/openssl/providers/implementations/rands/seeding/ |
H A D | rand_win.c | 73 size_t bytes = 0; in ossl_pool_acquire_entropy() local 76 bytes = bytes_needed; in ossl_pool_acquire_entropy() 78 ossl_rand_pool_add_end(pool, bytes, 8 * bytes); in ossl_pool_acquire_entropy() 87 size_t bytes = 0; in ossl_pool_acquire_entropy() local 92 bytes = bytes_needed; in ossl_pool_acquire_entropy() 97 ossl_rand_pool_add_end(pool, bytes, 8 * bytes); in ossl_pool_acquire_entropy() 106 size_t bytes = 0; in ossl_pool_acquire_entropy() local 112 bytes = bytes_needed; in ossl_pool_acquire_entropy() 116 ossl_rand_pool_add_end(pool, bytes, 8 * bytes); in ossl_pool_acquire_entropy()
|
H A D | rand_unix.c | 635 ssize_t bytes; in ossl_pool_acquire_entropy() 643 if (bytes > 0) { in ossl_pool_acquire_entropy() 644 ossl_rand_pool_add_end(pool, bytes, 8 * bytes); in ossl_pool_acquire_entropy() 645 bytes_needed -= bytes; in ossl_pool_acquire_entropy() 666 ssize_t bytes = 0; in ossl_pool_acquire_entropy() 678 if (bytes > 0) { in ossl_pool_acquire_entropy() 679 ossl_rand_pool_add_end(pool, bytes, 8 * bytes); in ossl_pool_acquire_entropy() 680 bytes_needed -= bytes; in ossl_pool_acquire_entropy() 718 size_t bytes = 0; in ossl_pool_acquire_entropy() 725 bytes = bytes_needed; in ossl_pool_acquire_entropy() [all …]
|
/openssl/test/ |
H A D | cipherbytes_test.c | 30 const unsigned char bytes[] = {0x00}; in test_empty() local 33 if (!TEST_int_eq(SSL_bytes_to_cipher_list(s, bytes, 0, 0, &sk, &scsv), 0) in test_empty() 49 const unsigned char bytes[] = {0xc0, 0x0f, 0x00, 0x2f, 0x01, 0x00}; in test_unsupported() local 52 if (!TEST_true(SSL_bytes_to_cipher_list(s, bytes, sizeof(bytes), in test_unsupported() 74 const unsigned char bytes[] = {0x00, 0x00, 0x35, 0x01, 0x00, 0x80, in test_v2() local 78 if (!TEST_true(SSL_bytes_to_cipher_list(s, bytes, sizeof(bytes), 1, in test_v2() 104 const unsigned char bytes[] = {0x00, 0x2f, 0x00, 0x33, 0x00, 0x9f, 0x00, 0xff, in test_v3() local 108 if (!SSL_bytes_to_cipher_list(s, bytes, sizeof(bytes), 0, &sk, &scsv) in test_v3()
|
H A D | packettest.c | 156 const unsigned char *bytes = NULL; in test_PACKET_get_bytes() local 161 || !TEST_uchar_eq(bytes[0], 2) in test_PACKET_get_bytes() 162 || !TEST_uchar_eq(bytes[1], 4) in test_PACKET_get_bytes() 163 || !TEST_uchar_eq(bytes[2], 6) in test_PACKET_get_bytes() 164 || !TEST_uchar_eq(bytes[3], 8) in test_PACKET_get_bytes() 168 || !TEST_uchar_eq(bytes[0], 0xf8) in test_PACKET_get_bytes() 180 unsigned char bytes[4]; in test_PACKET_copy_bytes() local 185 || !TEST_char_eq(bytes[0], 2) in test_PACKET_copy_bytes() 186 || !TEST_char_eq(bytes[1], 4) in test_PACKET_copy_bytes() 187 || !TEST_char_eq(bytes[2], 6) in test_PACKET_copy_bytes() [all …]
|
H A D | bio_base64_test.c | 23 unsigned bytes; member 202 raw = OPENSSL_zalloc(t->bytes); in test_bio_base64_run() 204 raw = genbytes(t->bytes); in test_bio_base64_run() 206 if (raw == NULL && t->bytes > 0) { in test_bio_base64_run() 211 out_len = t->bytes + 1024; in test_bio_base64_run() 296 || n != (int) t->bytes in test_bio_base64_run() 334 fprintf(stderr, ", datalen=%u", t->bytes); in generic_case() 356 if (*llen > t->bytes + (t->bytes >> 1)) in generic_case() 389 t.bytes = lengths[lencase]; in test_bio_base64_generated() 392 t.bytes += padcase; in test_bio_base64_generated() [all …]
|
H A D | bio_readbuffer_test.c | 32 size_t readbytes = 0, bytes = 0, count = 0; in test_readbuffer_file_bio() local 82 if (!TEST_int_eq(BIO_read_ex(in_bio, buf, len, &bytes), 1)) in test_readbuffer_file_bio() 84 if (!TEST_mem_eq(buf, bytes, expected + count, bytes)) in test_readbuffer_file_bio() 86 count += bytes; in test_readbuffer_file_bio()
|
H A D | wpackettest.c | 334 unsigned char *bytes; in test_WPACKET_allocate_bytes() local 339 bytes[0] = 0xfe; in test_WPACKET_allocate_bytes() 340 bytes[1] = 0xff; in test_WPACKET_allocate_bytes() 350 bytes[0] = 0xfe; in test_WPACKET_allocate_bytes() 351 bytes[1] = 0xff; in test_WPACKET_allocate_bytes() 367 || !TEST_true(WPACKET_memcpy(&pkt, bytes, sizeof(bytes))) in test_WPACKET_memcpy() 375 || !TEST_true(WPACKET_sub_memcpy_u8(&pkt, bytes, sizeof(bytes))) in test_WPACKET_memcpy() 461 unsigned char *bytes; in test_WPACKET_quic() local 531 bytes[0] = 0x55; in test_WPACKET_quic() 532 bytes[1] = 0x66; in test_WPACKET_quic() [all …]
|
/openssl/test/recipes/30-test_evp_data/ |
H A D | evpciph_aes_cts.txt | 17 # 32 bytes input 24 # 48 bytes input 31 # 64 bytes input 53 # 31 bytes input 62 # 32 bytes input 71 # 47 bytes input 91 # 47 bytes input 99 # 127 bytes 107 # 129 bytes 187 # 47 bytes input [all …]
|
H A D | evpciph_camellia_cts.txt | 69 # Plaintext: 13 bytes byte (31332062797465732062797465) 80 # Plaintext: 30 bytes bytes bytes bytes byt (333020627974657320627974657320627974657320627974657320… 124 # Plaintext: 13 bytes byte (31332062797465732062797465) 135 # Plaintext: 30 bytes bytes bytes bytes byt (333020627974657320627974657320627974657320627974657320…
|
/openssl/crypto/x509/ |
H A D | x509name.c | 148 ne = X509_NAME_ENTRY_create_by_OBJ(NULL, obj, type, bytes, len); in X509_NAME_add_entry_by_OBJ() 162 ne = X509_NAME_ENTRY_create_by_NID(NULL, nid, type, bytes, len); in X509_NAME_add_entry_by_NID() 176 ne = X509_NAME_ENTRY_create_by_txt(NULL, field, type, bytes, len); in X509_NAME_add_entry_by_txt() 256 nentry = X509_NAME_ENTRY_create_by_OBJ(ne, obj, type, bytes, len); in X509_NAME_ENTRY_create_by_txt() 294 if (!X509_NAME_ENTRY_set_data(ret, type, bytes, len)) in X509_NAME_ENTRY_create_by_OBJ() 318 const unsigned char *bytes, int len) in X509_NAME_ENTRY_set_data() argument 322 if ((ne == NULL) || ((bytes == NULL) && (len != 0))) in X509_NAME_ENTRY_set_data() 325 return ASN1_STRING_set_by_NID(&ne->value, bytes, in X509_NAME_ENTRY_set_data() 329 len = strlen((const char *)bytes); in X509_NAME_ENTRY_set_data() 330 i = ASN1_STRING_set(ne->value, bytes, len); in X509_NAME_ENTRY_set_data() [all …]
|
H A D | x509_att.c | 143 attr = X509_ATTRIBUTE_create_by_OBJ(NULL, obj, type, bytes, len); in STACK_OF() 154 const unsigned char *bytes, in STACK_OF() 167 return ossl_x509at_add1_attr_by_OBJ(x, obj, type, bytes, len); in STACK_OF() 178 attr = X509_ATTRIBUTE_create_by_NID(NULL, nid, type, bytes, len); in STACK_OF() 188 const unsigned char *bytes, in STACK_OF() 201 return ossl_x509at_add1_attr_by_NID(x, nid, type, bytes, len); in STACK_OF() 213 attr = X509_ATTRIBUTE_create_by_txt(NULL, attrname, type, bytes, len); in STACK_OF() 224 const unsigned char *bytes, in STACK_OF() 230 attr = X509_ATTRIBUTE_create_by_txt(NULL, attrname, type, bytes, len); in STACK_OF() 317 const unsigned char *bytes, in X509_ATTRIBUTE_create_by_txt() argument [all …]
|
/openssl/crypto/cms/ |
H A D | cms_att.c | 105 const void *bytes, int len) in CMS_signed_add1_attr_by_OBJ() argument 107 if (ossl_x509at_add1_attr_by_OBJ(&si->signedAttrs, obj, type, bytes, len)) in CMS_signed_add1_attr_by_OBJ() 113 int nid, int type, const void *bytes, int len) in CMS_signed_add1_attr_by_NID() argument 115 if (ossl_x509at_add1_attr_by_NID(&si->signedAttrs, nid, type, bytes, len)) in CMS_signed_add1_attr_by_NID() 122 const void *bytes, int len) in CMS_signed_add1_attr_by_txt() argument 124 if (ossl_x509at_add1_attr_by_txt(&si->signedAttrs, attrname, type, bytes, in CMS_signed_add1_attr_by_txt() 173 const void *bytes, int len) in CMS_unsigned_add1_attr_by_OBJ() argument 175 if (ossl_x509at_add1_attr_by_OBJ(&si->unsignedAttrs, obj, type, bytes, len)) in CMS_unsigned_add1_attr_by_OBJ() 182 const void *bytes, int len) in CMS_unsigned_add1_attr_by_NID() argument 191 const void *bytes, int len) in CMS_unsigned_add1_attr_by_txt() argument [all …]
|
/openssl/doc/man3/ |
H A D | EVP_EncodeInit.pod | 36 bytes of binary data provided 4 bytes of base64 encoded data will be produced 49 For each 48 byte input block encoded 64 bytes of base64 data 51 final block (which may be less than 48 bytes) will output 4 bytes for every 3 52 bytes of input. If the data length is not divisible by 3 then a full 4 bytes is 79 65 bytes plus an additional NUL terminator (i.e. 66 bytes in total). 88 B<n> and stores it in B<t>. For every 3 bytes of input provided 4 bytes of 92 example if 16 bytes of input data is provided then 24 bytes of encoded data is 117 input bytes. 149 For every 4 input bytes exactly 3 output bytes will be produced. 152 bytes at the tail of the returned output. [all …]
|
H A D | X509_ACERT_add1_attr.pod | 18 const void *bytes, int len); 20 int type, const void *bytes, int len); 22 const unsigned char *bytes, int len); 32 type I<type> constructed using I<len> bytes from I<bytes>. 35 ASN1 type I<type> constructed using I<len> bytes from I<bytes>.
|
H A D | PKCS12_add1_attr_by_NID.pod | 13 const unsigned char *bytes, int len); 15 const unsigned char *bytes, int len); 22 type B<type> constructed using B<len> bytes from B<bytes>. 25 ASN1 type B<type> constructed using B<len> bytes from B<bytes>.
|
H A D | SSL_pending.pod | 5 SSL_pending, SSL_has_pending - check for readable bytes buffered in an 21 SSL_pending() returns the number of bytes which have been processed, buffered 25 L<SSL_CTX_set_read_ahead(3)>), additional protocol bytes (beyond the current 28 additional bytes will be buffered by OpenSSL but will remain unprocessed until 29 they are needed. As these bytes are still in an unprocessed state SSL_pending() 30 will ignore them. Therefore, it is possible for no more bytes to be readable from 32 to return 0, even though readable application data bytes are available (because 48 bytes that are pending and are available for immediate read. SSL_has_pending()
|
/openssl/crypto/rand/ |
H A D | randfile.c | 85 int RAND_load_file(const char *file, long bytes) in RAND_load_file() argument 103 if (bytes == 0) in RAND_load_file() 120 if (bytes < 0) { in RAND_load_file() 122 bytes = sb.st_size; in RAND_load_file() 124 bytes = RAND_DRBG_STRENGTH; in RAND_load_file() 149 if (bytes > 0) in RAND_load_file() 150 n = (bytes <= RAND_LOAD_BUF_SIZE) ? (int)bytes : RAND_BUF_SIZE; in RAND_load_file() 168 if (bytes > 0 && (bytes -= i) <= 0) in RAND_load_file()
|
H A D | rand_egd.c | 21 int RAND_query_egd_bytes(const char *path, unsigned char *buf, int bytes) in RAND_query_egd_bytes() argument 31 int RAND_egd_bytes(const char *path, int bytes) in RAND_egd_bytes() argument 109 int RAND_query_egd_bytes(const char *path, unsigned char *buf, int bytes) in RAND_query_egd_bytes() argument 116 if (bytes > (int)sizeof(tempbuf)) in RAND_query_egd_bytes() 178 tempbuf[1] = bytes; in RAND_query_egd_bytes() 204 int RAND_egd_bytes(const char *path, int bytes) in RAND_egd_bytes() argument 208 num = RAND_query_egd_bytes(path, NULL, bytes); in RAND_egd_bytes()
|
/openssl/test/testutil/ |
H A D | format_output.c | 209 int n = bytes * 2, i; in convert_bn_memory() 271 const size_t bytes = bn_bytes; in test_fail_bignum_common() local 300 len = ((l1 > l2 ? l1 : l2) + bytes - 1) / bytes * bytes; in test_fail_bignum_common() 318 cnt = 8 * (len - bytes); in test_fail_bignum_common() 319 n1 = convert_bn_memory(m1, bytes, b1, &lz1, bn1); in test_fail_bignum_common() 350 m1 += bytes; in test_fail_bignum_common() 352 m2 += bytes; in test_fail_bignum_common() 353 len -= bytes; in test_fail_bignum_common() 458 n1 = l1 > bytes ? bytes : l1; in test_fail_memory_common() 462 n2 = l2 > bytes ? bytes : l2; in test_fail_memory_common() [all …]
|
/openssl/include/internal/ |
H A D | packet.h | 817 #define WPACKET_sub_allocate_bytes_u8(pkt, len, bytes) \ argument 819 #define WPACKET_sub_allocate_bytes_u16(pkt, len, bytes) \ argument 821 #define WPACKET_sub_allocate_bytes_u24(pkt, len, bytes) \ argument 823 #define WPACKET_sub_allocate_bytes_u32(pkt, len, bytes) \ argument 855 #define WPACKET_sub_reserve_bytes_u8(pkt, len, bytes) \ argument 856 WPACKET_reserve_bytes__((pkt), (len), (bytes), 1) 857 #define WPACKET_sub_reserve_bytes_u16(pkt, len, bytes) \ argument 858 WPACKET_sub_reserve_bytes__((pkt), (len), (bytes), 2) 859 #define WPACKET_sub_reserve_bytes_u24(pkt, len, bytes) \ argument 860 WPACKET_sub_reserve_bytes__((pkt), (len), (bytes), 3) [all …]
|
/openssl/doc/man1/ |
H A D | openssl-rand.pod.in | 6 openssl-rand - generate pseudo-random bytes 21 This command generates I<num> random bytes using a cryptographically 26 (K = 1024 bytes, M = 1024*1024 bytes, etc). 29 maximum number of bytes the CSPRNG can produce per instantiation. Currently, 30 this is restricted to 2^61 bytes as per NIST SP 800-90C. 32 The random bytes are generated using the L<RAND_bytes(3)> function,
|
/openssl/crypto/whrlpool/ |
H A D | wp_dgst.c | 71 int WHIRLPOOL_Update(WHIRLPOOL_CTX *c, const void *_inp, size_t bytes) in WHIRLPOOL_Update() argument 81 while (bytes >= chunk) { in WHIRLPOOL_Update() 83 bytes -= chunk; in WHIRLPOOL_Update() 86 if (bytes) in WHIRLPOOL_Update() 87 WHIRLPOOL_BitUpdate(c, inp, bytes * 8); in WHIRLPOOL_Update() 253 unsigned char *WHIRLPOOL(const void *inp, size_t bytes, unsigned char *md) in WHIRLPOOL() argument 261 WHIRLPOOL_Update(&ctx, inp, bytes); in WHIRLPOOL()
|
/openssl/crypto/bn/ |
H A D | bn_rand.c | 27 int b, ret = 0, bit, bytes, mask; in bnrand() local 39 bytes = (bits + 7) / 8; in bnrand() 43 buf = OPENSSL_malloc(bytes); in bnrand() 48 b = flag == NORMAL ? RAND_bytes_ex(libctx, buf, bytes, strength) in bnrand() 49 : RAND_priv_bytes_ex(libctx, buf, bytes, strength); in bnrand() 60 for (i = 0; i < bytes; i++) { in bnrand() 86 buf[bytes - 1] |= 1; in bnrand() 87 if (!BN_bin2bn(buf, bytes, rnd)) in bnrand() 91 OPENSSL_clear_free(buf, bytes); in bnrand()
|
/openssl/test/helpers/ |
H A D | pkcs12.h | 79 void add_certbag(PKCS12_BUILDER *pb, const unsigned char *bytes, int len, 81 void add_keybag(PKCS12_BUILDER *pb, const unsigned char *bytes, int len, 98 void check_certbag(PKCS12_BUILDER *pb, const unsigned char *bytes, int len, 100 void check_keybag(PKCS12_BUILDER *pb, const unsigned char *bytes, int len,
|
/openssl/doc/designs/quic-design/ |
H A D | quic-fc.md | 11 bytes allowed to be sent on a stream, or across all streams, since the beginning 19 that the total number of logical bytes sent on a given stream is equivalent to 30 bytes transmitted across all streams since the start of the connection. 61 - **Controlled bytes** refers to any byte which counts for purposes of flow 74 controlled bytes since the beginning of the connection or stream. 82 - The **Credit Watermark** (CWM), which is the number of bytes which have 130 number of controlled bytes we are allowed to send since the start of the 189 a stream-level flow controller whenever we receive any controlled bytes. 190 `numBytes` is the number of controlled bytes we received. (This event is 194 stream payload bytes) have been received). [all …]
|