/external/boringssl/src/crypto/fipsmodule/rsa/ |
D | padding.c | 327 size_t mdlen = EVP_MD_size(md); in RSA_padding_add_PKCS1_OAEP_mgf1() local 329 if (to_len < 2 * mdlen + 2) { in RSA_padding_add_PKCS1_OAEP_mgf1() 335 if (from_len > emlen - 2 * mdlen - 1) { in RSA_padding_add_PKCS1_OAEP_mgf1() 340 if (emlen < 2 * mdlen + 1) { in RSA_padding_add_PKCS1_OAEP_mgf1() 347 uint8_t *db = to + mdlen + 1; in RSA_padding_add_PKCS1_OAEP_mgf1() 352 OPENSSL_memset(db + mdlen, 0, emlen - from_len - 2 * mdlen - 1); in RSA_padding_add_PKCS1_OAEP_mgf1() 353 db[emlen - from_len - mdlen - 1] = 0x01; in RSA_padding_add_PKCS1_OAEP_mgf1() 354 OPENSSL_memcpy(db + emlen - from_len - mdlen, from, from_len); in RSA_padding_add_PKCS1_OAEP_mgf1() 355 if (!RAND_bytes(seed, mdlen)) { in RSA_padding_add_PKCS1_OAEP_mgf1() 359 uint8_t *dbmask = OPENSSL_malloc(emlen - mdlen); in RSA_padding_add_PKCS1_OAEP_mgf1() [all …]
|
/external/boringssl/src/crypto/evp/ |
D | digestsign.c | 160 unsigned int mdlen; in EVP_DigestSignFinal() local 164 EVP_DigestFinal_ex(&tmp_ctx, md, &mdlen) && in EVP_DigestSignFinal() 165 EVP_PKEY_sign(ctx->pctx, out_sig, out_sig_len, md, mdlen); in EVP_DigestSignFinal() 185 unsigned int mdlen; in EVP_DigestVerifyFinal() local 189 EVP_DigestFinal_ex(&tmp_ctx, md, &mdlen) && in EVP_DigestVerifyFinal() 190 EVP_PKEY_verify(ctx->pctx, sig, sig_len, md, mdlen); in EVP_DigestVerifyFinal()
|
/external/openssh/ |
D | digest-openssl.c | 186 u_int mdlen; in ssh_digest_memory() local 194 mdlen = dlen; in ssh_digest_memory() 195 if (!EVP_Digest(m, mlen, d, &mdlen, digest->mdfunc(), NULL)) in ssh_digest_memory()
|
/external/wpa_supplicant_8/src/eap_common/ |
D | eap_pwd_common.c | 50 size_t resultbytelen, len = 0, mdlen; in eap_pwd_kdf() local 67 mdlen = SHA256_MAC_LEN; in eap_pwd_kdf() 68 if (crypto_hash_finish(hash, digest, &mdlen) < 0) in eap_pwd_kdf() 70 if ((len + mdlen) > resultbytelen) in eap_pwd_kdf() 73 os_memcpy(result + len, digest, mdlen); in eap_pwd_kdf() 74 len += mdlen; in eap_pwd_kdf()
|
/external/python/cpython2/Modules/ |
D | _hashopenssl.c | 591 int cplen, j, k, tkeylen, mdlen; in PKCS5_PBKDF2_HMAC_fast() local 595 mdlen = EVP_MD_size(digest); in PKCS5_PBKDF2_HMAC_fast() 596 if (mdlen < 0) in PKCS5_PBKDF2_HMAC_fast() 608 if (tkeylen > mdlen) in PKCS5_PBKDF2_HMAC_fast() 609 cplen = mdlen; in PKCS5_PBKDF2_HMAC_fast() 637 if (!HMAC_Update(&hctx, digtmp, mdlen) in PKCS5_PBKDF2_HMAC_fast()
|
/external/ppp/pppd/ |
D | chap_ms.c | 583 int mdlen = secret_len; in NTPasswordHash() local 587 int mdlen = secret_len; in NTPasswordHash() 589 int mdlen = secret_len * 8; in NTPasswordHash() 596 while (mdlen > 512) { in NTPasswordHash() 599 mdlen -= 512; in NTPasswordHash() 601 MD4Update(&md4Context, secret, mdlen); in NTPasswordHash()
|
/external/python/cpython3/Modules/ |
D | _hashopenssl.c | 557 int cplen, j, k, tkeylen, mdlen; in PKCS5_PBKDF2_HMAC_fast() local 561 mdlen = EVP_MD_size(digest); in PKCS5_PBKDF2_HMAC_fast() 562 if (mdlen < 0) in PKCS5_PBKDF2_HMAC_fast() 574 if (tkeylen > mdlen) in PKCS5_PBKDF2_HMAC_fast() 575 cplen = mdlen; in PKCS5_PBKDF2_HMAC_fast() 603 if (!HMAC_Update(&hctx, digtmp, mdlen) in PKCS5_PBKDF2_HMAC_fast()
|
/external/wpa_supplicant_8/src/crypto/ |
D | crypto_openssl.c | 1040 unsigned int mdlen; in crypto_hash_finish() local 1052 mdlen = *len; in crypto_hash_finish() 1053 res = HMAC_Final(ctx->ctx, mac, &mdlen); in crypto_hash_finish() 1061 *len = mdlen; in crypto_hash_finish() 1072 unsigned int mdlen) in openssl_hmac_vector() argument 1091 res = HMAC_Final(ctx, mac, &mdlen); in openssl_hmac_vector()
|
D | crypto_wolfssl.c | 162 unsigned int mdlen) in wolfssl_hmac_vector() argument 167 (void) mdlen; in wolfssl_hmac_vector()
|