Home
last modified time | relevance | path

Searched refs:buff (Results 1 – 19 of 19) sorted by relevance

/openssl/test/testutil/
H A Dstanza.c92 for (s->numpairs = 0; BIO_gets(s->fp, s->buff, sizeof(s->buff)); ) { in test_readstanza()
94 if (!TEST_ptr(p = strchr(s->buff, '\n'))) { in test_readstanza()
101 if (s->buff[0] == '\0') in test_readstanza()
105 if (s->buff[0] == '#') in test_readstanza()
109 if (!TEST_ptr(equals = strchr(s->buff, '='))) { in test_readstanza()
114 if (!TEST_ptr(key = strip_spaces(s->buff))) { in test_readstanza()
/openssl/crypto/ui/
H A Dui_util.c22 char buff[BUFSIZ]; in UI_UTIL_read_pw_string() local
26 UI_UTIL_read_pw(buf, buff, (length > BUFSIZ) ? BUFSIZ : length, in UI_UTIL_read_pw_string()
28 OPENSSL_cleanse(buff, BUFSIZ); in UI_UTIL_read_pw_string()
32 int UI_UTIL_read_pw(char *buf, char *buff, int size, const char *prompt, in UI_UTIL_read_pw() argument
45 ok = UI_add_verify_string(ui, prompt, 0, buff, 0, size - 1, buf); in UI_UTIL_read_pw()
/openssl/crypto/modes/
H A Dwrap128.c277 unsigned char buff[16]; in CRYPTO_128_unwrap_pad() local
279 block(in, buff, key); in CRYPTO_128_unwrap_pad()
280 memcpy(aiv, buff, 8); in CRYPTO_128_unwrap_pad()
282 memcpy(out, buff + 8, 8); in CRYPTO_128_unwrap_pad()
284 OPENSSL_cleanse(buff, inlen); in CRYPTO_128_unwrap_pad()
/openssl/crypto/des/
H A Dfcrypt.c66 static char buff[14]; in DES_crypt() local
69 return DES_fcrypt(buf, salt, buff); in DES_crypt()
89 ret = DES_fcrypt(e_buf, e_salt, buff); in DES_crypt()
/openssl/apps/lib/
H A Dapps_ui.c169 char *buff = NULL; in password_callback() local
196 buff = ui_malloc(bufsiz, "password buffer"); in password_callback()
197 ok = UI_add_verify_string(ui, prompt, ui_flags, buff, in password_callback()
205 OPENSSL_clear_free(buff, (unsigned int)bufsiz); in password_callback()
/openssl/crypto/ec/
H A Decx_meth.c1067 buff[0] &= 248; in s390x_pkey_ecd_keygen25519()
1068 buff[31] &= 63; in s390x_pkey_ecd_keygen25519()
1069 buff[31] |= 64; in s390x_pkey_ecd_keygen25519()
1139 if (EVP_DigestFinalXOF(hashctx, buff, sizeof(buff)) != 1) in s390x_pkey_ecd_keygen448()
1142 buff[0] &= -4; in s390x_pkey_ecd_keygen448()
1143 buff[55] |= 0x80; in s390x_pkey_ecd_keygen448()
1144 buff[56] = 0; in s390x_pkey_ecd_keygen448()
1197 unsigned long long buff[512]; in s390x_pkey_ecd_digestsign25519() member
1242 unsigned long long buff[512]; in s390x_pkey_ecd_digestsign448() member
1290 unsigned long long buff[512]; in s390x_pkey_ecd_digestverify25519() member
[all …]
H A Decx_s390x.c87 unsigned long long buff[512]; in s390x_x25519_mul() member
120 unsigned long long buff[512]; in s390x_x448_mul() member
160 unsigned long long buff[512]; in s390x_ed25519_mul() member
194 unsigned long long buff[512]; in s390x_ed448_mul() member
/openssl/crypto/evp/
H A Devp_key.c56 char buff[BUFSIZ]; in EVP_read_pw_string_min() local
67 && UI_add_verify_string(ui, prompt, 0, buff, min, in EVP_read_pw_string_min()
72 OPENSSL_cleanse(buff, BUFSIZ); in EVP_read_pw_string_min()
/openssl/crypto/
H A Dmem.c144 char buff[80]; in shouldfail() local
147 BIO_snprintf(buff, sizeof(buff), in shouldfail()
150 len = strlen(buff); in shouldfail()
151 if (write(md_tracefd, buff, len) != len) in shouldfail()
H A Ds390xcap.c721 char *tok_begin, *tok_end, *buff, tok[S390X_STFLE_MAX][LEN + 1]; in parse_env() local
724 buff = malloc(strlen(env) + 1); in parse_env()
725 if (buff == NULL) in parse_env()
730 strcpy(buff, env); in parse_env()
732 tok_begin = buff + strspn(buff, ";"); in parse_env()
799 free(buff); in parse_env()
/openssl/providers/implementations/keymgmt/
H A Decx_kmgmt.c1151 unsigned char x_dst[32], buff[SHA512_DIGEST_LENGTH]; in s390x_ecd_keygen25519() local
1182 j = EVP_Digest(privkey, 32, buff, &sz, sha, NULL); in s390x_ecd_keygen25519()
1187 buff[0] &= 248; in s390x_ecd_keygen25519()
1188 buff[31] &= 63; in s390x_ecd_keygen25519()
1189 buff[31] |= 64; in s390x_ecd_keygen25519()
1219 unsigned char x_dst[57], buff[114]; in s390x_ecd_keygen448() local
1256 if (EVP_DigestFinalXOF(hashctx, buff, sizeof(buff)) != 1) in s390x_ecd_keygen448()
1259 buff[0] &= -4; in s390x_ecd_keygen448()
1260 buff[55] |= 0x80; in s390x_ecd_keygen448()
1261 buff[56] = 0; in s390x_ecd_keygen448()
[all …]
/openssl/crypto/conf/
H A Dconf_def.c213 BUF_MEM *buff = NULL; in def_load_bio() local
233 if ((buff = BUF_MEM_new()) == NULL) { in def_load_bio()
256 if (!BUF_MEM_grow(buff, bufnum + CONFBUFSIZE)) { in def_load_bio()
260 p = &(buff->data[bufnum]); in def_load_bio()
338 p = &(buff->data[bufnum - 1]); in def_load_bio()
347 buf = buff->data; in def_load_bio()
561 BUF_MEM_free(buff); in def_load_bio()
571 BUF_MEM_free(buff); in def_load_bio()
/openssl/doc/man3/
H A DUI_UTIL_read_pw.pod14 int UI_UTIL_read_pw(char *buf, char *buff, int size, const char *prompt,
27 difference is that you can give it an external buffer B<buff> for the
/openssl/apps/
H A Denc.c137 unsigned char *buff = NULL, salt[EVP_MAX_IV_LENGTH]; in enc_main() local
372 buff = app_malloc(EVP_ENCODE_LENGTH(bsize), "evp buffer"); in enc_main()
690 inl = BIO_read(rbio, (char *)buff, bsize); in enc_main()
697 if (BIO_write(wbio, (char *)buff, inl) != inl) { in enc_main()
720 OPENSSL_free(buff); in enc_main()
H A Ds_server.c269 char buff[1]; member
296 wbuf->buff[0] = '\0'; in ebcdic_new()
355 wbuf->buff[0] = '\0'; in ebcdic_write()
360 ebcdic2ascii(wbuf->buff, in, inl); in ebcdic_write()
362 ret = BIO_write(next, wbuf->buff, inl); in ebcdic_write()
/openssl/providers/implementations/signature/
H A Deddsa_sig.c1056 unsigned long long buff[512]; in s390x_ed25519_digestsign() member
1081 unsigned long long buff[512]; in s390x_ed448_digestsign() member
1108 unsigned long long buff[512]; in s390x_ed25519_digestverify() member
1130 unsigned long long buff[512]; in s390x_ed448_digestverify() member
/openssl/engines/
H A De_loader_attic.c928 BIO *buff = NULL; in file_find_type() local
931 if ((buff = BIO_new(BIO_f_buffer())) == NULL) in file_find_type()
934 ctx->_.file.file = BIO_push(buff, ctx->_.file.file); in file_find_type()
1662 BIO *buff = ctx->_.file.file; in file_close() local
1669 BIO_free(buff); in file_close()
/openssl/test/
H A Dtestutil.h594 char buff[4096]; /* Input buffer for a single key/value */ member
/openssl/include/openssl/
H A Dui.h.in376 int UI_UTIL_read_pw(char *buf, char *buff, int size, const char *prompt,

Completed in 61 milliseconds