/third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/ |
H A D | tlsv1_server_read.c | 602 size_t outlen, outbuflen; in tls_process_client_key_exchange_rsa() local 623 outbuflen = outlen = end - pos; in tls_process_client_key_exchange_rsa() 624 out = os_malloc(outlen >= TLS_PRE_MASTER_SECRET_LEN ? in tls_process_client_key_exchange_rsa() 625 outlen : TLS_PRE_MASTER_SECRET_LEN); in tls_process_client_key_exchange_rsa() 652 out, &outlen) < 0) { in tls_process_client_key_exchange_rsa() 654 "PreMasterSecret (encr_len=%u outlen=%lu)", in tls_process_client_key_exchange_rsa() 655 encr_len, (unsigned long) outlen); in tls_process_client_key_exchange_rsa() 659 if (!use_random && outlen != TLS_PRE_MASTER_SECRET_LEN) { in tls_process_client_key_exchange_rsa() 661 (unsigned long) outlen); in tls_process_client_key_exchange_rsa() 673 outlen in tls_process_client_key_exchange_rsa() [all...] |
H A D | rsa.c | 260 * @outlen: Maximum size of the output buffer and used size on success 265 int crypto_rsa_exptmod(const u8 *in, size_t inlen, u8 *out, size_t *outlen, in crypto_rsa_exptmod() argument 330 if (modlen > *outlen) { in crypto_rsa_exptmod() 331 *outlen = modlen; in crypto_rsa_exptmod() 338 *outlen = modlen; in crypto_rsa_exptmod()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/ |
H A D | tlsv1_server_read.c | 602 size_t outlen, outbuflen; in tls_process_client_key_exchange_rsa() local 623 outbuflen = outlen = end - pos; in tls_process_client_key_exchange_rsa() 624 out = os_malloc(outlen >= TLS_PRE_MASTER_SECRET_LEN ? in tls_process_client_key_exchange_rsa() 625 outlen : TLS_PRE_MASTER_SECRET_LEN); in tls_process_client_key_exchange_rsa() 652 out, &outlen) < 0) { in tls_process_client_key_exchange_rsa() 654 "PreMasterSecret (encr_len=%u outlen=%lu)", in tls_process_client_key_exchange_rsa() 655 encr_len, (unsigned long) outlen); in tls_process_client_key_exchange_rsa() 659 if (!use_random && outlen != TLS_PRE_MASTER_SECRET_LEN) { in tls_process_client_key_exchange_rsa() 661 (unsigned long) outlen); in tls_process_client_key_exchange_rsa() 673 outlen in tls_process_client_key_exchange_rsa() [all...] |
H A D | rsa.c | 251 * @outlen: Maximum size of the output buffer and used size on success 256 int crypto_rsa_exptmod(const u8 *in, size_t inlen, u8 *out, size_t *outlen, in crypto_rsa_exptmod() argument 321 if (modlen > *outlen) { in crypto_rsa_exptmod() 322 *outlen = modlen; in crypto_rsa_exptmod() 329 *outlen = modlen; in crypto_rsa_exptmod()
|
/third_party/curl/lib/vauth/ |
H A D | spnego_gssapi.c | 205 * outlen [out] - The length of the output message. 210 char **outptr, size_t *outlen) in Curl_auth_create_spnego_message() 218 outptr, outlen); in Curl_auth_create_spnego_message() 228 if(!*outptr || !*outlen) { in Curl_auth_create_spnego_message() 209 Curl_auth_create_spnego_message(struct negotiatedata *nego, char **outptr, size_t *outlen) Curl_auth_create_spnego_message() argument
|
H A D | spnego_sspi.c | 302 * outlen [out] - The length of the output message. 307 char **outptr, size_t *outlen) in Curl_auth_create_spnego_message() 312 outlen); in Curl_auth_create_spnego_message() 313 if(!result && (!*outptr || !*outlen)) { in Curl_auth_create_spnego_message() 306 Curl_auth_create_spnego_message(struct negotiatedata *nego, char **outptr, size_t *outlen) Curl_auth_create_spnego_message() argument
|
/third_party/node/deps/openssl/openssl/crypto/evp/ |
H A D | ec_ctrl.c | 147 int EVP_PKEY_CTX_set_ecdh_kdf_outlen(EVP_PKEY_CTX *ctx, int outlen) in EVP_PKEY_CTX_set_ecdh_kdf_outlen() argument 150 size_t len = outlen; in EVP_PKEY_CTX_set_ecdh_kdf_outlen() 157 if (outlen <= 0) { in EVP_PKEY_CTX_set_ecdh_kdf_outlen()
|
/third_party/openssl/crypto/evp/ |
H A D | ec_ctrl.c | 147 int EVP_PKEY_CTX_set_ecdh_kdf_outlen(EVP_PKEY_CTX *ctx, int outlen) in EVP_PKEY_CTX_set_ecdh_kdf_outlen() argument 150 size_t len = outlen; in EVP_PKEY_CTX_set_ecdh_kdf_outlen() 157 if (outlen <= 0) { in EVP_PKEY_CTX_set_ecdh_kdf_outlen()
|
/third_party/NuttX/drivers/usbdev/gadget/ |
H A D | composite.c | 395 uint8_t *dataout, size_t outlen) in composite_classsetup() 406 (void)outlen; in composite_classsetup() 419 ret = CLASS_SETUP(priv->device[i].dev, dev, ctrl, dataout, outlen); in composite_classsetup() 434 ret = CLASS_SETUP(devobj->dev, dev, ctrl, dataout, outlen); in composite_classsetup() 451 const struct usb_device_request *ctrl, uint8_t *dataout, size_t outlen) in usb_composite_setup() 550 ret = CLASS_SETUP(usb_cdev->device[i].dev, dev, ctrl, dataout, outlen); in usb_composite_setup() 582 value = composite_classsetup(usb_cdev, dev, ctrl, dataout, outlen); in usb_composite_setup() 615 (void)composite_classsetup(usb_cdev, dev, ctrl, dataout, outlen); in usb_composite_setup() 392 composite_classsetup(struct composite_dev_s *priv, struct usbdev_s *dev, const struct usb_device_request *ctrl, uint8_t *dataout, size_t outlen) composite_classsetup() argument 450 usb_composite_setup(struct usbdevclass_driver_s *driver, struct usbdev_s *dev, const struct usb_device_request *ctrl, uint8_t *dataout, size_t outlen) usb_composite_setup() argument
|
H A D | dfu.c | 121 FAR uint8_t *dataout, size_t outlen); 238 FAR uint8_t *dataout, size_t outlen) in usbclass_setup() 247 (void)outlen; in usbclass_setup() 235 usbclass_setup(FAR struct usbdevclass_driver_s *driver, FAR struct usbdev_s *dev, FAR const struct usb_device_request *ctrl, FAR uint8_t *dataout, size_t outlen) usbclass_setup() argument
|
/third_party/node/deps/openssl/openssl/providers/implementations/kdfs/ |
H A D | hkdf.c | 250 * out buffer of size *outlen. 251 * If out is NULL then outlen is used to return the required buffer size. 253 static int setinfo_fromparams(const OSSL_PARAM *p, unsigned char *out, size_t *outlen) in setinfo_fromparams() argument 262 if (!WPACKET_init_static_len(&pkt, out, *outlen, 0)) in setinfo_fromparams() 274 if (!WPACKET_get_total_written(&pkt, outlen) in setinfo_fromparams() 582 * secret |outlen| bytes long and store it in the location pointed to be |out|. 590 unsigned char *out, size_t outlen) in prov_tls13_hkdf_expand() 603 || !WPACKET_put_bytes_u16(&pkt, outlen) in prov_tls13_hkdf_expand() 616 out, outlen); in prov_tls13_hkdf_expand() 629 unsigned char *out, size_t outlen) in prov_tls13_hkdf_generate_secret() 585 prov_tls13_hkdf_expand(const EVP_MD *md, const unsigned char *key, size_t keylen, const unsigned char *prefix, size_t prefixlen, const unsigned char *label, size_t labellen, const unsigned char *data, size_t datalen, unsigned char *out, size_t outlen) prov_tls13_hkdf_expand() argument 619 prov_tls13_hkdf_generate_secret(OSSL_LIB_CTX *libctx, const EVP_MD *md, const unsigned char *prevsecret, size_t prevsecretlen, const unsigned char *insecret, size_t insecretlen, const unsigned char *prefix, size_t prefixlen, const unsigned char *label, size_t labellen, unsigned char *out, size_t outlen) prov_tls13_hkdf_generate_secret() argument [all...] |
/third_party/openssl/providers/implementations/kdfs/ |
H A D | hkdf.c | 250 * out buffer of size *outlen. 251 * If out is NULL then outlen is used to return the required buffer size. 253 static int setinfo_fromparams(const OSSL_PARAM *p, unsigned char *out, size_t *outlen) in setinfo_fromparams() argument 262 if (!WPACKET_init_static_len(&pkt, out, *outlen, 0)) in setinfo_fromparams() 274 if (!WPACKET_get_total_written(&pkt, outlen) in setinfo_fromparams() 582 * secret |outlen| bytes long and store it in the location pointed to be |out|. 590 unsigned char *out, size_t outlen) in prov_tls13_hkdf_expand() 603 || !WPACKET_put_bytes_u16(&pkt, outlen) in prov_tls13_hkdf_expand() 616 out, outlen); in prov_tls13_hkdf_expand() 629 unsigned char *out, size_t outlen) in prov_tls13_hkdf_generate_secret() 585 prov_tls13_hkdf_expand(const EVP_MD *md, const unsigned char *key, size_t keylen, const unsigned char *prefix, size_t prefixlen, const unsigned char *label, size_t labellen, const unsigned char *data, size_t datalen, unsigned char *out, size_t outlen) prov_tls13_hkdf_expand() argument 619 prov_tls13_hkdf_generate_secret(OSSL_LIB_CTX *libctx, const EVP_MD *md, const unsigned char *prevsecret, size_t prevsecretlen, const unsigned char *insecret, size_t insecretlen, const unsigned char *prefix, size_t prefixlen, const unsigned char *label, size_t labellen, unsigned char *out, size_t outlen) prov_tls13_hkdf_generate_secret() argument [all...] |
/third_party/openssl/test/ |
H A D | ssl_old_test.c | 114 static int cb_client_npn(SSL *s, unsigned char **out, unsigned char *outlen, in cb_client_npn() argument 124 *outlen = sizeof(NEXT_PROTO_STRING) - 2; in cb_client_npn() 250 * outlen: (output) set to the length of the resulting buffer on success. 255 static unsigned char *next_protos_parse(size_t *outlen, in next_protos_parse() argument 282 *outlen = len + 1; in next_protos_parse() 287 unsigned char *outlen, const unsigned char *in, in cb_server_alpn() 302 ((unsigned char **)out, outlen, protos, protos_len, in, in cb_server_alpn() 312 alpn_selected = OPENSSL_malloc(*outlen); in cb_server_alpn() 318 memcpy(alpn_selected, *out, *outlen); in cb_server_alpn() 444 size_t *outlen, in in custom_ext_0_cli_add_cb() 286 cb_server_alpn(SSL *s, const unsigned char **out, unsigned char *outlen, const unsigned char *in, unsigned int inlen, void *arg) cb_server_alpn() argument 442 custom_ext_0_cli_add_cb(SSL *s, unsigned int ext_type, const unsigned char **out, size_t *outlen, int *al, void *arg) custom_ext_0_cli_add_cb() argument 458 custom_ext_1_cli_add_cb(SSL *s, unsigned int ext_type, const unsigned char **out, size_t *outlen, int *al, void *arg) custom_ext_1_cli_add_cb() argument 476 custom_ext_2_cli_add_cb(SSL *s, unsigned int ext_type, const unsigned char **out, size_t *outlen, int *al, void *arg) custom_ext_2_cli_add_cb() argument 498 custom_ext_3_cli_add_cb(SSL *s, unsigned int ext_type, const unsigned char **out, size_t *outlen, int *al, void *arg) custom_ext_3_cli_add_cb() argument 535 custom_ext_0_srv_add_cb(SSL *s, unsigned int ext_type, const unsigned char **out, size_t *outlen, int *al, void *arg) custom_ext_0_srv_add_cb() argument 558 custom_ext_1_srv_add_cb(SSL *s, unsigned int ext_type, const unsigned char **out, size_t *outlen, int *al, void *arg) custom_ext_1_srv_add_cb() argument 579 custom_ext_2_srv_add_cb(SSL *s, unsigned int ext_type, const unsigned char **out, size_t *outlen, int *al, void *arg) custom_ext_2_srv_add_cb() argument 602 custom_ext_3_srv_add_cb(SSL *s, unsigned int ext_type, const unsigned char **out, size_t *outlen, int *al, void *arg) custom_ext_3_srv_add_cb() argument [all...] |
/third_party/node/deps/openssl/openssl/providers/implementations/rands/ |
H A D | drbg.c | 189 unsigned char *out, size_t outlen) in ossl_drbg_clear_seed() 191 OPENSSL_secure_clear_free(out, outlen); in ossl_drbg_clear_seed() 248 static void cleanup_entropy(PROV_DRBG *drbg, unsigned char *out, size_t outlen) in cleanup_entropy() argument 252 ossl_crngt_cleanup_entropy(drbg, out, outlen); in cleanup_entropy() 254 ossl_prov_cleanup_entropy(drbg->provctx, out, outlen); in cleanup_entropy() 259 drbg->parent_clear_seed(drbg->parent, out, outlen); in cleanup_entropy() 606 * Generate |outlen| bytes into the buffer at |out|. Reseed if we need 615 int ossl_prov_drbg_generate(PROV_DRBG *drbg, unsigned char *out, size_t outlen, in ossl_prov_drbg_generate() argument 643 if (outlen > drbg->max_request) { in ossl_prov_drbg_generate() 683 if (!drbg->generate(drbg, out, outlen, adi in ossl_prov_drbg_generate() 188 ossl_drbg_clear_seed(ossl_unused void *vdrbg, unsigned char *out, size_t outlen) ossl_drbg_clear_seed() argument 765 ossl_rand_drbg_new(void *provctx, void *parent, const OSSL_DISPATCH *p_dispatch, int (*dnew)(PROV_DRBG *ctx), int (*instantiate)(PROV_DRBG *drbg, const unsigned char *entropy, size_t entropylen, const unsigned char *nonce, size_t noncelen, const unsigned char *pers, size_t perslen), int (*uninstantiate)(PROV_DRBG *ctx), int (*reseed)(PROV_DRBG *drbg, const unsigned char *ent, size_t ent_len, const unsigned char *adin, size_t adin_len), int (*generate)(PROV_DRBG *, unsigned char *out, size_t outlen, const unsigned char *adin, size_t adin_len)) ossl_rand_drbg_new() argument [all...] |
H A D | test_rng.c | 102 static int test_rng_generate(void *vtest, unsigned char *out, size_t outlen, in test_rng_generate() argument 108 if (strength > t->strength || t->entropy_len - t->entropy_pos < outlen) in test_rng_generate() 110 memcpy(out, t->entropy + t->entropy_pos, outlen); in test_rng_generate() 111 t->entropy_pos += outlen; in test_rng_generate()
|
/third_party/openssl/providers/implementations/rands/ |
H A D | drbg.c | 189 unsigned char *out, size_t outlen) in ossl_drbg_clear_seed() 191 OPENSSL_secure_clear_free(out, outlen); in ossl_drbg_clear_seed() 248 static void cleanup_entropy(PROV_DRBG *drbg, unsigned char *out, size_t outlen) in cleanup_entropy() argument 252 ossl_crngt_cleanup_entropy(drbg, out, outlen); in cleanup_entropy() 254 ossl_prov_cleanup_entropy(drbg->provctx, out, outlen); in cleanup_entropy() 259 drbg->parent_clear_seed(drbg->parent, out, outlen); in cleanup_entropy() 606 * Generate |outlen| bytes into the buffer at |out|. Reseed if we need 615 int ossl_prov_drbg_generate(PROV_DRBG *drbg, unsigned char *out, size_t outlen, in ossl_prov_drbg_generate() argument 643 if (outlen > drbg->max_request) { in ossl_prov_drbg_generate() 683 if (!drbg->generate(drbg, out, outlen, adi in ossl_prov_drbg_generate() 188 ossl_drbg_clear_seed(ossl_unused void *vdrbg, unsigned char *out, size_t outlen) ossl_drbg_clear_seed() argument 765 ossl_rand_drbg_new(void *provctx, void *parent, const OSSL_DISPATCH *p_dispatch, int (*dnew)(PROV_DRBG *ctx), int (*instantiate)(PROV_DRBG *drbg, const unsigned char *entropy, size_t entropylen, const unsigned char *nonce, size_t noncelen, const unsigned char *pers, size_t perslen), int (*uninstantiate)(PROV_DRBG *ctx), int (*reseed)(PROV_DRBG *drbg, const unsigned char *ent, size_t ent_len, const unsigned char *adin, size_t adin_len), int (*generate)(PROV_DRBG *, unsigned char *out, size_t outlen, const unsigned char *adin, size_t adin_len)) ossl_rand_drbg_new() argument [all...] |
H A D | test_rng.c | 102 static int test_rng_generate(void *vtest, unsigned char *out, size_t outlen, in test_rng_generate() argument 108 if (strength > t->strength || t->entropy_len - t->entropy_pos < outlen) in test_rng_generate() 110 memcpy(out, t->entropy + t->entropy_pos, outlen); in test_rng_generate() 111 t->entropy_pos += outlen; in test_rng_generate()
|
/third_party/openssl/ohos_lite/include/crypto/ |
H A D | rand.h | 50 unsigned char *out, size_t outlen); 55 unsigned char *out, size_t outlen);
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
H A D | sha1-tlsprf.c | 24 * @outlen: Number of bytes of key to generate 31 const u8 *seed, size_t seed_len, u8 *out, size_t outlen) in tls_prf_sha1_md5() 76 for (i = 0; i < outlen; i++) { in tls_prf_sha1_md5() 30 tls_prf_sha1_md5(const u8 *secret, size_t secret_len, const char *label, const u8 *seed, size_t seed_len, u8 *out, size_t outlen) tls_prf_sha1_md5() argument
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
H A D | sha1-tlsprf.c | 24 * @outlen: Number of bytes of key to generate 31 const u8 *seed, size_t seed_len, u8 *out, size_t outlen) in tls_prf_sha1_md5() 76 for (i = 0; i < outlen; i++) { in tls_prf_sha1_md5() 30 tls_prf_sha1_md5(const u8 *secret, size_t secret_len, const char *label, const u8 *seed, size_t seed_len, u8 *out, size_t outlen) tls_prf_sha1_md5() argument
|
/third_party/node/deps/openssl/openssl/ssl/statem/ |
H A D | extensions_cust.c | 34 size_t *outlen, X509 *x, size_t chainidx, in custom_ext_add_old_cb_wrap() 42 return add_cb_wrap->add_cb(s, ext_type, out, outlen, al, in custom_ext_add_old_cb_wrap() 183 size_t outlen = 0; in custom_ext_add() local 208 &outlen, x, chainidx, &al, in custom_ext_add() 221 || (outlen > 0 && !WPACKET_memcpy(pkt, out, outlen)) in custom_ext_add() 31 custom_ext_add_old_cb_wrap(SSL *s, unsigned int ext_type, unsigned int context, const unsigned char **out, size_t *outlen, X509 *x, size_t chainidx, int *al, void *add_arg) custom_ext_add_old_cb_wrap() argument
|
/third_party/openssl/ssl/statem/ |
H A D | extensions_cust.c | 34 size_t *outlen, X509 *x, size_t chainidx, in custom_ext_add_old_cb_wrap() 42 return add_cb_wrap->add_cb(s, ext_type, out, outlen, al, in custom_ext_add_old_cb_wrap() 183 size_t outlen = 0; in custom_ext_add() local 208 &outlen, x, chainidx, &al, in custom_ext_add() 221 || (outlen > 0 && !WPACKET_memcpy(pkt, out, outlen)) in custom_ext_add() 31 custom_ext_add_old_cb_wrap(SSL *s, unsigned int ext_type, unsigned int context, const unsigned char **out, size_t *outlen, X509 *x, size_t chainidx, int *al, void *add_arg) custom_ext_add_old_cb_wrap() argument
|
/third_party/nghttp2/tests/ |
H A D | nghttp2_buf_test.c | 194 ssize_t outlen; in test_nghttp2_bufs_remove() local 219 outlen = nghttp2_bufs_remove(&bufs, &out); in test_nghttp2_bufs_remove() 220 CU_ASSERT(11 == outlen); in test_nghttp2_bufs_remove() 222 CU_ASSERT(0 == memcmp("hello world", out, (size_t)outlen)); in test_nghttp2_bufs_remove()
|
/third_party/node/deps/base64/base64/bin/ |
H A D | base64.c | 379 size_t outlen, len = find_newline(start, avail); in decode() local 390 outbuf, &outlen) == 0) { in decode() 397 outbuf += outlen; in decode() 398 ototal += outlen; in decode()
|
/third_party/node/deps/openssl/openssl/providers/implementations/macs/ |
H A D | gmac_prov.c | 131 int outlen; in gmac_update() local 137 if (!EVP_EncryptUpdate(ctx, NULL, &outlen, data, INT_MAX)) in gmac_update() 142 return EVP_EncryptUpdate(ctx, NULL, &outlen, data, datalen); in gmac_update()
|