| /src/sys/external/isc/libsodium/dist/test/default/ |
| aead_aes256gcm.c | 3096 size_t ciphertext_len; local 3124 ciphertext_len = message_len + crypto_aead_aes256gcm_ABYTES; 3126 expected_ciphertext = (unsigned char *) sodium_malloc(ciphertext_len); 3135 ciphertext = (unsigned char *) sodium_malloc(ciphertext_len); 3148 hex = (char *) sodium_malloc((size_t) ciphertext_len * 2 + 1); 3149 sodium_bin2hex(hex, (size_t) ciphertext_len * 2 + 1, 3150 ciphertext, ciphertext_len); 3159 assert((size_t) found_ciphertext_len == ciphertext_len); 3160 if (memcmp(ciphertext, expected_ciphertext, ciphertext_len) != 0) { 3164 ciphertext, ciphertext_len); [all...] |
| /src/crypto/external/apache2/openssl/dist/include/crypto/ |
| sm2.h | 76 uint8_t *ciphertext_buf, size_t *ciphertext_len); 80 const uint8_t *ciphertext, size_t ciphertext_len,
|
| /src/crypto/external/bsd/openssl/dist/include/crypto/ |
| sm2.h | 76 uint8_t *ciphertext_buf, size_t *ciphertext_len); 80 const uint8_t *ciphertext, size_t ciphertext_len,
|
| /src/crypto/external/bsd/openssl.old/dist/include/crypto/ |
| sm2.h | 69 uint8_t *ciphertext_buf, size_t *ciphertext_len); 74 size_t ciphertext_len, uint8_t *ptext_buf, size_t *ptext_len);
|
| /src/crypto/external/apache2/openssl/dist/include/internal/ |
| quic_record_tx.h | 134 * Given the value ciphertext_len representing an encrypted packet payload 136 * Returns 0 if the specified EL is not provisioned or ciphertext_len is too 140 size_t ciphertext_len, 147 * provisioned. The result is written to *ciphertext_len. 151 size_t *ciphertext_len);
|
| /src/crypto/external/apache2/openssl/dist/crypto/sm2/ |
| sm2_crypt.c | 110 uint8_t *ciphertext_buf, size_t *ciphertext_len) 181 memset(ciphertext_buf, 0, *ciphertext_len); 257 *ciphertext_len = (size_t)ciphertext_leni; 277 const uint8_t *ciphertext, size_t ciphertext_len, 305 sm2_ctext = d2i_SM2_Ciphertext(NULL, &ciphertext, ciphertext_len);
|
| /src/crypto/external/bsd/openssl/dist/crypto/sm2/ |
| sm2_crypt.c | 123 uint8_t *ciphertext_buf, size_t *ciphertext_len) 192 memset(ciphertext_buf, 0, *ciphertext_len); 270 *ciphertext_len = (size_t)ciphertext_leni; 290 const uint8_t *ciphertext, size_t ciphertext_len, 318 sm2_ctext = d2i_SM2_Ciphertext(NULL, &ciphertext, ciphertext_len);
|
| /src/crypto/external/bsd/openssl.old/dist/crypto/sm2/ |
| sm2_crypt.c | 104 size_t msg_len, uint8_t *ciphertext_buf, size_t *ciphertext_len) 170 memset(ciphertext_buf, 0, *ciphertext_len); 237 *ciphertext_len = (size_t)ciphertext_leni; 257 size_t ciphertext_len, uint8_t *ptext_buf, size_t *ptext_len) 282 sm2_ctext = d2i_SM2_Ciphertext(NULL, &ciphertext, ciphertext_len);
|
| /src/crypto/external/apache2/openssl/dist/ssl/quic/ |
| quic_record_tx.c | 406 size_t *ciphertext_len) 413 *ciphertext_len = 0; 423 *ciphertext_len = plaintext_len + tag_len; 429 size_t ciphertext_len, 443 if (ciphertext_len <= tag_len) { 448 *plaintext_len = ciphertext_len - tag_len;
|
| quic_txp.c | 1755 size_t hdr_len, ciphertext_len; local 1771 &ciphertext_len)) 1774 pkt->phdr.len = ciphertext_len; 1779 pkt->geom.pkt_overhead = hdr_len + ciphertext_len - pkt->h.bytes_appended;
|
| /src/crypto/external/bsd/openssl.old/dist/test/ |
| evp_test.c | 481 size_t ciphertext_len; member in struct:cipher_data_st 545 return parse_bin(value, &cdat->ciphertext, &cdat->ciphertext_len); 591 out_len = expected->ciphertext_len; 594 in_len = expected->ciphertext_len;
|
| evp_extra_test.c | 965 int len, kek_len, ciphertext_len, plaintext_len; local 974 || !TEST_true(EVP_SealUpdate(ctx, ciphertext, &ciphertext_len, 976 || !TEST_true(EVP_SealFinal(ctx, ciphertext + ciphertext_len, 980 ciphertext_len += len; 984 ciphertext, ciphertext_len))
|
| /src/crypto/external/apache2/openssl/dist/test/ |
| evp_test.c | 892 size_t ciphertext_len; member in struct:cipher_data_st 1023 return parse_bin(value, &cdat->ciphertext, &cdat->ciphertext_len); 1108 out_len = expected->ciphertext_len; 1111 in_len = expected->ciphertext_len; 2149 size_t ciphertext_len; member in struct:kem_data_st 2209 return parse_bin(value, &kdata->ciphertext, &kdata->ciphertext_len); 2270 && !TEST_mem_eq(wrapped, wrappedlen, kdata->ciphertext, kdata->ciphertext_len)) {
|
| evp_extra_test.c | 1769 int len, kek_len, ciphertext_len, plaintext_len; local 1787 || !TEST_true(EVP_SealUpdate(ctx, ciphertext, &ciphertext_len, 1789 || !TEST_true(EVP_SealFinal(ctx, ciphertext + ciphertext_len, 1793 ciphertext_len += len; 1797 ciphertext, ciphertext_len))
|
| /src/crypto/external/bsd/openssh/dist/ |
| pkcs11.h | 1311 unsigned long *ciphertext_len)); 1341 unsigned long ciphertext_len,
|
| /src/crypto/external/bsd/openssl/dist/test/ |
| evp_test.c | 534 size_t ciphertext_len; member in struct:cipher_data_st 633 return parse_bin(value, &cdat->ciphertext, &cdat->ciphertext_len); 713 out_len = expected->ciphertext_len; 716 in_len = expected->ciphertext_len;
|
| evp_extra_test.c | 1298 int len, kek_len, ciphertext_len, plaintext_len; local 1316 || !TEST_true(EVP_SealUpdate(ctx, ciphertext, &ciphertext_len, 1318 || !TEST_true(EVP_SealFinal(ctx, ciphertext + ciphertext_len, 1322 ciphertext_len += len; 1326 ciphertext, ciphertext_len))
|