/openssl/test/ |
H A D | priority_queue_test.c | 55 static size_t values[MAX_SAMPLES], sorted[MAX_SAMPLES], ref[MAX_SAMPLES]; in test_size_t_priority_queue_int() local 68 memset(values, 0, sizeof(values)); in test_size_t_priority_queue_int() 73 values[i] = random ? test_random() : (size_t)(count - i); in test_size_t_priority_queue_int() 74 memcpy(sorted, values, sizeof(*sorted) * count); in test_size_t_priority_queue_int() 78 memcpy(values, sorted, sizeof(*values) * count); in test_size_t_priority_queue_int() 80 qsort(values, count, sizeof(*values), &qsort_size_t_compare_rev); in test_size_t_priority_queue_int() 90 if (!TEST_true(ossl_pqueue_size_t_push(pq, values + i, ref + i))) in test_size_t_priority_queue_int() 100 if (values[i] != SIZE_MAX) { in test_size_t_priority_queue_int() 102 values + i)) in test_size_t_priority_queue_int() 104 values[i] = SIZE_MAX; in test_size_t_priority_queue_int() [all …]
|
/openssl/doc/man3/ |
H A D | DSA_SIG_new.pod | 22 values are erased before the memory is returned to the system. 24 DSA_SIG_get0() returns internal pointers to the B<r> and B<s> values contained 27 The B<r> and B<s> values can be set by calling DSA_SIG_set0() and passing the 28 new values for B<r> and B<s> as parameters to the function. Calling this 29 function transfers the memory management of the values to the DSA_SIG object, 30 and therefore the values that have been passed in should not be freed directly
|
H A D | DSA_get0_pqg.pod | 46 to NULL. Otherwise they are set to pointers to their respective values. These 47 point directly to the internal representations of the values and therefore 51 the new values for B<p>, B<q> and B<g> as parameters to the function. Calling 52 this function transfers the memory management of the values to the DSA object, 53 and therefore the values that have been passed in should not be freed directly 56 To get the public and private key values use the DSA_get0_key() function. A 60 be. The values point to the internal representation of the public key and 61 private key values. This memory should not be freed directly. 63 The public and private key values can be set using DSA_set0_key(). The public 67 this function transfers the memory management of the key values to the DSA [all …]
|
H A D | DH_get0_pqg.pod | 51 to NULL. Otherwise they are set to pointers to their respective values. These 52 point directly to the internal representations of the values and therefore 57 The I<p>, I<q> and I<g> values can be set by calling DH_set0_pqg() and passing 58 the new values for I<p>, I<q> and I<g> as parameters to the function. Calling 59 this function transfers the memory management of the values to the DH object, 68 To get the public and private key values use the DH_get0_key() function. A 72 be. The values point to the internal representation of the public key and 73 private key values. This memory should not be freed directly. 77 The public and private key values can be set using DH_set0_key(). Either 80 of the key values to the DH object, and therefore they should not be freed [all …]
|
H A D | X509_cmp.pod | 8 - compare X509 certificates and related values 25 certificates, X509 CRL objects and various values in an X509 certificate. 29 values of two B<X509> objects and the canonical (DER) encoding values. 34 canonical (DER) encoding values of the two objects using L<i2d_X509_NAME(3)>. 42 values in the given B<X509> objects I<a> and I<b>.
|
H A D | RSA_get0_key.pod | 76 their respective values. These point directly to the internal 77 representations of the values and therefore should not be freed 80 The B<n>, B<e> and B<d> parameter values can be set by calling 81 RSA_set0_key() and passing the new values for B<n>, B<e> and B<d> as 82 parameters to the function. The values B<n> and B<e> must be non-NULL 84 value B<d> may be NULL. On subsequent calls any of these values may be 86 Calling this function transfers the memory management of the values to 87 the RSA object, and therefore the values that have been passed in 97 ignore NULL parameters but return values for other, non-NULL, parameters. 101 return values are stored in an array of B<BIGNUM *>. RSA_set0_multi_prime_params() [all …]
|
H A D | ECDSA_SIG_new.pod | 56 ECDSA_SIG_get0() returns internal pointers the I<r> and I<s> values contained 61 The values I<r>, I<s> can also be retrieved separately by the corresponding 64 Non-NULL I<r> and I<s> values can be set on the I<sig> by calling 66 values to the B<ECDSA_SIG> object, and therefore the values that have been 99 The remaining functions utilise the internal I<kinv> and I<r> values used 106 (or NULL). The precomputed values or returned in I<kinv> and I<rp> and can be 110 I<dgst> using the private EC key I<eckey> and the optional pre-computed values
|
H A D | OPENSSL_instrument_bus.pod | 24 zeroed upon invocation (if you want to retrieve actual probe values). 31 periods when probe values appeared deterministic. The subroutine 42 Otherwise number of recorded values is returned.
|
H A D | SSL_get_client_random.pod | 9 - get internal TLS/SSL random values and get/set master key 51 These functions expose internal values from the TLS handshake, for 57 ARE NOT random number generators. Instead, they return the mostly-random values that 73 Finally, though the "client_random" and "server_random" values are called 75 values based on their view of the current time.
|
H A D | X509_ALGOR_dup.pod | 39 values for the message digest I<md>. 44 X509_ALGOR_copy() copies the source values into the dest structs; making 54 X509_ALGOR_get0() and X509_ALGOR_set_md() return no values.
|
H A D | ADMISSIONS.pod | 116 to those values within the object. 126 to those values within the object. 136 functions return pointers to those values within the object. 150 functions return pointers to those values within the object.
|
H A D | X509_NAME_print_ex.pod | 29 This supports multi-valued RDNs and escapes B</> and B<+> characters in values. 61 components and separate values in the same RDN for a multi-valued RDN. 80 separating field names and values. 83 printed instead of the values. 117 Otherwise, it returns -1 on error or other values on success.
|
H A D | o2i_SCT_LIST.pod | 23 treated and the return values. 27 All of the functions have return values consistent with those stated for
|
H A D | EVP_PKEY_CTX_get0_libctx.pod | 21 OSSL_LIB_CTX and property query string values respectively that were 32 if they are not set. The returned values should not be freed by the caller.
|
H A D | SSL_set_bio.pod | 42 If neither the B<rbio> or B<wbio> have changed from their previous values 49 previously set values then one reference is consumed for the rbio and one 72 same as the previously set value and the old B<rbio> and B<wbio> values 80 previously set value and the old B<rbio> and B<wbio> values were different
|
/openssl/crypto/x509/ |
H A D | v3_bcons.c | 25 STACK_OF(CONF_VALUE) *values); 57 STACK_OF(CONF_VALUE) *values) in v2i_BASIC_CONSTRAINTS() 67 for (i = 0; i < sk_CONF_VALUE_num(values); i++) { in v2i_BASIC_CONSTRAINTS() 68 val = sk_CONF_VALUE_value(values, i); in v2i_BASIC_CONSTRAINTS()
|
H A D | v3_pcons.c | 23 STACK_OF(CONF_VALUE) *values); 57 STACK_OF(CONF_VALUE) *values) in v2i_POLICY_CONSTRAINTS() 67 for (i = 0; i < sk_CONF_VALUE_num(values); i++) { in v2i_POLICY_CONSTRAINTS() 68 val = sk_CONF_VALUE_value(values, i); in v2i_POLICY_CONSTRAINTS()
|
H A D | v3_akid.c | 25 STACK_OF(CONF_VALUE) *values); 98 STACK_OF(CONF_VALUE) *values) in v2i_AUTHORITY_KEYID() 101 int i, n = sk_CONF_VALUE_num(values); in v2i_AUTHORITY_KEYID() 116 if (n == 1 && strcmp(sk_CONF_VALUE_value(values, 0)->name, "none") == 0) { in v2i_AUTHORITY_KEYID() 121 cnf = sk_CONF_VALUE_value(values, i); in v2i_AUTHORITY_KEYID()
|
/openssl/test/recipes/30-test_evp_data/ |
H A D | evpmac_siphash.txt | 14 # SIPHASH tests - default values: 2,4 rounds, 16-byte mac 129 # SIPHASH - default values: 2,4 rounds, explicit 8-byte mac 143 # SIPHASH - default values: 2,4 rounds, explicit 16-byte mac 151 # SIPHASH - default values: 2,4 rounds, explicit 16-byte mac (set as 0) 159 # SIPHASH - default values: 2,4 rounds, explicit 13-byte mac (invalid size) 166 # SIPHASH - default values: 2,4 rounds, explicit 13-byte mac (invalid size) 185 Title = SIPHASH - non-default values: 4,8 rounds
|
/openssl/apps/demoSRP/ |
H A D | srp_verifier.txt | 3 # records starting with a I followed by the g and N values and the id. 4 # The exact values ... you have to dig this out from the source of srp.c
|
/openssl/doc/man7/ |
H A D | EVP_PKEY-DH.pod | 36 with known values for I<p>, I<q> and I<g>. 38 The following values can be used by the OpenSSL's default and FIPS providers: 42 The following additional values can also be used by OpenSSL's default provider: 90 Sets the type of parameter generation. For B<DH> valid values are: 127 Where s is the security strength of the key which has values of 135 values used for FFC parameter generation are also required for parameter 136 validation. This means that optional FFC domain parameter values for 235 B<DER> data, additional values used during generation may be required to 240 the actual validation. In production code the return values should be checked.
|
/openssl/doc/internal/man3/ |
H A D | OSSL_TIME.pod | 94 time values. 96 B<ossl_time_min> returns the lesser of two time values. 98 B<ossl_time_max> returns the greater of two time values. 131 input time values. 133 B<ossl_time_min> and B<ossl_time_max> choose and return one of the input values.
|
H A D | ossl_DER_w_precompiled.pod | 19 the buffer held by I<pkt>. For example, precompiled values, such as 32 mean that the values given to the functions are invalid, such as the provided
|
/openssl/doc/man5/ |
H A D | x509v3_config.pod | 29 The format of B<values> depends on the value of B<name>, many have a 44 is a comma-separated list of names and values: 48 The long form allows the values to be placed in a separate section: 85 will only recognize the last value. To specify multiple values append a 132 the permitted key usages. The defined values are: C<digitalSignature>, 232 The B<email> option has two special values. 297 Possible values for access_id include B<OCSP> (OCSP responder), 341 values are: C<keyCompromise>, C<CACompromise>, C<affiliationChanged>, 391 values are: C<keyCompromise>, C<CACompromise>, C<affiliationChanged>, 541 Acceptable values for nsCertType are: B<client>, B<server>, B<email>, [all …]
|
/openssl/crypto/conf/ |
H A D | conf_mod.c | 120 STACK_OF(CONF_VALUE) *values; in CONF_modules_load() 147 values = NCONF_get_section(cnf, vsection); in CONF_modules_load() 149 if (values == NULL) { in CONF_modules_load() 162 for (i = 0; i < sk_CONF_VALUE_num(values); i++) { in CONF_modules_load() 163 vl = sk_CONF_VALUE_value(values, i); in CONF_modules_load()
|