Home
last modified time | relevance | path

Searched refs:out_len (Results 1 – 25 of 86) sorted by relevance

1234

/crypto/fipsmodule/cmac/
A Dcmac_test.cc56 size_t out_len; in test() local
69 size_t out_len; in test() local
162 size_t out_len; in TEST() local
165 out_len = std::min(out_len, tag_len); in TEST()
168 EXPECT_EQ(Bytes(tag), Bytes(out, out_len)); in TEST()
176 out_len = std::min(out_len, tag_len); in TEST()
177 EXPECT_EQ(Bytes(tag), Bytes(out, out_len)); in TEST()
182 EXPECT_NE(Bytes(tag), Bytes(out, out_len)); in TEST()
224 size_t out_len; in RunCAVPTest() local
227 out_len = std::min(out_len, tag_len); in RunCAVPTest()
[all …]
/crypto/rsa/
A Drsa_crypt.cc206 *out_len = mlen; in RSA_padding_check_PKCS1_OAEP_mgf1()
306 *out_len = msg_len; in rsa_padding_check_PKCS1_type_2()
312 size_t out_len; in RSA_public_encrypt() local
322 return (int)out_len; in RSA_public_encrypt()
327 size_t out_len; in RSA_private_encrypt() local
337 return (int)out_len; in RSA_private_encrypt()
415 *out_len = rsa_size; in RSA_encrypt()
499 size_t out_len; in RSA_private_decrypt() local
508 return (int)out_len; in RSA_private_decrypt()
513 size_t out_len; in RSA_public_decrypt() local
[all …]
/crypto/fipsmodule/cipher/
A Dcipher.cc.inc246 *out_len = 0;
286 *out_len = 0;
330 *out_len = 0;
340 *out_len = 0;
351 *out_len = b;
385 *out_len = 0;
408 *out_len -= b;
425 *out_len = 0;
448 *out_len = 0;
478 *out_len = n;
[all …]
A Daead.cc.inc114 size_t out_len) {
115 if (!buffers_alias(in, in_len, out, out_len)) {
122 int EVP_AEAD_CTX_seal(const EVP_AEAD_CTX *ctx, uint8_t *out, size_t *out_len,
145 *out_len = in_len + out_tag_len;
153 *out_len = 0;
192 int EVP_AEAD_CTX_open(const EVP_AEAD_CTX *ctx, uint8_t *out, size_t *out_len,
203 if (!ctx->aead->open(ctx, out, out_len, max_out_len, nonce, nonce_len, in,
226 *out_len = plaintext_len;
235 *out_len = 0;
270 size_t *out_len) {
[all …]
/crypto/base64/
A Dbase64.cc77 *out_len = len; in EVP_EncodedLength()
96 *out_len = 0; in EVP_EncodeUpdate()
135 *out_len = 0; in EVP_EncodeUpdate()
153 *out_len = (int)total; in EVP_EncodeUpdate()
158 *out_len = 0; in EVP_EncodeFinal()
170 *out_len = (int)encoded; in EVP_EncodeFinal()
300 *out_len = 0; in EVP_DecodeUpdate()
342 *out_len = 0; in EVP_DecodeUpdate()
355 *out_len = 0; in EVP_DecodeFinal()
365 *out_len = 0; in EVP_DecodeBase64()
[all …]
A Dbase64_test.cc227 int out_len; in TEST_P() local
228 EVP_EncodeUpdate(&ctx, out, &out_len, in TEST_P()
231 size_t total = out_len; in TEST_P()
234 total += out_len; in TEST_P()
243 int out_len; in TEST_P() local
249 total = out_len; in TEST_P()
251 total += out_len; in TEST_P()
279 size_t out_len = 0; in TEST_P() local
299 out_len += bytes_written; in TEST_P()
312 out_len += bytes_written; in TEST_P()
[all …]
/crypto/fipsmodule/tls/
A Dkdf.cc.inc32 static int tls1_P_hash(uint8_t *out, size_t out_len,
63 (out_len > chunk && !HMAC_CTX_copy_ex(&ctx_tmp, &ctx)) ||
74 if (len > out_len) {
75 len = out_len;
81 out_len -= len;
83 if (out_len == 0) {
104 uint8_t *out, size_t out_len,
109 if (out_len == 0) {
113 OPENSSL_memset(out, 0, out_len);
144 int CRYPTO_tls13_hkdf_expand_label(uint8_t *out, size_t out_len,
[all …]
/crypto/bio/
A Dprintf.cc27 int out_len, ret; in BIO_printf() local
30 out_len = vsnprintf(buf, sizeof(buf), format, args); in BIO_printf()
32 if (out_len < 0) { in BIO_printf()
36 if ((size_t)out_len >= sizeof(buf)) { in BIO_printf()
37 const size_t requested_len = (size_t)out_len; in BIO_printf()
46 out_len = vsnprintf(out, requested_len + 1, format, args); in BIO_printf()
48 assert(out_len == (int)requested_len); in BIO_printf()
53 ret = BIO_write(bio, out, out_len); in BIO_printf()
/crypto/ecdh/
A Decdh.cc29 int ECDH_compute_key(void *out, size_t out_len, const EC_POINT *pub_key, in ECDH_compute_key() argument
32 size_t *out_len)) { in ECDH_compute_key() argument
55 if (kdf(buf, buf_len, out, &out_len) == NULL) { in ECDH_compute_key()
61 if (buf_len < out_len) { in ECDH_compute_key()
62 out_len = buf_len; in ECDH_compute_key()
64 OPENSSL_memcpy(out, buf, out_len); in ECDH_compute_key()
67 if (out_len > INT_MAX) { in ECDH_compute_key()
72 return (int)out_len; in ECDH_compute_key()
/crypto/fipsmodule/hkdf/
A Dhkdf.cc.inc26 int HKDF(uint8_t *out_key, size_t out_len, const EVP_MD *digest,
35 !HKDF_expand(out_key, out_len, digest, prk, prk_len, info, info_len)) {
42 int HKDF_extract(uint8_t *out_key, size_t *out_len, const EVP_MD *digest,
54 *out_len = len;
55 assert(*out_len == EVP_MD_size(digest));
59 int HKDF_expand(uint8_t *out_key, size_t out_len, const EVP_MD *digest,
71 n = (out_len + digest_len - 1) / digest_len;
72 if (out_len + digest_len < out_len || n > 255) {
97 if (todo > out_len - done) {
98 todo = out_len - done;
A Dhkdf_test.cc40 const size_t out_len; member
267 ASSERT_TRUE(HKDF_expand(buf, test->out_len, test->md_func(), prk, prk_len, in TEST()
269 EXPECT_EQ(Bytes(test->out, test->out_len), Bytes(buf, test->out_len)); in TEST()
271 ASSERT_TRUE(HKDF(buf, test->out_len, test->md_func(), test->ikm, in TEST()
274 EXPECT_EQ(Bytes(test->out, test->out_len), Bytes(buf, test->out_len)); in TEST()
344 size_t len = test->out_len; in TEST()
346 EXPECT_EQ(Bytes(test->out, test->out_len), Bytes(buf, len)); in TEST()
373 size_t len = test->out_len; in TEST()
375 EXPECT_EQ(Bytes(test->out, test->out_len), Bytes(buf, len)); in TEST()
/crypto/cipher/
A Daead_test.cc209 size_t out_len; in TEST_P() local
213 out.resize(out_len); in TEST_P()
576 size_t out_len; in TEST_P() local
603 Bytes(in, out_len)); in TEST_P()
610 EXPECT_EQ(Bytes(kPlaintext), Bytes(in, out_len)); in TEST_P()
649 size_t out_len; in TEST_P() local
654 Bytes(out + 1, out_len)); in TEST_P()
884 size_t out_len; in TEST() local
897 ASSERT_EQ(out_len, kPlaintext.size()); in TEST()
926 size_t out_len; in RunWycheproofTestCase() local
[all …]
/crypto/pkcs8/
A Dpkcs8.cc35 size_t *out_len) { in pkcs12_encode_password() argument
63 size_t out_len, uint8_t *out, const EVP_MD *md) { in pkcs12_key_gen() argument
129 while (out_len != 0) { in pkcs12_key_gen()
148 size_t todo = out_len < A_len ? out_len : A_len; in pkcs12_key_gen()
151 out_len -= todo; in pkcs12_key_gen()
152 if (out_len == 0) { in pkcs12_key_gen()
322 int pkcs8_pbe_decrypt(uint8_t **out, size_t *out_len, CBS *algorithm, in pkcs8_pbe_decrypt() argument
369 *out_len = n1 + n2; in pkcs8_pbe_decrypt()
391 size_t out_len; in PKCS8_parse_encrypted_private_key() local
392 if (!pkcs8_pbe_decrypt(&out, &out_len, &algorithm, pass, pass_len, in PKCS8_parse_encrypted_private_key()
[all …]
/crypto/evp/
A Dp_ed25519_asn1.cc75 size_t *out_len) { in ed25519_get_priv_raw() argument
83 *out_len = 32; in ed25519_get_priv_raw()
87 if (*out_len < 32) { in ed25519_get_priv_raw()
94 *out_len = 32; in ed25519_get_priv_raw()
99 size_t *out_len) { in ed25519_get_pub_raw() argument
102 *out_len = 32; in ed25519_get_pub_raw()
106 if (*out_len < 32) { in ed25519_get_pub_raw()
112 *out_len = 32; in ed25519_get_pub_raw()
A Dp_x25519_asn1.cc73 size_t *out_len) { in x25519_get_priv_raw() argument
81 *out_len = 32; in x25519_get_priv_raw()
85 if (*out_len < 32) { in x25519_get_priv_raw()
91 *out_len = 32; in x25519_get_priv_raw()
96 size_t *out_len) { in x25519_get_pub_raw() argument
99 *out_len = 32; in x25519_get_pub_raw()
103 if (*out_len < 32) { in x25519_get_pub_raw()
109 *out_len = 32; in x25519_get_pub_raw()
A Dp_hkdf.cc101 static int pkey_hkdf_derive(EVP_PKEY_CTX *ctx, uint8_t *out, size_t *out_len) { in pkey_hkdf_derive() argument
114 *out_len = EVP_MD_size(hctx->md); in pkey_hkdf_derive()
123 return HKDF(out, *out_len, hctx->md, hctx->key, hctx->key_len, hctx->salt, in pkey_hkdf_derive()
127 if (*out_len < EVP_MD_size(hctx->md)) { in pkey_hkdf_derive()
131 return HKDF_extract(out, out_len, hctx->md, hctx->key, hctx->key_len, in pkey_hkdf_derive()
135 return HKDF_expand(out, *out_len, hctx->md, hctx->key, hctx->key_len, in pkey_hkdf_derive()
A Dp_rsa.cc109 unsigned out_len; in pkey_rsa_sign() local
112 if (!RSA_sign(EVP_MD_type(rctx->md), tbs, tbslen, sig, &out_len, rsa)) { in pkey_rsa_sign()
115 *siglen = out_len; in pkey_rsa_sign()
166 size_t *out_len, const uint8_t *sig, in pkey_rsa_verify_recover() argument
173 *out_len = key_len; in pkey_rsa_verify_recover()
177 if (*out_len < key_len) { in pkey_rsa_verify_recover()
183 return RSA_verify_raw(rsa, out_len, out, *out_len, sig, sig_len, in pkey_rsa_verify_recover()
220 *out_len = hash_len; in pkey_rsa_verify_recover()
A Dp_dh.cc73 static int pkey_dh_derive(EVP_PKEY_CTX *ctx, uint8_t *out, size_t *out_len) { in pkey_dh_derive() argument
94 *out_len = DH_size(our_key); in pkey_dh_derive()
98 if (*out_len < (size_t)DH_size(our_key)) { in pkey_dh_derive()
110 *out_len = (size_t)ret; in pkey_dh_derive()
/crypto/x509/
A Da_sign.cc67 size_t out_len = EVP_PKEY_size(pkey); in ASN1_item_sign_ctx() local
68 if (out_len > INT_MAX) { in ASN1_item_sign_ctx()
73 out = reinterpret_cast<uint8_t *>(OPENSSL_malloc(out_len)); in ASN1_item_sign_ctx()
78 if (!EVP_DigestSign(ctx, out, &out_len, in, in_len)) { in ASN1_item_sign_ctx()
83 ASN1_STRING_set0(signature, out, (int)out_len); in ASN1_item_sign_ctx()
87 ret = (int)out_len; in ASN1_item_sign_ctx()
A Dx_x509a.cc95 const uint8_t *X509_alias_get0(const X509 *x, int *out_len) { in X509_alias_get0() argument
97 if (out_len != NULL) { in X509_alias_get0()
98 *out_len = alias != NULL ? alias->length : 0; in X509_alias_get0()
103 const uint8_t *X509_keyid_get0(const X509 *x, int *out_len) { in X509_keyid_get0() argument
105 if (out_len != NULL) { in X509_keyid_get0()
106 *out_len = keyid != NULL ? keyid->length : 0; in X509_keyid_get0()
/crypto/fipsmodule/bn/
A Dbytes.cc.inc22 void bn_big_endian_to_words(BN_ULONG *out, size_t out_len, const uint8_t *in,
26 BSSL_CHECK(in_len <= out_len * sizeof(BN_ULONG));
33 out_len--;
44 out_len--;
48 OPENSSL_memset(out, 0, out_len * sizeof(BN_ULONG));
144 void bn_words_to_big_endian(uint8_t *out, size_t out_len, const BN_ULONG *in,
147 declassify_assert(fits_in_bytes(in, in_len, out_len));
153 if (out_len < num_bytes) {
154 num_bytes = out_len;
158 out[out_len - i - 1] = bytes[i];
[all …]
/crypto/fipsmodule/rand/
A Dctrdrbg.cc.inc66 if (out_len > kMaxNumBits / 8 || input_len > (1u << 30)) {
87 CRYPTO_store_u32_be(s_ptr, (uint32_t)out_len);
134 while (temp_len < out_len) {
139 size_t to_copy = std::min(kAESOutLen, out_len - temp_len);
321 if (out_len > CTR_DRBG_MAX_GENERATE_LENGTH) {
360 while (out_len >= AES_BLOCK_SIZE) {
362 if (todo > out_len) {
363 todo = out_len;
375 out_len -= todo;
378 if (out_len > 0) {
[all …]
/crypto/hpke/
A Dhpke.cc94 size_t *out_len, const uint8_t *salt, in hpke_labeled_extract() argument
112 size_t out_len, const uint8_t *prk, in hpke_labeled_expand() argument
119 CBB_add_u16(&labeled_info, out_len) && in hpke_labeled_expand()
124 HKDF_expand(out_key, out_len, hkdf_md, prk, prk_len, in hpke_labeled_expand()
136 uint8_t *out_key, size_t out_len, in dhkem_extract_and_expand() argument
442 size_t out_len; in p256() local
444 assert(out_len == P256_SHARED_KEY_LEN); in p256()
800 size_t *out_len, size_t max_out) { in EVP_HPKE_KEY_public_key() argument
806 *out_len = key->kem->public_key_len; in EVP_HPKE_KEY_public_key()
811 size_t *out_len, size_t max_out) { in EVP_HPKE_KEY_private_key() argument
[all …]
/crypto/fipsmodule/aes/
A Dkey_wrap.cc.inc131 int AES_wrap_key_padded(const AES_KEY *key, uint8_t *out, size_t *out_len,
136 *out_len = 0;
150 *out_len = AES_BLOCK_SIZE;
168 *out_len = ret;
173 int AES_unwrap_key_padded(const AES_KEY *key, uint8_t *out, size_t *out_len,
175 *out_len = 0;
203 *out_len = constant_time_select_w(ok, claimed_len, 0);
/crypto/trust_token/
A Dtrust_token.cc262 TRUST_TOKEN_CLIENT *ctx, uint8_t **out, size_t *out_len, size_t count, in trust_token_client_begin_issuance_impl() argument
281 if (!CBB_finish(&request, out, out_len)) { in trust_token_client_begin_issuance_impl()
297 size_t *out_len, size_t count) { in TRUST_TOKEN_CLIENT_begin_issuance() argument
298 return trust_token_client_begin_issuance_impl(ctx, out, out_len, count, in TRUST_TOKEN_CLIENT_begin_issuance()
303 TRUST_TOKEN_CLIENT *ctx, uint8_t **out, size_t *out_len, size_t count, in TRUST_TOKEN_CLIENT_begin_issuance_over_message() argument
306 ctx, out, out_len, count, /*include_message=*/1, msg, msg_len); in TRUST_TOKEN_CLIENT_begin_issuance_over_message()
362 size_t *out_len, in TRUST_TOKEN_CLIENT_begin_redemption() argument
373 !CBB_finish(&request, out, out_len)) { in TRUST_TOKEN_CLIENT_begin_redemption()
520 size_t *out_len, size_t *out_tokens_issued, in TRUST_TOKEN_ISSUER_issue() argument
566 if (!CBB_finish(&response, out, out_len)) { in TRUST_TOKEN_ISSUER_issue()

Completed in 38 milliseconds

1234