| /freebsd/crypto/krb5/src/lib/crypto/krb/ |
| H A D | encrypt_length.c | 32 size_t inputlen, size_t *length) in krb5_c_encrypt_length() argument 42 padding_len = krb5int_c_padding_length(ktp, inputlen); in krb5_c_encrypt_length() 45 *length = header_len + inputlen + padding_len + trailer_len; in krb5_c_encrypt_length()
|
| /freebsd/crypto/libecc/include/libecc/sig/ |
| H A D | fuzzing_ecdsa.h | 23 …RET int ecdsa_sign_raw(struct ec_sign_context *ctx, const u8 *input, u8 inputlen, u8 *sig, u8 sigl… 25 …_WARN_UNUSED_RET int ecdsa_verify_raw(struct ec_verify_context *ctx, const u8 *input, u8 inputlen);
|
| H A D | fuzzing_ecrdsa.h | 23 …ET int ecrdsa_sign_raw(struct ec_sign_context *ctx, const u8 *input, u8 inputlen, u8 *sig, u8 sigl… 25 …WARN_UNUSED_RET int ecrdsa_verify_raw(struct ec_verify_context *ctx, const u8 *input, u8 inputlen);
|
| H A D | fuzzing_ecgdsa.h | 23 …ET int ecgdsa_sign_raw(struct ec_sign_context *ctx, const u8 *input, u8 inputlen, u8 *sig, u8 sigl… 25 …WARN_UNUSED_RET int ecgdsa_verify_raw(struct ec_verify_context *ctx, const u8 *input, u8 inputlen);
|
| /freebsd/crypto/libecc/src/sig/ |
| H A D | fuzzing_ecgdsa.c | 41 int ecgdsa_sign_raw(struct ec_sign_context *ctx, const u8 *input, u8 inputlen, u8 *sig, u8 siglen, … in ecgdsa_sign_raw() argument 84 hsize = inputlen; in ecgdsa_sign_raw() 101 MUST_HAVE(((u32)inputlen <= sizeof(e_buf)), ret, err); in ecgdsa_sign_raw() 255 int ecgdsa_verify_raw(struct ec_verify_context *ctx, const u8 *input, u8 inputlen) in ecgdsa_verify_raw() argument 294 hsize = inputlen; in ecgdsa_verify_raw() 304 MUST_HAVE(((u32)inputlen <= sizeof(e_buf)), ret, err); in ecgdsa_verify_raw()
|
| H A D | fuzzing_ecdsa.c | 41 int ecdsa_sign_raw(struct ec_sign_context *ctx, const u8 *input, u8 inputlen, u8 *sig, u8 siglen, c… in ecdsa_sign_raw() argument 81 hsize = inputlen; in ecdsa_sign_raw() 99 MUST_HAVE(((u32)inputlen <= sizeof(hash)), ret, err); in ecdsa_sign_raw() 277 int ecdsa_verify_raw(struct ec_verify_context *ctx, const u8 *input, u8 inputlen) in ecdsa_verify_raw() argument 315 hsize = inputlen; in ecdsa_verify_raw() 327 MUST_HAVE(((u32)inputlen <= sizeof(hash)), ret, err); in ecdsa_verify_raw()
|
| H A D | fuzzing_ecrdsa.c | 82 int ecrdsa_sign_raw(struct ec_sign_context *ctx, const u8 *input, u8 inputlen, u8 *sig, u8 siglen, … in ecrdsa_sign_raw() argument 124 hsize = inputlen; in ecrdsa_sign_raw() 193 MUST_HAVE(((u32)inputlen <= sizeof(h_buf)), ret, err); in ecrdsa_sign_raw() 289 int ecrdsa_verify_raw(struct ec_verify_context *ctx, const u8 *input, u8 inputlen) in ecrdsa_verify_raw() argument 327 hsize = inputlen; in ecrdsa_verify_raw() 337 MUST_HAVE(((u32)inputlen <= sizeof(h_buf)), ret, err); in ecrdsa_verify_raw()
|
| /freebsd/crypto/heimdal/lib/krb5/ |
| H A D | mit_glue.c | 289 size_t inputlen, in krb5_c_encrypt_length() argument 305 *length = krb5_get_wrapped_length(context, crypto, inputlen); in krb5_c_encrypt_length()
|
| /freebsd/crypto/krb5/src/windows/include/ |
| H A D | loadfuncs-krb5.h | 225 size_t inputlen, size_t *length)
|
| /freebsd/crypto/openssl/test/ |
| H A D | evp_test.c | 2129 size_t inputlen; member 2197 return parse_bin(value, &kdata->input, &kdata->inputlen); in kem_test_parse() 2413 ret = decapsulate(t, kdata->ctx, kdata->op, kdata->input, kdata->inputlen, in kem_test_run()
|
| /freebsd/crypto/krb5/src/include/krb5/ |
| H A D | krb5.hin | 565 * @param [in] inputlen Length of the data to be encrypted 569 * @a inputlen bytes including padding, confounder, and checksum. 575 size_t inputlen, size_t *length);
|