/openssl-master/crypto/ |
A D | params.c | 49 res.data_size = data_size; in ossl_param_construct() 354 switch (p->data_size) { in OSSL_PARAM_get_int32() 374 switch (p->data_size) { in OSSL_PARAM_get_int32() 394 switch (p->data_size) { in OSSL_PARAM_get_int32() 417 switch (p->data_size) { in OSSL_PARAM_set_int32() 433 switch (p->data_size) { in OSSL_PARAM_set_int32() 448 switch (p->data_size) { in OSSL_PARAM_set_int32() 474 switch (p->data_size) { in OSSL_PARAM_get_uint32() 493 switch (p->data_size) { in OSSL_PARAM_get_uint32() 512 switch (p->data_size) { in OSSL_PARAM_get_uint32() [all …]
|
A D | params_from_text.c | 82 if (p->data_size > 0) { in prepare_from_text() 83 if (buf_bits > p->data_size * 8 in prepare_from_text() 85 && buf_bits == p->data_size * 8)) { in prepare_from_text() 91 *buf_n = p->data_size; in prepare_from_text() 173 to->data_size = buf_n; in construct_from_text()
|
A D | params_dup.c | 55 last->data_size = secure_buffer_sz; in ossl_param_set_secure_block() 82 param_sz = in->data_size; in ossl_param_dup() 233 OPENSSL_secure_clear_free(p->data, p->data_size); in OSSL_PARAM_free()
|
A D | param_build_set.c | 76 if (sz > p->data_size) in ossl_param_build_set_bn_pad() 78 p->data_size = sz; in ossl_param_build_set_bn_pad()
|
/openssl-master/test/ |
A D | param_build_test.c | 75 || !TEST_size_t_eq(p->data_size, sizeof(int)) in template_public_test() 82 || !TEST_size_t_eq(p->data_size, sizeof(int32_t)) in template_public_test() 88 || !TEST_size_t_eq(p->data_size, sizeof(int64_t)) in template_public_test() 95 || !TEST_size_t_eq(p->data_size, sizeof(long int)) in template_public_test() 102 || !TEST_size_t_eq(p->data_size, sizeof(time_t)) in template_public_test() 110 || !TEST_size_t_eq(p->data_size, sizeof(double)) in template_public_test() 207 || !TEST_size_t_eq(p->data_size, sizeof(int)) in template_private_test() 215 || !TEST_size_t_eq(p->data_size, sizeof(int32_t)) in template_private_test() 222 || !TEST_size_t_eq(p->data_size, sizeof(int64_t)) in template_private_test() 238 || !TEST_size_t_eq(p->data_size, sizeof(size_t)) in template_private_test() [all …]
|
A D | params_test.c | 141 params->data_size, NULL))) in raw_set_params() 146 params->data_size))) in raw_set_params() 155 OPENSSL_strnlen(params->data, params->data_size); in raw_set_params() 164 obj->p6_l = params->data_size; in raw_set_params() 183 if (!TEST_size_t_ge(params->data_size, params->return_size)) in raw_get_params() 188 if (!TEST_size_t_gt(params->data_size, params->return_size)) in raw_get_params() 193 if (!TEST_size_t_gt(params->data_size, params->return_size)) in raw_get_params()
|
A D | params_api_test.c | 76 const int bit32 = param->data_size <= sizeof(int32_t); in test_param_type_extra() 77 const int sizet = param->data_size <= sizeof(size_t); in test_param_type_extra() 427 param.data_size = len; in test_param_bignum() 436 param.data_size = param.return_size; in test_param_bignum() 533 || !TEST_size_t_eq(cp->data_size, cp->return_size) in test_param_construct() 544 || !TEST_size_t_eq(cp->data_size, cp->return_size) in test_param_construct() 590 cp->data_size = cp->return_size; in test_param_construct() 610 cp->data_size = cp->return_size; in test_param_construct() 619 || !TEST_size_t_eq(cp->data_size, cp->return_size)) in test_param_construct() 622 cp->data_size = cp->return_size; in test_param_construct()
|
A D | p_test.c | 125 if (p->data_size >= buf_l) in p_get_params() 180 if (p->data_size >= sizeof(digestsuccess)) { in p_get_params() 196 if (p->data_size >= sizeof(stopsuccess)) { in p_get_params()
|
/openssl-master/providers/implementations/ciphers/ |
A D | ciphercommon_ccm.c | 83 if ((p->data_size & 1) || (p->data_size < 4) || p->data_size > 16) { in ossl_ccm_set_ctx_params() 93 memcpy(ctx->buf, p->data, p->data_size); in ossl_ccm_set_ctx_params() 96 ctx->m = p->data_size; in ossl_ccm_set_ctx_params() 121 sz = ccm_tls_init(ctx, p->data, p->data_size); in ossl_ccm_set_ctx_params() 135 if (ccm_tls_iv_set_fixed(ctx, p->data, p->data_size) == 0) { in ossl_ccm_set_ctx_params() 167 if (ccm_get_ivlen(ctx) > p->data_size) { in ossl_ccm_get_ctx_params() 171 if (!OSSL_PARAM_set_octet_string(p, ctx->iv, p->data_size) in ossl_ccm_get_ctx_params() 172 && !OSSL_PARAM_set_octet_ptr(p, &ctx->iv, p->data_size)) { in ossl_ccm_get_ctx_params() 180 if (ccm_get_ivlen(ctx) > p->data_size) { in ossl_ccm_get_ctx_params() 184 if (!OSSL_PARAM_set_octet_string(p, ctx->iv, p->data_size) in ossl_ccm_get_ctx_params() [all …]
|
A D | cipher_chacha20_poly1305.c | 119 if (p->data_size == 0 || p->data_size > POLY1305_BLOCK_SIZE) { in chacha20_poly1305_get_ctx_params() 123 memcpy(p->data, ctx->tag, p->data_size); in chacha20_poly1305_get_ctx_params() 185 if (p->data_size == 0 || p->data_size > POLY1305_BLOCK_SIZE) { in chacha20_poly1305_set_ctx_params() 194 memcpy(ctx->tag, p->data, p->data_size); in chacha20_poly1305_set_ctx_params() 196 ctx->tag_len = p->data_size; in chacha20_poly1305_set_ctx_params() 205 len = hw->tls_init(&ctx->base, p->data, p->data_size); in chacha20_poly1305_set_ctx_params() 219 if (hw->tls_iv_set_fixed(&ctx->base, p->data, p->data_size) == 0) { in chacha20_poly1305_set_ctx_params()
|
A D | ciphercommon_gcm.c | 166 if (ctx->ivlen > p->data_size) { in ossl_gcm_get_ctx_params() 181 if (ctx->ivlen > p->data_size) { in ossl_gcm_get_ctx_params() 199 sz = p->data_size; in ossl_gcm_get_ctx_params() 216 || !getivgen(ctx, p->data, p->data_size)) in ossl_gcm_get_ctx_params() 265 sz = gcm_tls_init(ctx, p->data, p->data_size); in ossl_gcm_set_ctx_params() 279 if (gcm_tls_iv_set_fixed(ctx, p->data, p->data_size) == 0) { in ossl_gcm_set_ctx_params() 288 || !setivinv(ctx, p->data, p->data_size)) in ossl_gcm_set_ctx_params()
|
A D | cipher_aes_ocb.c | 372 if (p->data_size > OCB_MAX_TAG_LEN) in aes_ocb_set_ctx_params() 374 ctx->taglen = p->data_size; in aes_ocb_set_ctx_params() 376 if (p->data_size != ctx->taglen || ctx->base.enc) in aes_ocb_set_ctx_params() 378 memcpy(ctx->tag, p->data, p->data_size); in aes_ocb_set_ctx_params() 433 if (ctx->base.ivlen > p->data_size) { in aes_ocb_get_ctx_params() 445 if (ctx->base.ivlen > p->data_size) { in aes_ocb_get_ctx_params() 461 if (!ctx->base.enc || p->data_size != ctx->taglen) { in aes_ocb_get_ctx_params()
|
A D | cipher_aes_cbc_hmac_sha.c | 106 hw->init_mac_key(ctx, p->data, p->data_size); in aes_set_ctx_params() 137 mb_param.len = p->data_size; in aes_set_ctx_params() 168 mb_param.len = pin->data_size; in aes_set_ctx_params() 180 if (hw->set_tls1_aad(ctx, p->data, p->data_size) <= 0) in aes_set_ctx_params()
|
A D | cipher_rc4_hmac_md5.c | 179 sz = GET_HW(ctx)->tls_init(&ctx->base, p->data, p->data_size); in rc4_hmac_md5_set_ctx_params() 192 GET_HW(ctx)->init_mackey(&ctx->base, p->data, p->data_size); in rc4_hmac_md5_set_ctx_params()
|
/openssl-master/apps/lib/ |
A D | app_params.c | 62 if (param->data_size == 0) in describe_param_type() 66 param->data_size); in describe_param_type() 124 BIO_printf(bio_out, "<%zu bytes>\n", p->data_size); in print_param_value() 128 p->data_type, p->data_size); in print_param_value()
|
/openssl-master/providers/implementations/macs/ |
A D | blake2_mac_impl.c | 210 && !blake2_setkey(macctx, p->data, p->data_size)) in blake2_mac_set_ctx_params() 219 if (p->data_size > BLAKE2_PERSONALBYTES) { in blake2_mac_set_ctx_params() 223 BLAKE2_PARAM_SET_PERSONAL(&macctx->params, p->data, p->data_size); in blake2_mac_set_ctx_params() 231 if (p->data_size > BLAKE2_SALTBYTES) { in blake2_mac_set_ctx_params() 235 BLAKE2_PARAM_SET_SALT(&macctx->params, p->data, p->data_size); in blake2_mac_set_ctx_params()
|
A D | hmac_prov.c | 68 size_t data_size, 332 macctx->key = OPENSSL_secure_malloc(p->data_size > 0 ? p->data_size : 1); in hmac_set_ctx_params() 335 memcpy(macctx->key, p->data, p->data_size); in hmac_set_ctx_params() 336 macctx->keylen = p->data_size; in hmac_set_ctx_params() 338 if (!HMAC_Init_ex(macctx->ctx, p->data, p->data_size, in hmac_set_ctx_params()
|
A D | gmac_prov.c | 228 || !gmac_setkey(macctx, p->data, p->data_size)) in gmac_set_ctx_params() 236 p->data_size, NULL) in gmac_set_ctx_params()
|
/openssl-master/doc/man3/ |
A D | OSSL_PARAM.pod | 16 size_t data_size; /* data size */ 99 =item I<data_size> 103 and I<data_size> is its size in bytes. 106 The I<data_size> needs special attention with the parameter type 116 In this case, I<data_size> is ignored. 120 If I<data_size> is zero, it means that an arbitrary data size is 128 In case the I<data_size> is an unsuitable size for the data, the 195 I<data_size> is not relevant. However, the I<responder> will set 221 I<data_size> is not relevant. However, the I<responder> will set 279 if the I<data_size> isn't a suitable size (even if I<data_size> is [all …]
|
/openssl-master/providers/implementations/keymgmt/ |
A D | mac_legacy_kmgmt.c | 197 key->priv_key = OPENSSL_secure_malloc(p->data_size > 0 ? p->data_size : 1); in mac_key_fromdata() 202 memcpy(key->priv_key, p->data, p->data_size); in mac_key_fromdata() 203 key->priv_key_len = p->data_size; in mac_key_fromdata() 432 gctx->priv_key = OPENSSL_secure_malloc(p->data_size); in mac_gen_set_params() 437 memcpy(gctx->priv_key, p->data, p->data_size); in mac_gen_set_params() 438 gctx->priv_key_len = p->data_size; in mac_gen_set_params()
|
/openssl-master/crypto/rsa/ |
A D | rsa_acvp_test_params.c | 48 d->data_size = p->data_size; in ossl_rsa_acvp_test_gen_params_new() 49 d->data = OPENSSL_memdup(p->data, p->data_size); in ossl_rsa_acvp_test_gen_params_new()
|
/openssl-master/providers/implementations/digests/ |
A D | md5_sha1_prov.c | 53 p->data_size, p->data); in md5_sha1_set_ctx_params()
|
/openssl-master/providers/implementations/kdfs/ |
A D | kbkdf.c | 271 if (p->data == NULL || p->data_size == 0) in kbkdf_set_buffer() 301 if (p != NULL && strncasecmp("counter", p->data, p->data_size) == 0) { in kbkdf_set_ctx_params() 304 && strncasecmp("feedback", p->data, p->data_size) == 0) { in kbkdf_set_ctx_params()
|
/openssl-master/ssl/ |
A D | s3_cbc.c | 41 size_t data_size, 163 size_t data_size, in ssl3_cbc_digest_record() argument 325 mac_end_offset = data_size + header_length; in ssl3_cbc_digest_record()
|
/openssl-master/include/openssl/ |
A D | core.h | 86 size_t data_size; /* data size */ member
|