Home
last modified time | relevance | path

Searched refs:mdsize (Results 1 – 16 of 16) sorted by relevance

/freebsd/sys/geom/eli/
H A Dg_eli_hmac.c90 g_eli_crypto_hmac_final(struct hmac_ctx *ctx, uint8_t *md, size_t mdsize) in g_eli_crypto_hmac_final() argument
103 if (mdsize == 0) in g_eli_crypto_hmac_final()
104 mdsize = SHA512_MDLEN; in g_eli_crypto_hmac_final()
105 bcopy(digest, md, mdsize); in g_eli_crypto_hmac_final()
111 size_t datasize, uint8_t *md, size_t mdsize) in g_eli_crypto_hmac() argument
117 g_eli_crypto_hmac_final(&ctx, md, mdsize); in g_eli_crypto_hmac()
H A Dg_eli.h738 void g_eli_crypto_hmac_final(struct hmac_ctx *ctx, uint8_t *md, size_t mdsize);
740 const uint8_t *data, size_t datasize, uint8_t *md, size_t mdsize);
/freebsd/crypto/openssl/providers/implementations/signature/
H A Dsm2_sig.c86 size_t mdsize; member
128 ctx->mdsize = SM3_DIGEST_LENGTH; in sm2sig_newctx()
174 if (ctx->mdsize != 0 && tbslen != ctx->mdsize) in sm2sig_sign()
190 if (ctx->mdsize != 0 && tbslen != ctx->mdsize) in sm2sig_verify()
260 if ((z = OPENSSL_zalloc(ctx->mdsize)) == NULL in sm2sig_compute_z_digest()
264 || !EVP_DigestUpdate(ctx->mdctx, z, ctx->mdsize)) in sm2sig_compute_z_digest()
403 if (p != NULL && !OSSL_PARAM_set_size_t(p, psm2ctx->mdsize)) in sm2sig_get_ctx_params()
432 size_t mdsize; in sm2sig_set_ctx_params() local
465 if (p != NULL && (!OSSL_PARAM_get_size_t(p, &mdsize) in sm2sig_set_ctx_params()
466 || mdsize != psm2ctx->mdsize)) in sm2sig_set_ctx_params()
H A Decdsa_sig.c81 size_t mdsize; member
193 if (ctx->mdsize != 0 && tbslen != ctx->mdsize) in ecdsa_sign()
209 if (!ossl_prov_is_running() || (ctx->mdsize != 0 && tbslen != ctx->mdsize)) in ecdsa_verify()
275 ctx->mdsize = EVP_MD_get_size(ctx->md); in ecdsa_setup_md()
383 ctx->mdsize = 0; in ecdsa_freectx()
451 if (p != NULL && !OSSL_PARAM_set_size_t(p, ctx->mdsize)) in ecdsa_get_ctx_params()
480 size_t mdsize = 0; in ecdsa_set_ctx_params() local
512 if (!OSSL_PARAM_get_size_t(p, &mdsize) in ecdsa_set_ctx_params()
513 || (!ctx->flag_allow_md && mdsize != ctx->mdsize)) in ecdsa_set_ctx_params()
515 ctx->mdsize = mdsize; in ecdsa_set_ctx_params()
H A Ddsa_sig.c238 size_t mdsize = dsa_get_md_size(pdsactx); in dsa_sign() local
251 if (mdsize != 0 && tbslen != mdsize) in dsa_sign()
266 size_t mdsize = dsa_get_md_size(pdsactx); in dsa_verify() local
268 if (!ossl_prov_is_running() || (mdsize != 0 && tbslen != mdsize)) in dsa_verify()
H A Drsa_sig.c520 size_t mdsize = rsa_get_md_size(prsactx); in rsa_sign() local
536 if (mdsize != 0) { in rsa_sign()
537 if (tbslen != mdsize) { in rsa_sign()
788 size_t mdsize; in rsa_verify() local
794 mdsize = rsa_get_md_size(prsactx); in rsa_verify()
795 if (tbslen != mdsize) { in rsa_verify()
798 mdsize, tbslen); in rsa_verify()
/freebsd/crypto/openssl/crypto/ffc/
H A Dffc_params_generate.c141 int mdsize; in generate_canonical_g() local
144 if (mdsize <= 0) in generate_canonical_g()
199 int mdsize; in generate_p() local
215 if (mdsize <= 0) in generate_p()
342 if (mdsize > qsize) in generate_q_fips186_4()
346 if (mdsize < qsize) in generate_q_fips186_4()
347 memset(md + mdsize, 0, qsize - mdsize); in generate_q_fips186_4()
550 mdsize = EVP_MD_get_size(md); in ossl_ffc_params_FIPS186_4_gen_verify()
551 if (mdsize <= 0) in ossl_ffc_params_FIPS186_4_gen_verify()
555 N = mdsize * 8; in ossl_ffc_params_FIPS186_4_gen_verify()
[all …]
/freebsd/sbin/mdmfs/
H A Dmdmfs.c99 intmax_t mdsize; in main() local
123 mdsize = 0; in main()
271 mdsize = (intmax_t)strtoumax(size_arg, &p, 0); in main()
277 mdsize *= 1024; in main()
280 mdsize *= 1024; in main()
283 mdsize *= 1024; in main()
286 mdsize *= 1024; in main()
289 mdsize *= 1024; in main()
294 mdsize *= 512; in main()
322 if (size_arg != NULL && mdsize != 0) in main()
[all …]
/freebsd/crypto/openssl/crypto/evp/
H A Dp5_crpt.c37 int mdsize; in PKCS5_PBE_keyivgen_ex() local
80 mdsize = EVP_MD_get_size(md); in PKCS5_PBE_keyivgen_ex()
81 if (mdsize < 0) in PKCS5_PBE_keyivgen_ex()
97 if (EVP_KDF_derive(kctx, md_tmp, mdsize, params) != 1) in PKCS5_PBE_keyivgen_ex()
H A Ddigest.c429 size_t mdsize = 0; in EVP_DigestFinal_ex() local
437 mdsize = sz; in EVP_DigestFinal_ex()
446 ret = ctx->digest->dfinal(ctx->algctx, md, &size, mdsize); in EVP_DigestFinal_ex()
461 OPENSSL_assert(mdsize <= EVP_MAX_MD_SIZE); in EVP_DigestFinal_ex()
464 *isize = mdsize; in EVP_DigestFinal_ex()
911 size_t mdsize = 0; in evp_md_cache_constants() local
915 params[1] = OSSL_PARAM_construct_size_t(OSSL_DIGEST_PARAM_SIZE, &mdsize); in evp_md_cache_constants()
921 if (mdsize > INT_MAX || blksz > INT_MAX) in evp_md_cache_constants()
925 md->md_size = (int)mdsize; in evp_md_cache_constants()
/freebsd/crypto/openssl/providers/implementations/kdfs/
H A Dpbkdf1.c56 int mdsize, ret = 0; in kdf_pbkdf1_do_derive() local
71 mdsize = EVP_MD_size(md_type); in kdf_pbkdf1_do_derive()
72 if (mdsize < 0) in kdf_pbkdf1_do_derive()
74 if (n > (size_t)mdsize) { in kdf_pbkdf1_do_derive()
82 if (!EVP_DigestUpdate(ctx, md_tmp, mdsize)) in kdf_pbkdf1_do_derive()
/freebsd/sys/contrib/openzfs/module/os/freebsd/zfs/
H A Dcrypto_os.c106 crypto_mac_final(struct hmac_ctx *ctx, void *md, size_t mdsize) in crypto_mac_final() argument
119 if (mdsize == 0) in crypto_mac_final()
120 mdsize = SHA512_DIGEST_LENGTH; in crypto_mac_final()
121 memcpy(md, digest, mdsize); in crypto_mac_final()
/freebsd/contrib/openbsm/bin/auditdistd/
H A Dproto_tls.c300 unsigned int i, mdsize; in tls_certificate_verify() local
312 if (X509_digest(cert, EVP_sha256(), md, &mdsize) != 1) in tls_certificate_verify()
314 PJDLOG_ASSERT(mdsize <= EVP_MAX_MD_SIZE); in tls_certificate_verify()
320 for (i = 0; i < mdsize; i++) { in tls_certificate_verify()
/freebsd/sys/geom/mirror/
H A Dg_mirror_ctl.c624 off_t mdsize; in g_mirror_ctl_insert() local
690 mdsize = (sc->sc_type == G_MIRROR_TYPE_AUTOMATIC) ? in g_mirror_ctl_insert()
692 if (sc->sc_provider->mediasize > pp->mediasize - mdsize) { in g_mirror_ctl_insert()
/freebsd/crypto/openssl/test/recipes/30-test_evp_data/
H A Devppkey_ecdsa.txt118 # Test that mdsize != tbssize fails
/freebsd/crypto/openssl/test/
H A Dsslapitest.c80 static SSL_SESSION *create_a_psk(SSL *ssl, size_t mdsize);
3360 static SSL_SESSION *create_a_psk(SSL *ssl, size_t mdsize) in create_a_psk() argument
3372 if (mdsize == SHA384_DIGEST_LENGTH) { in create_a_psk()
3374 } else if (mdsize == SHA256_DIGEST_LENGTH) { in create_a_psk()
3387 || !TEST_true(SSL_SESSION_set1_master_key(sess, key, mdsize)) in create_a_psk()
3404 size_t mdsize) in setupearly_data_test() argument
3444 clientpsk = create_a_psk(*clientssl, mdsize); in setupearly_data_test()