Searched refs:decrypt_len (Results 1 – 9 of 9) sorted by relevance
/netbsd-src/crypto/external/bsd/openssl.old/dist/crypto/rsa/ |
H A D | rsa_sign.c | 128 int decrypt_len, ret = 0, encoded_len = 0; in int_rsa_verify() local 143 decrypt_len = RSA_public_decrypt((int)siglen, sigbuf, decrypt_buf, rsa, in int_rsa_verify() 145 if (decrypt_len <= 0) in int_rsa_verify() 154 if (decrypt_len != SSL_SIG_LENGTH) { in int_rsa_verify() 173 } else if (type == NID_mdc2 && decrypt_len == 2 + 16 in int_rsa_verify() 207 if (m_len > (size_t)decrypt_len) { in int_rsa_verify() 211 m = decrypt_buf + decrypt_len - m_len; in int_rsa_verify() 218 if (encoded_len != decrypt_len in int_rsa_verify()
|
/netbsd-src/crypto/external/bsd/openssl.old/dist/util/perl/TLSProxy/ |
H A D | Record.pm | 173 $decrypt_len, 184 decrypt_len => $decrypt_len, 218 $self->decrypt_len(length($data)); 267 $self->decrypt_len(length($data)); 325 sub decrypt_len subroutine 329 $self->{decrypt_len} = shift; 331 return $self->{decrypt_len};
|
H A D | Message.pm | 209 if (length($payload) + $record->decrypt_len >= $messlen) { 222 $recoffset = $record->decrypt_len; 223 push @message_frag_lens, $record->decrypt_len; 228 while ($record->decrypt_len > $recoffset) { 230 if ($record->decrypt_len - $recoffset < 4) { 247 if ($recoffset <= $record->decrypt_len) { 249 if ($record->decrypt_len - $recoffset >= $messlen) { 263 $record->decrypt_len - $recoffset); 264 $recoffset = $record->decrypt_len; 492 $rec->decrypt_len(length($rec->decrypt_data));
|
H A D | Proxy.pm | 470 my $decrypt_len;
|
/netbsd-src/crypto/external/bsd/openssl/dist/util/perl/TLSProxy/ |
H A D | Record.pm | 173 $decrypt_len, 184 decrypt_len => $decrypt_len, 218 $self->decrypt_len(length($data)); 267 $self->decrypt_len(length($data)); 325 sub decrypt_len subroutine 329 $self->{decrypt_len} = shift; 331 return $self->{decrypt_len};
|
/netbsd-src/crypto/external/bsd/openssl/dist/crypto/rsa/ |
H A D | rsa_sign.c | 336 size_t decrypt_len, encoded_len = 0; in ossl_rsa_verify() local 355 decrypt_len = len; in ossl_rsa_verify() 364 if (decrypt_len != SSL_SIG_LENGTH) { in ossl_rsa_verify() 383 } else if (type == NID_mdc2 && decrypt_len == 2 + 16 in ossl_rsa_verify() 417 if (m_len > decrypt_len) { in ossl_rsa_verify() 421 m = decrypt_buf + decrypt_len - m_len; in ossl_rsa_verify() 428 if (encoded_len != decrypt_len in ossl_rsa_verify()
|
/netbsd-src/crypto/external/bsd/openssl.old/dist/test/recipes/ |
H A D | 70-test_tls13hrr.t | 119 $hrr_record->decrypt_len(),
|
/netbsd-src/crypto/external/bsd/openssl/dist/test/recipes/ |
H A D | 70-test_tls13hrr.t | 146 $hrr_record->decrypt_len(),
|
/netbsd-src/crypto/external/bsd/openssl.old/dist/ssl/statem/ |
H A D | statem_srvr.c | 3001 int decrypt_len; in tls_process_cke_rsa() local 3067 decrypt_len = (int)RSA_private_decrypt((int)PACKET_remaining(&enc_premaster), in tls_process_cke_rsa() 3070 if (decrypt_len < 0) { in tls_process_cke_rsa() 3083 if (decrypt_len < 11 + SSL_MAX_MASTER_KEY_LENGTH) { in tls_process_cke_rsa() 3089 padding_len = decrypt_len - SSL_MAX_MASTER_KEY_LENGTH; in tls_process_cke_rsa()
|