Home
last modified time | relevance | path

Searched refs:mlen (Results 1 – 18 of 18) sorted by relevance

/openssl/crypto/modes/
H A Dccm128.c41 const unsigned char *nonce, size_t nlen, size_t mlen) in CRYPTO_ccm128_setiv() argument
48 if (sizeof(mlen) == 8 && L >= 3) { in CRYPTO_ccm128_setiv()
49 ctx->nonce.c[8] = (u8)(mlen >> (56 % (sizeof(mlen) * 8))); in CRYPTO_ccm128_setiv()
50 ctx->nonce.c[9] = (u8)(mlen >> (48 % (sizeof(mlen) * 8))); in CRYPTO_ccm128_setiv()
51 ctx->nonce.c[10] = (u8)(mlen >> (40 % (sizeof(mlen) * 8))); in CRYPTO_ccm128_setiv()
52 ctx->nonce.c[11] = (u8)(mlen >> (32 % (sizeof(mlen) * 8))); in CRYPTO_ccm128_setiv()
56 ctx->nonce.c[12] = (u8)(mlen >> 24); in CRYPTO_ccm128_setiv()
57 ctx->nonce.c[13] = (u8)(mlen >> 16); in CRYPTO_ccm128_setiv()
58 ctx->nonce.c[14] = (u8)(mlen >> 8); in CRYPTO_ccm128_setiv()
59 ctx->nonce.c[15] = (u8)mlen; in CRYPTO_ccm128_setiv()
H A Dgcm128.c783 mlen += len; in CRYPTO_gcm128_encrypt()
784 if (mlen > ((U64(1) << 36) - 32) || (sizeof(len) == 8 && mlen < len)) in CRYPTO_gcm128_encrypt()
786 ctx->len.u[1] = mlen; in CRYPTO_gcm128_encrypt()
1008 mlen += len; in CRYPTO_gcm128_decrypt()
1009 if (mlen > ((U64(1) << 36) - 32) || (sizeof(len) == 8 && mlen < len)) in CRYPTO_gcm128_decrypt()
1011 ctx->len.u[1] = mlen; in CRYPTO_gcm128_decrypt()
1243 mlen += len; in CRYPTO_gcm128_encrypt_ctr32()
1244 if (mlen > ((U64(1) << 36) - 32) || (sizeof(len) == 8 && mlen < len)) in CRYPTO_gcm128_encrypt_ctr32()
1246 ctx->len.u[1] = mlen; in CRYPTO_gcm128_encrypt_ctr32()
1397 mlen += len; in CRYPTO_gcm128_decrypt_ctr32()
[all …]
/openssl/doc/designs/ddd/
H A Dddd-01-conn-blocking.c144 int l, mlen, res = 1; in main() local
152 mlen = snprintf(msg, sizeof(msg), in main()
167 l = tx(b, msg, mlen); in main()
168 if (l < mlen) { in main()
H A Dddd-03-fd-blocking.c139 int rc, fd = -1, l, mlen, res = 1; in main() local
151 mlen = snprintf(msg, sizeof(msg), in main()
193 l = tx(ssl, msg, mlen); in main()
194 if (l < mlen) { in main()
H A Dddd-06-mem-uv.c699 int mlen; variable
711 wr = app_write(conn, tx_msg, mlen, post_write_get, NULL); in post_connect()
712 if (wr < mlen) { in post_connect()
730 mlen = snprintf(tx_msg, sizeof(tx_msg), in main()
/openssl/crypto/rsa/
H A Drsa_oaep.c174 int i, dblen = 0, mlen = -1, one_index = 0, msg_index; in RSA_padding_check_PKCS1_OAEP_mgf1() local
294 mlen = dblen - msg_index; in RSA_padding_check_PKCS1_OAEP_mgf1()
299 good &= constant_time_ge(tlen, mlen); in RSA_padding_check_PKCS1_OAEP_mgf1()
314 mask = ~constant_time_eq(msg_index & (dblen - mdlen - 1 - mlen), 0); in RSA_padding_check_PKCS1_OAEP_mgf1()
319 mask = good & constant_time_lt(i, mlen); in RSA_padding_check_PKCS1_OAEP_mgf1()
340 return constant_time_select_int(good, mlen, -1); in RSA_padding_check_PKCS1_OAEP_mgf1()
H A Drsa_pk1.c179 int zero_index = 0, msg_index, mlen = -1; in RSA_padding_check_PKCS1_type_2() local
235 mlen = num - msg_index; in RSA_padding_check_PKCS1_type_2()
240 good &= constant_time_ge(tlen, mlen); in RSA_padding_check_PKCS1_type_2()
255 mask = ~constant_time_eq(msg_index & (num - RSA_PKCS1_PADDING_SIZE - mlen), 0); in RSA_padding_check_PKCS1_type_2()
260 mask = good & constant_time_lt(i, mlen); in RSA_padding_check_PKCS1_type_2()
275 return constant_time_select_int(good, mlen, -1); in RSA_padding_check_PKCS1_type_2()
/openssl/providers/implementations/ciphers/
H A Dcipher_aes_gcm_hw_vaes_avx512.inc149 u64 mlen = gcmctx->len.u[1];
151 mlen += len;
152 if (mlen > ((U64(1) << 36) - 32) || (mlen < len))
155 gcmctx->len.u[1] = mlen;
H A Dciphercommon_ccm_hw.c14 size_t nlen, size_t mlen) in ossl_ccm_generic_setiv() argument
16 return CRYPTO_ccm128_setiv(&ctx->ccm_ctx, nonce, nlen, mlen) == 0; in ossl_ccm_generic_setiv()
H A Dcipher_aes_gcm_hw_s390x.inc212 unsigned long long mlen;
221 mlen = kma->tpcl + len;
222 if (mlen > ((U64(1) << 36) - 32) || (sizeof(len) == 8 && mlen < len))
224 kma->tpcl = mlen;
H A Dciphercommon_ccm.c325 static int ccm_set_iv(PROV_CCM_CTX *ctx, size_t mlen) in ccm_set_iv() argument
329 if (!hw->setiv(ctx, ctx->iv, ccm_get_ivlen(ctx), mlen)) in ccm_set_iv()
H A Dcipher_aes_ccm_hw_s390x.inc35 size_t mlen)
40 sctx->ccm.s390x.nonce.g[1] = mlen;
/openssl/providers/implementations/include/prov/
H A Dciphercommon_ccm.h58 size_t mlen));
95 size_t nlen, size_t mlen);
/openssl/crypto/cms/
H A Dcms_sd.c1004 unsigned int mlen; in CMS_SignerInfo_verify_content() local
1024 if (EVP_DigestFinal_ex(mctx, mval, &mlen) <= 0) { in CMS_SignerInfo_verify_content()
1031 if (mlen != (unsigned int)os->length) { in CMS_SignerInfo_verify_content()
1036 if (memcmp(mval, os->data, mlen)) { in CMS_SignerInfo_verify_content()
1062 si->signature->length, mval, mlen); in CMS_SignerInfo_verify_content()
/openssl/include/openssl/
H A Dmodes.h145 size_t nlen, size_t mlen);
/openssl/ssl/statem/
H A Dstatem_dtls.c806 size_t mlen, frag_off, frag_len; in dtls_get_reassembled_message() local
865 mlen = msg_hdr.msg_len; in dtls_get_reassembled_message()
901 if (frag_len && frag_len < mlen) { in dtls_get_reassembled_message()
/openssl/crypto/evp/
H A De_aes.c1317 unsigned long long mlen; in s390x_aes_gcm() local
1325 mlen = ctx->kma.param.tpcl + len; in s390x_aes_gcm()
1326 if (mlen > ((U64(1) << 36) - 32) || (sizeof(len) == 8 && mlen < len)) in s390x_aes_gcm()
1328 ctx->kma.param.tpcl = mlen; in s390x_aes_gcm()
1792 size_t mlen) in s390x_aes_ccm_setiv() argument
1795 ctx->aes.ccm.nonce.g[1] = mlen; in s390x_aes_ccm_setiv()
/openssl/ssl/
H A Dt1_lib.c2378 size_t mlen; in tls_decrypt_ticket() local
2485 mlen = ssl_hmac_size(hctx); in tls_decrypt_ticket()
2486 if (mlen == 0) { in tls_decrypt_ticket()
2498 if (eticklen <= TLSEXT_KEYNAME_LENGTH + ivlen + mlen) { in tls_decrypt_ticket()
2502 eticklen -= mlen; in tls_decrypt_ticket()
2510 if (CRYPTO_memcmp(tick_hmac, etick + eticklen, mlen)) { in tls_decrypt_ticket()

Completed in 80 milliseconds