/openssl/crypto/asn1/ |
H A D | a_d2i_fp.c | 121 long slen; in asn1_d2i_read_bio() local 163 inf = ASN1_get_object(&q, &slen, &tag, &xclass, diff); in asn1_d2i_read_bio() 183 } else if (eos && (slen == 0) && (tag == V_ASN1_EOC)) { in asn1_d2i_read_bio() 192 want = slen; in asn1_d2i_read_bio() 233 if (off + slen < off) { in asn1_d2i_read_bio() 237 off += slen; in asn1_d2i_read_bio()
|
H A D | f_int.c | 57 int num = 0, slen = 0, first = 1; in a2i_ASN1_INTEGER() local 105 if (num + i > slen) { in a2i_ASN1_INTEGER() 106 sp = OPENSSL_clear_realloc(s, slen, num + i * 2); in a2i_ASN1_INTEGER() 112 slen = num + i * 2; in a2i_ASN1_INTEGER()
|
H A D | f_string.c | 51 int num = 0, slen = 0, first = 1; in a2i_ASN1_STRING() local 97 if (num + i > slen) { in a2i_ASN1_STRING() 104 slen = num + i * 2; in a2i_ASN1_STRING()
|
/openssl/crypto/crmf/ |
H A D | crmf_pbm.c | 39 OSSL_CRMF_PBMPARAMETER *OSSL_CRMF_pbmp_new(OSSL_LIB_CTX *libctx, size_t slen, in OSSL_CRMF_pbmp_new() argument 54 if ((salt = OPENSSL_malloc(slen)) == NULL) in OSSL_CRMF_pbmp_new() 56 if (RAND_bytes_ex(libctx, salt, slen, 0) <= 0) { in OSSL_CRMF_pbmp_new() 60 if (!ASN1_OCTET_STRING_set(pbm->salt, salt, (int)slen)) in OSSL_CRMF_pbmp_new()
|
/openssl/apps/lib/ |
H A D | vms_term_sock.c | 296 unsigned int slen; in CreateSocketPair() local 321 slen = sizeof(sin); in CreateSocketPair() 322 memset ((char *) &sin, 0, slen); in CreateSocketPair() 330 status = bind (SockDesc1, (struct sockaddr *) &sin, slen); in CreateSocketPair() 340 status = getsockname (SockDesc1, (struct sockaddr *) &sin, &slen); in CreateSocketPair()
|
/openssl/test/ |
H A D | bio_tfo_test.c | 203 socklen_t slen; in test_fd_tfo() local 273 slen = sizeof(sstorage); in test_fd_tfo() 274 if (!TEST_int_ge(getsockname(afd, (struct sockaddr *)&sstorage, &slen), 0)) in test_fd_tfo() 359 (struct sockaddr *)&sstorage, slen), 0)) { in test_fd_tfo()
|
H A D | bio_dgram_test.c | 26 size_t slen, tmplen; in compare_addr() local 34 slen = sizeof(xa); in compare_addr() 40 slen = sizeof(xa6); in compare_addr() 47 tmplen = slen; in compare_addr() 51 tmplen = slen; in compare_addr() 55 if (!TEST_mem_eq(pa, slen, pb, slen)) in compare_addr()
|
H A D | evp_pkey_dhkem_test.c | 297 size_t slen = sizeof(s); in test_ec_public_key_infinity() local 308 && TEST_int_eq(EVP_PKEY_encapsulate(keyctx, e, &elen, s, &slen), 0) in test_ec_public_key_infinity() 311 && TEST_int_eq(EVP_PKEY_decapsulate(keyctx, s, &slen, in test_ec_public_key_infinity() 316 && TEST_int_eq(EVP_PKEY_encapsulate(ctx, e, &elen, s, &slen), 0); in test_ec_public_key_infinity()
|
H A D | acvp_test.c | 236 size_t *rlen, size_t *slen) in get_ecdsa_sig_rs_bytes() argument 264 *slen = s1_len; in get_ecdsa_sig_rs_bytes() 279 size_t sig_len = 0, rlen = 0, slen = 0; in ecdsa_siggen_test() local 289 || !TEST_true(get_ecdsa_sig_rs_bytes(sig, sig_len, &r, &s, &rlen, &slen))) in ecdsa_siggen_test() 292 test_output_memory("s", s, slen); in ecdsa_siggen_test() 788 size_t sig_len = 0, rlen = 0, slen = 0; in dsa_siggen_test() local 799 || !TEST_true(get_dsa_sig_rs_bytes(sig, sig_len, &r, &s, &rlen, &slen))) in dsa_siggen_test() 802 test_output_memory("s", s, slen); in dsa_siggen_test()
|
H A D | json_test.c | 137 #define END_SCRIPT_EXPECTING(s, slen) \ argument 142 (s), (slen) \
|
H A D | evp_pkey_provided_test.c | 64 size_t slen; in compare_with_file() local 114 slen = len; in compare_with_file() 116 stripcr(memdata, &slen); in compare_with_file() 120 if (!TEST_mem_eq(memdata, slen, buf, readbytes)) in compare_with_file()
|
/openssl/providers/implementations/kdfs/ |
H A D | tls1_prf.c | 87 const unsigned char *sec, size_t slen, 550 const unsigned char *sec, size_t slen, in tls1_prf_alg() argument 559 size_t L_S1 = (slen + 1) / 2; in tls1_prf_alg() 569 if (!tls1_prf_P_hash(sha1ctx, sec + slen - L_S2, L_S2, in tls1_prf_alg() 581 if (!tls1_prf_P_hash(mdctx, sec, slen, seed, seed_len, out, olen)) in tls1_prf_alg()
|
/openssl/crypto/pem/ |
H A D | pem_pkey.c | 109 int slen; in pem_read_bio_key_legacy() local 174 } else if ((slen = ossl_pem_check_suffix(nm, "PRIVATE KEY")) > 0) { in pem_read_bio_key_legacy() 176 ameth = EVP_PKEY_asn1_find_str(NULL, nm, slen); in pem_read_bio_key_legacy() 186 && (slen = ossl_pem_check_suffix(nm, "PARAMETERS")) > 0) { in pem_read_bio_key_legacy() 191 if (!EVP_PKEY_set_type_str(ret, nm, slen) in pem_read_bio_key_legacy()
|
H A D | pem_lib.c | 135 int slen; in check_pem() local 141 slen = ossl_pem_check_suffix(nm, "PRIVATE KEY"); in check_pem() 142 if (slen > 0) { in check_pem() 147 ameth = EVP_PKEY_asn1_find_str(NULL, nm, slen); in check_pem() 155 int slen; in check_pem() local 157 slen = ossl_pem_check_suffix(nm, "PARAMETERS"); in check_pem() 158 if (slen > 0) { in check_pem() 160 ameth = EVP_PKEY_asn1_find_str(&e, nm, slen); in check_pem()
|
/openssl/ssl/ |
H A D | t1_enc.c | 31 const unsigned char *sec, size_t slen, in tls1_PRF() argument 62 (size_t)slen); in tls1_PRF() 329 size_t slen, unsigned char *out) in tls1_final_finish_mac() argument 348 if (!tls1_PRF(s, str, slen, hash, hashlen, NULL, 0, NULL, 0, NULL, 0, in tls1_final_finish_mac()
|
H A D | t1_lib.c | 2376 int slen, ivlen, renew_ticket = 0, declen; in tls_decrypt_ticket() local 2519 if (sdec == NULL || EVP_DecryptUpdate(ctx, sdec, &slen, p, in tls_decrypt_ticket() 2525 if (EVP_DecryptFinal(ctx, sdec + slen, &declen) <= 0) { in tls_decrypt_ticket() 2530 slen += declen; in tls_decrypt_ticket() 2533 sess = d2i_SSL_SESSION_ex(NULL, &p, slen, sctx->libctx, sctx->propq); in tls_decrypt_ticket() 2534 slen -= p - sdec; in tls_decrypt_ticket() 2538 if (slen != 0) { in tls_decrypt_ticket()
|
/openssl/engines/ |
H A D | e_capi.c | 854 DWORD slen; in capi_rsa_sign() local 919 slen = RSA_size(rsa); in capi_rsa_sign() 920 if (!CryptSignHash(hash, capi_key->keyspec, NULL, 0, sigret, &slen)) { in capi_rsa_sign() 927 for (i = 0; i < slen / 2; i++) { in capi_rsa_sign() 930 sigret[i] = sigret[slen - i - 1]; in capi_rsa_sign() 931 sigret[slen - i - 1] = c; in capi_rsa_sign() 933 *siglen = slen; in capi_rsa_sign() 1025 DWORD slen; in capi_dsa_do_sign() local 1062 slen = sizeof(csigbuf); in capi_dsa_do_sign() 1063 if (!CryptSignHash(hash, capi_key->keyspec, NULL, 0, csigbuf, &slen)) { in capi_dsa_do_sign()
|
H A D | e_loader_attic.c | 529 int slen; in try_decode_PrivateKey() local 532 if ((slen = check_suffix(pem_name, "PRIVATE KEY")) > 0 in try_decode_PrivateKey() 534 slen)) != NULL in try_decode_PrivateKey() 685 int slen; in try_decode_params() local 688 if ((slen = check_suffix(pem_name, "PARAMETERS")) > 0 in try_decode_params() 689 && (ameth = EVP_PKEY_asn1_find_str(NULL, pem_name, slen)) != NULL in try_decode_params()
|
/openssl/ssl/quic/ |
H A D | quic_trace.c | 41 static void put_str(BIO *bio, char *str, size_t slen) in put_str() argument 45 for (i = 0; i < slen; i++) in put_str()
|
/openssl/ssl/statem/ |
H A D | statem_lib.c | 613 size_t slen; in tls_construct_finished() local 639 slen = ssl->method->ssl3_enc->server_finished_label_len; in tls_construct_finished() 642 slen = ssl->method->ssl3_enc->client_finished_label_len; in tls_construct_finished() 646 sender, slen, in tls_construct_finished() 754 size_t slen; in ssl3_take_mac() local 759 slen = ssl->method->ssl3_enc->server_finished_label_len; in ssl3_take_mac() 762 slen = ssl->method->ssl3_enc->client_finished_label_len; in ssl3_take_mac() 766 ssl->method->ssl3_enc->final_finish_mac(s, sender, slen, in ssl3_take_mac()
|
H A D | statem_srvr.c | 3933 int len, slen_full, slen, lenfinal; in construct_stateless_ticket() local 3989 slen = i2d_SSL_SESSION(sess, NULL); in construct_stateless_ticket() 3990 if (slen == 0 || slen > slen_full) { in construct_stateless_ticket() 4094 || !WPACKET_reserve_bytes(pkt, slen + EVP_MAX_BLOCK_LENGTH, in construct_stateless_ticket() 4097 || !EVP_EncryptUpdate(ctx, encdata1, &len, senc, slen) in construct_stateless_ticket() 4103 || len + lenfinal > slen + EVP_MAX_BLOCK_LENGTH in construct_stateless_ticket()
|
/openssl/crypto/x509/ |
H A D | x_pubkey.c | 187 size_t slen = publen; in x509_pubkey_ex_d2i_ex() local 217 if (OSSL_DECODER_from_data(dctx, &p, &slen)) { in x509_pubkey_ex_d2i_ex() 218 if (slen != 0) { in x509_pubkey_ex_d2i_ex()
|
/openssl/apps/ |
H A D | req.c | 1456 size_t elen, slen; in check_end() local 1460 slen = strlen(str); in check_end() 1461 if (elen > slen) in check_end() 1463 tmp = str + slen - elen; in check_end()
|
/openssl/include/openssl/ |
H A D | crmf.h.in | 87 OSSL_CRMF_PBMPARAMETER *OSSL_CRMF_pbmp_new(OSSL_LIB_CTX *libctx, size_t slen,
|
/openssl/doc/man3/ |
H A D | ECDSA_SIG_new.pod | 99 sbn = BN_bin2bn(s, slen, NULL);
|