Home
last modified time | relevance | path

Searched refs:big (Results 1 – 24 of 24) sorted by relevance

/openssl/doc/man3/
H A DBN_bn2bin.pod44 BN_bn2bin() converts the absolute value of B<a> into big-endian form
48 BN_bn2binpad() also converts the absolute value of B<a> into big-endian form
53 BN_signed_bn2bin() converts the value of B<a> into big-endian signed 2's
60 BN_bin2bn() converts the positive integer in big-endian form of length
64 BN_signed_bin2bn() converts the integer in big-endian signed 2's complement
74 in native format, i.e. most significant byte first on big-endian platforms,
96 big-endian number, and the number itself in big-endian format, where
110 BN_bn2bin() returns the length of the big-endian number placed at B<to>.
H A DBF_encrypt.pod101 platforms and big-endian on big-endian ones.
H A DEVP_PKEY_set1_encoded_public_key.pod38 DH it should be encoded as a positive integer in big-endian form. For EC is
H A DASN1_STRING_length.pod75 character in big endian format, and for a UTF8String it will be in UTF8 format.
H A DASN1_INTEGER_get_int64.pod41 (due to invalid type or the value being too big to fit into an B<int64_t> type)
H A DEVP_PKEY_gettable_params.pod87 EVP_PKEY_get_octet_string_param() if I<max_buf_sz> is not big enough to hold the
H A DOBJ_nid2obj.pod163 not NULL and I<buf_len> is big enough, otherwise the total string length.
H A DEC_POINT_new.pod175 not included. B<BIGNUM> form is the octet form interpreted as a big endian
H A DOSSL_HPKE_CTX_new.pod435 OSSL_HPKE_get_public_encap_size() provides a way for senders to know how big
483 * this is big enough for this example, real code would need different
H A DOSSL_PARAM_int.pod170 for defining UTF8 strings, OCTET strings and big numbers.
H A DEVP_EncryptInit.pod650 keys of a specific form. I<key> must point to a buffer at least as big as the
/openssl/providers/implementations/kdfs/
H A Dkbkdf.c93 uint32_t big = 0; in be32() local
99 big |= (host & 0xff000000) >> 24; in be32()
100 big |= (host & 0x00ff0000) >> 8; in be32()
101 big |= (host & 0x0000ff00) << 8; in be32()
102 big |= (host & 0x000000ff) << 24; in be32()
103 return big; in be32()
/openssl/test/recipes/04-test_params_conversion_data/
H A Dnative_types.txt313 # big
321 # big
/openssl/providers/implementations/ciphers/
H A Dcipher_aes_gcm_hw_s390x.inc139 * big-endian.
203 * success. Code is big-endian.
H A Dcipher_aes_ccm_hw_s390x.inc46 * Process additional authenticated data. Code is big-endian.
/openssl/test/recipes/80-test_cmp_http_data/
H A Dtest_credentials.csv32 1,extracerts big file, -section,,BLANK,,BLANK,, -cert,signer.crt, -key,signer.p12, -keypass,pass:12…
/openssl/doc/man7/
H A Dpassphrase-encoding.pod32 encoded in big endian (UCS-2 BE).
H A Dossl-guide-migration.pod1689 formats are not individual big-endian integers.
/openssl/crypto/err/
H A Dopenssl.txt576 DSO_R_FILENAME_TOO_BIG:101:filename too big
1236 RSA_R_DIGEST_TOO_BIG_FOR_RSA_KEY:112:digest too big for rsa key
1414 SSL_R_DTLS_MESSAGE_TOO_BIG:334:dtls message too big
/openssl/doc/designs/quic-design/
H A Ddgram-api.md398 QUIC implementation so probably not a big deal. We can always support
/openssl/crypto/aes/asm/
H A Dbsaes-armv8.pl1269 // x4 -> initial value of 128-bit counter (stored big-endian) which increments, modulo 2^32, for …
/openssl/test/recipes/30-test_evp_data/
H A Devpciph_aes_common.txt648 # Self-generated vector to trigger false carry on big-endian platforms
/openssl/crypto/objects/
H A Dobjects.txt1843 dstu4145le 1 1 : dstu4145be : DSTU 4145-2002 big endian
/openssl/
H A DCHANGES.md6803 values of len that are too big and therefore p + len < limit.
8004 values of len that are too big and therefore p + len < limit.
16348 * Add configuration option to build on Linux on both big-endian and
18420 There are two big advantages in doing things this way. The extensions
18433 to garbage. This is because not salting is a big security hole, so people
20002 * DES quad checksum was broken on big-endian architectures. Fixed.

Completed in 84 milliseconds