Searched refs:decrypt_len (Results 1 – 7 of 7) sorted by relevance
| /src/crypto/openssl/util/perl/TLSProxy/ |
| H A D | Record.pm | 220 $decrypt_len, 232 $decrypt_len, 246 $decrypt_len, 259 $decrypt_len, 276 $decrypt_len, 290 decrypt_len => $decrypt_len, 324 $self->decrypt_len(length($data)); 373 $self->decrypt_len(length($data)); 440 sub decrypt_len subroutine 444 $self->{decrypt_len} = shift; [all …]
|
| H A D | Message.pm | 224 if (length($payload) + $record->decrypt_len >= $messlen) { 243 $recoffset = $record->decrypt_len; 244 push @message_frag_lens, $record->decrypt_len; 249 while ($record->decrypt_len > $recoffset) { 253 if ($record->decrypt_len - $recoffset < $msgheaderlen) { 283 if ($recoffset <= $record->decrypt_len) { 285 if ($record->decrypt_len - $recoffset >= $messlen) { 300 $record->decrypt_len - $recoffset); 301 $recoffset = $record->decrypt_len; 616 $rec->decrypt_len(length($rec->decrypt_data));
|
| H A D | Proxy.pm | 596 my $decrypt_len;
|
| /src/crypto/openssl/crypto/rsa/ |
| H A D | rsa_sign.c | 349 size_t decrypt_len, encoded_len = 0; in ossl_rsa_verify() local 366 decrypt_len = len; in ossl_rsa_verify() 375 if (decrypt_len != SSL_SIG_LENGTH) { in ossl_rsa_verify() 394 } else if (type == NID_mdc2 && decrypt_len == 2 + 16 in ossl_rsa_verify() 428 if (m_len > decrypt_len) { in ossl_rsa_verify() 432 m = decrypt_buf + decrypt_len - m_len; in ossl_rsa_verify() 439 if (encoded_len != decrypt_len in ossl_rsa_verify()
|
| /src/contrib/wpa/src/eap_server/ |
| H A D | eap_server_eke.c | 521 size_t decrypt_len; in eap_eke_process_commit() local 563 decrypt_len = sizeof(data->nonce_p); in eap_eke_process_commit() 565 data->nonce_p, &decrypt_len) < 0) { in eap_eke_process_commit() 570 if (decrypt_len < (size_t) data->sess.nonce_len) { in eap_eke_process_commit() 593 size_t decrypt_len; in eap_eke_process_confirm() local 612 decrypt_len = sizeof(nonce); in eap_eke_process_confirm() 614 nonce, &decrypt_len) < 0) { in eap_eke_process_confirm() 619 if (decrypt_len < (size_t) data->sess.nonce_len) { in eap_eke_process_confirm()
|
| /src/contrib/wpa/src/eap_peer/ |
| H A D | eap_eke.c | 510 size_t decrypt_len; in eap_eke_process_confirm() local 532 decrypt_len = sizeof(nonces); in eap_eke_process_confirm() 534 nonces, &decrypt_len) < 0) { in eap_eke_process_confirm() 539 if (decrypt_len != (size_t) 2 * data->sess.nonce_len) { in eap_eke_process_confirm()
|
| /src/crypto/openssl/test/recipes/ |
| H A D | 70-test_tls13hrr.t | 178 $hrr_record->decrypt_len(),
|