/openssl/apps/lib/ |
H A D | app_params.c | 13 static int describe_param_type(char *buf, size_t bufsz, const OSSL_PARAM *param) in describe_param_type() argument 45 printed_len = BIO_snprintf(buf, bufsz, "%s: ", param->key); in describe_param_type() 48 bufsz -= printed_len; in describe_param_type() 50 printed_len = BIO_snprintf(buf, bufsz, "%s%s", type_mod, type); in describe_param_type() 53 bufsz -= printed_len; in describe_param_type() 56 printed_len = BIO_snprintf(buf, bufsz, " [%d]", param->data_type); in describe_param_type() 59 bufsz -= printed_len; in describe_param_type() 63 printed_len = BIO_snprintf(buf, bufsz, " (arbitrary size)"); in describe_param_type() 65 printed_len = BIO_snprintf(buf, bufsz, " (max %zu bytes large)", in describe_param_type() 69 bufsz -= printed_len; in describe_param_type()
|
/openssl/crypto/sha/ |
H A D | sha3.c | 24 ctx->bufsz = 0; in ossl_sha3_reset() 70 ctx->bufsz += len; in ossl_sha3_update() 81 ctx->bufsz = 0; in ossl_sha3_update() 92 ctx->bufsz = rem; in ossl_sha3_update() 106 size_t num = ctx->bufsz; in ossl_sha3_final() 143 size_t num = ctx->bufsz; in ossl_sha3_squeeze() 169 num = ctx->bufsz = 0; in ossl_sha3_squeeze() 178 if (outlen > ctx->bufsz) in ossl_sha3_squeeze() 179 len = ctx->bufsz; in ossl_sha3_squeeze() 185 ctx->bufsz -= len; in ossl_sha3_squeeze() [all …]
|
/openssl/providers/implementations/digests/ |
H A D | sha3_prov.c | 84 if ((num = ctx->bufsz) != 0) { in keccak_update() 90 ctx->bufsz += len; in keccak_update() 99 ctx->bufsz = 0; in keccak_update() 106 ctx->bufsz = rem; in keccak_update() 269 if (ctx->bufsz != 0) { in s390x_shake_squeeze() 276 ctx->bufsz += len; in s390x_shake_squeeze() 278 ctx->bufsz = 0; in s390x_shake_squeeze() 293 size_t num = ctx->bufsz; in s390x_keccakc_final() 355 ctx->bufsz = 0; in s390x_keccakc_squeeze() 365 ctx->bufsz += len; in s390x_keccakc_squeeze() [all …]
|
/openssl/providers/implementations/ciphers/ |
H A D | ciphercommon.c | 195 ctx->bufsz = 0; in cipher_generic_init_internal() 338 if (ctx->bufsz != 0) in ossl_cipher_generic_block_update() 358 ctx->bufsz = 0; in ossl_cipher_generic_block_update() 417 } else if (ctx->bufsz == 0) { in ossl_cipher_generic_block_final() 420 } else if (ctx->bufsz != blksz) { in ossl_cipher_generic_block_final() 433 ctx->bufsz = 0; in ossl_cipher_generic_block_final() 439 if (ctx->bufsz != blksz) { in ossl_cipher_generic_block_final() 458 if (outsize < ctx->bufsz) { in ossl_cipher_generic_block_final() 462 memcpy(out, ctx->buf, ctx->bufsz); in ossl_cipher_generic_block_final() 463 *outl = ctx->bufsz; in ossl_cipher_generic_block_final() [all …]
|
H A D | cipher_aes_ocb.c | 160 unsigned char *buf, size_t *bufsz, in aes_ocb_block_update_internal() argument 168 if (*bufsz != 0) in aes_ocb_block_update_internal() 169 nextblocks = ossl_cipher_fillblock(buf, bufsz, AES_BLOCK_SIZE, &in, &inl); in aes_ocb_block_update_internal() 173 if (*bufsz == AES_BLOCK_SIZE) { in aes_ocb_block_update_internal() 182 *bufsz = 0; in aes_ocb_block_update_internal() 201 && !ossl_cipher_trailingdata(buf, bufsz, AES_BLOCK_SIZE, &in, &inl)) { in aes_ocb_block_update_internal()
|
H A D | cipher_tdes_common.c | 88 ctx->bufsz = 0; in tdes_init()
|
H A D | cipher_des.c | 81 ctx->bufsz = 0; in des_init()
|
/openssl/include/internal/ |
H A D | sha3.h | 45 size_t bufsz; /* used bytes in below buffer */ member
|
/openssl/test/helpers/ |
H A D | quictestlib.c | 715 size_t i, bufsz = 0; in packet_plain_mutate() local 722 bufsz += iovecin[i].buf_len; in packet_plain_mutate() 724 fault->pplainio.buf_len = bufsz; in packet_plain_mutate() 727 bufsz += GROWTH_ALLOWANCE; in packet_plain_mutate() 729 fault->pplainio.buf = cur = OPENSSL_malloc(bufsz); in packet_plain_mutate() 735 fault->pplainbuf_alloc = bufsz; in packet_plain_mutate()
|
/openssl/providers/implementations/include/prov/ |
H A D | ciphercommon_gcm.h | 65 size_t bufsz; /* Number of bytes in buf */ member
|
H A D | ciphercommon.h | 67 size_t bufsz; /* Number of bytes in buf */ member
|
/openssl/test/ |
H A D | bio_dgram_test.c | 530 size_t bufsz; in test_bio_dgram_pair() local 536 bufsz = 9 * (mtu1 + (sizeof(BIO_ADDR) * 2) + sizeof(size_t)); in test_bio_dgram_pair() 537 if (!TEST_true(BIO_set_write_buf_size(bio1, bufsz))) in test_bio_dgram_pair()
|
H A D | sslapitest.c | 1140 const size_t bufsz = SSL3_RT_MAX_PLAIN_LENGTH + 16; in execute_test_ktls() local 1248 buf = OPENSSL_zalloc(bufsz); in execute_test_ktls() 1256 while ((ret = SSL_write(clientssl, buf, bufsz)) != (int)bufsz) { in execute_test_ktls() 1263 ret = SSL_read(serverssl, buf + offset, bufsz - offset); in execute_test_ktls() 1270 } while (offset < bufsz); in execute_test_ktls() 1272 if (!TEST_true(offset == bufsz)) in execute_test_ktls() 1274 for (i = 0; i < bufsz; i++) in execute_test_ktls()
|
/openssl/crypto/bn/asm/ |
H A D | vis3-mont.pl | 93 ($t0,$t1,$t2,$t3,$cnt,$tp,$bufsz,$anp)=map("%l$_",(0..7));
|
H A D | sparct4-mont.pl | 706 ($t0,$t1,$t2,$t3,$cnt,$tp,$bufsz)=map("%l$_",(0..7)); 950 ($t0,$t1,$t2,$t3,$cnt,$tp,$bufsz,$ccr)=map("%l$_",(0..7));
|