/freebsd/tools/regression/net80211/wep/ |
H A D | test_wep.c | 146 size_t encrypted_len; member 220 memcpy(mtod(m, void *), t->encrypted, t->encrypted_len); in runtest() 221 m->m_len = t->encrypted_len; in runtest() 263 if (m->m_pkthdr.len != t->encrypted_len) { in runtest() 266 t->encrypted, t->encrypted_len); in runtest() 271 t->encrypted, t->encrypted_len); in runtest()
|
/freebsd/tools/regression/net80211/ccmp/ |
H A D | test_ccmp.c | 541 size_t encrypted_len; member 645 if (m->m_pkthdr.len != t->encrypted_len) { in runtest() 649 t->encrypted, t->encrypted_len); in runtest() 651 } else if (memcmp(mtod(m, const void *), t->encrypted, t->encrypted_len)) { in runtest() 655 t->encrypted, t->encrypted_len); in runtest()
|
/freebsd/crypto/openssh/ |
H A D | sshkey-xmss.c | 897 size_t i, keylen, ivlen, blocksize, authlen, encrypted_len, aadlen; in sshkey_xmss_encrypt_state() local 943 encrypted_len = sshbuf_len(padded); in sshkey_xmss_encrypt_state() 946 if ((r = sshbuf_put_u32(encoded, encrypted_len)) != 0) in sshkey_xmss_encrypt_state() 957 encrypted_len + aadlen + authlen, &cp)) != 0 || in sshkey_xmss_encrypt_state() 961 encrypted_len, aadlen, authlen)) != 0) in sshkey_xmss_encrypt_state() 989 u_int blocksize, encrypted_len, index; in sshkey_xmss_decrypt_state() local 1028 (r = sshbuf_get_u32(encoded, &encrypted_len)) != 0) in sshkey_xmss_decrypt_state() 1032 if (encrypted_len < blocksize || (encrypted_len % blocksize) != 0) { in sshkey_xmss_decrypt_state() 1038 sshbuf_len(encoded) - authlen < encrypted_len) { in sshkey_xmss_decrypt_state() 1050 if ((r = sshbuf_reserve(decrypted, aadlen + encrypted_len, &dp)) != 0 || in sshkey_xmss_decrypt_state() [all …]
|
H A D | sshkey.c | 3068 u_int blocksize, rounds, nkeys, encrypted_len, check1, check2; in private2_decrypt() local 3096 (r = sshbuf_get_u32(decoded, &encrypted_len)) != 0) in private2_decrypt() 3120 if (encrypted_len < blocksize || (encrypted_len % blocksize) != 0) { in private2_decrypt() 3146 sshbuf_len(decoded) - authlen < encrypted_len) { in private2_decrypt() 3152 if ((r = sshbuf_reserve(decrypted, encrypted_len, &dp)) != 0 || in private2_decrypt() 3157 encrypted_len, 0, authlen)) != 0) { in private2_decrypt() 3163 if ((r = sshbuf_consume(decoded, encrypted_len + authlen)) != 0) in private2_decrypt()
|
/freebsd/tools/regression/net80211/tkip/ |
H A D | test_tkip.c | 134 size_t encrypted_len; member 267 } else if (m->m_pkthdr.len != t->encrypted_len) { in runtest() 270 t->encrypted, t->encrypted_len); in runtest() 275 t->encrypted, t->encrypted_len); in runtest()
|
/freebsd/contrib/wpa/src/eap_common/ |
H A D | ikev2_common.h | 311 size_t encrypted_len; member 322 const u8 *encrypted, size_t encrypted_len,
|
H A D | ikev2_common.c | 323 payloads->encrypted_len = pdatalen; in ikev2_parse_payloads() 431 const u8 *encrypted, size_t encrypted_len, in ikev2_decrypt_payload() argument 461 if (encrypted_len < iv_len + 1 + integ_alg->hash_len) { in ikev2_decrypt_payload() 469 end = encrypted + encrypted_len; in ikev2_decrypt_payload()
|
/freebsd/contrib/wpa/src/eap_server/ |
H A D | ikev2.c | 449 size_t encrypted_len, u8 next_payload) in ikev2_process_sa_init_encr() argument 458 hdr, encrypted, encrypted_len, in ikev2_process_sa_init_encr() 499 pl->encrypted_len, in ikev2_process_sa_init() 722 pl->encrypted_len, &decrypted_len); in ikev2_process_sa_auth()
|
/freebsd/contrib/wpa/src/eap_peer/ |
H A D | ikev2.c | 658 pl->encrypted_len, &decrypted_len); in ikev2_process_sa_auth()
|