| /freebsd/crypto/openssl/ssl/quic/ |
| H A D | quic_port.c | 948 size_t *ct_len) in encrypt_validation_token() argument 958 *ct_len = iv_len + pt_len + tag_len + QUIC_RETRY_INTEGRITY_TAG_LEN; in encrypt_validation_token() 996 size_t ct_len, in decrypt_validation_token() argument 1009 if (ct_len < (iv_len + tag_len) || ct_len > ENCRYPTED_TOKEN_MAX_LEN) in decrypt_validation_token() 1012 *pt_len = ct_len - iv_len - tag_len; in decrypt_validation_token() 1019 tag = ciphertext + ct_len - tag_len; in decrypt_validation_token() 1023 ct_len - iv_len - tag_len) in decrypt_validation_token() 1118 size_t written, token_buf_len, ct_len; in port_send_retry() local 1148 &ct_len) in port_send_retry() 1149 || ct_len > ENCRYPTED_TOKEN_MAX_LEN in port_send_retry() [all …]
|
| /freebsd/crypto/openssl/test/ |
| H A D | aesgcmtest.c | 38 static int do_encrypt(unsigned char *iv_gen, unsigned char *ct, int *ct_len, in do_encrypt() argument 57 && TEST_true(EVP_EncryptUpdate(ctx, ct, ct_len, gcm_pt, in do_encrypt() 72 int ct_len, const unsigned char *tag, int tag_len) in do_decrypt() argument 90 ct_len) in do_decrypt()
|
| H A D | acvp_test.c | 880 const unsigned char *ct, size_t ct_len, in cipher_enc() argument 897 if (!TEST_mem_eq(out, out_len, ct, ct_len)) in cipher_enc() 914 tst->ct, tst->ct_len, enc)) in cipher_enc_dec_test() 915 && TEST_true(cipher_enc(tst->alg, tst->ct, tst->ct_len, in cipher_enc_dec_test() 926 const unsigned char *ct, size_t ct_len, in aes_ccm_enc_dec() argument 966 || !TEST_mem_eq(out, out_len, ct, ct_len) in aes_ccm_enc_dec() 970 if (!TEST_mem_eq(out, out_len + len, ct, ct_len)) in aes_ccm_enc_dec() 986 const size_t tag_len = tst->ct_len - tst->pt_len; in aes_ccm_enc_dec_test() 987 const size_t ct_len = tst->ct_len - tag_len; in aes_ccm_enc_dec_test() local 988 const unsigned char *tag = tst->ct + ct_len; in aes_ccm_enc_dec_test() [all …]
|
| H A D | acvp_test.inc | 859 size_t ct_len; 873 size_t ct_len; 887 size_t ct_len; 2051 size_t ct_len;
|
| /freebsd/crypto/openssl/providers/fips/ |
| H A D | self_test_kats.c | 99 int ret = 0, encrypt = 1, len = 0, ct_len = 0, pt_len = 0; in self_test_cipher() local 119 || !EVP_CipherFinal_ex(ctx, ct_buf + len, &ct_len)) in self_test_cipher() 123 ct_len += len; in self_test_cipher() 124 if (ct_len != (int)t->base.expected_len in self_test_cipher() 125 || memcmp(t->base.expected, ct_buf, ct_len) != 0) in self_test_cipher()
|
| /freebsd/contrib/wpa/src/crypto/ |
| H A D | crypto_openssl.c | 5258 const u8 *ct, size_t ct_len) in hpke_aead_open() argument 5265 if (ct_len < ctx->n_t) in hpke_aead_open() 5267 tag = ct + ct_len - ctx->n_t; in hpke_aead_open() 5268 ct_len -= ctx->n_t; in hpke_aead_open() 5287 pt = wpabuf_alloc(ct_len + AES_BLOCK_SIZE); in hpke_aead_open() 5290 if (EVP_DecryptUpdate(cctx, wpabuf_put(pt, 0), &len, ct, ct_len) != 1) { in hpke_aead_open() 5424 size_t enc_len, ct_len; in hpke_base_seal() local 5441 ct_len = OSSL_HPKE_get_ciphertext_size(suite, pt_len); in hpke_base_seal() 5442 buf = wpabuf_alloc(enc_len + ct_len); in hpke_base_seal() 5464 if (OSSL_HPKE_seal(ctx, wpabuf_put(buf, 0), &ct_len, aad, aad_len, in hpke_base_seal() [all …]
|