Home
last modified time | relevance | path

Searched refs:m (Results 76 – 100 of 183) sorted by relevance

12345678

/openssl/crypto/ffc/
H A Dffc_params_generate.c319 int m = *retm; in generate_q_fips186_4() local
327 if (!BN_GENCB_call(cb, 0, m++)) in generate_q_fips186_4()
382 *retm = m; in generate_q_fips186_4()
393 int i, r, ret = 0, m = *retm; in generate_q_fips186_2() local
399 if (!BN_GENCB_call(cb, 0, m++)) in generate_q_fips186_2()
442 *retm = m; in generate_q_fips186_2()
525 int n = 0, m = 0, qsize; in ossl_ffc_params_FIPS186_4_gen_verify() local
684 seed != params->seed, &m, res, cb)) in ossl_ffc_params_FIPS186_4_gen_verify()
818 int n = 0, m = 0; in ossl_ffc_params_FIPS186_2_gen_verify() local
931 use_random_seed, &m, res, cb)) in ossl_ffc_params_FIPS186_2_gen_verify()
/openssl/crypto/asn1/
H A Da_time.c56 int m = tm->tm_mon; in determine_days() local
60 tm->tm_yday = ydays[m] + d - 1; in determine_days()
61 if (m >= 2) { in determine_days()
64 m += 2; in determine_days()
67 m += 14; in determine_days()
73 tm->tm_wday = (d + (13 * m) / 5 + y + y / 4 + c / 4 + 5 * c + 6) % 7; in determine_days()
/openssl/crypto/property/
H A Dproperty_parse.c31 static int match_ch(const char *t[], char m) in match_ch() argument
35 if (*s == m) { in match_ch()
42 #define MATCH(s, m) match(s, m, sizeof(m) - 1) argument
44 static int match(const char *t[], const char m[], size_t m_len) in match() argument
48 if (OPENSSL_strncasecmp(s, m, m_len) == 0) { in match()
/openssl/doc/man3/
H A DBN_mod_mul_montgomery.pod16 int BN_MONT_CTX_set(BN_MONT_CTX *mont, const BIGNUM *m, BN_CTX *ctx);
37 BN_MONT_CTX_set() sets up the I<mont> structure from the modulus I<m>
69 The inputs must be reduced modulo B<m>, otherwise the result will be
H A DEC_GROUP_copy.pod153 For F2^m fields this will be the value m.
156 which will be either F2^m or Fp.
159 For a curve defined over Fp the discriminant is given by the formula 4*a^3 + 27*b^2 whilst for F2^m
180 defined over an F2^m field. Addition and multiplication operations within an F2^m field are perform…
183 f(x) = x^m + x^k + 1 with m > k >= 1
187 f(x) = x^m + x^k3 + x^k2 + x^k1 + 1 with m > k3 > k2 > k1 >= 1
228 over GF(2^m), this is the irreducible polynomial defining the field.
H A DRSA_meth_new.pod79 const BIGNUM *p, const BIGNUM *m,
83 const BIGNUM *p, const BIGNUM *m,
94 int (*RSA_meth_get_sign(const RSA_METHOD *meth))(int type, const unsigned char *m,
99 int (*sign)(int type, const unsigned char *m,
103 int (*RSA_meth_get_verify(const RSA_METHOD *meth))(int dtype, const unsigned char *m,
108 int (*verify)(int dtype, const unsigned char *m,
186 r = a ^ p mod m
H A DDSA_meth_new.pod55 BIGNUM *m, BN_CTX *ctx,
60 BIGNUM *m, BN_CTX *ctx,
64 const BIGNUM *p, const BIGNUM *m,
70 const BIGNUM *m,
147 rr = a1^p1 * a2^p2 mod m
156 r = a ^ p mod m
H A DSSL_CTX_set_split_send_fragment.pod18 long SSL_set_max_send_fragment(SSL *ssl, long m);
20 long SSL_CTX_set_max_pipelines(SSL_CTX *ctx, long m);
21 long SSL_set_max_pipelines(SSL_CTX *ssl, long m);
23 long SSL_CTX_set_split_send_fragment(SSL_CTX *ctx, long m);
24 long SSL_set_split_send_fragment(SSL *ssl, long m);
/openssl/crypto/bn/
H A Dbn_blind.c26 const BIGNUM *m, BN_CTX *ctx, BN_MONT_CTX *m_ctx);
234 const BIGNUM *e, BIGNUM *m, BN_CTX *ctx, in BN_BLINDING_create_param() argument
238 const BIGNUM *m, in BN_BLINDING_create_param() argument
247 ret = BN_BLINDING_new(NULL, NULL, m); in BN_BLINDING_create_param()
H A Dbn_prime.c341 BIGNUM *g, *w1, *w3, *x, *m, *z, *b; in ossl_bn_miller_rabin_is_prime() local
353 m = BN_CTX_get(ctx); in ossl_bn_miller_rabin_is_prime()
375 if (!BN_rshift(m, w1, a)) in ossl_bn_miller_rabin_is_prime()
405 if (!BN_mod_exp_mont(z, b, m, w, ctx, mont)) in ossl_bn_miller_rabin_is_prime()
460 BN_clear(m); in ossl_bn_miller_rabin_is_prime()
/openssl/fuzz/corpora/conf/
H A D6d5820ac9cd089fdb2f50feddf07059ccbf3e30a10 m::=
H A Dd1c3ccc41fd3a50079de51e5d3616a095fd7be3a10 m::=
/openssl/doc/man1/
H A Dopenssl-version.pod.in20 [B<-m>]
68 =item B<-m>
/openssl/crypto/aes/asm/
H A Daes-mips.pl1742 srl $tp4,$m,7
1744 subu $m,$tp4
1745 and $m,$x1b1b1b1b
1746 xor $tp2,$m
1750 srl $tp8,$m,7
1752 subu $m,$tp8
1753 and $m,$x1b1b1b1b
1754 xor $tp4,$m
1758 srl $tp9,$m,7
1760 subu $m,$tp9
[all …]
/openssl/crypto/sha/asm/
H A Dsha1-sparcv9a.pl336 my $m=($i%8)*2;
376 faligndata @X[$m],@X[$m+2],@X[$m]
383 fpadd32 $VK_00_19,@X[$m],%f20
400 std %f20,[$nXfer+`4*$m`]
/openssl/crypto/des/
H A Dset_key.c139 #define HPERM_OP(a,t,n,m) ((t)=((((a)<<(16-(n)))^(a))&(m)),\ argument
/openssl/ssl/
H A Dt1_enc.c160 const EVP_MD *m; in tls1_change_cipher_state() local
181 m = s->s3.tmp.new_hash; in tls1_change_cipher_state()
250 m, comp)) { in tls1_change_cipher_state()
331 || EVP_DigestSignInit_ex(mac_ctx, NULL, EVP_MD_get0_name(m), in tls1_change_cipher_state()
377 && !tls_provider_set_tls_params(s, dd, c, m)) { in tls1_change_cipher_state()
391 if (!ktls_check_supported_cipher(s, c, m, taglen)) in tls1_change_cipher_state()
423 if (!ktls_configure_crypto(sctx->libctx, s->version, c, m, rl_sequence, in tls1_change_cipher_state()
/openssl/test/recipes/91-test_pkey_check_data/
H A Ddhpkey.pem9 vr2QwKbZpvbwpT+GrQM8K6lTYSW2AqeV29b23KstGGRDxyF9nrTM2a+la+m+YCuy
/openssl/providers/implementations/ciphers/
H A Dcipher_sm4_ccm_hw.c22 CRYPTO_ccm128_init(&ctx->ccm_ctx, ctx->m, ctx->l, &actx->ks.ks, in ccm_sm4_initkey()
H A Dcipher_aria_ccm_hw.c22 CRYPTO_ccm128_init(&ctx->ccm_ctx, ctx->m, ctx->l, &actx->ks.ks, in ccm_aria_initkey()
/openssl/test/certs/
H A Dee-codesign-serverauth.pem18 NjNoFebf6p842zU9EH8tF/m+CkCPAHpGOsrc1+bf77jpmX4=
H A Dca-name2.pem12 hD18gJrJU5xNcvejUjANBgkqhkiG9w0BAQsFAAOCAQEAa+4h7d7XCtWfWLes/m+V
H A Dee-cert.pem15 xOgAExfz3Tf/pjsLaha5aWH7NyCSKWC+lYkIOJ/Kb/m/6QsDJoXsEC8AhrPfqJhz
H A Dee-cert-3072.pem18 m+08U/yWDOB9Hb9/tjmNyPMx4ttrhnsvTMwtEafYod0hTsDpyGpz0icjE6GrX/Y4
/openssl/test/recipes/15-test_dsaparam_data/valid/
H A Dp2048_q160_t1862_gind1.pem13 m+RhuXnP8UzBtsUdz+7Z+EioRB4=

Completed in 62 milliseconds

12345678