Home
last modified time | relevance | path

Searched refs:in_len (Results 1 – 25 of 31) sorted by relevance

12

/dragonfly/crypto/libressl/crypto/evp/
H A De_chacha20poly1305.c165 *out_len = in_len + c20_ctx->tag_len; in aead_chacha20_poly1305_seal()
170 *out_len = in_len + POLY1305_TAG_LEN; in aead_chacha20_poly1305_seal()
188 if (in_len < c20_ctx->tag_len) { in aead_chacha20_poly1305_open()
198 plaintext_len = in_len - c20_ctx->tag_len; in aead_chacha20_poly1305_open()
270 *out_len = in_len + c20_ctx->tag_len; in aead_xchacha20_poly1305_seal()
275 *out_len = in_len + POLY1305_TAG_LEN; in aead_xchacha20_poly1305_seal()
292 if (in_len < c20_ctx->tag_len) { in aead_xchacha20_poly1305_open()
381 size_t in_len; member
471 cpx->in_len = 0; in chacha20_poly1305_cipher()
477 if (len > SIZE_MAX - cpx->in_len) { in chacha20_poly1305_cipher()
[all …]
H A Devp_aead.c96 check_alias(const unsigned char *in, size_t in_len, const unsigned char *out) in check_alias() argument
100 if (in + in_len <= out) in check_alias()
108 const unsigned char *in, size_t in_len, const unsigned char *ad, in EVP_AEAD_CTX_seal() argument
111 size_t possible_out_len = in_len + ctx->aead->overhead; in EVP_AEAD_CTX_seal()
114 if (possible_out_len < in_len) { in EVP_AEAD_CTX_seal()
119 if (!check_alias(in, in_len, out)) { in EVP_AEAD_CTX_seal()
125 in, in_len, ad, ad_len)) { in EVP_AEAD_CTX_seal()
140 const unsigned char *in, size_t in_len, const unsigned char *ad, in EVP_AEAD_CTX_open() argument
143 if (!check_alias(in, in_len, out)) { in EVP_AEAD_CTX_open()
149 in, in_len, ad, ad_len)) { in EVP_AEAD_CTX_open()
H A Devp_locl.h286 size_t nonce_len, const unsigned char *in, size_t in_len,
291 size_t nonce_len, const unsigned char *in, size_t in_len,
H A De_aes.c2291 const unsigned char *in, size_t in_len, const unsigned char *ad, in aead_aes_gcm_seal() argument
2298 if (max_out_len < in_len + gcm_ctx->tag_len) { in aead_aes_gcm_seal()
2316 in_len - bulk, gcm_ctx->ctr)) in aead_aes_gcm_seal()
2320 in_len - bulk)) in aead_aes_gcm_seal()
2324 CRYPTO_gcm128_tag(&gcm, out + in_len, gcm_ctx->tag_len); in aead_aes_gcm_seal()
2325 *out_len = in_len + gcm_ctx->tag_len; in aead_aes_gcm_seal()
2333 const unsigned char *in, size_t in_len, const unsigned char *ad, in aead_aes_gcm_open() argument
2342 if (in_len < gcm_ctx->tag_len) { in aead_aes_gcm_open()
2347 plaintext_len = in_len - gcm_ctx->tag_len; in aead_aes_gcm_open()
2367 in_len - bulk - gcm_ctx->tag_len, gcm_ctx->ctr)) in aead_aes_gcm_open()
[all …]
/dragonfly/sys/crypto/
H A Dchachapoly.c114 KKASSERT(in_len == 0 || (in_len > 0 && out != NULL)); in _chacha20poly1305_update()
122 if (in_len == 0 || in == NULL) in _chacha20poly1305_update()
128 poly1305_update(&ctx->poly, out, in_len); in _chacha20poly1305_update()
130 poly1305_update(&ctx->poly, in, in_len); in _chacha20poly1305_update()
134 ctx->data_len += in_len; in _chacha20poly1305_update()
158 KKASSERT(in_len == 0 || (in_len > 0 && out != NULL)); in _chacha20poly1305_final()
159 KKASSERT(in_len <= CHACHA_BLOCKLEN); in _chacha20poly1305_final()
168 if (in_len > 0) { in _chacha20poly1305_final()
171 poly1305_update(&ctx->poly, out, in_len); in _chacha20poly1305_final()
173 poly1305_update(&ctx->poly, in, in_len); in _chacha20poly1305_final()
[all …]
/dragonfly/contrib/wpa_supplicant/src/tls/
H A Dtlsv1_client_read.c95 left = *in_len; in tls_process_server_hello()
364 left = *in_len; in tls_process_certificate()
394 in_len); in tls_process_certificate()
835 left = *in_len; in tls_process_certificate_status()
1030 left = *in_len; in tls_process_server_key_exchange()
1063 in_len); in tls_process_server_key_exchange()
1126 left = *in_len; in tls_process_certificate_request()
1190 left = *in_len; in tls_process_server_hello_done()
1278 left = *in_len; in tls_process_server_change_cipher_spec()
1328 left = *in_len; in tls_process_server_finished()
[all …]
H A Dtlsv1_record.c279 const u8 *in_data, size_t in_len, in tlsv1_record_receive() argument
289 if (in_len < TLS_RECORD_HEADER_LEN) { in tlsv1_record_receive()
292 (unsigned long) in_len); in tlsv1_record_receive()
294 in_data, in_len); in tlsv1_record_receive()
324 in_len -= TLS_RECORD_HEADER_LEN; in tlsv1_record_receive()
326 if (rlen > in_len) { in tlsv1_record_receive()
346 in_len = rlen; in tlsv1_record_receive()
348 if (*out_len < in_len) { in tlsv1_record_receive()
358 out_data, in_len) < 0) { in tlsv1_record_receive()
362 plen = in_len; in tlsv1_record_receive()
[all …]
H A Dtlsv1_client.c140 const u8 *in_data, size_t in_len, in tlsv1_client_handshake() argument
154 if (in_len) in tlsv1_client_handshake()
169 in_len = wpabuf_len(conn->partial_input); in tlsv1_client_handshake()
172 if (in_data == NULL || in_len == 0) in tlsv1_client_handshake()
176 end = in_data + in_len; in tlsv1_client_handshake()
177 in_msg = os_malloc(in_len); in tlsv1_client_handshake()
183 in_msg_len = in_len; in tlsv1_client_handshake()
274 const u8 *in_data, size_t in_len, in tlsv1_client_encrypt() argument
280 in_data, in_len); in tlsv1_client_encrypt()
307 const u8 *in_data, size_t in_len, in tlsv1_client_decrypt() argument
[all …]
H A Dtlsv1_server_read.c27 size_t *in_len);
140 left = *in_len; in tls_process_client_hello()
381 *in_len = end - in_data; in tls_process_client_hello()
414 left = *in_len; in tls_process_certificate()
446 in_len); in tls_process_certificate()
825 left = *in_len; in tls_process_client_key_exchange()
903 in_len); in tls_process_certificate_verify()
915 left = *in_len; in tls_process_certificate_verify()
1047 size_t *in_len) in tls_process_change_cipher_spec() argument
1061 left = *in_len; in tls_process_change_cipher_spec()
[all …]
H A Dtlsv1_server.c133 const u8 *in_data, size_t in_len, in tlsv1_server_handshake() argument
141 if (in_data == NULL || in_len == 0) { in tlsv1_server_handshake()
147 end = in_data + in_len; in tlsv1_server_handshake()
148 in_msg = os_malloc(in_len); in tlsv1_server_handshake()
154 in_msg_len = in_len; in tlsv1_server_handshake()
228 const u8 *in_data, size_t in_len, in tlsv1_server_encrypt() argument
234 in_data, in_len); in tlsv1_server_encrypt()
237 out_data, out_len, in_data, in_len, &rlen) < 0) { in tlsv1_server_encrypt()
261 const u8 *in_data, size_t in_len, in tlsv1_server_decrypt() argument
270 in_end = in_data + in_len; in tlsv1_server_decrypt()
H A Dtlsv1_server.h25 const u8 *in_data, size_t in_len, size_t *out_len);
27 const u8 *in_data, size_t in_len,
30 const u8 *in_data, size_t in_len,
H A Dtlsv1_client.h25 const u8 *in_data, size_t in_len,
29 const u8 *in_data, size_t in_len,
32 const u8 *in_data, size_t in_len,
H A Dtlsv1_record.h68 const u8 *in_data, size_t in_len,
/dragonfly/crypto/libressl/crypto/bio/
H A Dbss_mem.c92 static int mem_write(BIO *bio, const char *in, int in_len);
220 mem_write(BIO *bio, const char *in, int in_len) in mem_write() argument
227 if (in == NULL || in_len <= 0) in mem_write()
246 buf_len = bm->buf->length + in_len; in mem_write()
253 memcpy(&bm->buf->data[buf_len - in_len], in, in_len); in mem_write()
255 return in_len; in mem_write()
/dragonfly/contrib/libarchive/libarchive/
H A Darchive_cryptor_private.h155 #define archive_decrypto_aes_ctr_update(ctx, in, in_len, out, out_len) \ argument
156 __archive_cryptor.decrypto_aes_ctr_update(ctx, in, in_len, out, out_len)
162 #define archive_encrypto_aes_ctr_update(ctx, in, in_len, out, out_len) \ argument
163 __archive_cryptor.encrypto_aes_ctr_update(ctx, in, in_len, out, out_len)
H A Darchive_cryptor.c464 size_t in_len, uint8_t * const out, size_t *out_len) in aes_ctr_update() argument
468 (void)in_len; /* UNUSED */ in aes_ctr_update()
490 size_t in_len, uint8_t * const out, size_t *out_len) in aes_ctr_update() argument
494 unsigned max = (unsigned)((in_len < *out_len)? in_len: *out_len); in aes_ctr_update()
/dragonfly/lib/libtcplay/
H A Dcrypto.c102 unsigned char *in, int in_len, unsigned char *out) in tc_encrypt() argument
128 cipher_chain->cipher->klen, iv, in, out, in_len, 1); in tc_encrypt()
151 unsigned char *in, int in_len, unsigned char *out) in tc_decrypt() argument
180 cipher_chain->cipher->klen, iv, in, out, in_len, 0); in tc_decrypt()
H A Dtcplay.h265 unsigned char *in, int in_len, unsigned char *out);
268 unsigned char *in, int in_len, unsigned char *out);
/dragonfly/usr.sbin/ppp/libradius/
H A Dradlib.c210 if (h->in_len < POS_ATTRS) in is_valid_response()
213 if (len > h->in_len) in is_valid_response()
251 h->in_len - POS_ATTRS); in is_valid_response()
289 if (h->in_len < POS_ATTRS) in is_valid_request()
292 if (len > h->in_len) in is_valid_request()
686 h->in_len = recvfrom(h->fd, h->in, in rad_continue_send_request()
688 if (h->in_len == -1) { in rad_continue_send_request()
797 h->in_len = recvfrom(h->fd, h->in, in rad_receive_request()
799 if (h->in_len == -1) { in rad_receive_request()
952 if (h->in_pos >= h->in_len) in rad_get_attr()
[all …]
H A Dradlib_private.h94 int in_len; /* Length of response */ member
/dragonfly/crypto/libressl/crypto/asn1/
H A Da_object.c327 a2d_ASN1_OBJECT(unsigned char *out, int out_len, const char *in, int in_len) in a2d_ASN1_OBJECT() argument
337 if (in_len == -1) in a2d_ASN1_OBJECT()
338 in_len = strlen(in); in a2d_ASN1_OBJECT()
339 if (in_len <= 0) in a2d_ASN1_OBJECT()
342 CBS_init(&cbs, in, in_len); in a2d_ASN1_OBJECT()
H A Dasn1_item.c238 int in_len = 0, out_len = 0; in ASN1_item_sign_ctx() local
290 if ((in_len = ASN1_item_i2d(asn, &buf_in, it)) <= 0) { in ASN1_item_sign_ctx()
291 in_len = 0; in ASN1_item_sign_ctx()
306 if (!EVP_DigestSignUpdate(ctx, buf_in, in_len) || in ASN1_item_sign_ctx()
328 freezero(buf_in, in_len); in ASN1_item_sign_ctx()
/dragonfly/contrib/wpa_supplicant/src/eap_peer/
H A Deap_tls_common.c467 size_t tls_in_len, in_len; in eap_peer_tls_reassemble_fragment() local
470 in_len = in_data ? wpabuf_len(in_data) : 0; in eap_peer_tls_reassemble_fragment()
472 if (tls_in_len + in_len == 0) { in eap_peer_tls_reassemble_fragment()
478 (unsigned long) in_len); in eap_peer_tls_reassemble_fragment()
483 if (tls_in_len + in_len > 65536) { in eap_peer_tls_reassemble_fragment()
494 if (in_len > data->tls_in_left) { in eap_peer_tls_reassemble_fragment()
502 if (wpabuf_resize(&data->tls_in, in_len) < 0) { in eap_peer_tls_reassemble_fragment()
510 data->tls_in_left -= in_len; in eap_peer_tls_reassemble_fragment()
/dragonfly/contrib/wpa_supplicant/src/eap_server/
H A Deap_server_teap.c955 u8 *in_data, size_t in_len) in eap_teap_process_phase2_response() argument
975 if (in_len > sizeof(*hdr) && *pos == EAP_TYPE_NAK) { in eap_teap_process_phase2_response()
976 left = in_len - sizeof(*hdr); in eap_teap_process_phase2_response()
1005 wpabuf_set(&buf, in_data, in_len); in eap_teap_process_phase2_response()
1078 u8 *in_data, size_t in_len) in eap_teap_process_phase2_eap() argument
1084 if (in_len < (int) sizeof(*hdr)) { in eap_teap_process_phase2_eap()
1087 (unsigned long) in_len); in eap_teap_process_phase2_eap()
1092 if (len > in_len) { in eap_teap_process_phase2_eap()
1095 (unsigned long) in_len, (unsigned long) len); in eap_teap_process_phase2_eap()
1118 u8 *in_data, size_t in_len) in eap_teap_process_basic_auth_resp() argument
[all …]
H A Deap_server_fast.c974 u8 *in_data, size_t in_len) in eap_fast_process_phase2_response() argument
993 if (in_len > sizeof(*hdr) && *pos == EAP_TYPE_NAK) { in eap_fast_process_phase2_response()
994 left = in_len - sizeof(*hdr); in eap_fast_process_phase2_response()
1022 wpabuf_set(&buf, in_data, in_len); in eap_fast_process_phase2_response()
1096 u8 *in_data, size_t in_len) in eap_fast_process_phase2_eap() argument
1102 if (in_len < (int) sizeof(*hdr)) { in eap_fast_process_phase2_eap()
1104 "EAP frame (len=%lu)", (unsigned long) in_len); in eap_fast_process_phase2_eap()
1109 if (len > in_len) { in eap_fast_process_phase2_eap()
1112 (unsigned long) in_len, (unsigned long) len); in eap_fast_process_phase2_eap()

12