EVP_MD_size
if (tbslen != EVP_MD_size(dctx->md))
if (tbslen != EVP_MD_size(dctx->md))
mdlen = EVP_MD_size(md);
int EVP_MD_size(const EVP_MD *md);
#define EVP_MD_CTX_size(e) EVP_MD_size(EVP_MD_CTX_md(e))
LCRYPTO_ALIAS(EVP_MD_size);
mdsize = EVP_MD_size(md);
mdlen = EVP_MD_size(digest);
if ((s = EVP_MD_size(ctx->digest)) < 0)
LCRYPTO_USED(EVP_MD_size);
const size_t digest_len = EVP_MD_size(digest);
#define HMAC_size(e) (EVP_MD_size(HMAC_CTX_get_md((e))))
*keylen = EVP_MD_size(kctx->md);
if ((chunk = EVP_MD_size(md)) < 0)
mdlen = EVP_MD_size(dgst);
if ((u = EVP_MD_size(md_type)) <= 0)
if ((md_size = EVP_MD_size(md_type)) < 0)
saltlen = EVP_MD_size(sigmd);
saltlen = EVP_PKEY_size(pk) - EVP_MD_size(sigmd) - 2;
if ((md_len = EVP_MD_size(md)) <= 0)
if ((mdlen = EVP_MD_size(md)) <= 0)
if ((mdlen = EVP_MD_size(md)) <= 0)
mdlen = EVP_MD_size(dgst);
if (tbslen != (size_t)EVP_MD_size(rctx->md)) {
if (ret != EVP_MD_size(rctx->md)) {
if (tbslen != (size_t)EVP_MD_size(rctx->md)) {
rctx->min_saltlen > EVP_MD_size(rctx->md)) ||
max_saltlen = RSA_size(rsa) - EVP_MD_size(md);
hLen = EVP_MD_size(Hash);
hLen = EVP_MD_size(Hash);
if ((m_len = EVP_MD_size(md)) > (size_t)decrypt_len) {
if ((md_size = EVP_MD_size(digest)) < 0) {
if ((md_size = EVP_MD_size(digest)) < 0) {
if ((hlen = EVP_MD_size(digest)) < 0) {
if ((C3_size = EVP_MD_size(digest)) < 0) {
if ((hash_size = EVP_MD_size(digest)) < 0) {
if ((md_len = EVP_MD_size(md)) < 0) {
if ((md_size = EVP_MD_size(digest)) < 0) {
memset(out, 0, EVP_MD_size(digest));
if (digest->length != EVP_MD_size(md)) {
if ((length = EVP_MD_size(md)) < 0)
if ((security_bits = EVP_MD_size(md)) <= 0)
*mac_secret_size = EVP_MD_size(*md);
EVP_PKEY_size(pkey) < (2 * EVP_MD_size(sigalg->md()) + 2))
chunk = EVP_MD_size(md);
mac_key_len = EVP_MD_size(mac_hash);
if (EVP_MD_size(rl->mac_hash) != CBS_len(mac_key))
if (!tls13_secret_init(&finished_key, EVP_MD_size(ctx->hash)))
finished_key.len = EVP_MD_size(ctx->hash);
md_len = EVP_MD_size(secrets->digest);
hash_length = EVP_MD_size(digest);
finished_key.len = EVP_MD_size(ctx->hash);
if (!tls13_secret_init(&finished_key, EVP_MD_size(ctx->hash)))
out_len = EVP_MD_size(md);
out_len = EVP_MD_size(md);
return (EVP_MD_size(dsa->dsa_priv));
md_value_len = EVP_MD_size(md);
if (HMAC(usm->digest, usm->authkey, EVP_MD_size(usm->digest), buf,
if (HMAC(usm->digest, usm->authkey, EVP_MD_size(usm->digest), packet,
keylen = EVP_MD_size(digest);
if (keylen != (size_t)EVP_MD_size(digest)) {
keylen = EVP_MD_size(usm->digest);
if (keylen != (size_t)EVP_MD_size(usm->digest)) {
!EVP_DigestUpdate(ctx, mkey, EVP_MD_size(md)) ||
!EVP_DigestUpdate(ctx, mkey, EVP_MD_size(md)) ||
algorithm->maximum_digest_size = EVP_MD_size(hmac_algorithm);