in rsa_verify() 795 mdsize, tbslen); in rsa_verify()
|
/openssl-master/crypto/ffc/ |
A D | ffc_params_generate.c | 141 int mdsize; in generate_canonical_g() local 144 if (mdsize <= 0) in generate_canonical_g() 199 int mdsize; in generate_p() local 215 if (mdsize <= 0) in generate_p() 342 if (mdsize > qsize) in generate_q_fips186_4() 346 if (mdsize < qsize) in generate_q_fips186_4() 347 memset(md + mdsize, 0, qsize - mdsize); in generate_q_fips186_4() 550 mdsize = EVP_MD_get_size(md); in ossl_ffc_params_FIPS186_4_gen_verify() 551 if (mdsize <= 0) in ossl_ffc_params_FIPS186_4_gen_verify() 555 N = mdsize * 8; in ossl_ffc_params_FIPS186_4_gen_verify() [all …]
|
/openssl-master/crypto/evp/ |
A D | p5_crpt.c | 37 int mdsize; in PKCS5_PBE_keyivgen_ex() local 80 mdsize = EVP_MD_get_size(md); in PKCS5_PBE_keyivgen_ex() 81 if (mdsize < 0) in PKCS5_PBE_keyivgen_ex() 97 if (EVP_KDF_derive(kctx, md_tmp, mdsize, params) != 1) in PKCS5_PBE_keyivgen_ex()
|
A D | digest.c | 412 size_t mdsize = 0; in EVP_DigestFinal_ex() local 420 mdsize = sz; in EVP_DigestFinal_ex() 429 ret = ctx->digest->dfinal(ctx->algctx, md, &size, mdsize); in EVP_DigestFinal_ex() 444 OPENSSL_assert(mdsize <= EVP_MAX_MD_SIZE); in EVP_DigestFinal_ex() 447 *isize = mdsize; in EVP_DigestFinal_ex() 882 size_t mdsize = 0; in evp_md_cache_constants() local 886 params[1] = OSSL_PARAM_construct_size_t(OSSL_DIGEST_PARAM_SIZE, &mdsize); in evp_md_cache_constants() 892 if (mdsize > INT_MAX || blksz > INT_MAX) in evp_md_cache_constants() 896 md->md_size = (int)mdsize; in evp_md_cache_constants()
|
/openssl-master/providers/implementations/kdfs/ |
A D | pbkdf1.c | 56 int mdsize, ret = 0; in kdf_pbkdf1_do_derive() local 71 mdsize = EVP_MD_size(md_type); in kdf_pbkdf1_do_derive() 72 if (mdsize < 0) in kdf_pbkdf1_do_derive() 77 if (!EVP_DigestUpdate(ctx, md_tmp, mdsize)) in kdf_pbkdf1_do_derive()
|
/openssl-master/test/recipes/30-test_evp_data/ |
A D | evppkey_ecdsa.txt | 106 # Test that mdsize != tbssize fails
|
Completed in 22 milliseconds