Home
last modified time | relevance | path

Searched refs:magic (Results 1 – 16 of 16) sorted by relevance

/openssl-master/crypto/aes/asm/
A Dvpaes-x86.pl191 &mov ($magic,16);
286 &shl ($magic,4);
290 &xor ($magic,0x30);
292 &and ($magic,0x30);
297 &lea ($magic,&DWP($k_sr-$k_dsbd,$base,$magic));
403 &xor ($magic,0x30);
749 &add ($magic,-16);
750 &and ($magic,0x30);
800 &shr ($magic,1);
801 &and ($magic,32);
[all …]
A Dbsaes-armv7.pl1632 my ($inp,$out,$len,$key,$rounds,$magic,$fp)=(map("r$_",(7..10,1..3)));
1701 adr $magic, .Lxts_magic
1709 vldmia $magic, {$twmask} @ load XTS magic
1779 vldmia $magic, {$twmask} @ load XTS magic
2110 adr $magic, .Lxts_magic
2124 vldmia $magic, {$twmask} @ load XTS magic
2194 vldmia $magic, {$twmask} @ load XTS magic
2389 mov r5, $magic @ preserve magic
2399 mov $magic, r5
2409 vldmia $magic, {$twmask}
/openssl-master/crypto/pem/
A Dpvkfmt.c288 unsigned int bitlen, magic; in do_b2i_key() local
327 unsigned int bitlen, magic, length; in ossl_b2i_bio() local
337 if (ossl_do_blob_header(&p, 16, &magic, &bitlen, &isdss, ispub) <= 0) in ossl_b2i_bio()
559 unsigned int bitlen = 0, magic = 0, keyalg = 0; in do_i2b() local
563 bitlen = check_bitlen_rsa(EVP_PKEY_get0_RSA(pk), ispub, &magic); in do_i2b()
597 write_ledword(&p, magic); in do_i2b()
849 unsigned int magic; in do_PVK_body_key() local
888 magic = read_ledword((const unsigned char **)&q); in do_PVK_body_key()
889 if (magic != MS_RSA2MAGIC && magic != MS_DSS2MAGIC) { in do_PVK_body_key()
898 magic = read_ledword((const unsigned char **)&q); in do_PVK_body_key()
[all …]
/openssl-master/apps/
A Dpasswd.c314 static char *md5crypt(const char *passwd, const char *magic, const char *salt) in md5crypt() argument
331 magic_len = strlen(magic); in md5crypt()
332 OPENSSL_strlcpy(ascii_magic, magic, sizeof(ascii_magic)); in md5crypt()
334 if ((magic[0] & 0x80) != 0) /* High bit is 1 in EBCDIC alnums */ in md5crypt()
496 static char *shacrypt(const char *passwd, const char *magic, const char *salt) in shacrypt() argument
528 magic_len = strlen(magic); in shacrypt()
534 switch (magic[0]) { in shacrypt()
565 OPENSSL_strlcpy(ascii_magic, magic, sizeof(ascii_magic)); in shacrypt()
567 if ((magic[0] & 0x80) != 0) /* High bit is 1 in EBCDIC alnums */ in shacrypt()
720 switch (magic[0]) { in shacrypt()
A Denc.c107 static const char magic[] = "Salted__"; in enc_main() local
119 char mbuf[sizeof(magic) - 1]; in enc_main()
451 && (BIO_write(wbio, magic, in enc_main()
452 sizeof(magic) - 1) != sizeof(magic) - 1 in enc_main()
466 if (memcmp(mbuf, magic, sizeof(mbuf)) == 0) { /* file IS salted */ in enc_main()
/openssl-master/engines/
A De_capi.txt29 invalid dsa public key blob magic number
33 invalid rsa public key blob magic number
A De_capi.c677 if (rp->magic != 0x31415352) { in capi_get_pkey()
679 BIO_snprintf(magstr, 10, "%lx", rp->magic); in capi_get_pkey()
723 if (dp->magic != 0x31535344) { in capi_get_pkey()
725 BIO_snprintf(magstr, 10, "%lx", dp->magic); in capi_get_pkey()
A De_loader_attic.c1350 unsigned int magic = 0, bitlen = 0; in file_try_read_msblob() local
1357 if (!ossl_do_blob_header(&p, sizeof(peekbuf), &magic, &bitlen, in file_try_read_msblob()
/openssl-master/providers/implementations/storemgmt/
A Dfile_store_any2obj.c117 unsigned int bitlen, magic; in msblob2obj_decode() local
142 ok = ossl_do_blob_header(&p, 16, &magic, &bitlen, &isdss, &ispub) > 0; in msblob2obj_decode()
/openssl-master/providers/implementations/encode_decode/
A Ddecode_msblob2key.c90 unsigned int bitlen, magic, length; in msblob2key_decode() local
102 ok = ossl_do_blob_header(&p, 16, &magic, &bitlen, &isdss, &ispub) > 0; in msblob2key_decode()
/openssl-master/providers/implementations/ciphers/
A Dcipher_rc2.c76 static int rc2_magic_to_keybits(int magic) in rc2_magic_to_keybits() argument
78 switch (magic) { in rc2_magic_to_keybits()
/openssl-master/crypto/sha/asm/
A Dsha512-armv4.pl106 my $magic = shift;
159 teq $t0,#$magic
/openssl-master/crypto/
A Dbuild.info64 # uses functions from there to parse magic environment variables.
/openssl-master/crypto/err/
A Dopenssl.txt854 PEM_R_BAD_MAGIC_NUMBER:116:bad magic number
/openssl-master/Configurations/
A Dunix-Makefile.tmpl1848 # Next line needs to become "less magic" (see PR #11950)
/openssl-master/
A DCHANGES.md11738 * Use sizeof in preference to magic numbers.
16487 magic header, so unsalted files fail gracefully instead of just decrypting
17414 value was just used as a "magic string" and not used directly its

Completed in 49 milliseconds