/dragonfly/crypto/libressl/crypto/evp/ |
H A D | e_chacha20poly1305.c | 165 *out_len = in_len + c20_ctx->tag_len; in aead_chacha20_poly1305_seal() 170 *out_len = in_len + POLY1305_TAG_LEN; in aead_chacha20_poly1305_seal() 188 if (in_len < c20_ctx->tag_len) { in aead_chacha20_poly1305_open() 198 plaintext_len = in_len - c20_ctx->tag_len; in aead_chacha20_poly1305_open() 270 *out_len = in_len + c20_ctx->tag_len; in aead_xchacha20_poly1305_seal() 275 *out_len = in_len + POLY1305_TAG_LEN; in aead_xchacha20_poly1305_seal() 292 if (in_len < c20_ctx->tag_len) { in aead_xchacha20_poly1305_open() 381 size_t in_len; member 471 cpx->in_len = 0; in chacha20_poly1305_cipher() 477 if (len > SIZE_MAX - cpx->in_len) { in chacha20_poly1305_cipher() [all …]
|
H A D | evp_aead.c | 96 check_alias(const unsigned char *in, size_t in_len, const unsigned char *out) in check_alias() argument 100 if (in + in_len <= out) in check_alias() 108 const unsigned char *in, size_t in_len, const unsigned char *ad, in EVP_AEAD_CTX_seal() argument 111 size_t possible_out_len = in_len + ctx->aead->overhead; in EVP_AEAD_CTX_seal() 114 if (possible_out_len < in_len) { in EVP_AEAD_CTX_seal() 119 if (!check_alias(in, in_len, out)) { in EVP_AEAD_CTX_seal() 125 in, in_len, ad, ad_len)) { in EVP_AEAD_CTX_seal() 140 const unsigned char *in, size_t in_len, const unsigned char *ad, in EVP_AEAD_CTX_open() argument 143 if (!check_alias(in, in_len, out)) { in EVP_AEAD_CTX_open() 149 in, in_len, ad, ad_len)) { in EVP_AEAD_CTX_open()
|
H A D | evp_locl.h | 286 size_t nonce_len, const unsigned char *in, size_t in_len, 291 size_t nonce_len, const unsigned char *in, size_t in_len,
|
H A D | e_aes.c | 2291 const unsigned char *in, size_t in_len, const unsigned char *ad, in aead_aes_gcm_seal() argument 2298 if (max_out_len < in_len + gcm_ctx->tag_len) { in aead_aes_gcm_seal() 2316 in_len - bulk, gcm_ctx->ctr)) in aead_aes_gcm_seal() 2320 in_len - bulk)) in aead_aes_gcm_seal() 2324 CRYPTO_gcm128_tag(&gcm, out + in_len, gcm_ctx->tag_len); in aead_aes_gcm_seal() 2325 *out_len = in_len + gcm_ctx->tag_len; in aead_aes_gcm_seal() 2333 const unsigned char *in, size_t in_len, const unsigned char *ad, in aead_aes_gcm_open() argument 2342 if (in_len < gcm_ctx->tag_len) { in aead_aes_gcm_open() 2347 plaintext_len = in_len - gcm_ctx->tag_len; in aead_aes_gcm_open() 2367 in_len - bulk - gcm_ctx->tag_len, gcm_ctx->ctr)) in aead_aes_gcm_open() [all …]
|
/dragonfly/sys/crypto/ |
H A D | chachapoly.c | 114 KKASSERT(in_len == 0 || (in_len > 0 && out != NULL)); in _chacha20poly1305_update() 122 if (in_len == 0 || in == NULL) in _chacha20poly1305_update() 128 poly1305_update(&ctx->poly, out, in_len); in _chacha20poly1305_update() 130 poly1305_update(&ctx->poly, in, in_len); in _chacha20poly1305_update() 134 ctx->data_len += in_len; in _chacha20poly1305_update() 158 KKASSERT(in_len == 0 || (in_len > 0 && out != NULL)); in _chacha20poly1305_final() 159 KKASSERT(in_len <= CHACHA_BLOCKLEN); in _chacha20poly1305_final() 168 if (in_len > 0) { in _chacha20poly1305_final() 171 poly1305_update(&ctx->poly, out, in_len); in _chacha20poly1305_final() 173 poly1305_update(&ctx->poly, in, in_len); in _chacha20poly1305_final() [all …]
|
/dragonfly/contrib/wpa_supplicant/src/tls/ |
H A D | tlsv1_client_read.c | 95 left = *in_len; in tls_process_server_hello() 364 left = *in_len; in tls_process_certificate() 394 in_len); in tls_process_certificate() 835 left = *in_len; in tls_process_certificate_status() 1030 left = *in_len; in tls_process_server_key_exchange() 1063 in_len); in tls_process_server_key_exchange() 1126 left = *in_len; in tls_process_certificate_request() 1190 left = *in_len; in tls_process_server_hello_done() 1278 left = *in_len; in tls_process_server_change_cipher_spec() 1328 left = *in_len; in tls_process_server_finished() [all …]
|
H A D | tlsv1_record.c | 279 const u8 *in_data, size_t in_len, in tlsv1_record_receive() argument 289 if (in_len < TLS_RECORD_HEADER_LEN) { in tlsv1_record_receive() 292 (unsigned long) in_len); in tlsv1_record_receive() 294 in_data, in_len); in tlsv1_record_receive() 324 in_len -= TLS_RECORD_HEADER_LEN; in tlsv1_record_receive() 326 if (rlen > in_len) { in tlsv1_record_receive() 346 in_len = rlen; in tlsv1_record_receive() 348 if (*out_len < in_len) { in tlsv1_record_receive() 358 out_data, in_len) < 0) { in tlsv1_record_receive() 362 plen = in_len; in tlsv1_record_receive() [all …]
|
H A D | tlsv1_client.c | 140 const u8 *in_data, size_t in_len, in tlsv1_client_handshake() argument 154 if (in_len) in tlsv1_client_handshake() 169 in_len = wpabuf_len(conn->partial_input); in tlsv1_client_handshake() 172 if (in_data == NULL || in_len == 0) in tlsv1_client_handshake() 176 end = in_data + in_len; in tlsv1_client_handshake() 177 in_msg = os_malloc(in_len); in tlsv1_client_handshake() 183 in_msg_len = in_len; in tlsv1_client_handshake() 274 const u8 *in_data, size_t in_len, in tlsv1_client_encrypt() argument 280 in_data, in_len); in tlsv1_client_encrypt() 307 const u8 *in_data, size_t in_len, in tlsv1_client_decrypt() argument [all …]
|
H A D | tlsv1_server_read.c | 27 size_t *in_len); 140 left = *in_len; in tls_process_client_hello() 381 *in_len = end - in_data; in tls_process_client_hello() 414 left = *in_len; in tls_process_certificate() 446 in_len); in tls_process_certificate() 825 left = *in_len; in tls_process_client_key_exchange() 903 in_len); in tls_process_certificate_verify() 915 left = *in_len; in tls_process_certificate_verify() 1047 size_t *in_len) in tls_process_change_cipher_spec() argument 1061 left = *in_len; in tls_process_change_cipher_spec() [all …]
|
H A D | tlsv1_server.c | 133 const u8 *in_data, size_t in_len, in tlsv1_server_handshake() argument 141 if (in_data == NULL || in_len == 0) { in tlsv1_server_handshake() 147 end = in_data + in_len; in tlsv1_server_handshake() 148 in_msg = os_malloc(in_len); in tlsv1_server_handshake() 154 in_msg_len = in_len; in tlsv1_server_handshake() 228 const u8 *in_data, size_t in_len, in tlsv1_server_encrypt() argument 234 in_data, in_len); in tlsv1_server_encrypt() 237 out_data, out_len, in_data, in_len, &rlen) < 0) { in tlsv1_server_encrypt() 261 const u8 *in_data, size_t in_len, in tlsv1_server_decrypt() argument 270 in_end = in_data + in_len; in tlsv1_server_decrypt()
|
H A D | tlsv1_server.h | 25 const u8 *in_data, size_t in_len, size_t *out_len); 27 const u8 *in_data, size_t in_len, 30 const u8 *in_data, size_t in_len,
|
H A D | tlsv1_client.h | 25 const u8 *in_data, size_t in_len, 29 const u8 *in_data, size_t in_len, 32 const u8 *in_data, size_t in_len,
|
H A D | tlsv1_record.h | 68 const u8 *in_data, size_t in_len,
|
/dragonfly/crypto/libressl/crypto/bio/ |
H A D | bss_mem.c | 92 static int mem_write(BIO *bio, const char *in, int in_len); 220 mem_write(BIO *bio, const char *in, int in_len) in mem_write() argument 227 if (in == NULL || in_len <= 0) in mem_write() 246 buf_len = bm->buf->length + in_len; in mem_write() 253 memcpy(&bm->buf->data[buf_len - in_len], in, in_len); in mem_write() 255 return in_len; in mem_write()
|
/dragonfly/contrib/libarchive/libarchive/ |
H A D | archive_cryptor_private.h | 155 #define archive_decrypto_aes_ctr_update(ctx, in, in_len, out, out_len) \ argument 156 __archive_cryptor.decrypto_aes_ctr_update(ctx, in, in_len, out, out_len) 162 #define archive_encrypto_aes_ctr_update(ctx, in, in_len, out, out_len) \ argument 163 __archive_cryptor.encrypto_aes_ctr_update(ctx, in, in_len, out, out_len)
|
H A D | archive_cryptor.c | 464 size_t in_len, uint8_t * const out, size_t *out_len) in aes_ctr_update() argument 468 (void)in_len; /* UNUSED */ in aes_ctr_update() 490 size_t in_len, uint8_t * const out, size_t *out_len) in aes_ctr_update() argument 494 unsigned max = (unsigned)((in_len < *out_len)? in_len: *out_len); in aes_ctr_update()
|
/dragonfly/lib/libtcplay/ |
H A D | crypto.c | 102 unsigned char *in, int in_len, unsigned char *out) in tc_encrypt() argument 128 cipher_chain->cipher->klen, iv, in, out, in_len, 1); in tc_encrypt() 151 unsigned char *in, int in_len, unsigned char *out) in tc_decrypt() argument 180 cipher_chain->cipher->klen, iv, in, out, in_len, 0); in tc_decrypt()
|
H A D | tcplay.h | 265 unsigned char *in, int in_len, unsigned char *out); 268 unsigned char *in, int in_len, unsigned char *out);
|
/dragonfly/usr.sbin/ppp/libradius/ |
H A D | radlib.c | 210 if (h->in_len < POS_ATTRS) in is_valid_response() 213 if (len > h->in_len) in is_valid_response() 251 h->in_len - POS_ATTRS); in is_valid_response() 289 if (h->in_len < POS_ATTRS) in is_valid_request() 292 if (len > h->in_len) in is_valid_request() 686 h->in_len = recvfrom(h->fd, h->in, in rad_continue_send_request() 688 if (h->in_len == -1) { in rad_continue_send_request() 797 h->in_len = recvfrom(h->fd, h->in, in rad_receive_request() 799 if (h->in_len == -1) { in rad_receive_request() 952 if (h->in_pos >= h->in_len) in rad_get_attr() [all …]
|
H A D | radlib_private.h | 94 int in_len; /* Length of response */ member
|
/dragonfly/crypto/libressl/crypto/asn1/ |
H A D | a_object.c | 327 a2d_ASN1_OBJECT(unsigned char *out, int out_len, const char *in, int in_len) in a2d_ASN1_OBJECT() argument 337 if (in_len == -1) in a2d_ASN1_OBJECT() 338 in_len = strlen(in); in a2d_ASN1_OBJECT() 339 if (in_len <= 0) in a2d_ASN1_OBJECT() 342 CBS_init(&cbs, in, in_len); in a2d_ASN1_OBJECT()
|
H A D | asn1_item.c | 238 int in_len = 0, out_len = 0; in ASN1_item_sign_ctx() local 290 if ((in_len = ASN1_item_i2d(asn, &buf_in, it)) <= 0) { in ASN1_item_sign_ctx() 291 in_len = 0; in ASN1_item_sign_ctx() 306 if (!EVP_DigestSignUpdate(ctx, buf_in, in_len) || in ASN1_item_sign_ctx() 328 freezero(buf_in, in_len); in ASN1_item_sign_ctx()
|
/dragonfly/contrib/wpa_supplicant/src/eap_peer/ |
H A D | eap_tls_common.c | 467 size_t tls_in_len, in_len; in eap_peer_tls_reassemble_fragment() local 470 in_len = in_data ? wpabuf_len(in_data) : 0; in eap_peer_tls_reassemble_fragment() 472 if (tls_in_len + in_len == 0) { in eap_peer_tls_reassemble_fragment() 478 (unsigned long) in_len); in eap_peer_tls_reassemble_fragment() 483 if (tls_in_len + in_len > 65536) { in eap_peer_tls_reassemble_fragment() 494 if (in_len > data->tls_in_left) { in eap_peer_tls_reassemble_fragment() 502 if (wpabuf_resize(&data->tls_in, in_len) < 0) { in eap_peer_tls_reassemble_fragment() 510 data->tls_in_left -= in_len; in eap_peer_tls_reassemble_fragment()
|
/dragonfly/contrib/wpa_supplicant/src/eap_server/ |
H A D | eap_server_teap.c | 955 u8 *in_data, size_t in_len) in eap_teap_process_phase2_response() argument 975 if (in_len > sizeof(*hdr) && *pos == EAP_TYPE_NAK) { in eap_teap_process_phase2_response() 976 left = in_len - sizeof(*hdr); in eap_teap_process_phase2_response() 1005 wpabuf_set(&buf, in_data, in_len); in eap_teap_process_phase2_response() 1078 u8 *in_data, size_t in_len) in eap_teap_process_phase2_eap() argument 1084 if (in_len < (int) sizeof(*hdr)) { in eap_teap_process_phase2_eap() 1087 (unsigned long) in_len); in eap_teap_process_phase2_eap() 1092 if (len > in_len) { in eap_teap_process_phase2_eap() 1095 (unsigned long) in_len, (unsigned long) len); in eap_teap_process_phase2_eap() 1118 u8 *in_data, size_t in_len) in eap_teap_process_basic_auth_resp() argument [all …]
|
H A D | eap_server_fast.c | 974 u8 *in_data, size_t in_len) in eap_fast_process_phase2_response() argument 993 if (in_len > sizeof(*hdr) && *pos == EAP_TYPE_NAK) { in eap_fast_process_phase2_response() 994 left = in_len - sizeof(*hdr); in eap_fast_process_phase2_response() 1022 wpabuf_set(&buf, in_data, in_len); in eap_fast_process_phase2_response() 1096 u8 *in_data, size_t in_len) in eap_fast_process_phase2_eap() argument 1102 if (in_len < (int) sizeof(*hdr)) { in eap_fast_process_phase2_eap() 1104 "EAP frame (len=%lu)", (unsigned long) in_len); in eap_fast_process_phase2_eap() 1109 if (len > in_len) { in eap_fast_process_phase2_eap() 1112 (unsigned long) in_len, (unsigned long) len); in eap_fast_process_phase2_eap()
|