Home
last modified time | relevance | path

Searched refs:decrypt_len (Results 1 – 14 of 14) sorted by relevance

/third_party/openssl/crypto/rsa/
Drsa_sign.c128 int decrypt_len, ret = 0, encoded_len = 0; in int_rsa_verify() local
143 decrypt_len = RSA_public_decrypt((int)siglen, sigbuf, decrypt_buf, rsa, in int_rsa_verify()
145 if (decrypt_len <= 0) in int_rsa_verify()
154 if (decrypt_len != SSL_SIG_LENGTH) { in int_rsa_verify()
173 } else if (type == NID_mdc2 && decrypt_len == 2 + 16 in int_rsa_verify()
207 if (m_len > (size_t)decrypt_len) { in int_rsa_verify()
211 m = decrypt_buf + decrypt_len - m_len; in int_rsa_verify()
218 if (encoded_len != decrypt_len in int_rsa_verify()
/third_party/openssl/util/perl/TLSProxy/
DRecord.pm173 $decrypt_len,
184 decrypt_len => $decrypt_len,
218 $self->decrypt_len(length($data));
267 $self->decrypt_len(length($data));
325 sub decrypt_len subroutine
329 $self->{decrypt_len} = shift;
331 return $self->{decrypt_len};
DMessage.pm209 if (length($payload) + $record->decrypt_len >= $messlen) {
222 $recoffset = $record->decrypt_len;
223 push @message_frag_lens, $record->decrypt_len;
228 while ($record->decrypt_len > $recoffset) {
230 if ($record->decrypt_len - $recoffset < 4) {
247 if ($recoffset <= $record->decrypt_len) {
249 if ($record->decrypt_len - $recoffset >= $messlen) {
263 $record->decrypt_len - $recoffset);
264 $recoffset = $record->decrypt_len;
492 $rec->decrypt_len(length($rec->decrypt_data));
DProxy.pm470 my $decrypt_len;
/third_party/mindspore/mindspore/core/utils/
Dcrypto.cc76 std::unique_ptr<Byte[]> Decrypt(size_t *decrypt_len, const std::string &encrypt_data_path, const By… in Decrypt() argument
83 std::unique_ptr<Byte[]> Decrypt(size_t *decrypt_len, const Byte *model_data, size_t data_size, cons… in Decrypt() argument
349 std::unique_ptr<Byte[]> Decrypt(size_t *decrypt_len, const std::string &encrypt_data_path, const By… in Decrypt() argument
369 *decrypt_len = 0; in Decrypt()
389 size_t capacity = std::min(file_size - *decrypt_len, SECUREC_MEM_MAX_LEN); in Decrypt()
390 auto ret = memcpy_s(decrypt_data.get() + *decrypt_len, capacity, decrypt_block_buf.data(), in Decrypt()
395 *decrypt_len += static_cast<size_t>(decrypt_block_len); in Decrypt()
401 std::unique_ptr<Byte[]> Decrypt(size_t *decrypt_len, const Byte *model_data, size_t data_size, cons… in Decrypt() argument
413 *decrypt_len = 0; in Decrypt()
437 size_t capacity = std::min(data_size - *decrypt_len, SECUREC_MEM_MAX_LEN); in Decrypt()
[all …]
Dcrypto.h31 std::unique_ptr<Byte[]> Decrypt(size_t *decrypt_len, const std::string &encrypt_data_path, const By…
33 std::unique_ptr<Byte[]> Decrypt(size_t *decrypt_len, const Byte *model_data, size_t data_size, cons…
/third_party/mindspore/mindspore/ccsrc/fl/armour/secure_protocol/
Dencrypt.cc160 uint8_t *decrypt_data, int *decrypt_len) const { in evp_aes_decrypt()
210 *decrypt_len = out_len; in evp_aes_decrypt()
211 ret = EVP_DecryptFinal_ex(ctx, decrypt_data + *decrypt_len, &out_len); in evp_aes_decrypt()
216 *decrypt_len += out_len; in evp_aes_decrypt()
Dencrypt.h54 uint8_t *decrypt_data, int *decrypt_len) const;
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/
Deap_server_eke.c520 size_t decrypt_len; in eap_eke_process_commit() local
562 decrypt_len = sizeof(data->nonce_p); in eap_eke_process_commit()
564 data->nonce_p, &decrypt_len) < 0) { in eap_eke_process_commit()
569 if (decrypt_len < (size_t) data->sess.nonce_len) { in eap_eke_process_commit()
592 size_t decrypt_len; in eap_eke_process_confirm() local
611 decrypt_len = sizeof(nonce); in eap_eke_process_confirm()
613 nonce, &decrypt_len) < 0) { in eap_eke_process_confirm()
618 if (decrypt_len < (size_t) data->sess.nonce_len) { in eap_eke_process_confirm()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/
Deap_server_eke.c520 size_t decrypt_len; in eap_eke_process_commit() local
562 decrypt_len = sizeof(data->nonce_p); in eap_eke_process_commit()
564 data->nonce_p, &decrypt_len) < 0) { in eap_eke_process_commit()
569 if (decrypt_len < (size_t) data->sess.nonce_len) { in eap_eke_process_commit()
592 size_t decrypt_len; in eap_eke_process_confirm() local
611 decrypt_len = sizeof(nonce); in eap_eke_process_confirm()
613 nonce, &decrypt_len) < 0) { in eap_eke_process_confirm()
618 if (decrypt_len < (size_t) data->sess.nonce_len) { in eap_eke_process_confirm()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/
Deap_eke.c510 size_t decrypt_len; in eap_eke_process_confirm() local
532 decrypt_len = sizeof(nonces); in eap_eke_process_confirm()
534 nonces, &decrypt_len) < 0) { in eap_eke_process_confirm()
539 if (decrypt_len != (size_t) 2 * data->sess.nonce_len) { in eap_eke_process_confirm()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/
Deap_eke.c510 size_t decrypt_len; in eap_eke_process_confirm() local
532 decrypt_len = sizeof(nonces); in eap_eke_process_confirm()
534 nonces, &decrypt_len) < 0) { in eap_eke_process_confirm()
539 if (decrypt_len != (size_t) 2 * data->sess.nonce_len) { in eap_eke_process_confirm()
/third_party/openssl/ssl/statem/
Dstatem_srvr.c3001 int decrypt_len; in tls_process_cke_rsa() local
3067 decrypt_len = (int)RSA_private_decrypt((int)PACKET_remaining(&enc_premaster), in tls_process_cke_rsa()
3070 if (decrypt_len < 0) { in tls_process_cke_rsa()
3083 if (decrypt_len < 11 + SSL_MAX_MASTER_KEY_LENGTH) { in tls_process_cke_rsa()
3089 padding_len = decrypt_len - SSL_MAX_MASTER_KEY_LENGTH; in tls_process_cke_rsa()
/third_party/mindspore/mindspore/ccsrc/pipeline/jit/
Dpipeline.cc1497 size_t decrypt_len; in PyDecrypt() local
1499 …mindspore::Decrypt(&decrypt_len, encrypt_data_path, reinterpret_cast<Byte *>(key), key_len, dec_mo… in PyDecrypt()
1504 auto py_decrypt_data = py::bytes(reinterpret_cast<char *>(decrypt_data.get()), decrypt_len); in PyDecrypt()