Home
last modified time | relevance | path

Searched refs:byte (Results 1 – 25 of 91) sorted by relevance

1234

/openssl-master/crypto/modes/
A Dsiv128.c93 size_t out_len = sizeof(out->byte); in siv128_do_s2v_p()
111 t.byte[len] = 0x80; in siv128_do_s2v_p()
117 if (!EVP_MAC_final(mac_ctx, out->byte, &out_len, sizeof(out->byte)) in siv128_do_s2v_p()
288 q.byte[8] &= 0x7f; in ossl_siv128_encrypt()
289 q.byte[12] &= 0x7f; in ossl_siv128_encrypt()
314 q.byte[8] &= 0x7f; in ossl_siv128_decrypt()
315 q.byte[12] &= 0x7f; in ossl_siv128_decrypt()
321 p = ctx->tag.byte; in ossl_siv128_decrypt()
323 t.byte[i] ^= p[i]; in ossl_siv128_decrypt()
350 memcpy(ctx->tag.byte, tag, len); in ossl_siv128_set_tag()
[all …]
/openssl-master/crypto/
A Dasn1_dsa.c157 unsigned int byte; in ossl_decode_der_length() local
159 if (!PACKET_get_1(pkt, &byte)) in ossl_decode_der_length()
162 if (byte < 0x80) in ossl_decode_der_length()
163 return PACKET_get_sub_packet(pkt, subpkt, (size_t)byte); in ossl_decode_der_length()
164 if (byte == 0x81) in ossl_decode_der_length()
166 if (byte == 0x82) in ossl_decode_der_length()
A Dprovider_core.c1556 size_t byte = bitnum / 8; in ossl_provider_set_operation_bit() local
1561 if (provider->operation_bits_sz <= byte) { in ossl_provider_set_operation_bit()
1563 byte + 1); in ossl_provider_set_operation_bit()
1572 '\0', byte + 1 - provider->operation_bits_sz); in ossl_provider_set_operation_bit()
1573 provider->operation_bits_sz = byte + 1; in ossl_provider_set_operation_bit()
1575 provider->operation_bits[byte] |= bit; in ossl_provider_set_operation_bit()
1583 size_t byte = bitnum / 8; in ossl_provider_test_operation_bit() local
1594 if (provider->operation_bits_sz > byte) in ossl_provider_test_operation_bit()
1595 *result = ((provider->operation_bits[byte] & bit) != 0); in ossl_provider_test_operation_bit()
/openssl-master/doc/man3/
A DSSL_CTX_use_serverinfo.pod30 a byte array into B<ctx>. The B<version> parameter specifies the format of the
31 byte array provided in B<*serverinfo> which is of length B<serverinfo_length>.
34 consist of a 4-byte context, a 2-byte Extension Type, a 2-byte length, and then
42 consist of a 2-byte Extension Type, a 2-byte length, and then length bytes of
A DBIO_ADDR.pod45 BIO_ADDR_rawmake() takes a protocol B<family>, a byte array of
46 size B<wherelen> with an address in network byte order pointed at
47 by B<where> and a port number in network byte order in B<port> (except
65 with B<p> set to B<NULL>. The raw address will be in network byte
66 order, most significant byte first.
73 The raw port will be in network byte order.
97 network byte order address of a specific site. Internally, those are
A DBF_encrypt.pod43 Blowfish is a block cipher that operates on 64 bit (8 byte) blocks of data.
44 It uses a variable size key, but typically, 128 bit (16 byte) keys are
81 decryption (BF_DECRYPT) shall be performed. B<ivec> must point at an 8 byte
88 8 byte long initialization vector. B<num> must point at an integer which must
100 each 32-bit chunk in host-byte order, which is little-endian on little-endian
A DEVP_PKEY_get_group_name.pod17 I<gname>, up to at most I<gname_sz> bytes including the ending NUL byte
19 the NUL byte, if I<pkey>'s key type supports it.
A DDES_random_key.pod112 each byte is the parity bit. The key schedule is an expanded form of
142 decrypts a single 8-byte I<DES_cblock> in I<electronic code book>
201 arbitrary number of bytes, without 8 byte padding. Each call to this
226 DES_cbc_cksum() produces an 8 byte checksum based on the input stream
232 DES_quad_cksum() is a Kerberos v4 function. It returns a 4 byte
259 data send down I<fd> consists of 4 bytes (in network byte order)
271 first 12 bits will come from the 1st input byte and the low half of
272 the second input byte. The second 12 bits will have the low 8 bits
273 taken from the 3rd input byte and the top 4 bits taken from the 4th
274 input byte. The same holds for output. This function has been
[all …]
A DBN_bn2bin.pod55 byte first on big-endian platforms, and least significant byte first on
76 that consists of the number's length in bytes represented as a 4-byte
79 of numbers with the MSB set is prefixed with null byte).
A DEVP_PKEY_gettable_params.pod53 value including a terminating NUL byte, or this function will fail.
55 not including the terminating NUL byte. The required buffer size not including
56 the terminating NUL byte can be obtained from I<*out_len> by calling the
A DSSL_CIPHER_get_name.pod99 two-byte TLS cipher ID (as allocated by IANA) in network byte order. This parameter
107 SSL_CIPHER_get_protocol_id() returns the two-byte ID used in the TLS protocol of the given
178 SSL_CIPHER_get_id() returns a 4-byte integer representing the OpenSSL-specific ID.
180 SSL_CIPHER_get_protocol_id() returns a 2-byte integer representing the TLS
A DASN1_STRING_print_ex.pod64 option will correctly display multi byte characters.
67 all: everything is assumed to be one byte per character. This is primarily for
80 one byte per character, if B<ASN1_STRFLGS_DUMP_UNKNOWN> is set then they will
A DSSL_CTX_set_alpn_select_cb.pod117 nonempty, 8-bit length-prefixed, byte strings. The length-prefix byte is not
118 included in the length. Each string is limited to 255 bytes. A byte-string
119 length of 0 is invalid. A truncated byte-string is invalid. The length of the
A DEVP_EncodeInit.pod47 the final block). For each 48 byte input block encoded 64 bytes of base 64 data
67 additional byte for a NUL terminator. EVP_EncodeUpdate() may be called
91 created plus 1 byte for a NUL terminator (i.e. 25 bytes in total). The length of
100 function will attempt to decode as much data as possible in 4 byte chunks. Any
/openssl-master/test/recipes/30-test_evp_data/
A Devpmac_siphash.txt14 # SIPHASH tests - default values: 2,4 rounds, 16-byte mac
129 # SIPHASH - default values: 2,4 rounds, explicit 8-byte mac
143 # SIPHASH - default values: 2,4 rounds, explicit 16-byte mac
151 # SIPHASH - default values: 2,4 rounds, explicit 16-byte mac (set as 0)
159 # SIPHASH - default values: 2,4 rounds, explicit 13-byte mac (invalid size)
166 # SIPHASH - default values: 2,4 rounds, explicit 13-byte mac (invalid size)
A Devpciph_aria.txt199 # 16-byte Tag
217 # 8-byte Tag
235 # 12-byte Tag
A Devpciph_camellia_cts.txt69 # Plaintext: 13 bytes byte (31332062797465732062797465)
124 # Plaintext: 13 bytes byte (31332062797465732062797465)
/openssl-master/test/
A Ddanetest.c182 uint8_t byte; in hexdecode() local
189 for (byte = 0; *in; ++in) { in hexdecode()
199 byte |= (char)x; in hexdecode()
201 *cp++ = byte; in hexdecode()
202 byte = 0; in hexdecode()
204 byte <<= 4; in hexdecode()
A Dpackettest.c288 const unsigned char *byte = NULL; in test_PACKET_forward() local
293 || !TEST_true(PACKET_get_bytes(&pkt, &byte, 1)) in test_PACKET_forward()
294 || !TEST_uchar_eq(byte[0], 4) in test_PACKET_forward()
296 || !TEST_true(PACKET_get_bytes(&pkt, &byte, 1)) in test_PACKET_forward()
297 || !TEST_uchar_eq(byte[0], 0xfe)) in test_PACKET_forward()
/openssl-master/test/recipes/
A D70-test_sslrecords.t284 my $byte;
306 $byte = pack('C', TLSProxy::Message::AL_LEVEL_FATAL);
315 $byte,
316 $byte
321 $byte = pack('C', TLSProxy::Message::AL_DESC_UNEXPECTED_MESSAGE);
330 $byte,
331 $byte
/openssl-master/crypto/modes/asm/
A Dghash-parisc.pl81 $byte="%r5";
403 ldb 14($inp),$byte
407 xor $byte,$nlo,$nlo
430 ldbx $cnt($inp),$byte
437 xor $byte,$nlo,$nlo
494 ldb 15($inp),$byte
495 xor $byte,$nlo,$nlo
505 ldb 14($inp),$byte
515 xor $byte,$nlo,$nlo
541 ldbx $cnt($inp),$byte
[all …]
/openssl-master/doc/man7/
A Dpassphrase-encoding.pod48 opportunistically prepends each byte with a zero byte to obtain the UCS-2
70 A pass phrase that contains this kind of byte sequence will give a different
95 encoding was ISO-8859-1 (i.e. "naïve" resulting in the byte sequence 0x6E 0x61
97 is UTF-8 (i.e. "naïve" resulting in the byte sequence 0x6E 0x61 0xC3 0xAF 0x76
107 For other objects, it's as legitimate to use any byte sequence (such as a
110 byte sequence as it is.
138 It's possible that its byte sequence is exactly right.
/openssl-master/crypto/des/asm/
A Ddes_enc.m41779 .byte 0, 0, 0, 0, 4, 4, 4, 4
1780 .byte 8, 8, 8, 8, 12, 12, 12, 12
1781 .byte 16, 16, 16, 16, 20, 20, 20, 20
1782 .byte 24, 24, 24, 24, 28, 28, 28, 28
1783 .byte 32, 32, 32, 32, 36, 36, 36, 36
1784 .byte 40, 40, 40, 40, 44, 44, 44, 44
1785 .byte 48, 48, 48, 48, 52, 52, 52, 52
1786 .byte 56, 56, 56, 56, 60, 60, 60, 60
1787 .byte 64, 64, 64, 64, 68, 68, 68, 68
1788 .byte 72, 72, 72, 72, 76, 76, 76, 76
[all …]
/openssl-master/crypto/perlasm/
A DREADME.md30 &LB(reg); Low byte for a register
31 &HB(reg); High byte for a register
/openssl-master/doc/internal/man3/
A Dossl_cmp_asn1_octet_string_set1.pod25 referenced via the I<tgt> argument and assigns either a copy of the given byte

Completed in 53 milliseconds

1234