/openssl/crypto/aes/asm/ |
H A D | vpaes-x86.pl | 191 &mov ($magic,16); 286 &shl ($magic,4); 290 &xor ($magic,0x30); 292 &and ($magic,0x30); 297 &lea ($magic,&DWP($k_sr-$k_dsbd,$base,$magic)); 403 &xor ($magic,0x30); 749 &add ($magic,-16); 750 &and ($magic,0x30); 800 &shr ($magic,1); 801 &and ($magic,32); [all …]
|
H A D | bsaes-armv7.pl | 1632 my ($inp,$out,$len,$key,$rounds,$magic,$fp)=(map("r$_",(7..10,1..3))); 1701 adr $magic, .Lxts_magic 1709 vldmia $magic, {$twmask} @ load XTS magic 1779 vldmia $magic, {$twmask} @ load XTS magic 2110 adr $magic, .Lxts_magic 2124 vldmia $magic, {$twmask} @ load XTS magic 2194 vldmia $magic, {$twmask} @ load XTS magic 2389 mov r5, $magic @ preserve magic 2399 mov $magic, r5 2409 vldmia $magic, {$twmask}
|
/openssl/test/ |
H A D | bio_pw_callback_test.c | 17 char magic; member 118 if (!TEST_char_eq(cb_data->magic, cb_magic)) in read_callback() 140 if (!TEST_char_eq(cb_data->magic, cb_magic)) in write_callback() 169 cb_data.magic = cb_magic; in re_encrypt_key() 183 if (!TEST_char_eq(cb_data.magic, cb_magic)) in re_encrypt_key() 211 cb_data.magic = cb_magic; in decrypt_key() 228 if (!TEST_char_eq(cb_data.magic, cb_magic)) in decrypt_key()
|
/openssl/crypto/pem/ |
H A D | pvkfmt.c | 290 unsigned int bitlen, magic; in do_b2i_key() local 329 unsigned int bitlen, magic, length; in ossl_b2i_bio() local 339 if (ossl_do_blob_header(&p, 16, &magic, &bitlen, &isdss, ispub) <= 0) in ossl_b2i_bio() 570 unsigned int bitlen = 0, magic = 0, keyalg = 0; in do_i2b() local 574 bitlen = check_bitlen_rsa(EVP_PKEY_get0_RSA(pk), ispub, &magic); in do_i2b() 607 write_ledword(&p, magic); in do_i2b() 859 unsigned int magic; in do_PVK_body_key() local 896 magic = read_ledword((const unsigned char **)&q); in do_PVK_body_key() 897 if (magic != MS_RSA2MAGIC && magic != MS_DSS2MAGIC) { in do_PVK_body_key() 906 magic = read_ledword((const unsigned char **)&q); in do_PVK_body_key() [all …]
|
/openssl/apps/ |
H A D | passwd.c | 314 static char *md5crypt(const char *passwd, const char *magic, const char *salt) in md5crypt() argument 331 magic_len = strlen(magic); in md5crypt() 332 OPENSSL_strlcpy(ascii_magic, magic, sizeof(ascii_magic)); in md5crypt() 334 if ((magic[0] & 0x80) != 0) /* High bit is 1 in EBCDIC alnums */ in md5crypt() 495 static char *shacrypt(const char *passwd, const char *magic, const char *salt) in shacrypt() argument 527 magic_len = strlen(magic); in shacrypt() 533 switch (magic[0]) { in shacrypt() 564 OPENSSL_strlcpy(ascii_magic, magic, sizeof(ascii_magic)); in shacrypt() 566 if ((magic[0] & 0x80) != 0) /* High bit is 1 in EBCDIC alnums */ in shacrypt() 719 switch (magic[0]) { in shacrypt()
|
H A D | enc.c | 118 static const char magic[] = "Salted__"; in enc_main() local 130 char mbuf[sizeof(magic) - 1]; in enc_main() 525 && (BIO_write(wbio, magic, in enc_main() 526 sizeof(magic) - 1) != sizeof(magic) - 1 in enc_main() 540 if (memcmp(mbuf, magic, sizeof(mbuf)) == 0) { /* file IS salted */ in enc_main()
|
/openssl/engines/ |
H A D | e_capi.txt | 29 invalid dsa public key blob magic number 33 invalid rsa public key blob magic number
|
H A D | e_capi.c | 678 if (rp->magic != 0x31415352) { in capi_get_pkey() 680 BIO_snprintf(magstr, 10, "%lx", rp->magic); in capi_get_pkey() 733 if (dp->magic != 0x31535344) { in capi_get_pkey() 735 BIO_snprintf(magstr, 10, "%lx", dp->magic); in capi_get_pkey()
|
H A D | e_loader_attic.c | 1334 unsigned int magic = 0, bitlen = 0; in file_try_read_msblob() local 1341 if (ossl_do_blob_header(&p, sizeof(peekbuf), &magic, &bitlen, in file_try_read_msblob()
|
/openssl/providers/implementations/storemgmt/ |
H A D | file_store_any2obj.c | 117 unsigned int bitlen, magic; in msblob2obj_decode() local 142 ok = ossl_do_blob_header(&p, 16, &magic, &bitlen, &isdss, &ispub) > 0; in msblob2obj_decode()
|
/openssl/providers/implementations/encode_decode/ |
H A D | decode_msblob2key.c | 102 unsigned int bitlen, magic, length; in msblob2key_decode() local 117 ok = ossl_do_blob_header(&p, 16, &magic, &bitlen, &isdss, &ispub) > 0; in msblob2key_decode()
|
/openssl/providers/implementations/ciphers/ |
H A D | cipher_rc2.c | 74 static int rc2_magic_to_keybits(int magic) in rc2_magic_to_keybits() argument 76 switch (magic) { in rc2_magic_to_keybits()
|
/openssl/crypto/sha/asm/ |
H A D | sha512-armv4.pl | 106 my $magic = shift; 159 teq $t0,#$magic
|
/openssl/crypto/ |
H A D | build.info | 68 # uses functions from there to parse magic environment variables.
|
/openssl/doc/designs/ |
H A D | fast-param-find.md | 172 /* magic decoder */
|
/openssl/crypto/err/ |
H A D | openssl.txt | 928 PEM_R_BAD_MAGIC_NUMBER:116:bad magic number
|
/openssl/Configurations/ |
H A D | unix-Makefile.tmpl | 1935 # Next line needs to become "less magic" (see PR #11950)
|
/openssl/ |
H A D | CHANGES.md | 13683 * Use sizeof in preference to magic numbers. 18432 magic header, so unsalted files fail gracefully instead of just decrypting 19359 value was just used as a "magic string" and not used directly its
|