/openssl/crypto/ec/ |
H A D | eck_prn.c | 31 ret = ECPKParameters_print(b, x, off); in ECPKParameters_print_fp() 46 ret = EC_KEY_print(b, x, off); in EC_KEY_print_fp() 68 size_t len, int off); 101 if (!BIO_indent(bp, off, 128)) in ECPKParameters_print() 113 if (!BIO_indent(bp, off, 128)) in ECPKParameters_print() 161 if (!BIO_indent(bp, off, 128)) in ECPKParameters_print() 233 if (off > 0) { in print_bin() 234 if (off > 128) in print_bin() 235 off = 128; in print_bin() 236 memset(str, ' ', off); in print_bin() [all …]
|
H A D | ecp_s390x_nistp.c | 138 int off; in ecdsa_s390x_nistp_sign_sig() local 167 off = len - (dgstlen > len ? len : dgstlen); in ecdsa_s390x_nistp_sign_sig() 168 memcpy(param + S390X_OFF_H(len) + off, dgst, len - off); in ecdsa_s390x_nistp_sign_sig() 234 int off; in ecdsa_s390x_nistp_verify_sig() local 264 off = len - (dgstlen > len ? len : dgstlen); in ecdsa_s390x_nistp_verify_sig() 265 memcpy(param + S390X_OFF_H(len) + off, dgst, len - off); in ecdsa_s390x_nistp_verify_sig()
|
H A D | ec_ameth.c | 283 static int do_EC_KEY_print(BIO *bp, const EC_KEY *x, int off, ec_print_t ktype) in do_EC_KEY_print() argument 315 if (!BIO_indent(bp, off, 128)) in do_EC_KEY_print() 322 if (BIO_printf(bp, "%*spriv:\n", off, "") <= 0) in do_EC_KEY_print() 324 if (ASN1_buf_print(bp, priv, privlen, off + 4) == 0) in do_EC_KEY_print() 329 if (BIO_printf(bp, "%*spub:\n", off, "") <= 0) in do_EC_KEY_print() 331 if (ASN1_buf_print(bp, pub, publen, off + 4) == 0) in do_EC_KEY_print() 335 if (!ECPKParameters_print(bp, group, off)) in do_EC_KEY_print() 710 int EC_KEY_print(BIO *bp, const EC_KEY *x, int off) in EC_KEY_print() argument 714 return do_EC_KEY_print(bp, x, off, in EC_KEY_print()
|
/openssl/crypto/asn1/ |
H A D | a_d2i_fp.c | 116 size_t off = 0; in asn1_d2i_read_bio() local 132 diff = len - off; in asn1_d2i_read_bio() 158 p = (unsigned char *)&(b->data[off]); in asn1_d2i_read_bio() 160 diff = len - off; in asn1_d2i_read_bio() 173 off += i; /* end of data */ in asn1_d2i_read_bio() 193 if (want > (len - off)) { in asn1_d2i_read_bio() 196 want -= (len - off); in asn1_d2i_read_bio() 233 if (off + slen < off) { in asn1_d2i_read_bio() 237 off += slen; in asn1_d2i_read_bio() 245 if (off > INT_MAX) { in asn1_d2i_read_bio() [all …]
|
H A D | a_int.c | 239 size_t off = sizeof(uint64_t); in asn1_put_uint64() local 242 b[--off] = (unsigned char)r; in asn1_put_uint64() 245 return off; in asn1_put_uint64() 344 size_t off; in asn1_string_set_int64() local 359 return ASN1_STRING_set(a, tbuf + off, sizeof(tbuf) - off); in asn1_string_set_int64() 383 size_t off; in asn1_string_set_uint64() local 386 off = asn1_put_uint64(tbuf, r); in asn1_string_set_uint64() 387 return ASN1_STRING_set(a, tbuf + off, sizeof(tbuf) - off); in asn1_string_set_uint64() 636 size_t off; in ossl_i2c_uint64_int() local 638 off = asn1_put_uint64(buf, r); in ossl_i2c_uint64_int() [all …]
|
/openssl/test/ |
H A D | quic_stream_test.c | 506 if (off <= queued_min && off + size > queued_min) in test_rstream_random() 507 queued_min = off + size; in test_rstream_random() 513 if (queued_max < off + size) in test_rstream_random() 514 queued_max = off + size; in test_rstream_random() 521 if (off > 50) in test_rstream_random() 522 off -= 50; in test_rstream_random() 524 if (off + size > data_size) in test_rstream_random() 525 off = data_size - size; in test_rstream_random() 526 if (off <= queued_min && off + size > queued_min) in test_rstream_random() 527 queued_min = off + size; in test_rstream_random() [all …]
|
H A D | danetest.c | 305 int off; in test_tlsafile() local 316 &ntlsa, &ncert, &noncheck, &want, &want_depth, &off) != 5 in test_tlsafile() 317 || !allws(line + off)) { in test_tlsafile()
|
/openssl/crypto/ |
H A D | cpuid.c | 107 int off = (env[0] == '~') ? 1 : 0; in OPENSSL_cpuid_setup() local 109 vec = ossl_strtouint64(env + off); in OPENSSL_cpuid_setup() 111 if (off) { in OPENSSL_cpuid_setup() 133 off = (env[0] == '~') ? 1 : 0; in OPENSSL_cpuid_setup() 134 vecx = ossl_strtouint64(env + off); in OPENSSL_cpuid_setup() 135 if (off) { in OPENSSL_cpuid_setup()
|
H A D | s390xcap.c | 47 off = (tok[0][0] == '~') ? 1 : 0; \ 48 if (sscanf(tok[0] + off, "%llx", &cap->NAME[0]) != 1) \ 50 if (off) \ 53 off = (tok[1][0] == '~') ? 1 : 0; \ 54 if (sscanf(tok[1] + off, "%llx", &cap->NAME[1]) != 1) \ 56 if (off) \ 722 int rc, off, i, n; in parse_env() local 743 off = (tok[i][0] == '~') ? 1 : 0; in parse_env() 744 if (sscanf(tok[i] + off, "%llx", &cap->stfle[i]) != 1) in parse_env() 746 if (off) in parse_env()
|
/openssl/crypto/rsa/ |
H A D | rsa_prn.c | 22 int RSA_print_fp(FILE *fp, const RSA *x, int off) in RSA_print_fp() argument 32 ret = RSA_print(b, x, off); in RSA_print_fp() 38 int RSA_print(BIO *bp, const RSA *x, int off) in RSA_print() argument 47 ret = EVP_PKEY_print_private(bp, pk, off, NULL); in RSA_print()
|
H A D | rsa_ameth.c | 311 if (!BIO_indent(bp, off, 128)) in pkey_rsa_print() 329 if (!ASN1_bn_print(bp, str, x->n, NULL, off)) in pkey_rsa_print() 331 if (!ASN1_bn_print(bp, s, x->e, NULL, off)) in pkey_rsa_print() 336 if (!ASN1_bn_print(bp, "privateExponent:", x->d, NULL, off)) in pkey_rsa_print() 338 if (!ASN1_bn_print(bp, "prime1:", x->p, NULL, off)) in pkey_rsa_print() 340 if (!ASN1_bn_print(bp, "prime2:", x->q, NULL, off)) in pkey_rsa_print() 342 if (!ASN1_bn_print(bp, "exponent1:", x->dmp1, NULL, off)) in pkey_rsa_print() 344 if (!ASN1_bn_print(bp, "exponent2:", x->dmq1, NULL, off)) in pkey_rsa_print() 346 if (!ASN1_bn_print(bp, "coefficient:", x->iqmp, NULL, off)) in pkey_rsa_print() 356 if (!BIO_indent(bp, off, 128)) in pkey_rsa_print() [all …]
|
/openssl/crypto/dsa/ |
H A D | dsa_prn.c | 22 int DSA_print_fp(FILE *fp, const DSA *x, int off) in DSA_print_fp() argument 32 ret = DSA_print(b, x, off); in DSA_print_fp() 53 int DSA_print(BIO *bp, const DSA *x, int off) in DSA_print() argument 62 ret = EVP_PKEY_print_private(bp, pk, off, NULL); in DSA_print()
|
H A D | dsa_ameth.c | 272 static int do_dsa_print(BIO *bp, const DSA *x, int off, int ptype) in do_dsa_print() argument 300 if (!BIO_indent(bp, off, 128)) in do_dsa_print() 309 if (!ASN1_bn_print(bp, "priv:", priv_key, NULL, off)) in do_dsa_print() 311 if (!ASN1_bn_print(bp, "pub: ", pub_key, NULL, off)) in do_dsa_print() 313 if (!ossl_ffc_params_print(bp, &x->params, off)) in do_dsa_print()
|
/openssl/demos/bio/ |
H A D | sconnect.c | 43 int i, len, off, ret = EXIT_FAILURE; in main() local 86 off = 0; in main() 88 i = BIO_write(out, &(p[off]), len); in main() 98 off += i; in main()
|
/openssl/doc/man3/ |
H A D | ECPKParameters_print.pod | 16 int ECPKParameters_print(BIO *bp, const EC_GROUP *x, int off); 17 int ECPKParameters_print_fp(FILE *fp, const EC_GROUP *x, int off); 29 or B<fp>. The output lines are indented by B<off> spaces.
|
H A D | SSL_CTX_set_read_ahead.pod | 29 Setting the parameter B<yes> to 0 turns reading ahead is off, other values turn 50 B<SSL_MODE_AUTO_RETRY> is not turned off using SSL_CTX_clear_mode(). 56 ahead should be turned off. 61 SSL_get_read_ahead() and SSL_CTX_get_read_ahead() return 0 if reading ahead is off,
|
/openssl/crypto/perlasm/ |
H A D | riscv.pm | 249 my $off = shift; 251 my $off0 = ($off + 0); 252 my $off1 = ($off + 1); 253 my $off2 = ($off + 2); 254 my $off3 = ($off + 3); 255 my $off4 = ($off + 4); 256 my $off5 = ($off + 5); 257 my $off6 = ($off + 6); 258 my $off7 = ($off + 7);
|
/openssl/crypto/bio/ |
H A D | bss_mem.c | 248 long off, remain; in mem_ctrl() local 257 off = (bm->data == bo->data) ? 0 : bm->data - bo->data; in mem_ctrl() 277 if (num < 0 || num > off + remain) in mem_ctrl() 283 off = num; in mem_ctrl() 286 ret = off; in mem_ctrl()
|
/openssl/include/internal/ |
H A D | ktls.h | 199 static ossl_inline ossl_ssize_t ktls_sendfile(int s, int fd, off_t off, in ktls_sendfile() argument 205 ret = sendfile(fd, s, off, size, NULL, &sbytes, flags); in ktls_sendfile() 362 static ossl_inline ossl_ssize_t ktls_sendfile(int s, int fd, off_t off, size_t size, int flags) in ktls_sendfile() argument 364 return sendfile(s, fd, &off, size); in ktls_sendfile()
|
/openssl/providers/implementations/ciphers/ |
H A D | cipher_aes_cbc_hmac_sha1_hw.c | 259 off = hash_d[i].blocks * 64; in tls1_multi_block_encrypt() local 260 const unsigned char *ptr = hash_d[i].ptr + off; in tls1_multi_block_encrypt() 262 off = (len - processed) - (64 - 13) - off; /* remainder actually */ in tls1_multi_block_encrypt() 263 memcpy(blocks[i].c, ptr, off); in tls1_multi_block_encrypt() 264 blocks[i].c[off] = 0x80; in tls1_multi_block_encrypt() 267 if (off < (64 - 8)) { in tls1_multi_block_encrypt() 603 size_t off = out - p; in aesni_cbc_hmac_sha1_cipher() local 609 ((int)(j - off - SHA_DIGEST_LENGTH)) >> (sizeof(int) * in aesni_cbc_hmac_sha1_cipher() 612 cmask &= ((int)(off - 1 - j)) >> (sizeof(int) * 8 - 1); in aesni_cbc_hmac_sha1_cipher()
|
H A D | cipher_aes_cbc_hmac_sha256_hw.c | 267 off = hash_d[i].blocks * 64; in tls1_multi_block_encrypt() local 268 const unsigned char *ptr = hash_d[i].ptr + off; in tls1_multi_block_encrypt() 270 off = (len - processed) - (64 - 13) - off; /* remainder actually */ in tls1_multi_block_encrypt() 271 memcpy(blocks[i].c, ptr, off); in tls1_multi_block_encrypt() 272 blocks[i].c[off] = 0x80; in tls1_multi_block_encrypt() 275 if (off < (64 - 8)) { in tls1_multi_block_encrypt() 655 size_t off = out - p; in aesni_cbc_hmac_sha256_cipher() local 663 ((int)(j - off - SHA256_DIGEST_LENGTH)) >> in aesni_cbc_hmac_sha256_cipher() 666 cmask &= ((int)(off - 1 - j)) >> (sizeof(int) * 8 - 1); in aesni_cbc_hmac_sha256_cipher()
|
/openssl/test/recipes/04-test_conf_data/ |
H A D | dollarid_off.cnf | 1 .pragma dollarid:off
|
/openssl/crypto/evp/ |
H A D | e_aes_cbc_hmac_sha1.c | 297 off = hash_d[i].blocks * 64; in tls1_1_multi_block_encrypt() local 298 const unsigned char *ptr = hash_d[i].ptr + off; in tls1_1_multi_block_encrypt() 300 off = (len - processed) - (64 - 13) - off; /* remainder actually */ in tls1_1_multi_block_encrypt() 301 memcpy(blocks[i].c, ptr, off); in tls1_1_multi_block_encrypt() 302 blocks[i].c[off] = 0x80; in tls1_1_multi_block_encrypt() 305 if (off < (64 - 8)) { in tls1_1_multi_block_encrypt() 709 size_t off = out - p; in aesni_cbc_hmac_sha1_cipher() local 715 ((int)(j - off - SHA_DIGEST_LENGTH)) >> (sizeof(int) * in aesni_cbc_hmac_sha1_cipher() 718 cmask &= ((int)(off - 1 - j)) >> (sizeof(int) * 8 - 1); in aesni_cbc_hmac_sha1_cipher()
|
H A D | e_aes_cbc_hmac_sha256.c | 295 off = hash_d[i].blocks * 64; in tls1_1_multi_block_encrypt() local 296 const unsigned char *ptr = hash_d[i].ptr + off; in tls1_1_multi_block_encrypt() 298 off = (len - processed) - (64 - 13) - off; /* remainder actually */ in tls1_1_multi_block_encrypt() 299 memcpy(blocks[i].c, ptr, off); in tls1_1_multi_block_encrypt() 300 blocks[i].c[off] = 0x80; in tls1_1_multi_block_encrypt() 303 if (off < (64 - 8)) { in tls1_1_multi_block_encrypt() 706 size_t off = out - p; in aesni_cbc_hmac_sha256_cipher() local 713 ((int)(j - off - SHA256_DIGEST_LENGTH)) >> in aesni_cbc_hmac_sha256_cipher() 716 cmask &= ((int)(off - 1 - j)) >> (sizeof(int) * 8 - 1); in aesni_cbc_hmac_sha256_cipher()
|
/openssl/ssl/record/ |
H A D | rec_layer_d1.c | 85 if (!ossl_assert(rec->off == 0)) in dtls_buffer_record() 269 rr->off = 0; in dtls1_read_bytes() 351 memcpy(buf, &(rr->data[rr->off]), n); in dtls1_read_bytes() 383 const unsigned char *alert_bytes = rr->data + rr->off; in dtls1_read_bytes()
|