/openssl-master/crypto/modes/ |
A D | ccm128.c | 41 const unsigned char *nonce, size_t nlen, size_t mlen) in CRYPTO_ccm128_setiv() argument 48 if (sizeof(mlen) == 8 && L >= 3) { in CRYPTO_ccm128_setiv() 49 ctx->nonce.c[8] = (u8)(mlen >> (56 % (sizeof(mlen) * 8))); in CRYPTO_ccm128_setiv() 50 ctx->nonce.c[9] = (u8)(mlen >> (48 % (sizeof(mlen) * 8))); in CRYPTO_ccm128_setiv() 51 ctx->nonce.c[10] = (u8)(mlen >> (40 % (sizeof(mlen) * 8))); in CRYPTO_ccm128_setiv() 52 ctx->nonce.c[11] = (u8)(mlen >> (32 % (sizeof(mlen) * 8))); in CRYPTO_ccm128_setiv() 56 ctx->nonce.c[12] = (u8)(mlen >> 24); in CRYPTO_ccm128_setiv() 57 ctx->nonce.c[13] = (u8)(mlen >> 16); in CRYPTO_ccm128_setiv() 58 ctx->nonce.c[14] = (u8)(mlen >> 8); in CRYPTO_ccm128_setiv() 59 ctx->nonce.c[15] = (u8)mlen; in CRYPTO_ccm128_setiv()
|
A D | gcm128.c | 984 mlen += len; 985 if (mlen > ((U64(1) << 36) - 32) || (sizeof(len) == 8 && mlen < len)) 987 ctx->len.u[1] = mlen; 1216 mlen += len; 1217 if (mlen > ((U64(1) << 36) - 32) || (sizeof(len) == 8 && mlen < len)) 1219 ctx->len.u[1] = mlen; 1458 mlen += len; 1459 if (mlen > ((U64(1) << 36) - 32) || (sizeof(len) == 8 && mlen < len)) 1461 ctx->len.u[1] = mlen; 1619 mlen += len; [all …]
|
/openssl-master/crypto/rsa/ |
A D | rsa_pk1.c | 175 int zero_index = 0, msg_index, mlen = -1; in RSA_padding_check_PKCS1_type_2() local 233 mlen = num - msg_index; in RSA_padding_check_PKCS1_type_2() 238 good &= constant_time_ge(tlen, mlen); in RSA_padding_check_PKCS1_type_2() 253 mask = ~constant_time_eq(msg_index & (num - RSA_PKCS1_PADDING_SIZE - mlen), 0); in RSA_padding_check_PKCS1_type_2() 258 mask = good & constant_time_lt(i, mlen); in RSA_padding_check_PKCS1_type_2() 273 return constant_time_select_int(good, mlen, -1); in RSA_padding_check_PKCS1_type_2()
|
A D | rsa_oaep.c | 164 int i, dblen = 0, mlen = -1, one_index = 0, msg_index; in RSA_padding_check_PKCS1_OAEP_mgf1() local 276 mlen = dblen - msg_index; in RSA_padding_check_PKCS1_OAEP_mgf1() 281 good &= constant_time_ge(tlen, mlen); in RSA_padding_check_PKCS1_OAEP_mgf1() 296 mask = ~constant_time_eq(msg_index & (dblen - mdlen - 1 - mlen), 0); in RSA_padding_check_PKCS1_OAEP_mgf1() 301 mask = good & constant_time_lt(i, mlen); in RSA_padding_check_PKCS1_OAEP_mgf1() 322 return constant_time_select_int(good, mlen, -1); in RSA_padding_check_PKCS1_OAEP_mgf1()
|
/openssl-master/providers/implementations/ciphers/ |
A D | ciphercommon_ccm_hw.c | 14 size_t nlen, size_t mlen) in ossl_ccm_generic_setiv() argument 16 return CRYPTO_ccm128_setiv(&ctx->ccm_ctx, nonce, nlen, mlen) == 0; in ossl_ccm_generic_setiv()
|
A D | cipher_aes_gcm_hw_s390x.inc | 212 unsigned long long mlen; 221 mlen = kma->tpcl + len; 222 if (mlen > ((U64(1) << 36) - 32) || (sizeof(len) == 8 && mlen < len)) 224 kma->tpcl = mlen;
|
A D | ciphercommon_ccm.c | 322 static int ccm_set_iv(PROV_CCM_CTX *ctx, size_t mlen) in ccm_set_iv() argument 326 if (!hw->setiv(ctx, ctx->iv, ccm_get_ivlen(ctx), mlen)) in ccm_set_iv()
|
A D | cipher_aes_ccm_hw_s390x.inc | 35 size_t mlen) 40 sctx->ccm.s390x.nonce.g[1] = mlen;
|
/openssl-master/providers/implementations/include/prov/ |
A D | ciphercommon_ccm.h | 54 size_t mlen)); 91 size_t nlen, size_t mlen);
|
/openssl-master/crypto/cms/ |
A D | cms_sd.c | 946 unsigned int mlen; in CMS_SignerInfo_verify_content() local 966 if (EVP_DigestFinal_ex(mctx, mval, &mlen) <= 0) { in CMS_SignerInfo_verify_content() 974 if (mlen != (unsigned int)os->length) { in CMS_SignerInfo_verify_content() 979 if (memcmp(mval, os->data, mlen)) { in CMS_SignerInfo_verify_content() 1001 si->signature->length, mval, mlen); in CMS_SignerInfo_verify_content()
|
/openssl-master/ssl/statem/ |
A D | statem_dtls.c | 758 size_t mlen, frag_off, frag_len; in dtls_get_reassembled_message() local 811 mlen = msg_hdr.msg_len; in dtls_get_reassembled_message() 835 if (frag_len && frag_len < mlen) { in dtls_get_reassembled_message()
|
/openssl-master/include/openssl/ |
A D | modes.h | 145 size_t nlen, size_t mlen);
|
/openssl-master/ssl/ |
A D | t1_lib.c | 1785 size_t mlen; in tls_decrypt_ticket() local 1890 mlen = ssl_hmac_size(hctx); in tls_decrypt_ticket() 1891 if (mlen == 0) { in tls_decrypt_ticket() 1898 TLSEXT_KEYNAME_LENGTH + EVP_CIPHER_CTX_get_iv_length(ctx) + mlen) { in tls_decrypt_ticket() 1902 eticklen -= mlen; in tls_decrypt_ticket() 1910 if (CRYPTO_memcmp(tick_hmac, etick + eticklen, mlen)) { in tls_decrypt_ticket()
|
/openssl-master/crypto/evp/ |
A D | e_aes.c | 1233 unsigned long long mlen; in s390x_aes_gcm() local 1241 mlen = ctx->kma.param.tpcl + len; in s390x_aes_gcm() 1242 if (mlen > ((U64(1) << 36) - 32) || (sizeof(len) == 8 && mlen < len)) in s390x_aes_gcm() 1244 ctx->kma.param.tpcl = mlen; in s390x_aes_gcm() 1707 size_t mlen) in s390x_aes_ccm_setiv() argument 1710 ctx->aes.ccm.nonce.g[1] = mlen; in s390x_aes_ccm_setiv()
|