/openssl-master/test/testutil/ |
A D | stanza.c | 92 for (s->numpairs = 0; BIO_gets(s->fp, s->buff, sizeof(s->buff)); ) { in test_readstanza() 94 if (!TEST_ptr(p = strchr(s->buff, '\n'))) { in test_readstanza() 101 if (s->buff[0] == '\0') in test_readstanza() 105 if (s->buff[0] == '#') in test_readstanza() 109 if (!TEST_ptr(equals = strchr(s->buff, '='))) { in test_readstanza() 114 if (!TEST_ptr(key = strip_spaces(s->buff))) { in test_readstanza()
|
/openssl-master/crypto/ui/ |
A D | ui_util.c | 22 char buff[BUFSIZ]; in UI_UTIL_read_pw_string() local 26 UI_UTIL_read_pw(buf, buff, (length > BUFSIZ) ? BUFSIZ : length, in UI_UTIL_read_pw_string() 28 OPENSSL_cleanse(buff, BUFSIZ); in UI_UTIL_read_pw_string() 32 int UI_UTIL_read_pw(char *buf, char *buff, int size, const char *prompt, in UI_UTIL_read_pw() argument 45 ok = UI_add_verify_string(ui, prompt, 0, buff, 0, size - 1, buf); in UI_UTIL_read_pw()
|
/openssl-master/crypto/modes/ |
A D | wrap128.c | 277 unsigned char buff[16]; in CRYPTO_128_unwrap_pad() local 279 block(in, buff, key); in CRYPTO_128_unwrap_pad() 280 memcpy(aiv, buff, 8); in CRYPTO_128_unwrap_pad() 282 memcpy(out, buff + 8, 8); in CRYPTO_128_unwrap_pad() 284 OPENSSL_cleanse(buff, inlen); in CRYPTO_128_unwrap_pad()
|
/openssl-master/crypto/des/ |
A D | fcrypt.c | 66 static char buff[14]; in DES_crypt() local 69 return DES_fcrypt(buf, salt, buff); in DES_crypt() 89 ret = DES_fcrypt(e_buf, e_salt, buff); in DES_crypt()
|
/openssl-master/crypto/ |
A D | mem.c | 133 char buff[80]; in shouldfail() local 136 BIO_snprintf(buff, sizeof(buff), in shouldfail() 139 len = strlen(buff); in shouldfail() 140 if (write(md_tracefd, buff, len) != len) in shouldfail()
|
A D | s390xcap.c | 670 char *tok_begin, *tok_end, *buff, tok[S390X_STFLE_MAX][LEN + 1]; in parse_env() local 673 buff = malloc(strlen(env) + 1); in parse_env() 674 if (buff == NULL) in parse_env() 679 strcpy(buff, env); in parse_env() 681 tok_begin = buff + strspn(buff, ";"); in parse_env() 740 free(buff); in parse_env()
|
/openssl-master/apps/lib/ |
A D | apps_ui.c | 169 char *buff = NULL; in password_callback() local 196 buff = ui_malloc(bufsiz, "password buffer"); in password_callback() 197 ok = UI_add_verify_string(ui, prompt, ui_flags, buff, in password_callback() 205 OPENSSL_clear_free(buff, (unsigned int)bufsiz); in password_callback()
|
/openssl-master/providers/implementations/keymgmt/ |
A D | ecx_kmgmt.c | 912 unsigned char x_dst[32], buff[SHA512_DIGEST_LENGTH]; in s390x_ecd_keygen25519() local 943 j = EVP_Digest(privkey, 32, buff, &sz, sha, NULL); in s390x_ecd_keygen25519() 948 buff[0] &= 248; in s390x_ecd_keygen25519() 949 buff[31] &= 63; in s390x_ecd_keygen25519() 950 buff[31] |= 64; in s390x_ecd_keygen25519() 980 unsigned char x_dst[57], buff[114]; in s390x_ecd_keygen448() local 1017 if (EVP_DigestFinalXOF(hashctx, buff, sizeof(buff)) != 1) in s390x_ecd_keygen448() 1020 buff[0] &= -4; in s390x_ecd_keygen448() 1021 buff[55] |= 0x80; in s390x_ecd_keygen448() 1022 buff[56] = 0; in s390x_ecd_keygen448() [all …]
|
/openssl-master/crypto/ec/ |
A D | ecx_meth.c | 1044 buff[0] &= 248; in s390x_pkey_ecd_keygen25519() 1045 buff[31] &= 63; in s390x_pkey_ecd_keygen25519() 1046 buff[31] |= 64; in s390x_pkey_ecd_keygen25519() 1116 if (EVP_DigestFinalXOF(hashctx, buff, sizeof(buff)) != 1) in s390x_pkey_ecd_keygen448() 1119 buff[0] &= -4; in s390x_pkey_ecd_keygen448() 1120 buff[55] |= 0x80; in s390x_pkey_ecd_keygen448() 1121 buff[56] = 0; in s390x_pkey_ecd_keygen448() 1178 unsigned long long buff[512]; in s390x_pkey_ecd_digestsign25519() member 1218 unsigned long long buff[512]; in s390x_pkey_ecd_digestsign448() member 1261 unsigned long long buff[512]; in s390x_pkey_ecd_digestverify25519() member [all …]
|
A D | ecx_s390x.c | 87 unsigned long long buff[512]; in s390x_x25519_mul() member 120 unsigned long long buff[512]; in s390x_x448_mul() member 160 unsigned long long buff[512]; in s390x_ed25519_mul() member 194 unsigned long long buff[512]; in s390x_ed448_mul() member
|
/openssl-master/crypto/evp/ |
A D | evp_key.c | 56 char buff[BUFSIZ]; in EVP_read_pw_string_min() local 67 && UI_add_verify_string(ui, prompt, 0, buff, min, in EVP_read_pw_string_min() 72 OPENSSL_cleanse(buff, BUFSIZ); in EVP_read_pw_string_min()
|
/openssl-master/crypto/conf/ |
A D | conf_def.c | 213 BUF_MEM *buff = NULL; in def_load_bio() local 230 if ((buff = BUF_MEM_new()) == NULL) { in def_load_bio() 255 if (!BUF_MEM_grow(buff, bufnum + CONFBUFSIZE)) { in def_load_bio() 259 p = &(buff->data[bufnum]); in def_load_bio() 337 p = &(buff->data[bufnum - 1]); in def_load_bio() 346 buf = buff->data; in def_load_bio() 553 BUF_MEM_free(buff); in def_load_bio() 563 BUF_MEM_free(buff); in def_load_bio()
|
/openssl-master/providers/implementations/signature/ |
A D | eddsa_sig.c | 359 unsigned long long buff[512]; in s390x_ed25519_digestsign() member 384 unsigned long long buff[512]; in s390x_ed448_digestsign() member 411 unsigned long long buff[512]; in s390x_ed25519_digestverify() member 433 unsigned long long buff[512]; in s390x_ed448_digestverify() member
|
/openssl-master/apps/ |
A D | enc.c | 126 unsigned char *buff = NULL, salt[PKCS5_SALT_LEN]; in enc_main() local 330 buff = app_malloc(EVP_ENCODE_LENGTH(bsize), "evp buffer"); in enc_main() 609 inl = BIO_read(rbio, (char *)buff, bsize); in enc_main() 612 if (BIO_write(wbio, (char *)buff, inl) != inl) { in enc_main() 630 OPENSSL_free(buff); in enc_main()
|
A D | s_server.c | 262 char buff[1]; member 289 wbuf->buff[0] = '\0'; in ebcdic_new() 348 wbuf->buff[0] = '\0'; in ebcdic_write() 353 ebcdic2ascii(wbuf->buff, in, inl); in ebcdic_write() 355 ret = BIO_write(next, wbuf->buff, inl); in ebcdic_write()
|
/openssl-master/doc/man3/ |
A D | UI_UTIL_read_pw.pod | 14 int UI_UTIL_read_pw(char *buf, char *buff, int size, const char *prompt, 27 difference is that you can give it an external buffer B<buff> for the
|
/openssl-master/engines/ |
A D | e_loader_attic.c | 933 BIO *buff = NULL; in file_find_type() local 936 if ((buff = BIO_new(BIO_f_buffer())) == NULL) in file_find_type() 939 ctx->_.file.file = BIO_push(buff, ctx->_.file.file); in file_find_type() 1679 BIO *buff = ctx->_.file.file; in file_close() local 1686 BIO_free(buff); in file_close()
|
/openssl-master/test/ |
A D | testutil.h | 539 char buff[4096]; /* Input buffer for a single key/value */ member
|
/openssl-master/include/openssl/ |
A D | ui.h.in | 376 int UI_UTIL_read_pw(char *buf, char *buff, int size, const char *prompt,
|