/third_party/openssl/crypto/rsa/ |
D | rsa_sign.c | 128 int decrypt_len, ret = 0, encoded_len = 0; in int_rsa_verify() local 143 decrypt_len = RSA_public_decrypt((int)siglen, sigbuf, decrypt_buf, rsa, in int_rsa_verify() 145 if (decrypt_len <= 0) in int_rsa_verify() 154 if (decrypt_len != SSL_SIG_LENGTH) { in int_rsa_verify() 173 } else if (type == NID_mdc2 && decrypt_len == 2 + 16 in int_rsa_verify() 207 if (m_len > (size_t)decrypt_len) { in int_rsa_verify() 211 m = decrypt_buf + decrypt_len - m_len; in int_rsa_verify() 218 if (encoded_len != decrypt_len in int_rsa_verify()
|
/third_party/openssl/util/perl/TLSProxy/ |
D | Record.pm | 173 $decrypt_len, 184 decrypt_len => $decrypt_len, 218 $self->decrypt_len(length($data)); 267 $self->decrypt_len(length($data)); 325 sub decrypt_len subroutine 329 $self->{decrypt_len} = shift; 331 return $self->{decrypt_len};
|
D | Message.pm | 209 if (length($payload) + $record->decrypt_len >= $messlen) { 222 $recoffset = $record->decrypt_len; 223 push @message_frag_lens, $record->decrypt_len; 228 while ($record->decrypt_len > $recoffset) { 230 if ($record->decrypt_len - $recoffset < 4) { 247 if ($recoffset <= $record->decrypt_len) { 249 if ($record->decrypt_len - $recoffset >= $messlen) { 263 $record->decrypt_len - $recoffset); 264 $recoffset = $record->decrypt_len; 492 $rec->decrypt_len(length($rec->decrypt_data));
|
D | Proxy.pm | 470 my $decrypt_len;
|
/third_party/mindspore/mindspore/core/utils/ |
D | crypto.cc | 76 std::unique_ptr<Byte[]> Decrypt(size_t *decrypt_len, const std::string &encrypt_data_path, const By… in Decrypt() argument 83 std::unique_ptr<Byte[]> Decrypt(size_t *decrypt_len, const Byte *model_data, size_t data_size, cons… in Decrypt() argument 349 std::unique_ptr<Byte[]> Decrypt(size_t *decrypt_len, const std::string &encrypt_data_path, const By… in Decrypt() argument 369 *decrypt_len = 0; in Decrypt() 389 size_t capacity = std::min(file_size - *decrypt_len, SECUREC_MEM_MAX_LEN); in Decrypt() 390 auto ret = memcpy_s(decrypt_data.get() + *decrypt_len, capacity, decrypt_block_buf.data(), in Decrypt() 395 *decrypt_len += static_cast<size_t>(decrypt_block_len); in Decrypt() 401 std::unique_ptr<Byte[]> Decrypt(size_t *decrypt_len, const Byte *model_data, size_t data_size, cons… in Decrypt() argument 413 *decrypt_len = 0; in Decrypt() 437 size_t capacity = std::min(data_size - *decrypt_len, SECUREC_MEM_MAX_LEN); in Decrypt() [all …]
|
D | crypto.h | 31 std::unique_ptr<Byte[]> Decrypt(size_t *decrypt_len, const std::string &encrypt_data_path, const By… 33 std::unique_ptr<Byte[]> Decrypt(size_t *decrypt_len, const Byte *model_data, size_t data_size, cons…
|
/third_party/mindspore/mindspore/ccsrc/fl/armour/secure_protocol/ |
D | encrypt.cc | 160 uint8_t *decrypt_data, int *decrypt_len) const { in evp_aes_decrypt() 210 *decrypt_len = out_len; in evp_aes_decrypt() 211 ret = EVP_DecryptFinal_ex(ctx, decrypt_data + *decrypt_len, &out_len); in evp_aes_decrypt() 216 *decrypt_len += out_len; in evp_aes_decrypt()
|
D | encrypt.h | 54 uint8_t *decrypt_data, int *decrypt_len) const;
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/ |
D | eap_server_eke.c | 520 size_t decrypt_len; in eap_eke_process_commit() local 562 decrypt_len = sizeof(data->nonce_p); in eap_eke_process_commit() 564 data->nonce_p, &decrypt_len) < 0) { in eap_eke_process_commit() 569 if (decrypt_len < (size_t) data->sess.nonce_len) { in eap_eke_process_commit() 592 size_t decrypt_len; in eap_eke_process_confirm() local 611 decrypt_len = sizeof(nonce); in eap_eke_process_confirm() 613 nonce, &decrypt_len) < 0) { in eap_eke_process_confirm() 618 if (decrypt_len < (size_t) data->sess.nonce_len) { in eap_eke_process_confirm()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
D | eap_server_eke.c | 520 size_t decrypt_len; in eap_eke_process_commit() local 562 decrypt_len = sizeof(data->nonce_p); in eap_eke_process_commit() 564 data->nonce_p, &decrypt_len) < 0) { in eap_eke_process_commit() 569 if (decrypt_len < (size_t) data->sess.nonce_len) { in eap_eke_process_commit() 592 size_t decrypt_len; in eap_eke_process_confirm() local 611 decrypt_len = sizeof(nonce); in eap_eke_process_confirm() 613 nonce, &decrypt_len) < 0) { in eap_eke_process_confirm() 618 if (decrypt_len < (size_t) data->sess.nonce_len) { in eap_eke_process_confirm()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/ |
D | eap_eke.c | 510 size_t decrypt_len; in eap_eke_process_confirm() local 532 decrypt_len = sizeof(nonces); in eap_eke_process_confirm() 534 nonces, &decrypt_len) < 0) { in eap_eke_process_confirm() 539 if (decrypt_len != (size_t) 2 * data->sess.nonce_len) { in eap_eke_process_confirm()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/ |
D | eap_eke.c | 510 size_t decrypt_len; in eap_eke_process_confirm() local 532 decrypt_len = sizeof(nonces); in eap_eke_process_confirm() 534 nonces, &decrypt_len) < 0) { in eap_eke_process_confirm() 539 if (decrypt_len != (size_t) 2 * data->sess.nonce_len) { in eap_eke_process_confirm()
|
/third_party/openssl/ssl/statem/ |
D | statem_srvr.c | 3001 int decrypt_len; in tls_process_cke_rsa() local 3067 decrypt_len = (int)RSA_private_decrypt((int)PACKET_remaining(&enc_premaster), in tls_process_cke_rsa() 3070 if (decrypt_len < 0) { in tls_process_cke_rsa() 3083 if (decrypt_len < 11 + SSL_MAX_MASTER_KEY_LENGTH) { in tls_process_cke_rsa() 3089 padding_len = decrypt_len - SSL_MAX_MASTER_KEY_LENGTH; in tls_process_cke_rsa()
|
/third_party/mindspore/mindspore/ccsrc/pipeline/jit/ |
D | pipeline.cc | 1497 size_t decrypt_len; in PyDecrypt() local 1499 …mindspore::Decrypt(&decrypt_len, encrypt_data_path, reinterpret_cast<Byte *>(key), key_len, dec_mo… in PyDecrypt() 1504 auto py_decrypt_data = py::bytes(reinterpret_cast<char *>(decrypt_data.get()), decrypt_len); in PyDecrypt()
|