/openssl/crypto/evp/ |
H A D | ctrl_params_translate.c | 191 void *p2; member 771 ctx->p2 = (char *)(ctx->p2 == NULL in fix_cipher_md() 776 ctx->p2 = (ctx->p2 == NULL ? "" : (char *)get_name(ctx->p2)); in fix_cipher_md() 985 ctx->p2 = (ASN1_OBJECT *)OBJ_txt2obj(ctx->p2, 0); in fix_oid() 1163 ctx->p2 = &p2; in fix_ec_paramgen_curve_nid() 1518 ctx->p2 = NULL; in get_payload_group_name() 1571 ctx->p2 = NULL; in get_payload_private_key() 1610 ctx->p2 = NULL; in get_payload_public_key() 1679 ctx->p2 = NULL; in get_payload_public_key_ec() 1813 ctx->p2 = NULL; in get_payload_int() [all …]
|
H A D | legacy_sha.c | 67 static int sha1_int_ctrl(EVP_MD_CTX *ctx, int cmd, int p1, void *p2) in IMPLEMENT_LEGACY_EVP_MD_METH() 70 cmd, p1, p2); in IMPLEMENT_LEGACY_EVP_MD_METH() 73 static int shake_ctrl(EVP_MD_CTX *evp_ctx, int cmd, int p1, void *p2) in shake_ctrl() argument
|
/openssl/crypto/dsa/ |
H A D | dsa_pmeth.c | 151 if (EVP_MD_get_type((const EVP_MD *)p2) != NID_sha1 && in pkey_dsa_ctrl() 152 EVP_MD_get_type((const EVP_MD *)p2) != NID_sha224 && in pkey_dsa_ctrl() 153 EVP_MD_get_type((const EVP_MD *)p2) != NID_sha256) { in pkey_dsa_ctrl() 157 dctx->pmd = p2; in pkey_dsa_ctrl() 161 if (EVP_MD_get_type((const EVP_MD *)p2) != NID_sha1 && in pkey_dsa_ctrl() 162 EVP_MD_get_type((const EVP_MD *)p2) != NID_dsa && in pkey_dsa_ctrl() 164 EVP_MD_get_type((const EVP_MD *)p2) != NID_sha224 && in pkey_dsa_ctrl() 165 EVP_MD_get_type((const EVP_MD *)p2) != NID_sha256 && in pkey_dsa_ctrl() 166 EVP_MD_get_type((const EVP_MD *)p2) != NID_sha384 && in pkey_dsa_ctrl() 175 dctx->md = p2; in pkey_dsa_ctrl() [all …]
|
/openssl/crypto/objects/ |
H A D | objxref.pl | 43 my ($xr, $p1, $p2) = /^(\S+)\s+(\S+)\s+(\S+)/; 46 check_oid($p2); 47 $xref_tbl{$xr} = [$p1, $p2, $ln]; 102 my ($p1, $p2) = @{$xref_tbl{$_}}; 104 my $o2 = "NID_$p2},"; 124 my ($p1, $p2, $x) = @{$xref_tbl{$_}}; 127 next if $p1 eq "undef" || $p2 eq "undef";
|
/openssl/crypto/ec/ |
H A D | ec_pmeth.c | 323 dctx->kdf_md = p2; in pkey_ec_ctrl() 327 *(const EVP_MD **)p2 = dctx->kdf_md; in pkey_ec_ctrl() 337 *(int *)p2 = dctx->kdf_outlen; in pkey_ec_ctrl() 342 dctx->kdf_ukm = p2; in pkey_ec_ctrl() 343 if (p2) in pkey_ec_ctrl() 350 *(unsigned char **)p2 = dctx->kdf_ukm; in pkey_ec_ctrl() 354 if (EVP_MD_get_type((const EVP_MD *)p2) != NID_sha1 && in pkey_ec_ctrl() 356 EVP_MD_get_type((const EVP_MD *)p2) != NID_sha224 && in pkey_ec_ctrl() 364 EVP_MD_get_type((const EVP_MD *)p2) != NID_sm3) { in pkey_ec_ctrl() 368 dctx->md = p2; in pkey_ec_ctrl() [all …]
|
/openssl/crypto/bn/ |
H A D | bn_x931p.c | 53 int BN_X931_derive_prime_ex(BIGNUM *p, BIGNUM *p1, BIGNUM *p2, in BN_X931_derive_prime_ex() argument 70 if (p2 == NULL) in BN_X931_derive_prime_ex() 71 p2 = BN_CTX_get(ctx); in BN_X931_derive_prime_ex() 85 if (!bn_x931_derive_pi(p2, Xp2, ctx, cb)) in BN_X931_derive_prime_ex() 88 if (!BN_mul(p1p2, p1, p2, ctx)) in BN_X931_derive_prime_ex() 93 if (!BN_mod_inverse(p, p2, p1, ctx)) in BN_X931_derive_prime_ex() 96 if (!BN_mul(p, p, p2, ctx)) in BN_X931_derive_prime_ex() 99 if (!BN_mod_inverse(t, p1, p2, ctx)) in BN_X931_derive_prime_ex() 219 int BN_X931_generate_prime_ex(BIGNUM *p, BIGNUM *p1, BIGNUM *p2, in BN_X931_generate_prime_ex() argument 238 if (!BN_X931_derive_prime_ex(p, p1, p2, Xp, Xp1, Xp2, e, ctx, cb)) in BN_X931_generate_prime_ex()
|
H A D | bn_exp2.c | 17 const BIGNUM *a2, const BIGNUM *p2, const BIGNUM *m, in BN_mod_exp2_mont() argument 32 bn_check_top(p2); in BN_mod_exp2_mont() 40 bits2 = BN_num_bits(p2); in BN_mod_exp2_mont() 160 if (BN_is_bit_set(p2, b)) { in BN_mod_exp2_mont() 165 while (!BN_is_bit_set(p2, i)) in BN_mod_exp2_mont() 171 if (BN_is_bit_set(p2, i)) in BN_mod_exp2_mont()
|
H A D | bn_rsa_fips186_4.c | 185 BIGNUM *p1, BIGNUM *p2, in ossl_bn_rsa_fips186_4_gen_prob_primes() argument 201 p2i = (p2 != NULL) ? p2 : BN_CTX_get(ctx); in ossl_bn_rsa_fips186_4_gen_prob_primes() 244 if (p2 == NULL) in ossl_bn_rsa_fips186_4_gen_prob_primes()
|
/openssl/crypto/rsa/ |
H A D | rsa_pmeth.c | 482 *(int *)p2 = rctx->pad_mode; in pkey_rsa_ctrl() 492 *(int *)p2 = rctx->saltlen; in pkey_rsa_ctrl() 527 if (p2 == NULL || !BN_is_odd((BIGNUM *)p2) || BN_is_one((BIGNUM *)p2)) { in pkey_rsa_ctrl() 532 rctx->pub_exp = p2; in pkey_rsa_ctrl() 552 rctx->md = p2; in pkey_rsa_ctrl() 564 rctx->md = p2; in pkey_rsa_ctrl() 568 *(const EVP_MD **)p2 = rctx->md; in pkey_rsa_ctrl() 590 rctx->mgf1md = p2; in pkey_rsa_ctrl() 600 if (p2 && p1 > 0) { in pkey_rsa_ctrl() 601 rctx->oaep_label = p2; in pkey_rsa_ctrl() [all …]
|
H A D | rsa_mp.c | 62 BIGNUM *p1 = NULL, *p2 = NULL; in ossl_rsa_multip_calc_product() local 76 p2 = rsa->q; in ossl_rsa_multip_calc_product() 85 if (!BN_mul(pinfo->pp, p1, p2, ctx)) in ossl_rsa_multip_calc_product() 89 p2 = pinfo->r; in ossl_rsa_multip_calc_product()
|
H A D | rsa_acvp_test_params.c | 115 t->p2 = BN_new(); in ossl_rsa_acvp_test_set_params() 139 && !OSSL_PARAM_set_BN(p, t->p2)) in ossl_rsa_acvp_test_get_params() 161 BN_free(t->p2); in ossl_rsa_acvp_test_free()
|
H A D | rsa_sp800_56b_gen.c | 63 BIGNUM *p1 = NULL, *p2 = NULL; in ossl_rsa_fips186_4_gen_prob_primes() local 78 p2 = test->p2; in ossl_rsa_fips186_4_gen_prob_primes() 122 if (!ossl_bn_rsa_fips186_4_gen_prob_primes(rsa->p, Xpo, p1, p2, Xp, Xp1, Xp2, in ossl_rsa_fips186_4_gen_prob_primes()
|
/openssl/providers/implementations/ciphers/ |
H A D | cipher_rc2.c | 109 OSSL_PARAM *p, *p1, *p2; in rc2_get_ctx_params() local 119 p2 = OSSL_PARAM_locate(params, OSSL_CIPHER_PARAM_ALGORITHM_ID_PARAMS_OLD); in rc2_get_ctx_params() 120 if (p1 != NULL || p2 != NULL) { in rc2_get_ctx_params() 125 unsigned char *d2 = (p2 == NULL) ? NULL : p2->data; in rc2_get_ctx_params() 130 || (p2 != NULL && p2->data_type != OSSL_PARAM_OCTET_STRING)) { in rc2_get_ctx_params() 162 if (p2 != NULL && i >= 0) in rc2_get_ctx_params() 163 p2->return_size = (size_t)i; in rc2_get_ctx_params()
|
/openssl/crypto/perlasm/ |
H A D | cbc.pl | 35 local($name,$enc_func,$dec_func,$swap,$iv_off,$enc_off,$p1,$p2,$p3)=@_; 58 $data_off+=4 if ($p2 > 0); 89 if ($p2 > 0) 91 &comment("get and push parameter $p2"); 92 if ($enc_off != $p2) 93 { &mov("eax", &wparam($p2)); &push("eax"); } 328 $total+=4 if ($p2 > 0);
|
H A D | x86asm.pl | 81 { my($p1,$p2,$optimize)=@_; 83 if ($optimize && $p1=~/^mm[0-7]$/ && $p2=~/^mm[0-7]$/) 85 { &::pshufw($p1,$p2,0xe4); }
|
/openssl/crypto/dh/ |
H A D | dh_pmeth.c | 115 static int pkey_dh_ctrl(EVP_PKEY_CTX *ctx, int type, int p1, void *p2) in pkey_dh_ctrl() argument 177 dctx->kdf_md = p2; in pkey_dh_ctrl() 181 *(const EVP_MD **)p2 = dctx->kdf_md; in pkey_dh_ctrl() 191 *(int *)p2 = dctx->kdf_outlen; in pkey_dh_ctrl() 196 dctx->kdf_ukm = p2; in pkey_dh_ctrl() 197 if (p2) in pkey_dh_ctrl() 204 *(unsigned char **)p2 = dctx->kdf_ukm; in pkey_dh_ctrl() 209 dctx->kdf_oid = p2; in pkey_dh_ctrl() 213 *(ASN1_OBJECT **)p2 = dctx->kdf_oid; in pkey_dh_ctrl()
|
/openssl/crypto/asn1/ |
H A D | a_dup.c | 19 const unsigned char *p2; in ASN1_dup() local 35 p2 = b; in ASN1_dup() 36 ret = d2i(NULL, &p2, i); in ASN1_dup()
|
/openssl/crypto/ |
H A D | params_dup.c | 146 OSSL_PARAM *OSSL_PARAM_merge(const OSSL_PARAM *p1, const OSSL_PARAM *p2) in OSSL_PARAM_merge() argument 156 if (p1 == NULL && p2 == NULL) { in OSSL_PARAM_merge() 169 if (p2 != NULL) { in OSSL_PARAM_merge() 170 for (p = p2; p->key != NULL && list2_sz < OSSL_PARAM_MERGE_LIST_MAX; p++) in OSSL_PARAM_merge()
|
/openssl/test/ |
H A D | params_test.c | 48 double p2; member 107 obj->p2 = p2_init; in init_object() 138 obj->p2 = *(double *)params->data; in raw_set_params() 180 params->return_size = sizeof(obj->p2); in raw_get_params() 181 *(double *)params->data = obj->p2; in raw_get_params() 218 && !TEST_true(OSSL_PARAM_get_double(p, &obj->p2))) in api_set_params() 254 && !TEST_true(OSSL_PARAM_set_double(p, obj->p2))) in api_get_params() 490 || !TEST_double_eq(sneakpeek->p2, p2_init) /* Should remain untouched */ in test_case_variant()
|
H A D | rsa_sp800_56b_test.c | 143 static const unsigned char p2[] = { 0x10, 0x00, 0x00, 0x00, 0x00 }; in test_check_prime_factor_range() local 153 && TEST_ptr(bn_p2 = bn_load_new(p2, sizeof(p2))) in test_check_prime_factor_range() 190 static const unsigned char p2[] = { 0x0B, 0x50, 0x4f, 0x33, 0x75 }; in test_check_prime_factor() local 195 && TEST_ptr(bn_p2 = bn_load_new(p2, sizeof(p2))) in test_check_prime_factor()
|
/openssl/crypto/md2/ |
H A D | md2_dgst.c | 160 register MD2_INT *p1, *p2; in MD2_Final() local 164 p2 = c->cksm; in MD2_Final() 172 cp[i] = (UCHAR) p2[i]; in MD2_Final()
|
/openssl/crypto/bio/ |
H A D | bf_buff.c | 240 char *p1, *p2; in buffer_ctrl() local 319 p2 = ctx->obuf; in buffer_ctrl() 328 p2 = OPENSSL_malloc((size_t)num); in buffer_ctrl() 329 if (p2 == NULL) { in buffer_ctrl() 342 if (ctx->obuf != p2) { in buffer_ctrl() 344 ctx->obuf = p2; in buffer_ctrl()
|
/openssl/doc/man3/ |
H A D | BN_mod_exp_mont.pod | 22 const BIGNUM *a2, const BIGNUM *p2, 41 the I<p1>-th power modulo I<m1> (C<rr1=a1^p1 % m1>) and I<a2> to the I<p2>-th 42 power modulo I<m2> (C<rr2=a2^p2 % m2>) using Montgomery multiplication. For some
|
/openssl/crypto/property/ |
H A D | property.c | 624 OSSL_PROPERTY_LIST *pq = NULL, *p2 = NULL; in ossl_method_store_fetch() local 653 p2 = pq = ossl_parse_query(store->ctx, prop_query, 0); in ossl_method_store_fetch() 664 p2 = ossl_property_merge(pq, *plp); in ossl_method_store_fetch() 666 if (p2 == NULL) in ossl_method_store_fetch() 668 pq = p2; in ossl_method_store_fetch() 732 ossl_property_free(p2); in ossl_method_store_fetch()
|
/openssl/crypto/ct/ |
H A D | ct_oct.c | 321 unsigned char *p = NULL, *p2; in i2o_SCT_LIST() local 339 p2 = p; in i2o_SCT_LIST() 343 s2n(sct_len, p2); in i2o_SCT_LIST()
|