/barrelfish-master/lib/tommath/ |
H A D | bn_mp_to_signed_bin_n.c | 19 int mp_to_signed_bin_n (mp_int * a, unsigned char *b, unsigned long *outlen) argument 21 if (*outlen < (unsigned long)mp_signed_bin_size(a)) { 24 *outlen = mp_signed_bin_size(a);
|
H A D | bn_mp_to_unsigned_bin_n.c | 19 int mp_to_unsigned_bin_n (mp_int * a, unsigned char *b, unsigned long *outlen) argument 21 if (*outlen < (unsigned long)mp_unsigned_bin_size(a)) { 24 *outlen = mp_unsigned_bin_size(a);
|
/barrelfish-master/lib/openssl-1.0.0d/crypto/ecdh/ |
H A D | ech_key.c | 75 int ECDH_compute_key(void *out, size_t outlen, const EC_POINT *pub_key, argument 77 void *(*KDF)(const void *in, size_t inlen, void *out, size_t *outlen)) 82 return ecdh->meth->compute_key(out, outlen, pub_key, eckey, KDF);
|
H A D | ech_ossl.c | 84 void *(*KDF)(const void *in, size_t inlen, void *out, size_t *outlen)); 108 static int ecdh_compute_key(void *out, size_t outlen, const EC_POINT *pub_key, argument 110 void *(*KDF)(const void *in, size_t inlen, void *out, size_t *outlen)) 121 if (outlen > INT_MAX) 191 if (KDF(buf, buflen, out, &outlen) == NULL) 196 ret = outlen; 201 if (outlen > buflen) 202 outlen = buflen; 203 memcpy(out, buf, outlen); 204 ret = outlen; [all...] |
H A D | ech_locl.h | 68 int (*compute_key)(void *key, size_t outlen, const EC_POINT *pub_key, EC_KEY *ecdh, 69 void *(*KDF)(const void *in, size_t inlen, void *out, size_t *outlen));
|
H A D | ecdh.h | 94 int ECDH_compute_key(void *out, size_t outlen, const EC_POINT *pub_key, EC_KEY *ecdh, 95 void *(*KDF)(const void *in, size_t inlen, void *out, size_t *outlen));
|
H A D | ecdhtest.c | 109 static void *KDF1_SHA1(const void *in, size_t inlen, void *out, size_t *outlen) argument 112 if (*outlen < SHA_DIGEST_LENGTH) 115 *outlen = SHA_DIGEST_LENGTH;
|
/barrelfish-master/usr/drivers/solarflare/ |
H A D | mcdi_rpc.c | 44 uint8_t *out, uint32_t outlen, uint32_t *outlen_actual, 110 // outlen computation from driver 111 outlen = (outlen < rlen+3) ? outlen : rlen+3; 112 outlen = outlen & ~0x3; 118 memset(&out, outlen, 0); 120 for (int i = 0; i < outlen; i+=4 ){ 43 mcdi_rpc(unsigned cmd, const uint8_t *in, uint32_t inlen, uint8_t *out, uint32_t outlen, uint32_t *outlen_actual, bool port, sfn5122f_t *d) argument
|
H A D | mcdi_rpc.h | 135 uint8_t *out, uint32_t outlen, uint32_t *outlen_actual,
|
/barrelfish-master/lib/openssl-1.0.0d/crypto/pkcs12/ |
H A D | p12_decr.c | 76 int outlen, i; local 93 outlen = i; 100 outlen += i; 101 if (datalen) *datalen = outlen; 119 int outlen; local 122 &out, &outlen, 0)) { 135 fwrite (p, 1, outlen, op); 139 ret = ASN1_item_d2i(NULL, &p, outlen, it); 140 if (zbuf) OPENSSL_cleanse(out, outlen);
|
/barrelfish-master/lib/openssl-1.0.0d/crypto/asn1/ |
H A D | a_strex.c | 178 int i, outlen, len; local 183 outlen = 0; 225 outlen += len; 230 outlen += len; 233 return outlen; 269 int outlen, der_len; local 274 outlen = do_hex_dump(io_ch, arg, str->data, str->length); 275 if(outlen < 0) return -1; 276 return outlen + 1; 285 outlen 316 int outlen, len; local 402 int outlen, len; local [all...] |
H A D | a_mbstr.c | 96 int outform, outlen = 0; local 214 outlen = nchar; 219 outlen = nchar << 1; 224 outlen = nchar << 2; 229 outlen = 0; 230 traverse_string(in, len, inform, out_utf8, &outlen); 234 if(!(p = OPENSSL_malloc(outlen + 1))) { 239 dest->length = outlen; 241 p[outlen] = 0; 299 int *outlen; local [all...] |
/barrelfish-master/include/openssl/ |
H A D | ecdh.h | 94 int ECDH_compute_key(void *out, size_t outlen, const EC_POINT *pub_key, EC_KEY *ecdh, 95 void *(*KDF)(const void *in, size_t inlen, void *out, size_t *outlen));
|
/barrelfish-master/lib/openssl-1.0.0d/crypto/rsa/ |
H A D | rsa_oaep.c | 187 long i, outlen = 0; local 197 for (i = 0; outlen < len; i++) 206 if (outlen + mdlen <= len) 208 EVP_DigestFinal_ex(&c, mask + outlen, NULL); 209 outlen += mdlen; 214 memcpy(mask + outlen, md, len - outlen); 215 outlen = len;
|
H A D | rsa_pmeth.c | 320 unsigned char *out, size_t *outlen, 329 *outlen = ret; 334 unsigned char *out, size_t *outlen, 343 *outlen = ret; 319 pkey_rsa_encrypt(EVP_PKEY_CTX *ctx, unsigned char *out, size_t *outlen, const unsigned char *in, size_t inlen) argument 333 pkey_rsa_decrypt(EVP_PKEY_CTX *ctx, unsigned char *out, size_t *outlen, const unsigned char *in, size_t inlen) argument
|
/barrelfish-master/lib/openssl-1.0.0d/crypto/pem/ |
H A D | pvkfmt.c | 488 int outlen, noinc = 0; local 503 outlen = 16 + blob_length(bitlen, 506 return outlen; 511 p = OPENSSL_malloc(outlen); 532 *out += outlen; 533 return outlen; 539 int outlen, wrlen; local 540 outlen = do_i2b(&tmp, pk, ispub); 541 if (outlen < 0) 543 wrlen = BIO_write(out, tmp, outlen); 842 int outlen = 24, pklen; local 922 int outlen, wrlen; local [all...] |
/barrelfish-master/lib/openssl-1.0.0d/demos/engines/rsaref/ |
H A D | rsaref.c | 401 int i,outlen= -1; local 406 if ((i=RSAPrivateDecrypt(to,(unsigned int *)&outlen,(unsigned char *)from,len,&RSAkey)) != 0) 409 outlen= -1; 413 return(outlen); 419 int i,outlen= -1; local 429 if ((i=RSAPrivateEncrypt(to,(unsigned int *)&outlen,(unsigned char *)from,len,&RSAkey)) != 0) 432 outlen= -1; 436 return(outlen); 442 int i,outlen= -1; local 447 if ((i=RSAPublicDecrypt(to,(unsigned int *)&outlen,(unsigne 460 int outlen= -1; local [all...] |
/barrelfish-master/lib/openssl-1.0.0d/engines/ccgost/ |
H A D | gost_lcl.h | 170 int pkey_GOST94cp_encrypt(EVP_PKEY_CTX *ctx, unsigned char *out, size_t *outlen, const unsigned char* key, size_t key_len ); 172 int pkey_GOST94cp_decrypt(EVP_PKEY_CTX *ctx, unsigned char *out, size_t *outlen, const unsigned char* in, size_t in_len ); 174 int pkey_GOST01cp_encrypt(EVP_PKEY_CTX *ctx, unsigned char *out, size_t *outlen, const unsigned char* key, size_t key_len ); 176 int pkey_GOST01cp_decrypt(EVP_PKEY_CTX *ctx, unsigned char *out, size_t *outlen, const unsigned char* in, size_t in_len );
|
H A D | gost94_keyx.c | 88 int pkey_GOST94cp_encrypt(EVP_PKEY_CTX *ctx, unsigned char *out, size_t *outlen, const unsigned char* key, size_t key_len ) argument 179 *outlen = i2d_GOST_KEY_TRANSPORT(gkt,out?&out:NULL); 180 if (*outlen <= 0)
|
/barrelfish-master/lib/barrelfish/ |
H A D | pmap_serialise.c | 37 size_t outlen, size_t *outpos) 47 if (*outpos >= outlen) { 97 err = serialise_tree(depth + 1, pmap, &c->v, out, outlen, outpos); 120 size_t outlen = buflen / sizeof(struct serial_entry); local 123 err = serialise_tree(0, pmap, pmap_get_vroot(pmap), out, outlen, &outpos); 34 serialise_tree(int depth, struct pmap *pmap, struct vnode_public *v, struct serial_entry *out, size_t outlen, size_t *outpos) argument
|
/barrelfish-master/lib/openssl-1.0.0d/crypto/evp/ |
H A D | pmeth_fn.c | 211 unsigned char *out, size_t *outlen, 225 M_check_autoarg(ctx, out, outlen, EVP_F_EVP_PKEY_ENCRYPT) 226 return ctx->pmeth->encrypt(ctx, out, outlen, in, inlen); 248 unsigned char *out, size_t *outlen, 262 M_check_autoarg(ctx, out, outlen, EVP_F_EVP_PKEY_DECRYPT) 263 return ctx->pmeth->decrypt(ctx, out, outlen, in, inlen); 210 EVP_PKEY_encrypt(EVP_PKEY_CTX *ctx, unsigned char *out, size_t *outlen, const unsigned char *in, size_t inlen) argument 247 EVP_PKEY_decrypt(EVP_PKEY_CTX *ctx, unsigned char *out, size_t *outlen, const unsigned char *in, size_t inlen) argument
|
/barrelfish-master/lib/lwip2/src/netif/ppp/ |
H A D | upap.c | 532 int outlen; local 534 outlen = UPAP_HEADERLEN + 2 * sizeof (u_char) + 536 p = pbuf_alloc(PBUF_RAW, (u16_t)(PPP_HDRLEN +outlen), PPP_CTRL_PBUF_TYPE); 549 PUTSHORT(outlen, outp); 570 int outlen; local 572 outlen = UPAP_HEADERLEN + sizeof (u_char) + msglen; 573 p = pbuf_alloc(PBUF_RAW, (u16_t)(PPP_HDRLEN +outlen), PPP_CTRL_PBUF_TYPE); 586 PUTSHORT(outlen, outp);
|
/barrelfish-master/include/lwip2/netif/ppp/ |
H A D | upap.c | 532 int outlen; local 534 outlen = UPAP_HEADERLEN + 2 * sizeof (u_char) + 536 p = pbuf_alloc(PBUF_RAW, (u16_t)(PPP_HDRLEN +outlen), PPP_CTRL_PBUF_TYPE); 549 PUTSHORT(outlen, outp); 570 int outlen; local 572 outlen = UPAP_HEADERLEN + sizeof (u_char) + msglen; 573 p = pbuf_alloc(PBUF_RAW, (u16_t)(PPP_HDRLEN +outlen), PPP_CTRL_PBUF_TYPE); 586 PUTSHORT(outlen, outp);
|
/barrelfish-master/lib/openssl-1.0.0d/crypto/ec/ |
H A D | ec_pmeth.c | 173 size_t outlen; local 191 /* NB: unlike PKS#3 DH, if *outlen is less than maximum size this is 195 outlen = *keylen; 197 ret = ECDH_compute_key(key, outlen, pubkey, ctx->pkey->pkey.ec, 0);
|
/barrelfish-master/lib/openssl-1.0.0d/test/ |
H A D | ecdhtest.c | 109 static void *KDF1_SHA1(const void *in, size_t inlen, void *out, size_t *outlen) argument 112 if (*outlen < SHA_DIGEST_LENGTH) 115 *outlen = SHA_DIGEST_LENGTH;
|