/openssl/crypto/modes/ |
H A D | ccm128.c | 41 const unsigned char *nonce, size_t nlen, size_t mlen) in CRYPTO_ccm128_setiv() argument 48 if (sizeof(mlen) == 8 && L >= 3) { in CRYPTO_ccm128_setiv() 49 ctx->nonce.c[8] = (u8)(mlen >> (56 % (sizeof(mlen) * 8))); in CRYPTO_ccm128_setiv() 50 ctx->nonce.c[9] = (u8)(mlen >> (48 % (sizeof(mlen) * 8))); in CRYPTO_ccm128_setiv() 51 ctx->nonce.c[10] = (u8)(mlen >> (40 % (sizeof(mlen) * 8))); in CRYPTO_ccm128_setiv() 52 ctx->nonce.c[11] = (u8)(mlen >> (32 % (sizeof(mlen) * 8))); in CRYPTO_ccm128_setiv() 56 ctx->nonce.c[12] = (u8)(mlen >> 24); in CRYPTO_ccm128_setiv() 57 ctx->nonce.c[13] = (u8)(mlen >> 16); in CRYPTO_ccm128_setiv() 58 ctx->nonce.c[14] = (u8)(mlen >> 8); in CRYPTO_ccm128_setiv() 59 ctx->nonce.c[15] = (u8)mlen; in CRYPTO_ccm128_setiv()
|
H A D | gcm128.c | 783 mlen += len; in CRYPTO_gcm128_encrypt() 784 if (mlen > ((U64(1) << 36) - 32) || (sizeof(len) == 8 && mlen < len)) in CRYPTO_gcm128_encrypt() 786 ctx->len.u[1] = mlen; in CRYPTO_gcm128_encrypt() 1008 mlen += len; in CRYPTO_gcm128_decrypt() 1009 if (mlen > ((U64(1) << 36) - 32) || (sizeof(len) == 8 && mlen < len)) in CRYPTO_gcm128_decrypt() 1011 ctx->len.u[1] = mlen; in CRYPTO_gcm128_decrypt() 1243 mlen += len; in CRYPTO_gcm128_encrypt_ctr32() 1244 if (mlen > ((U64(1) << 36) - 32) || (sizeof(len) == 8 && mlen < len)) in CRYPTO_gcm128_encrypt_ctr32() 1246 ctx->len.u[1] = mlen; in CRYPTO_gcm128_encrypt_ctr32() 1397 mlen += len; in CRYPTO_gcm128_decrypt_ctr32() [all …]
|
/openssl/doc/designs/ddd/ |
H A D | ddd-01-conn-blocking.c | 144 int l, mlen, res = 1; in main() local 152 mlen = snprintf(msg, sizeof(msg), in main() 167 l = tx(b, msg, mlen); in main() 168 if (l < mlen) { in main()
|
H A D | ddd-03-fd-blocking.c | 139 int rc, fd = -1, l, mlen, res = 1; in main() local 151 mlen = snprintf(msg, sizeof(msg), in main() 193 l = tx(ssl, msg, mlen); in main() 194 if (l < mlen) { in main()
|
H A D | ddd-06-mem-uv.c | 699 int mlen; variable 711 wr = app_write(conn, tx_msg, mlen, post_write_get, NULL); in post_connect() 712 if (wr < mlen) { in post_connect() 730 mlen = snprintf(tx_msg, sizeof(tx_msg), in main()
|
/openssl/crypto/rsa/ |
H A D | rsa_oaep.c | 174 int i, dblen = 0, mlen = -1, one_index = 0, msg_index; in RSA_padding_check_PKCS1_OAEP_mgf1() local 294 mlen = dblen - msg_index; in RSA_padding_check_PKCS1_OAEP_mgf1() 299 good &= constant_time_ge(tlen, mlen); in RSA_padding_check_PKCS1_OAEP_mgf1() 314 mask = ~constant_time_eq(msg_index & (dblen - mdlen - 1 - mlen), 0); in RSA_padding_check_PKCS1_OAEP_mgf1() 319 mask = good & constant_time_lt(i, mlen); in RSA_padding_check_PKCS1_OAEP_mgf1() 340 return constant_time_select_int(good, mlen, -1); in RSA_padding_check_PKCS1_OAEP_mgf1()
|
H A D | rsa_pk1.c | 179 int zero_index = 0, msg_index, mlen = -1; in RSA_padding_check_PKCS1_type_2() local 235 mlen = num - msg_index; in RSA_padding_check_PKCS1_type_2() 240 good &= constant_time_ge(tlen, mlen); in RSA_padding_check_PKCS1_type_2() 255 mask = ~constant_time_eq(msg_index & (num - RSA_PKCS1_PADDING_SIZE - mlen), 0); in RSA_padding_check_PKCS1_type_2() 260 mask = good & constant_time_lt(i, mlen); in RSA_padding_check_PKCS1_type_2() 275 return constant_time_select_int(good, mlen, -1); in RSA_padding_check_PKCS1_type_2()
|
/openssl/providers/implementations/ciphers/ |
H A D | cipher_aes_gcm_hw_vaes_avx512.inc | 149 u64 mlen = gcmctx->len.u[1]; 151 mlen += len; 152 if (mlen > ((U64(1) << 36) - 32) || (mlen < len)) 155 gcmctx->len.u[1] = mlen;
|
H A D | ciphercommon_ccm_hw.c | 14 size_t nlen, size_t mlen) in ossl_ccm_generic_setiv() argument 16 return CRYPTO_ccm128_setiv(&ctx->ccm_ctx, nonce, nlen, mlen) == 0; in ossl_ccm_generic_setiv()
|
H A D | cipher_aes_gcm_hw_s390x.inc | 212 unsigned long long mlen; 221 mlen = kma->tpcl + len; 222 if (mlen > ((U64(1) << 36) - 32) || (sizeof(len) == 8 && mlen < len)) 224 kma->tpcl = mlen;
|
H A D | ciphercommon_ccm.c | 325 static int ccm_set_iv(PROV_CCM_CTX *ctx, size_t mlen) in ccm_set_iv() argument 329 if (!hw->setiv(ctx, ctx->iv, ccm_get_ivlen(ctx), mlen)) in ccm_set_iv()
|
H A D | cipher_aes_ccm_hw_s390x.inc | 35 size_t mlen) 40 sctx->ccm.s390x.nonce.g[1] = mlen;
|
/openssl/providers/implementations/include/prov/ |
H A D | ciphercommon_ccm.h | 58 size_t mlen)); 95 size_t nlen, size_t mlen);
|
/openssl/crypto/cms/ |
H A D | cms_sd.c | 1004 unsigned int mlen; in CMS_SignerInfo_verify_content() local 1024 if (EVP_DigestFinal_ex(mctx, mval, &mlen) <= 0) { in CMS_SignerInfo_verify_content() 1031 if (mlen != (unsigned int)os->length) { in CMS_SignerInfo_verify_content() 1036 if (memcmp(mval, os->data, mlen)) { in CMS_SignerInfo_verify_content() 1062 si->signature->length, mval, mlen); in CMS_SignerInfo_verify_content()
|
/openssl/include/openssl/ |
H A D | modes.h | 145 size_t nlen, size_t mlen);
|
/openssl/ssl/statem/ |
H A D | statem_dtls.c | 806 size_t mlen, frag_off, frag_len; in dtls_get_reassembled_message() local 865 mlen = msg_hdr.msg_len; in dtls_get_reassembled_message() 901 if (frag_len && frag_len < mlen) { in dtls_get_reassembled_message()
|
/openssl/crypto/evp/ |
H A D | e_aes.c | 1317 unsigned long long mlen; in s390x_aes_gcm() local 1325 mlen = ctx->kma.param.tpcl + len; in s390x_aes_gcm() 1326 if (mlen > ((U64(1) << 36) - 32) || (sizeof(len) == 8 && mlen < len)) in s390x_aes_gcm() 1328 ctx->kma.param.tpcl = mlen; in s390x_aes_gcm() 1792 size_t mlen) in s390x_aes_ccm_setiv() argument 1795 ctx->aes.ccm.nonce.g[1] = mlen; in s390x_aes_ccm_setiv()
|
/openssl/ssl/ |
H A D | t1_lib.c | 2378 size_t mlen; in tls_decrypt_ticket() local 2485 mlen = ssl_hmac_size(hctx); in tls_decrypt_ticket() 2486 if (mlen == 0) { in tls_decrypt_ticket() 2498 if (eticklen <= TLSEXT_KEYNAME_LENGTH + ivlen + mlen) { in tls_decrypt_ticket() 2502 eticklen -= mlen; in tls_decrypt_ticket() 2510 if (CRYPTO_memcmp(tick_hmac, etick + eticklen, mlen)) { in tls_decrypt_ticket()
|