filename
stringlengths
3
146
content
stringlengths
25
24.6k
from
stringclasses
1 value
memcpy_s
errno_t __cdecl memcpy_s( void *const Destination, const rsize_t DestinationSize, const void *const Source, const rsize_t SourceSize) { int *v8; // rax errno_t v9; // ebx if ( !SourceSize ) return 0; if ( !Destination ) goto LABEL_4; if ( Source && DestinationSize >= SourceSize ) { memmove(Destination, Source, SourceSize); return 0; } memset(Destination, 0, DestinationSize); if ( !Source ) { LABEL_4: v8 = errno(); v9 = 22; LABEL_5: *v8 = v9; invalid_parameter(0i64, 0i64, 0i64, 0, 0i64); return v9; } if ( DestinationSize < SourceSize ) { v8 = errno(); v9 = 34; goto LABEL_5; } return 22; }
openssl
memmove
void *__cdecl memmove(void *a1, const void *Src, size_t Size) { void *v3; // r11 bool v4; // cf unsigned __int64 v5; // rdx size_t v6; // r9 size_t v7; // r9 __int64 v9; // rax __int64 v10; // r10 __int64 v11; // r10 int v12; // eax int v13; // eax __int64 v14; // r10 __int64 v15; // r10 __int64 v16; // r9 __int64 v17; // r10 __int64 v18; // r10 int *v19; // rcx size_t v20; // r9 size_t v21; // r9 __int64 v22; // rax __int64 v23; // r10 __int64 v24; // r10 int v25; // eax int v26; // eax __int64 v27; // r10 __int64 v28; // r10 __int64 v29; // r9 __int64 v30; // r10 __int64 v31; // r10 void *retaddr; // [rsp+0h] [rbp+0h] BYREF v3 = a1; v4 = Src < a1; v5 = (_BYTE *)Src - (_BYTE *)a1; if ( v4 ) { v19 = (int *)((char *)a1 + Size); if ( Size >= 8 ) { if ( ((unsigned __int8)v19 & 7) != 0 ) { if ( ((unsigned __int8)v19 & 1) != 0 ) { v19 = (int *)((char *)v19 - 1); --Size; *(_BYTE *)v19 = *((_BYTE *)v19 + v5); } if ( ((unsigned __int8)v19 & 2) != 0 ) { v19 = (int *)((char *)v19 - 2); Size -= 2i64; *(_WORD *)v19 = *(_WORD *)((char *)v19 + v5); } if ( ((unsigned __int8)v19 & 4) != 0 ) { --v19; Size -= 4i64; *v19 = *(int *)((char *)v19 + v5); } } while ( 1 ) { v20 = Size >> 5; if ( !(Size >> 5) ) break; if ( v20 < 0x2000 || v5 > 0xFFFFFFFFFFFFF000ui64 ) { do { v22 = *(_QWORD *)((char *)v19 + v5 - 8); v23 = *(_QWORD *)((char *)v19 + v5 - 16); v19 -= 8; *((_QWORD *)v19 + 3) = v22; *((_QWORD *)v19 + 2) = v23; v24 = *(_QWORD *)((char *)v19 + v5); --v20; *((_QWORD *)v19 + 1) = *(_QWORD *)((char *)v19 + v5 + 8); *(_QWORD *)v19 = v24; } while ( v20 ); Size &= 0x1Fu; break; } do { v25 = 32; do { v19 -= 32; _mm_prefetch((const char *)v19 + v5, 0); _mm_prefetch((const char *)v19 + v5 + 64, 0); --v25; } while ( v25 ); v19 += 1024; v26 = 64; do { v27 = *(_QWORD *)((char *)v19 + v5 - 16); _mm_stream_si32(v19 - 2, *(_QWORD *)((char *)v19 + v5 - 8)); _mm_stream_si32(v19 - 4, v27); v28 = *(_QWORD *)((char *)v19 + v5 - 32); _mm_stream_si32(v19 - 6, *(_QWORD *)((char *)v19 + v5 - 24)); _mm_stream_si32(v19 - 8, v28); v29 = *(_QWORD *)((char *)v19 + v5 - 40); v30 = *(_QWORD *)((char *)v19 + v5 - 48); v19 -= 16; _mm_stream_si32(v19 + 6, v29); _mm_stream_si32(v19 + 4, v30); v31 = *(_QWORD *)((char *)v19 + v5); --v26; _mm_stream_si32(v19 + 2, *(_QWORD *)((char *)v19 + v5 + 8)); _mm_stream_si32(v19, v31); } while ( v26 ); Size -= 4096i64; } while ( Size >= 0x1000 ); _InterlockedOr8((volatile signed __int8 *)&retaddr, 0); } v21 = Size >> 3; if ( Size >> 3 ) { do { v19 -= 2; --v21; *(_QWORD *)v19 = *(_QWORD *)((char *)v19 + v5); } while ( v21 ); Size &= 7u; } } if ( Size ) { do { v19 = (int *)((char *)v19 - 1); --Size; *(_BYTE *)v19 = *((_BYTE *)v19 + v5); } while ( Size ); return v3; } else { return v3; } } else { if ( Size >= 8 ) { if ( ((unsigned __int8)a1 & 7) != 0 ) { if ( ((unsigned __int8)a1 & 1) != 0 ) { --Size; *(_BYTE *)a1 = *((_BYTE *)a1 + v5); a1 = (char *)a1 + 1; } if ( ((unsigned __int8)a1 & 2) != 0 ) { Size -= 2i64; *(_WORD *)a1 = *(_WORD *)((char *)a1 + v5); a1 = (char *)a1 + 2; } if ( ((unsigned __int8)a1 & 4) != 0 ) { Size -= 4i64; *(_DWORD *)a1 = *(_DWORD *)((char *)a1 + v5); a1 = (char *)a1 + 4; } } while ( 1 ) { v6 = Size >> 5; if ( !(Size >> 5) ) break; if ( v6 < 0x2000 || v5 < 0x1000 ) { do { v9 = *(_QWORD *)((char *)a1 + v5); v10 = *(_QWORD *)((char *)a1 + v5 + 8); a1 = (char *)a1 + 32; *((_QWORD *)a1 - 4) = v9; *((_QWORD *)a1 - 3) = v10; v11 = *(_QWORD *)((char *)a1 + v5 - 8); --v6; *((_QWORD *)a1 - 2) = *(_QWORD *)((char *)a1 + v5 - 16); *((_QWORD *)a1 - 1) = v11; } while ( v6 ); Size &= 0x1Fu; break; } do { v12 = 32; do { _mm_prefetch((const char *)a1 + v5, 0); _mm_prefetch((const char *)a1 + v5 + 64, 0); a1 = (char *)a1 + 128; --v12; } while ( v12 ); a1 = (char *)a1 - 4096; v13 = 64; do { v14 = *(_QWORD *)((char *)a1 + v5 + 8); _mm_stream_si32((int *)a1, *(_QWORD *)((char *)a1 + v5)); _mm_stream_si32((int *)a1 + 2, v14); v15 = *(_QWORD *)((char *)a1 + v5 + 24); _mm_stream_si32((int *)a1 + 4, *(_QWORD *)((char *)a1 + v5 + 16)); _mm_stream_si32((int *)a1 + 6, v15); v16 = *(_QWORD *)((char *)a1 + v5 + 32); v17 = *(_QWORD *)((char *)a1 + v5 + 40); a1 = (char *)a1 + 64; _mm_stream_si32((int *)a1 - 8, v16); _mm_stream_si32((int *)a1 - 6, v17); v18 = *(_QWORD *)((char *)a1 + v5 - 8); --v13; _mm_stream_si32((int *)a1 - 4, *(_QWORD *)((char *)a1 + v5 - 16)); _mm_stream_si32((int *)a1 - 2, v18); } while ( v13 ); Size -= 4096i64; } while ( Size >= 0x1000 ); _InterlockedOr8((volatile signed __int8 *)&retaddr, 0); } v7 = Size >> 3; if ( Size >> 3 ) { do { *(_QWORD *)a1 = *(_QWORD *)((char *)a1 + v5); a1 = (char *)a1 + 8; --v7; } while ( v7 ); Size &= 7u; } } if ( Size ) { do { *(_BYTE *)a1 = *((_BYTE *)a1 + v5); a1 = (char *)a1 + 1; --Size; } while ( Size ); return v3; } else { return v3; } } }
openssl
memset
// local variable allocation has failed, the output may be wrong! void *__cdecl memset(void *a1, int Val, size_t Size) { void *result; // rax unsigned int v4; // ecx size_t v5; // r9 unsigned __int64 v6; // r9 size_t v7; // r9 size_t i; // r9 void *retaddr; // [rsp+0h] [rbp+0h] BYREF result = a1; if ( Size >= 8 ) { *(_QWORD *)&Val = 0x101010101010101i64 * (unsigned __int8)Val; if ( Size >= 0x40 ) { v4 = -(int)a1 & 7; if ( v4 ) { Size -= v4; *(_QWORD *)result = *(_QWORD *)&Val; } a1 = (char *)result + v4; v5 = Size; Size &= 0x3Fu; v6 = v5 >> 6; if ( v6 ) { if ( v6 >= 0x1C00 ) { do { _mm_stream_si32((int *)a1, Val); _mm_stream_si32((int *)a1 + 2, Val); _mm_stream_si32((int *)a1 + 4, Val); a1 = (char *)a1 + 64; _mm_stream_si32((int *)a1 - 10, Val); _mm_stream_si32((int *)a1 - 8, Val); --v6; _mm_stream_si32((int *)a1 - 6, Val); _mm_stream_si32((int *)a1 - 4, Val); _mm_stream_si32((int *)a1 - 2, Val); } while ( v6 ); _InterlockedOr8((volatile signed __int8 *)&retaddr, 0); } else { do { *(_QWORD *)a1 = *(_QWORD *)&Val; *((_QWORD *)a1 + 1) = *(_QWORD *)&Val; *((_QWORD *)a1 + 2) = *(_QWORD *)&Val; a1 = (char *)a1 + 64; *((_QWORD *)a1 - 5) = *(_QWORD *)&Val; *((_QWORD *)a1 - 4) = *(_QWORD *)&Val; --v6; *((_QWORD *)a1 - 3) = *(_QWORD *)&Val; *((_QWORD *)a1 - 2) = *(_QWORD *)&Val; *((_QWORD *)a1 - 1) = *(_QWORD *)&Val; } while ( v6 ); } } } v7 = Size; Size &= 7u; for ( i = v7 >> 3; i; --i ) { *(_QWORD *)a1 = *(_QWORD *)&Val; a1 = (char *)a1 + 8; } } for ( ; Size; --Size ) { *(_BYTE *)a1 = Val; a1 = (char *)a1 + 1; } return result; }
openssl
N98E_bn_mul_add_words
unsigned __int64 __fastcall N98E_bn_mul_add_words(unsigned __int64 *a1, _QWORD *a2, int a3, unsigned __int64 a4) { unsigned __int64 v4; // r10 int v5; // edi unsigned __int64 v9; // rsi __int64 v10; // rbp __int64 v11; // rax __int64 v12; // rdx __int64 v13; // r8 __int64 v14; // rcx unsigned __int64 v15; // rax unsigned __int64 v16; // rdx unsigned __int64 v17; // rax unsigned __int64 v18; // rdx unsigned __int64 v19; // r8 unsigned __int64 v20; // rcx unsigned __int64 v21; // rdx __int64 v22; // rax __int64 v23; // r8 __int64 v24; // r9 __int64 v25; // rdx unsigned __int64 v26; // rax unsigned __int64 v27; // r8 unsigned __int64 v28; // rax unsigned __int64 v29; // r8 unsigned __int64 v30; // r9 unsigned __int64 v31; // rdx unsigned __int64 v32; // rax unsigned __int64 v33; // r8 __int64 v34; // rax __int64 v35; // r8 __int64 v36; // r9 __int64 v37; // rcx unsigned __int64 v38; // rax unsigned __int64 v39; // r8 unsigned __int64 v40; // rax unsigned __int64 v41; // r8 unsigned __int64 v42; // r9 unsigned __int64 v43; // rcx unsigned __int64 v44; // rax unsigned __int64 v45; // r8 __int64 v46; // rax __int64 v47; // rdx __int64 v48; // r8 __int64 v49; // r10 unsigned __int64 v50; // rax unsigned __int64 v51; // rdx unsigned __int64 v52; // rax unsigned __int64 v53; // rdx unsigned __int64 v54; // r8 unsigned __int64 v55; // rax unsigned __int64 v56; // rdx __int64 v57; // rax __int64 v58; // rdx __int64 v59; // r8 __int64 v60; // rcx unsigned __int64 v61; // rax unsigned __int64 v62; // rdx unsigned __int64 v63; // rax unsigned __int64 v64; // rdx unsigned __int64 v65; // r8 unsigned __int64 v66; // rcx unsigned __int64 v67; // rdx v4 = 0i64; v5 = a3; if ( a3 <= 0 ) return 0i64; v9 = HIDWORD(a4); v10 = (unsigned int)a4; if ( (a3 & 0xFFFFFFFC) != 0 ) { do { v11 = HIDWORD(*a2); v12 = (unsigned int)*a2; v13 = v10 * v12; v14 = v9 * v11; v15 = v10 * v11; v16 = v15 + v9 * v12; if ( v16 < v15 ) v14 += 0x100000000i64; v17 = v16; v18 = v16 << 32; v19 = v18 + v13; v20 = HIDWORD(v17) + v14; if ( v19 < v18 ) ++v20; if ( v19 + v4 < v4 ) ++v20; v21 = *a1 + v19 + v4; if ( v21 < *a1 ) ++v20; *a1 = v21; v22 = HIDWORD(a2[1]); v23 = (unsigned int)a2[1]; v24 = v10 * v23; v25 = v9 * v22; v26 = v10 * v22; v27 = v26 + v9 * v23; if ( v27 < v26 ) v25 += 0x100000000i64; v28 = v27; v29 = v27 << 32; v30 = v29 + v24; v31 = HIDWORD(v28) + v25; if ( v30 < v29 ) ++v31; if ( v30 + v20 < v20 ) ++v31; v32 = a1[1]; v33 = v32 + v30 + v20; if ( v33 < v32 ) ++v31; a1[1] = v33; v34 = HIDWORD(a2[2]); v35 = (unsigned int)a2[2]; v36 = v10 * v35; v37 = v9 * v34; v38 = v10 * v34; v39 = v38 + v9 * v35; if ( v39 < v38 ) v37 += 0x100000000i64; v40 = v39; v41 = v39 << 32; v42 = v41 + v36; v43 = HIDWORD(v40) + v37; if ( v42 < v41 ) ++v43; if ( v42 + v31 < v31 ) ++v43; v44 = a1[2]; v45 = v44 + v42 + v31; if ( v45 < v44 ) ++v43; a1[2] = v45; v46 = HIDWORD(a2[3]); v47 = (unsigned int)a2[3]; v48 = v10 * v47; v49 = v9 * v46; v50 = v10 * v46; v51 = v50 + v9 * v47; if ( v51 < v50 ) v49 += 0x100000000i64; v52 = v51; v53 = v51 << 32; v54 = v53 + v48; v4 = HIDWORD(v52) + v49; if ( v54 < v53 ) ++v4; if ( v54 + v43 < v43 ) ++v4; v55 = a1[3]; v56 = v55 + v54 + v43; if ( v56 < v55 ) ++v4; v5 -= 4; a1[3] = v56; a2 += 4; a1 += 4; } while ( (v5 & 0xFFFFFFFC) != 0 ); } for ( ; v5; v4 = v66 ) { v57 = HIDWORD(*a2); v58 = (unsigned int)*a2; v59 = v10 * v58; v60 = v9 * v57; v61 = v10 * v57; v62 = v61 + v9 * v58; if ( v62 < v61 ) v60 += 0x100000000i64; v63 = v62; v64 = v62 << 32; v65 = v64 + v59; v66 = HIDWORD(v63) + v60; if ( v65 < v64 ) ++v66; if ( v65 + v4 < v4 ) ++v66; v67 = *a1 + v65 + v4; if ( v67 < *a1 ) ++v66; *a1++ = v67; ++a2; --v5; } return v4; }
openssl
N98E_bn_mul_words
unsigned __int64 __fastcall N98E_bn_mul_words(_QWORD *a1, _QWORD *a2, int a3, unsigned __int64 a4) { unsigned __int64 v4; // r10 int v5; // edi unsigned __int64 v9; // rsi __int64 v10; // rbp __int64 v11; // rax __int64 v12; // rdx __int64 v13; // r8 __int64 v14; // rcx unsigned __int64 v15; // rax unsigned __int64 v16; // rdx unsigned __int64 v17; // rax unsigned __int64 v18; // rdx unsigned __int64 v19; // r8 unsigned __int64 v20; // rcx __int64 v21; // rax __int64 v22; // r8 __int64 v23; // r9 __int64 v24; // rdx unsigned __int64 v25; // rax unsigned __int64 v26; // r8 unsigned __int64 v27; // rax unsigned __int64 v28; // r8 unsigned __int64 v29; // r9 unsigned __int64 v30; // rdx __int64 v31; // rax __int64 v32; // r8 __int64 v33; // r9 __int64 v34; // rcx unsigned __int64 v35; // rax unsigned __int64 v36; // r8 unsigned __int64 v37; // rax unsigned __int64 v38; // r8 unsigned __int64 v39; // r9 unsigned __int64 v40; // rcx __int64 v41; // rax __int64 v42; // rdx __int64 v43; // r8 __int64 v44; // r10 unsigned __int64 v45; // rax unsigned __int64 v46; // rdx unsigned __int64 v47; // rax unsigned __int64 v48; // rdx unsigned __int64 v49; // r8 __int64 v50; // rax __int64 v51; // rdx __int64 v52; // r8 __int64 v53; // rcx unsigned __int64 v54; // rax unsigned __int64 v55; // rdx unsigned __int64 v56; // rax unsigned __int64 v57; // rdx unsigned __int64 v58; // r8 unsigned __int64 v59; // rcx v4 = 0i64; v5 = a3; if ( a3 <= 0 ) return 0i64; v9 = HIDWORD(a4); v10 = (unsigned int)a4; if ( (a3 & 0xFFFFFFFC) != 0 ) { do { v11 = HIDWORD(*a2); v12 = (unsigned int)*a2; v13 = v10 * v12; v14 = v9 * v11; v15 = v10 * v11; v16 = v15 + v9 * v12; if ( v16 < v15 ) v14 += 0x100000000i64; v17 = v16; v18 = v16 << 32; v19 = v18 + v13; v20 = HIDWORD(v17) + v14; if ( v19 < v18 ) ++v20; if ( v19 + v4 < v4 ) ++v20; *a1 = v19 + v4; v21 = HIDWORD(a2[1]); v22 = (unsigned int)a2[1]; v23 = v10 * v22; v24 = v9 * v21; v25 = v10 * v21; v26 = v25 + v9 * v22; if ( v26 < v25 ) v24 += 0x100000000i64; v27 = v26; v28 = v26 << 32; v29 = v28 + v23; v30 = HIDWORD(v27) + v24; if ( v29 < v28 ) ++v30; if ( v29 + v20 < v20 ) ++v30; a1[1] = v29 + v20; v31 = HIDWORD(a2[2]); v32 = (unsigned int)a2[2]; v33 = v10 * v32; v34 = v9 * v31; v35 = v10 * v31; v36 = v35 + v9 * v32; if ( v36 < v35 ) v34 += 0x100000000i64; v37 = v36; v38 = v36 << 32; v39 = v38 + v33; v40 = HIDWORD(v37) + v34; if ( v39 < v38 ) ++v40; if ( v39 + v30 < v30 ) ++v40; a1[2] = v39 + v30; v41 = HIDWORD(a2[3]); v42 = (unsigned int)a2[3]; v43 = v10 * v42; v44 = v9 * v41; v45 = v10 * v41; v46 = v45 + v9 * v42; if ( v46 < v45 ) v44 += 0x100000000i64; v47 = v46; v48 = v46 << 32; v49 = v48 + v43; v4 = HIDWORD(v47) + v44; if ( v49 < v48 ) ++v4; if ( v49 + v40 < v40 ) ++v4; v5 -= 4; a1[3] = v49 + v40; a2 += 4; a1 += 4; } while ( (v5 & 0xFFFFFFFC) != 0 ); } for ( ; v5; v4 = v59 ) { v50 = HIDWORD(*a2); v51 = (unsigned int)*a2; v52 = v10 * v51; v53 = v9 * v50; v54 = v10 * v50; v55 = v54 + v9 * v51; if ( v55 < v54 ) v53 += 0x100000000i64; v56 = v55; v57 = v55 << 32; v58 = v57 + v52; v59 = HIDWORD(v56) + v53; if ( v58 < v57 ) ++v59; if ( v58 + v4 < v4 ) ++v59; *a1++ = v58 + v4; ++a2; --v5; } return v4; }
openssl
name_cmp
int __fastcall name_cmp(const char *a1, const char *a2) { unsigned int v2; // eax const char *i; // r8 size_t v5; // rbx int result; // eax char v7; // al v2 = 0; for ( i = a2; *i; ++v2 ) { if ( v2 >= 0x80000000 ) break; ++i; } v5 = v2 & 0x7FFFFFFF; result = strncmp(a1, a2, v5); if ( !result ) { v7 = a1[v5]; return v7 && v7 != 46; } return result; }
openssl
NETSCAPE_SPKI_get_pubkey_0
evp_pkey_st *__fastcall NETSCAPE_SPKI_get_pubkey_0(Netscape_spki_st *x) { _QWORD *v1; // rcx if ( x && (v1 = *(_QWORD **)x) != 0i64 ) return (evp_pkey_st *)X509_PUBKEY_get(*v1); else return 0i64; }
openssl
NETSCAPE_SPKI_set_pubkey_0
__int64 __fastcall NETSCAPE_SPKI_set_pubkey_0(Netscape_spki_st *x, evp_pkey_st *pkey) { __int64 v2; // rcx if ( x && (v2 = *(_QWORD *)x) != 0 ) return sub_1400E2570(v2, pkey); else return 0i64; }
openssl
nullf_callback_ctrl_0
__int64 __fastcall nullf_callback_ctrl_0(bio_st *b, int cmd, int (__fastcall *fp)(bio_st *, int, int)) { _QWORD *v3; // rcx v3 = (_QWORD *)*((_QWORD *)b + 8); if ( v3 ) return sub_140099D50(v3, cmd, (__int64)fp); else return 0i64; }
openssl
nullf_callback_ctrl_0_0
__int64 __fastcall nullf_callback_ctrl_0_0(bio_st *b, __int64 cmd, int (__fastcall *fp)(bio_st *, int, int)) { __int64 v3; // rcx v3 = *((_QWORD *)b + 8); if ( v3 ) return sub_1400998F0(v3, cmd, (int)fp); else return 0i64; }
openssl
nullf_callback_ctrl_0_1
__int64 __fastcall nullf_callback_ctrl_0_1(bio_st *b, __int64 cmd, int (__fastcall *fp)(bio_st *, int, int)) { __int64 v3; // rcx v3 = *((_QWORD *)b + 8); if ( v3 ) return sub_140099700(v3, cmd); else return 0i64; }
openssl
nullsub_1
void nullsub_1() { ; }
openssl
nullsub_2
void nullsub_2() { ; }
openssl
null_cipher
__int64 __fastcall null_cipher(evp_cipher_ctx_st *ctx, unsigned __int8 *out, unsigned __int8 *in, size_t inl) { if ( in != out ) memmove(out, in, inl); return 1i64; }
openssl
OBJ_bsearch_ssl_cipher_id
int __fastcall OBJ_bsearch_ssl_cipher_id(ssl_cipher_st *key, const ssl_cipher_st *base, engine_st *num) { return EVP_DecryptInit_ex_0(key, base, num, (const unsigned __int8 *)0x50, (const unsigned __int8 *)sub_14004F9A0); }
openssl
obj_cleanup_int
__int64 obj_cleanup_int() { __int64 result; // rax if ( qword_140282390 ) { sub_1400E87A0(qword_140282390, 0i64); sub_1400E82E0(qword_140282390, sub_14009D890); sub_1400E82E0(qword_140282390, sub_14009D8B0); sub_1400E82E0(qword_140282390, sub_14009D8C0); result = sub_1400E8230(qword_140282390); qword_140282390 = 0i64; } return result; }
openssl
obj_name_cmp
int __fastcall obj_name_cmp(const obj_name_st *a, const obj_name_st *b) { int result; // eax __int64 v5; // rax result = *(_DWORD *)a - *(_DWORD *)b; if ( *(_DWORD *)a == *(_DWORD *)b ) { if ( qword_140284DB0 && (int)sub_140091680((unsigned int *)qword_140284DB0) > *(_DWORD *)a ) { v5 = sub_140091690(qword_140284DB0, *(_DWORD *)a); return (*(__int64 (__fastcall **)(_QWORD, _QWORD))(v5 + 8))(*((_QWORD *)a + 1), *((_QWORD *)b + 1)); } else { return stricmp(*((const char **)a + 1), *((const char **)b + 1)); } } return result; }
openssl
OBJ_sigid_free_0
void OBJ_sigid_free_0() { sub_140091A50((void *)qword_140285448, (void (__fastcall *)(_QWORD))sid_free); qword_140285448 = 0i64; sub_140091630((void **)qword_140285440); qword_140285440 = 0i64; }
openssl
OCSP_basic_add1_cert_0
__int64 __fastcall OCSP_basic_add1_cert_0(__int64 a1, __int64 a2) { _QWORD *v4; // rax if ( !*(_QWORD *)(a1 + 72) ) { v4 = sub_140091AF0(); *(_QWORD *)(a1 + 72) = v4; if ( !v4 ) return 0i64; } if ( !(unsigned int)OPENSSL_sk_push_0(*(unsigned int **)(a1 + 72), a2) ) return 0i64; sub_1400AD790(a2); return 1i64; }
openssl
OCSP_cert_status_str_0
const char *__fastcall OCSP_cert_status_str_0(int s) { _QWORD *v1; // rax unsigned __int64 v2; // rdx v1 = &unk_140214B40; v2 = 0i64; while ( *(_DWORD *)v1 != s ) { ++v2; v1 += 2; if ( v2 >= 3 ) return "(UNKNOWN)"; } return (const char *)v1[1]; }
openssl
OCSP_cert_to_id
_QWORD *__fastcall OCSP_cert_to_id(unsigned int *a1, __int64 a2, __int64 a3) { unsigned int *v5; // rdi int v6; // ebp __int64 v7; // rbx int *v8; // rax v5 = a1; if ( !a1 ) v5 = (unsigned int *)sub_1400C5F40(); if ( a2 ) { v6 = sub_1400C8630(a2); v7 = sub_1400A9230(a2); } else { v7 = 0i64; v6 = sub_1400DCCA0(a3); } v8 = (int *)sub_1400E2D10(a3); return sub_1400DF7E0(v5, v6, v8, v7); }
openssl
OCSP_crl_reason_str_0
const char *__fastcall OCSP_crl_reason_str_0(int s) { _QWORD *v1; // rax unsigned __int64 v2; // rdx v1 = &unk_140214B70; v2 = 0i64; while ( *(_DWORD *)v1 != s ) { ++v2; v1 += 2; if ( v2 >= 8 ) return "(UNKNOWN)"; } return (const char *)v1[1]; }
openssl
ocsp_helper
__int64 __fastcall ocsp_helper(const x509_purpose_st *xp, const x509_st *x, int ca) { if ( ca ) return sub_146024C80((__int64)x); else return 1i64; }
openssl
OCSP_id_get0_info_0
__int64 __fastcall OCSP_id_get0_info_0( asn1_string_st **piNameHash, asn1_object_st **pmd, asn1_string_st **pikeyHash, asn1_string_st **pserial, ocsp_cert_id_st *cid) { if ( !cid ) return 0i64; if ( pmd ) *pmd = *(asn1_object_st **)cid; if ( piNameHash ) *piNameHash = (ocsp_cert_id_st *)((char *)cid + 16); if ( pikeyHash ) *pikeyHash = (ocsp_cert_id_st *)((char *)cid + 40); if ( pserial ) *pserial = (ocsp_cert_id_st *)((char *)cid + 64); return 1i64; }
openssl
OCSP_request_add1_cert_0
__int64 __fastcall OCSP_request_add1_cert_0(__int64 a1, __int64 a2) { __int64 v4; // rbx _QWORD *v6; // rax if ( !*(_QWORD *)(a1 + 32) ) *(_QWORD *)(a1 + 32) = sub_1400DFD80(); v4 = *(_QWORD *)(a1 + 32); if ( !v4 ) return 0i64; if ( a2 ) { if ( !*(_QWORD *)(v4 + 24) ) { v6 = sub_140091AF0(); *(_QWORD *)(v4 + 24) = v6; if ( !v6 ) return 0i64; } if ( !(unsigned int)OPENSSL_sk_push_0(*(unsigned int **)(v4 + 24), a2) ) return 0i64; sub_1400AD790(a2); } return 1i64; }
openssl
OCSP_response_status_str_0
const char *__fastcall OCSP_response_status_str_0(int s) { _QWORD *v1; // rax unsigned __int64 v2; // rdx v1 = &unk_140214AE0; v2 = 0i64; while ( *(_DWORD *)v1 != s ) { ++v2; v1 += 2; if ( v2 >= 6 ) return "(UNKNOWN)"; } return (const char *)v1[1]; }
openssl
OCSP_resp_count_0
__int64 __fastcall OCSP_resp_count_0(__int64 a1) { if ( a1 ) return sub_140091680(*(unsigned int **)(a1 + 32)); else return 0xFFFFFFFFi64; }
openssl
ok_callback_ctrl_0
_QWORD *__fastcall ok_callback_ctrl_0(bio_st *b, int cmd, int (__fastcall *fp)(bio_st *, int, int)) { _QWORD *result; // rax result = (_QWORD *)sub_140099FD0((__int64)b); if ( result ) return (_QWORD *)sub_140099D50(result, cmd, (__int64)fp); return result; }
openssl
OPENSSL_cipher_name_0
const char *__fastcall OPENSSL_cipher_name_0(const char *stdname) { __int64 v1; // rax if ( stdname && (v1 = sub_140066EE0(stdname)) != 0 ) return *(const char **)(v1 + 8); else return "(NONE)"; }
openssl
OPENSSL_cleanse_0
__int64 __fastcall OPENSSL_cleanse_0(__int64 a1, __int64 a2) { return off_14027D1C8(a1, 0i64, a2); }
openssl
OPENSSL_die
void __fastcall __noreturn OPENSSL_die(const char *message, const char *file, __int64 line) { sub_1400E36E0("%s:%d: OpenSSL internal error: %s\n", file, line, message); raise(22); exit(3); }
openssl
OPENSSL_gmtime
tm *__fastcall OPENSSL_gmtime(const __int64 *timer, tm *result) { tm *v2; // rbx v2 = result; if ( gmtime64_s(result, timer) ) return 0i64; return v2; }
openssl
OPENSSL_hexchar2int_0
__int64 __fastcall OPENSSL_hexchar2int_0(char a1) { __int64 result; // rax switch ( a1 ) { case '0': result = 0i64; break; case '1': result = 1i64; break; case '2': result = 2i64; break; case '3': result = 3i64; break; case '4': result = 4i64; break; case '5': result = 5i64; break; case '6': result = 6i64; break; case '7': result = 7i64; break; case '8': result = 8i64; break; case '9': result = 9i64; break; case 'A': case 'a': result = 10i64; break; case 'B': case 'b': result = 11i64; break; case 'C': case 'c': result = 12i64; break; case 'D': case 'd': result = 13i64; break; case 'E': case 'e': result = 14i64; break; case 'F': case 'f': result = 15i64; break; default: result = 0xFFFFFFFFi64; break; } return result; }
openssl
OPENSSL_sk_delete_0
__int64 __fastcall OPENSSL_sk_delete_0(__int64 a1, int a2) { if ( a1 && a2 >= 0 && a2 < *(_DWORD *)a1 ) return sub_140091370(a1, a2); else return 0i64; }
openssl
OPENSSL_sk_pop_0
__int64 __fastcall OPENSSL_sk_pop_0(_DWORD *a1) { if ( a1 && *a1 ) return sub_140091370((__int64)a1, *a1 - 1); else return 0i64; }
openssl
OPENSSL_sk_push_0
__int64 __fastcall OPENSSL_sk_push_0(unsigned int *a1, __int64 a2) { if ( a1 ) return sub_140091290((int *)a1, a2, *a1); else return 0xFFFFFFFFi64; }
openssl
OPENSSL_sk_reserve_0
__int64 __fastcall OPENSSL_sk_reserve_0(stack_st *st, int n) { if ( !st ) return 0i64; if ( n >= 0 ) return sub_140091130((int *)st, n, 1); return 1i64; }
openssl
openssl_strerror_r
_BOOL8 __fastcall openssl_strerror_r(int errnum, char *buf, size_t buflen) { return strerror_s(buf, buflen, errnum) == 0; }
openssl
ossl_init_async_ossl_
void __fastcall ossl_init_async_ossl_() { if ( (unsigned int)sub_140105670() ) { dword_1402853F4 = 1; dword_1402853F8 = 1; } else { dword_1402853F8 = 0; } }
openssl
ossl_init_load_crypto_strings_0
__int64 __fastcall ossl_init_load_crypto_strings_0() { __int64 result; // rax result = sub_140167BE0(); dword_1402853D0 = 1; return result; }
openssl
ossl_init_load_crypto_strings_0_0
__int64 __fastcall ossl_init_load_crypto_strings_0_0() { __int64 result; // rax result = sub_140168760(); dword_1402853D8 = 1; return result; }
openssl
ossl_init_load_crypto_strings_0_1
__int64 __fastcall ossl_init_load_crypto_strings_0_1() { __int64 result; // rax result = sub_1401690B0(); dword_140285400 = 1; return result; }
openssl
ossl_init_load_crypto_strings_0_2
__int64 __fastcall ossl_init_load_crypto_strings_0_2(__int64 a1) { __int64 result; // rax result = nullsub_1(a1); dword_140285408 = 1; return result; }
openssl
ossl_init_load_crypto_strings_0_3
__int64 __fastcall ossl_init_load_crypto_strings_0_3() { __int64 result; // rax result = sub_140169B10(); dword_140285410 = 1; return result; }
openssl
ossl_init_load_crypto_strings_0_4
__int64 __fastcall ossl_init_load_crypto_strings_0_4(__int64 a1) { __int64 result; // rax result = nullsub_1(a1); dword_140285418 = 1; return result; }
openssl
ossl_init_load_crypto_strings_0_5
__int64 __fastcall ossl_init_load_crypto_strings_0_5() { __int64 result; // rax result = sub_14016D340(); dword_140285420 = 1; return result; }
openssl
ossl_init_no_config_ossl__0
void __fastcall ossl_init_no_config_ossl__0() { ERR_load_SSL_strings_0(); dword_140282364 = 1; dword_140282368 = 1; }
openssl
ossl_init_no_config_ossl__0_0
void __fastcall ossl_init_no_config_ossl__0_0() { sub_140168990(); dword_1402853E0 = 1; dword_1402853E4 = 1; }
openssl
ossl_init_register_atexit_ossl_
void __fastcall ossl_init_register_atexit_ossl_() { dword_1402853B4 = onexit((_onexit_t)Func) != 0i64; }
openssl
ossl_safe_getenv
char *__fastcall ossl_safe_getenv(const char *name) { if ( (unsigned int)sub_14011D030() ) return 0i64; else return getenv(name); }
openssl
ossl_statem_app_data_allowed
__int64 __fastcall ossl_statem_app_data_allowed(__int64 a1) { __int64 v1; // rax int v2; // eax if ( *(_DWORD *)(a1 + 72) ) { v1 = *(_QWORD *)(a1 + 168); if ( *(_DWORD *)(v1 + 272) ) { if ( *(_DWORD *)(v1 + 264) ) { if ( *(_DWORD *)(a1 + 56) ) { v2 = *(_DWORD *)(a1 + 92); if ( !v2 || v2 == 20 ) return 1i64; } else if ( *(_DWORD *)(a1 + 92) == 12 ) { return 1i64; } } } } return 0i64; }
openssl
ossl_statem_client_pre_work
__int64 __fastcall ossl_statem_client_pre_work(__int64 a1, __int64 a2) { int v2; // eax __int64 result; // rax __int64 v4; // rax switch ( *(_DWORD *)(a1 + 92) ) { case 1: return sub_14006AC90(a1, a2, 1, 1); case 0xC: v4 = *(_QWORD *)(a1 + 8); *(_DWORD *)(a1 + 68) = 0; if ( (*(_BYTE *)(*(_QWORD *)(v4 + 192) + 96i64) & 8) == 0 ) return 2i64; result = sub_140087F50(a1); if ( (_DWORD)result ) return 2i64; break; case 0x10: if ( (*(_BYTE *)(*(_QWORD *)(*(_QWORD *)(a1 + 8) + 192i64) + 96i64) & 8) == 0 || !*(_DWORD *)(a1 + 200) ) return 2i64; *(_DWORD *)(a1 + 120) = 0; return 2i64; default: if ( *(_DWORD *)(a1 + 92) != 46 ) { if ( *(_DWORD *)(a1 + 92) != 47 ) return 2i64; v2 = *(_DWORD *)(a1 + 132); if ( v2 == 7 || !v2 ) return 2i64; } return sub_14006AC90(a1, a2, 0, 1); } return result; }
openssl
ossl_statem_export_allowed
_BOOL8 __fastcall ossl_statem_export_allowed(ssl_st *s) { return *(_QWORD *)(*((_QWORD *)s + 21) + 976i64) && *((_DWORD *)s + 23) != 36; }
openssl
ossl_statem_skip_early_data
_BOOL8 __fastcall ossl_statem_skip_early_data(ssl_st *s) { return *((_DWORD *)s + 452) == 1 && *((_DWORD *)s + 14) && *((_DWORD *)s + 23) == 46 && *((_DWORD *)s + 310) != 2; }
openssl
ossl_store_destroy_loaders_int
__int64 ossl_store_destroy_loaders_int() { __int64 result; // rax sub_1400E8230(qword_140284DE8); qword_140284DE8 = 0i64; result = sub_14011CD70(qword_140284DD8); qword_140284DD8 = 0i64; return result; }
openssl
OSSL_STORE_do_all_loaders_0
__int64 __fastcall OSSL_STORE_do_all_loaders_0( void (__fastcall *do_function)(const ossl_store_loader_st *, void *), void *do_arg) { sub_1400E8350(qword_140284DE8, do_function, do_arg); return 1i64; }
openssl
ossl_store_file_loader_init
__int64 __fastcall ossl_store_file_loader_init() { unsigned int v0; // ebx v0 = sub_1400DBF60(&off_14027E720); sub_14011F480((const WCHAR *)sub_140165DE0); return v0; }
openssl
OTHERNAME_cmp_0
__int64 __fastcall OTHERNAME_cmp_0(__int64 a1, __int64 a2) { __int64 result; // rax if ( !a1 || !a2 ) return 0xFFFFFFFFi64; result = sub_14012C910(*(_QWORD *)a1, *(_QWORD *)a2); if ( !(_DWORD)result ) return ASN1_TYPE_cmp_0(*(_DWORD **)(a1 + 8), *(_DWORD **)(a2 + 8)); return result; }
openssl
out_utf8
__int64 __fastcall out_utf8(unsigned int value, _DWORD *arg) { *arg += UTF8_putc(0i64, -1, value); return 1i64; }
openssl
o_names_init_ossl_
void __fastcall o_names_init_ossl_() { int v0; // eax sub_14011D030((unsigned int)(v0 - 37)); qword_140284DC0 = sub_1400E87B0(sub_1400DAFD0, obj_name_cmp); qword_140284DC8 = sub_14011CCD0(); sub_14011D030(2i64); if ( !qword_140284DC0 || (dword_140284DD0 = 1, !qword_140284DC8) ) dword_140284DD0 = 0; }
openssl
parse_cmdline
char __fastcall parse_cmdline(char *a1, char **a2, char *a3, _DWORD *a4, _DWORD *a5) { char *v6; // rbx char **v7; // r13 char *v8; // rdi BOOL v9; // r12d unsigned int v10; // esi int v11; // eax BOOL v12; // esi int v13; // edx unsigned int v14; // ecx int v15; // eax char v16; // al v6 = a3; *a5 = 0; v7 = a2; v8 = a1; *a4 = 1; if ( a2 ) { *a2 = a3; v7 = a2 + 1; } if ( a3 ) { v6 = a3 + 1; *a3 = *a1; } ++*a5; v9 = 0; do { if ( *v8 == 34 ) { LOBYTE(v10) = 34; LOBYTE(v11) = !v9; ++v8; v9 = !v9; } else { ++*a5; if ( v6 ) *v6++ = *v8; v10 = (unsigned __int8)*v8++; v11 = ismbblead(v10); if ( v11 ) { ++*a5; if ( v6 ) { LOBYTE(v11) = *v8; *v6++ = *v8; } ++v8; } if ( !(_BYTE)v10 ) { --v8; goto LABEL_21; } } } while ( v9 || (_BYTE)v10 != 32 && (_BYTE)v10 != 9 ); if ( v6 ) *(v6 - 1) = 0; LABEL_21: v12 = 0; while ( *v8 ) { while ( *v8 == 32 || *v8 == 9 ) ++v8; if ( !*v8 ) break; if ( v7 ) *v7++ = v6; ++*a4; if ( v6 ) *v6++ = *v8; ++*a5; while ( 1 ) { v13 = 1; v14 = 0; while ( *v8 == 92 ) { ++v8; ++v14; } if ( *v8 == 34 ) { if ( (v14 & 1) == 0 ) { if ( v12 && v8[1] == 34 ) { ++v8; } else { v13 = 0; v12 = !v12; } } v14 >>= 1; } while ( v14 ) { --v14; if ( v6 ) *v6++ = 92; ++*a5; } LOBYTE(v11) = *v8; if ( !*v8 || !v12 && ((_BYTE)v11 == 32 || (_BYTE)v11 == 9) ) break; if ( v13 ) { v15 = ismbblead((char)v11); if ( v6 ) { if ( v15 ) { v16 = *v8++; *v6++ = v16; ++*a5; } *v6++ = *v8; } else if ( v15 ) { ++v8; ++*a5; } ++*a5; } ++v8; } if ( v6 ) *v6++ = 0; ++*a5; } if ( v7 ) *v7 = 0i64; ++*a4; return v11; }
openssl
PEM_bytes_read_bio_0
__int64 __fastcall PEM_bytes_read_bio_0( unsigned __int8 **pdata, int *plen, char **pnm, const char *name, bio_st *bp, int (__fastcall *cb)(char *, int, int, void *), const char *u) { return sub_14009D3A0( pdata, plen, pnm, name, (__int64)bp, (__int64 (__fastcall *)(char *, __int64, _QWORD, const char *))cb, u, 2); }
openssl
PEM_bytes_read_bio_secmem_0
__int64 __fastcall PEM_bytes_read_bio_secmem_0( unsigned __int8 **pdata, int *plen, char **pnm, const char *name, bio_st *bp, int (__fastcall *cb)(char *, int, int, void *), const char *u) { return sub_14009D3A0( pdata, plen, pnm, name, (__int64)bp, (__int64 (__fastcall *)(char *, __int64, _QWORD, const char *))cb, u, 3); }
openssl
pem_malloc
void *__fastcall pem_malloc(int num, char flags) { if ( (flags & 1) != 0 ) return (void *)sub_14011CF80(num, "crypto\\pem\\pem_lib.c", 228i64); else return CRYPTO_malloc(num, "crypto\\pem\\pem_lib.c", 229i64); }
openssl
PEM_read_bio
__int64 __fastcall PEM_read_bio(bio_st *bp, char **name, char **header, unsigned __int8 **data, int *len) { return sub_14009C5F0((__int64)bp, name, (__int64 *)header, (__int64 *)data, len, 2); }
openssl
PEM_read_bio_RSAPrivateKey_1
rsa_st *__fastcall PEM_read_bio_RSAPrivateKey_1( bio_st *bp, rsa_st **rsa, int (__fastcall *cb)(char *, int, int, void *), void *u) { evp_pkey_st *v5; // rax v5 = (evp_pkey_st *)sub_1400CA3E0(bp, 0i64, cb, u); return pkey_get_dsa(v5, rsa); }
openssl
PEM_read_SSL_SESSION
__int64 __fastcall PEM_read_SSL_SESSION(int a1, int a2, __int64 a3, __int64 a4) { return sub_140124DA0((unsigned int)sub_140062EB0, (unsigned int)"SSL SESSION PARAMETERS", a1, a2, a3, a4); }
openssl
PEM_read_SSL_SESSION_0
__int64 __fastcall PEM_read_SSL_SESSION_0(int a1, int a2, __int64 a3, __int64 a4) { return sub_140124DA0((unsigned int)sub_1400A7EC0, (unsigned int)"CERTIFICATE", a1, a2, a3, a4); }
openssl
PEM_read_SSL_SESSION_1
__int64 __fastcall PEM_read_SSL_SESSION_1(int a1, int a2, __int64 a3, __int64 a4) { return sub_140124DA0((unsigned int)sub_1400B0490, (unsigned int)"CERTIFICATE REQUEST", a1, a2, a3, a4); }
openssl
PEM_read_SSL_SESSION_10
__int64 __fastcall PEM_read_SSL_SESSION_10(int a1, int a2, __int64 a3, __int64 a4) { return sub_140124DA0((unsigned int)d2i_CMS_ContentInfo, (unsigned int)"CMS", a1, a2, a3, a4); }
openssl
PEM_read_SSL_SESSION_11
__int64 __fastcall PEM_read_SSL_SESSION_11(int a1, int a2, __int64 a3, __int64 a4) { return sub_140124DA0((unsigned int)sub_1400ED590, (unsigned int)"ENCRYPTED PRIVATE KEY", a1, a2, a3, a4); }
openssl
PEM_read_SSL_SESSION_12
__int64 __fastcall PEM_read_SSL_SESSION_12(int a1, int a2, __int64 a3, __int64 a4) { return sub_140124DA0((unsigned int)sub_1400ED3C0, (unsigned int)"PRIVATE KEY", a1, a2, a3, a4); }
openssl
PEM_read_SSL_SESSION_13
__int64 __fastcall PEM_read_SSL_SESSION_13(int a1, int a2, __int64 a3, __int64 a4) { return sub_140124DA0((unsigned int)sub_1400A7FA0, (unsigned int)"TRUSTED CERTIFICATE", a1, a2, a3, a4); }
openssl
PEM_read_SSL_SESSION_2
__int64 __fastcall PEM_read_SSL_SESSION_2(int a1, int a2, __int64 a3, __int64 a4) { return sub_140124DA0((unsigned int)sub_1400B24C0, (unsigned int)"X509 CRL", a1, a2, a3, a4); }
openssl
PEM_read_SSL_SESSION_3
__int64 __fastcall PEM_read_SSL_SESSION_3(int a1, int a2, __int64 a3, __int64 a4) { return sub_140124DA0((unsigned int)sub_1400C6A50, (unsigned int)"PKCS7", a1, a2, a3, a4); }
openssl
PEM_read_SSL_SESSION_4
__int64 __fastcall PEM_read_SSL_SESSION_4(int a1, int a2, __int64 a3, __int64 a4) { return sub_140124DA0((unsigned int)sub_1400DF070, (unsigned int)"CERTIFICATE", a1, a2, a3, a4); }
openssl
PEM_read_SSL_SESSION_5
__int64 __fastcall PEM_read_SSL_SESSION_5(int a1, int a2, __int64 a3, __int64 a4) { return sub_140124DA0((unsigned int)sub_14010E020, (unsigned int)"RSA PUBLIC KEY", a1, a2, a3, a4); }
openssl
PEM_read_SSL_SESSION_6
__int64 __fastcall PEM_read_SSL_SESSION_6(int a1, int a2, __int64 a3, __int64 a4) { return sub_140124DA0((unsigned int)sub_1400CB120, (unsigned int)"DSA PARAMETERS", a1, a2, a3, a4); }
openssl
PEM_read_SSL_SESSION_7
__int64 __fastcall PEM_read_SSL_SESSION_7(int a1, int a2, __int64 a3, __int64 a4) { return sub_140124DA0((unsigned int)sub_1400D2600, (unsigned int)"EC PARAMETERS", a1, a2, a3, a4); }
openssl
PEM_read_SSL_SESSION_8
__int64 __fastcall PEM_read_SSL_SESSION_8(int a1, int a2, __int64 a3, __int64 a4) { return sub_140124DA0((unsigned int)sub_1400E2AD0, (unsigned int)"PUBLIC KEY", a1, a2, a3, a4); }
openssl
PEM_read_SSL_SESSION_9
__int64 __fastcall PEM_read_SSL_SESSION_9(int a1, int a2, __int64 a3, __int64 a4) { return sub_140124DA0((unsigned int)sub_1400E2830, (unsigned int)"PUBLIC KEY", a1, a2, a3, a4); }
openssl
PEM_write_bio_CMS_stream
__int64 __fastcall PEM_write_bio_CMS_stream(int a1, int a2, int a3, int a4) { __int64 v8; // rax v8 = sub_140132050(); return sub_14013D6A0(a1, a2, a3, a4, (__int64)"CMS", v8); }
openssl
PEM_write_bio_CMS_stream_0
__int64 __fastcall PEM_write_bio_CMS_stream_0(int a1, int a2, int a3, int a4) { void *v8; // rax v8 = sub_1400C6A40(); return sub_14013D6A0(a1, a2, a3, a4, (__int64)"PKCS7", (__int64)v8); }
openssl
PEM_write_DSAPrivateKey
__int64 __fastcall PEM_write_DSAPrivateKey( __int64 a1, __int64 a2, const evp_cipher_st *a3, char *a4, int a5, __int64 (__fastcall *a6)(char *, __int64, __int64, const char *), const char *a7) { return sub_14009CC90( (__int64 (__fastcall *)(__int64, char **))sub_14010E000, "RSA PRIVATE KEY", a1, a2, a3, a4, a5, a6, a7); }
openssl
PEM_write_DSAPrivateKey_0
__int64 __fastcall PEM_write_DSAPrivateKey_0( __int64 a1, __int64 a2, const evp_cipher_st *a3, char *a4, int a5, __int64 (__fastcall *a6)(char *, __int64, __int64, const char *), const char *a7) { return sub_14009CC90( (__int64 (__fastcall *)(__int64, char **))sub_1400CB100, "DSA PRIVATE KEY", a1, a2, a3, a4, a5, a6, a7); }
openssl
PEM_write_DSAPrivateKey_1
__int64 __fastcall PEM_write_DSAPrivateKey_1( __int64 a1, __int64 a2, const evp_cipher_st *a3, char *a4, int a5, __int64 (__fastcall *a6)(char *, __int64, __int64, const char *), const char *a7) { return sub_14009CC90( (__int64 (__fastcall *)(__int64, char **))sub_1400D2A60, "EC PRIVATE KEY", a1, a2, a3, a4, a5, a6, a7); }
openssl
PEM_write_PKCS8PrivateKey
__int64 __fastcall PEM_write_PKCS8PrivateKey( __int64 a1, __int64 a2, __int64 a3, char *a4, int a5, __int64 (__fastcall *a6)(char *, __int64, __int64, const char *), const char *a7) { return sub_1400ED8A0(a1, a2, 0, -1, a3, a4, a5, a6, a7); }
openssl
PEM_write_SSL_SESSION
__int64 __fastcall PEM_write_SSL_SESSION(int a1, int a2) { return sub_14009CC90( (unsigned int)sub_140062940, (unsigned int)"SSL SESSION PARAMETERS", a1, a2, 0, 0i64, 0, 0i64, 0i64); }
openssl
PEM_write_SSL_SESSION_0
__int64 __fastcall PEM_write_SSL_SESSION_0(__int64 a1, __int64 a2) { return sub_14009CC90( (__int64 (__fastcall *)(__int64, char **))sub_1400A7EE0, "CERTIFICATE", a1, a2, 0i64, 0i64, 0, 0i64, 0i64); }
openssl
PEM_write_SSL_SESSION_1
__int64 __fastcall PEM_write_SSL_SESSION_1(__int64 a1, __int64 a2) { return sub_14009CC90( (__int64 (__fastcall *)(__int64, char **))sub_1400B04B0, "CERTIFICATE REQUEST", a1, a2, 0i64, 0i64, 0, 0i64, 0i64); }
openssl
PEM_write_SSL_SESSION_10
__int64 __fastcall PEM_write_SSL_SESSION_10(__int64 a1, __int64 a2) { return sub_14009CC90( (__int64 (__fastcall *)(__int64, char **))sub_1400D2710, "EC PARAMETERS", a1, a2, 0i64, 0i64, 0, 0i64, 0i64); }
openssl
PEM_write_SSL_SESSION_11
__int64 __fastcall PEM_write_SSL_SESSION_11(__int64 a1, __int64 a2) { return sub_14009CC90( (__int64 (__fastcall *)(__int64, char **))sub_1400E2BA0, "PUBLIC KEY", a1, a2, 0i64, 0i64, 0, 0i64, 0i64); }
openssl
PEM_write_SSL_SESSION_12
__int64 __fastcall PEM_write_SSL_SESSION_12(__int64 a1, __int64 a2) { return sub_14009CC90( (__int64 (__fastcall *)(__int64, char **))sub_1400C9B90, "DH PARAMETERS", a1, a2, 0i64, 0i64, 0, 0i64, 0i64); }
openssl
PEM_write_SSL_SESSION_13
__int64 __fastcall PEM_write_SSL_SESSION_13(__int64 a1, __int64 a2) { return sub_14009CC90( (__int64 (__fastcall *)(__int64, char **))sub_1400C9CE0, "X9.42 DH PARAMETERS", a1, a2, 0i64, 0i64, 0, 0i64, 0i64); }
openssl
PEM_write_SSL_SESSION_14
__int64 __fastcall PEM_write_SSL_SESSION_14(__int64 a1, __int64 a2) { return sub_14009CC90( (__int64 (__fastcall *)(__int64, char **))sub_1400E28F0, "PUBLIC KEY", a1, a2, 0i64, 0i64, 0, 0i64, 0i64); }
openssl
PEM_write_SSL_SESSION_15
__int64 __fastcall PEM_write_SSL_SESSION_15(__int64 a1, __int64 a2) { return sub_14009CC90( (__int64 (__fastcall *)(__int64, char **))sub_1400ED5B0, "ENCRYPTED PRIVATE KEY", a1, a2, 0i64, 0i64, 0, 0i64, 0i64); }
openssl
PEM_write_SSL_SESSION_16
__int64 __fastcall PEM_write_SSL_SESSION_16(__int64 a1, __int64 a2) { return sub_14009CC90( (__int64 (__fastcall *)(__int64, char **))sub_1400ED3E0, "PRIVATE KEY", a1, a2, 0i64, 0i64, 0, 0i64, 0i64); }
openssl
PEM_write_SSL_SESSION_17
__int64 __fastcall PEM_write_SSL_SESSION_17(__int64 a1, __int64 a2) { return sub_14009CC90( (__int64 (__fastcall *)(__int64, char **))sub_1400A80F0, "TRUSTED CERTIFICATE", a1, a2, 0i64, 0i64, 0, 0i64, 0i64); }
openssl
PEM_write_SSL_SESSION_2
__int64 __fastcall PEM_write_SSL_SESSION_2(__int64 a1, __int64 a2) { return sub_14009CC90( (__int64 (__fastcall *)(__int64, char **))sub_1400B04B0, "NEW CERTIFICATE REQUEST", a1, a2, 0i64, 0i64, 0, 0i64, 0i64); }
openssl
PEM_write_SSL_SESSION_3
__int64 __fastcall PEM_write_SSL_SESSION_3(__int64 a1, __int64 a2) { return sub_14009CC90( (__int64 (__fastcall *)(__int64, char **))sub_1400B24E0, "X509 CRL", a1, a2, 0i64, 0i64, 0, 0i64, 0i64); }
openssl