/openssl/test/ |
H A D | x509aux.c | 45 long enclen; in test_certs() local 63 enclen = i2d(cert, NULL); in test_certs() 64 if (len != enclen) { in test_certs() 75 enclen = i2d(cert, &bufp); in test_certs() 76 if (len != enclen) { in test_certs() 82 enclen = (long) (bufp - buf); in test_certs() 83 if (enclen != len) { in test_certs() 110 enclen = i2d(cert, &buf); in test_certs() 111 if (len != enclen) { in test_certs() 129 enclen = i2d(cert, &buf); in test_certs() [all …]
|
H A D | hpke_test.c | 103 size_t enclen = sizeof(enc); in do_testhpke() local 1134 size_t enclen = sizeof(enc); in test_hpke_export() local 1266 size_t enclen = 0; in test_hpke_grease() local 1651 size_t enclen = sizeof(enc); in test_hpke_random_suites() local 1660 enclen = 10; in test_hpke_random_suites() 1686 enclen = sizeof(enc); in test_hpke_random_suites() 1694 enclen = sizeof(enc); in test_hpke_random_suites() 1702 enclen = sizeof(enc); in test_hpke_random_suites() 1709 enclen = sizeof(enc); in test_hpke_random_suites() 1810 size_t enclen = sizeof(enc); in test_hpke_compressed() local [all …]
|
H A D | evp_pkey_dhkem_test.c | 189 size_t enclen = sizeof(enc); in test_ikm_small() local 201 && TEST_int_eq(EVP_PKEY_encapsulate(ctx, enc, &enclen, in test_ikm_small() 212 size_t enclen = sizeof(enc); in test_input_size_small() local 216 || !TEST_int_eq(EVP_PKEY_encapsulate(ctx, NULL, &enclen, in test_input_size_small() 221 enclen--; in test_input_size_small() 225 enclen++; in test_input_size_small() 239 enclen--; in test_input_size_small() 621 size_t enclen = sizeof(enc); in test_ec_badpublic() local 625 if (!TEST_int_eq(EVP_PKEY_encapsulate(ctx, enc , &enclen, in test_ec_badpublic() 653 size_t enclen = sizeof(enc); in test_ec_badauth() local [all …]
|
H A D | packettest.c | 525 size_t enclen, len; in test_PACKET_get_quic_length_prefixed() member 552 : cases[i].enclen + cases[i].len))) in test_PACKET_get_quic_length_prefixed() 564 if (!TEST_ptr_eq(subpkt.curr, cases[i].buf + cases[i].enclen)) in test_PACKET_get_quic_length_prefixed()
|
H A D | dhkem_test.inc | 656 size_t secretlen = 0, enclen = 0; 676 ret = TEST_int_eq(EVP_PKEY_encapsulate(sctx, NULL, &enclen, NULL, 678 && TEST_int_eq(EVP_PKEY_encapsulate(sctx, enc, &enclen, secret, 680 && TEST_mem_eq(enc, enclen, t->expected_enc, t->expected_enclen)
|
/openssl/include/internal/ |
H A D | packet_quic.h | 25 size_t enclen; in PACKET_get_quic_vlint() local 30 enclen = ossl_quic_vlint_decode_len(*pkt->curr); in PACKET_get_quic_vlint() 32 if (PACKET_remaining(pkt) < enclen) in PACKET_get_quic_vlint() 36 packet_forward(pkt, enclen); in PACKET_get_quic_vlint() 50 size_t enclen; in PACKET_peek_quic_vlint_ex() local 55 enclen = ossl_quic_vlint_decode_len(*pkt->curr); in PACKET_peek_quic_vlint_ex() 57 if (PACKET_remaining(pkt) < enclen) in PACKET_peek_quic_vlint_ex() 79 size_t enclen; in PACKET_skip_quic_vlint() local 84 enclen = ossl_quic_vlint_decode_len(*pkt->curr); in PACKET_skip_quic_vlint() 86 if (PACKET_remaining(pkt) < enclen) in PACKET_skip_quic_vlint() [all …]
|
/openssl/crypto/hpke/ |
H A D | hpke.c | 391 size_t *enclen, in hpke_expansion() argument 407 *enclen = kem_info->Nenc; in hpke_expansion() 456 if (ctx == NULL || enc == NULL || enclen == NULL || *enclen == 0 in hpke_encap() 510 lenclen = *enclen; in hpke_encap() 515 if (lenclen > *enclen) { in hpke_encap() 1064 if (ctx == NULL || enc == NULL || enclen == NULL || *enclen == 0 in OSSL_HPKE_encap() 1375 if (enc == NULL || enclen == 0 in OSSL_HPKE_get_grease_value() 1401 if (plen > *enclen) { in OSSL_HPKE_get_grease_value() 1434 size_t enclen = 0; in OSSL_HPKE_get_ciphertext_size() local 1444 size_t enclen = 0; in OSSL_HPKE_get_public_encap_size() local [all …]
|
/openssl/providers/implementations/kem/ |
H A D | ecx_kem.c | 546 unsigned char *enc, size_t *enclen, in dhkem_encap() argument 555 if (enclen == NULL && secretlen == NULL) in dhkem_encap() 557 if (enclen != NULL) in dhkem_encap() 558 *enclen = info->Nenc; in dhkem_encap() 568 if (*enclen < info->Nenc) { in dhkem_encap() 589 *enclen = info->Nenc; in dhkem_encap() 615 const unsigned char *enc, size_t enclen) in dhkem_decap() argument 631 if (enclen != info->Nenc) { in dhkem_decap() 637 sender_ephempubkey = ecxkey_pubfromdata(ctx, enc, enclen); in dhkem_decap()
|
H A D | ec_kem.c | 643 unsigned char *enc, size_t *enclen, in dhkem_encap() argument 654 if (enclen == NULL && secretlen == NULL) in dhkem_encap() 656 if (enclen != NULL) in dhkem_encap() 657 *enclen = info->Nenc; in dhkem_encap() 667 if (*enclen < info->Nenc) { in dhkem_encap() 696 *enclen = sender_publen; in dhkem_encap() 722 const unsigned char *enc, size_t enclen) in dhkem_decap() argument 740 if (enclen != encodedpublen) { in dhkem_decap() 745 sender_ephempubkey = eckey_frompub(ctx->recipient_key, enc, enclen); in dhkem_decap()
|
/openssl/include/openssl/ |
H A D | hpke.h | 113 unsigned char *enc, size_t *enclen, 126 const unsigned char *enc, size_t enclen, 157 unsigned char *enc, size_t *enclen,
|
/openssl/crypto/ |
H A D | packet.c | 541 size_t enclen = ossl_quic_vlint_encode_len(max_len); in WPACKET_start_quic_sub_packet_bound() local 543 if (enclen == 0) in WPACKET_start_quic_sub_packet_bound() 546 if (WPACKET_start_sub_packet_len__(pkt, enclen) == 0) in WPACKET_start_quic_sub_packet_bound() 578 size_t enclen = ossl_quic_vlint_encode_len(v); in WPACKET_quic_write_vlint() local 580 if (enclen == 0) in WPACKET_quic_write_vlint() 583 if (WPACKET_allocate_bytes(pkt, enclen, &b) == 0) in WPACKET_quic_write_vlint()
|
/openssl/ssl/quic/ |
H A D | quic_wire_pkt.c | 596 size_t len = 0, enclen; in ossl_quic_wire_get_encoded_pkt_hdr_len() local 636 enclen = ossl_quic_vlint_encode_len(hdr->token_len); in ossl_quic_wire_get_encoded_pkt_hdr_len() 637 if (!enclen) in ossl_quic_wire_get_encoded_pkt_hdr_len() 640 len += enclen + hdr->token_len; in ossl_quic_wire_get_encoded_pkt_hdr_len() 644 enclen = ossl_quic_vlint_encode_len(hdr->len + hdr->pn_len); in ossl_quic_wire_get_encoded_pkt_hdr_len() 645 if (!enclen) in ossl_quic_wire_get_encoded_pkt_hdr_len() 648 len += enclen; in ossl_quic_wire_get_encoded_pkt_hdr_len()
|
/openssl/doc/man3/ |
H A D | OSSL_HPKE_CTX_new.pod | 32 unsigned char *enc, size_t *enclen, 45 const unsigned char *enc, size_t enclen, 73 unsigned char *enc, size_t *enclen, 259 On input I<enclen> should contain the maximum size of the I<enc> buffer, and returns 260 the output size. An error will occur if the input I<enclen> is 499 size_t enclen = sizeof(enc); 524 if (OSSL_HPKE_encap(sctx, enc, &enclen, pub, publen, info, infolen) != 1) 534 if (OSSL_HPKE_decap(rctx, enc, enclen, priv, info, infolen) != 1)
|
/openssl/ssl/statem/ |
H A D | statem_clnt.c | 3068 size_t enclen; in tls_construct_cke_rsa() local 3113 || EVP_PKEY_encrypt(pctx, NULL, &enclen, pms, pmslen) <= 0) { in tls_construct_cke_rsa() 3117 if (!WPACKET_allocate_bytes(pkt, enclen, &encdata) in tls_construct_cke_rsa() 3118 || EVP_PKEY_encrypt(pctx, encdata, &enclen, pms, pmslen) <= 0) { in tls_construct_cke_rsa() 3132 if (!ssl_log_rsa_client_key_exchange(s, encdata, enclen, pms, pmslen)) { in tls_construct_cke_rsa()
|