/openssl/test/recipes/ |
H A D | 20-test_mac.t | 42 input => '00010203', 47 input => '00010203', 60 input => '00', 81 input => '02000000000000000000000000000000', 93 input => '00', 98 input => '00', 103 input => '00', 111 input => '00', 148 my $bin = pack("H*", $input); 192 my ($cmdarray, $type, $input, $expect) = @_; [all …]
|
H A D | 04-test_pem_reading.t | 85 foreach my $input (keys %cert_expected) { 87 my @data = run(app([@common, data_file($input)], stderr => undef), capture => 1); 89 is((scalar @match > 0 ? 1 : 0), $cert_expected{$input}); 93 foreach my $input (keys %dsa_expected) { 98 @data = run(app([@common, data_file($input)], stderr => undef), capture => 1); 101 is((scalar @match > 0 ? 1 : 0), $dsa_expected{$input});
|
H A D | 15-test_dsaparam.t | 82 my $input = data_file("valid", "p3072_q256_t1864.pem"); 84 copy($input, $inout); 87 ok(!compare($input, $inout), "converted file $inout did not change");
|
/openssl/crypto/chacha/ |
H A D | chacha_enc.c | 101 u32 input[16]; in ChaCha20_ctr32_c() local 119 input[4] = key[0]; in ChaCha20_ctr32_c() 120 input[5] = key[1]; in ChaCha20_ctr32_c() 121 input[6] = key[2]; in ChaCha20_ctr32_c() 122 input[7] = key[3]; in ChaCha20_ctr32_c() 123 input[8] = key[4]; in ChaCha20_ctr32_c() 124 input[9] = key[5]; in ChaCha20_ctr32_c() 125 input[10] = key[6]; in ChaCha20_ctr32_c() 126 input[11] = key[7]; in ChaCha20_ctr32_c() 128 input[12] = counter[0]; in ChaCha20_ctr32_c() [all …]
|
/openssl/util/perl/OpenSSL/Util/ |
H A D | Pod.pm | 96 my $input = shift; 104 if (ref $input eq "") { 105 $filename = $input; 106 open $fh, $input or die "Trying to read $filename: $!\n"; 107 print STDERR "DEBUG: Reading $input\n" if $defaults{debug}; 108 $input = $fh; 110 if (ref $input eq "GLOB") { 112 $contents = <$input>;
|
/openssl/test/recipes/30-test_evp_data/ |
H A D | evpmac_blake.txt | 149 Input = "Sample input for keylen<blocklen and custom" 155 Input = "Sample input for keylen<blocklen and custom" 161 Input = "Sample input for keylen<blocklen and salt" 167 Input = "Sample input for keylen<blocklen and salt" 184 Input = "Sample input for outlen<digest_length" 190 Input = "Sample input for outlen<digest_length" 196 Input = "Combo input with outlen, custom and salt" 217 Input = "Sample input for keylen<blocklen and salt" 223 Input = "Sample input for keylen<blocklen and salt" 241 Input = "Sample input for outlen<digest_length" [all …]
|
H A D | evpciph_aes_cts.txt | 17 # 32 bytes input 24 # 48 bytes input 31 # 64 bytes input 53 # 31 bytes input 62 # 32 bytes input 71 # 47 bytes input 91 # 47 bytes input 187 # 47 bytes input 251 # 31 bytes input 269 # 47 bytes input [all …]
|
/openssl/demos/digest/ |
H A D | EVP_MD_stdin.c | 34 static int demonstrate_digest(BIO *input) in demonstrate_digest() argument 96 while ((ii = BIO_read(input, buffer, sizeof(buffer))) > 0) { in demonstrate_digest() 127 BIO *input = BIO_new_fd(fileno(stdin), 1); in main() local 129 if (input != NULL) { in main() 130 ret = (demonstrate_digest(input) ? EXIT_SUCCESS : EXIT_FAILURE); in main() 131 BIO_free(input); in main()
|
H A D | BIO_f_md.c | 41 BIO *input = NULL; in main() local 49 input = BIO_new_fd(fileno(stdin), 1); in main() 50 if (input == NULL) { in main() 96 reading = BIO_push(bio_digest, input); in main() 120 BIO_free(input); in main()
|
/openssl/test/ |
H A D | ossl_store_test.c | 45 char *input = test_mk_file_path(inputdir, infile); in test_store_open() local 47 ret = TEST_ptr(input) in test_store_open() 50 && TEST_ptr(sctx = OSSL_STORE_open_ex(input, NULL, NULL, ui_method, in test_store_open() 57 OPENSSL_free(input); in test_store_open() 163 char *input = test_mk_file_path(inputdir, sm2file); in test_store_attach_unregistered_scheme() local 165 ret = TEST_ptr(input) in test_store_attach_unregistered_scheme() 168 && TEST_ptr(bio = BIO_new_file(input, "r")) in test_store_attach_unregistered_scheme() 179 OPENSSL_free(input); in test_store_attach_unregistered_scheme()
|
H A D | mdc2_internal_test.c | 26 const char *input; member 60 MDC2_Update(&c, (const unsigned char *)testdata.input, in test_mdc2() 61 strlen(testdata.input)); in test_mdc2()
|
H A D | strtoultest.c | 15 char *input; /* the input string */ member 78 err = OPENSSL_strtoul(test->input, &endptr, test->base, &val); in test_strtoul() 88 if (!TEST_ptr_eq(endptr, &test->input[test->expect_endptr_offset])) in test_strtoul()
|
H A D | sm4_internal_test.c | 29 static const uint8_t input[SM4_BLOCK_SIZE] = { in test_sm4_ecb() local 58 memcpy(block, input, SM4_BLOCK_SIZE); in test_sm4_ecb() 73 if (!TEST_mem_eq(block, SM4_BLOCK_SIZE, input, SM4_BLOCK_SIZE)) in test_sm4_ecb()
|
H A D | sha_test.c | 14 static int test_static_sha_common(const char *input, size_t length, in test_static_sha_common() argument 21 const unsigned char *in = (unsigned char *)input; in test_static_sha_common() 22 const size_t in_len = strlen(input); in test_static_sha_common()
|
/openssl/include/openssl/ |
H A D | des.h | 78 void DES_ecb3_encrypt(const_DES_cblock *input, DES_cblock *output, 82 DES_LONG DES_cbc_cksum(const unsigned char *input, DES_cblock *output, 89 void DES_cbc_encrypt(const unsigned char *input, unsigned char *output, 93 void DES_ncbc_encrypt(const unsigned char *input, unsigned char *output, 97 void DES_xcbc_encrypt(const unsigned char *input, unsigned char *output, 105 void DES_ecb_encrypt(const_DES_cblock *input, DES_cblock *output, 142 void DES_ede3_cbc_encrypt(const unsigned char *input, unsigned char *output, 169 void DES_pcbc_encrypt(const unsigned char *input, unsigned char *output, 173 DES_LONG DES_quad_cksum(const unsigned char *input, DES_cblock output[],
|
/openssl/apps/ |
H A D | tsget.in | 157 my $input = $_; 158 my ($base, $path) = fileparse($input, '\.[^.]*'); 162 STDERR->printflush("$input: ") if $options{v}; 165 if ($input eq "-") { 170 open INPUT, "<" . $input 171 or warn("$input: could not open input file: $!\n"), next REQUEST; 174 or warn("$input: could not close input file: $!\n"), next REQUEST; 182 die "$input: fatal error: $error\n";
|
/openssl/util/perl/OpenSSL/ |
H A D | OID.pm | 149 my $input = shift; 157 if ($input =~ m/^\s*(${obj_re})\s*$/x) { 160 } elsif ($input =~ m/^\s*(${xmlobj_re})\s*$/) { 165 croak "Invalid ASN.1 object '$input'" unless @components; 166 die "Internal error when parsing '$input'"
|
/openssl/doc/man3/ |
H A D | DES_random_key.pod | 33 void DES_ecb_encrypt(const_DES_cblock *input, DES_cblock *output, 35 void DES_ecb2_encrypt(const_DES_cblock *input, DES_cblock *output, 37 void DES_ecb3_encrypt(const_DES_cblock *input, DES_cblock *output, 143 (ECB) mode. It always transforms the input data, pointed to by 145 If the I<encrypt> argument is nonzero (DES_ENCRYPT), the I<input> 152 DES_ecb3_encrypt() encrypts/decrypts the I<input> block by using 154 the input with I<ks1>, decrypting with the key schedule I<ks2>, and 202 routine will encrypt the input bytes to output and then update ivec 210 takes an array of characters as input and outputs an array of 274 input byte. The same holds for output. This function has been [all …]
|
H A D | OSSL_DECODER_CTX_new_for_pkey.pod | 42 I<input_struct>, I<keytype> and I<selection> to specify what the input is 50 decoder implementations that may be able to process the encoded input into 55 I<input_struct> which specifies a starting input type and input structure. 57 will find out the input type on their own. 65 find out the keytype and key contents on their own from the input they get. 90 Available input types depend on the implementations that available providers 93 Among the known input types that OpenSSL decoder implementations offer 95 See L<openssl-glossary(7)> for further information on what these input 100 Available input structures depend on the implementations that available 103 Among the known input structures that OpenSSL decoder implementations [all …]
|
H A D | OSSL_DECODER_CTX.pod | 87 figure out what the input data is and to attempt to unpack it into one of 89 the output from one can become the input for another. This allows having 96 added those that take the specified input type, and functions like 98 the decoder implementations that take that input type. For example, if the 99 input type is set to C<DER>, a PEM to DER decoder will be ignored. 101 The input type can also be NULL, which means that the caller doesn't know 102 what type of input they have. In this case, OSSL_DECODER_from_bio() will 104 discover what kind of input the caller gave it. 132 a decoder, to be used to attempt to decode some encoded input. 205 implementation's input type from a decoder instance I<decoder_inst>. [all …]
|
H A D | BIO_f_base64.pod | 30 Subsequent input lines can be of any length (i.e., newlines may appear anywhere 31 in the input) and a newline at the end of input is not needed. 39 Decoding stops when base64 padding is encountered, a soft end-of-input 42 (e.g. due to input characters other than valid base64 or whitespace). 46 than 0 (which indicates normal end of input). 57 For reading, it removes all expectations on newlines in the input data. 84 Read base64 encoded data from standard input and write the decoded 103 The hyphen character (B<->) is treated as an ad hoc soft end-of-input 109 input. 110 But it is just a heuristic, and sufficiently unusual input could produce
|
H A D | EVP_EncodeInit.pod | 37 plus some occasional newlines (see below). If the input data length is not a 47 Encoding of binary data is performed in blocks of 48 input bytes (or less for 49 For each 48 byte input block encoded 64 bytes of base64 data 70 repeatedly to process large amounts of input data. In the event of an error 87 EVP_EncodeBlock() encodes a full block of input data in B<f> and of length 88 B<n> and stores it in B<t>. For every 3 bytes of input provided 4 bytes of 115 0 to indicate that the end of the base64 input has been detected. 117 input bytes. 118 The soft end-of-input condition is not remembered in B<ctx>, it is up to the 128 soft end-of-input (B<->) character, and therefore no more input data is [all …]
|
/openssl/doc/man1/ |
H A D | openssl-engine.pod.in | 44 description of each command; the third adds the input flags, and the 45 final option adds the internal input flags. 83 (input flags): STRING 85 (input flags): NUMERIC 87 (input flags): STRING 89 (input flags): NUMERIC 91 (input flags): NUMERIC 93 (input flags): STRING 95 (input flags): NO_INPUT
|
H A D | openssl-format-options.pod | 5 openssl-format-options - OpenSSL command input and output format options 16 Several OpenSSL commands can take input or generate output in a variety 20 files in any of the B<DER>, B<PEM> or B<P12> formats. Specifying their input 22 the possible formats. However if the B<DER> or B<PEM> input format is specified 25 In order to access a key via an engine the input format B<ENGINE> may be used; 41 The format of the input or output streams. 45 Format of a private key input source. 49 Format of a CRL input source.
|
/openssl/ssl/record/methods/ |
H A D | tls1_meth.c | 212 if (recs[ctr].data != recs[ctr].input) { in tls1_cipher() 215 } else if (RAND_bytes_ex(rl->libctx, recs[ctr].input, in tls1_cipher() 303 recs[ctr].input[loop] = padval; in tls1_cipher() 327 data[ctr] = recs[ctr].input; in tls1_cipher() 379 recs[0].input += EVP_GCM_TLS_EXPLICIT_IV_LEN; in tls1_cipher() 382 recs[0].input += EVP_CCM_TLS_EXPLICIT_IV_LEN; in tls1_cipher() 385 recs[0].input += bs; in tls1_cipher() 412 tmpr = EVP_Cipher(ds, recs[0].data, recs[0].input, in tls1_cipher() 427 recs[ctr].input += EVP_GCM_TLS_EXPLICIT_IV_LEN; in tls1_cipher() 431 recs[ctr].input += EVP_CCM_TLS_EXPLICIT_IV_LEN; in tls1_cipher() [all …]
|