| /src/crypto/external/apache2/openssl/dist/include/internal/ |
| packet_quic.h | 25 size_t enclen; local 30 enclen = ossl_quic_vlint_decode_len(*pkt->curr); 32 if (PACKET_remaining(pkt) < enclen) 36 packet_forward(pkt, enclen); 50 size_t enclen; local 55 enclen = ossl_quic_vlint_decode_len(*pkt->curr); 57 if (PACKET_remaining(pkt) < enclen) 63 *was_minimal = (enclen == ossl_quic_vlint_encode_len(*data)); 79 size_t enclen; local 84 enclen = ossl_quic_vlint_decode_len(*pkt->curr) [all...] |
| /src/crypto/external/bsd/libsaslc/dist/src/ |
| crypto.c | 65 size_t enclen; local 69 enclen = (((inlen + 2) / 3)) * 4; 70 r = calloc(enclen + 1, sizeof(*r)); 89 n = BIO_read(bio, r, (int)enclen);
|
| xsess.c | 455 size_t enclen; local 457 if (saslc__crypto_encode_base64(*out, *outlen, &enc, &enclen) 464 *outlen = enclen;
|
| /src/crypto/external/apache2/openssl/dist/test/ |
| x509aux.c | 45 long enclen; local 63 enclen = i2d(cert, NULL); 64 if (len != enclen) { 66 enclen, name, len); 75 enclen = i2d(cert, &bufp); 76 if (len != enclen) { 78 enclen, name, len); 82 enclen = (long)(bufp - buf); 83 if (enclen != len) { 94 reuse = d2i(NULL, &p, enclen); [all...] |
| packettest.c | 524 size_t enclen, len; member in struct:quic_test_case 551 : cases[i].enclen + cases[i].len))) 563 if (!TEST_ptr_eq(subpkt.curr, cases[i].buf + cases[i].enclen))
|
| evp_pkey_dhkem_test.c | 190 size_t enclen = sizeof(enc); local 202 && TEST_int_eq(EVP_PKEY_encapsulate(ctx, enc, &enclen, 214 size_t enclen = sizeof(enc); local 218 || !TEST_int_eq(EVP_PKEY_encapsulate(ctx, NULL, &enclen, 224 enclen--; 225 if (!TEST_int_eq(EVP_PKEY_encapsulate(ctx, enc, &enclen, sec, &seclen), 228 enclen++; 231 if (!TEST_int_eq(EVP_PKEY_encapsulate(ctx, enc, &enclen, sec, &seclen), 0)) 238 if (!TEST_int_eq(EVP_PKEY_decapsulate(ctx, sec, &seclen, enc, enclen), 0)) 241 /* incorrect enclen passed to decap * 634 size_t enclen = sizeof(enc); local 667 size_t enclen = sizeof(enc); local [all...] |
| hpke_test.c | 103 size_t enclen = sizeof(enc); local 152 if (!TEST_true(OSSL_HPKE_encap(sealctx, enc, &enclen, 156 if (!TEST_true(cmpkey(privE, enc, enclen))) 192 if (!TEST_true(OSSL_HPKE_decap(openctx, enc, enclen, privR, 1227 size_t enclen = sizeof(enc); local 1249 if (!TEST_true(OSSL_HPKE_encap(ctx, enc, &enclen, pub, publen, NULL, 0))) 1268 if (!TEST_true(OSSL_HPKE_decap(rctx, enc, enclen, privp, NULL, 0))) 1360 size_t enclen = 0; local 1388 enclen = OSSL_HPKE_get_public_encap_size(g_suite); 1389 if (!TEST_size_t_ne(enclen, 0) 1417 size_t enclen = sizeof(enc), smallenclen = sizeof(smallenc); local 1747 size_t enclen = sizeof(enc); local 1906 size_t enclen = sizeof(enc); local 1984 size_t enclen = sizeof(enc); local [all...] |
| /src/crypto/external/bsd/libsaslc/dist/test/ |
| t_crypto.c | 191 size_t enclen; local 196 base64_test_cases[i].len, &enc, &enclen);
|
| /src/crypto/external/bsd/openssl/dist/test/ |
| x509aux.c | 46 long enclen; local 64 enclen = i2d(cert, NULL); 65 if (len != enclen) { 67 enclen, name, len); 76 enclen = i2d(cert, &bufp); 77 if (len != enclen) { 79 enclen, name, len); 83 enclen = (long) (bufp - buf); 84 if (enclen != len) { 95 reuse = d2i(NULL, &p, enclen); [all...] |
| /src/crypto/external/bsd/openssl.old/dist/test/ |
| x509aux.c | 46 long enclen; local 64 enclen = i2d(cert, NULL); 65 if (len != enclen) { 67 enclen, name, len); 76 enclen = i2d(cert, &bufp); 77 if (len != enclen) { 79 enclen, name, len); 83 enclen = (long) (bufp - buf); 84 if (enclen != len) { 95 reuse = d2i(NULL, &p, enclen); [all...] |
| /src/usr.bin/mail/ |
| mime_header.c | 96 size_t enclen, dstlen; local 118 enclen = p - encword; /* length of encoded substring */ 131 declen = mime_rfc2047_decode(enctype, dstend, dstlen, encword, enclen);
|
| /src/usr.sbin/ldpd/ |
| ldp_command.c | 410 socklen_t enclen = sizeof(enc); local 443 &enc, &enclen) == 0) {
|
| /src/crypto/external/apache2/openssl/dist/crypto/ |
| packet.c | 542 size_t enclen = ossl_quic_vlint_encode_len(max_len); local 544 if (enclen == 0) 547 if (WPACKET_start_sub_packet_len__(pkt, enclen) == 0) 579 size_t enclen = ossl_quic_vlint_encode_len(v); local 581 if (enclen == 0) 584 if (WPACKET_allocate_bytes(pkt, enclen, &b) == 0)
|
| /src/crypto/external/apache2/openssl/dist/ssl/quic/ |
| quic_wire_pkt.c | 621 size_t len = 0, enclen; local 661 enclen = ossl_quic_vlint_encode_len(hdr->token_len); 662 if (!enclen) 665 len += enclen + hdr->token_len; 669 enclen = ossl_quic_vlint_encode_len(hdr->len + hdr->pn_len); 670 if (!enclen) 673 len += enclen;
|
| /src/crypto/external/apache2/openssl/dist/crypto/hpke/ |
| hpke.c | 387 * @param enclen points to what will be enc length 393 size_t *enclen, 400 if (cipherlen == NULL || enclen == NULL) { 409 *enclen = kem_info->Nenc; 443 * @param enclen is the size of enc on input, number of octets used on output 448 static int hpke_encap(OSSL_HPKE_CTX *ctx, unsigned char *enc, size_t *enclen, 458 if (ctx == NULL || enc == NULL || enclen == NULL || *enclen == 0 513 lenclen = *enclen; 518 if (lenclen > *enclen) { 1447 size_t enclen = 0; local 1457 size_t enclen = 0; local [all...] |
| /src/sys/dev/scsipi/ |
| ses.c | 1187 int s, e, enclen, off = 8; local 1196 gget8(buffer, off+3, enclen); 1201 e = off + enclen;
|
| /src/crypto/external/apache2/openssl/dist/ssl/statem/ |
| statem_clnt.c | 3108 size_t enclen; local 3153 || EVP_PKEY_encrypt(pctx, NULL, &enclen, pms, pmslen) <= 0) { 3157 if (!WPACKET_allocate_bytes(pkt, enclen, &encdata) 3158 || EVP_PKEY_encrypt(pctx, encdata, &enclen, pms, pmslen) <= 0) { 3172 if (!ssl_log_rsa_client_key_exchange(s, encdata, enclen, pms, pmslen)) {
|
| /src/crypto/external/bsd/openssl/dist/ssl/statem/ |
| statem_clnt.c | 2830 size_t enclen; local 2870 || EVP_PKEY_encrypt(pctx, NULL, &enclen, pms, pmslen) <= 0) { 2874 if (!WPACKET_allocate_bytes(pkt, enclen, &encdata) 2875 || EVP_PKEY_encrypt(pctx, encdata, &enclen, pms, pmslen) <= 0) { 2889 if (!ssl_log_rsa_client_key_exchange(s, encdata, enclen, pms, pmslen)) {
|
| /src/crypto/external/bsd/openssl.old/dist/ssl/statem/ |
| statem_clnt.c | 2976 size_t enclen; local 3021 || EVP_PKEY_encrypt(pctx, NULL, &enclen, pms, pmslen) <= 0) { 3026 if (!WPACKET_allocate_bytes(pkt, enclen, &encdata) 3027 || EVP_PKEY_encrypt(pctx, encdata, &enclen, pms, pmslen) <= 0) { 3043 if (!ssl_log_rsa_client_key_exchange(s, encdata, enclen, pms, pmslen)) {
|
| /src/crypto/external/bsd/openssh/dist/ |
| sshkey.c | 1590 size_t i, enclen = 0; local 1644 enclen = sshbuf_len(prvbuf); 1645 if ((enc = malloc(enclen)) == NULL) { 1654 sshbuf_dump_data(enc, enclen, stderr); 1668 k->shielded_len = enclen; 1672 enclen = 0; 1685 freezero(enc, enclen);
|