/openssl/ssl/ |
H A D | s3_enc.c | 93 size_t md_len; in ssl3_change_cipher_state() local 120 md_len = (size_t)mdi; in ssl3_change_cipher_state() 127 n = md_len + md_len; in ssl3_change_cipher_state() 133 n = md_len; in ssl3_change_cipher_state() 135 n += md_len + key_len; in ssl3_change_cipher_state() 151 md_len, ciph, 0, NID_undef, md, comp, NULL)) { in ssl3_change_cipher_state()
|
/openssl/include/openssl/ |
H A D | sha.h | 66 unsigned int num, md_len; member 117 unsigned int num, md_len; member
|
H A D | hmac.h | 56 unsigned char *md, unsigned int *md_len);
|
/openssl/crypto/hmac/ |
H A D | hmac.c | 250 unsigned char *md, unsigned int *md_len) in HMAC() argument 261 if (md_len != NULL) in HMAC() 262 *md_len = (unsigned int)temp_md_len; in HMAC()
|
/openssl/crypto/sha/ |
H A D | sha256.c | 38 c->md_len = SHA224_DIGEST_LENGTH; in SHA224_Init() 53 c->md_len = SHA256_DIGEST_LENGTH; in SHA256_Init() 60 c->md_len = SHA256_192_DIGEST_LENGTH; in ossl_sha256_192_init() 91 switch ((c)->md_len) { \ 108 if ((c)->md_len > SHA256_DIGEST_LENGTH) \ 110 for (nn=0;nn<(c)->md_len/4;nn++) { \
|
H A D | sha512.c | 92 c->md_len = SHA224_DIGEST_LENGTH; in sha512_224_init() 110 c->md_len = SHA256_DIGEST_LENGTH; in sha512_256_init() 128 c->md_len = SHA384_DIGEST_LENGTH; in SHA384_Init() 146 c->md_len = SHA512_DIGEST_LENGTH; in SHA512_Init() 200 switch (c->md_len) { in SHA512_Final()
|
/openssl/crypto/rsa/ |
H A D | rsa_pk1.c | 293 unsigned int md_len; in ossl_rsa_prf() local 354 md_len = SHA256_DIGEST_LENGTH; in ossl_rsa_prf() 356 if (HMAC_Final(hmac, hmac_out, &md_len) <= 0) { in ossl_rsa_prf() 362 if (HMAC_Final(hmac, to + pos, &md_len) <= 0) { in ossl_rsa_prf()
|
H A D | rsa_ossl.c | 440 unsigned int md_len = SHA256_DIGEST_LENGTH; in derive_kdk() local 506 md_len = SHA256_DIGEST_LENGTH; in derive_kdk() 507 if (HMAC_Final(hmac, kdk, &md_len) <= 0) { in derive_kdk()
|
/openssl/crypto/pkcs7/ |
H A D | pk7_doit.c | 741 unsigned int md_len; in do_pkcs7_signed_attrib() local 752 if (!EVP_DigestFinal_ex(mctx, md_data, &md_len)) { in do_pkcs7_signed_attrib() 756 if (!PKCS7_add1_attrib_digest(si, md_data, md_len)) { in do_pkcs7_signed_attrib() 905 unsigned int md_len; in PKCS7_dataFinal() local 909 if (!EVP_DigestFinal_ex(mdc, md_data, &md_len)) in PKCS7_dataFinal() 911 if (!ASN1_OCTET_STRING_set(p7->d.digest->digest, md_data, md_len)) in PKCS7_dataFinal() 1123 unsigned int md_len; in PKCS7_signatureVerify() local 1127 if (!EVP_DigestFinal_ex(mdc_tmp, md_dat, &md_len)) in PKCS7_signatureVerify() 1134 if ((message_digest->length != (int)md_len) || in PKCS7_signatureVerify() 1135 (memcmp(message_digest->data, md_dat, md_len))) { in PKCS7_signatureVerify()
|
/openssl/crypto/ct/ |
H A D | ct_sct_ctx.c | 207 unsigned int md_len; in ct_public_key_hash() local 227 if (!EVP_Digest(der, der_len, md, &md_len, sha256, NULL)) in ct_public_key_hash()
|
/openssl/ssl/statem/ |
H A D | statem_lib.c | 835 size_t md_len; in tls_process_finished() local 876 md_len = s->s3.tmp.peer_finish_md_len; in tls_process_finished() 878 if (md_len != PACKET_remaining(pkt)) { in tls_process_finished() 884 md_len); in tls_process_finished() 900 if (!ossl_assert(md_len <= EVP_MAX_MD_SIZE)) { in tls_process_finished() 906 md_len); in tls_process_finished() 907 s->s3.previous_client_finished_len = md_len; in tls_process_finished() 910 md_len); in tls_process_finished() 911 s->s3.previous_server_finished_len = md_len; in tls_process_finished()
|
H A D | statem_clnt.c | 3262 unsigned int md_len; in tls_construct_cke_gost() local 3321 || EVP_DigestFinal_ex(ukm_hash, shared_ukm, &md_len) <= 0) { in tls_construct_cke_gost() 3379 unsigned int md_len; in ossl_gost_ukm() local 3391 || EVP_DigestFinal_ex(hash, dgst_buf, &md_len) <= 0) { in ossl_gost_ukm()
|
/openssl/doc/man3/ |
H A D | HMAC.pod | 25 unsigned char *md, unsigned int *md_len); 67 the output is placed in I<md_len>, unless it is NULL. Note: passing a NULL
|
H A D | EVP_DigestInit.pod | 750 unsigned int md_len, i; 783 if (!EVP_DigestFinal_ex(mdctx, md_value, &md_len)) { 791 for (i = 0; i < md_len; i++)
|
/openssl/fuzz/ |
H A D | provider.c | 550 unsigned int md_len; in do_evp_md() local 571 if (!EVP_DigestFinal_ex(mdctx, md_value, &md_len)) { in do_evp_md()
|
/openssl/apps/ |
H A D | speed.c | 1491 size_t md_len = SHA256_DIGEST_LENGTH; in SIG_sign_loop() local 1496 int ret = EVP_PKEY_sign(ctx, sig, &sig_len, md, md_len); in SIG_sign_loop() 1516 size_t md_len = SHA256_DIGEST_LENGTH; in SIG_verify_loop() local 1520 int ret = EVP_PKEY_verify(ctx, sig, sig_len, md, md_len); in SIG_verify_loop() 4257 size_t md_len = SHA256_DIGEST_LENGTH; in speed_main() local 4324 md, md_len) <= 0) { in speed_main() 4335 if (EVP_PKEY_sign(sig_sign_ctx, sig, &sig_len, md, md_len) <= 0) { in speed_main() 4354 if (EVP_PKEY_verify(sig_verify_ctx, sig, sig_len, md, md_len) <= 0) { in speed_main() 4358 if (EVP_PKEY_verify(sig_verify_ctx, sig, sig_len, md, md_len) <= 0) { in speed_main()
|
/openssl/test/ |
H A D | evp_extra_test.c | 2023 unsigned int md_len = sizeof(md_value); in test_EVP_md_null() local 2034 || !TEST_true(EVP_DigestFinal_ex(md_ctx, md_value, &md_len))) in test_EVP_md_null() 2037 if (!TEST_uint_eq(md_len, 0)) in test_EVP_md_null() 5186 unsigned int md_len; in test_custom_md_meth() local 5222 || !TEST_true(EVP_DigestFinal_ex(mdctx, md_value, &md_len)) in test_custom_md_meth()
|
/openssl/ |
H A D | CHANGES.md | 20213 * Change type of another md_len variable in pk7_doit.c:PKCS7_dataFinal()
|