/openssl-master/crypto/ec/ |
A D | eck_prn.c | 31 ret = ECPKParameters_print(b, x, off); in ECPKParameters_print_fp() 46 ret = EC_KEY_print(b, x, off); in EC_KEY_print_fp() 68 size_t len, int off); 101 if (!BIO_indent(bp, off, 128)) in ECPKParameters_print() 113 if (!BIO_indent(bp, off, 128)) in ECPKParameters_print() 161 if (!BIO_indent(bp, off, 128)) in ECPKParameters_print() 233 if (off > 0) { in print_bin() 234 if (off > 128) in print_bin() 235 off = 128; in print_bin() 236 memset(str, ' ', off); in print_bin() [all …]
|
A D | ecp_s390x_nistp.c | 138 int off; in ecdsa_s390x_nistp_sign_sig() local 167 off = len - (dgstlen > len ? len : dgstlen); in ecdsa_s390x_nistp_sign_sig() 168 memcpy(param + S390X_OFF_H(len) + off, dgst, len - off); in ecdsa_s390x_nistp_sign_sig() 234 int off; in ecdsa_s390x_nistp_verify_sig() local 264 off = len - (dgstlen > len ? len : dgstlen); in ecdsa_s390x_nistp_verify_sig() 265 memcpy(param + S390X_OFF_H(len) + off, dgst, len - off); in ecdsa_s390x_nistp_verify_sig()
|
A D | ec_ameth.c | 291 static int do_EC_KEY_print(BIO *bp, const EC_KEY *x, int off, ec_print_t ktype) in do_EC_KEY_print() argument 323 if (!BIO_indent(bp, off, 128)) in do_EC_KEY_print() 330 if (BIO_printf(bp, "%*spriv:\n", off, "") <= 0) in do_EC_KEY_print() 332 if (ASN1_buf_print(bp, priv, privlen, off + 4) == 0) in do_EC_KEY_print() 337 if (BIO_printf(bp, "%*spub:\n", off, "") <= 0) in do_EC_KEY_print() 339 if (ASN1_buf_print(bp, pub, publen, off + 4) == 0) in do_EC_KEY_print() 343 if (!ECPKParameters_print(bp, group, off)) in do_EC_KEY_print() 716 int EC_KEY_print(BIO *bp, const EC_KEY *x, int off) in EC_KEY_print() argument 720 return do_EC_KEY_print(bp, x, off, in EC_KEY_print()
|
/openssl-master/crypto/asn1/ |
A D | a_d2i_fp.c | 116 size_t off = 0; in asn1_d2i_read_bio() local 132 diff = len - off; in asn1_d2i_read_bio() 155 p = (unsigned char *)&(b->data[off]); in asn1_d2i_read_bio() 157 diff = len - off; in asn1_d2i_read_bio() 170 off += i; /* end of data */ in asn1_d2i_read_bio() 190 if (want > (len - off)) { in asn1_d2i_read_bio() 193 want -= (len - off); in asn1_d2i_read_bio() 230 if (off + slen < off) { in asn1_d2i_read_bio() 234 off += slen; in asn1_d2i_read_bio() 242 if (off > INT_MAX) { in asn1_d2i_read_bio() [all …]
|
A D | a_int.c | 239 size_t off = sizeof(uint64_t); in asn1_put_uint64() local 242 b[--off] = (unsigned char)r; in asn1_put_uint64() 245 return off; in asn1_put_uint64() 343 size_t off; in asn1_string_set_int64() local 358 return ASN1_STRING_set(a, tbuf + off, sizeof(tbuf) - off); in asn1_string_set_int64() 382 size_t off; in asn1_string_set_uint64() local 385 off = asn1_put_uint64(tbuf, r); in asn1_string_set_uint64() 386 return ASN1_STRING_set(a, tbuf + off, sizeof(tbuf) - off); in asn1_string_set_uint64() 638 size_t off; in ossl_i2c_uint64_int() local 640 off = asn1_put_uint64(buf, r); in ossl_i2c_uint64_int() [all …]
|
/openssl-master/crypto/ |
A D | cpuid.c | 107 int off = (env[0] == '~') ? 1 : 0; in OPENSSL_cpuid_setup() local 109 vec = ossl_strtouint64(env + off); in OPENSSL_cpuid_setup() 111 if (off) { in OPENSSL_cpuid_setup() 133 off = (env[0] == '~') ? 1 : 0; in OPENSSL_cpuid_setup() 134 vecx = ossl_strtouint64(env + off); in OPENSSL_cpuid_setup() 135 if (off) { in OPENSSL_cpuid_setup()
|
A D | s390xcap.c | 38 off = (tok[0][0] == '~') ? 1 : 0; \ 39 if (sscanf(tok[0] + off, "%llx", &cap->NAME[0]) != 1) \ 41 if (off) \ 44 off = (tok[1][0] == '~') ? 1 : 0; \ 45 if (sscanf(tok[1] + off, "%llx", &cap->NAME[1]) != 1) \ 47 if (off) \ 671 int rc, off, i, n; in parse_env() local 692 off = (tok[i][0] == '~') ? 1 : 0; in parse_env() 693 if (sscanf(tok[i] + off, "%llx", &cap->stfle[i]) != 1) in parse_env() 695 if (off) in parse_env()
|
/openssl-master/crypto/rsa/ |
A D | rsa_prn.c | 22 int RSA_print_fp(FILE *fp, const RSA *x, int off) in RSA_print_fp() argument 32 ret = RSA_print(b, x, off); in RSA_print_fp() 38 int RSA_print(BIO *bp, const RSA *x, int off) in RSA_print() argument 47 ret = EVP_PKEY_print_private(bp, pk, off, NULL); in RSA_print()
|
A D | rsa_ameth.c | 307 if (!BIO_indent(bp, off, 128)) in pkey_rsa_print() 325 if (!ASN1_bn_print(bp, str, x->n, NULL, off)) in pkey_rsa_print() 327 if (!ASN1_bn_print(bp, s, x->e, NULL, off)) in pkey_rsa_print() 332 if (!ASN1_bn_print(bp, "privateExponent:", x->d, NULL, off)) in pkey_rsa_print() 334 if (!ASN1_bn_print(bp, "prime1:", x->p, NULL, off)) in pkey_rsa_print() 336 if (!ASN1_bn_print(bp, "prime2:", x->q, NULL, off)) in pkey_rsa_print() 338 if (!ASN1_bn_print(bp, "exponent1:", x->dmp1, NULL, off)) in pkey_rsa_print() 340 if (!ASN1_bn_print(bp, "exponent2:", x->dmq1, NULL, off)) in pkey_rsa_print() 342 if (!ASN1_bn_print(bp, "coefficient:", x->iqmp, NULL, off)) in pkey_rsa_print() 352 if (!BIO_indent(bp, off, 128)) in pkey_rsa_print() [all …]
|
/openssl-master/crypto/dsa/ |
A D | dsa_prn.c | 22 int DSA_print_fp(FILE *fp, const DSA *x, int off) in DSA_print_fp() argument 32 ret = DSA_print(b, x, off); in DSA_print_fp() 53 int DSA_print(BIO *bp, const DSA *x, int off) in DSA_print() argument 62 ret = EVP_PKEY_print_private(bp, pk, off, NULL); in DSA_print()
|
A D | dsa_ameth.c | 269 static int do_dsa_print(BIO *bp, const DSA *x, int off, int ptype) in do_dsa_print() argument 297 if (!BIO_indent(bp, off, 128)) in do_dsa_print() 306 if (!ASN1_bn_print(bp, "priv:", priv_key, NULL, off)) in do_dsa_print() 308 if (!ASN1_bn_print(bp, "pub: ", pub_key, NULL, off)) in do_dsa_print() 310 if (!ossl_ffc_params_print(bp, &x->params, off)) in do_dsa_print()
|
/openssl-master/demos/bio/ |
A D | sconnect.c | 39 int i, len, off, ret = EXIT_FAILURE; in main() local 81 off = 0; in main() 83 i = BIO_write(out, &(p[off]), len); in main() 93 off += i; in main()
|
/openssl-master/doc/man3/ |
A D | SSL_CTX_set_read_ahead.pod | 29 Setting the parameter B<yes> to 0 turns reading ahead is off, other values turn 47 B<SSL_MODE_AUTO_RETRY> is not turned off using SSL_CTX_clear_mode(). 53 ahead should be turned off. 58 SSL_get_read_ahead() and SSL_CTX_get_read_ahead() return 0 if reading ahead is off,
|
A D | ECPKParameters_print.pod | 16 int ECPKParameters_print(BIO *bp, const EC_GROUP *x, int off); 17 int ECPKParameters_print_fp(FILE *fp, const EC_GROUP *x, int off); 29 or B<fp>. The output lines are indented by B<off> spaces.
|
/openssl-master/crypto/bio/ |
A D | bss_mem.c | 248 long off, remain; in mem_ctrl() local 257 off = (bm->data == bo->data) ? 0 : bm->data - bo->data; in mem_ctrl() 277 if (num < 0 || num > off + remain) in mem_ctrl() 283 off = num; in mem_ctrl() 286 ret = off; in mem_ctrl()
|
/openssl-master/include/internal/ |
A D | ktls.h | 188 static ossl_inline ossl_ssize_t ktls_sendfile(int s, int fd, off_t off, in ktls_sendfile() argument 194 ret = sendfile(fd, s, off, size, NULL, &sbytes, flags); in ktls_sendfile() 332 static ossl_inline ossl_ssize_t ktls_sendfile(int s, int fd, off_t off, size_t size, int flags) in ktls_sendfile() argument 334 return sendfile(s, fd, &off, size); in ktls_sendfile()
|
/openssl-master/providers/implementations/ciphers/ |
A D | cipher_aes_cbc_hmac_sha1_hw.c | 259 off = hash_d[i].blocks * 64; in tls1_multi_block_encrypt() local 260 const unsigned char *ptr = hash_d[i].ptr + off; in tls1_multi_block_encrypt() 262 off = (len - processed) - (64 - 13) - off; /* remainder actually */ in tls1_multi_block_encrypt() 263 memcpy(blocks[i].c, ptr, off); in tls1_multi_block_encrypt() 264 blocks[i].c[off] = 0x80; in tls1_multi_block_encrypt() 267 if (off < (64 - 8)) { in tls1_multi_block_encrypt() 603 size_t off = out - p; in aesni_cbc_hmac_sha1_cipher() local 609 ((int)(j - off - SHA_DIGEST_LENGTH)) >> (sizeof(int) * in aesni_cbc_hmac_sha1_cipher() 612 cmask &= ((int)(off - 1 - j)) >> (sizeof(int) * 8 - 1); in aesni_cbc_hmac_sha1_cipher()
|
A D | cipher_aes_cbc_hmac_sha256_hw.c | 267 off = hash_d[i].blocks * 64; in tls1_multi_block_encrypt() local 268 const unsigned char *ptr = hash_d[i].ptr + off; in tls1_multi_block_encrypt() 270 off = (len - processed) - (64 - 13) - off; /* remainder actually */ in tls1_multi_block_encrypt() 271 memcpy(blocks[i].c, ptr, off); in tls1_multi_block_encrypt() 272 blocks[i].c[off] = 0x80; in tls1_multi_block_encrypt() 275 if (off < (64 - 8)) { in tls1_multi_block_encrypt() 655 size_t off = out - p; in aesni_cbc_hmac_sha256_cipher() local 663 ((int)(j - off - SHA256_DIGEST_LENGTH)) >> in aesni_cbc_hmac_sha256_cipher() 666 cmask &= ((int)(off - 1 - j)) >> (sizeof(int) * 8 - 1); in aesni_cbc_hmac_sha256_cipher()
|
/openssl-master/ssl/record/ |
A D | record_local.h | 95 #define SSL3_RECORD_get_off(r) ((r)->off) 96 #define SSL3_RECORD_set_off(r, o) ((r)->off = (o)) 97 #define SSL3_RECORD_add_off(r, o) ((r)->off += (o))
|
A D | record.h | 52 size_t off; member 247 size_t off);
|
/openssl-master/test/recipes/04-test_conf_data/ |
A D | dollarid_off.cnf | 1 .pragma dollarid:off
|
/openssl-master/crypto/evp/ |
A D | e_aes_cbc_hmac_sha1.c | 296 off = hash_d[i].blocks * 64; in tls1_1_multi_block_encrypt() local 297 const unsigned char *ptr = hash_d[i].ptr + off; in tls1_1_multi_block_encrypt() 299 off = (len - processed) - (64 - 13) - off; /* remainder actually */ in tls1_1_multi_block_encrypt() 300 memcpy(blocks[i].c, ptr, off); in tls1_1_multi_block_encrypt() 301 blocks[i].c[off] = 0x80; in tls1_1_multi_block_encrypt() 304 if (off < (64 - 8)) { in tls1_1_multi_block_encrypt() 702 size_t off = out - p; in aesni_cbc_hmac_sha1_cipher() local 708 ((int)(j - off - SHA_DIGEST_LENGTH)) >> (sizeof(int) * in aesni_cbc_hmac_sha1_cipher() 711 cmask &= ((int)(off - 1 - j)) >> (sizeof(int) * 8 - 1); in aesni_cbc_hmac_sha1_cipher()
|
A D | e_aes_cbc_hmac_sha256.c | 295 off = hash_d[i].blocks * 64; in tls1_1_multi_block_encrypt() local 296 const unsigned char *ptr = hash_d[i].ptr + off; in tls1_1_multi_block_encrypt() 298 off = (len - processed) - (64 - 13) - off; /* remainder actually */ in tls1_1_multi_block_encrypt() 299 memcpy(blocks[i].c, ptr, off); in tls1_1_multi_block_encrypt() 300 blocks[i].c[off] = 0x80; in tls1_1_multi_block_encrypt() 303 if (off < (64 - 8)) { in tls1_1_multi_block_encrypt() 706 size_t off = out - p; in aesni_cbc_hmac_sha256_cipher() local 713 ((int)(j - off - SHA256_DIGEST_LENGTH)) >> in aesni_cbc_hmac_sha256_cipher() 716 cmask &= ((int)(off - 1 - j)) >> (sizeof(int) * 8 - 1); in aesni_cbc_hmac_sha256_cipher()
|
/openssl-master/test/ |
A D | danetest.c | 305 int off; in test_tlsafile() local 316 &ntlsa, &ncert, &noncheck, &want, &want_depth, &off) != 5 in test_tlsafile() 317 || !allws(line + off)) { in test_tlsafile()
|
/openssl-master/crypto/sha/asm/ |
A D | sha256-586.pl | 373 sub off { &DWP(4*(((shift)-$i)&7),"esp"); } subroutine 444 &mov ($t2,&off($f)); 447 &mov ("edi",&off($g)); 454 &mov (&off($e),$t1); # save $E, modulo-scheduled 456 &add ($T,&off($h)); # T += h 464 &mov ("edi",&off($b)); 466 &mov (&off($a),$AH[0]); # save $A, modulo-scheduled 477 &add ($E,&off($d)); # d += T
|