/openssl/ssl/ |
H A D | t1_trce.c | 47 if (msglen % vlen) in do_ssl_trace_list() 49 while (msglen) { in do_ssl_trace_list() 968 msglen -= 2; in ssl_print_extensions() 1026 msglen -= 2; in ssl_print_client_hello() 1044 msglen--; in ssl_print_client_hello() 1054 msglen--; in ssl_print_client_hello() 1093 msglen -= 2; in ssl_print_server_hello() 1563 msglen -= 4; in ssl_print_ticket() 1591 if (msglen) in ssl_print_ticket() 1611 msglen -= 4; in ssl_print_handshake() [all …]
|
H A D | d1_lib.c | 425 size_t fragoff, fraglen, msglen; in DTLSv1_listen() local 559 || !PACKET_get_net_3_len(&msgpkt, &msglen) in DTLSv1_listen() 587 if (fragoff != 0 || fraglen > msglen) { in DTLSv1_listen()
|
/openssl/test/ |
H A D | quic_newcid_test.c | 56 size_t msglen = strlen(msg); in test_ncid_frame() local 77 if (!TEST_int_eq(SSL_write(cssl, msg, msglen), msglen)) in test_ncid_frame() 90 if (!TEST_mem_eq(msg, msglen, buf, bytesread)) in test_ncid_frame() 104 (unsigned char *)msg, msglen, in test_ncid_frame() 111 if (!TEST_size_t_eq(msglen, byteswritten)) in test_ncid_frame() 118 if (!TEST_int_eq(SSL_read(cssl, buf, sizeof(buf)), msglen)) in test_ncid_frame() 121 if (!TEST_mem_eq(msg, msglen, buf, bytesread)) in test_ncid_frame() 124 if (!TEST_int_eq(SSL_write(cssl, msg, msglen), msglen)) in test_ncid_frame() 136 if (!TEST_mem_eq(msg, msglen, buf, bytesread)) in test_ncid_frame()
|
H A D | quicfaultstest.c | 30 size_t msglen = strlen(msg); in test_basic() local 44 if (!TEST_int_eq(SSL_write(cssl, msg, msglen), msglen)) in test_basic() 56 if (!TEST_mem_eq(msg, msglen, buf, bytesread)) in test_basic() 98 size_t msglen = strlen(msg); in test_unknown_frame() local 127 if (!TEST_true(ossl_quic_tserver_write(qtserv, sid, (unsigned char *)msg, msglen, in test_unknown_frame() 131 if (!TEST_size_t_eq(msglen, byteswritten)) in test_unknown_frame() 268 size_t msglen = strlen(msg); in test_corrupted_data() local 325 msglen - 5, &byteswritten))) in test_corrupted_data() 328 if (!TEST_size_t_eq(byteswritten, msglen - 5)) in test_corrupted_data() 353 if (!TEST_mem_eq(msg, msglen, buf, bytesread)) in test_corrupted_data()
|
H A D | quicapitest.c | 58 size_t msglen = strlen(msg); in test_quic_write_read() local 98 || !TEST_size_t_eq(numbytes, msglen)) in test_quic_write_read() 843 size_t written, readbytes, msglen; in test_bio_ssl() local 866 msglen = strlen(msg); in test_bio_ssl() 978 const size_t msglen = 1024; in test_back_pressure() local 990 msg = OPENSSL_malloc(msglen); in test_back_pressure() 1243 size_t msglen = strlen(msg); in test_client_auth() local 1286 || !TEST_size_t_eq(numbytes, msglen)) in test_client_auth() 1299 || !TEST_size_t_eq(numbytes, msglen) in test_client_auth() 1300 || !TEST_mem_eq(buf, numbytes, msg, msglen)) in test_client_auth() [all …]
|
H A D | clienthellotest.c | 71 size_t msglen; in test_client_hello() local 200 msglen = PACKET_remaining(&pkt); in test_client_hello() 239 testresult = TEST_true(msglen == F5_WORKAROUND_MAX_MSG_LEN); in test_client_hello()
|
H A D | curve448_internal_test.c | 586 size_t msglen) in dohash() argument 591 || !EVP_DigestUpdate(hashctx, msg, msglen) in dohash()
|
H A D | rsa_test.c | 398 size_t msglen = 64; in test_EVP_rsa_legacy_key() local 502 && TEST_true(EVP_DigestSign(ctx, sigbuf, &buflen, msgbuf, msglen))); in test_EVP_rsa_legacy_key()
|
H A D | sslapitest.c | 11335 msglen = fragsize * numpipes; in test_pipelining() 11336 msg = OPENSSL_malloc(msglen); in test_pipelining() 11342 msglen = 55; in test_pipelining() 11344 msglen = 50; in test_pipelining() 11347 msglen -= 2; /* Send 2 less bytes */ in test_pipelining() 11349 msglen -= 12; /* Send 12 less bytes */ in test_pipelining() 11351 buf = OPENSSL_malloc(msglen); in test_pipelining() 11378 || !TEST_size_t_eq(written, msglen)) in test_pipelining() 11391 offset < msglen; in test_pipelining() 11400 if (!TEST_mem_eq(msg, msglen, buf, offset) in test_pipelining() [all …]
|
H A D | quic_multistream_test.c | 4718 size_t msglen) in script_68_inject_handshake() argument
|
/openssl/ssl/quic/ |
H A D | quic_trace.c | 560 const void *buf, size_t msglen, SSL *ssl, void *arg) in ossl_quic_trace() argument 573 BIO_printf(bio, " Datagram\n Length: %zu\n", msglen); in ossl_quic_trace() 581 if (!PACKET_buf_init(&pkt, buf, msglen)) in ossl_quic_trace() 629 if (!PACKET_buf_init(&pkt, buf, msglen)) in ossl_quic_trace()
|
H A D | quic_local.h | 266 const void *buf, size_t msglen, SSL *ssl, void *arg);
|
/openssl/crypto/crmf/ |
H A D | crmf_pbm.c | 129 const unsigned char *msg, size_t msglen, in OSSL_CRMF_pbm_new() argument 209 msg, msglen, mac_res, EVP_MAX_MD_SIZE, outlen) == NULL) in OSSL_CRMF_pbm_new()
|
/openssl/doc/man3/ |
H A D | OSSL_CRMF_pbmp_new.pod | 15 const unsigned char *msg, size_t msglen, 27 lengths I<msglen> and I<seclen>.
|
/openssl/ssl/statem/ |
H A D | statem_dtls.c | 1339 size_t msglen; in dtls1_close_construct_packet() local 1342 || !WPACKET_get_length(pkt, &msglen) in dtls1_close_construct_packet() 1343 || msglen > INT_MAX) in dtls1_close_construct_packet() 1347 s->d1->w_msg_hdr.msg_len = msglen - DTLS1_HM_HEADER_LENGTH; in dtls1_close_construct_packet() 1348 s->d1->w_msg_hdr.frag_len = msglen - DTLS1_HM_HEADER_LENGTH; in dtls1_close_construct_packet() 1350 s->init_num = (int)msglen; in dtls1_close_construct_packet()
|
H A D | statem_lib.c | 77 size_t msglen; in ssl3_do_write() local 81 &msg, &msglen, in ssl3_do_write() 84 if (msglen < SSL3_HM_HEADER_LENGTH in ssl3_do_write() 85 || !BUF_MEM_grow(s->init_buf, msglen)) in ssl3_do_write() 87 memcpy(s->init_buf->data, msg, msglen); in ssl3_do_write() 88 s->init_num = msglen; in ssl3_do_write() 127 size_t msglen; in tls_close_construct_packet() local 130 || !WPACKET_get_length(pkt, &msglen) in tls_close_construct_packet() 131 || msglen > INT_MAX) in tls_close_construct_packet() 133 s->init_num = (int)msglen; in tls_close_construct_packet()
|
H A D | statem_clnt.c | 3261 size_t msglen; in tls_construct_cke_gost() local 3336 msglen = 255; in tls_construct_cke_gost() 3337 if (EVP_PKEY_encrypt(pkey_ctx, tmp, &msglen, pms, pmslen) <= 0) { in tls_construct_cke_gost() 3343 || (msglen >= 0x80 && !WPACKET_put_bytes_u8(pkt, 0x81)) in tls_construct_cke_gost() 3344 || !WPACKET_sub_memcpy_u8(pkt, tmp, msglen)) { in tls_construct_cke_gost() 3413 size_t msglen; in tls_construct_cke_gost18() local 3473 if (EVP_PKEY_encrypt(pkey_ctx, NULL, &msglen, pms, pmslen) <= 0) { in tls_construct_cke_gost18() 3478 if (!WPACKET_allocate_bytes(pkt, msglen, &encdata) in tls_construct_cke_gost18() 3479 || EVP_PKEY_encrypt(pkey_ctx, encdata, &msglen, pms, pmslen) <= 0) { in tls_construct_cke_gost18()
|
H A D | extensions_clnt.c | 1027 size_t binderoffset, msglen; in tls_construct_ctos_psk() local 1197 || !WPACKET_get_total_written(pkt, &msglen) in tls_construct_ctos_psk() 1207 msgstart = WPACKET_get_curr(pkt) - msglen; in tls_construct_ctos_psk()
|
/openssl/test/helpers/ |
H A D | quictestlib.h | 147 size_t msglen,
|
H A D | quictestlib.c | 995 size_t msglen = fault->handbuflen; in qtest_fault_delete_extension() local 1056 if ((size_t)(end - start) + SSL3_HM_HEADER_LENGTH > msglen) in qtest_fault_delete_extension() 1058 msglen -= (end - start) + SSL3_HM_HEADER_LENGTH; in qtest_fault_delete_extension() 1059 if (!qtest_fault_resize_message(fault, msglen)) in qtest_fault_delete_extension()
|
H A D | ssltestlib.c | 126 int rem, i, content, reclen, msglen, fragoff, fraglen, epoch; in dump_data() local 166 msglen = (rec[MSG_LEN_HI] << 16) | (rec[MSG_LEN_MID] << 8) in dump_data() 168 printf("*** Message Length: %d\n", msglen); in dump_data() 179 if (fragoff + fraglen > msglen) in dump_data()
|
/openssl/crypto/sm2/ |
H A D | sm2_crypt.c | 57 static int is_all_zeros(const unsigned char *msg, size_t msglen) in is_all_zeros() argument 62 for (i = 0; i < msglen; i++) { in is_all_zeros()
|
/openssl/doc/designs/quic-design/ |
H A D | quic-fault-injector.md | 286 size_t msglen, 434 size_t msglen = strlen(msg); 458 if (!TEST_true(ossl_quic_tserver_write(qtserv, (unsigned char *)msg, msglen, 462 if (!TEST_size_t_eq(msglen, byteswritten))
|
/openssl/include/openssl/ |
H A D | crmf.h.in | 92 const unsigned char *msg, size_t msglen,
|