/openssl/ssl/record/methods/ |
H A D | dtls_meth.c | 128 rr->input = &(rl->packet[DTLS1_RT_HEADER_LENGTH]); in dtls_process_record() 149 rr->data = rr->input; in dtls_process_record()
|
H A D | tls_common.c | 571 thisrr->input = &(rl->packet[SSL2_RT_HEADER_LENGTH]); in tls_get_more_records() 573 thisrr->input = &(rl->packet[SSL3_RT_HEADER_LENGTH]); in tls_get_more_records() 589 thisrr->data = thisrr->input; in tls_get_more_records()
|
/openssl/doc/man3/ |
H A D | PKCS12_parse.pod | 42 use. This may include passwords from local text files, or input from
|
H A D | OSSL_CMP_ITAV_set0.pod | 60 return the respective pointer or NULL if their input is NULL.
|
H A D | OSSL_CRMF_pbmp_new.pod | 53 malformed input.
|
H A D | OSSL_STORE_INFO.pod | 108 create a B<OSSL_STORE_INFO> object to hold the given input object. 109 On success the input object is consumed.
|
H A D | PKCS12_newpass.pod | 26 use. This may include passwords from local text files, or input from
|
H A D | ASN1_item_d2i_bio.pod | 45 ASN1_item_d2i_bio_ex() decodes the contents of its input BIO I<in>,
|
H A D | EVP_RAND.pod | 140 additional input I<addin> of length I<addin_len>. The bytes 147 input I<addin> of length I<addin_len> bytes. In the FIPS provider, both are 148 treated as additional input as per NIST SP-800-90Ar1, Sections 9.1 and 9.2.
|
H A D | PKCS12_PBE_keyivgen.pod | 45 The input is from I<in> of length I<inlen> and output is into a malloc'd buffer
|
/openssl/test/ |
H A D | tls13encryptiontest.c | 255 rec->data = rec->input = OPENSSL_malloc(ptlen + EVP_GCM_TLS_TAG_LEN); in load_record()
|
H A D | evp_extra_test.c | 1570 const unsigned char *input = ak->kder; in test_d2i_AutoPrivateKey() local 1574 p = input; in test_d2i_AutoPrivateKey() 1576 || !TEST_ptr_eq(p, input + input_len) in test_d2i_AutoPrivateKey() 2245 const unsigned char *input = ak->kder; in test_EVP_PKEY_check() local 2253 if (!TEST_ptr(pkey = load_example_key(ak->keytype, input, input_len))) in test_EVP_PKEY_check() 3494 const unsigned char *input; member 3618 if (!TEST_true(EVP_CipherUpdate(ctx, outbuf, &outlen1, t->input, t->inlen))) { in test_evp_init_seq() 3658 const unsigned char *input; member 3706 if (!TEST_true(EVP_CipherUpdate(ctx, outbuf, &outlen1, t->input, t->inlen))) { in test_evp_reset() 3722 if (!TEST_true(EVP_CipherUpdate(ctx, outbuf, &outlen1, t->input, t->inlen))) { in test_evp_reset()
|
/openssl/doc/man7/ |
H A D | passphrase-encoding.pod | 93 one used by your current input method. 100 should be understood that you either change the input method to use the
|
H A D | life_cycle-digest.pod | 25 input. 30 additional input or generating output.
|
H A D | EVP_MAC-KMAC.pod | 126 /* The update may be called multiple times here for streamed input */
|
H A D | EVP_KDF-TLS13_KDF.pod | 72 operation. The input key should be set to the intermediate fixed-length
|
H A D | EVP_KDF-X942-ASN1.pod | 10 X942KDF-ASN1. It is used by DH KeyAgreement, to derive a key using input such as
|
H A D | EVP_KDF-SS.pod | 10 SSKDF derives a key using input such as a shared secret key (that was generated
|
H A D | EVP_KDF-KB.pod | 11 input secret (and other optional values).
|
/openssl/doc/internal/man3/ |
H A D | evp_pkey_export_to_provider.pod | 37 best to get "traditional" PEM output even if the input B<EVP_PKEY> has a
|
/openssl/crypto/des/asm/ |
H A D | des_enc.m4 | 527 ! parameter 4 1 for load input/output address to local5/7 1371 ! void DES_ncbc_encrypt(input, output, length, schedule, ivec, enc) 1428 add in0, 8, in0 ! input address 1506 mov in0, local5 ! input 1520 fp_macro(out5, in5, 0, 1) ! 1 for input and output address to local5/7 1529 ! Load ivec next block now, since input and output address might be the same. 1564 ! void DES_ede3_cbc_encrypt(input, output, length, ks1, ks2, ks3, ivec, enc) 1729 fp_macro(out5, in5, 0, 1) ! 1 for input and output address local5/7
|
/openssl/test/recipes/30-test_evp_data/ |
H A D | evppkey_ecx.txt | 262 # Corrupted input 482 # Corrupted input
|
/openssl/crypto/err/ |
H A D | openssl.txt | 180 BN_R_INPUT_NOT_REDUCED:110:input not reduced 234 missing key input for creating protection 624 ENGINE_R_COMMAND_TAKES_INPUT:135:command takes input 625 ENGINE_R_COMMAND_TAKES_NO_INPUT:136:command takes no input 704 EVP_R_INPUT_NOT_INITIALIZED:111:input not initialized 977 PROV_R_ADDITIONAL_INPUT_TOO_LONG:184:additional input too long 1016 PROV_R_INVALID_INPUT_LENGTH:230:invalid input length 1105 RAND_R_ADDITIONAL_INPUT_TOO_LONG:102:additional input too long 1111 RAND_R_ENTROPY_INPUT_TOO_LONG:106:entropy input too long 1116 RAND_R_ERROR_RETRIEVING_ADDITIONAL_INPUT:109:error retrieving additional input
|
/openssl/doc/man1/ |
H A D | openssl-ca.pod.in | 117 An input filename containing a single certificate request (CSR) to be 122 The format of the data in certificate request input files; 134 section for information on the required input and output format. 159 The format of the data in certificate input files; unspecified by default. 169 The format of the private key input file; unspecified by default. 628 The input to the B<-spkac> command line option is a Netscape 752 Although several requests can be input and handled at once it is only
|
H A D | openssl-verify.pod.in | 103 input.
|