Home
last modified time | relevance | path

Searched refs:magic (Results 1 – 18 of 18) sorted by relevance

/openssl/crypto/aes/asm/
H A Dvpaes-x86.pl191 &mov ($magic,16);
286 &shl ($magic,4);
290 &xor ($magic,0x30);
292 &and ($magic,0x30);
297 &lea ($magic,&DWP($k_sr-$k_dsbd,$base,$magic));
403 &xor ($magic,0x30);
749 &add ($magic,-16);
750 &and ($magic,0x30);
800 &shr ($magic,1);
801 &and ($magic,32);
[all …]
H A Dbsaes-armv7.pl1632 my ($inp,$out,$len,$key,$rounds,$magic,$fp)=(map("r$_",(7..10,1..3)));
1701 adr $magic, .Lxts_magic
1709 vldmia $magic, {$twmask} @ load XTS magic
1779 vldmia $magic, {$twmask} @ load XTS magic
2110 adr $magic, .Lxts_magic
2124 vldmia $magic, {$twmask} @ load XTS magic
2194 vldmia $magic, {$twmask} @ load XTS magic
2389 mov r5, $magic @ preserve magic
2399 mov $magic, r5
2409 vldmia $magic, {$twmask}
/openssl/test/
H A Dbio_pw_callback_test.c17 char magic; member
118 if (!TEST_char_eq(cb_data->magic, cb_magic)) in read_callback()
140 if (!TEST_char_eq(cb_data->magic, cb_magic)) in write_callback()
169 cb_data.magic = cb_magic; in re_encrypt_key()
183 if (!TEST_char_eq(cb_data.magic, cb_magic)) in re_encrypt_key()
211 cb_data.magic = cb_magic; in decrypt_key()
228 if (!TEST_char_eq(cb_data.magic, cb_magic)) in decrypt_key()
/openssl/crypto/pem/
H A Dpvkfmt.c290 unsigned int bitlen, magic; in do_b2i_key() local
329 unsigned int bitlen, magic, length; in ossl_b2i_bio() local
339 if (ossl_do_blob_header(&p, 16, &magic, &bitlen, &isdss, ispub) <= 0) in ossl_b2i_bio()
570 unsigned int bitlen = 0, magic = 0, keyalg = 0; in do_i2b() local
574 bitlen = check_bitlen_rsa(EVP_PKEY_get0_RSA(pk), ispub, &magic); in do_i2b()
607 write_ledword(&p, magic); in do_i2b()
859 unsigned int magic; in do_PVK_body_key() local
896 magic = read_ledword((const unsigned char **)&q); in do_PVK_body_key()
897 if (magic != MS_RSA2MAGIC && magic != MS_DSS2MAGIC) { in do_PVK_body_key()
906 magic = read_ledword((const unsigned char **)&q); in do_PVK_body_key()
[all …]
/openssl/apps/
H A Dpasswd.c314 static char *md5crypt(const char *passwd, const char *magic, const char *salt) in md5crypt() argument
331 magic_len = strlen(magic); in md5crypt()
332 OPENSSL_strlcpy(ascii_magic, magic, sizeof(ascii_magic)); in md5crypt()
334 if ((magic[0] & 0x80) != 0) /* High bit is 1 in EBCDIC alnums */ in md5crypt()
495 static char *shacrypt(const char *passwd, const char *magic, const char *salt) in shacrypt() argument
527 magic_len = strlen(magic); in shacrypt()
533 switch (magic[0]) { in shacrypt()
564 OPENSSL_strlcpy(ascii_magic, magic, sizeof(ascii_magic)); in shacrypt()
566 if ((magic[0] & 0x80) != 0) /* High bit is 1 in EBCDIC alnums */ in shacrypt()
719 switch (magic[0]) { in shacrypt()
H A Denc.c118 static const char magic[] = "Salted__"; in enc_main() local
130 char mbuf[sizeof(magic) - 1]; in enc_main()
525 && (BIO_write(wbio, magic, in enc_main()
526 sizeof(magic) - 1) != sizeof(magic) - 1 in enc_main()
540 if (memcmp(mbuf, magic, sizeof(mbuf)) == 0) { /* file IS salted */ in enc_main()
/openssl/engines/
H A De_capi.txt29 invalid dsa public key blob magic number
33 invalid rsa public key blob magic number
H A De_capi.c678 if (rp->magic != 0x31415352) { in capi_get_pkey()
680 BIO_snprintf(magstr, 10, "%lx", rp->magic); in capi_get_pkey()
733 if (dp->magic != 0x31535344) { in capi_get_pkey()
735 BIO_snprintf(magstr, 10, "%lx", dp->magic); in capi_get_pkey()
H A De_loader_attic.c1334 unsigned int magic = 0, bitlen = 0; in file_try_read_msblob() local
1341 if (ossl_do_blob_header(&p, sizeof(peekbuf), &magic, &bitlen, in file_try_read_msblob()
/openssl/providers/implementations/storemgmt/
H A Dfile_store_any2obj.c117 unsigned int bitlen, magic; in msblob2obj_decode() local
142 ok = ossl_do_blob_header(&p, 16, &magic, &bitlen, &isdss, &ispub) > 0; in msblob2obj_decode()
/openssl/providers/implementations/encode_decode/
H A Ddecode_msblob2key.c102 unsigned int bitlen, magic, length; in msblob2key_decode() local
117 ok = ossl_do_blob_header(&p, 16, &magic, &bitlen, &isdss, &ispub) > 0; in msblob2key_decode()
/openssl/providers/implementations/ciphers/
H A Dcipher_rc2.c74 static int rc2_magic_to_keybits(int magic) in rc2_magic_to_keybits() argument
76 switch (magic) { in rc2_magic_to_keybits()
/openssl/crypto/sha/asm/
H A Dsha512-armv4.pl106 my $magic = shift;
159 teq $t0,#$magic
/openssl/crypto/
H A Dbuild.info68 # uses functions from there to parse magic environment variables.
/openssl/doc/designs/
H A Dfast-param-find.md172 /* magic decoder */
/openssl/crypto/err/
H A Dopenssl.txt928 PEM_R_BAD_MAGIC_NUMBER:116:bad magic number
/openssl/Configurations/
H A Dunix-Makefile.tmpl1935 # Next line needs to become "less magic" (see PR #11950)
/openssl/
H A DCHANGES.md13683 * Use sizeof in preference to magic numbers.
18432 magic header, so unsalted files fail gracefully instead of just decrypting
19359 value was just used as a "magic string" and not used directly its

Completed in 118 milliseconds