SHA_DIGEST_LENGTH
unsigned char md[SHA_DIGEST_LENGTH], challange[SHA_DIGEST_LENGTH];
unsigned char digest[SHA_DIGEST_LENGTH];
unsigned char md[SHA_DIGEST_LENGTH], challenge[SHA_DIGEST_LENGTH];
unsigned char hash[SHA_DIGEST_LENGTH];
unsigned char shaoutput[SHA_DIGEST_LENGTH];
unsigned char md[SHA_DIGEST_LENGTH];
|| !EVP_MD_meth_set_result_size(md, SHA_DIGEST_LENGTH)
unsigned char cert_sha1[SHA_DIGEST_LENGTH];
if (!ASN1_OCTET_STRING_set(cid->hash, cert_sha1, SHA_DIGEST_LENGTH)) {
else if (len != ((plen + SHA_DIGEST_LENGTH + AES_BLOCK_SIZE) & -AES_BLOCK_SIZE))
SHA1_Update(&key->md, out + plen, SHA_DIGEST_LENGTH);
plen += SHA_DIGEST_LENGTH;
unsigned int u[SHA_DIGEST_LENGTH / sizeof(unsigned int)];
unsigned char c[32 + SHA_DIGEST_LENGTH];
if (len < (AES_BLOCK_SIZE + SHA_DIGEST_LENGTH + 1))
} else if (len < (SHA_DIGEST_LENGTH + 1))
maxpad = len - (SHA_DIGEST_LENGTH + 1);
inp_len = len - (SHA_DIGEST_LENGTH + pad + 1);
len -= SHA_DIGEST_LENGTH; /* amend mac */
len += SHA_DIGEST_LENGTH;
SHA1_Update(&key->md, pmac->c, SHA_DIGEST_LENGTH);
unsigned char *p = out + len - 1 - maxpad - SHA_DIGEST_LENGTH;
for (res = 0, i = 0, j = 0; j < maxpad + SHA_DIGEST_LENGTH; j++) {
cmask = ((int)(j - off - SHA_DIGEST_LENGTH)) >> (sizeof(int) * 8 - 1);
for (res = 0, i = 0; i < SHA_DIGEST_LENGTH; i++)
return (int)(((len + SHA_DIGEST_LENGTH + AES_BLOCK_SIZE) & -AES_BLOCK_SIZE)
return SHA_DIGEST_LENGTH;
unsigned char icv[8], iv[8], sha1tmp[SHA_DIGEST_LENGTH];
OPENSSL_cleanse(sha1tmp, SHA_DIGEST_LENGTH);
unsigned char sha1tmp[SHA_DIGEST_LENGTH];
OPENSSL_cleanse(sha1tmp, SHA_DIGEST_LENGTH);
SHA_DIGEST_LENGTH,
N = (L >= 2048 ? SHA256_DIGEST_LENGTH : SHA_DIGEST_LENGTH) * 8;
N = (L >= 2048 ? SHA256_DIGEST_LENGTH : SHA_DIGEST_LENGTH) * 8;
if (qsize != SHA_DIGEST_LENGTH
unsigned char sha1tmp[SHA_DIGEST_LENGTH];
unsigned char md[SHA_DIGEST_LENGTH];
if (!(ASN1_OCTET_STRING_set(byKey, md, SHA_DIGEST_LENGTH))) {
unsigned char md[SHA_DIGEST_LENGTH];
ret = (ASN1_STRING_length(respid->value.byKey) == SHA_DIGEST_LENGTH)
SHA_DIGEST_LENGTH)
unsigned char tmphash[SHA_DIGEST_LENGTH], *keyhash;
if (id->value.byKey->length != SHA_DIGEST_LENGTH)
if (memcmp(keyhash, tmphash, SHA_DIGEST_LENGTH) == 0)
ASN1_SEQUENCE, 0x0d + SHA_DIGEST_LENGTH,
ASN1_OCTET_STRING, SHA_DIGEST_LENGTH
MD_NID_CASE(sha1, SHA_DIGEST_LENGTH)
static unsigned char m[SHA_DIGEST_LENGTH];
static unsigned char m[SHA_DIGEST_LENGTH];
unsigned char sha1tmp[SHA_DIGEST_LENGTH];
unsigned char dig[SHA_DIGEST_LENGTH];
unsigned char digest[SHA_DIGEST_LENGTH];
unsigned char digv[SHA_DIGEST_LENGTH];
unsigned char digs[SHA_DIGEST_LENGTH];
if (RAND_priv_bytes(digv, SHA_DIGEST_LENGTH) <= 0)
BN_bin2bn(digs, SHA_DIGEST_LENGTH, NULL),
BN_bin2bn(digv, SHA_DIGEST_LENGTH, NULL)))
unsigned char SHA1md[SHA_DIGEST_LENGTH];
for (i = 0; i < SHA_DIGEST_LENGTH; i++) {
for (i = 0; i < SHA_DIGEST_LENGTH; i++) {
rv = memcmp(a->sha1_hash, b->sha1_hash, SHA_DIGEST_LENGTH);
unsigned char md[SHA_DIGEST_LENGTH];
rv = memcmp(a->sha1_hash, b->sha1_hash, SHA_DIGEST_LENGTH);
|| !EVP_MD_meth_set_result_size(_hidden_sha1_md, SHA_DIGEST_LENGTH)
return ((len + SHA_DIGEST_LENGTH + AES_BLOCK_SIZE)
return SHA_DIGEST_LENGTH;
|| !EVP_MD_meth_set_result_size(md, SHA_DIGEST_LENGTH)
fill_known_data(md, SHA_DIGEST_LENGTH);
else if (len != ((plen + SHA_DIGEST_LENGTH + AES_BLOCK_SIZE) & -AES_BLOCK_SIZE))
fill_known_data(out + plen, SHA_DIGEST_LENGTH);
plen += SHA_DIGEST_LENGTH;
if (len < (AES_BLOCK_SIZE + SHA_DIGEST_LENGTH + 1))
} else if (len < (SHA_DIGEST_LENGTH + 1))
maxpad = len - (SHA_DIGEST_LENGTH + 1);
return (int)(((len + SHA_DIGEST_LENGTH + AES_BLOCK_SIZE) & -AES_BLOCK_SIZE)
return SHA_DIGEST_LENGTH;
unsigned char sha1_hash[SHA_DIGEST_LENGTH];
unsigned char sha1_hash[SHA_DIGEST_LENGTH];
else if (len != ((plen + SHA_DIGEST_LENGTH + AES_BLOCK_SIZE) & -AES_BLOCK_SIZE))
sha1_update(&sctx->md, out + plen, SHA_DIGEST_LENGTH);
plen += SHA_DIGEST_LENGTH;
unsigned int u[SHA_DIGEST_LENGTH / sizeof(unsigned int)];
unsigned char c[32 + SHA_DIGEST_LENGTH];
if (len < (AES_BLOCK_SIZE + SHA_DIGEST_LENGTH + 1))
} else if (len < (SHA_DIGEST_LENGTH + 1))
maxpad = len - (SHA_DIGEST_LENGTH + 1);
inp_len = len - (SHA_DIGEST_LENGTH + pad + 1);
len -= SHA_DIGEST_LENGTH; /* amend mac */
len += SHA_DIGEST_LENGTH;
sha1_update(&sctx->md, pmac->c, SHA_DIGEST_LENGTH);
unsigned char *p = out + len - 1 - maxpad - SHA_DIGEST_LENGTH;
for (res = 0, i = 0, j = 0; j < maxpad + SHA_DIGEST_LENGTH; j++) {
cmask = ((int)(j - off - SHA_DIGEST_LENGTH)) >> (sizeof(int) * 8 - 1);
vctx->removetlsfixed = SHA_DIGEST_LENGTH + AES_BLOCK_SIZE;
ctx->tls_aad_pad = (int)(((len + SHA_DIGEST_LENGTH + AES_BLOCK_SIZE) & -AES_BLOCK_SIZE)
ctx->tls_aad_pad = SHA_DIGEST_LENGTH;
unsigned char icv[8], iv[TDES_IVLEN], sha1tmp[SHA_DIGEST_LENGTH];
OPENSSL_cleanse(sha1tmp, SHA_DIGEST_LENGTH);
unsigned char sha1tmp[SHA_DIGEST_LENGTH];
OPENSSL_cleanse(sha1tmp, SHA_DIGEST_LENGTH);
sha1, SHA_CTX, SHA_CBLOCK, SHA_DIGEST_LENGTH, SHA2_FLAGS,
#define MD5_SHA1_DIGEST_LENGTH (MD5_DIGEST_LENGTH + SHA_DIGEST_LENGTH)
unsigned char buf[16], smd[SHA_DIGEST_LENGTH];
|| !EVP_DigestUpdate(m5, smd, SHA_DIGEST_LENGTH)) {
pad = 15 - ((len + SHA_DIGEST_LENGTH) % 16);
enc = OPENSSL_malloc(len + SHA_DIGEST_LENGTH + 1 + pad);
|| !EVP_MAC_final(ctx, enc + len, NULL, SHA_DIGEST_LENGTH))
len += SHA_DIGEST_LENGTH;
0, DTLS1_HM_HEADER_LENGTH + SHA_DIGEST_LENGTH, /* record length */
0, 0, SHA_DIGEST_LENGTH, /* message length */
0, 0, SHA_DIGEST_LENGTH, /* fragment length */
SHA_DIGEST_LENGTH);
unsigned char md[SHA_DIGEST_LENGTH];
static const unsigned char output[SHA_DIGEST_LENGTH] = {
return test_static_sha_common("abc", SHA_DIGEST_LENGTH, output, &SHA1);
#ifndef SHA_DIGEST_LENGTH
char id[SHA_DIGEST_LENGTH];
{ "sha1", SHA_DIGEST_LENGTH },
unsigned char digest[SHA_DIGEST_LENGTH];
char Digest[SHA_DIGEST_LENGTH];
u_char Digest[SHA_DIGEST_LENGTH];
char Digest[SHA_DIGEST_LENGTH];
char Digest[SHA_DIGEST_LENGTH];
char Digest[SHA_DIGEST_LENGTH];
char Digest[SHA_DIGEST_LENGTH];