/openssl/crypto/modes/ |
H A D | siv128.c | 93 size_t out_len = sizeof(out->byte); in siv128_do_s2v_p() 111 t.byte[len] = 0x80; in siv128_do_s2v_p() 117 if (!EVP_MAC_final(mac_ctx, out->byte, &out_len, sizeof(out->byte)) in siv128_do_s2v_p() 288 q.byte[8] &= 0x7f; in ossl_siv128_encrypt() 289 q.byte[12] &= 0x7f; in ossl_siv128_encrypt() 314 q.byte[8] &= 0x7f; in ossl_siv128_decrypt() 315 q.byte[12] &= 0x7f; in ossl_siv128_decrypt() 321 p = ctx->tag.byte; in ossl_siv128_decrypt() 323 t.byte[i] ^= p[i]; in ossl_siv128_decrypt() 350 memcpy(ctx->tag.byte, tag, len); in ossl_siv128_set_tag() [all …]
|
/openssl/crypto/ |
H A D | asn1_dsa.c | 157 unsigned int byte; in ossl_decode_der_length() local 159 if (!PACKET_get_1(pkt, &byte)) in ossl_decode_der_length() 162 if (byte < 0x80) in ossl_decode_der_length() 163 return PACKET_get_sub_packet(pkt, subpkt, (size_t)byte); in ossl_decode_der_length() 164 if (byte == 0x81) in ossl_decode_der_length() 166 if (byte == 0x82) in ossl_decode_der_length()
|
/openssl/doc/man3/ |
H A D | SSL_CTX_use_serverinfo.pod | 30 a byte array into B<ctx>. The B<version> parameter specifies the format of the 31 byte array provided in B<*serverinfo> which is of length B<serverinfo_length>. 34 consist of a 4-byte context, a 2-byte Extension Type, a 2-byte length, and then 42 consist of a 2-byte Extension Type, a 2-byte length, and then length bytes of
|
H A D | BIO_ADDR.pod | 55 BIO_ADDR_rawmake() takes a protocol B<family>, a byte array of 56 size B<wherelen> with an address in network byte order pointed at 57 by B<where> and a port number in network byte order in B<port> (except 75 with B<p> set to B<NULL>. The raw address will be in network byte 76 order, most significant byte first. 83 The raw port will be in network byte order. 107 network byte order address of a specific site. Internally, those are
|
H A D | BF_encrypt.pod | 43 Blowfish is a block cipher that operates on 64 bit (8 byte) blocks of data. 44 It uses a variable size key, but typically, 128 bit (16 byte) keys are 81 decryption (BF_DECRYPT) shall be performed. B<ivec> must point at an 8 byte 88 8 byte long initialization vector. B<num> must point at an integer which must 100 each 32-bit chunk in host-byte order, which is little-endian on little-endian
|
H A D | EVP_PKEY_get_group_name.pod | 17 I<gname>, up to at most I<gname_sz> bytes including the ending NUL byte 19 the NUL byte, if I<pkey>'s key type supports it.
|
H A D | DES_random_key.pod | 112 each byte is the parity bit. The key schedule is an expanded form of 142 decrypts a single 8-byte I<DES_cblock> in I<electronic code book> 201 arbitrary number of bytes, without 8 byte padding. Each call to this 226 DES_cbc_cksum() produces an 8 byte checksum based on the input stream 232 DES_quad_cksum() is a Kerberos v4 function. It returns a 4 byte 259 data send down I<fd> consists of 4 bytes (in network byte order) 271 first 12 bits will come from the 1st input byte and the low half of 272 the second input byte. The second 12 bits will have the low 8 bits 273 taken from the 3rd input byte and the top 4 bits taken from the 4th 274 input byte. The same holds for output. This function has been [all …]
|
H A D | OPENSSL_strcasecmp.pod | 16 The OPENSSL_strcasecmp function performs a byte-by-byte comparison of the strings
|
H A D | SSL_CIPHER_get_name.pod | 99 two-byte TLS cipher ID (as allocated by IANA) in network byte order. This parameter 107 SSL_CIPHER_get_protocol_id() returns the two-byte ID used in the TLS protocol of the given 178 SSL_CIPHER_get_id() returns a 4-byte integer representing the OpenSSL-specific ID. 180 SSL_CIPHER_get_protocol_id() returns a 2-byte integer representing the TLS
|
H A D | ASN1_STRING_print_ex.pod | 64 option will correctly display multi byte characters. 67 all: everything is assumed to be one byte per character. This is primarily for 80 one byte per character, if B<ASN1_STRFLGS_DUMP_UNKNOWN> is set then they will
|
H A D | BN_bn2bin.pod | 74 in native format, i.e. most significant byte first on big-endian platforms, 75 and least significant byte first on little-endian platforms. 95 that consists of the number's length in bytes represented as a 4-byte 98 of numbers with the MSB set is prefixed with null byte).
|
H A D | EVP_PKEY_gettable_params.pod | 64 value including a terminating NUL byte, or this function will fail. 66 not including the terminating NUL byte. The required buffer size not including 67 the terminating NUL byte can be obtained from I<*out_len> by calling the
|
/openssl/test/recipes/30-test_evp_data/ |
H A D | evpmac_siphash.txt | 14 # SIPHASH tests - default values: 2,4 rounds, 16-byte mac 129 # SIPHASH - default values: 2,4 rounds, explicit 8-byte mac 143 # SIPHASH - default values: 2,4 rounds, explicit 16-byte mac 151 # SIPHASH - default values: 2,4 rounds, explicit 16-byte mac (set as 0) 159 # SIPHASH - default values: 2,4 rounds, explicit 13-byte mac (invalid size) 166 # SIPHASH - default values: 2,4 rounds, explicit 13-byte mac (invalid size)
|
H A D | evppkey_rsa_common.txt | 441 # positive test with 11 byte long value 501 # an invalid ciphertext, with a zero byte in first byte of 502 # ciphertext, decrypts to a random 11 byte long synthetic 510 # an invalid ciphertext, with a zero byte removed from first byte of 511 # ciphertext, decrypts to a random 11 byte long synthetic 538 # to random 11 byte long synthetic plaintext 545 # negative test with otherwise valid padding but a zero byte in first byte 554 # byte of padding 562 # byte 810 # an otherwise valid plaintext, but with zero byte in first byte of padding [all …]
|
H A D | evpciph_aria.txt | 199 # 16-byte Tag 217 # 8-byte Tag 235 # 12-byte Tag
|
H A D | evpciph_camellia_cts.txt | 69 # Plaintext: 13 bytes byte (31332062797465732062797465) 124 # Plaintext: 13 bytes byte (31332062797465732062797465)
|
/openssl/test/ |
H A D | danetest.c | 182 uint8_t byte; in hexdecode() local 189 for (byte = 0; *in; ++in) { in hexdecode() 199 byte |= (char)x; in hexdecode() 201 *cp++ = byte; in hexdecode() 202 byte = 0; in hexdecode() 204 byte <<= 4; in hexdecode()
|
H A D | packettest.c | 288 const unsigned char *byte = NULL; in test_PACKET_forward() local 293 || !TEST_true(PACKET_get_bytes(&pkt, &byte, 1)) in test_PACKET_forward() 294 || !TEST_uchar_eq(byte[0], 4) in test_PACKET_forward() 296 || !TEST_true(PACKET_get_bytes(&pkt, &byte, 1)) in test_PACKET_forward() 297 || !TEST_uchar_eq(byte[0], 0xfe)) in test_PACKET_forward()
|
/openssl/crypto/modes/asm/ |
H A D | ghash-parisc.pl | 81 $byte="%r5"; 403 ldb 14($inp),$byte 407 xor $byte,$nlo,$nlo 430 ldbx $cnt($inp),$byte 437 xor $byte,$nlo,$nlo 494 ldb 15($inp),$byte 495 xor $byte,$nlo,$nlo 505 ldb 14($inp),$byte 515 xor $byte,$nlo,$nlo 541 ldbx $cnt($inp),$byte [all …]
|
/openssl/doc/man7/ |
H A D | passphrase-encoding.pod | 48 opportunistically prepends each byte with a zero byte to obtain the UCS-2 70 A pass phrase that contains this kind of byte sequence will give a different 95 encoding was ISO-8859-1 (i.e. "naïve" resulting in the byte sequence 0x6E 0x61 97 is UTF-8 (i.e. "naïve" resulting in the byte sequence 0x6E 0x61 0xC3 0xAF 0x76 107 For other objects, it's as legitimate to use any byte sequence (such as a 110 byte sequence as it is. 138 It's possible that its byte sequence is exactly right.
|
/openssl/test/recipes/ |
H A D | 70-test_sslrecords.t | 391 my $byte; 413 $byte = pack('C', TLSProxy::Message::AL_LEVEL_FATAL); 422 $byte, 423 $byte 428 $byte = pack('C', TLSProxy::Message::AL_DESC_UNEXPECTED_MESSAGE); 437 $byte, 438 $byte
|
/openssl/crypto/des/asm/ |
H A D | des_enc.m4 | 1779 .byte 0, 0, 0, 0, 4, 4, 4, 4 1780 .byte 8, 8, 8, 8, 12, 12, 12, 12 1781 .byte 16, 16, 16, 16, 20, 20, 20, 20 1782 .byte 24, 24, 24, 24, 28, 28, 28, 28 1783 .byte 32, 32, 32, 32, 36, 36, 36, 36 1784 .byte 40, 40, 40, 40, 44, 44, 44, 44 1785 .byte 48, 48, 48, 48, 52, 52, 52, 52 1786 .byte 56, 56, 56, 56, 60, 60, 60, 60 1787 .byte 64, 64, 64, 64, 68, 68, 68, 68 1788 .byte 72, 72, 72, 72, 76, 76, 76, 76 [all …]
|
/openssl/doc/man1/ |
H A D | openssl-kdf.pod.in | 84 the secret key is specified in hexadecimal form (two hex digits per byte). 95 the password is specified in hexadecimal form (two hex digits per byte). 108 the salt is specified in hexadecimal form (two hex digits per byte). 122 the info is specified in hexadecimal form (two hex digits per byte).
|
/openssl/crypto/bn/ |
H A D | bn_lib.c | 520 BN_ULONG byte = (byte_xored + carry) & 0xff; in bin2bn() local 522 carry = byte_xored > byte; /* Implicit 1 or 0 */ in bin2bn() 523 l |= (byte << m); in bin2bn() 613 unsigned char byte, byte_xored; in bn2binpad() local 617 byte = (unsigned char)(l >> (8 * (i % BN_BYTES)) & mask); in bn2binpad() 618 byte_xored = byte ^ xor; in bn2binpad()
|
/openssl/crypto/perlasm/ |
H A D | README.md | 30 &LB(reg); Low byte for a register 31 &HB(reg); High byte for a register
|