Lines Matching refs:input

179    the input string, in accordance with ITU-T X.690 section 11.7 and 11.8.
990 with NULL pointer as the output buffer and 0 as the input buffer length.
1933 automatically detect the PEM or DER format of the input files.
3392 cases where the input length is close to the maximum permissible length for
3700 ChaCha20-Poly1305 is an AEAD cipher, and requires a unique nonce input
3782 * Fixed the issue that RAND_add()/RAND_seed() silently discards random input
3812 * Make EVP_PKEY_asn1_new() a bit stricter about its input. A NULL pem_str
3829 being prime depends on the intended use based on the size of the input.
3910 * Enforce checking in the `pkeyutl` command to ensure that the input
4391 ChaCha20-Poly1305 is an AEAD cipher, and requires a unique nonce input
4501 * Make EVP_PKEY_asn1_new() a bit stricter about its input. A NULL pem_str
4513 being prime depends on the intended use based on the size of the input.
4563 in PKCS7) could eventually exceed the stack given malicious input with
4775 multiplication procedure that handles input lengths divisible by, but
4778 question is not used in operations with the private key itself and an input
4781 erroneous outcome of public-key operations with specially crafted input.
4901 and console input. Setting OPENSSL_WIN32_UTF8 environment variable
5286 SSL_CTX_sess_set_get_cb was changed. The read-only input buffer
6038 * Initial, experimental EVP support for AES-GCM. AAD can be input by
6055 input buffer is NULL and length 0 finalisation should be performed.
6286 * Make EVP_PKEY_asn1_new() a bit stricter about its input. A NULL pem_str
6298 being prime depends on the intended use based on the size of the input.
6330 in PKCS7) could eventually exceed the stack given malicious input with
6466 multiplication procedure that handles input lengths divisible by, but
6469 question is not used in operations with the private key itself and an input
6472 erroneous outcome of public-key operations with specially crafted input.
6537 is able to supply very large amounts of input data after a previous
6701 amounts of input data then a length check can overflow resulting in a heap
6719 is able to supply very large amounts of input data after a previous call to
7333 for corner cases. (Certain input points at infinity could lead to
7738 is able to supply very large amounts of input data after a previous
7903 amounts of input data then a length check can overflow resulting in a heap
7921 is able to supply very large amounts of input data after a previous call to
8686 for corner cases. (Certain input points at infinity could lead to
9670 for corner cases. (Certain input points at infinity could lead to
10315 draft-rescorla-tls-opaque-prf-input-00.txt. Since this is not an
10331 opaque PRF input value to use in the handshake. This will create
10352 PRF input just if possible, or 2 to enforce use of the opaque PRF
10353 input. In the latter case, the library will abort the handshake
10354 if opaque PRF input is not successfully negotiated.
10358 see the client's opaque PRF input through these variables if
10360 provides an opaque PRF input, the length must be the same as the
10361 length of the client's opaque PRF input.
10368 for applications that need to enforce opaque PRF input.
10489 Use the leftmost N bytes of the signature input if the input is
11299 - Change bn_nist.c so that it will properly handle input BIGNUMs
11624 of the input BIGNUMs. Also, BN_is_bit_set() has been changed to
12600 * Change BN_mod_sqrt() so that it verifies that the input value
12780 *Nils Larsch <nla@trustcenter.de> with input by Bodo Moeller*
13098 * Prompt for pass phrases when appropriate for PKCS12 input format.
14428 and input types for run-time discovery by calling applications. A
14430 depending on their input type, and only these can be invoked through
14432 can be based on user input, config files, etc). The distinction is
14434 result and can only support numeric or string input, whereas some
14779 skipped when using openssl x509 multiple times on a single input file,
16436 (crypto/conf/conf_lib.c), if the input LHASH is NULL, avoid using
17932 false-positive rate of at most 2^-80 for random input.
18371 -S option to allow a salt to be input on the command line.
18588 a public key to be input or output. For example:
18608 caused by input 46 bytes long. The cause is due to the way base64
18779 * Changed obj_dat.pl script so it takes its input and output files on