/openssl/ssl/statem/ |
H A D | statem_dtls.c | 22 #define RSMBLY_BITMASK_SIZE(msg_len) (((msg_len) + 7) / 8) argument 328 size_t msg_len; in dtls_get_message() local 361 msg_len = msg_hdr->msg_len; in dtls_get_message() 365 l2n3(msg_len, p); in dtls_get_message() 368 l2n3(msg_len, p); in dtls_get_message() 438 msg_len = msg_hdr->msg_len; in dtls1_preprocess_fragment() 460 s->d1->r_msg_hdr.msg_len = msg_len; in dtls1_preprocess_fragment() 464 } else if (msg_len != s->d1->r_msg_hdr.msg_len) { in dtls1_preprocess_fragment() 628 if (frag->msg_header.msg_len != msg_hdr->msg_len) { in dtls1_reassemble_fragment() 865 mlen = msg_hdr.msg_len; in dtls_get_reassembled_message() [all …]
|
/openssl/crypto/sm2/ |
H A D | sm2_crypt.c | 109 const uint8_t *msg, size_t msg_len, in ossl_sm2_encrypt() argument 183 msg_mask = OPENSSL_zalloc(msg_len); in ossl_sm2_encrypt() 214 if (is_all_zeros(msg_mask, msg_len)) { in ossl_sm2_encrypt() 219 for (i = 0; i != msg_len; ++i) in ossl_sm2_encrypt() 295 int msg_len = 0; in ossl_sm2_decrypt() local 319 msg_len = sm2_ctext->C2->length; in ossl_sm2_decrypt() 320 if (*ptext_len < (size_t)msg_len) { in ossl_sm2_decrypt() 340 msg_mask = OPENSSL_zalloc(msg_len); in ossl_sm2_decrypt() 370 if (is_all_zeros(msg_mask, msg_len)) { in ossl_sm2_decrypt() 375 for (i = 0; i != msg_len; ++i) in ossl_sm2_decrypt() [all …]
|
H A D | sm2_sign.c | 153 const uint8_t *msg, size_t msg_len) in sm2_compute_msg_hash() argument 189 || !EVP_DigestUpdate(hash, msg, msg_len) in sm2_compute_msg_hash() 414 const uint8_t *msg, size_t msg_len) in ossl_sm2_do_sign() argument 419 e = sm2_compute_msg_hash(digest, key, id, id_len, msg, msg_len); in ossl_sm2_do_sign() 437 const uint8_t *msg, size_t msg_len) in ossl_sm2_do_verify() argument 442 e = sm2_compute_msg_hash(digest, key, id, id_len, msg, msg_len); in ossl_sm2_do_verify()
|
/openssl/test/ |
H A D | sm2_internal_test.c | 140 const size_t msg_len = strlen(message); in test_sm2_crypt() local 149 size_t recovered_len = msg_len; in test_sm2_crypt() 166 || !TEST_true(ossl_sm2_ciphertext_size(key, digest, msg_len, in test_sm2_crypt() 176 (const uint8_t *)message, msg_len, in test_sm2_crypt() 187 || !TEST_int_eq(ptext_len, msg_len)) in test_sm2_crypt() 194 || !TEST_int_eq(recovered_len, msg_len) in test_sm2_crypt() 195 || !TEST_mem_eq(recovered, recovered_len, message, msg_len)) in test_sm2_crypt() 311 const size_t msg_len = strlen(message); in test_sm2_sign() local 341 strlen(userid), (const uint8_t *)message, msg_len); in test_sm2_sign() 357 strlen(userid), (const uint8_t *)message, msg_len); in test_sm2_sign()
|
H A D | ecdsatest.c | 80 long q_len, msg_len = 0; in x9_62_tests() local 106 || !TEST_ptr(message = OPENSSL_hexstr2buf(tbs, &msg_len)) in x9_62_tests() 108 || !TEST_true(EVP_DigestUpdate(mctx, message, msg_len)) in x9_62_tests()
|
H A D | acvp_test.c | 96 const unsigned char *msg, size_t msg_len, in sig_gen() argument 111 || !TEST_int_gt(EVP_DigestSign(md_ctx, sig, &sig_len, msg, msg_len), 0)) in sig_gen() 287 if (!TEST_true(sig_gen(pkey, NULL, tst->digest_alg, tst->msg, tst->msg_len, in ecdsa_siggen_test() 332 tst->msg, tst->msg_len), tst->pass) in ecdsa_sigver_test() 797 if (!TEST_true(sig_gen(pkey, NULL, tst->digest_alg, tst->msg, tst->msg_len, in dsa_siggen_test() 843 || !TEST_true(EVP_Digest(tst->msg, tst->msg_len, in dsa_sigver_test() 1432 tst->msg, tst->msg_len, in rsa_siggen_test() 1481 tst->msg, tst->msg_len), tst->pass) in rsa_sigver_test()
|
H A D | acvp_test.inc | 31 size_t msg_len; 38 size_t msg_len; 410 size_t msg_len; 424 size_t msg_len; 1350 size_t msg_len; 1387 size_t msg_len;
|
/openssl/include/crypto/ |
H A D | sm2.h | 41 const uint8_t *msg, size_t msg_len); 48 const uint8_t *msg, size_t msg_len); 68 size_t msg_len, size_t *ct_size); 75 const uint8_t *msg, size_t msg_len,
|
/openssl/test/helpers/ |
H A D | noisydgrambio.c | 279 static void flip_bits(unsigned char *msg, size_t msg_len, uint16_t flip, in flip_bits() argument 286 if (msg_len < 2) in flip_bits() 288 if (msg_len < flip_offset + 2) in flip_bits() 289 flip_offset = msg_len - 2; in flip_bits() 294 BIO_dump_fp(stdout, msg, msg_len); in flip_bits()
|
/openssl/demos/encrypt/ |
H A D | rsa_encrypt.c | 216 size_t msg_len = sizeof(msg) - 1; in main() local 221 if (!do_encrypt(libctx, msg, msg_len, &encrypted, &encrypted_len)) { in main()
|
/openssl/doc/man7/ |
H A D | EVP_SIGNATURE-ED25519.pod | 141 void do_sign(EVP_PKEY *ed_key, unsigned char *msg, size_t msg_len) 157 EVP_DigestSign(md_ctx, NULL, &sig_len, msg, msg_len); 160 EVP_DigestSign(md_ctx, sig, &sig_len, msg, msg_len);
|
H A D | EVP_PKEY-SM2.pod | 77 EVP_DigestVerifyUpdate(mctx, msg, msg_len);
|
/openssl/providers/implementations/keymgmt/ |
H A D | ecx_kmgmt.c | 629 size_t msg_len = sizeof(msg); in ecd_fips140_pairwise_test() local 651 operation_result = ossl_ed25519_sign(sig, msg, msg_len, ecx->pubkey, in ecd_fips140_pairwise_test() 655 operation_result = ossl_ed448_sign(ecx->libctx, sig, msg, msg_len, in ecd_fips140_pairwise_test() 664 operation_result = ossl_ed25519_verify(msg, msg_len, sig, ecx->pubkey, in ecd_fips140_pairwise_test() 668 operation_result = ossl_ed448_verify(ecx->libctx, msg, msg_len, sig, in ecd_fips140_pairwise_test()
|
/openssl/providers/fips/ |
H A D | self_test_kats.c | 523 if (EVP_PKEY_sign(ctx, sig, &siglen, t->msg, t->msg_len) <= 0) in self_test_digest_sign() 541 if (EVP_PKEY_verify(ctx, sig, siglen, t->msg, t->msg_len) <= 0) in self_test_digest_sign()
|
H A D | self_test_data.inc | 125 size_t msg_len;
|
/openssl/crypto/bio/ |
H A D | bss_dgram.c | 1402 BIO_MSG_N(msg, stride, i).data_len = mh[i].msg_len; in dgram_sendmmsg() 1595 BIO_MSG_N(msg, stride, i).data_len = mh[i].msg_len; in dgram_recvmmsg()
|
/openssl/doc/man3/ |
H A D | EVP_EncryptInit.pod | 1756 const unsigned char *msg, size_t msg_len, unsigned char *out) 1761 * the same size as the plaintext size "msg_len". 1762 * The "msg_len" can be any size >= 16. 1786 if (!EVP_CipherUpdate(ctx, out, &outlen, msg, msg_len))
|
/openssl/ssl/ |
H A D | ssl_local.h | 1885 size_t msg_len; member
|