/openssl-master/ssl/ |
A D | t1_trce.c | 46 if (msglen % vlen) in do_ssl_trace_list() 48 while (msglen) { in do_ssl_trace_list() 910 msglen -= 2; in ssl_print_extensions() 968 msglen -= 2; in ssl_print_client_hello() 986 msglen--; in ssl_print_client_hello() 996 msglen--; in ssl_print_client_hello() 1035 msglen -= 2; in ssl_print_server_hello() 1389 msglen -= 4; in ssl_print_ticket() 1417 if (msglen) in ssl_print_ticket() 1437 msglen -= 4; in ssl_print_handshake() [all …]
|
A D | d1_lib.c | 447 size_t fragoff, fraglen, msglen, reclen, align = 0; in DTLSv1_listen() local 587 || !PACKET_get_net_3_len(&msgpkt, &msglen) in DTLSv1_listen() 615 if (fragoff != 0 || fraglen > msglen) { in DTLSv1_listen()
|
/openssl-master/test/ |
A D | clienthellotest.c | 71 size_t msglen; in test_client_hello() local 200 msglen = PACKET_remaining(&pkt); in test_client_hello() 239 testresult = TEST_true(msglen == F5_WORKAROUND_MAX_MSG_LEN); in test_client_hello()
|
A D | curve448_internal_test.c | 586 size_t msglen) in dohash() argument 591 || !EVP_DigestUpdate(hashctx, msg, msglen) in dohash()
|
/openssl-master/crypto/crmf/ |
A D | crmf_pbm.c | 130 const unsigned char *msg, size_t msglen, in OSSL_CRMF_pbm_new() argument 209 msg, msglen, mac_res, EVP_MAX_MD_SIZE, outlen) == NULL) in OSSL_CRMF_pbm_new()
|
/openssl-master/doc/man3/ |
A D | OSSL_CRMF_pbmp_new.pod | 15 const unsigned char *msg, size_t msglen, 27 lengths I<msglen> and I<seclen>.
|
A D | EVP_EncryptInit.pod | 1627 if (!EVP_CipherUpdate(ctx, encrypted, &outlen, msg, msglen))
|
/openssl-master/ssl/statem/ |
A D | statem_dtls.c | 1269 size_t msglen; in dtls1_close_construct_packet() local 1272 || !WPACKET_get_length(pkt, &msglen) in dtls1_close_construct_packet() 1273 || msglen > INT_MAX) in dtls1_close_construct_packet() 1277 s->d1->w_msg_hdr.msg_len = msglen - DTLS1_HM_HEADER_LENGTH; in dtls1_close_construct_packet() 1278 s->d1->w_msg_hdr.frag_len = msglen - DTLS1_HM_HEADER_LENGTH; in dtls1_close_construct_packet() 1280 s->init_num = (int)msglen; in dtls1_close_construct_packet()
|
A D | statem_clnt.c | 3010 size_t msglen; in tls_construct_cke_gost() local 3085 msglen = 255; in tls_construct_cke_gost() 3086 if (EVP_PKEY_encrypt(pkey_ctx, tmp, &msglen, pms, pmslen) <= 0) { in tls_construct_cke_gost() 3092 || (msglen >= 0x80 && !WPACKET_put_bytes_u8(pkt, 0x81)) in tls_construct_cke_gost() 3093 || !WPACKET_sub_memcpy_u8(pkt, tmp, msglen)) { in tls_construct_cke_gost() 3159 size_t msglen; in tls_construct_cke_gost18() local 3219 msglen = 255; in tls_construct_cke_gost18() 3220 if (EVP_PKEY_encrypt(pkey_ctx, tmp, &msglen, pms, pmslen) <= 0) { in tls_construct_cke_gost18() 3225 if (!WPACKET_memcpy(pkt, tmp, msglen)) { in tls_construct_cke_gost18()
|
A D | statem_lib.c | 79 size_t msglen; in tls_close_construct_packet() local 82 || !WPACKET_get_length(pkt, &msglen) in tls_close_construct_packet() 83 || msglen > INT_MAX) in tls_close_construct_packet() 85 s->init_num = (int)msglen; in tls_close_construct_packet()
|
A D | extensions_clnt.c | 978 size_t reshashsize = 0, pskhashsize = 0, binderoffset, msglen; in tls_construct_ctos_psk() local 1139 || !WPACKET_get_total_written(pkt, &msglen) in tls_construct_ctos_psk() 1149 msgstart = WPACKET_get_curr(pkt) - msglen; in tls_construct_ctos_psk()
|
/openssl-master/test/helpers/ |
A D | ssltestlib.c | 119 int rem, i, content, reclen, msglen, fragoff, fraglen, epoch; in dump_data() local 159 msglen = (rec[MSG_LEN_HI] << 16) | (rec[MSG_LEN_MID] << 8) in dump_data() 161 printf("*** Message Length: %d\n", msglen); in dump_data() 172 if (fragoff + fraglen > msglen) in dump_data()
|
/openssl-master/include/openssl/ |
A D | crmf.h.in | 85 const unsigned char *msg, size_t msglen,
|