/openssl/providers/implementations/macs/ |
H A D | kmac_prov.c | 122 size_t out_len; member 251 dst->out_len = src->out_len; in kmac_dup() 312 size_t out_len, block_len; in kmac_init() local 388 *outl = kctx->out_len; in kmac_final() 489 kctx->out_len = sz; in kmac_set_ctx_params() 551 *out_len = len + 1; in right_encode() 566 *out_len = 0; in encode_string() 585 *out_len = sz; in encode_string() 607 if (out_len == NULL) { in bytepad() 636 if (out_len != NULL) in bytepad() [all …]
|
/openssl/demos/mac/ |
H A D | cmac-aes256.c | 73 size_t out_len = 0; in main() local 115 if (!EVP_MAC_final(mctx, NULL, &out_len, 0)) { in main() 119 out = OPENSSL_malloc(out_len); in main() 125 if (!EVP_MAC_final(mctx, out, &out_len, out_len)) { in main() 131 BIO_dump_indent_fp(stdout, out, out_len, 2); in main() 134 if (out_len != sizeof(expected_output)) { in main()
|
H A D | hmac-sha512.c | 84 size_t out_len = 0; in main() local 126 if (!EVP_MAC_final(mctx, NULL, &out_len, 0)) { in main() 130 out = OPENSSL_malloc(out_len); in main() 136 if (!EVP_MAC_final(mctx, out, &out_len, out_len)) { in main() 142 BIO_dump_indent_fp(stdout, out, out_len, 2); in main() 145 if (out_len != sizeof(expected_output)) { in main()
|
H A D | gmac.c | 66 size_t out_len = 0; in main() local 118 if (!EVP_MAC_final(mctx, out, &out_len, sizeof(out))) { in main() 124 BIO_dump_indent_fp(stdout, out, out_len, 2); in main() 127 if (out_len != sizeof(expected_output)) { in main()
|
H A D | siphash.c | 54 size_t out_len = 0; in main() local 102 if (!EVP_MAC_final(mctx, out, &out_len, sizeof(out))) { in main() 108 BIO_dump_indent_fp(stdout, out, out_len, 2); in main() 111 if (out_len != sizeof(expected_output)) { in main()
|
H A D | poly1305.c | 94 size_t out_len = 0; in main() local 180 if (!EVP_MAC_final(mctx, out, &out_len, sizeof(out))) { in main() 186 BIO_dump_indent_fp(stdout, out, out_len, 2); in main() 189 if (out_len != sizeof(expected_output)) { in main()
|
/openssl/providers/implementations/ciphers/ |
H A D | cipher_aes_gcm_siv_hw.c | 35 int out_len; in aes_gcm_siv_initkey() local 70 out_len = BLOCK_SIZE; in aes_gcm_siv_initkey() 71 if (!EVP_EncryptUpdate(ctx->ecb_ctx, output, &out_len, data.block, BLOCK_SIZE)) in aes_gcm_siv_initkey() 85 out_len = BLOCK_SIZE; in aes_gcm_siv_initkey() 157 int out_len; in aes_gcm_siv_encrypt() local 196 out_len = sizeof(ctx->tag); in aes_gcm_siv_encrypt() 197 error |= !EVP_EncryptUpdate(ctx->ecb_ctx, ctx->tag, &out_len, S_s, sizeof(S_s)); in aes_gcm_siv_encrypt() 218 int out_len; in aes_gcm_siv_decrypt() local 266 out_len = sizeof(ctx->tag); in aes_gcm_siv_decrypt() 338 int out_len; in aes_gcm_siv_ctr32() local [all …]
|
/openssl/providers/implementations/kdfs/ |
H A D | sskdf.c | 138 out_len = (size_t)hlen; in SSKDF_hash_kdm() 160 if (len >= out_len) { in SSKDF_hash_kdm() 163 out += out_len; in SSKDF_hash_kdm() 164 len -= out_len; in SSKDF_hash_kdm() 244 size_t counter, out_len, len; in SSKDF_mac_kdm() local 266 if (out_len <= 0 || (mac == mac_buf && out_len > sizeof(mac_buf))) in SSKDF_mac_kdm() 282 if (len >= out_len) { in SSKDF_mac_kdm() 285 out += out_len; in SSKDF_mac_kdm() 286 len -= out_len; in SSKDF_mac_kdm() 367 dest->out_len = src->out_len; in sskdf_dup() [all …]
|
H A D | x942kdf.c | 275 size_t counter, out_len, len = derived_key_len; in x942kdf_hash_kdm() local 291 out_len = (size_t)hlen; in x942kdf_hash_kdm() 312 if (len >= out_len) { in x942kdf_hash_kdm() 315 out += out_len; in x942kdf_hash_kdm() 316 len -= out_len; in x942kdf_hash_kdm() 414 static int x942kdf_set_buffer(unsigned char **out, size_t *out_len, in x942kdf_set_buffer() argument 422 return OSSL_PARAM_get_octet_string(p, (void **)out, 0, out_len); in x942kdf_set_buffer()
|
/openssl/crypto/modes/ |
H A D | siv128.c | 93 size_t out_len = sizeof(out->byte); in siv128_do_s2v_p() local 117 if (!EVP_MAC_final(mac_ctx, out->byte, &out_len, sizeof(out->byte)) in siv128_do_s2v_p() 118 || out_len != SIV_LEN) in siv128_do_s2v_p() 133 int out_len = (int)len; in siv128_do_encrypt() local 137 return EVP_EncryptUpdate(ctx, out, &out_len, in, out_len); in siv128_do_encrypt() 168 size_t out_len = SIV_LEN; in ossl_siv128_init() local 202 || !EVP_MAC_final(mac_ctx, ctx->d.byte, &out_len, in ossl_siv128_init() 250 size_t out_len = SIV_LEN; in ossl_siv128_aad() local 257 || !EVP_MAC_final(mac_ctx, mac_out.byte, &out_len, in ossl_siv128_aad() 259 || out_len != SIV_LEN) { in ossl_siv128_aad()
|
/openssl/crypto/bn/ |
H A D | rsaz_exp_x2.c | 44 static void to_words52(BN_ULONG *out, int out_len, const BN_ULONG *in, 539 static void to_words52(BN_ULONG *out, int out_len, 547 assert(out_len >= number_of_digits(in_bitsize, DIGIT_SIZE)); 560 out_len -= 2; 572 out_len -= 2; 576 out_len--; 579 memset(out, 0, out_len * sizeof(BN_ULONG)); 585 assert(out_len <= 8); 587 for (; out_len > 0; out_len--) { 600 int out_len = BITS2WORD64_SIZE(out_bitsize); [all …]
|
/openssl/doc/man3/ |
H A D | EVP_PKEY_gettable_params.pod | 25 size_t *out_len); 28 size_t *out_len); 65 If I<out_len> is not NULL, I<*out_len> is set to the length of the string 67 the terminating NUL byte can be obtained from I<*out_len> by calling the 72 If I<out_len> is not NULL, I<*out_len> is set to the length of the contents. 73 The required buffer size can be obtained from I<*out_len> by calling the 88 value. If I<out_len> is not NULL, I<*out_len> will be assigned the required
|
H A D | OSSL_SELF_TEST_new.pod | 120 unsigned int out_len = 0; 138 || !EVP_DigestFinal(ctx, out, &out_len)) 144 if (out_len != t->expected_len 145 || memcmp(out, t->expected, out_len) != 0)
|
/openssl/providers/fips/ |
H A D | self_test.c | 204 size_t out_len = 0; in integrity_self_test() local 220 || !EVP_MAC_final(ctx, out, &out_len, MAX_MD_SIZE)) in integrity_self_test() 226 if (out_len != sizeof(hmac_kat_digest) in integrity_self_test() 227 || memcmp(out, hmac_kat_digest, out_len) != 0) in integrity_self_test() 250 size_t bytes_read = 0, out_len = 0; in verify_integrity() local 280 if (!EVP_MAC_final(ctx, out, &out_len, sizeof(out))) in verify_integrity() 284 if (expected_len != out_len in verify_integrity() 285 || memcmp(expected, out, out_len) != 0) in verify_integrity()
|
/openssl/test/ |
H A D | bio_base64_test.c | 190 unsigned out_len; in test_bio_base64_run() local 211 out_len = t->bytes + 1024; in test_bio_base64_run() 212 out = OPENSSL_malloc(out_len); in test_bio_base64_run() 249 n = BIO_read(b64, out, out_len); in test_bio_base64_run() 255 n2 = BIO_read(b64, out + n, out_len - n); in test_bio_base64_run() 259 n = BIO_read(b64, out, out_len); in test_bio_base64_run() 271 if (n < (int) out_len) in test_bio_base64_run() 273 ret = BIO_read(b64, out + n, out_len - n); in test_bio_base64_run()
|
H A D | evp_pkey_dparams_test.c | 247 int ret, out_len; in params_bio_test() local 261 && TEST_int_gt(out_len = BIO_get_mem_data(out, &out_bin), 0) in params_bio_test() 264 out_bin, out_len); in params_bio_test()
|
H A D | acvp_test.c | 85 *out_len = sz; in pkey_get_bn_bytes() 876 int ret = 0, out_len = 0, len = 0; in cipher_enc() local 889 out_len += len; in cipher_enc() 890 if (!TEST_mem_eq(out, out_len, ct, ct_len)) in cipher_enc() 926 int out_len, len; in aes_ccm_enc_dec() local 953 out_len += len; in aes_ccm_enc_dec() 956 || !TEST_mem_eq(out, out_len, ct, ct_len) in aes_ccm_enc_dec() 1081 if (out_len != NULL) in aes_gcm_enc_dec() 1082 *out_len = olen; in aes_gcm_enc_dec() 1121 int out_len = 0; in aes_gcm_gen_iv_internal_test() local [all …]
|
/openssl/include/internal/ |
H A D | params.h | 23 unsigned char **out, size_t *out_len); 37 unsigned char **out, size_t *out_len,
|
H A D | quic_record_util.h | 32 unsigned char *out, size_t out_len);
|
/openssl/demos/encrypt/ |
H A D | rsa_encrypt.c | 98 unsigned char **out, size_t *out_len) in do_encrypt() argument 139 *out_len = buf_len; in do_encrypt() 155 unsigned char **out, size_t *out_len) in do_decrypt() argument 198 *out_len = buf_len; in do_decrypt()
|
/openssl/doc/man7/ |
H A D | EVP_KEYEXCH-ECDH.pod | 88 size_t out_len = sizeof(secret); 89 size_t secret_len = out_len; 102 &out_len);
|
H A D | EVP_MAC-KMAC.pod | 97 int xof_enabled, unsigned char *out, int out_len) 138 *p++ = OSSL_PARAM_construct_int(OSSL_MAC_PARAM_SIZE, &out_len); 146 if (!EVP_MAC_final(ctx, out, &l, out_len))
|
/openssl/test/testutil/ |
H A D | driver.c | 418 char *glue_strings(const char *list[], size_t *out_len) in glue_strings() argument 427 if (out_len != NULL) in glue_strings() 428 *out_len = len; in glue_strings()
|
/openssl/ssl/quic/ |
H A D | quic_record_util.c | 27 unsigned char *out, size_t out_len) in ossl_quic_hkdf_extract() argument 60 ret = EVP_KDF_derive(kctx, out, out_len, params); in ossl_quic_hkdf_extract()
|
/openssl/crypto/rsa/ |
H A D | rsa_sign.c | 258 static int encode_pkcs1(unsigned char **out, size_t *out_len, int type, in encode_pkcs1() argument 283 *out_len = dig_info_len; in encode_pkcs1()
|