Searched refs:m (Results 176 – 194 of 194) sorted by relevance
12345678
126 * Fixed possible OOB memory access with invalid low-level GF(2^m) elliptic863 ### Major changes between OpenSSL 1.0.2m and OpenSSL 1.0.2n [7 Dec 2017]868 ### Major changes between OpenSSL 1.0.2l and OpenSSL 1.0.2m [2 Nov 2017]1050 ### Major changes between OpenSSL 1.0.1m and OpenSSL 1.0.1n [11 Jun 2015]1058 ### Major changes between OpenSSL 1.0.1l and OpenSSL 1.0.1m [19 Mar 2015]1214 ### Major changes between OpenSSL 1.0.0m and OpenSSL 1.0.0n [6 Aug 2014]1223 Known issues in OpenSSL 1.0.0m:1230 ### Major changes between OpenSSL 1.0.0l and OpenSSL 1.0.0m [5 Jun 2014]1332 ### Major changes between OpenSSL 0.9.8m and OpenSSL 0.9.8n [24 Mar 2010]1337 ### Major changes between OpenSSL 0.9.8l and OpenSSL 0.9.8m [25 Feb 2010][all …]
3424 ### Changes between 1.1.1m and 1.1.1n [xx XXX xxxx]3426 ### Changes between 1.1.1l and 1.1.1m [14 Dec 2021]6531 ### Changes between 1.0.2m and 1.0.2n [7 Dec 2017]6578 ### Changes between 1.0.2l and 1.0.2m [2 Nov 2017]8417 ### Changes between 1.0.1m and 1.0.1n [11 Jun 2015]8498 ### Changes between 1.0.1l and 1.0.1m [19 Mar 2015]9802 ### Changes between 1.0.0m and 1.0.0n [6 Aug 2014]9865 ### Changes between 1.0.0l and 1.0.0m [5 Jun 2014]11146 - OpenSSL 0.9.8m if 'short' is a 16-bit type,15499 such that `|m| < r < 0`, `BN_nnmod` will output `rem + |m|` instead).[all …]
152 $ git commit -a -m "make update"
128 static int capi_rsa_sign(int dtype, const unsigned char *m,849 int capi_rsa_sign(int dtype, const unsigned char *m, unsigned int m_len, in capi_rsa_sign() argument912 if (!CryptSetHashParam(hash, HP_HASHVAL, (unsigned char *)m, 0)) { in capi_rsa_sign()
309 const uint64_t m = 0xFFFFFFFFUL; in mul_lower() local310 return (x & m) * (y & m); in mul_lower()
195 * string. For now, I'm settling for dealing with the fact it is a
513 X509_LOOKUP *X509_STORE_add_lookup(X509_STORE *xs, X509_LOOKUP_METHOD *m);
326 void X509_CRL_METHOD_free(X509_CRL_METHOD *m);
219 But we would need to have storage inside the BIO_dgram for *m* `struct220 msghdr`, *m\*v* iovecs, etc. Since we want to support multithreaded use224 Limiting *m* isn't a problem, because `sendmmsg` returns the number
373 BIO_MSG *m,
707 #define CMP_DEBUG(m, a1, a2, a3) \ argument708 CMP_print(bio_out, OSSL_CMP_LOG_DEBUG, "debug", m, a1, a2, a3)719 #define CMP_WARN(m, a1, a2, a3) \ argument720 CMP_print(bio_out, OSSL_CMP_LOG_WARNING, "warning", m, a1, a2, a3)
1611 const EVP_MD *m; in EVP_PKEY_CTX_md() local1613 if (md == NULL || (m = EVP_get_digestbyname(md)) == NULL) { in EVP_PKEY_CTX_md()1617 return EVP_PKEY_CTX_ctrl(ctx, -1, optype, cmd, 0, (void *)m); in EVP_PKEY_CTX_md()
209 static void openssl_free(char *m) in openssl_free() argument211 OPENSSL_free(m); in openssl_free()921 int m; in cipher_test_init() local951 m = EVP_CIPHER_get_mode(cipher); in cipher_test_init()953 cdat->aead = m != 0 ? m : -1; in cipher_test_init()
1248 next if grep { lc("$name.h") =~ m/$_/i } @nogo_headers_re;
330 The command C<openssl version -m> can be used to find out the value
130 my $pointer_size_str = $config{target} =~ m|-p(\d+)$| ? $1 : "";
2983 CN/m2989 KTV1b97PiYmZNDeoBY78FQyHRSvdSo+oRew2RacpaCAntRoiWHyN1nAdDSzjCN/m3478 NDZxmneIfrsLGM+Ambn0IStuMKFBnBjgKdNoY8ydRI9Nuk0qDmBxG+VykV+9T+8m
2275 ytgZZtF+6vVXBor6fHhGa7WyIDLREA+m7571 CgIxG3K8XNyOlt8XnOV1EcJqyehz/B92zd6afY5Sp+m+XHdTYgMx6Jd6mJArSK6Y
529 OpenSSL 0.9.8m.
Completed in 134 milliseconds