| /src/crypto/external/apache2/openssl/dist/demos/encrypt/ |
| rsa_encrypt.c | 216 size_t encrypted_len = 0, decrypted_len = 0; local 220 if (!do_encrypt(libctx, msg, msg_len, &encrypted, &encrypted_len)) { 224 if (!do_decrypt(libctx, encrypted, encrypted_len,
|
| rsa_encrypt.c | 216 size_t encrypted_len = 0, decrypted_len = 0; local 220 if (!do_encrypt(libctx, msg, msg_len, &encrypted, &encrypted_len)) { 224 if (!do_decrypt(libctx, encrypted, encrypted_len,
|
| /src/external/bsd/wpa/dist/src/eap_common/ |
| ikev2_common.h | 311 size_t encrypted_len; member in struct:ikev2_payloads 322 const u8 *encrypted, size_t encrypted_len,
|
| ikev2_common.h | 311 size_t encrypted_len; member in struct:ikev2_payloads 322 const u8 *encrypted, size_t encrypted_len,
|
| /src/crypto/external/bsd/openssh/dist/ |
| sshkey.c | 2991 u_int blocksize, rounds, nkeys, encrypted_len, check1, check2; local 3019 (r = sshbuf_get_u32(decoded, &encrypted_len)) != 0) 3043 if (encrypted_len < blocksize || (encrypted_len % blocksize) != 0) { 3069 sshbuf_len(decoded) - authlen < encrypted_len) { 3075 if ((r = sshbuf_reserve(decrypted, encrypted_len, &dp)) != 0 || 3080 encrypted_len, 0, authlen)) != 0) { 3086 if ((r = sshbuf_consume(decoded, encrypted_len + authlen)) != 0)
|
| sshkey.c | 2991 u_int blocksize, rounds, nkeys, encrypted_len, check1, check2; local 3019 (r = sshbuf_get_u32(decoded, &encrypted_len)) != 0) 3043 if (encrypted_len < blocksize || (encrypted_len % blocksize) != 0) { 3069 sshbuf_len(decoded) - authlen < encrypted_len) { 3075 if ((r = sshbuf_reserve(decrypted, encrypted_len, &dp)) != 0 || 3080 encrypted_len, 0, authlen)) != 0) { 3086 if ((r = sshbuf_consume(decoded, encrypted_len + authlen)) != 0)
|
| /src/sys/net/ |
| if_wg.c | 2898 size_t encrypted_len, decrypted_len; local 2977 encrypted_len = mlen - sizeof(*wgmd); 2978 if (encrypted_len < WG_AUTHTAG_LEN) { 2979 WG_DLOG("Short encrypted_len: %zu\n", encrypted_len); 2982 success = m_ensure_contig(&m, sizeof(*wgmd) + encrypted_len); 2986 encrypted_buf = kmem_intr_alloc(encrypted_len, KM_NOSLEEP); 2991 m_copydata(m, sizeof(*wgmd), encrypted_len, encrypted_buf); 3003 decrypted_len = encrypted_len - WG_AUTHTAG_LEN; 3017 WG_DLOG("mlen=%zu, encrypted_len=%zu\n", mlen, encrypted_len) 4470 size_t inner_len, padded_len, encrypted_len; local [all...] |
| if_wg.c | 2898 size_t encrypted_len, decrypted_len; local 2977 encrypted_len = mlen - sizeof(*wgmd); 2978 if (encrypted_len < WG_AUTHTAG_LEN) { 2979 WG_DLOG("Short encrypted_len: %zu\n", encrypted_len); 2982 success = m_ensure_contig(&m, sizeof(*wgmd) + encrypted_len); 2986 encrypted_buf = kmem_intr_alloc(encrypted_len, KM_NOSLEEP); 2991 m_copydata(m, sizeof(*wgmd), encrypted_len, encrypted_buf); 3003 decrypted_len = encrypted_len - WG_AUTHTAG_LEN; 3017 WG_DLOG("mlen=%zu, encrypted_len=%zu\n", mlen, encrypted_len) 4470 size_t inner_len, padded_len, encrypted_len; local [all...] |