HomeSort by: relevance | last modified time | path
    Searched defs:enclen (Results 1 - 20 of 20) sorted by relevancy

  /src/crypto/external/apache2/openssl/dist/include/internal/
packet_quic.h 25 size_t enclen; local
30 enclen = ossl_quic_vlint_decode_len(*pkt->curr);
32 if (PACKET_remaining(pkt) < enclen)
36 packet_forward(pkt, enclen);
50 size_t enclen; local
55 enclen = ossl_quic_vlint_decode_len(*pkt->curr);
57 if (PACKET_remaining(pkt) < enclen)
63 *was_minimal = (enclen == ossl_quic_vlint_encode_len(*data));
79 size_t enclen; local
84 enclen = ossl_quic_vlint_decode_len(*pkt->curr)
    [all...]
  /src/crypto/external/bsd/libsaslc/dist/src/
crypto.c 65 size_t enclen; local
69 enclen = (((inlen + 2) / 3)) * 4;
70 r = calloc(enclen + 1, sizeof(*r));
89 n = BIO_read(bio, r, (int)enclen);
xsess.c 455 size_t enclen; local
457 if (saslc__crypto_encode_base64(*out, *outlen, &enc, &enclen)
464 *outlen = enclen;
  /src/crypto/external/apache2/openssl/dist/test/
x509aux.c 45 long enclen; local
63 enclen = i2d(cert, NULL);
64 if (len != enclen) {
66 enclen, name, len);
75 enclen = i2d(cert, &bufp);
76 if (len != enclen) {
78 enclen, name, len);
82 enclen = (long)(bufp - buf);
83 if (enclen != len) {
94 reuse = d2i(NULL, &p, enclen);
    [all...]
packettest.c 524 size_t enclen, len; member in struct:quic_test_case
551 : cases[i].enclen + cases[i].len)))
563 if (!TEST_ptr_eq(subpkt.curr, cases[i].buf + cases[i].enclen))
evp_pkey_dhkem_test.c 190 size_t enclen = sizeof(enc); local
202 && TEST_int_eq(EVP_PKEY_encapsulate(ctx, enc, &enclen,
214 size_t enclen = sizeof(enc); local
218 || !TEST_int_eq(EVP_PKEY_encapsulate(ctx, NULL, &enclen,
224 enclen--;
225 if (!TEST_int_eq(EVP_PKEY_encapsulate(ctx, enc, &enclen, sec, &seclen),
228 enclen++;
231 if (!TEST_int_eq(EVP_PKEY_encapsulate(ctx, enc, &enclen, sec, &seclen), 0))
238 if (!TEST_int_eq(EVP_PKEY_decapsulate(ctx, sec, &seclen, enc, enclen), 0))
241 /* incorrect enclen passed to decap *
634 size_t enclen = sizeof(enc); local
667 size_t enclen = sizeof(enc); local
    [all...]
hpke_test.c 103 size_t enclen = sizeof(enc); local
152 if (!TEST_true(OSSL_HPKE_encap(sealctx, enc, &enclen,
156 if (!TEST_true(cmpkey(privE, enc, enclen)))
192 if (!TEST_true(OSSL_HPKE_decap(openctx, enc, enclen, privR,
1227 size_t enclen = sizeof(enc); local
1249 if (!TEST_true(OSSL_HPKE_encap(ctx, enc, &enclen, pub, publen, NULL, 0)))
1268 if (!TEST_true(OSSL_HPKE_decap(rctx, enc, enclen, privp, NULL, 0)))
1360 size_t enclen = 0; local
1388 enclen = OSSL_HPKE_get_public_encap_size(g_suite);
1389 if (!TEST_size_t_ne(enclen, 0)
1417 size_t enclen = sizeof(enc), smallenclen = sizeof(smallenc); local
1747 size_t enclen = sizeof(enc); local
1906 size_t enclen = sizeof(enc); local
1984 size_t enclen = sizeof(enc); local
    [all...]
  /src/crypto/external/bsd/libsaslc/dist/test/
t_crypto.c 191 size_t enclen; local
196 base64_test_cases[i].len, &enc, &enclen);
  /src/crypto/external/bsd/openssl/dist/test/
x509aux.c 46 long enclen; local
64 enclen = i2d(cert, NULL);
65 if (len != enclen) {
67 enclen, name, len);
76 enclen = i2d(cert, &bufp);
77 if (len != enclen) {
79 enclen, name, len);
83 enclen = (long) (bufp - buf);
84 if (enclen != len) {
95 reuse = d2i(NULL, &p, enclen);
    [all...]
  /src/crypto/external/bsd/openssl.old/dist/test/
x509aux.c 46 long enclen; local
64 enclen = i2d(cert, NULL);
65 if (len != enclen) {
67 enclen, name, len);
76 enclen = i2d(cert, &bufp);
77 if (len != enclen) {
79 enclen, name, len);
83 enclen = (long) (bufp - buf);
84 if (enclen != len) {
95 reuse = d2i(NULL, &p, enclen);
    [all...]
  /src/usr.bin/mail/
mime_header.c 96 size_t enclen, dstlen; local
118 enclen = p - encword; /* length of encoded substring */
131 declen = mime_rfc2047_decode(enctype, dstend, dstlen, encword, enclen);
  /src/usr.sbin/ldpd/
ldp_command.c 410 socklen_t enclen = sizeof(enc); local
443 &enc, &enclen) == 0) {
  /src/crypto/external/apache2/openssl/dist/crypto/
packet.c 542 size_t enclen = ossl_quic_vlint_encode_len(max_len); local
544 if (enclen == 0)
547 if (WPACKET_start_sub_packet_len__(pkt, enclen) == 0)
579 size_t enclen = ossl_quic_vlint_encode_len(v); local
581 if (enclen == 0)
584 if (WPACKET_allocate_bytes(pkt, enclen, &b) == 0)
  /src/crypto/external/apache2/openssl/dist/ssl/quic/
quic_wire_pkt.c 621 size_t len = 0, enclen; local
661 enclen = ossl_quic_vlint_encode_len(hdr->token_len);
662 if (!enclen)
665 len += enclen + hdr->token_len;
669 enclen = ossl_quic_vlint_encode_len(hdr->len + hdr->pn_len);
670 if (!enclen)
673 len += enclen;
  /src/crypto/external/apache2/openssl/dist/crypto/hpke/
hpke.c 387 * @param enclen points to what will be enc length
393 size_t *enclen,
400 if (cipherlen == NULL || enclen == NULL) {
409 *enclen = kem_info->Nenc;
443 * @param enclen is the size of enc on input, number of octets used on output
448 static int hpke_encap(OSSL_HPKE_CTX *ctx, unsigned char *enc, size_t *enclen,
458 if (ctx == NULL || enc == NULL || enclen == NULL || *enclen == 0
513 lenclen = *enclen;
518 if (lenclen > *enclen) {
1447 size_t enclen = 0; local
1457 size_t enclen = 0; local
    [all...]
  /src/sys/dev/scsipi/
ses.c 1187 int s, e, enclen, off = 8; local
1196 gget8(buffer, off+3, enclen);
1201 e = off + enclen;
  /src/crypto/external/apache2/openssl/dist/ssl/statem/
statem_clnt.c 3108 size_t enclen; local
3153 || EVP_PKEY_encrypt(pctx, NULL, &enclen, pms, pmslen) <= 0) {
3157 if (!WPACKET_allocate_bytes(pkt, enclen, &encdata)
3158 || EVP_PKEY_encrypt(pctx, encdata, &enclen, pms, pmslen) <= 0) {
3172 if (!ssl_log_rsa_client_key_exchange(s, encdata, enclen, pms, pmslen)) {
  /src/crypto/external/bsd/openssl/dist/ssl/statem/
statem_clnt.c 2830 size_t enclen; local
2870 || EVP_PKEY_encrypt(pctx, NULL, &enclen, pms, pmslen) <= 0) {
2874 if (!WPACKET_allocate_bytes(pkt, enclen, &encdata)
2875 || EVP_PKEY_encrypt(pctx, encdata, &enclen, pms, pmslen) <= 0) {
2889 if (!ssl_log_rsa_client_key_exchange(s, encdata, enclen, pms, pmslen)) {
  /src/crypto/external/bsd/openssl.old/dist/ssl/statem/
statem_clnt.c 2976 size_t enclen; local
3021 || EVP_PKEY_encrypt(pctx, NULL, &enclen, pms, pmslen) <= 0) {
3026 if (!WPACKET_allocate_bytes(pkt, enclen, &encdata)
3027 || EVP_PKEY_encrypt(pctx, encdata, &enclen, pms, pmslen) <= 0) {
3043 if (!ssl_log_rsa_client_key_exchange(s, encdata, enclen, pms, pmslen)) {
  /src/crypto/external/bsd/openssh/dist/
sshkey.c 1590 size_t i, enclen = 0; local
1644 enclen = sshbuf_len(prvbuf);
1645 if ((enc = malloc(enclen)) == NULL) {
1654 sshbuf_dump_data(enc, enclen, stderr);
1668 k->shielded_len = enclen;
1672 enclen = 0;
1685 freezero(enc, enclen);

Completed in 48 milliseconds