/freebsd/crypto/openssl/test/ |
H A D | aesgcmtest.c | 97 int ctlen = 0, taglen = 0; in kat_test() local 99 return do_encrypt(NULL, ct, &ctlen, tag, &taglen) in kat_test() 100 && TEST_mem_eq(gcm_ct, sizeof(gcm_ct), ct, ctlen) in kat_test() 102 && do_decrypt(gcm_iv, ct, ctlen, tag, taglen); in kat_test() 124 int ctlen = 0, taglen = 0; in ivgen_test() local 126 return do_encrypt(iv_gen, ct, &ctlen, tag, &taglen) in ivgen_test() 127 && do_decrypt(iv_gen, ct, ctlen, tag, taglen); in ivgen_test()
|
H A D | evp_libctx_test.c | 531 size_t ctlen = 0, unwraplen = 0, secretlen = 0; in kem_rsa_gen_recover() local 539 && TEST_int_eq(EVP_PKEY_encapsulate(dctx, NULL, &ctlen, NULL, in kem_rsa_gen_recover() 541 && TEST_int_eq(ctlen, secretlen) in kem_rsa_gen_recover() 542 && TEST_int_eq(ctlen, bits / 8) in kem_rsa_gen_recover() 543 && TEST_int_eq(EVP_PKEY_encapsulate(dctx, ct, &ctlen, secret, in kem_rsa_gen_recover() 549 ct, ctlen), 1) in kem_rsa_gen_recover() 551 ct, ctlen), 1) in kem_rsa_gen_recover() 596 size_t ctlen = 0, secretlen = 0; in kem_rsa_params() local 619 && TEST_int_eq(EVP_PKEY_encapsulate(pubctx, ct, &ctlen, secret, &secretlen), -2) in kem_rsa_params() 627 && TEST_int_eq(EVP_PKEY_encapsulate(pubctx, ct, &ctlen, secret, NULL), 1) in kem_rsa_params() [all …]
|
H A D | tls-provider.c | 335 unsigned char *ct, size_t *ctlen, in xor_encapsulate() 354 if (ctlen == NULL && sslen == NULL) in xor_encapsulate() 356 if (ctlen != NULL) in xor_encapsulate() 357 *ctlen = XOR_KEY_SIZE; in xor_encapsulate() 373 *ctlen = XOR_KEY_SIZE; in xor_encapsulate() 394 const unsigned char *ct, size_t ctlen) in xor_decapsulate() 415 if (ctlen != XOR_KEY_SIZE) in xor_decapsulate() 329 xor_encapsulate(void * vpxorctx,unsigned char * ct,size_t * ctlen,unsigned char * ss,size_t * sslen) xor_encapsulate() argument 388 xor_decapsulate(void * vpxorctx,unsigned char * ss,size_t * sslen,const unsigned char * ct,size_t ctlen) xor_decapsulate() argument
|
H A D | evp_fetch_prov_test.c | 244 int ret = 0, ctlen, ptlen; in encrypt_decrypt() local 252 || !TEST_true(EVP_CipherUpdate(ctx, ct, &ctlen, msg, len)) in encrypt_decrypt() 253 || !TEST_true(EVP_CipherFinal_ex(ctx, ct, &ctlen)) in encrypt_decrypt() 255 || !TEST_true(EVP_CipherUpdate(ctx, pt, &ptlen, ct, ctlen)) in encrypt_decrypt()
|
H A D | threadstest.c | 393 size_t ptlen, ctlen = sizeof(ctbuf); in thread_shared_evp_pkey() local 408 || !TEST_int_ge(EVP_PKEY_encrypt(ctx, ctbuf, &ctlen, in thread_shared_evp_pkey() 421 || !TEST_int_gt(EVP_PKEY_decrypt(ctx, ptbuf, &ptlen, ctbuf, ctlen), in thread_shared_evp_pkey()
|
H A D | evp_extra_test.c | 3025 int ctlen, ptlen, tmp = 99; in test_decrypt_null_chunks() local 3033 || !TEST_true(EVP_EncryptUpdate(ctx, ciphertext, &ctlen, msg, in test_decrypt_null_chunks() 3036 || !TEST_true(EVP_EncryptUpdate(ctx, ciphertext + ctlen, &tmp, NULL, in test_decrypt_null_chunks() 3039 || !TEST_true(EVP_EncryptUpdate(ctx, ciphertext + ctlen, &tmp, in test_decrypt_null_chunks() 3042 || !TEST_int_eq(ctlen += tmp, sizeof(msg)) in test_decrypt_null_chunks() 3043 || !TEST_true(EVP_EncryptFinal(ctx, ciphertext + ctlen, &tmp)) in test_decrypt_null_chunks() 3061 ctlen - dec_offset)) in test_decrypt_null_chunks()
|
/freebsd/contrib/tcpdump/ |
H A D | print-esp.c | 177 const u_char *iv, const u_char *ct, unsigned int ctlen) in do_decrypt() argument 218 if ((ctlen % block_size) != 0) { in do_decrypt() 222 caller, ctlen, block_size); in do_decrypt() 230 ptlen = ctlen; in do_decrypt() 250 if (!EVP_DecryptUpdate(ctx, pt, &len, ct, ctlen)) { in do_decrypt() 283 unsigned int ctlen; in esp_decrypt_buffer_by_ikev2_print() local 308 ctlen = end-ct; in esp_decrypt_buffer_by_ikev2_print() 313 ct, ctlen); in esp_decrypt_buffer_by_ikev2_print() 322 if (!nd_push_buffer(ndo, pt, pt, ctlen)) { in esp_decrypt_buffer_by_ikev2_print()
|
/freebsd/libexec/phttpget/ |
H A D | phttpget.c | 76 size_t ptlen, ctlen; in b64enc() local 87 ctlen = 4 * ((ptlen + 2) / 3) + 1; in b64enc() 88 if ((ctext = malloc(ctlen)) == NULL) in b64enc() 90 ctext[ctlen - 1] = 0; in b64enc()
|
/freebsd/sys/kgssapi/krb5/ |
H A D | krb5_mech.c | 1407 size_t mlen, blen, mblen, cklen, ctlen; in krb5_wrap_new() local 1432 ctlen = blen + mlen + EC + 16; in krb5_wrap_new() 1465 ctlen = 0; in krb5_wrap_new() 1518 krb5_checksum(Ki, 0, m, 16, ctlen, cklen); in krb5_wrap_new() 1519 krb5_encrypt(Ke, m, 16, ctlen, NULL, 0); in krb5_wrap_new() 1785 size_t blen, cklen, ctlen, mlen, plen, tlen; in krb5_unwrap_new() local 1892 ctlen = mlen - 16 - cklen; in krb5_unwrap_new() 1893 krb5_decrypt(Ke, m, 0, ctlen, NULL, 0); in krb5_unwrap_new() 1901 plen = ctlen - blen - 16 - EC; in krb5_unwrap_new() 1906 m_copydata(m, ctlen, cklen, buf); in krb5_unwrap_new() [all …]
|
/freebsd/crypto/openssl/ssl/ |
H A D | s3_lib.c | 4846 const unsigned char *ct, size_t ctlen, in ssl_decapsulate() argument 4862 || EVP_PKEY_decapsulate(pctx, NULL, &pmslen, ct, ctlen) <= 0) { in ssl_decapsulate() 4873 if (EVP_PKEY_decapsulate(pctx, pms, &pmslen, ct, ctlen) <= 0) { in ssl_decapsulate() 4901 size_t pmslen = 0, ctlen = 0; in ssl_encapsulate() local 4912 || EVP_PKEY_encapsulate(pctx, NULL, &ctlen, NULL, &pmslen) <= 0 in ssl_encapsulate() 4913 || pmslen == 0 || ctlen == 0) { in ssl_encapsulate() 4919 ct = OPENSSL_malloc(ctlen); in ssl_encapsulate() 4925 if (EVP_PKEY_encapsulate(pctx, ct, &ctlen, pms, &pmslen) <= 0) { in ssl_encapsulate() 4944 *ctlenp = ctlen; in ssl_encapsulate()
|
H A D | ssl_local.h | 2467 const unsigned char *ct, size_t ctlen,
|
/freebsd/crypto/openssl/ssl/statem/ |
H A D | extensions_srvr.c | 1683 size_t ctlen = 0; in tls_construct_stoc_key_share() local 1691 if (ssl_encapsulate(s, ckey, &ct, &ctlen, 0) == 0) { in tls_construct_stoc_key_share() 1696 if (ctlen == 0) { in tls_construct_stoc_key_share() 1702 if (!WPACKET_sub_memcpy_u16(pkt, ct, ctlen) in tls_construct_stoc_key_share()
|
H A D | extensions_clnt.c | 1887 size_t ctlen = PACKET_remaining(&encoded_pt); in tls_parse_stoc_key_share() local 1889 if (ssl_decapsulate(s, ckey, ct, ctlen, 1) == 0) { in tls_parse_stoc_key_share()
|
/freebsd/contrib/unbound/services/ |
H A D | rpz.c | 449 new_cname_override(struct regional* region, uint8_t* ct, size_t ctlen) in new_cname_override() argument 453 uint16_t rdlength = htons(ctlen); in new_cname_override() 477 pd->rr_len[0] = ctlen+2; in new_cname_override() 479 pd->rr_data[0] = regional_alloc_zero(region, 2 /* rdlength */ + ctlen); in new_cname_override() 485 memmove(pd->rr_data[0]+2, ct, ctlen); in new_cname_override()
|