/openssl-master/crypto/modes/ |
A D | siv128.c | 93 size_t out_len = sizeof(out->byte); in siv128_do_s2v_p() 111 t.byte[len] = 0x80; in siv128_do_s2v_p() 117 if (!EVP_MAC_final(mac_ctx, out->byte, &out_len, sizeof(out->byte)) in siv128_do_s2v_p() 288 q.byte[8] &= 0x7f; in ossl_siv128_encrypt() 289 q.byte[12] &= 0x7f; in ossl_siv128_encrypt() 314 q.byte[8] &= 0x7f; in ossl_siv128_decrypt() 315 q.byte[12] &= 0x7f; in ossl_siv128_decrypt() 321 p = ctx->tag.byte; in ossl_siv128_decrypt() 323 t.byte[i] ^= p[i]; in ossl_siv128_decrypt() 350 memcpy(ctx->tag.byte, tag, len); in ossl_siv128_set_tag() [all …]
|
/openssl-master/crypto/ |
A D | asn1_dsa.c | 157 unsigned int byte; in ossl_decode_der_length() local 159 if (!PACKET_get_1(pkt, &byte)) in ossl_decode_der_length() 162 if (byte < 0x80) in ossl_decode_der_length() 163 return PACKET_get_sub_packet(pkt, subpkt, (size_t)byte); in ossl_decode_der_length() 164 if (byte == 0x81) in ossl_decode_der_length() 166 if (byte == 0x82) in ossl_decode_der_length()
|
A D | provider_core.c | 1556 size_t byte = bitnum / 8; in ossl_provider_set_operation_bit() local 1561 if (provider->operation_bits_sz <= byte) { in ossl_provider_set_operation_bit() 1563 byte + 1); in ossl_provider_set_operation_bit() 1572 '\0', byte + 1 - provider->operation_bits_sz); in ossl_provider_set_operation_bit() 1573 provider->operation_bits_sz = byte + 1; in ossl_provider_set_operation_bit() 1575 provider->operation_bits[byte] |= bit; in ossl_provider_set_operation_bit() 1583 size_t byte = bitnum / 8; in ossl_provider_test_operation_bit() local 1594 if (provider->operation_bits_sz > byte) in ossl_provider_test_operation_bit() 1595 *result = ((provider->operation_bits[byte] & bit) != 0); in ossl_provider_test_operation_bit()
|
/openssl-master/doc/man3/ |
A D | SSL_CTX_use_serverinfo.pod | 30 a byte array into B<ctx>. The B<version> parameter specifies the format of the 31 byte array provided in B<*serverinfo> which is of length B<serverinfo_length>. 34 consist of a 4-byte context, a 2-byte Extension Type, a 2-byte length, and then 42 consist of a 2-byte Extension Type, a 2-byte length, and then length bytes of
|
A D | BIO_ADDR.pod | 45 BIO_ADDR_rawmake() takes a protocol B<family>, a byte array of 46 size B<wherelen> with an address in network byte order pointed at 47 by B<where> and a port number in network byte order in B<port> (except 65 with B<p> set to B<NULL>. The raw address will be in network byte 66 order, most significant byte first. 73 The raw port will be in network byte order. 97 network byte order address of a specific site. Internally, those are
|
A D | BF_encrypt.pod | 43 Blowfish is a block cipher that operates on 64 bit (8 byte) blocks of data. 44 It uses a variable size key, but typically, 128 bit (16 byte) keys are 81 decryption (BF_DECRYPT) shall be performed. B<ivec> must point at an 8 byte 88 8 byte long initialization vector. B<num> must point at an integer which must 100 each 32-bit chunk in host-byte order, which is little-endian on little-endian
|
A D | EVP_PKEY_get_group_name.pod | 17 I<gname>, up to at most I<gname_sz> bytes including the ending NUL byte 19 the NUL byte, if I<pkey>'s key type supports it.
|
A D | DES_random_key.pod | 112 each byte is the parity bit. The key schedule is an expanded form of 142 decrypts a single 8-byte I<DES_cblock> in I<electronic code book> 201 arbitrary number of bytes, without 8 byte padding. Each call to this 226 DES_cbc_cksum() produces an 8 byte checksum based on the input stream 232 DES_quad_cksum() is a Kerberos v4 function. It returns a 4 byte 259 data send down I<fd> consists of 4 bytes (in network byte order) 271 first 12 bits will come from the 1st input byte and the low half of 272 the second input byte. The second 12 bits will have the low 8 bits 273 taken from the 3rd input byte and the top 4 bits taken from the 4th 274 input byte. The same holds for output. This function has been [all …]
|
A D | BN_bn2bin.pod | 55 byte first on big-endian platforms, and least significant byte first on 76 that consists of the number's length in bytes represented as a 4-byte 79 of numbers with the MSB set is prefixed with null byte).
|
A D | EVP_PKEY_gettable_params.pod | 53 value including a terminating NUL byte, or this function will fail. 55 not including the terminating NUL byte. The required buffer size not including 56 the terminating NUL byte can be obtained from I<*out_len> by calling the
|
A D | SSL_CIPHER_get_name.pod | 99 two-byte TLS cipher ID (as allocated by IANA) in network byte order. This parameter 107 SSL_CIPHER_get_protocol_id() returns the two-byte ID used in the TLS protocol of the given 178 SSL_CIPHER_get_id() returns a 4-byte integer representing the OpenSSL-specific ID. 180 SSL_CIPHER_get_protocol_id() returns a 2-byte integer representing the TLS
|
A D | ASN1_STRING_print_ex.pod | 64 option will correctly display multi byte characters. 67 all: everything is assumed to be one byte per character. This is primarily for 80 one byte per character, if B<ASN1_STRFLGS_DUMP_UNKNOWN> is set then they will
|
A D | SSL_CTX_set_alpn_select_cb.pod | 117 nonempty, 8-bit length-prefixed, byte strings. The length-prefix byte is not 118 included in the length. Each string is limited to 255 bytes. A byte-string 119 length of 0 is invalid. A truncated byte-string is invalid. The length of the
|
A D | EVP_EncodeInit.pod | 47 the final block). For each 48 byte input block encoded 64 bytes of base 64 data 67 additional byte for a NUL terminator. EVP_EncodeUpdate() may be called 91 created plus 1 byte for a NUL terminator (i.e. 25 bytes in total). The length of 100 function will attempt to decode as much data as possible in 4 byte chunks. Any
|
/openssl-master/test/recipes/30-test_evp_data/ |
A D | evpmac_siphash.txt | 14 # SIPHASH tests - default values: 2,4 rounds, 16-byte mac 129 # SIPHASH - default values: 2,4 rounds, explicit 8-byte mac 143 # SIPHASH - default values: 2,4 rounds, explicit 16-byte mac 151 # SIPHASH - default values: 2,4 rounds, explicit 16-byte mac (set as 0) 159 # SIPHASH - default values: 2,4 rounds, explicit 13-byte mac (invalid size) 166 # SIPHASH - default values: 2,4 rounds, explicit 13-byte mac (invalid size)
|
A D | evpciph_aria.txt | 199 # 16-byte Tag 217 # 8-byte Tag 235 # 12-byte Tag
|
A D | evpciph_camellia_cts.txt | 69 # Plaintext: 13 bytes byte (31332062797465732062797465) 124 # Plaintext: 13 bytes byte (31332062797465732062797465)
|
/openssl-master/test/ |
A D | danetest.c | 182 uint8_t byte; in hexdecode() local 189 for (byte = 0; *in; ++in) { in hexdecode() 199 byte |= (char)x; in hexdecode() 201 *cp++ = byte; in hexdecode() 202 byte = 0; in hexdecode() 204 byte <<= 4; in hexdecode()
|
A D | packettest.c | 288 const unsigned char *byte = NULL; in test_PACKET_forward() local 293 || !TEST_true(PACKET_get_bytes(&pkt, &byte, 1)) in test_PACKET_forward() 294 || !TEST_uchar_eq(byte[0], 4) in test_PACKET_forward() 296 || !TEST_true(PACKET_get_bytes(&pkt, &byte, 1)) in test_PACKET_forward() 297 || !TEST_uchar_eq(byte[0], 0xfe)) in test_PACKET_forward()
|
/openssl-master/test/recipes/ |
A D | 70-test_sslrecords.t | 284 my $byte; 306 $byte = pack('C', TLSProxy::Message::AL_LEVEL_FATAL); 315 $byte, 316 $byte 321 $byte = pack('C', TLSProxy::Message::AL_DESC_UNEXPECTED_MESSAGE); 330 $byte, 331 $byte
|
/openssl-master/crypto/modes/asm/ |
A D | ghash-parisc.pl | 81 $byte="%r5"; 403 ldb 14($inp),$byte 407 xor $byte,$nlo,$nlo 430 ldbx $cnt($inp),$byte 437 xor $byte,$nlo,$nlo 494 ldb 15($inp),$byte 495 xor $byte,$nlo,$nlo 505 ldb 14($inp),$byte 515 xor $byte,$nlo,$nlo 541 ldbx $cnt($inp),$byte [all …]
|
/openssl-master/doc/man7/ |
A D | passphrase-encoding.pod | 48 opportunistically prepends each byte with a zero byte to obtain the UCS-2 70 A pass phrase that contains this kind of byte sequence will give a different 95 encoding was ISO-8859-1 (i.e. "naïve" resulting in the byte sequence 0x6E 0x61 97 is UTF-8 (i.e. "naïve" resulting in the byte sequence 0x6E 0x61 0xC3 0xAF 0x76 107 For other objects, it's as legitimate to use any byte sequence (such as a 110 byte sequence as it is. 138 It's possible that its byte sequence is exactly right.
|
/openssl-master/crypto/des/asm/ |
A D | des_enc.m4 | 1779 .byte 0, 0, 0, 0, 4, 4, 4, 4 1780 .byte 8, 8, 8, 8, 12, 12, 12, 12 1781 .byte 16, 16, 16, 16, 20, 20, 20, 20 1782 .byte 24, 24, 24, 24, 28, 28, 28, 28 1783 .byte 32, 32, 32, 32, 36, 36, 36, 36 1784 .byte 40, 40, 40, 40, 44, 44, 44, 44 1785 .byte 48, 48, 48, 48, 52, 52, 52, 52 1786 .byte 56, 56, 56, 56, 60, 60, 60, 60 1787 .byte 64, 64, 64, 64, 68, 68, 68, 68 1788 .byte 72, 72, 72, 72, 76, 76, 76, 76 [all …]
|
/openssl-master/crypto/perlasm/ |
A D | README.md | 30 &LB(reg); Low byte for a register 31 &HB(reg); High byte for a register
|
/openssl-master/doc/internal/man3/ |
A D | ossl_cmp_asn1_octet_string_set1.pod | 25 referenced via the I<tgt> argument and assigns either a copy of the given byte
|