filename
stringlengths 3
146
| content
stringlengths 25
24.6k
| from
stringclasses 1
value |
---|---|---|
memcpy_s | errno_t __cdecl memcpy_s(
void *const Destination,
const rsize_t DestinationSize,
const void *const Source,
const rsize_t SourceSize)
{
int *v8; // rax
errno_t v9; // ebx
if ( !SourceSize )
return 0;
if ( !Destination )
goto LABEL_4;
if ( Source && DestinationSize >= SourceSize )
{
memmove(Destination, Source, SourceSize);
return 0;
}
memset(Destination, 0, DestinationSize);
if ( !Source )
{
LABEL_4:
v8 = errno();
v9 = 22;
LABEL_5:
*v8 = v9;
invalid_parameter(0i64, 0i64, 0i64, 0, 0i64);
return v9;
}
if ( DestinationSize < SourceSize )
{
v8 = errno();
v9 = 34;
goto LABEL_5;
}
return 22;
}
| openssl |
memmove | void *__cdecl memmove(void *a1, const void *Src, size_t Size)
{
void *v3; // r11
bool v4; // cf
unsigned __int64 v5; // rdx
size_t v6; // r9
size_t v7; // r9
__int64 v9; // rax
__int64 v10; // r10
__int64 v11; // r10
int v12; // eax
int v13; // eax
__int64 v14; // r10
__int64 v15; // r10
__int64 v16; // r9
__int64 v17; // r10
__int64 v18; // r10
int *v19; // rcx
size_t v20; // r9
size_t v21; // r9
__int64 v22; // rax
__int64 v23; // r10
__int64 v24; // r10
int v25; // eax
int v26; // eax
__int64 v27; // r10
__int64 v28; // r10
__int64 v29; // r9
__int64 v30; // r10
__int64 v31; // r10
void *retaddr; // [rsp+0h] [rbp+0h] BYREF
v3 = a1;
v4 = Src < a1;
v5 = (_BYTE *)Src - (_BYTE *)a1;
if ( v4 )
{
v19 = (int *)((char *)a1 + Size);
if ( Size >= 8 )
{
if ( ((unsigned __int8)v19 & 7) != 0 )
{
if ( ((unsigned __int8)v19 & 1) != 0 )
{
v19 = (int *)((char *)v19 - 1);
--Size;
*(_BYTE *)v19 = *((_BYTE *)v19 + v5);
}
if ( ((unsigned __int8)v19 & 2) != 0 )
{
v19 = (int *)((char *)v19 - 2);
Size -= 2i64;
*(_WORD *)v19 = *(_WORD *)((char *)v19 + v5);
}
if ( ((unsigned __int8)v19 & 4) != 0 )
{
--v19;
Size -= 4i64;
*v19 = *(int *)((char *)v19 + v5);
}
}
while ( 1 )
{
v20 = Size >> 5;
if ( !(Size >> 5) )
break;
if ( v20 < 0x2000 || v5 > 0xFFFFFFFFFFFFF000ui64 )
{
do
{
v22 = *(_QWORD *)((char *)v19 + v5 - 8);
v23 = *(_QWORD *)((char *)v19 + v5 - 16);
v19 -= 8;
*((_QWORD *)v19 + 3) = v22;
*((_QWORD *)v19 + 2) = v23;
v24 = *(_QWORD *)((char *)v19 + v5);
--v20;
*((_QWORD *)v19 + 1) = *(_QWORD *)((char *)v19 + v5 + 8);
*(_QWORD *)v19 = v24;
}
while ( v20 );
Size &= 0x1Fu;
break;
}
do
{
v25 = 32;
do
{
v19 -= 32;
_mm_prefetch((const char *)v19 + v5, 0);
_mm_prefetch((const char *)v19 + v5 + 64, 0);
--v25;
}
while ( v25 );
v19 += 1024;
v26 = 64;
do
{
v27 = *(_QWORD *)((char *)v19 + v5 - 16);
_mm_stream_si32(v19 - 2, *(_QWORD *)((char *)v19 + v5 - 8));
_mm_stream_si32(v19 - 4, v27);
v28 = *(_QWORD *)((char *)v19 + v5 - 32);
_mm_stream_si32(v19 - 6, *(_QWORD *)((char *)v19 + v5 - 24));
_mm_stream_si32(v19 - 8, v28);
v29 = *(_QWORD *)((char *)v19 + v5 - 40);
v30 = *(_QWORD *)((char *)v19 + v5 - 48);
v19 -= 16;
_mm_stream_si32(v19 + 6, v29);
_mm_stream_si32(v19 + 4, v30);
v31 = *(_QWORD *)((char *)v19 + v5);
--v26;
_mm_stream_si32(v19 + 2, *(_QWORD *)((char *)v19 + v5 + 8));
_mm_stream_si32(v19, v31);
}
while ( v26 );
Size -= 4096i64;
}
while ( Size >= 0x1000 );
_InterlockedOr8((volatile signed __int8 *)&retaddr, 0);
}
v21 = Size >> 3;
if ( Size >> 3 )
{
do
{
v19 -= 2;
--v21;
*(_QWORD *)v19 = *(_QWORD *)((char *)v19 + v5);
}
while ( v21 );
Size &= 7u;
}
}
if ( Size )
{
do
{
v19 = (int *)((char *)v19 - 1);
--Size;
*(_BYTE *)v19 = *((_BYTE *)v19 + v5);
}
while ( Size );
return v3;
}
else
{
return v3;
}
}
else
{
if ( Size >= 8 )
{
if ( ((unsigned __int8)a1 & 7) != 0 )
{
if ( ((unsigned __int8)a1 & 1) != 0 )
{
--Size;
*(_BYTE *)a1 = *((_BYTE *)a1 + v5);
a1 = (char *)a1 + 1;
}
if ( ((unsigned __int8)a1 & 2) != 0 )
{
Size -= 2i64;
*(_WORD *)a1 = *(_WORD *)((char *)a1 + v5);
a1 = (char *)a1 + 2;
}
if ( ((unsigned __int8)a1 & 4) != 0 )
{
Size -= 4i64;
*(_DWORD *)a1 = *(_DWORD *)((char *)a1 + v5);
a1 = (char *)a1 + 4;
}
}
while ( 1 )
{
v6 = Size >> 5;
if ( !(Size >> 5) )
break;
if ( v6 < 0x2000 || v5 < 0x1000 )
{
do
{
v9 = *(_QWORD *)((char *)a1 + v5);
v10 = *(_QWORD *)((char *)a1 + v5 + 8);
a1 = (char *)a1 + 32;
*((_QWORD *)a1 - 4) = v9;
*((_QWORD *)a1 - 3) = v10;
v11 = *(_QWORD *)((char *)a1 + v5 - 8);
--v6;
*((_QWORD *)a1 - 2) = *(_QWORD *)((char *)a1 + v5 - 16);
*((_QWORD *)a1 - 1) = v11;
}
while ( v6 );
Size &= 0x1Fu;
break;
}
do
{
v12 = 32;
do
{
_mm_prefetch((const char *)a1 + v5, 0);
_mm_prefetch((const char *)a1 + v5 + 64, 0);
a1 = (char *)a1 + 128;
--v12;
}
while ( v12 );
a1 = (char *)a1 - 4096;
v13 = 64;
do
{
v14 = *(_QWORD *)((char *)a1 + v5 + 8);
_mm_stream_si32((int *)a1, *(_QWORD *)((char *)a1 + v5));
_mm_stream_si32((int *)a1 + 2, v14);
v15 = *(_QWORD *)((char *)a1 + v5 + 24);
_mm_stream_si32((int *)a1 + 4, *(_QWORD *)((char *)a1 + v5 + 16));
_mm_stream_si32((int *)a1 + 6, v15);
v16 = *(_QWORD *)((char *)a1 + v5 + 32);
v17 = *(_QWORD *)((char *)a1 + v5 + 40);
a1 = (char *)a1 + 64;
_mm_stream_si32((int *)a1 - 8, v16);
_mm_stream_si32((int *)a1 - 6, v17);
v18 = *(_QWORD *)((char *)a1 + v5 - 8);
--v13;
_mm_stream_si32((int *)a1 - 4, *(_QWORD *)((char *)a1 + v5 - 16));
_mm_stream_si32((int *)a1 - 2, v18);
}
while ( v13 );
Size -= 4096i64;
}
while ( Size >= 0x1000 );
_InterlockedOr8((volatile signed __int8 *)&retaddr, 0);
}
v7 = Size >> 3;
if ( Size >> 3 )
{
do
{
*(_QWORD *)a1 = *(_QWORD *)((char *)a1 + v5);
a1 = (char *)a1 + 8;
--v7;
}
while ( v7 );
Size &= 7u;
}
}
if ( Size )
{
do
{
*(_BYTE *)a1 = *((_BYTE *)a1 + v5);
a1 = (char *)a1 + 1;
--Size;
}
while ( Size );
return v3;
}
else
{
return v3;
}
}
}
| openssl |
memset | // local variable allocation has failed, the output may be wrong!
void *__cdecl memset(void *a1, int Val, size_t Size)
{
void *result; // rax
unsigned int v4; // ecx
size_t v5; // r9
unsigned __int64 v6; // r9
size_t v7; // r9
size_t i; // r9
void *retaddr; // [rsp+0h] [rbp+0h] BYREF
result = a1;
if ( Size >= 8 )
{
*(_QWORD *)&Val = 0x101010101010101i64 * (unsigned __int8)Val;
if ( Size >= 0x40 )
{
v4 = -(int)a1 & 7;
if ( v4 )
{
Size -= v4;
*(_QWORD *)result = *(_QWORD *)&Val;
}
a1 = (char *)result + v4;
v5 = Size;
Size &= 0x3Fu;
v6 = v5 >> 6;
if ( v6 )
{
if ( v6 >= 0x1C00 )
{
do
{
_mm_stream_si32((int *)a1, Val);
_mm_stream_si32((int *)a1 + 2, Val);
_mm_stream_si32((int *)a1 + 4, Val);
a1 = (char *)a1 + 64;
_mm_stream_si32((int *)a1 - 10, Val);
_mm_stream_si32((int *)a1 - 8, Val);
--v6;
_mm_stream_si32((int *)a1 - 6, Val);
_mm_stream_si32((int *)a1 - 4, Val);
_mm_stream_si32((int *)a1 - 2, Val);
}
while ( v6 );
_InterlockedOr8((volatile signed __int8 *)&retaddr, 0);
}
else
{
do
{
*(_QWORD *)a1 = *(_QWORD *)&Val;
*((_QWORD *)a1 + 1) = *(_QWORD *)&Val;
*((_QWORD *)a1 + 2) = *(_QWORD *)&Val;
a1 = (char *)a1 + 64;
*((_QWORD *)a1 - 5) = *(_QWORD *)&Val;
*((_QWORD *)a1 - 4) = *(_QWORD *)&Val;
--v6;
*((_QWORD *)a1 - 3) = *(_QWORD *)&Val;
*((_QWORD *)a1 - 2) = *(_QWORD *)&Val;
*((_QWORD *)a1 - 1) = *(_QWORD *)&Val;
}
while ( v6 );
}
}
}
v7 = Size;
Size &= 7u;
for ( i = v7 >> 3; i; --i )
{
*(_QWORD *)a1 = *(_QWORD *)&Val;
a1 = (char *)a1 + 8;
}
}
for ( ; Size; --Size )
{
*(_BYTE *)a1 = Val;
a1 = (char *)a1 + 1;
}
return result;
}
| openssl |
N98E_bn_mul_add_words | unsigned __int64 __fastcall N98E_bn_mul_add_words(unsigned __int64 *a1, _QWORD *a2, int a3, unsigned __int64 a4)
{
unsigned __int64 v4; // r10
int v5; // edi
unsigned __int64 v9; // rsi
__int64 v10; // rbp
__int64 v11; // rax
__int64 v12; // rdx
__int64 v13; // r8
__int64 v14; // rcx
unsigned __int64 v15; // rax
unsigned __int64 v16; // rdx
unsigned __int64 v17; // rax
unsigned __int64 v18; // rdx
unsigned __int64 v19; // r8
unsigned __int64 v20; // rcx
unsigned __int64 v21; // rdx
__int64 v22; // rax
__int64 v23; // r8
__int64 v24; // r9
__int64 v25; // rdx
unsigned __int64 v26; // rax
unsigned __int64 v27; // r8
unsigned __int64 v28; // rax
unsigned __int64 v29; // r8
unsigned __int64 v30; // r9
unsigned __int64 v31; // rdx
unsigned __int64 v32; // rax
unsigned __int64 v33; // r8
__int64 v34; // rax
__int64 v35; // r8
__int64 v36; // r9
__int64 v37; // rcx
unsigned __int64 v38; // rax
unsigned __int64 v39; // r8
unsigned __int64 v40; // rax
unsigned __int64 v41; // r8
unsigned __int64 v42; // r9
unsigned __int64 v43; // rcx
unsigned __int64 v44; // rax
unsigned __int64 v45; // r8
__int64 v46; // rax
__int64 v47; // rdx
__int64 v48; // r8
__int64 v49; // r10
unsigned __int64 v50; // rax
unsigned __int64 v51; // rdx
unsigned __int64 v52; // rax
unsigned __int64 v53; // rdx
unsigned __int64 v54; // r8
unsigned __int64 v55; // rax
unsigned __int64 v56; // rdx
__int64 v57; // rax
__int64 v58; // rdx
__int64 v59; // r8
__int64 v60; // rcx
unsigned __int64 v61; // rax
unsigned __int64 v62; // rdx
unsigned __int64 v63; // rax
unsigned __int64 v64; // rdx
unsigned __int64 v65; // r8
unsigned __int64 v66; // rcx
unsigned __int64 v67; // rdx
v4 = 0i64;
v5 = a3;
if ( a3 <= 0 )
return 0i64;
v9 = HIDWORD(a4);
v10 = (unsigned int)a4;
if ( (a3 & 0xFFFFFFFC) != 0 )
{
do
{
v11 = HIDWORD(*a2);
v12 = (unsigned int)*a2;
v13 = v10 * v12;
v14 = v9 * v11;
v15 = v10 * v11;
v16 = v15 + v9 * v12;
if ( v16 < v15 )
v14 += 0x100000000i64;
v17 = v16;
v18 = v16 << 32;
v19 = v18 + v13;
v20 = HIDWORD(v17) + v14;
if ( v19 < v18 )
++v20;
if ( v19 + v4 < v4 )
++v20;
v21 = *a1 + v19 + v4;
if ( v21 < *a1 )
++v20;
*a1 = v21;
v22 = HIDWORD(a2[1]);
v23 = (unsigned int)a2[1];
v24 = v10 * v23;
v25 = v9 * v22;
v26 = v10 * v22;
v27 = v26 + v9 * v23;
if ( v27 < v26 )
v25 += 0x100000000i64;
v28 = v27;
v29 = v27 << 32;
v30 = v29 + v24;
v31 = HIDWORD(v28) + v25;
if ( v30 < v29 )
++v31;
if ( v30 + v20 < v20 )
++v31;
v32 = a1[1];
v33 = v32 + v30 + v20;
if ( v33 < v32 )
++v31;
a1[1] = v33;
v34 = HIDWORD(a2[2]);
v35 = (unsigned int)a2[2];
v36 = v10 * v35;
v37 = v9 * v34;
v38 = v10 * v34;
v39 = v38 + v9 * v35;
if ( v39 < v38 )
v37 += 0x100000000i64;
v40 = v39;
v41 = v39 << 32;
v42 = v41 + v36;
v43 = HIDWORD(v40) + v37;
if ( v42 < v41 )
++v43;
if ( v42 + v31 < v31 )
++v43;
v44 = a1[2];
v45 = v44 + v42 + v31;
if ( v45 < v44 )
++v43;
a1[2] = v45;
v46 = HIDWORD(a2[3]);
v47 = (unsigned int)a2[3];
v48 = v10 * v47;
v49 = v9 * v46;
v50 = v10 * v46;
v51 = v50 + v9 * v47;
if ( v51 < v50 )
v49 += 0x100000000i64;
v52 = v51;
v53 = v51 << 32;
v54 = v53 + v48;
v4 = HIDWORD(v52) + v49;
if ( v54 < v53 )
++v4;
if ( v54 + v43 < v43 )
++v4;
v55 = a1[3];
v56 = v55 + v54 + v43;
if ( v56 < v55 )
++v4;
v5 -= 4;
a1[3] = v56;
a2 += 4;
a1 += 4;
}
while ( (v5 & 0xFFFFFFFC) != 0 );
}
for ( ; v5; v4 = v66 )
{
v57 = HIDWORD(*a2);
v58 = (unsigned int)*a2;
v59 = v10 * v58;
v60 = v9 * v57;
v61 = v10 * v57;
v62 = v61 + v9 * v58;
if ( v62 < v61 )
v60 += 0x100000000i64;
v63 = v62;
v64 = v62 << 32;
v65 = v64 + v59;
v66 = HIDWORD(v63) + v60;
if ( v65 < v64 )
++v66;
if ( v65 + v4 < v4 )
++v66;
v67 = *a1 + v65 + v4;
if ( v67 < *a1 )
++v66;
*a1++ = v67;
++a2;
--v5;
}
return v4;
}
| openssl |
N98E_bn_mul_words | unsigned __int64 __fastcall N98E_bn_mul_words(_QWORD *a1, _QWORD *a2, int a3, unsigned __int64 a4)
{
unsigned __int64 v4; // r10
int v5; // edi
unsigned __int64 v9; // rsi
__int64 v10; // rbp
__int64 v11; // rax
__int64 v12; // rdx
__int64 v13; // r8
__int64 v14; // rcx
unsigned __int64 v15; // rax
unsigned __int64 v16; // rdx
unsigned __int64 v17; // rax
unsigned __int64 v18; // rdx
unsigned __int64 v19; // r8
unsigned __int64 v20; // rcx
__int64 v21; // rax
__int64 v22; // r8
__int64 v23; // r9
__int64 v24; // rdx
unsigned __int64 v25; // rax
unsigned __int64 v26; // r8
unsigned __int64 v27; // rax
unsigned __int64 v28; // r8
unsigned __int64 v29; // r9
unsigned __int64 v30; // rdx
__int64 v31; // rax
__int64 v32; // r8
__int64 v33; // r9
__int64 v34; // rcx
unsigned __int64 v35; // rax
unsigned __int64 v36; // r8
unsigned __int64 v37; // rax
unsigned __int64 v38; // r8
unsigned __int64 v39; // r9
unsigned __int64 v40; // rcx
__int64 v41; // rax
__int64 v42; // rdx
__int64 v43; // r8
__int64 v44; // r10
unsigned __int64 v45; // rax
unsigned __int64 v46; // rdx
unsigned __int64 v47; // rax
unsigned __int64 v48; // rdx
unsigned __int64 v49; // r8
__int64 v50; // rax
__int64 v51; // rdx
__int64 v52; // r8
__int64 v53; // rcx
unsigned __int64 v54; // rax
unsigned __int64 v55; // rdx
unsigned __int64 v56; // rax
unsigned __int64 v57; // rdx
unsigned __int64 v58; // r8
unsigned __int64 v59; // rcx
v4 = 0i64;
v5 = a3;
if ( a3 <= 0 )
return 0i64;
v9 = HIDWORD(a4);
v10 = (unsigned int)a4;
if ( (a3 & 0xFFFFFFFC) != 0 )
{
do
{
v11 = HIDWORD(*a2);
v12 = (unsigned int)*a2;
v13 = v10 * v12;
v14 = v9 * v11;
v15 = v10 * v11;
v16 = v15 + v9 * v12;
if ( v16 < v15 )
v14 += 0x100000000i64;
v17 = v16;
v18 = v16 << 32;
v19 = v18 + v13;
v20 = HIDWORD(v17) + v14;
if ( v19 < v18 )
++v20;
if ( v19 + v4 < v4 )
++v20;
*a1 = v19 + v4;
v21 = HIDWORD(a2[1]);
v22 = (unsigned int)a2[1];
v23 = v10 * v22;
v24 = v9 * v21;
v25 = v10 * v21;
v26 = v25 + v9 * v22;
if ( v26 < v25 )
v24 += 0x100000000i64;
v27 = v26;
v28 = v26 << 32;
v29 = v28 + v23;
v30 = HIDWORD(v27) + v24;
if ( v29 < v28 )
++v30;
if ( v29 + v20 < v20 )
++v30;
a1[1] = v29 + v20;
v31 = HIDWORD(a2[2]);
v32 = (unsigned int)a2[2];
v33 = v10 * v32;
v34 = v9 * v31;
v35 = v10 * v31;
v36 = v35 + v9 * v32;
if ( v36 < v35 )
v34 += 0x100000000i64;
v37 = v36;
v38 = v36 << 32;
v39 = v38 + v33;
v40 = HIDWORD(v37) + v34;
if ( v39 < v38 )
++v40;
if ( v39 + v30 < v30 )
++v40;
a1[2] = v39 + v30;
v41 = HIDWORD(a2[3]);
v42 = (unsigned int)a2[3];
v43 = v10 * v42;
v44 = v9 * v41;
v45 = v10 * v41;
v46 = v45 + v9 * v42;
if ( v46 < v45 )
v44 += 0x100000000i64;
v47 = v46;
v48 = v46 << 32;
v49 = v48 + v43;
v4 = HIDWORD(v47) + v44;
if ( v49 < v48 )
++v4;
if ( v49 + v40 < v40 )
++v4;
v5 -= 4;
a1[3] = v49 + v40;
a2 += 4;
a1 += 4;
}
while ( (v5 & 0xFFFFFFFC) != 0 );
}
for ( ; v5; v4 = v59 )
{
v50 = HIDWORD(*a2);
v51 = (unsigned int)*a2;
v52 = v10 * v51;
v53 = v9 * v50;
v54 = v10 * v50;
v55 = v54 + v9 * v51;
if ( v55 < v54 )
v53 += 0x100000000i64;
v56 = v55;
v57 = v55 << 32;
v58 = v57 + v52;
v59 = HIDWORD(v56) + v53;
if ( v58 < v57 )
++v59;
if ( v58 + v4 < v4 )
++v59;
*a1++ = v58 + v4;
++a2;
--v5;
}
return v4;
}
| openssl |
name_cmp | int __fastcall name_cmp(const char *a1, const char *a2)
{
unsigned int v2; // eax
const char *i; // r8
size_t v5; // rbx
int result; // eax
char v7; // al
v2 = 0;
for ( i = a2; *i; ++v2 )
{
if ( v2 >= 0x80000000 )
break;
++i;
}
v5 = v2 & 0x7FFFFFFF;
result = strncmp(a1, a2, v5);
if ( !result )
{
v7 = a1[v5];
return v7 && v7 != 46;
}
return result;
}
| openssl |
NETSCAPE_SPKI_get_pubkey_0 | evp_pkey_st *__fastcall NETSCAPE_SPKI_get_pubkey_0(Netscape_spki_st *x)
{
_QWORD *v1; // rcx
if ( x && (v1 = *(_QWORD **)x) != 0i64 )
return (evp_pkey_st *)X509_PUBKEY_get(*v1);
else
return 0i64;
}
| openssl |
NETSCAPE_SPKI_set_pubkey_0 | __int64 __fastcall NETSCAPE_SPKI_set_pubkey_0(Netscape_spki_st *x, evp_pkey_st *pkey)
{
__int64 v2; // rcx
if ( x && (v2 = *(_QWORD *)x) != 0 )
return sub_1400E2570(v2, pkey);
else
return 0i64;
}
| openssl |
nullf_callback_ctrl_0 | __int64 __fastcall nullf_callback_ctrl_0(bio_st *b, int cmd, int (__fastcall *fp)(bio_st *, int, int))
{
_QWORD *v3; // rcx
v3 = (_QWORD *)*((_QWORD *)b + 8);
if ( v3 )
return sub_140099D50(v3, cmd, (__int64)fp);
else
return 0i64;
}
| openssl |
nullf_callback_ctrl_0_0 | __int64 __fastcall nullf_callback_ctrl_0_0(bio_st *b, __int64 cmd, int (__fastcall *fp)(bio_st *, int, int))
{
__int64 v3; // rcx
v3 = *((_QWORD *)b + 8);
if ( v3 )
return sub_1400998F0(v3, cmd, (int)fp);
else
return 0i64;
}
| openssl |
nullf_callback_ctrl_0_1 | __int64 __fastcall nullf_callback_ctrl_0_1(bio_st *b, __int64 cmd, int (__fastcall *fp)(bio_st *, int, int))
{
__int64 v3; // rcx
v3 = *((_QWORD *)b + 8);
if ( v3 )
return sub_140099700(v3, cmd);
else
return 0i64;
}
| openssl |
nullsub_1 | void nullsub_1()
{
;
}
| openssl |
nullsub_2 | void nullsub_2()
{
;
}
| openssl |
null_cipher | __int64 __fastcall null_cipher(evp_cipher_ctx_st *ctx, unsigned __int8 *out, unsigned __int8 *in, size_t inl)
{
if ( in != out )
memmove(out, in, inl);
return 1i64;
}
| openssl |
OBJ_bsearch_ssl_cipher_id | int __fastcall OBJ_bsearch_ssl_cipher_id(ssl_cipher_st *key, const ssl_cipher_st *base, engine_st *num)
{
return EVP_DecryptInit_ex_0(key, base, num, (const unsigned __int8 *)0x50, (const unsigned __int8 *)sub_14004F9A0);
}
| openssl |
obj_cleanup_int | __int64 obj_cleanup_int()
{
__int64 result; // rax
if ( qword_140282390 )
{
sub_1400E87A0(qword_140282390, 0i64);
sub_1400E82E0(qword_140282390, sub_14009D890);
sub_1400E82E0(qword_140282390, sub_14009D8B0);
sub_1400E82E0(qword_140282390, sub_14009D8C0);
result = sub_1400E8230(qword_140282390);
qword_140282390 = 0i64;
}
return result;
}
| openssl |
obj_name_cmp | int __fastcall obj_name_cmp(const obj_name_st *a, const obj_name_st *b)
{
int result; // eax
__int64 v5; // rax
result = *(_DWORD *)a - *(_DWORD *)b;
if ( *(_DWORD *)a == *(_DWORD *)b )
{
if ( qword_140284DB0 && (int)sub_140091680((unsigned int *)qword_140284DB0) > *(_DWORD *)a )
{
v5 = sub_140091690(qword_140284DB0, *(_DWORD *)a);
return (*(__int64 (__fastcall **)(_QWORD, _QWORD))(v5 + 8))(*((_QWORD *)a + 1), *((_QWORD *)b + 1));
}
else
{
return stricmp(*((const char **)a + 1), *((const char **)b + 1));
}
}
return result;
}
| openssl |
OBJ_sigid_free_0 | void OBJ_sigid_free_0()
{
sub_140091A50((void *)qword_140285448, (void (__fastcall *)(_QWORD))sid_free);
qword_140285448 = 0i64;
sub_140091630((void **)qword_140285440);
qword_140285440 = 0i64;
}
| openssl |
OCSP_basic_add1_cert_0 | __int64 __fastcall OCSP_basic_add1_cert_0(__int64 a1, __int64 a2)
{
_QWORD *v4; // rax
if ( !*(_QWORD *)(a1 + 72) )
{
v4 = sub_140091AF0();
*(_QWORD *)(a1 + 72) = v4;
if ( !v4 )
return 0i64;
}
if ( !(unsigned int)OPENSSL_sk_push_0(*(unsigned int **)(a1 + 72), a2) )
return 0i64;
sub_1400AD790(a2);
return 1i64;
}
| openssl |
OCSP_cert_status_str_0 | const char *__fastcall OCSP_cert_status_str_0(int s)
{
_QWORD *v1; // rax
unsigned __int64 v2; // rdx
v1 = &unk_140214B40;
v2 = 0i64;
while ( *(_DWORD *)v1 != s )
{
++v2;
v1 += 2;
if ( v2 >= 3 )
return "(UNKNOWN)";
}
return (const char *)v1[1];
}
| openssl |
OCSP_cert_to_id | _QWORD *__fastcall OCSP_cert_to_id(unsigned int *a1, __int64 a2, __int64 a3)
{
unsigned int *v5; // rdi
int v6; // ebp
__int64 v7; // rbx
int *v8; // rax
v5 = a1;
if ( !a1 )
v5 = (unsigned int *)sub_1400C5F40();
if ( a2 )
{
v6 = sub_1400C8630(a2);
v7 = sub_1400A9230(a2);
}
else
{
v7 = 0i64;
v6 = sub_1400DCCA0(a3);
}
v8 = (int *)sub_1400E2D10(a3);
return sub_1400DF7E0(v5, v6, v8, v7);
}
| openssl |
OCSP_crl_reason_str_0 | const char *__fastcall OCSP_crl_reason_str_0(int s)
{
_QWORD *v1; // rax
unsigned __int64 v2; // rdx
v1 = &unk_140214B70;
v2 = 0i64;
while ( *(_DWORD *)v1 != s )
{
++v2;
v1 += 2;
if ( v2 >= 8 )
return "(UNKNOWN)";
}
return (const char *)v1[1];
}
| openssl |
ocsp_helper | __int64 __fastcall ocsp_helper(const x509_purpose_st *xp, const x509_st *x, int ca)
{
if ( ca )
return sub_146024C80((__int64)x);
else
return 1i64;
}
| openssl |
OCSP_id_get0_info_0 | __int64 __fastcall OCSP_id_get0_info_0(
asn1_string_st **piNameHash,
asn1_object_st **pmd,
asn1_string_st **pikeyHash,
asn1_string_st **pserial,
ocsp_cert_id_st *cid)
{
if ( !cid )
return 0i64;
if ( pmd )
*pmd = *(asn1_object_st **)cid;
if ( piNameHash )
*piNameHash = (ocsp_cert_id_st *)((char *)cid + 16);
if ( pikeyHash )
*pikeyHash = (ocsp_cert_id_st *)((char *)cid + 40);
if ( pserial )
*pserial = (ocsp_cert_id_st *)((char *)cid + 64);
return 1i64;
}
| openssl |
OCSP_request_add1_cert_0 | __int64 __fastcall OCSP_request_add1_cert_0(__int64 a1, __int64 a2)
{
__int64 v4; // rbx
_QWORD *v6; // rax
if ( !*(_QWORD *)(a1 + 32) )
*(_QWORD *)(a1 + 32) = sub_1400DFD80();
v4 = *(_QWORD *)(a1 + 32);
if ( !v4 )
return 0i64;
if ( a2 )
{
if ( !*(_QWORD *)(v4 + 24) )
{
v6 = sub_140091AF0();
*(_QWORD *)(v4 + 24) = v6;
if ( !v6 )
return 0i64;
}
if ( !(unsigned int)OPENSSL_sk_push_0(*(unsigned int **)(v4 + 24), a2) )
return 0i64;
sub_1400AD790(a2);
}
return 1i64;
}
| openssl |
OCSP_response_status_str_0 | const char *__fastcall OCSP_response_status_str_0(int s)
{
_QWORD *v1; // rax
unsigned __int64 v2; // rdx
v1 = &unk_140214AE0;
v2 = 0i64;
while ( *(_DWORD *)v1 != s )
{
++v2;
v1 += 2;
if ( v2 >= 6 )
return "(UNKNOWN)";
}
return (const char *)v1[1];
}
| openssl |
OCSP_resp_count_0 | __int64 __fastcall OCSP_resp_count_0(__int64 a1)
{
if ( a1 )
return sub_140091680(*(unsigned int **)(a1 + 32));
else
return 0xFFFFFFFFi64;
}
| openssl |
ok_callback_ctrl_0 | _QWORD *__fastcall ok_callback_ctrl_0(bio_st *b, int cmd, int (__fastcall *fp)(bio_st *, int, int))
{
_QWORD *result; // rax
result = (_QWORD *)sub_140099FD0((__int64)b);
if ( result )
return (_QWORD *)sub_140099D50(result, cmd, (__int64)fp);
return result;
}
| openssl |
OPENSSL_cipher_name_0 | const char *__fastcall OPENSSL_cipher_name_0(const char *stdname)
{
__int64 v1; // rax
if ( stdname && (v1 = sub_140066EE0(stdname)) != 0 )
return *(const char **)(v1 + 8);
else
return "(NONE)";
}
| openssl |
OPENSSL_cleanse_0 | __int64 __fastcall OPENSSL_cleanse_0(__int64 a1, __int64 a2)
{
return off_14027D1C8(a1, 0i64, a2);
}
| openssl |
OPENSSL_die | void __fastcall __noreturn OPENSSL_die(const char *message, const char *file, __int64 line)
{
sub_1400E36E0("%s:%d: OpenSSL internal error: %s\n", file, line, message);
raise(22);
exit(3);
}
| openssl |
OPENSSL_gmtime | tm *__fastcall OPENSSL_gmtime(const __int64 *timer, tm *result)
{
tm *v2; // rbx
v2 = result;
if ( gmtime64_s(result, timer) )
return 0i64;
return v2;
}
| openssl |
OPENSSL_hexchar2int_0 | __int64 __fastcall OPENSSL_hexchar2int_0(char a1)
{
__int64 result; // rax
switch ( a1 )
{
case '0':
result = 0i64;
break;
case '1':
result = 1i64;
break;
case '2':
result = 2i64;
break;
case '3':
result = 3i64;
break;
case '4':
result = 4i64;
break;
case '5':
result = 5i64;
break;
case '6':
result = 6i64;
break;
case '7':
result = 7i64;
break;
case '8':
result = 8i64;
break;
case '9':
result = 9i64;
break;
case 'A':
case 'a':
result = 10i64;
break;
case 'B':
case 'b':
result = 11i64;
break;
case 'C':
case 'c':
result = 12i64;
break;
case 'D':
case 'd':
result = 13i64;
break;
case 'E':
case 'e':
result = 14i64;
break;
case 'F':
case 'f':
result = 15i64;
break;
default:
result = 0xFFFFFFFFi64;
break;
}
return result;
}
| openssl |
OPENSSL_sk_delete_0 | __int64 __fastcall OPENSSL_sk_delete_0(__int64 a1, int a2)
{
if ( a1 && a2 >= 0 && a2 < *(_DWORD *)a1 )
return sub_140091370(a1, a2);
else
return 0i64;
}
| openssl |
OPENSSL_sk_pop_0 | __int64 __fastcall OPENSSL_sk_pop_0(_DWORD *a1)
{
if ( a1 && *a1 )
return sub_140091370((__int64)a1, *a1 - 1);
else
return 0i64;
}
| openssl |
OPENSSL_sk_push_0 | __int64 __fastcall OPENSSL_sk_push_0(unsigned int *a1, __int64 a2)
{
if ( a1 )
return sub_140091290((int *)a1, a2, *a1);
else
return 0xFFFFFFFFi64;
}
| openssl |
OPENSSL_sk_reserve_0 | __int64 __fastcall OPENSSL_sk_reserve_0(stack_st *st, int n)
{
if ( !st )
return 0i64;
if ( n >= 0 )
return sub_140091130((int *)st, n, 1);
return 1i64;
}
| openssl |
openssl_strerror_r | _BOOL8 __fastcall openssl_strerror_r(int errnum, char *buf, size_t buflen)
{
return strerror_s(buf, buflen, errnum) == 0;
}
| openssl |
ossl_init_async_ossl_ | void __fastcall ossl_init_async_ossl_()
{
if ( (unsigned int)sub_140105670() )
{
dword_1402853F4 = 1;
dword_1402853F8 = 1;
}
else
{
dword_1402853F8 = 0;
}
}
| openssl |
ossl_init_load_crypto_strings_0 | __int64 __fastcall ossl_init_load_crypto_strings_0()
{
__int64 result; // rax
result = sub_140167BE0();
dword_1402853D0 = 1;
return result;
}
| openssl |
ossl_init_load_crypto_strings_0_0 | __int64 __fastcall ossl_init_load_crypto_strings_0_0()
{
__int64 result; // rax
result = sub_140168760();
dword_1402853D8 = 1;
return result;
}
| openssl |
ossl_init_load_crypto_strings_0_1 | __int64 __fastcall ossl_init_load_crypto_strings_0_1()
{
__int64 result; // rax
result = sub_1401690B0();
dword_140285400 = 1;
return result;
}
| openssl |
ossl_init_load_crypto_strings_0_2 | __int64 __fastcall ossl_init_load_crypto_strings_0_2(__int64 a1)
{
__int64 result; // rax
result = nullsub_1(a1);
dword_140285408 = 1;
return result;
}
| openssl |
ossl_init_load_crypto_strings_0_3 | __int64 __fastcall ossl_init_load_crypto_strings_0_3()
{
__int64 result; // rax
result = sub_140169B10();
dword_140285410 = 1;
return result;
}
| openssl |
ossl_init_load_crypto_strings_0_4 | __int64 __fastcall ossl_init_load_crypto_strings_0_4(__int64 a1)
{
__int64 result; // rax
result = nullsub_1(a1);
dword_140285418 = 1;
return result;
}
| openssl |
ossl_init_load_crypto_strings_0_5 | __int64 __fastcall ossl_init_load_crypto_strings_0_5()
{
__int64 result; // rax
result = sub_14016D340();
dword_140285420 = 1;
return result;
}
| openssl |
ossl_init_no_config_ossl__0 | void __fastcall ossl_init_no_config_ossl__0()
{
ERR_load_SSL_strings_0();
dword_140282364 = 1;
dword_140282368 = 1;
}
| openssl |
ossl_init_no_config_ossl__0_0 | void __fastcall ossl_init_no_config_ossl__0_0()
{
sub_140168990();
dword_1402853E0 = 1;
dword_1402853E4 = 1;
}
| openssl |
ossl_init_register_atexit_ossl_ | void __fastcall ossl_init_register_atexit_ossl_()
{
dword_1402853B4 = onexit((_onexit_t)Func) != 0i64;
}
| openssl |
ossl_safe_getenv | char *__fastcall ossl_safe_getenv(const char *name)
{
if ( (unsigned int)sub_14011D030() )
return 0i64;
else
return getenv(name);
}
| openssl |
ossl_statem_app_data_allowed | __int64 __fastcall ossl_statem_app_data_allowed(__int64 a1)
{
__int64 v1; // rax
int v2; // eax
if ( *(_DWORD *)(a1 + 72) )
{
v1 = *(_QWORD *)(a1 + 168);
if ( *(_DWORD *)(v1 + 272) )
{
if ( *(_DWORD *)(v1 + 264) )
{
if ( *(_DWORD *)(a1 + 56) )
{
v2 = *(_DWORD *)(a1 + 92);
if ( !v2 || v2 == 20 )
return 1i64;
}
else if ( *(_DWORD *)(a1 + 92) == 12 )
{
return 1i64;
}
}
}
}
return 0i64;
}
| openssl |
ossl_statem_client_pre_work | __int64 __fastcall ossl_statem_client_pre_work(__int64 a1, __int64 a2)
{
int v2; // eax
__int64 result; // rax
__int64 v4; // rax
switch ( *(_DWORD *)(a1 + 92) )
{
case 1:
return sub_14006AC90(a1, a2, 1, 1);
case 0xC:
v4 = *(_QWORD *)(a1 + 8);
*(_DWORD *)(a1 + 68) = 0;
if ( (*(_BYTE *)(*(_QWORD *)(v4 + 192) + 96i64) & 8) == 0 )
return 2i64;
result = sub_140087F50(a1);
if ( (_DWORD)result )
return 2i64;
break;
case 0x10:
if ( (*(_BYTE *)(*(_QWORD *)(*(_QWORD *)(a1 + 8) + 192i64) + 96i64) & 8) == 0 || !*(_DWORD *)(a1 + 200) )
return 2i64;
*(_DWORD *)(a1 + 120) = 0;
return 2i64;
default:
if ( *(_DWORD *)(a1 + 92) != 46 )
{
if ( *(_DWORD *)(a1 + 92) != 47 )
return 2i64;
v2 = *(_DWORD *)(a1 + 132);
if ( v2 == 7 || !v2 )
return 2i64;
}
return sub_14006AC90(a1, a2, 0, 1);
}
return result;
}
| openssl |
ossl_statem_export_allowed | _BOOL8 __fastcall ossl_statem_export_allowed(ssl_st *s)
{
return *(_QWORD *)(*((_QWORD *)s + 21) + 976i64) && *((_DWORD *)s + 23) != 36;
}
| openssl |
ossl_statem_skip_early_data | _BOOL8 __fastcall ossl_statem_skip_early_data(ssl_st *s)
{
return *((_DWORD *)s + 452) == 1 && *((_DWORD *)s + 14) && *((_DWORD *)s + 23) == 46 && *((_DWORD *)s + 310) != 2;
}
| openssl |
ossl_store_destroy_loaders_int | __int64 ossl_store_destroy_loaders_int()
{
__int64 result; // rax
sub_1400E8230(qword_140284DE8);
qword_140284DE8 = 0i64;
result = sub_14011CD70(qword_140284DD8);
qword_140284DD8 = 0i64;
return result;
}
| openssl |
OSSL_STORE_do_all_loaders_0 | __int64 __fastcall OSSL_STORE_do_all_loaders_0(
void (__fastcall *do_function)(const ossl_store_loader_st *, void *),
void *do_arg)
{
sub_1400E8350(qword_140284DE8, do_function, do_arg);
return 1i64;
}
| openssl |
ossl_store_file_loader_init | __int64 __fastcall ossl_store_file_loader_init()
{
unsigned int v0; // ebx
v0 = sub_1400DBF60(&off_14027E720);
sub_14011F480((const WCHAR *)sub_140165DE0);
return v0;
}
| openssl |
OTHERNAME_cmp_0 | __int64 __fastcall OTHERNAME_cmp_0(__int64 a1, __int64 a2)
{
__int64 result; // rax
if ( !a1 || !a2 )
return 0xFFFFFFFFi64;
result = sub_14012C910(*(_QWORD *)a1, *(_QWORD *)a2);
if ( !(_DWORD)result )
return ASN1_TYPE_cmp_0(*(_DWORD **)(a1 + 8), *(_DWORD **)(a2 + 8));
return result;
}
| openssl |
out_utf8 | __int64 __fastcall out_utf8(unsigned int value, _DWORD *arg)
{
*arg += UTF8_putc(0i64, -1, value);
return 1i64;
}
| openssl |
o_names_init_ossl_ | void __fastcall o_names_init_ossl_()
{
int v0; // eax
sub_14011D030((unsigned int)(v0 - 37));
qword_140284DC0 = sub_1400E87B0(sub_1400DAFD0, obj_name_cmp);
qword_140284DC8 = sub_14011CCD0();
sub_14011D030(2i64);
if ( !qword_140284DC0 || (dword_140284DD0 = 1, !qword_140284DC8) )
dword_140284DD0 = 0;
}
| openssl |
parse_cmdline | char __fastcall parse_cmdline(char *a1, char **a2, char *a3, _DWORD *a4, _DWORD *a5)
{
char *v6; // rbx
char **v7; // r13
char *v8; // rdi
BOOL v9; // r12d
unsigned int v10; // esi
int v11; // eax
BOOL v12; // esi
int v13; // edx
unsigned int v14; // ecx
int v15; // eax
char v16; // al
v6 = a3;
*a5 = 0;
v7 = a2;
v8 = a1;
*a4 = 1;
if ( a2 )
{
*a2 = a3;
v7 = a2 + 1;
}
if ( a3 )
{
v6 = a3 + 1;
*a3 = *a1;
}
++*a5;
v9 = 0;
do
{
if ( *v8 == 34 )
{
LOBYTE(v10) = 34;
LOBYTE(v11) = !v9;
++v8;
v9 = !v9;
}
else
{
++*a5;
if ( v6 )
*v6++ = *v8;
v10 = (unsigned __int8)*v8++;
v11 = ismbblead(v10);
if ( v11 )
{
++*a5;
if ( v6 )
{
LOBYTE(v11) = *v8;
*v6++ = *v8;
}
++v8;
}
if ( !(_BYTE)v10 )
{
--v8;
goto LABEL_21;
}
}
}
while ( v9 || (_BYTE)v10 != 32 && (_BYTE)v10 != 9 );
if ( v6 )
*(v6 - 1) = 0;
LABEL_21:
v12 = 0;
while ( *v8 )
{
while ( *v8 == 32 || *v8 == 9 )
++v8;
if ( !*v8 )
break;
if ( v7 )
*v7++ = v6;
++*a4;
if ( v6 )
*v6++ = *v8;
++*a5;
while ( 1 )
{
v13 = 1;
v14 = 0;
while ( *v8 == 92 )
{
++v8;
++v14;
}
if ( *v8 == 34 )
{
if ( (v14 & 1) == 0 )
{
if ( v12 && v8[1] == 34 )
{
++v8;
}
else
{
v13 = 0;
v12 = !v12;
}
}
v14 >>= 1;
}
while ( v14 )
{
--v14;
if ( v6 )
*v6++ = 92;
++*a5;
}
LOBYTE(v11) = *v8;
if ( !*v8 || !v12 && ((_BYTE)v11 == 32 || (_BYTE)v11 == 9) )
break;
if ( v13 )
{
v15 = ismbblead((char)v11);
if ( v6 )
{
if ( v15 )
{
v16 = *v8++;
*v6++ = v16;
++*a5;
}
*v6++ = *v8;
}
else if ( v15 )
{
++v8;
++*a5;
}
++*a5;
}
++v8;
}
if ( v6 )
*v6++ = 0;
++*a5;
}
if ( v7 )
*v7 = 0i64;
++*a4;
return v11;
}
| openssl |
PEM_bytes_read_bio_0 | __int64 __fastcall PEM_bytes_read_bio_0(
unsigned __int8 **pdata,
int *plen,
char **pnm,
const char *name,
bio_st *bp,
int (__fastcall *cb)(char *, int, int, void *),
const char *u)
{
return sub_14009D3A0(
pdata,
plen,
pnm,
name,
(__int64)bp,
(__int64 (__fastcall *)(char *, __int64, _QWORD, const char *))cb,
u,
2);
}
| openssl |
PEM_bytes_read_bio_secmem_0 | __int64 __fastcall PEM_bytes_read_bio_secmem_0(
unsigned __int8 **pdata,
int *plen,
char **pnm,
const char *name,
bio_st *bp,
int (__fastcall *cb)(char *, int, int, void *),
const char *u)
{
return sub_14009D3A0(
pdata,
plen,
pnm,
name,
(__int64)bp,
(__int64 (__fastcall *)(char *, __int64, _QWORD, const char *))cb,
u,
3);
}
| openssl |
pem_malloc | void *__fastcall pem_malloc(int num, char flags)
{
if ( (flags & 1) != 0 )
return (void *)sub_14011CF80(num, "crypto\\pem\\pem_lib.c", 228i64);
else
return CRYPTO_malloc(num, "crypto\\pem\\pem_lib.c", 229i64);
}
| openssl |
PEM_read_bio | __int64 __fastcall PEM_read_bio(bio_st *bp, char **name, char **header, unsigned __int8 **data, int *len)
{
return sub_14009C5F0((__int64)bp, name, (__int64 *)header, (__int64 *)data, len, 2);
}
| openssl |
PEM_read_bio_RSAPrivateKey_1 | rsa_st *__fastcall PEM_read_bio_RSAPrivateKey_1(
bio_st *bp,
rsa_st **rsa,
int (__fastcall *cb)(char *, int, int, void *),
void *u)
{
evp_pkey_st *v5; // rax
v5 = (evp_pkey_st *)sub_1400CA3E0(bp, 0i64, cb, u);
return pkey_get_dsa(v5, rsa);
}
| openssl |
PEM_read_SSL_SESSION | __int64 __fastcall PEM_read_SSL_SESSION(int a1, int a2, __int64 a3, __int64 a4)
{
return sub_140124DA0((unsigned int)sub_140062EB0, (unsigned int)"SSL SESSION PARAMETERS", a1, a2, a3, a4);
}
| openssl |
PEM_read_SSL_SESSION_0 | __int64 __fastcall PEM_read_SSL_SESSION_0(int a1, int a2, __int64 a3, __int64 a4)
{
return sub_140124DA0((unsigned int)sub_1400A7EC0, (unsigned int)"CERTIFICATE", a1, a2, a3, a4);
}
| openssl |
PEM_read_SSL_SESSION_1 | __int64 __fastcall PEM_read_SSL_SESSION_1(int a1, int a2, __int64 a3, __int64 a4)
{
return sub_140124DA0((unsigned int)sub_1400B0490, (unsigned int)"CERTIFICATE REQUEST", a1, a2, a3, a4);
}
| openssl |
PEM_read_SSL_SESSION_10 | __int64 __fastcall PEM_read_SSL_SESSION_10(int a1, int a2, __int64 a3, __int64 a4)
{
return sub_140124DA0((unsigned int)d2i_CMS_ContentInfo, (unsigned int)"CMS", a1, a2, a3, a4);
}
| openssl |
PEM_read_SSL_SESSION_11 | __int64 __fastcall PEM_read_SSL_SESSION_11(int a1, int a2, __int64 a3, __int64 a4)
{
return sub_140124DA0((unsigned int)sub_1400ED590, (unsigned int)"ENCRYPTED PRIVATE KEY", a1, a2, a3, a4);
}
| openssl |
PEM_read_SSL_SESSION_12 | __int64 __fastcall PEM_read_SSL_SESSION_12(int a1, int a2, __int64 a3, __int64 a4)
{
return sub_140124DA0((unsigned int)sub_1400ED3C0, (unsigned int)"PRIVATE KEY", a1, a2, a3, a4);
}
| openssl |
PEM_read_SSL_SESSION_13 | __int64 __fastcall PEM_read_SSL_SESSION_13(int a1, int a2, __int64 a3, __int64 a4)
{
return sub_140124DA0((unsigned int)sub_1400A7FA0, (unsigned int)"TRUSTED CERTIFICATE", a1, a2, a3, a4);
}
| openssl |
PEM_read_SSL_SESSION_2 | __int64 __fastcall PEM_read_SSL_SESSION_2(int a1, int a2, __int64 a3, __int64 a4)
{
return sub_140124DA0((unsigned int)sub_1400B24C0, (unsigned int)"X509 CRL", a1, a2, a3, a4);
}
| openssl |
PEM_read_SSL_SESSION_3 | __int64 __fastcall PEM_read_SSL_SESSION_3(int a1, int a2, __int64 a3, __int64 a4)
{
return sub_140124DA0((unsigned int)sub_1400C6A50, (unsigned int)"PKCS7", a1, a2, a3, a4);
}
| openssl |
PEM_read_SSL_SESSION_4 | __int64 __fastcall PEM_read_SSL_SESSION_4(int a1, int a2, __int64 a3, __int64 a4)
{
return sub_140124DA0((unsigned int)sub_1400DF070, (unsigned int)"CERTIFICATE", a1, a2, a3, a4);
}
| openssl |
PEM_read_SSL_SESSION_5 | __int64 __fastcall PEM_read_SSL_SESSION_5(int a1, int a2, __int64 a3, __int64 a4)
{
return sub_140124DA0((unsigned int)sub_14010E020, (unsigned int)"RSA PUBLIC KEY", a1, a2, a3, a4);
}
| openssl |
PEM_read_SSL_SESSION_6 | __int64 __fastcall PEM_read_SSL_SESSION_6(int a1, int a2, __int64 a3, __int64 a4)
{
return sub_140124DA0((unsigned int)sub_1400CB120, (unsigned int)"DSA PARAMETERS", a1, a2, a3, a4);
}
| openssl |
PEM_read_SSL_SESSION_7 | __int64 __fastcall PEM_read_SSL_SESSION_7(int a1, int a2, __int64 a3, __int64 a4)
{
return sub_140124DA0((unsigned int)sub_1400D2600, (unsigned int)"EC PARAMETERS", a1, a2, a3, a4);
}
| openssl |
PEM_read_SSL_SESSION_8 | __int64 __fastcall PEM_read_SSL_SESSION_8(int a1, int a2, __int64 a3, __int64 a4)
{
return sub_140124DA0((unsigned int)sub_1400E2AD0, (unsigned int)"PUBLIC KEY", a1, a2, a3, a4);
}
| openssl |
PEM_read_SSL_SESSION_9 | __int64 __fastcall PEM_read_SSL_SESSION_9(int a1, int a2, __int64 a3, __int64 a4)
{
return sub_140124DA0((unsigned int)sub_1400E2830, (unsigned int)"PUBLIC KEY", a1, a2, a3, a4);
}
| openssl |
PEM_write_bio_CMS_stream | __int64 __fastcall PEM_write_bio_CMS_stream(int a1, int a2, int a3, int a4)
{
__int64 v8; // rax
v8 = sub_140132050();
return sub_14013D6A0(a1, a2, a3, a4, (__int64)"CMS", v8);
}
| openssl |
PEM_write_bio_CMS_stream_0 | __int64 __fastcall PEM_write_bio_CMS_stream_0(int a1, int a2, int a3, int a4)
{
void *v8; // rax
v8 = sub_1400C6A40();
return sub_14013D6A0(a1, a2, a3, a4, (__int64)"PKCS7", (__int64)v8);
}
| openssl |
PEM_write_DSAPrivateKey | __int64 __fastcall PEM_write_DSAPrivateKey(
__int64 a1,
__int64 a2,
const evp_cipher_st *a3,
char *a4,
int a5,
__int64 (__fastcall *a6)(char *, __int64, __int64, const char *),
const char *a7)
{
return sub_14009CC90(
(__int64 (__fastcall *)(__int64, char **))sub_14010E000,
"RSA PRIVATE KEY",
a1,
a2,
a3,
a4,
a5,
a6,
a7);
}
| openssl |
PEM_write_DSAPrivateKey_0 | __int64 __fastcall PEM_write_DSAPrivateKey_0(
__int64 a1,
__int64 a2,
const evp_cipher_st *a3,
char *a4,
int a5,
__int64 (__fastcall *a6)(char *, __int64, __int64, const char *),
const char *a7)
{
return sub_14009CC90(
(__int64 (__fastcall *)(__int64, char **))sub_1400CB100,
"DSA PRIVATE KEY",
a1,
a2,
a3,
a4,
a5,
a6,
a7);
}
| openssl |
PEM_write_DSAPrivateKey_1 | __int64 __fastcall PEM_write_DSAPrivateKey_1(
__int64 a1,
__int64 a2,
const evp_cipher_st *a3,
char *a4,
int a5,
__int64 (__fastcall *a6)(char *, __int64, __int64, const char *),
const char *a7)
{
return sub_14009CC90(
(__int64 (__fastcall *)(__int64, char **))sub_1400D2A60,
"EC PRIVATE KEY",
a1,
a2,
a3,
a4,
a5,
a6,
a7);
}
| openssl |
PEM_write_PKCS8PrivateKey | __int64 __fastcall PEM_write_PKCS8PrivateKey(
__int64 a1,
__int64 a2,
__int64 a3,
char *a4,
int a5,
__int64 (__fastcall *a6)(char *, __int64, __int64, const char *),
const char *a7)
{
return sub_1400ED8A0(a1, a2, 0, -1, a3, a4, a5, a6, a7);
}
| openssl |
PEM_write_SSL_SESSION | __int64 __fastcall PEM_write_SSL_SESSION(int a1, int a2)
{
return sub_14009CC90(
(unsigned int)sub_140062940,
(unsigned int)"SSL SESSION PARAMETERS",
a1,
a2,
0,
0i64,
0,
0i64,
0i64);
}
| openssl |
PEM_write_SSL_SESSION_0 | __int64 __fastcall PEM_write_SSL_SESSION_0(__int64 a1, __int64 a2)
{
return sub_14009CC90(
(__int64 (__fastcall *)(__int64, char **))sub_1400A7EE0,
"CERTIFICATE",
a1,
a2,
0i64,
0i64,
0,
0i64,
0i64);
}
| openssl |
PEM_write_SSL_SESSION_1 | __int64 __fastcall PEM_write_SSL_SESSION_1(__int64 a1, __int64 a2)
{
return sub_14009CC90(
(__int64 (__fastcall *)(__int64, char **))sub_1400B04B0,
"CERTIFICATE REQUEST",
a1,
a2,
0i64,
0i64,
0,
0i64,
0i64);
}
| openssl |
PEM_write_SSL_SESSION_10 | __int64 __fastcall PEM_write_SSL_SESSION_10(__int64 a1, __int64 a2)
{
return sub_14009CC90(
(__int64 (__fastcall *)(__int64, char **))sub_1400D2710,
"EC PARAMETERS",
a1,
a2,
0i64,
0i64,
0,
0i64,
0i64);
}
| openssl |
PEM_write_SSL_SESSION_11 | __int64 __fastcall PEM_write_SSL_SESSION_11(__int64 a1, __int64 a2)
{
return sub_14009CC90(
(__int64 (__fastcall *)(__int64, char **))sub_1400E2BA0,
"PUBLIC KEY",
a1,
a2,
0i64,
0i64,
0,
0i64,
0i64);
}
| openssl |
PEM_write_SSL_SESSION_12 | __int64 __fastcall PEM_write_SSL_SESSION_12(__int64 a1, __int64 a2)
{
return sub_14009CC90(
(__int64 (__fastcall *)(__int64, char **))sub_1400C9B90,
"DH PARAMETERS",
a1,
a2,
0i64,
0i64,
0,
0i64,
0i64);
}
| openssl |
PEM_write_SSL_SESSION_13 | __int64 __fastcall PEM_write_SSL_SESSION_13(__int64 a1, __int64 a2)
{
return sub_14009CC90(
(__int64 (__fastcall *)(__int64, char **))sub_1400C9CE0,
"X9.42 DH PARAMETERS",
a1,
a2,
0i64,
0i64,
0,
0i64,
0i64);
}
| openssl |
PEM_write_SSL_SESSION_14 | __int64 __fastcall PEM_write_SSL_SESSION_14(__int64 a1, __int64 a2)
{
return sub_14009CC90(
(__int64 (__fastcall *)(__int64, char **))sub_1400E28F0,
"PUBLIC KEY",
a1,
a2,
0i64,
0i64,
0,
0i64,
0i64);
}
| openssl |
PEM_write_SSL_SESSION_15 | __int64 __fastcall PEM_write_SSL_SESSION_15(__int64 a1, __int64 a2)
{
return sub_14009CC90(
(__int64 (__fastcall *)(__int64, char **))sub_1400ED5B0,
"ENCRYPTED PRIVATE KEY",
a1,
a2,
0i64,
0i64,
0,
0i64,
0i64);
}
| openssl |
PEM_write_SSL_SESSION_16 | __int64 __fastcall PEM_write_SSL_SESSION_16(__int64 a1, __int64 a2)
{
return sub_14009CC90(
(__int64 (__fastcall *)(__int64, char **))sub_1400ED3E0,
"PRIVATE KEY",
a1,
a2,
0i64,
0i64,
0,
0i64,
0i64);
}
| openssl |
PEM_write_SSL_SESSION_17 | __int64 __fastcall PEM_write_SSL_SESSION_17(__int64 a1, __int64 a2)
{
return sub_14009CC90(
(__int64 (__fastcall *)(__int64, char **))sub_1400A80F0,
"TRUSTED CERTIFICATE",
a1,
a2,
0i64,
0i64,
0,
0i64,
0i64);
}
| openssl |
PEM_write_SSL_SESSION_2 | __int64 __fastcall PEM_write_SSL_SESSION_2(__int64 a1, __int64 a2)
{
return sub_14009CC90(
(__int64 (__fastcall *)(__int64, char **))sub_1400B04B0,
"NEW CERTIFICATE REQUEST",
a1,
a2,
0i64,
0i64,
0,
0i64,
0i64);
}
| openssl |
PEM_write_SSL_SESSION_3 | __int64 __fastcall PEM_write_SSL_SESSION_3(__int64 a1, __int64 a2)
{
return sub_14009CC90(
(__int64 (__fastcall *)(__int64, char **))sub_1400B24E0,
"X509 CRL",
a1,
a2,
0i64,
0i64,
0,
0i64,
0i64);
}
| openssl |