/openssl/doc/man3/ |
H A D | RSA_sign.pod | 15 int RSA_sign(int type, const unsigned char *m, unsigned int m_len, 18 int RSA_verify(int type, const unsigned char *m, unsigned int m_len, 27 RSA_sign() signs the message digest B<m> of size B<m_len> using the 37 B<m>. 43 matches a given message digest B<m> of size B<m_len>. B<type> denotes
|
H A D | RSA_sign_ASN1_OCTET_STRING.pod | 15 int RSA_sign_ASN1_OCTET_STRING(int dummy, unsigned char *m, 19 int RSA_verify_ASN1_OCTET_STRING(int dummy, unsigned char *m, 28 RSA_sign_ASN1_OCTET_STRING() signs the octet string B<m> of size 43 B<m> of size B<m_len>. B<dummy> is ignored. B<rsa> is the signer's
|
/openssl/crypto/mdc2/ |
H A D | mdc2_one.c | 23 static unsigned char m[MDC2_DIGEST_LENGTH]; in MDC2() local 26 md = m; in MDC2()
|
/openssl/crypto/ripemd/ |
H A D | rmd_one.c | 24 static unsigned char m[RIPEMD160_DIGEST_LENGTH]; in RIPEMD160() local 27 md = m; in RIPEMD160()
|
/openssl/test/ |
H A D | bntests.pl | 94 my $m = bn($s{'M'}); 96 return if $modmul == $a->bmod($m); 102 my $m = bn($s{'M'}); 103 return if $modexp == $a->bmodpow($e, $m);
|
H A D | bntest.c | 480 || !TEST_ptr(m = BN_new()) in test_modexp_mont5() 724 BN_free(m); in test_modexp_mont5() 1610 || !TEST_ptr(m = getBN(s, "M")) in file_modmul() 1619 if (BN_is_odd(m)) { in file_modmul() 1649 BN_free(m); in file_modmul() 1673 if (BN_is_odd(m)) { in file_modexp() 1704 BN_free(m); in file_modexp() 2501 BIGNUM *m = BN_new(); in test_expmodone() local 2507 || !TEST_ptr(m) in test_expmodone() 2530 BN_set_negative(m, 1); in test_expmodone() [all …]
|
H A D | testutil.h | 473 # define TEST_strn2_eq(a, m, b, n) test_strn_eq(__FILE__, __LINE__, #a, #b, a, m, b, n) argument 474 # define TEST_strn2_ne(a, m, b, n) test_strn_ne(__FILE__, __LINE__, #a, #b, a, m, b, n) argument 476 # define TEST_mem_eq(a, m, b, n) test_mem_eq(__FILE__, __LINE__, #a, #b, a, m, b, n) argument 477 # define TEST_mem_ne(a, m, b, n) test_mem_ne(__FILE__, __LINE__, #a, #b, a, m, b, n) argument 523 void test_output_string(const char *name, const char *m, size_t l); 525 void test_output_memory(const char *name, const unsigned char *m, size_t l);
|
/openssl/crypto/bn/ |
H A D | bn_nist.c | 285 # define bn_cp_64(to, n, from, m) (to)[n] = (m>=0)?((from)[m]):0; argument 291 # define bn_cp_32_naked(to, n, from, m) (((n)&1)?(to[(n)/2]|=((m)&1)?(from[(m)/2]&BN_MASK2h):(from… argument 292 … :(to[(n)/2] =((m)&1)?(from[(m)/2]>>32):(from[(m)/2]&BN_MASK2l))) 294 # define bn_cp_32(to,n,from,m) ((m)>=0)?bn_cp_32_naked(to,n,from,m):bn_32_set_0(to,n) argument 303 # define bn_cp_64(to, n, from, m) \ argument 305 bn_cp_32(to, (n)*2, from, (m)*2); \ 306 bn_cp_32(to, (n)*2+1, from, (m)*2+1); \ 313 # define bn_cp_32(to, n, from, m) (to)[n] = (m>=0)?((from)[m]):0; argument
|
H A D | bn_conv.c | 130 int neg = 0, h, m, i, j, k, c; in BN_hex2bn() local 169 m = 0; in BN_hex2bn() 172 m = (BN_BYTES * 2 <= j) ? BN_BYTES * 2 : j; in BN_hex2bn() 175 c = a[j - m]; in BN_hex2bn() 181 if (--m <= 0) { in BN_hex2bn()
|
H A D | rsaz_exp.h | 70 const BN_ULONG *m, in bn_reduce_once_in_place() argument 73 carry -= bn_sub_words(tmp, r, m, num); in bn_reduce_once_in_place()
|
/openssl/ssl/ |
H A D | priority_queue.c | 199 size_t n, m; in ossl_pqueue_push() local 205 m = pq->freelist; in ossl_pqueue_push() 206 pq->freelist = pq->elements[m].posn; in ossl_pqueue_push() 209 pq->heap[n].index = m; in ossl_pqueue_push() 211 pq->elements[m].posn = n; in ossl_pqueue_push() 213 pq->elements[m].used = 1; in ossl_pqueue_push() 217 *elem = m; in ossl_pqueue_push()
|
/openssl/test/recipes/ |
H A D | 80-test_ca.t | 270 … my ($mo, $d, $h, $m, $s, $y) = $human =~ /^([A-Za-z]{3})\s+(\d+) (\d{2}):(\d{2}):(\d{2}) (\d{4})/; 277 return timegm($s, $m, $h, $d, $months{$mo}, $y); 284 my ($y, $mo, $d, $h, $m, $s) = $asn1 =~ /^(\d{2,4})(\d{2})(\d{2})(\d{2})(\d{2})(\d{2})Z$/; 286 return timegm($s, $m, $h, $d, $mo - 1, $y);
|
/openssl/crypto/md2/ |
H A D | md2_one.c | 28 static unsigned char m[MD2_DIGEST_LENGTH]; in MD2() local 31 md = m; in MD2()
|
/openssl/crypto/md5/ |
H A D | md5_one.c | 28 static unsigned char m[MD5_DIGEST_LENGTH]; in MD5() local 31 md = m; in MD5()
|
/openssl/crypto/md4/ |
H A D | md4_one.c | 28 static unsigned char m[MD4_DIGEST_LENGTH]; in MD4() local 31 md = m; in MD4()
|
/openssl/include/openssl/ |
H A D | rsa.h | 351 OSSL_DEPRECATEDIN_3_0 int RSA_sign(int type, const unsigned char *m, 354 OSSL_DEPRECATEDIN_3_0 int RSA_verify(int type, const unsigned char *m, 365 const unsigned char *m, unsigned int m_length, 370 const unsigned char *m, unsigned int m_length, 539 const BIGNUM *m, 547 const BIGNUM *m, 560 const unsigned char *m, 567 int (*sign) (int type, const unsigned char *m, 573 const unsigned char *m, 580 int (*verify) (int dtype, const unsigned char *m,
|
/openssl/crypto/rsa/ |
H A D | rsa_local.h | 24 BN_MONT_CTX *m; member 117 const BIGNUM *m, BN_CTX *ctx, BN_MONT_CTX *m_ctx); 133 const unsigned char *m, unsigned int m_length, 136 int (*rsa_verify) (int dtype, const unsigned char *m,
|
/openssl/include/crypto/ |
H A D | bn.h | 81 const BIGNUM *m); 83 const BIGNUM *m); 88 int bn_div_fixed_top(BIGNUM *dv, BIGNUM *rem, const BIGNUM *m,
|
/openssl/providers/implementations/digests/ |
H A D | blake2s_prov.c | 151 uint32_t m[16]; in blake2s_compress() local 183 m[i] = load32(blocks + i * sizeof(m[i])); in blake2s_compress() 200 a = a + b + m[blake2s_sigma[r][2*i+0]]; \ in blake2s_compress() 204 a = a + b + m[blake2s_sigma[r][2*i+1]]; \ in blake2s_compress()
|
H A D | blake2b_prov.c | 158 uint64_t m[16]; in blake2b_compress() local 190 m[i] = load64(blocks + i * sizeof(m[i])); in blake2b_compress() 207 a = a + b + m[blake2b_sigma[r][2*i+0]]; \ in blake2b_compress() 211 a = a + b + m[blake2b_sigma[r][2*i+1]]; \ in blake2b_compress()
|
/openssl/crypto/ec/ |
H A D | ec2_oct.c | 261 int y_bit, m; in ossl_ec_GF2m_simple_oct2point() local 309 m = EC_GROUP_get_degree(group); in ossl_ec_GF2m_simple_oct2point() 310 field_len = (m + 7) / 8; in ossl_ec_GF2m_simple_oct2point() 337 if (BN_num_bits(x) > m) { in ossl_ec_GF2m_simple_oct2point() 348 if (BN_num_bits(y) > m) { in ossl_ec_GF2m_simple_oct2point()
|
/openssl/doc/man7/ |
H A D | EVP_PKEY-EC.pod | 34 which correspond to prime field Fp and binary field F2^m. 38 For a curve over Fp I<p> is the prime for the field. For a curve over F2^m I<p> 51 For F2^m: y^2 + xy = x^3 + ax^2 + b 149 This field is only used for a binary field F2^m. 151 =item "m" (B<OSSL_PKEY_PARAM_EC_CHAR2_M>) <integer> 161 These fields are only used for a binary field F2^m. 162 I<m> is the degree of the binary field. 165 range m > tp > 0. 168 that m > k3 > k2 > k1 > 0
|
/openssl/crypto/objects/ |
H A D | obj_dat.pl | 223 my $m = $obj{$nid{$_}}; 224 my $v = $objd{$m}; 227 printf " %4d, /* %-32s %s */\n", $_, $m, $v;
|
/openssl/crypto/dsa/ |
H A D | dsa_local.h | 55 const BIGNUM *m, BN_CTX *ctx, BN_MONT_CTX *in_mont); 58 const BIGNUM *m, BN_CTX *ctx, BN_MONT_CTX *m_ctx);
|
/openssl/fuzz/ |
H A D | test-corpus.c | 34 # define S_ISREG(m) ((m) & S_IFREG) argument
|