Searched refs:big (Results 1 – 24 of 24) sorted by relevance
/openssl/doc/man3/ |
H A D | BN_bn2bin.pod | 44 BN_bn2bin() converts the absolute value of B<a> into big-endian form 48 BN_bn2binpad() also converts the absolute value of B<a> into big-endian form 53 BN_signed_bn2bin() converts the value of B<a> into big-endian signed 2's 60 BN_bin2bn() converts the positive integer in big-endian form of length 64 BN_signed_bin2bn() converts the integer in big-endian signed 2's complement 74 in native format, i.e. most significant byte first on big-endian platforms, 96 big-endian number, and the number itself in big-endian format, where 110 BN_bn2bin() returns the length of the big-endian number placed at B<to>.
|
H A D | BF_encrypt.pod | 101 platforms and big-endian on big-endian ones.
|
H A D | EVP_PKEY_set1_encoded_public_key.pod | 38 DH it should be encoded as a positive integer in big-endian form. For EC is
|
H A D | ASN1_STRING_length.pod | 75 character in big endian format, and for a UTF8String it will be in UTF8 format.
|
H A D | ASN1_INTEGER_get_int64.pod | 41 (due to invalid type or the value being too big to fit into an B<int64_t> type)
|
H A D | EVP_PKEY_gettable_params.pod | 87 EVP_PKEY_get_octet_string_param() if I<max_buf_sz> is not big enough to hold the
|
H A D | OBJ_nid2obj.pod | 163 not NULL and I<buf_len> is big enough, otherwise the total string length.
|
H A D | EC_POINT_new.pod | 175 not included. B<BIGNUM> form is the octet form interpreted as a big endian
|
H A D | OSSL_HPKE_CTX_new.pod | 435 OSSL_HPKE_get_public_encap_size() provides a way for senders to know how big 483 * this is big enough for this example, real code would need different
|
H A D | OSSL_PARAM_int.pod | 170 for defining UTF8 strings, OCTET strings and big numbers.
|
H A D | EVP_EncryptInit.pod | 650 keys of a specific form. I<key> must point to a buffer at least as big as the
|
/openssl/providers/implementations/kdfs/ |
H A D | kbkdf.c | 93 uint32_t big = 0; in be32() local 99 big |= (host & 0xff000000) >> 24; in be32() 100 big |= (host & 0x00ff0000) >> 8; in be32() 101 big |= (host & 0x0000ff00) << 8; in be32() 102 big |= (host & 0x000000ff) << 24; in be32() 103 return big; in be32()
|
/openssl/test/recipes/04-test_params_conversion_data/ |
H A D | native_types.txt | 313 # big 321 # big
|
/openssl/providers/implementations/ciphers/ |
H A D | cipher_aes_gcm_hw_s390x.inc | 139 * big-endian. 203 * success. Code is big-endian.
|
H A D | cipher_aes_ccm_hw_s390x.inc | 46 * Process additional authenticated data. Code is big-endian.
|
/openssl/test/recipes/80-test_cmp_http_data/ |
H A D | test_credentials.csv | 32 1,extracerts big file, -section,,BLANK,,BLANK,, -cert,signer.crt, -key,signer.p12, -keypass,pass:12…
|
/openssl/doc/man7/ |
H A D | passphrase-encoding.pod | 32 encoded in big endian (UCS-2 BE).
|
H A D | ossl-guide-migration.pod | 1689 formats are not individual big-endian integers.
|
/openssl/crypto/err/ |
H A D | openssl.txt | 576 DSO_R_FILENAME_TOO_BIG:101:filename too big 1236 RSA_R_DIGEST_TOO_BIG_FOR_RSA_KEY:112:digest too big for rsa key 1414 SSL_R_DTLS_MESSAGE_TOO_BIG:334:dtls message too big
|
/openssl/doc/designs/quic-design/ |
H A D | dgram-api.md | 398 QUIC implementation so probably not a big deal. We can always support
|
/openssl/crypto/aes/asm/ |
H A D | bsaes-armv8.pl | 1269 // x4 -> initial value of 128-bit counter (stored big-endian) which increments, modulo 2^32, for …
|
/openssl/test/recipes/30-test_evp_data/ |
H A D | evpciph_aes_common.txt | 648 # Self-generated vector to trigger false carry on big-endian platforms
|
/openssl/crypto/objects/ |
H A D | objects.txt | 1843 dstu4145le 1 1 : dstu4145be : DSTU 4145-2002 big endian
|
/openssl/ |
H A D | CHANGES.md | 6803 values of len that are too big and therefore p + len < limit. 8004 values of len that are too big and therefore p + len < limit. 16348 * Add configuration option to build on Linux on both big-endian and 18420 There are two big advantages in doing things this way. The extensions 18433 to garbage. This is because not salting is a big security hole, so people 20002 * DES quad checksum was broken on big-endian architectures. Fixed.
|
Completed in 84 milliseconds