/openssl/crypto/ffc/ |
H A D | ffc_params_generate.c | 141 int mdsize; in generate_canonical_g() local 144 if (mdsize <= 0) in generate_canonical_g() 199 int mdsize; in generate_p() local 215 if (mdsize <= 0) in generate_p() 325 if (mdsize <= 0) in generate_q_fips186_4() 345 if (mdsize > qsize) in generate_q_fips186_4() 349 if (mdsize < qsize) in generate_q_fips186_4() 350 memset(md + mdsize, 0, qsize - mdsize); in generate_q_fips186_4() 554 if (mdsize <= 0) in ossl_ffc_params_FIPS186_4_gen_verify() 558 N = mdsize * 8; in ossl_ffc_params_FIPS186_4_gen_verify() [all …]
|
/openssl/providers/implementations/signature/ |
H A D | sm2_sig.c | 85 size_t mdsize; member 132 ctx->mdsize = SM3_DIGEST_LENGTH; in sm2sig_newctx() 178 if (ctx->mdsize != 0 && tbslen != ctx->mdsize) in sm2sig_sign() 194 if (ctx->mdsize != 0 && tbslen != ctx->mdsize) in sm2sig_verify() 267 if ((z = OPENSSL_zalloc(ctx->mdsize)) == NULL in sm2sig_compute_z_digest() 271 || !EVP_DigestUpdate(ctx->mdctx, z, ctx->mdsize)) in sm2sig_compute_z_digest() 415 if (p != NULL && !OSSL_PARAM_set_size_t(p, psm2ctx->mdsize)) in sm2sig_get_ctx_params() 444 size_t mdsize; in sm2sig_set_ctx_params() local 477 if (p != NULL && (!OSSL_PARAM_get_size_t(p, &mdsize) in sm2sig_set_ctx_params() 478 || mdsize != psm2ctx->mdsize)) in sm2sig_set_ctx_params()
|
H A D | ecdsa_sig.c | 104 size_t mdsize; member 253 ctx->mdsize = (size_t)md_size; in ecdsa_setup_md() 340 if (ctx->mdsize != 0 && tbslen != ctx->mdsize) in ecdsa_sign_directly() 437 if (!ossl_prov_is_running() || (ctx->mdsize != 0 && tbslen != ctx->mdsize)) in ecdsa_verify_directly() 682 if (p != NULL && !OSSL_PARAM_set_size_t(p, ctx->mdsize)) in ecdsa_get_ctx_params() 765 size_t mdsize = 0; in ecdsa_set_ctx_params() local 795 if (!OSSL_PARAM_get_size_t(p, &mdsize) in ecdsa_set_ctx_params() 796 || (!ctx->flag_allow_md && mdsize != ctx->mdsize)) in ecdsa_set_ctx_params() 798 ctx->mdsize = mdsize; in ecdsa_set_ctx_params()
|
H A D | rsa_sig.c | 280 int mdsize, rsasize; in rsa_pss_compute_saltlen() local 282 if ((mdsize = EVP_MD_get_size(ctx->md)) <= 0) { in rsa_pss_compute_saltlen() 290 saltlen = rsasize - mdsize - 2; in rsa_pss_compute_saltlen() 635 int mdsize = rsa_get_md_size(ctx); in rsa_pss_saltlen_check_passed() local 682 size_t mdsize = rsa_get_md_size(prsactx); in rsa_sign_directly() local 698 if (mdsize != 0) { in rsa_sign_directly() 699 if (tbslen != mdsize) { in rsa_sign_directly() 1056 size_t mdsize; in rsa_verify_directly() local 1062 mdsize = rsa_get_md_size(prsactx); in rsa_verify_directly() 1063 if (tbslen != mdsize) { in rsa_verify_directly() [all …]
|
H A D | dsa_sig.c | 335 size_t mdsize = dsa_get_md_size(pdsactx); in dsa_sign_directly() local 353 if (mdsize != 0 && tbslen != mdsize) in dsa_sign_directly() 441 size_t mdsize = dsa_get_md_size(pdsactx); in dsa_verify_directly() local 443 if (!ossl_prov_is_running() || (mdsize != 0 && tbslen != mdsize)) in dsa_verify_directly()
|
/openssl/crypto/evp/ |
H A D | p5_crpt.c | 37 int mdsize; in PKCS5_PBE_keyivgen_ex() local 80 mdsize = EVP_MD_get_size(md); in PKCS5_PBE_keyivgen_ex() 81 if (mdsize <= 0) in PKCS5_PBE_keyivgen_ex() 97 if (EVP_KDF_derive(kctx, md_tmp, mdsize, params) != 1) in PKCS5_PBE_keyivgen_ex()
|
H A D | digest.c | 446 size_t mdsize = 0; in EVP_DigestFinal_ex() local 454 mdsize = sz; in EVP_DigestFinal_ex() 468 ret = ctx->digest->dfinal(ctx->algctx, md, &size, mdsize); in EVP_DigestFinal_ex() 485 OPENSSL_assert(mdsize <= EVP_MAX_MD_SIZE); in EVP_DigestFinal_ex() 488 *isize = mdsize; in EVP_DigestFinal_ex() 986 size_t mdsize = 0; in evp_md_cache_constants() local 995 params[1] = OSSL_PARAM_construct_size_t(OSSL_DIGEST_PARAM_SIZE, &mdsize); in evp_md_cache_constants() 1001 if (mdsize > INT_MAX || blksz > INT_MAX) in evp_md_cache_constants() 1005 md->md_size = (int)mdsize; in evp_md_cache_constants()
|
/openssl/providers/implementations/kdfs/ |
H A D | pbkdf1.c | 57 int mdsize, ret = 0; in kdf_pbkdf1_do_derive() local 72 mdsize = EVP_MD_size(md_type); in kdf_pbkdf1_do_derive() 73 if (mdsize <= 0) in kdf_pbkdf1_do_derive() 75 if (n > (size_t)mdsize) { in kdf_pbkdf1_do_derive() 83 if (!EVP_DigestUpdate(ctx, md_tmp, mdsize)) in kdf_pbkdf1_do_derive()
|
/openssl/test/helpers/ |
H A D | ssltestlib.h | 80 SSL_SESSION *create_a_psk(SSL *ssl, size_t mdsize);
|
H A D | ssltestlib.c | 1379 SSL_SESSION *create_a_psk(SSL *ssl, size_t mdsize) in create_a_psk() argument 1391 if (mdsize == SHA384_DIGEST_LENGTH) { in create_a_psk() 1393 } else if (mdsize == SHA256_DIGEST_LENGTH) { in create_a_psk() 1406 || !TEST_true(SSL_SESSION_set1_master_key(sess, key, mdsize)) in create_a_psk()
|
/openssl/test/recipes/30-test_evp_data/ |
H A D | evppkey_ecdsa_sigalg.txt | 117 # Test that mdsize != tbssize fails
|
H A D | evppkey_ecdsa.txt | 118 # Test that mdsize != tbssize fails
|
/openssl/ssl/ |
H A D | ssl_lib.c | 272 int mdsize; in dane_tlsa_add() local 303 mdsize = EVP_MD_get_size(md); in dane_tlsa_add() 304 if (mdsize <= 0 || dlen != (size_t)mdsize) { in dane_tlsa_add()
|
/openssl/test/ |
H A D | sslapitest.c | 3417 size_t mdsize) in setupearly_data_test() argument 3462 clientpsk = create_a_psk(*clientssl, mdsize); in setupearly_data_test()
|