| /crypto/bio/ |
| A D | bio_print.c | 40 static int _dopr(char **sbuffer, char **buffer, 88 char **buffer, in _dopr() argument 320 if (buffer || *maxlen > INT_MAX) in _dopr() 370 if (buffer == NULL) { in _dopr() 383 char **buffer, in fmtstr() argument 435 char **buffer, in fmtint() argument 569 char **buffer, in fmtfp() argument 851 if (buffer && *currlen == *maxlen) { in doapr_outch() 856 if (*buffer == NULL) { in doapr_outch() 871 *buffer = tmpbuf; in doapr_outch() [all …]
|
| /crypto/rand/ |
| A D | rand_pool.c | 43 if (pool->buffer == NULL) in ossl_rand_pool_new() 74 pool->buffer = (unsigned char *) buffer; in ossl_rand_pool_attach() 114 return pool->buffer; in ossl_rand_pool_buffer() 142 pool->buffer = NULL; in ossl_rand_pool_detach() 153 pool->buffer = buffer; in ossl_rand_pool_reattach() 226 pool->buffer = p; in rand_pool_grow() 309 if (pool->buffer == NULL) { in ossl_rand_pool_add() 323 if (pool->alloc_len > pool->len && pool->buffer + pool->len == buffer) { in ossl_rand_pool_add() 336 memcpy(pool->buffer + pool->len, buffer, len); in ossl_rand_pool_add() 366 if (pool->buffer == NULL) { in ossl_rand_pool_add_begin() [all …]
|
| /crypto/bn/ |
| A D | bn_s390x.c | 27 unsigned char *buffer; in s390x_mod_exp_hw() local 34 buffer = OPENSSL_calloc(size, 4); in s390x_mod_exp_hw() 35 if (buffer == NULL) in s390x_mod_exp_hw() 37 me.inputdata = buffer; in s390x_mod_exp_hw() 39 me.outputdata = buffer + size; in s390x_mod_exp_hw() 41 me.b_key = buffer + 2 * size; in s390x_mod_exp_hw() 42 me.n_modulus = buffer + 3 * size; in s390x_mod_exp_hw() 67 OPENSSL_clear_free(buffer, 4 * size); in s390x_mod_exp_hw() 83 unsigned char *buffer, *part; in s390x_crt() local 99 if (buffer == NULL) in s390x_crt() [all …]
|
| /crypto/ec/curve448/ |
| A D | f_generic.c | 24 dword_t buffer = 0; in gf_serialize() local 35 buffer |= ((dword_t) red->limb[LIMBPERM(j)]) << fill; in gf_serialize() 39 serial[i] = (uint8_t)buffer; in gf_serialize() 41 buffer >>= 8; in gf_serialize() 70 dword_t buffer = 0; in gf_deserialize() local 83 buffer |= ((dword_t) sj) << fill; in gf_deserialize() 88 ((i < NLIMBS - 1) ? buffer & LIMB_MASK(LIMBPERM(i)) : buffer); in gf_deserialize() 90 buffer >>= LIMB_PLACE_VALUE(LIMBPERM(i)); in gf_deserialize() 96 return succ & word_is_zero((word_t)buffer) & ~word_is_zero((word_t)scarry); in gf_deserialize()
|
| /crypto/ |
| A D | provider_conf.c | 87 char buffer[512]; in provider_conf_params_internal() local 112 OPENSSL_strlcpy(buffer, name, sizeof(buffer)); in provider_conf_params_internal() 113 OPENSSL_strlcat(buffer, ".", sizeof(buffer)); in provider_conf_params_internal() 114 buffer_len = strlen(buffer); in provider_conf_params_internal() 120 if (buffer_len + strlen(sectconf->name) >= sizeof(buffer)) { in provider_conf_params_internal() 124 buffer[buffer_len] = '\0'; in provider_conf_params_internal() 125 OPENSSL_strlcat(buffer, sectconf->name, sizeof(buffer)); in provider_conf_params_internal() 126 rc = provider_conf_params_internal(prov, provinfo, buffer, in provider_conf_params_internal()
|
| A D | threads_pthread.c | 752 void *buffer[BT_BUF_SIZE]; in record_lock_contention() local 761 traces->stacks[traces->idx].nptrs = backtrace(buffer, BT_BUF_SIZE); in record_lock_contention() 762 traces->stacks[traces->idx].strings = backtrace_symbols(buffer, in record_lock_contention()
|
| A D | build.info | 3 SUBDIRS=objects buffer bio stack lhash hashtable rand evp asn1 pem x509 conf \
|
| /crypto/dso/ |
| A D | dso_dlfcn.c | 367 char *buffer, *member; in dladdr() local 375 if ((buffer = OPENSSL_malloc(buffer_sz)) != NULL) { in dladdr() 376 OPENSSL_strlcpy(buffer, this_ldi->ldinfo_filename, buffer_sz); in dladdr() 383 OPENSSL_strlcat(buffer, "(", buffer_sz); in dladdr() 384 OPENSSL_strlcat(buffer, member, buffer_sz); in dladdr() 385 OPENSSL_strlcat(buffer, ")", buffer_sz); in dladdr() 387 dl->dli_fname = buffer; in dladdr()
|
| /crypto/buffer/ |
| A D | build.info | 2 SOURCE[../../libcrypto]=buffer.c buf_err.c 3 SOURCE[../../providers/libfips.a]=buffer.c
|
| /crypto/comp/ |
| A D | c_zstd.c | 460 void* buffer; member 566 OPENSSL_free(ctx->decompress.buffer); in bio_zstd_free() 590 if (ctx->decompress.buffer == NULL) { in bio_zstd_read() 591 ctx->decompress.buffer = OPENSSL_malloc(ctx->decompress.bufsize); in bio_zstd_read() 592 if (ctx->decompress.buffer == NULL) { in bio_zstd_read() 596 ctx->decompress.inbuf.src = ctx->decompress.buffer; in bio_zstd_read() 623 ret = BIO_read(next, ctx->decompress.buffer, (int)ctx->decompress.bufsize); in bio_zstd_read() 785 if (ctx->decompress.buffer != NULL) { in bio_zstd_ctrl() 786 tmp = OPENSSL_realloc(ctx->decompress.buffer, ibs); in bio_zstd_ctrl() 789 if (ctx->decompress.inbuf.src == ctx->decompress.buffer) in bio_zstd_ctrl() [all …]
|
| /crypto/evp/ |
| A D | evp_rand.c | 705 unsigned char **buffer, in evp_rand_get_seed_locked() argument 713 return ctx->meth->get_seed(ctx->algctx, buffer, in evp_rand_get_seed_locked() 721 unsigned char **buffer, in evp_rand_get_seed() argument 731 buffer, in evp_rand_get_seed() 740 unsigned char *buffer, size_t b_len) in evp_rand_clear_seed_locked() argument 743 ctx->meth->clear_seed(ctx->algctx, buffer, b_len); in evp_rand_clear_seed_locked() 747 unsigned char *buffer, size_t b_len) in evp_rand_clear_seed() argument 751 evp_rand_clear_seed_locked(ctx, buffer, b_len); in evp_rand_clear_seed()
|
| A D | p_lib.c | 2219 unsigned char buffer[2048]; in EVP_PKEY_get_bn_param() local 2227 memset(buffer, 0, sizeof(buffer)); in EVP_PKEY_get_bn_param() 2228 params[0] = OSSL_PARAM_construct_BN(key_name, buffer, sizeof(buffer)); in EVP_PKEY_get_bn_param() 2258 OPENSSL_cleanse(buffer, params[0].data_size); in EVP_PKEY_get_bn_param() 2365 unsigned char buffer[2048]; in EVP_PKEY_set_bn_param() local 2375 if (!ossl_assert(bsize <= (int)sizeof(buffer))) in EVP_PKEY_set_bn_param() 2378 if (BN_bn2nativepad(bn, buffer, bsize) < 0) in EVP_PKEY_set_bn_param() 2380 params[0] = OSSL_PARAM_construct_BN(key_name, buffer, bsize); in EVP_PKEY_set_bn_param()
|
| /crypto/x509/ |
| A D | by_dir.c | 46 BUF_MEM *buffer; member 115 if ((a->buffer = BUF_MEM_new()) == NULL) { in new_dir() 122 BUF_MEM_free(a->buffer); in new_dir() 161 BUF_MEM_free(a->buffer); in free_dir()
|
| /crypto/ts/ |
| A D | ts_rsp_verify.c | 428 unsigned char buffer[4096]; in ts_compute_imprint() local 468 while ((length = BIO_read(data, buffer, sizeof(buffer))) > 0) { in ts_compute_imprint() 469 if (!EVP_DigestUpdate(md_ctx, buffer, length)) in ts_compute_imprint()
|
| /crypto/ec/ |
| A D | ec_asn1.c | 387 unsigned char *buffer = NULL; in EC_GROUP_get_ecparameters() local 423 len = EC_POINT_point2buf(group, point, form, &buffer, NULL); in EC_GROUP_get_ecparameters() 429 OPENSSL_free(buffer); in EC_GROUP_get_ecparameters() 433 ASN1_STRING_set0(ret->base, buffer, (int)len); in EC_GROUP_get_ecparameters()
|
| /crypto/err/ |
| A D | openssl.ec | 11 L BUF include/openssl/buffererr.h crypto/buffer/buf_err.c include/cry…
|
| A D | openssl.txt | 18 ASN1_R_BUFFER_TOO_SMALL:107:buffer too small 518 CRYPTO_R_TOO_SMALL_BUFFER:116:too small buffer 604 EC_R_BUFFER_TOO_SMALL:100:buffer too small 727 EVP_R_BUFFER_TOO_SMALL:155:buffer too small 1157 PROV_R_NULL_OUTPUT_BUFFER:248:null output buffer 1161 PROV_R_OUTPUT_BUFFER_TOO_SMALL:106:output buffer too small 1201 PROV_R_WRONG_OUTPUT_BUFFER_SIZE:139:wrong output buffer size 1340 SM2_R_BUFFER_TOO_SMALL:107:buffer too small 1772 UI_R_NO_RESULT_BUFFER:105:no result buffer
|
| /crypto/bn/asm/ |
| A D | vis3-mont.pl | 67 add %g5, %g1, %g1 ! 3*buffer size
|
| /crypto/aes/asm/ |
| A D | bsaes-armv8.pl | 1865 // to final position and reuse penultimate ciphertext block buffer to
|