Home
last modified time | relevance | path

Searched refs:byte (Results 1 – 25 of 109) sorted by relevance

12345

/openssl/crypto/modes/
H A Dsiv128.c93 size_t out_len = sizeof(out->byte); in siv128_do_s2v_p()
111 t.byte[len] = 0x80; in siv128_do_s2v_p()
117 if (!EVP_MAC_final(mac_ctx, out->byte, &out_len, sizeof(out->byte)) in siv128_do_s2v_p()
288 q.byte[8] &= 0x7f; in ossl_siv128_encrypt()
289 q.byte[12] &= 0x7f; in ossl_siv128_encrypt()
314 q.byte[8] &= 0x7f; in ossl_siv128_decrypt()
315 q.byte[12] &= 0x7f; in ossl_siv128_decrypt()
321 p = ctx->tag.byte; in ossl_siv128_decrypt()
323 t.byte[i] ^= p[i]; in ossl_siv128_decrypt()
350 memcpy(ctx->tag.byte, tag, len); in ossl_siv128_set_tag()
[all …]
/openssl/crypto/
H A Dasn1_dsa.c157 unsigned int byte; in ossl_decode_der_length() local
159 if (!PACKET_get_1(pkt, &byte)) in ossl_decode_der_length()
162 if (byte < 0x80) in ossl_decode_der_length()
163 return PACKET_get_sub_packet(pkt, subpkt, (size_t)byte); in ossl_decode_der_length()
164 if (byte == 0x81) in ossl_decode_der_length()
166 if (byte == 0x82) in ossl_decode_der_length()
/openssl/doc/man3/
H A DSSL_CTX_use_serverinfo.pod30 a byte array into B<ctx>. The B<version> parameter specifies the format of the
31 byte array provided in B<*serverinfo> which is of length B<serverinfo_length>.
34 consist of a 4-byte context, a 2-byte Extension Type, a 2-byte length, and then
42 consist of a 2-byte Extension Type, a 2-byte length, and then length bytes of
H A DBIO_ADDR.pod55 BIO_ADDR_rawmake() takes a protocol B<family>, a byte array of
56 size B<wherelen> with an address in network byte order pointed at
57 by B<where> and a port number in network byte order in B<port> (except
75 with B<p> set to B<NULL>. The raw address will be in network byte
76 order, most significant byte first.
83 The raw port will be in network byte order.
107 network byte order address of a specific site. Internally, those are
H A DBF_encrypt.pod43 Blowfish is a block cipher that operates on 64 bit (8 byte) blocks of data.
44 It uses a variable size key, but typically, 128 bit (16 byte) keys are
81 decryption (BF_DECRYPT) shall be performed. B<ivec> must point at an 8 byte
88 8 byte long initialization vector. B<num> must point at an integer which must
100 each 32-bit chunk in host-byte order, which is little-endian on little-endian
H A DEVP_PKEY_get_group_name.pod17 I<gname>, up to at most I<gname_sz> bytes including the ending NUL byte
19 the NUL byte, if I<pkey>'s key type supports it.
H A DDES_random_key.pod112 each byte is the parity bit. The key schedule is an expanded form of
142 decrypts a single 8-byte I<DES_cblock> in I<electronic code book>
201 arbitrary number of bytes, without 8 byte padding. Each call to this
226 DES_cbc_cksum() produces an 8 byte checksum based on the input stream
232 DES_quad_cksum() is a Kerberos v4 function. It returns a 4 byte
259 data send down I<fd> consists of 4 bytes (in network byte order)
271 first 12 bits will come from the 1st input byte and the low half of
272 the second input byte. The second 12 bits will have the low 8 bits
273 taken from the 3rd input byte and the top 4 bits taken from the 4th
274 input byte. The same holds for output. This function has been
[all …]
H A DOPENSSL_strcasecmp.pod16 The OPENSSL_strcasecmp function performs a byte-by-byte comparison of the strings
H A DSSL_CIPHER_get_name.pod99 two-byte TLS cipher ID (as allocated by IANA) in network byte order. This parameter
107 SSL_CIPHER_get_protocol_id() returns the two-byte ID used in the TLS protocol of the given
178 SSL_CIPHER_get_id() returns a 4-byte integer representing the OpenSSL-specific ID.
180 SSL_CIPHER_get_protocol_id() returns a 2-byte integer representing the TLS
H A DASN1_STRING_print_ex.pod64 option will correctly display multi byte characters.
67 all: everything is assumed to be one byte per character. This is primarily for
80 one byte per character, if B<ASN1_STRFLGS_DUMP_UNKNOWN> is set then they will
H A DBN_bn2bin.pod74 in native format, i.e. most significant byte first on big-endian platforms,
75 and least significant byte first on little-endian platforms.
95 that consists of the number's length in bytes represented as a 4-byte
98 of numbers with the MSB set is prefixed with null byte).
H A DEVP_PKEY_gettable_params.pod64 value including a terminating NUL byte, or this function will fail.
66 not including the terminating NUL byte. The required buffer size not including
67 the terminating NUL byte can be obtained from I<*out_len> by calling the
/openssl/test/recipes/30-test_evp_data/
H A Devpmac_siphash.txt14 # SIPHASH tests - default values: 2,4 rounds, 16-byte mac
129 # SIPHASH - default values: 2,4 rounds, explicit 8-byte mac
143 # SIPHASH - default values: 2,4 rounds, explicit 16-byte mac
151 # SIPHASH - default values: 2,4 rounds, explicit 16-byte mac (set as 0)
159 # SIPHASH - default values: 2,4 rounds, explicit 13-byte mac (invalid size)
166 # SIPHASH - default values: 2,4 rounds, explicit 13-byte mac (invalid size)
H A Devppkey_rsa_common.txt441 # positive test with 11 byte long value
501 # an invalid ciphertext, with a zero byte in first byte of
502 # ciphertext, decrypts to a random 11 byte long synthetic
510 # an invalid ciphertext, with a zero byte removed from first byte of
511 # ciphertext, decrypts to a random 11 byte long synthetic
538 # to random 11 byte long synthetic plaintext
545 # negative test with otherwise valid padding but a zero byte in first byte
554 # byte of padding
562 # byte
810 # an otherwise valid plaintext, but with zero byte in first byte of padding
[all …]
H A Devpciph_aria.txt199 # 16-byte Tag
217 # 8-byte Tag
235 # 12-byte Tag
H A Devpciph_camellia_cts.txt69 # Plaintext: 13 bytes byte (31332062797465732062797465)
124 # Plaintext: 13 bytes byte (31332062797465732062797465)
/openssl/test/
H A Ddanetest.c182 uint8_t byte; in hexdecode() local
189 for (byte = 0; *in; ++in) { in hexdecode()
199 byte |= (char)x; in hexdecode()
201 *cp++ = byte; in hexdecode()
202 byte = 0; in hexdecode()
204 byte <<= 4; in hexdecode()
H A Dpackettest.c288 const unsigned char *byte = NULL; in test_PACKET_forward() local
293 || !TEST_true(PACKET_get_bytes(&pkt, &byte, 1)) in test_PACKET_forward()
294 || !TEST_uchar_eq(byte[0], 4) in test_PACKET_forward()
296 || !TEST_true(PACKET_get_bytes(&pkt, &byte, 1)) in test_PACKET_forward()
297 || !TEST_uchar_eq(byte[0], 0xfe)) in test_PACKET_forward()
/openssl/crypto/modes/asm/
H A Dghash-parisc.pl81 $byte="%r5";
403 ldb 14($inp),$byte
407 xor $byte,$nlo,$nlo
430 ldbx $cnt($inp),$byte
437 xor $byte,$nlo,$nlo
494 ldb 15($inp),$byte
495 xor $byte,$nlo,$nlo
505 ldb 14($inp),$byte
515 xor $byte,$nlo,$nlo
541 ldbx $cnt($inp),$byte
[all …]
/openssl/doc/man7/
H A Dpassphrase-encoding.pod48 opportunistically prepends each byte with a zero byte to obtain the UCS-2
70 A pass phrase that contains this kind of byte sequence will give a different
95 encoding was ISO-8859-1 (i.e. "naïve" resulting in the byte sequence 0x6E 0x61
97 is UTF-8 (i.e. "naïve" resulting in the byte sequence 0x6E 0x61 0xC3 0xAF 0x76
107 For other objects, it's as legitimate to use any byte sequence (such as a
110 byte sequence as it is.
138 It's possible that its byte sequence is exactly right.
/openssl/test/recipes/
H A D70-test_sslrecords.t391 my $byte;
413 $byte = pack('C', TLSProxy::Message::AL_LEVEL_FATAL);
422 $byte,
423 $byte
428 $byte = pack('C', TLSProxy::Message::AL_DESC_UNEXPECTED_MESSAGE);
437 $byte,
438 $byte
/openssl/crypto/des/asm/
H A Ddes_enc.m41779 .byte 0, 0, 0, 0, 4, 4, 4, 4
1780 .byte 8, 8, 8, 8, 12, 12, 12, 12
1781 .byte 16, 16, 16, 16, 20, 20, 20, 20
1782 .byte 24, 24, 24, 24, 28, 28, 28, 28
1783 .byte 32, 32, 32, 32, 36, 36, 36, 36
1784 .byte 40, 40, 40, 40, 44, 44, 44, 44
1785 .byte 48, 48, 48, 48, 52, 52, 52, 52
1786 .byte 56, 56, 56, 56, 60, 60, 60, 60
1787 .byte 64, 64, 64, 64, 68, 68, 68, 68
1788 .byte 72, 72, 72, 72, 76, 76, 76, 76
[all …]
/openssl/doc/man1/
H A Dopenssl-kdf.pod.in84 the secret key is specified in hexadecimal form (two hex digits per byte).
95 the password is specified in hexadecimal form (two hex digits per byte).
108 the salt is specified in hexadecimal form (two hex digits per byte).
122 the info is specified in hexadecimal form (two hex digits per byte).
/openssl/crypto/bn/
H A Dbn_lib.c520 BN_ULONG byte = (byte_xored + carry) & 0xff; in bin2bn() local
522 carry = byte_xored > byte; /* Implicit 1 or 0 */ in bin2bn()
523 l |= (byte << m); in bin2bn()
613 unsigned char byte, byte_xored; in bn2binpad() local
617 byte = (unsigned char)(l >> (8 * (i % BN_BYTES)) & mask); in bn2binpad()
618 byte_xored = byte ^ xor; in bn2binpad()
/openssl/crypto/perlasm/
H A DREADME.md30 &LB(reg); Low byte for a register
31 &HB(reg); High byte for a register

Completed in 51 milliseconds

12345