/openbsd-current/lib/libcrypto/hmac/ |
H A D | hmac.h | 88 const unsigned char *d, size_t n, unsigned char *md, unsigned int *md_len)
|
H A D | hmac.c | 263 size_t n, unsigned char *md, unsigned int *md_len) 277 if (!HMAC_Final(&c, md, md_len)) 262 HMAC(const EVP_MD *evp_md, const void *key, int key_len, const unsigned char *d, size_t n, unsigned char *md, unsigned int *md_len) argument
|
/openbsd-current/lib/libssl/ |
H A D | tls13_key_schedule.c | 399 int md_len; local 415 md_len = EVP_MD_size(secrets->digest); 416 if (md_len <= 0 || md_len > EVP_MAX_MD_SIZE) 419 if (!tls13_secret_init(&export_secret, md_len)) 421 if (!tls13_secret_init(&context, md_len)) 438 if (md_len != md_out_len)
|
H A D | ssl_srvr.c | 2396 int al, md_len, ret; local 2412 md_len = TLS1_FINISH_MAC_LENGTH; 2422 if (s->s3->hs.peer_finished_len != md_len || 2423 CBS_len(&cbs) != md_len) { 2436 OPENSSL_assert(md_len <= EVP_MAX_MD_SIZE); 2438 s->s3->hs.peer_finished, md_len); 2439 s->s3->previous_client_finished_len = md_len;
|
H A D | ssl_clnt.c | 2403 int al, md_len, ret; local 2419 md_len = TLS1_FINISH_MAC_LENGTH; 2429 if (s->s3->hs.peer_finished_len != md_len || 2430 CBS_len(&cbs) != md_len) { 2443 OPENSSL_assert(md_len <= EVP_MAX_MD_SIZE); 2445 s->s3->hs.peer_finished, md_len); 2446 s->s3->previous_server_finished_len = md_len;
|
/openbsd-current/usr.sbin/rpki-client/ |
H A D | x509.c | 204 unsigned int md_len = EVP_MAX_MD_SIZE; local 223 if (!X509_pubkey_digest(x, EVP_sha1(), md, &md_len)) { 228 if (os->length < 0 || md_len != (size_t)os->length) { 231 fn, md_len, os->length); 235 if (memcmp(os->data, md, md_len) != 0) { 240 *ski = hex_encode(md, md_len); 388 unsigned int md_len = EVP_MAX_MD_SIZE; local 401 if (!EVP_Digest(der, der_len, md, &md_len, EVP_sha1(), NULL)) { 406 return hex_encode(md, md_len);
|
/openbsd-current/lib/libcrypto/sha/ |
H A D | sha.h | 120 unsigned int num, md_len; member in struct:SHA256state_st 168 unsigned int num, md_len; member in struct:SHA512state_st
|
H A D | sha256.c | 296 c->md_len = SHA224_DIGEST_LENGTH; 345 c->md_len = SHA256_DIGEST_LENGTH; 445 switch (c->md_len) { 461 if (c->md_len > SHA256_DIGEST_LENGTH) 463 for (nn = 0; nn < c->md_len / 4; nn++) {
|
H A D | sha512.c | 324 c->md_len = SHA384_DIGEST_LENGTH; 373 c->md_len = SHA512_DIGEST_LENGTH; 459 switch (c->md_len) { 523 c->md_len = SHA512_224_DIGEST_LENGTH; 555 c->md_len = SHA512_256_DIGEST_LENGTH;
|
/openbsd-current/lib/libcrypto/sm2/ |
H A D | sm2_pmeth.c | 224 int md_len; local 236 if ((md_len = EVP_MD_size(md)) < 0) { 246 return EVP_DigestUpdate(dctx->md_ctx, za, md_len);
|
/openbsd-current/lib/libcrypto/pkcs7/ |
H A D | pk7_doit.c | 664 unsigned int md_len; local 675 if (!EVP_DigestFinal_ex(mctx, md_data, &md_len)) { 679 if (!PKCS7_add1_attrib_digest(si, md_data, md_len)) { 823 unsigned int md_len; local 828 if (!EVP_DigestFinal_ex(mdc, md_data, &md_len)) 831 md_len) == 0) 1040 unsigned int md_len; local 1044 if (!EVP_DigestFinal_ex(&mdc_tmp, md_dat, &md_len)) 1051 if ((message_digest->length != (int)md_len) || 1052 (memcmp(message_digest->data, md_dat, md_len))) { [all...] |
/openbsd-current/usr.sbin/pppd/ |
H A D | chap.c | 776 int outlen, md_len, name_len; local 778 md_len = cstate->resp_length; 780 outlen = CHAP_HEADERLEN + sizeof (u_char) + md_len + name_len; 789 PUTCHAR(md_len, outp); /* length of MD */ 790 BCOPY(cstate->response, outp, md_len); /* copy MD to buffer */ 791 INCPTR(md_len, outp);
|
/openbsd-current/lib/libcrypto/ct/ |
H A D | ct_sct_ctx.c | 256 unsigned int md_len; local 272 if (!EVP_Digest(der, der_len, md, &md_len, EVP_sha256(), NULL))
|
/openbsd-current/usr.sbin/ldomctl/ |
H A D | ldomctl.c | 201 size_t md_len; local 226 md_len = sizeof(hdr) + hdr.node_blk_sz + hdr.name_blk_sz + 228 md_buf = xmalloc(md_len); 229 hv_read(guest->mdpa, md_buf, md_len); 237 fwrite(md_buf, md_len, 1, fp);
|