/crypto/fipsmodule/cmac/ |
A D | cmac_test.cc | 56 size_t out_len; in test() local 69 size_t out_len; in test() local 162 size_t out_len; in TEST() local 165 out_len = std::min(out_len, tag_len); in TEST() 168 EXPECT_EQ(Bytes(tag), Bytes(out, out_len)); in TEST() 176 out_len = std::min(out_len, tag_len); in TEST() 177 EXPECT_EQ(Bytes(tag), Bytes(out, out_len)); in TEST() 182 EXPECT_NE(Bytes(tag), Bytes(out, out_len)); in TEST() 224 size_t out_len; in RunCAVPTest() local 227 out_len = std::min(out_len, tag_len); in RunCAVPTest() [all …]
|
/crypto/rsa/ |
A D | rsa_crypt.cc | 206 *out_len = mlen; in RSA_padding_check_PKCS1_OAEP_mgf1() 306 *out_len = msg_len; in rsa_padding_check_PKCS1_type_2() 312 size_t out_len; in RSA_public_encrypt() local 322 return (int)out_len; in RSA_public_encrypt() 327 size_t out_len; in RSA_private_encrypt() local 337 return (int)out_len; in RSA_private_encrypt() 415 *out_len = rsa_size; in RSA_encrypt() 499 size_t out_len; in RSA_private_decrypt() local 508 return (int)out_len; in RSA_private_decrypt() 513 size_t out_len; in RSA_public_decrypt() local [all …]
|
/crypto/fipsmodule/cipher/ |
A D | cipher.cc.inc | 246 *out_len = 0; 286 *out_len = 0; 330 *out_len = 0; 340 *out_len = 0; 351 *out_len = b; 385 *out_len = 0; 408 *out_len -= b; 425 *out_len = 0; 448 *out_len = 0; 478 *out_len = n; [all …]
|
A D | aead.cc.inc | 114 size_t out_len) { 115 if (!buffers_alias(in, in_len, out, out_len)) { 122 int EVP_AEAD_CTX_seal(const EVP_AEAD_CTX *ctx, uint8_t *out, size_t *out_len, 145 *out_len = in_len + out_tag_len; 153 *out_len = 0; 192 int EVP_AEAD_CTX_open(const EVP_AEAD_CTX *ctx, uint8_t *out, size_t *out_len, 203 if (!ctx->aead->open(ctx, out, out_len, max_out_len, nonce, nonce_len, in, 226 *out_len = plaintext_len; 235 *out_len = 0; 270 size_t *out_len) { [all …]
|
/crypto/base64/ |
A D | base64.cc | 77 *out_len = len; in EVP_EncodedLength() 96 *out_len = 0; in EVP_EncodeUpdate() 135 *out_len = 0; in EVP_EncodeUpdate() 153 *out_len = (int)total; in EVP_EncodeUpdate() 158 *out_len = 0; in EVP_EncodeFinal() 170 *out_len = (int)encoded; in EVP_EncodeFinal() 300 *out_len = 0; in EVP_DecodeUpdate() 342 *out_len = 0; in EVP_DecodeUpdate() 355 *out_len = 0; in EVP_DecodeFinal() 365 *out_len = 0; in EVP_DecodeBase64() [all …]
|
A D | base64_test.cc | 227 int out_len; in TEST_P() local 228 EVP_EncodeUpdate(&ctx, out, &out_len, in TEST_P() 231 size_t total = out_len; in TEST_P() 234 total += out_len; in TEST_P() 243 int out_len; in TEST_P() local 249 total = out_len; in TEST_P() 251 total += out_len; in TEST_P() 279 size_t out_len = 0; in TEST_P() local 299 out_len += bytes_written; in TEST_P() 312 out_len += bytes_written; in TEST_P() [all …]
|
/crypto/fipsmodule/tls/ |
A D | kdf.cc.inc | 32 static int tls1_P_hash(uint8_t *out, size_t out_len, 63 (out_len > chunk && !HMAC_CTX_copy_ex(&ctx_tmp, &ctx)) || 74 if (len > out_len) { 75 len = out_len; 81 out_len -= len; 83 if (out_len == 0) { 104 uint8_t *out, size_t out_len, 109 if (out_len == 0) { 113 OPENSSL_memset(out, 0, out_len); 144 int CRYPTO_tls13_hkdf_expand_label(uint8_t *out, size_t out_len, [all …]
|
/crypto/bio/ |
A D | printf.cc | 27 int out_len, ret; in BIO_printf() local 30 out_len = vsnprintf(buf, sizeof(buf), format, args); in BIO_printf() 32 if (out_len < 0) { in BIO_printf() 36 if ((size_t)out_len >= sizeof(buf)) { in BIO_printf() 37 const size_t requested_len = (size_t)out_len; in BIO_printf() 46 out_len = vsnprintf(out, requested_len + 1, format, args); in BIO_printf() 48 assert(out_len == (int)requested_len); in BIO_printf() 53 ret = BIO_write(bio, out, out_len); in BIO_printf()
|
/crypto/ecdh/ |
A D | ecdh.cc | 29 int ECDH_compute_key(void *out, size_t out_len, const EC_POINT *pub_key, in ECDH_compute_key() argument 32 size_t *out_len)) { in ECDH_compute_key() argument 55 if (kdf(buf, buf_len, out, &out_len) == NULL) { in ECDH_compute_key() 61 if (buf_len < out_len) { in ECDH_compute_key() 62 out_len = buf_len; in ECDH_compute_key() 64 OPENSSL_memcpy(out, buf, out_len); in ECDH_compute_key() 67 if (out_len > INT_MAX) { in ECDH_compute_key() 72 return (int)out_len; in ECDH_compute_key()
|
/crypto/fipsmodule/hkdf/ |
A D | hkdf.cc.inc | 26 int HKDF(uint8_t *out_key, size_t out_len, const EVP_MD *digest, 35 !HKDF_expand(out_key, out_len, digest, prk, prk_len, info, info_len)) { 42 int HKDF_extract(uint8_t *out_key, size_t *out_len, const EVP_MD *digest, 54 *out_len = len; 55 assert(*out_len == EVP_MD_size(digest)); 59 int HKDF_expand(uint8_t *out_key, size_t out_len, const EVP_MD *digest, 71 n = (out_len + digest_len - 1) / digest_len; 72 if (out_len + digest_len < out_len || n > 255) { 97 if (todo > out_len - done) { 98 todo = out_len - done;
|
A D | hkdf_test.cc | 40 const size_t out_len; member 267 ASSERT_TRUE(HKDF_expand(buf, test->out_len, test->md_func(), prk, prk_len, in TEST() 269 EXPECT_EQ(Bytes(test->out, test->out_len), Bytes(buf, test->out_len)); in TEST() 271 ASSERT_TRUE(HKDF(buf, test->out_len, test->md_func(), test->ikm, in TEST() 274 EXPECT_EQ(Bytes(test->out, test->out_len), Bytes(buf, test->out_len)); in TEST() 344 size_t len = test->out_len; in TEST() 346 EXPECT_EQ(Bytes(test->out, test->out_len), Bytes(buf, len)); in TEST() 373 size_t len = test->out_len; in TEST() 375 EXPECT_EQ(Bytes(test->out, test->out_len), Bytes(buf, len)); in TEST()
|
/crypto/cipher/ |
A D | aead_test.cc | 209 size_t out_len; in TEST_P() local 213 out.resize(out_len); in TEST_P() 576 size_t out_len; in TEST_P() local 603 Bytes(in, out_len)); in TEST_P() 610 EXPECT_EQ(Bytes(kPlaintext), Bytes(in, out_len)); in TEST_P() 649 size_t out_len; in TEST_P() local 654 Bytes(out + 1, out_len)); in TEST_P() 884 size_t out_len; in TEST() local 897 ASSERT_EQ(out_len, kPlaintext.size()); in TEST() 926 size_t out_len; in RunWycheproofTestCase() local [all …]
|
/crypto/pkcs8/ |
A D | pkcs8.cc | 35 size_t *out_len) { in pkcs12_encode_password() argument 63 size_t out_len, uint8_t *out, const EVP_MD *md) { in pkcs12_key_gen() argument 129 while (out_len != 0) { in pkcs12_key_gen() 148 size_t todo = out_len < A_len ? out_len : A_len; in pkcs12_key_gen() 151 out_len -= todo; in pkcs12_key_gen() 152 if (out_len == 0) { in pkcs12_key_gen() 322 int pkcs8_pbe_decrypt(uint8_t **out, size_t *out_len, CBS *algorithm, in pkcs8_pbe_decrypt() argument 369 *out_len = n1 + n2; in pkcs8_pbe_decrypt() 391 size_t out_len; in PKCS8_parse_encrypted_private_key() local 392 if (!pkcs8_pbe_decrypt(&out, &out_len, &algorithm, pass, pass_len, in PKCS8_parse_encrypted_private_key() [all …]
|
/crypto/evp/ |
A D | p_ed25519_asn1.cc | 75 size_t *out_len) { in ed25519_get_priv_raw() argument 83 *out_len = 32; in ed25519_get_priv_raw() 87 if (*out_len < 32) { in ed25519_get_priv_raw() 94 *out_len = 32; in ed25519_get_priv_raw() 99 size_t *out_len) { in ed25519_get_pub_raw() argument 102 *out_len = 32; in ed25519_get_pub_raw() 106 if (*out_len < 32) { in ed25519_get_pub_raw() 112 *out_len = 32; in ed25519_get_pub_raw()
|
A D | p_x25519_asn1.cc | 73 size_t *out_len) { in x25519_get_priv_raw() argument 81 *out_len = 32; in x25519_get_priv_raw() 85 if (*out_len < 32) { in x25519_get_priv_raw() 91 *out_len = 32; in x25519_get_priv_raw() 96 size_t *out_len) { in x25519_get_pub_raw() argument 99 *out_len = 32; in x25519_get_pub_raw() 103 if (*out_len < 32) { in x25519_get_pub_raw() 109 *out_len = 32; in x25519_get_pub_raw()
|
A D | p_hkdf.cc | 101 static int pkey_hkdf_derive(EVP_PKEY_CTX *ctx, uint8_t *out, size_t *out_len) { in pkey_hkdf_derive() argument 114 *out_len = EVP_MD_size(hctx->md); in pkey_hkdf_derive() 123 return HKDF(out, *out_len, hctx->md, hctx->key, hctx->key_len, hctx->salt, in pkey_hkdf_derive() 127 if (*out_len < EVP_MD_size(hctx->md)) { in pkey_hkdf_derive() 131 return HKDF_extract(out, out_len, hctx->md, hctx->key, hctx->key_len, in pkey_hkdf_derive() 135 return HKDF_expand(out, *out_len, hctx->md, hctx->key, hctx->key_len, in pkey_hkdf_derive()
|
A D | p_rsa.cc | 109 unsigned out_len; in pkey_rsa_sign() local 112 if (!RSA_sign(EVP_MD_type(rctx->md), tbs, tbslen, sig, &out_len, rsa)) { in pkey_rsa_sign() 115 *siglen = out_len; in pkey_rsa_sign() 166 size_t *out_len, const uint8_t *sig, in pkey_rsa_verify_recover() argument 173 *out_len = key_len; in pkey_rsa_verify_recover() 177 if (*out_len < key_len) { in pkey_rsa_verify_recover() 183 return RSA_verify_raw(rsa, out_len, out, *out_len, sig, sig_len, in pkey_rsa_verify_recover() 220 *out_len = hash_len; in pkey_rsa_verify_recover()
|
A D | p_dh.cc | 73 static int pkey_dh_derive(EVP_PKEY_CTX *ctx, uint8_t *out, size_t *out_len) { in pkey_dh_derive() argument 94 *out_len = DH_size(our_key); in pkey_dh_derive() 98 if (*out_len < (size_t)DH_size(our_key)) { in pkey_dh_derive() 110 *out_len = (size_t)ret; in pkey_dh_derive()
|
/crypto/x509/ |
A D | a_sign.cc | 67 size_t out_len = EVP_PKEY_size(pkey); in ASN1_item_sign_ctx() local 68 if (out_len > INT_MAX) { in ASN1_item_sign_ctx() 73 out = reinterpret_cast<uint8_t *>(OPENSSL_malloc(out_len)); in ASN1_item_sign_ctx() 78 if (!EVP_DigestSign(ctx, out, &out_len, in, in_len)) { in ASN1_item_sign_ctx() 83 ASN1_STRING_set0(signature, out, (int)out_len); in ASN1_item_sign_ctx() 87 ret = (int)out_len; in ASN1_item_sign_ctx()
|
A D | x_x509a.cc | 95 const uint8_t *X509_alias_get0(const X509 *x, int *out_len) { in X509_alias_get0() argument 97 if (out_len != NULL) { in X509_alias_get0() 98 *out_len = alias != NULL ? alias->length : 0; in X509_alias_get0() 103 const uint8_t *X509_keyid_get0(const X509 *x, int *out_len) { in X509_keyid_get0() argument 105 if (out_len != NULL) { in X509_keyid_get0() 106 *out_len = keyid != NULL ? keyid->length : 0; in X509_keyid_get0()
|
/crypto/fipsmodule/bn/ |
A D | bytes.cc.inc | 22 void bn_big_endian_to_words(BN_ULONG *out, size_t out_len, const uint8_t *in, 26 BSSL_CHECK(in_len <= out_len * sizeof(BN_ULONG)); 33 out_len--; 44 out_len--; 48 OPENSSL_memset(out, 0, out_len * sizeof(BN_ULONG)); 144 void bn_words_to_big_endian(uint8_t *out, size_t out_len, const BN_ULONG *in, 147 declassify_assert(fits_in_bytes(in, in_len, out_len)); 153 if (out_len < num_bytes) { 154 num_bytes = out_len; 158 out[out_len - i - 1] = bytes[i]; [all …]
|
/crypto/fipsmodule/rand/ |
A D | ctrdrbg.cc.inc | 66 if (out_len > kMaxNumBits / 8 || input_len > (1u << 30)) { 87 CRYPTO_store_u32_be(s_ptr, (uint32_t)out_len); 134 while (temp_len < out_len) { 139 size_t to_copy = std::min(kAESOutLen, out_len - temp_len); 321 if (out_len > CTR_DRBG_MAX_GENERATE_LENGTH) { 360 while (out_len >= AES_BLOCK_SIZE) { 362 if (todo > out_len) { 363 todo = out_len; 375 out_len -= todo; 378 if (out_len > 0) { [all …]
|
/crypto/hpke/ |
A D | hpke.cc | 94 size_t *out_len, const uint8_t *salt, in hpke_labeled_extract() argument 112 size_t out_len, const uint8_t *prk, in hpke_labeled_expand() argument 119 CBB_add_u16(&labeled_info, out_len) && in hpke_labeled_expand() 124 HKDF_expand(out_key, out_len, hkdf_md, prk, prk_len, in hpke_labeled_expand() 136 uint8_t *out_key, size_t out_len, in dhkem_extract_and_expand() argument 442 size_t out_len; in p256() local 444 assert(out_len == P256_SHARED_KEY_LEN); in p256() 800 size_t *out_len, size_t max_out) { in EVP_HPKE_KEY_public_key() argument 806 *out_len = key->kem->public_key_len; in EVP_HPKE_KEY_public_key() 811 size_t *out_len, size_t max_out) { in EVP_HPKE_KEY_private_key() argument [all …]
|
/crypto/fipsmodule/aes/ |
A D | key_wrap.cc.inc | 131 int AES_wrap_key_padded(const AES_KEY *key, uint8_t *out, size_t *out_len, 136 *out_len = 0; 150 *out_len = AES_BLOCK_SIZE; 168 *out_len = ret; 173 int AES_unwrap_key_padded(const AES_KEY *key, uint8_t *out, size_t *out_len, 175 *out_len = 0; 203 *out_len = constant_time_select_w(ok, claimed_len, 0);
|
/crypto/trust_token/ |
A D | trust_token.cc | 262 TRUST_TOKEN_CLIENT *ctx, uint8_t **out, size_t *out_len, size_t count, in trust_token_client_begin_issuance_impl() argument 281 if (!CBB_finish(&request, out, out_len)) { in trust_token_client_begin_issuance_impl() 297 size_t *out_len, size_t count) { in TRUST_TOKEN_CLIENT_begin_issuance() argument 298 return trust_token_client_begin_issuance_impl(ctx, out, out_len, count, in TRUST_TOKEN_CLIENT_begin_issuance() 303 TRUST_TOKEN_CLIENT *ctx, uint8_t **out, size_t *out_len, size_t count, in TRUST_TOKEN_CLIENT_begin_issuance_over_message() argument 306 ctx, out, out_len, count, /*include_message=*/1, msg, msg_len); in TRUST_TOKEN_CLIENT_begin_issuance_over_message() 362 size_t *out_len, in TRUST_TOKEN_CLIENT_begin_redemption() argument 373 !CBB_finish(&request, out, out_len)) { in TRUST_TOKEN_CLIENT_begin_redemption() 520 size_t *out_len, size_t *out_tokens_issued, in TRUST_TOKEN_ISSUER_issue() argument 566 if (!CBB_finish(&response, out, out_len)) { in TRUST_TOKEN_ISSUER_issue()
|