/openssl/doc/man3/ |
H A D | OSSL_ENCODER_to_bio.pod | 14 int OSSL_ENCODER_to_data(OSSL_ENCODER_CTX *ctx, unsigned char **pdata, 31 with the output going to the I<*pdata> and I<*pdata_len>. 32 If I<*pdata> is NULL when OSSL_ENCODER_to_data() is called, a buffer will be 33 allocated using L<OPENSSL_zalloc(3)>, and I<*pdata> will be set to point at 36 If I<*pdata> is non-NULL when OSSL_ENCODER_to_data() is called, I<*pdata_len> 37 is assumed to have its size. In this case, I<*pdata> will be set to point
|
H A D | PEM_bytes_read_bio.pod | 11 int PEM_bytes_read_bio(unsigned char **pdata, long *plen, char **pnm, 14 int PEM_bytes_read_bio_secmem(unsigned char **pdata, long *plen, char **pnm, 39 I<*pdata> with length I<*plen>. The caller must free the storage pointed 40 to by I<*pdata>. 44 returned in I<*pdata> and I<*pnm>. Accordingly, the caller must use
|
H A D | OSSL_DECODER_from_bio.pod | 16 int OSSL_DECODER_from_data(OSSL_DECODER_CTX *ctx, const unsigned char **pdata, 31 with input coming from I<*pdata>, I<*pdata_len> bytes long. Both I<*pdata> 33 I<*pdata> is updated to point at the location after what has been decoded,
|
/openssl/crypto/encode_decode/ |
H A D | encoder_lib.c | 96 int OSSL_ENCODER_to_data(OSSL_ENCODER_CTX *ctx, unsigned char **pdata, in OSSL_ENCODER_to_data() argument 115 if (pdata != NULL && *pdata != NULL) { in OSSL_ENCODER_to_data() 131 if (pdata != NULL) { in OSSL_ENCODER_to_data() 132 if (*pdata != NULL) { in OSSL_ENCODER_to_data() 133 memcpy(*pdata, buf->data, buf->length); in OSSL_ENCODER_to_data() 134 *pdata += buf->length; in OSSL_ENCODER_to_data() 137 *pdata = (unsigned char *)buf->data; in OSSL_ENCODER_to_data()
|
H A D | decoder_lib.c | 145 int OSSL_DECODER_from_data(OSSL_DECODER_CTX *ctx, const unsigned char **pdata, in OSSL_DECODER_from_data() argument 151 if (pdata == NULL || *pdata == NULL || pdata_len == NULL) { in OSSL_DECODER_from_data() 156 membio = BIO_new_mem_buf(*pdata, (int)*pdata_len); in OSSL_DECODER_from_data() 158 *pdata_len = (size_t)BIO_get_mem_data(membio, pdata); in OSSL_DECODER_from_data()
|
/openssl/test/ |
H A D | evp_extra_test2.c | 579 const unsigned char *pdata = kExampleRSAKeyDER; in test_rsa_tofrom_data_select() local 582 ret = TEST_ptr(key = d2i_AutoPrivateKey_ex(NULL, &pdata, pdata_len, in test_rsa_tofrom_data_select() 1217 const unsigned char *pdata = keydata[0].kder; in test_pkey_todata_null() local 1219 ret = TEST_ptr(pkey = d2i_AutoPrivateKey_ex(NULL, &pdata, keydata[0].size, in test_pkey_todata_null() 1240 const unsigned char *pdata = keydata[0].kder; in test_pkey_export_null() local 1242 ret = TEST_ptr(pkey = d2i_AutoPrivateKey_ex(NULL, &pdata, keydata[0].size, in test_pkey_export_null() 1258 const unsigned char *pdata = keydata[0].kder; in test_pkey_export() local 1261 if (!TEST_ptr(pkey = d2i_AutoPrivateKey_ex(NULL, &pdata, pdata_len, in test_pkey_export() 1272 pdata = keydata[0].kder; in test_pkey_export() 1274 if (!TEST_ptr(rsa = d2i_RSAPrivateKey(NULL, &pdata, pdata_len)) in test_pkey_export() [all …]
|
H A D | evp_test.c | 2920 PBE_DATA *pdata = t->data; in scrypt_test_parse() local 2937 PBE_DATA *pdata = t->data; in pbkdf2_test_parse() local 2941 if (pdata->iter <= 0) in pbkdf2_test_parse() 2947 if (pdata->md == NULL) in pbkdf2_test_parse() 2957 PBE_DATA *pdata = t->data; in pkcs12_test_parse() local 2960 pdata->id = atoi(value); in pkcs12_test_parse() 2961 if (pdata->id <= 0) in pkcs12_test_parse() 3007 PBE_DATA *pdata = t->data; in pbe_test_parse() local 3010 return parse_bin(value, &pdata->pass, &pdata->pass_len); in pbe_test_parse() 3012 return parse_bin(value, &pdata->salt, &pdata->salt_len); in pbe_test_parse() [all …]
|
H A D | evp_extra_test.c | 791 const unsigned char **pdata = &data; in load_example_key() local 798 (void)OSSL_DECODER_from_data(dctx, pdata, &data_len); in load_example_key()
|
/openssl/test/helpers/ |
H A D | predefined_dhparams.c | 49 unsigned char *pdata, size_t plen, in get_dh_from_pg() argument 56 p = BN_bin2bn(pdata, plen, NULL); in get_dh_from_pg()
|
/openssl/crypto/pem/ |
H A D | pem_lib.c | 242 static int pem_bytes_read_bio_flags(unsigned char **pdata, long *plen, in pem_bytes_read_bio_flags() argument 268 *pdata = data; in pem_bytes_read_bio_flags() 285 int PEM_bytes_read_bio(unsigned char **pdata, long *plen, char **pnm, in PEM_bytes_read_bio() argument 288 return pem_bytes_read_bio_flags(pdata, plen, pnm, name, bp, cb, u, in PEM_bytes_read_bio() 292 int PEM_bytes_read_bio_secmem(unsigned char **pdata, long *plen, char **pnm, in PEM_bytes_read_bio_secmem() argument 295 return pem_bytes_read_bio_flags(pdata, plen, pnm, name, bp, cb, u, in PEM_bytes_read_bio_secmem()
|
/openssl/crypto/sm3/asm/ |
H A D | sm3-armv8.pl | 116 my ($pstate,$pdata,$num)=("x0","x1","w2"); 144 ld1 {$s0.16b-$s3.16b}, [$pdata], #64
|
/openssl/include/openssl/ |
H A D | encoder.h | 107 int OSSL_ENCODER_to_data(OSSL_ENCODER_CTX *ctx, unsigned char **pdata,
|
H A D | decoder.h | 116 int OSSL_DECODER_from_data(OSSL_DECODER_CTX *ctx, const unsigned char **pdata,
|
H A D | pem.h | 385 int PEM_bytes_read_bio_secmem(unsigned char **pdata, long *plen, char **pnm, 390 int PEM_bytes_read_bio(unsigned char **pdata, long *plen, char **pnm,
|
/openssl/crypto/store/ |
H A D | store_result.c | 266 const unsigned char *pdata = data->octet_data; in try_key_value() local 295 (void)OSSL_DECODER_from_data(decoderctx, &pdata, &pdatalen); in try_key_value()
|
/openssl/ssl/statem/ |
H A D | statem_lib.c | 1309 unsigned char *pdata = NULL; in tls_output_rpk() local 1322 pdata_len = i2d_X509_PUBKEY(xpk, &pdata); in tls_output_rpk() 1325 pdata_len = i2d_PUBKEY(cpk->privatekey, &pdata); in tls_output_rpk() 1333 if (!WPACKET_sub_memcpy_u24(pkt, pdata, pdata_len)) { in tls_output_rpk() 1356 if (!WPACKET_sub_memcpy_u24(pkt, pdata, pdata_len)) { in tls_output_rpk() 1380 OPENSSL_free(pdata); in tls_output_rpk()
|