/openssl/crypto/ffc/ |
H A D | ffc_params_generate.c | 319 int m = *retm; in generate_q_fips186_4() local 327 if (!BN_GENCB_call(cb, 0, m++)) in generate_q_fips186_4() 382 *retm = m; in generate_q_fips186_4() 393 int i, r, ret = 0, m = *retm; in generate_q_fips186_2() local 399 if (!BN_GENCB_call(cb, 0, m++)) in generate_q_fips186_2() 442 *retm = m; in generate_q_fips186_2() 525 int n = 0, m = 0, qsize; in ossl_ffc_params_FIPS186_4_gen_verify() local 684 seed != params->seed, &m, res, cb)) in ossl_ffc_params_FIPS186_4_gen_verify() 818 int n = 0, m = 0; in ossl_ffc_params_FIPS186_2_gen_verify() local 931 use_random_seed, &m, res, cb)) in ossl_ffc_params_FIPS186_2_gen_verify()
|
/openssl/crypto/asn1/ |
H A D | a_time.c | 56 int m = tm->tm_mon; in determine_days() local 60 tm->tm_yday = ydays[m] + d - 1; in determine_days() 61 if (m >= 2) { in determine_days() 64 m += 2; in determine_days() 67 m += 14; in determine_days() 73 tm->tm_wday = (d + (13 * m) / 5 + y + y / 4 + c / 4 + 5 * c + 6) % 7; in determine_days()
|
/openssl/crypto/property/ |
H A D | property_parse.c | 31 static int match_ch(const char *t[], char m) in match_ch() argument 35 if (*s == m) { in match_ch() 42 #define MATCH(s, m) match(s, m, sizeof(m) - 1) argument 44 static int match(const char *t[], const char m[], size_t m_len) in match() argument 48 if (OPENSSL_strncasecmp(s, m, m_len) == 0) { in match()
|
/openssl/doc/man3/ |
H A D | BN_mod_mul_montgomery.pod | 16 int BN_MONT_CTX_set(BN_MONT_CTX *mont, const BIGNUM *m, BN_CTX *ctx); 37 BN_MONT_CTX_set() sets up the I<mont> structure from the modulus I<m> 69 The inputs must be reduced modulo B<m>, otherwise the result will be
|
H A D | EC_GROUP_copy.pod | 153 For F2^m fields this will be the value m. 156 which will be either F2^m or Fp. 159 For a curve defined over Fp the discriminant is given by the formula 4*a^3 + 27*b^2 whilst for F2^m… 180 defined over an F2^m field. Addition and multiplication operations within an F2^m field are perform… 183 f(x) = x^m + x^k + 1 with m > k >= 1 187 f(x) = x^m + x^k3 + x^k2 + x^k1 + 1 with m > k3 > k2 > k1 >= 1 228 over GF(2^m), this is the irreducible polynomial defining the field.
|
H A D | RSA_meth_new.pod | 79 const BIGNUM *p, const BIGNUM *m, 83 const BIGNUM *p, const BIGNUM *m, 94 int (*RSA_meth_get_sign(const RSA_METHOD *meth))(int type, const unsigned char *m, 99 int (*sign)(int type, const unsigned char *m, 103 int (*RSA_meth_get_verify(const RSA_METHOD *meth))(int dtype, const unsigned char *m, 108 int (*verify)(int dtype, const unsigned char *m, 186 r = a ^ p mod m
|
H A D | DSA_meth_new.pod | 55 BIGNUM *m, BN_CTX *ctx, 60 BIGNUM *m, BN_CTX *ctx, 64 const BIGNUM *p, const BIGNUM *m, 70 const BIGNUM *m, 147 rr = a1^p1 * a2^p2 mod m 156 r = a ^ p mod m
|
H A D | SSL_CTX_set_split_send_fragment.pod | 18 long SSL_set_max_send_fragment(SSL *ssl, long m); 20 long SSL_CTX_set_max_pipelines(SSL_CTX *ctx, long m); 21 long SSL_set_max_pipelines(SSL_CTX *ssl, long m); 23 long SSL_CTX_set_split_send_fragment(SSL_CTX *ctx, long m); 24 long SSL_set_split_send_fragment(SSL *ssl, long m);
|
/openssl/crypto/bn/ |
H A D | bn_blind.c | 26 const BIGNUM *m, BN_CTX *ctx, BN_MONT_CTX *m_ctx); 234 const BIGNUM *e, BIGNUM *m, BN_CTX *ctx, in BN_BLINDING_create_param() argument 238 const BIGNUM *m, in BN_BLINDING_create_param() argument 247 ret = BN_BLINDING_new(NULL, NULL, m); in BN_BLINDING_create_param()
|
H A D | bn_prime.c | 341 BIGNUM *g, *w1, *w3, *x, *m, *z, *b; in ossl_bn_miller_rabin_is_prime() local 353 m = BN_CTX_get(ctx); in ossl_bn_miller_rabin_is_prime() 375 if (!BN_rshift(m, w1, a)) in ossl_bn_miller_rabin_is_prime() 405 if (!BN_mod_exp_mont(z, b, m, w, ctx, mont)) in ossl_bn_miller_rabin_is_prime() 460 BN_clear(m); in ossl_bn_miller_rabin_is_prime()
|
/openssl/fuzz/corpora/conf/ |
H A D | 6d5820ac9cd089fdb2f50feddf07059ccbf3e30a | 10 m::=
|
H A D | d1c3ccc41fd3a50079de51e5d3616a095fd7be3a | 10 m::=
|
/openssl/doc/man1/ |
H A D | openssl-version.pod.in | 20 [B<-m>] 68 =item B<-m>
|
/openssl/crypto/aes/asm/ |
H A D | aes-mips.pl | 1742 srl $tp4,$m,7 1744 subu $m,$tp4 1745 and $m,$x1b1b1b1b 1746 xor $tp2,$m 1750 srl $tp8,$m,7 1752 subu $m,$tp8 1753 and $m,$x1b1b1b1b 1754 xor $tp4,$m 1758 srl $tp9,$m,7 1760 subu $m,$tp9 [all …]
|
/openssl/crypto/sha/asm/ |
H A D | sha1-sparcv9a.pl | 336 my $m=($i%8)*2; 376 faligndata @X[$m],@X[$m+2],@X[$m] 383 fpadd32 $VK_00_19,@X[$m],%f20 400 std %f20,[$nXfer+`4*$m`]
|
/openssl/crypto/des/ |
H A D | set_key.c | 139 #define HPERM_OP(a,t,n,m) ((t)=((((a)<<(16-(n)))^(a))&(m)),\ argument
|
/openssl/ssl/ |
H A D | t1_enc.c | 160 const EVP_MD *m; in tls1_change_cipher_state() local 181 m = s->s3.tmp.new_hash; in tls1_change_cipher_state() 250 m, comp)) { in tls1_change_cipher_state() 331 || EVP_DigestSignInit_ex(mac_ctx, NULL, EVP_MD_get0_name(m), in tls1_change_cipher_state() 377 && !tls_provider_set_tls_params(s, dd, c, m)) { in tls1_change_cipher_state() 391 if (!ktls_check_supported_cipher(s, c, m, taglen)) in tls1_change_cipher_state() 423 if (!ktls_configure_crypto(sctx->libctx, s->version, c, m, rl_sequence, in tls1_change_cipher_state()
|
/openssl/test/recipes/91-test_pkey_check_data/ |
H A D | dhpkey.pem | 9 vr2QwKbZpvbwpT+GrQM8K6lTYSW2AqeV29b23KstGGRDxyF9nrTM2a+la+m+YCuy
|
/openssl/providers/implementations/ciphers/ |
H A D | cipher_sm4_ccm_hw.c | 22 CRYPTO_ccm128_init(&ctx->ccm_ctx, ctx->m, ctx->l, &actx->ks.ks, in ccm_sm4_initkey()
|
H A D | cipher_aria_ccm_hw.c | 22 CRYPTO_ccm128_init(&ctx->ccm_ctx, ctx->m, ctx->l, &actx->ks.ks, in ccm_aria_initkey()
|
/openssl/test/certs/ |
H A D | ee-codesign-serverauth.pem | 18 NjNoFebf6p842zU9EH8tF/m+CkCPAHpGOsrc1+bf77jpmX4=
|
H A D | ca-name2.pem | 12 hD18gJrJU5xNcvejUjANBgkqhkiG9w0BAQsFAAOCAQEAa+4h7d7XCtWfWLes/m+V
|
H A D | ee-cert.pem | 15 xOgAExfz3Tf/pjsLaha5aWH7NyCSKWC+lYkIOJ/Kb/m/6QsDJoXsEC8AhrPfqJhz
|
H A D | ee-cert-3072.pem | 18 m+08U/yWDOB9Hb9/tjmNyPMx4ttrhnsvTMwtEafYod0hTsDpyGpz0icjE6GrX/Y4
|
/openssl/test/recipes/15-test_dsaparam_data/valid/ |
H A D | p2048_q160_t1862_gind1.pem | 13 m+RhuXnP8UzBtsUdz+7Z+EioRB4=
|