/openssl/test/testutil/ |
H A D | stanza.c | 92 for (s->numpairs = 0; BIO_gets(s->fp, s->buff, sizeof(s->buff)); ) { in test_readstanza() 94 if (!TEST_ptr(p = strchr(s->buff, '\n'))) { in test_readstanza() 101 if (s->buff[0] == '\0') in test_readstanza() 105 if (s->buff[0] == '#') in test_readstanza() 109 if (!TEST_ptr(equals = strchr(s->buff, '='))) { in test_readstanza() 114 if (!TEST_ptr(key = strip_spaces(s->buff))) { in test_readstanza()
|
/openssl/crypto/ui/ |
H A D | ui_util.c | 22 char buff[BUFSIZ]; in UI_UTIL_read_pw_string() local 26 UI_UTIL_read_pw(buf, buff, (length > BUFSIZ) ? BUFSIZ : length, in UI_UTIL_read_pw_string() 28 OPENSSL_cleanse(buff, BUFSIZ); in UI_UTIL_read_pw_string() 32 int UI_UTIL_read_pw(char *buf, char *buff, int size, const char *prompt, in UI_UTIL_read_pw() argument 45 ok = UI_add_verify_string(ui, prompt, 0, buff, 0, size - 1, buf); in UI_UTIL_read_pw()
|
/openssl/crypto/modes/ |
H A D | wrap128.c | 277 unsigned char buff[16]; in CRYPTO_128_unwrap_pad() local 279 block(in, buff, key); in CRYPTO_128_unwrap_pad() 280 memcpy(aiv, buff, 8); in CRYPTO_128_unwrap_pad() 282 memcpy(out, buff + 8, 8); in CRYPTO_128_unwrap_pad() 284 OPENSSL_cleanse(buff, inlen); in CRYPTO_128_unwrap_pad()
|
/openssl/crypto/des/ |
H A D | fcrypt.c | 66 static char buff[14]; in DES_crypt() local 69 return DES_fcrypt(buf, salt, buff); in DES_crypt() 89 ret = DES_fcrypt(e_buf, e_salt, buff); in DES_crypt()
|
/openssl/apps/lib/ |
H A D | apps_ui.c | 169 char *buff = NULL; in password_callback() local 196 buff = ui_malloc(bufsiz, "password buffer"); in password_callback() 197 ok = UI_add_verify_string(ui, prompt, ui_flags, buff, in password_callback() 205 OPENSSL_clear_free(buff, (unsigned int)bufsiz); in password_callback()
|
/openssl/crypto/ec/ |
H A D | ecx_meth.c | 1067 buff[0] &= 248; in s390x_pkey_ecd_keygen25519() 1068 buff[31] &= 63; in s390x_pkey_ecd_keygen25519() 1069 buff[31] |= 64; in s390x_pkey_ecd_keygen25519() 1139 if (EVP_DigestFinalXOF(hashctx, buff, sizeof(buff)) != 1) in s390x_pkey_ecd_keygen448() 1142 buff[0] &= -4; in s390x_pkey_ecd_keygen448() 1143 buff[55] |= 0x80; in s390x_pkey_ecd_keygen448() 1144 buff[56] = 0; in s390x_pkey_ecd_keygen448() 1197 unsigned long long buff[512]; in s390x_pkey_ecd_digestsign25519() member 1242 unsigned long long buff[512]; in s390x_pkey_ecd_digestsign448() member 1290 unsigned long long buff[512]; in s390x_pkey_ecd_digestverify25519() member [all …]
|
H A D | ecx_s390x.c | 87 unsigned long long buff[512]; in s390x_x25519_mul() member 120 unsigned long long buff[512]; in s390x_x448_mul() member 160 unsigned long long buff[512]; in s390x_ed25519_mul() member 194 unsigned long long buff[512]; in s390x_ed448_mul() member
|
/openssl/crypto/evp/ |
H A D | evp_key.c | 56 char buff[BUFSIZ]; in EVP_read_pw_string_min() local 67 && UI_add_verify_string(ui, prompt, 0, buff, min, in EVP_read_pw_string_min() 72 OPENSSL_cleanse(buff, BUFSIZ); in EVP_read_pw_string_min()
|
/openssl/crypto/ |
H A D | mem.c | 144 char buff[80]; in shouldfail() local 147 BIO_snprintf(buff, sizeof(buff), in shouldfail() 150 len = strlen(buff); in shouldfail() 151 if (write(md_tracefd, buff, len) != len) in shouldfail()
|
H A D | s390xcap.c | 721 char *tok_begin, *tok_end, *buff, tok[S390X_STFLE_MAX][LEN + 1]; in parse_env() local 724 buff = malloc(strlen(env) + 1); in parse_env() 725 if (buff == NULL) in parse_env() 730 strcpy(buff, env); in parse_env() 732 tok_begin = buff + strspn(buff, ";"); in parse_env() 799 free(buff); in parse_env()
|
/openssl/providers/implementations/keymgmt/ |
H A D | ecx_kmgmt.c | 1151 unsigned char x_dst[32], buff[SHA512_DIGEST_LENGTH]; in s390x_ecd_keygen25519() local 1182 j = EVP_Digest(privkey, 32, buff, &sz, sha, NULL); in s390x_ecd_keygen25519() 1187 buff[0] &= 248; in s390x_ecd_keygen25519() 1188 buff[31] &= 63; in s390x_ecd_keygen25519() 1189 buff[31] |= 64; in s390x_ecd_keygen25519() 1219 unsigned char x_dst[57], buff[114]; in s390x_ecd_keygen448() local 1256 if (EVP_DigestFinalXOF(hashctx, buff, sizeof(buff)) != 1) in s390x_ecd_keygen448() 1259 buff[0] &= -4; in s390x_ecd_keygen448() 1260 buff[55] |= 0x80; in s390x_ecd_keygen448() 1261 buff[56] = 0; in s390x_ecd_keygen448() [all …]
|
/openssl/crypto/conf/ |
H A D | conf_def.c | 213 BUF_MEM *buff = NULL; in def_load_bio() local 233 if ((buff = BUF_MEM_new()) == NULL) { in def_load_bio() 256 if (!BUF_MEM_grow(buff, bufnum + CONFBUFSIZE)) { in def_load_bio() 260 p = &(buff->data[bufnum]); in def_load_bio() 338 p = &(buff->data[bufnum - 1]); in def_load_bio() 347 buf = buff->data; in def_load_bio() 561 BUF_MEM_free(buff); in def_load_bio() 571 BUF_MEM_free(buff); in def_load_bio()
|
/openssl/doc/man3/ |
H A D | UI_UTIL_read_pw.pod | 14 int UI_UTIL_read_pw(char *buf, char *buff, int size, const char *prompt, 27 difference is that you can give it an external buffer B<buff> for the
|
/openssl/apps/ |
H A D | enc.c | 137 unsigned char *buff = NULL, salt[EVP_MAX_IV_LENGTH]; in enc_main() local 372 buff = app_malloc(EVP_ENCODE_LENGTH(bsize), "evp buffer"); in enc_main() 690 inl = BIO_read(rbio, (char *)buff, bsize); in enc_main() 697 if (BIO_write(wbio, (char *)buff, inl) != inl) { in enc_main() 720 OPENSSL_free(buff); in enc_main()
|
H A D | s_server.c | 269 char buff[1]; member 296 wbuf->buff[0] = '\0'; in ebcdic_new() 355 wbuf->buff[0] = '\0'; in ebcdic_write() 360 ebcdic2ascii(wbuf->buff, in, inl); in ebcdic_write() 362 ret = BIO_write(next, wbuf->buff, inl); in ebcdic_write()
|
/openssl/providers/implementations/signature/ |
H A D | eddsa_sig.c | 1056 unsigned long long buff[512]; in s390x_ed25519_digestsign() member 1081 unsigned long long buff[512]; in s390x_ed448_digestsign() member 1108 unsigned long long buff[512]; in s390x_ed25519_digestverify() member 1130 unsigned long long buff[512]; in s390x_ed448_digestverify() member
|
/openssl/engines/ |
H A D | e_loader_attic.c | 928 BIO *buff = NULL; in file_find_type() local 931 if ((buff = BIO_new(BIO_f_buffer())) == NULL) in file_find_type() 934 ctx->_.file.file = BIO_push(buff, ctx->_.file.file); in file_find_type() 1662 BIO *buff = ctx->_.file.file; in file_close() local 1669 BIO_free(buff); in file_close()
|
/openssl/test/ |
H A D | testutil.h | 594 char buff[4096]; /* Input buffer for a single key/value */ member
|
/openssl/include/openssl/ |
H A D | ui.h.in | 376 int UI_UTIL_read_pw(char *buf, char *buff, int size, const char *prompt,
|