Searched refs:padded_len (Results 1 – 5 of 5) sorted by relevance
/external/boringssl/src/crypto/evp/ |
D | p_rsa.c | 351 size_t padded_len; in pkey_rsa_decrypt() local 353 !RSA_decrypt(rsa, &padded_len, rctx->tbuf, key_len, in, inlen, in pkey_rsa_decrypt() 356 out, outlen, key_len, rctx->tbuf, padded_len, rctx->oaep_label, in pkey_rsa_decrypt()
|
/external/boringssl/src/crypto/fipsmodule/rsa/ |
D | rsa.c | 469 size_t padded_len = RSA_size(rsa); in RSA_sign_pss_mgf1() local 470 uint8_t *padded = OPENSSL_malloc(padded_len); in RSA_sign_pss_mgf1() 478 RSA_sign_raw(rsa, out_len, out, max_out, padded, padded_len, in RSA_sign_pss_mgf1()
|
/external/openssh/ |
D | packet.c | 1540 u_int len, padded_len; in ssh_packet_read_poll1() local 1560 padded_len = (len + 8) & ~7; in ssh_packet_read_poll1() 1563 if (sshbuf_len(state->input) < 4 + padded_len) in ssh_packet_read_poll1() 1580 sshbuf_ptr(state->input), padded_len)) { in ssh_packet_read_poll1() 1604 if ((r = sshbuf_reserve(state->incoming_packet, padded_len, &p)) != 0) in ssh_packet_read_poll1() 1607 sshbuf_ptr(state->input), padded_len, 0, 0)) != 0) in ssh_packet_read_poll1() 1610 if ((r = sshbuf_consume(state->input, padded_len)) != 0) in ssh_packet_read_poll1() 1659 state->p_read.bytes += padded_len + 4; in ssh_packet_read_poll1()
|
D | umac.c | 703 static void nh(nh_ctx *hc, const UINT8 *buf, UINT32 padded_len, in nh() argument 726 nh_aux(hc->nh_key, buf, result, padded_len); in nh()
|
/external/boringssl/src/ssl/ |
D | ssl_test.cc | 905 size_t input_len, padded_len; member 946 size_t padded_len = GetClientHelloLen(max_version, session_version, in TestPaddingExtension() local 948 if (padded_len != test.padded_len) { in TestPaddingExtension() 953 static_cast<unsigned>(padded_len), in TestPaddingExtension() 954 static_cast<unsigned>(test.padded_len), max_version, in TestPaddingExtension()
|