Searched refs:slen (Results 1 – 10 of 10) sorted by relevance
| /crypto/asn1/ |
| A D | a_d2i_fp.c | 120 long slen; in asn1_d2i_read_bio() local 164 inf = ASN1_get_object(&q, &slen, &tag, &xclass, (int)diff); in asn1_d2i_read_bio() 183 } else if (eos && (slen == 0) && (tag == V_ASN1_EOC)) { in asn1_d2i_read_bio() 192 want = slen; in asn1_d2i_read_bio() 234 if (off + slen < off) { in asn1_d2i_read_bio() 238 off += slen; in asn1_d2i_read_bio()
|
| A D | f_int.c | 57 int num = 0, slen = 0, first = 1; in a2i_ASN1_INTEGER() local 105 if (num + i > slen) { in a2i_ASN1_INTEGER() 106 sp = OPENSSL_clear_realloc(s, slen, num + i * 2); in a2i_ASN1_INTEGER() 112 slen = num + i * 2; in a2i_ASN1_INTEGER()
|
| A D | f_string.c | 51 int num = 0, slen = 0, first = 1; in a2i_ASN1_STRING() local 97 if (num + i > slen) { in a2i_ASN1_STRING() 104 slen = num + i * 2; in a2i_ASN1_STRING()
|
| /crypto/crmf/ |
| A D | crmf_pbm.c | 27 OSSL_CRMF_PBMPARAMETER *OSSL_CRMF_pbmp_new(OSSL_LIB_CTX *libctx, size_t slen, in OSSL_CRMF_pbmp_new() argument 42 if ((salt = OPENSSL_malloc(slen)) == NULL) in OSSL_CRMF_pbmp_new() 44 if (RAND_bytes_ex(libctx, salt, slen, 0) <= 0) { in OSSL_CRMF_pbmp_new() 48 if (!ASN1_OCTET_STRING_set(pbm->salt, salt, (int)slen)) in OSSL_CRMF_pbmp_new()
|
| /crypto/pem/ |
| A D | pem_pkey.c | 111 int slen; in pem_read_bio_key_legacy() local 176 } else if ((slen = ossl_pem_check_suffix(nm, "PRIVATE KEY")) > 0) { in pem_read_bio_key_legacy() 178 ameth = EVP_PKEY_asn1_find_str(NULL, nm, slen); in pem_read_bio_key_legacy() 188 && (slen = ossl_pem_check_suffix(nm, "PARAMETERS")) > 0) { in pem_read_bio_key_legacy() 193 if (!EVP_PKEY_set_type_str(ret, nm, slen) in pem_read_bio_key_legacy()
|
| A D | pem_lib.c | 137 int slen; in check_pem() local 143 slen = ossl_pem_check_suffix(nm, "PRIVATE KEY"); in check_pem() 144 if (slen > 0) { in check_pem() 149 ameth = EVP_PKEY_asn1_find_str(NULL, nm, slen); in check_pem() 157 int slen; in check_pem() local 159 slen = ossl_pem_check_suffix(nm, "PARAMETERS"); in check_pem() 160 if (slen > 0) { in check_pem() 162 ameth = EVP_PKEY_asn1_find_str(&e, nm, slen); in check_pem()
|
| /crypto/ml_kem/ |
| A D | ml_kem.c | 1936 uint8_t *shared_secret, size_t slen, in ossl_ml_kem_encap_seed() argument 1949 || shared_secret == NULL || slen != ML_KEM_SHARED_SECRET_BYTES in ossl_ml_kem_encap_seed() 1983 CONSTTIME_DECLASSIFY(shared_secret, slen); in ossl_ml_kem_encap_seed() 1990 uint8_t *shared_secret, size_t slen, in ossl_ml_kem_encap_rand() argument 2002 return ossl_ml_kem_encap_seed(ctext, clen, shared_secret, slen, in ossl_ml_kem_encap_rand() 2006 int ossl_ml_kem_decap(uint8_t *shared_secret, size_t slen, in ossl_ml_kem_decap() argument 2022 if (shared_secret == NULL || slen != ML_KEM_SHARED_SECRET_BYTES in ossl_ml_kem_decap() 2062 CONSTTIME_DECLASSIFY(shared_secret, slen); in ossl_ml_kem_decap()
|
| /crypto/x509/ |
| A D | x_pubkey.c | 187 size_t slen = publen; in x509_pubkey_ex_d2i_ex() local 217 if (OSSL_DECODER_from_data(dctx, &p, &slen)) { in x509_pubkey_ex_d2i_ex() 218 if (slen != 0) { in x509_pubkey_ex_d2i_ex()
|
| /crypto/pkcs12/ |
| A D | p12_mutl.c | 160 unsigned char *salt, int slen, in pkcs12_gen_mac() argument
|
| /crypto/bio/ |
| A D | bss_dgram.c | 1543 socklen_t slen; in dgram_recvmmsg() local 1726 slen = sizeof(*msg[0].peer); in dgram_recvmmsg() 1735 msg[0].peer != NULL ? &slen : NULL); in dgram_recvmmsg()
|
Completed in 39 milliseconds