/openssl/crypto/rsa/ |
H A D | rsa_oaep.c | 66 int mdlen, dbmask_len = 0; in ossl_rsa_padding_add_PKCS1_OAEP_mgf1_ex() local 92 if (mdlen <= 0) { in ossl_rsa_padding_add_PKCS1_OAEP_mgf1_ex() 111 db = to + mdlen + 1; in ossl_rsa_padding_add_PKCS1_OAEP_mgf1_ex() 117 memset(db + mdlen, 0, emlen - flen - 2 * mdlen - 1); in ossl_rsa_padding_add_PKCS1_OAEP_mgf1_ex() 125 dbmask_len = emlen - mdlen; in ossl_rsa_padding_add_PKCS1_OAEP_mgf1_ex() 141 for (i = 0; i < mdlen; i++) in ossl_rsa_padding_add_PKCS1_OAEP_mgf1_ex() 183 int mdlen; in RSA_padding_check_PKCS1_OAEP_mgf1() local 226 dblen = num - mdlen - 1; in RSA_padding_check_PKCS1_OAEP_mgf1() 357 int mdlen; in PKCS1_MGF1() local 363 if (mdlen <= 0) in PKCS1_MGF1() [all …]
|
/openssl/crypto/cms/ |
H A D | cms_dd.c | 64 unsigned int mdlen; in ossl_cms_DigestedData_do_final() local 78 if (EVP_DigestFinal_ex(mctx, md, &mdlen) <= 0) in ossl_cms_DigestedData_do_final() 82 if (mdlen != (unsigned int)dd->digest->length) { in ossl_cms_DigestedData_do_final() 87 if (memcmp(md, dd->digest->data, mdlen)) in ossl_cms_DigestedData_do_final() 92 if (!ASN1_STRING_set(dd->digest, md, mdlen)) in ossl_cms_DigestedData_do_final()
|
H A D | cms_sd.c | 716 unsigned int mdlen) in cms_SignerInfo_content_sign() argument 746 if (!EVP_DigestFinal_ex(mctx, computed_md, &mdlen)) in cms_SignerInfo_content_sign() 751 V_ASN1_OCTET_STRING, md, mdlen)) in cms_SignerInfo_content_sign() 767 if (!EVP_DigestFinal_ex(mctx, computed_md, &mdlen)) in cms_SignerInfo_content_sign() 774 if (EVP_PKEY_sign(pctx, sig, &siglen, md, mdlen) <= 0) { in cms_SignerInfo_content_sign()
|
H A D | cms_smime.c | 931 const unsigned char *md, unsigned int mdlen, in CMS_final_digest() argument 944 if (!ossl_cms_DataFinal(cms, cmsbio, md, mdlen)) { in CMS_final_digest()
|
/openssl/crypto/ocsp/ |
H A D | ocsp_vfy.c | 313 int mdlen; in ocsp_match_issuerid() local 330 mdlen = EVP_MD_get_size(dgst); in ocsp_match_issuerid() 331 if (mdlen <= 0) { in ocsp_match_issuerid() 335 if (cid->issuerNameHash.length != mdlen || in ocsp_match_issuerid() 336 cid->issuerKeyHash.length != mdlen) { in ocsp_match_issuerid() 343 if (memcmp(md, cid->issuerNameHash.data, mdlen) != 0) { in ocsp_match_issuerid() 351 ret = memcmp(md, cid->issuerKeyHash.data, mdlen) == 0; in ocsp_match_issuerid()
|
/openssl/providers/implementations/kdfs/ |
H A D | pbkdf2.c | 384 int cplen, k, tkeylen, mdlen; in pbkdf2_derive() local 389 mdlen = EVP_MD_get_size(digest); in pbkdf2_derive() 390 if (mdlen <= 0) in pbkdf2_derive() 397 if ((keylen / mdlen) >= KDF_PBKDF2_MAX_KEY_LEN_DIGEST_RATIO) { in pbkdf2_derive() 429 if (tkeylen > mdlen) in pbkdf2_derive() 430 cplen = mdlen; in pbkdf2_derive() 451 if (!HMAC_Update(hctx, digtmp, mdlen) in pbkdf2_derive()
|
H A D | hkdf.c | 691 size_t mdlen; in prov_tls13_hkdf_generate_secret() local 701 mdlen = (size_t)ret; in prov_tls13_hkdf_generate_secret() 705 insecretlen = mdlen; in prov_tls13_hkdf_generate_secret() 709 prevsecretlen = mdlen; in prov_tls13_hkdf_generate_secret() 726 hash, mdlen, preextractsec, mdlen)) in prov_tls13_hkdf_generate_secret() 729 prevsecretlen = mdlen; in prov_tls13_hkdf_generate_secret() 736 OPENSSL_cleanse(preextractsec, mdlen); in prov_tls13_hkdf_generate_secret()
|
/openssl/providers/implementations/signature/ |
H A D | eddsa_sig.c | 388 size_t mdlen; in ed25519_sign() local 429 tbs, tbslen, md, &mdlen) in ed25519_sign() 430 || mdlen != EDDSA_PREHASH_OUTPUT_LEN) { in ed25519_sign() 435 tbslen = mdlen; in ed25519_sign() 496 size_t mdlen = sizeof(md); in ed448_sign() local 537 tbslen = mdlen; in ed448_sign() 571 size_t mdlen; in ed25519_verify() local 594 tbs, tbslen, md, &mdlen) in ed25519_verify() 600 tbslen = mdlen; in ed25519_verify() 629 size_t mdlen = sizeof(md); in ed448_verify() local [all …]
|
/openssl/crypto/evp/ |
H A D | m_sigver.c | 532 unsigned int mdlen = 0; in EVP_DigestSignFinal() local 538 r = EVP_DigestFinal_ex(ctx, md, &mdlen); in EVP_DigestSignFinal() 552 r = EVP_DigestFinal_ex(tmp_ctx, md, &mdlen); in EVP_DigestSignFinal() 557 if (EVP_PKEY_sign(pctx, sigret, siglen, md, mdlen) <= 0) in EVP_DigestSignFinal() 610 unsigned int mdlen = 0; in EVP_DigestVerifyFinal() local 661 r = EVP_DigestFinal_ex(ctx, md, &mdlen); in EVP_DigestVerifyFinal() 674 r = EVP_DigestFinal_ex(tmp_ctx, md, &mdlen); in EVP_DigestVerifyFinal() 679 return EVP_PKEY_verify(pctx, sig, siglen, md, mdlen); in EVP_DigestVerifyFinal()
|
H A D | digest.c | 745 unsigned char *md, size_t *mdlen) in EVP_Q_digest() argument 755 if (mdlen != NULL) in EVP_Q_digest() 756 *mdlen = temp; in EVP_Q_digest()
|
/openssl/crypto/pkcs7/ |
H A D | pk7_attr.c | 124 const unsigned char *md, int mdlen) in PKCS7_add1_attrib_digest() argument 130 if (!ASN1_STRING_set(os, md, mdlen) in PKCS7_add1_attrib_digest()
|
/openssl/doc/man3/ |
H A D | EVP_PKEY_verify.pod | 170 size_t mdlen, siglen; 174 * NB: assumes verify_key, sig, siglen md and mdlen are already set up 188 ret = EVP_PKEY_verify(ctx, sig, siglen, md, mdlen); 208 size_t mdlen = 32, siglen; 212 * NB: assumes verify_key, sig, siglen, md and mdlen are already set up 224 if (EVP_PKEY_verify(ctx, sig, siglen, md, mdlen) <= 0) 228 ret = EVP_PKEY_verify(ctx, sig, siglen, md, mdlen);
|
H A D | BIO_f_md.pod | 120 int mdlen; 132 mdlen = BIO_gets(mdtmp, mdbuf, EVP_MAX_MD_SIZE); 133 for (i = 0; i < mdlen; i++) printf(":%02X", mdbuf[i]);
|
H A D | EVP_PKEY_sign.pod | 159 size_t mdlen = 32, siglen; 178 if (EVP_PKEY_sign(ctx, NULL, &siglen, md, mdlen) <= 0) 186 if (EVP_PKEY_sign(ctx, sig, &siglen, md, mdlen) <= 0) 204 size_t mdlen = 32, siglen; 221 if (EVP_PKEY_sign(ctx, NULL, &siglen, md, mdlen) <= 0) 229 if (EVP_PKEY_sign(ctx, sig, &siglen, md, mdlen) <= 0)
|
H A D | CMS_final.pod | 13 unsigned int mdlen, BIO *dcont, unsigned int flags);
|
H A D | EVP_DigestInit.pod | 58 unsigned char *md, size_t *mdlen); 254 The digest value is placed in I<md> and its length is written at I<mdlen>
|
/openssl/crypto/sha/ |
H A D | sha3.c | 43 int ossl_keccak_init(KECCAK1600_CTX *ctx, unsigned char pad, size_t bitlen, size_t mdlen) in ossl_keccak_init() argument 48 ctx->md_size = mdlen / 8; in ossl_keccak_init()
|
/openssl/include/internal/ |
H A D | sha3.h | 54 size_t typelen, size_t mdlen);
|
/openssl/ssl/ |
H A D | tls13_enc.c | 169 size_t mdlen; in tls13_generate_secret() local 196 mdlen = (size_t)mdleni; in tls13_generate_secret() 207 (unsigned char *)prevsecret, mdlen); in tls13_generate_secret() 216 ret = EVP_KDF_derive(kctx, outsecret, mdlen, params) <= 0; in tls13_generate_secret()
|
/openssl/providers/implementations/digests/ |
H A D | sha3_prov.c | 500 #define SHAKE_newctx(typ, uname, name, bitlen, mdlen, pad) \ argument 509 ossl_keccak_init(ctx, pad, bitlen, mdlen); \ 510 if (mdlen == 0) \
|
/openssl/include/openssl/ |
H A D | pkcs7.h.in | 348 const unsigned char *md, int mdlen);
|
H A D | cms.h.in | 127 const unsigned char *md, unsigned int mdlen, BIO *dcont,
|
H A D | evp.h | 730 unsigned char *md, size_t *mdlen);
|