Home
last modified time | relevance | path

Searched refs:values (Results 1 – 25 of 316) sorted by relevance

12345678910>>...13

/openssl/test/
H A Dpriority_queue_test.c55 static size_t values[MAX_SAMPLES], sorted[MAX_SAMPLES], ref[MAX_SAMPLES]; in test_size_t_priority_queue_int() local
68 memset(values, 0, sizeof(values)); in test_size_t_priority_queue_int()
73 values[i] = random ? test_random() : (size_t)(count - i); in test_size_t_priority_queue_int()
74 memcpy(sorted, values, sizeof(*sorted) * count); in test_size_t_priority_queue_int()
78 memcpy(values, sorted, sizeof(*values) * count); in test_size_t_priority_queue_int()
80 qsort(values, count, sizeof(*values), &qsort_size_t_compare_rev); in test_size_t_priority_queue_int()
90 if (!TEST_true(ossl_pqueue_size_t_push(pq, values + i, ref + i))) in test_size_t_priority_queue_int()
100 if (values[i] != SIZE_MAX) { in test_size_t_priority_queue_int()
102 values + i)) in test_size_t_priority_queue_int()
104 values[i] = SIZE_MAX; in test_size_t_priority_queue_int()
[all …]
/openssl/doc/man3/
H A DDSA_SIG_new.pod22 values are erased before the memory is returned to the system.
24 DSA_SIG_get0() returns internal pointers to the B<r> and B<s> values contained
27 The B<r> and B<s> values can be set by calling DSA_SIG_set0() and passing the
28 new values for B<r> and B<s> as parameters to the function. Calling this
29 function transfers the memory management of the values to the DSA_SIG object,
30 and therefore the values that have been passed in should not be freed directly
H A DDSA_get0_pqg.pod46 to NULL. Otherwise they are set to pointers to their respective values. These
47 point directly to the internal representations of the values and therefore
51 the new values for B<p>, B<q> and B<g> as parameters to the function. Calling
52 this function transfers the memory management of the values to the DSA object,
53 and therefore the values that have been passed in should not be freed directly
56 To get the public and private key values use the DSA_get0_key() function. A
60 be. The values point to the internal representation of the public key and
61 private key values. This memory should not be freed directly.
63 The public and private key values can be set using DSA_set0_key(). The public
67 this function transfers the memory management of the key values to the DSA
[all …]
H A DDH_get0_pqg.pod51 to NULL. Otherwise they are set to pointers to their respective values. These
52 point directly to the internal representations of the values and therefore
57 The I<p>, I<q> and I<g> values can be set by calling DH_set0_pqg() and passing
58 the new values for I<p>, I<q> and I<g> as parameters to the function. Calling
59 this function transfers the memory management of the values to the DH object,
68 To get the public and private key values use the DH_get0_key() function. A
72 be. The values point to the internal representation of the public key and
73 private key values. This memory should not be freed directly.
77 The public and private key values can be set using DH_set0_key(). Either
80 of the key values to the DH object, and therefore they should not be freed
[all …]
H A DX509_cmp.pod8 - compare X509 certificates and related values
25 certificates, X509 CRL objects and various values in an X509 certificate.
29 values of two B<X509> objects and the canonical (DER) encoding values.
34 canonical (DER) encoding values of the two objects using L<i2d_X509_NAME(3)>.
42 values in the given B<X509> objects I<a> and I<b>.
H A DRSA_get0_key.pod76 their respective values. These point directly to the internal
77 representations of the values and therefore should not be freed
80 The B<n>, B<e> and B<d> parameter values can be set by calling
81 RSA_set0_key() and passing the new values for B<n>, B<e> and B<d> as
82 parameters to the function. The values B<n> and B<e> must be non-NULL
84 value B<d> may be NULL. On subsequent calls any of these values may be
86 Calling this function transfers the memory management of the values to
87 the RSA object, and therefore the values that have been passed in
97 ignore NULL parameters but return values for other, non-NULL, parameters.
101 return values are stored in an array of B<BIGNUM *>. RSA_set0_multi_prime_params()
[all …]
H A DECDSA_SIG_new.pod56 ECDSA_SIG_get0() returns internal pointers the I<r> and I<s> values contained
61 The values I<r>, I<s> can also be retrieved separately by the corresponding
64 Non-NULL I<r> and I<s> values can be set on the I<sig> by calling
66 values to the B<ECDSA_SIG> object, and therefore the values that have been
99 The remaining functions utilise the internal I<kinv> and I<r> values used
106 (or NULL). The precomputed values or returned in I<kinv> and I<rp> and can be
110 I<dgst> using the private EC key I<eckey> and the optional pre-computed values
H A DOPENSSL_instrument_bus.pod24 zeroed upon invocation (if you want to retrieve actual probe values).
31 periods when probe values appeared deterministic. The subroutine
42 Otherwise number of recorded values is returned.
H A DSSL_get_client_random.pod9 - get internal TLS/SSL random values and get/set master key
51 These functions expose internal values from the TLS handshake, for
57 ARE NOT random number generators. Instead, they return the mostly-random values that
73 Finally, though the "client_random" and "server_random" values are called
75 values based on their view of the current time.
H A DX509_ALGOR_dup.pod39 values for the message digest I<md>.
44 X509_ALGOR_copy() copies the source values into the dest structs; making
54 X509_ALGOR_get0() and X509_ALGOR_set_md() return no values.
H A DADMISSIONS.pod116 to those values within the object.
126 to those values within the object.
136 functions return pointers to those values within the object.
150 functions return pointers to those values within the object.
H A DX509_NAME_print_ex.pod29 This supports multi-valued RDNs and escapes B</> and B<+> characters in values.
61 components and separate values in the same RDN for a multi-valued RDN.
80 separating field names and values.
83 printed instead of the values.
117 Otherwise, it returns -1 on error or other values on success.
H A Do2i_SCT_LIST.pod23 treated and the return values.
27 All of the functions have return values consistent with those stated for
H A DEVP_PKEY_CTX_get0_libctx.pod21 OSSL_LIB_CTX and property query string values respectively that were
32 if they are not set. The returned values should not be freed by the caller.
H A DSSL_set_bio.pod42 If neither the B<rbio> or B<wbio> have changed from their previous values
49 previously set values then one reference is consumed for the rbio and one
72 same as the previously set value and the old B<rbio> and B<wbio> values
80 previously set value and the old B<rbio> and B<wbio> values were different
/openssl/crypto/x509/
H A Dv3_bcons.c25 STACK_OF(CONF_VALUE) *values);
57 STACK_OF(CONF_VALUE) *values) in v2i_BASIC_CONSTRAINTS()
67 for (i = 0; i < sk_CONF_VALUE_num(values); i++) { in v2i_BASIC_CONSTRAINTS()
68 val = sk_CONF_VALUE_value(values, i); in v2i_BASIC_CONSTRAINTS()
H A Dv3_pcons.c23 STACK_OF(CONF_VALUE) *values);
57 STACK_OF(CONF_VALUE) *values) in v2i_POLICY_CONSTRAINTS()
67 for (i = 0; i < sk_CONF_VALUE_num(values); i++) { in v2i_POLICY_CONSTRAINTS()
68 val = sk_CONF_VALUE_value(values, i); in v2i_POLICY_CONSTRAINTS()
H A Dv3_akid.c25 STACK_OF(CONF_VALUE) *values);
98 STACK_OF(CONF_VALUE) *values) in v2i_AUTHORITY_KEYID()
101 int i, n = sk_CONF_VALUE_num(values); in v2i_AUTHORITY_KEYID()
116 if (n == 1 && strcmp(sk_CONF_VALUE_value(values, 0)->name, "none") == 0) { in v2i_AUTHORITY_KEYID()
121 cnf = sk_CONF_VALUE_value(values, i); in v2i_AUTHORITY_KEYID()
/openssl/test/recipes/30-test_evp_data/
H A Devpmac_siphash.txt14 # SIPHASH tests - default values: 2,4 rounds, 16-byte mac
129 # SIPHASH - default values: 2,4 rounds, explicit 8-byte mac
143 # SIPHASH - default values: 2,4 rounds, explicit 16-byte mac
151 # SIPHASH - default values: 2,4 rounds, explicit 16-byte mac (set as 0)
159 # SIPHASH - default values: 2,4 rounds, explicit 13-byte mac (invalid size)
166 # SIPHASH - default values: 2,4 rounds, explicit 13-byte mac (invalid size)
185 Title = SIPHASH - non-default values: 4,8 rounds
/openssl/apps/demoSRP/
H A Dsrp_verifier.txt3 # records starting with a I followed by the g and N values and the id.
4 # The exact values ... you have to dig this out from the source of srp.c
/openssl/doc/man7/
H A DEVP_PKEY-DH.pod36 with known values for I<p>, I<q> and I<g>.
38 The following values can be used by the OpenSSL's default and FIPS providers:
42 The following additional values can also be used by OpenSSL's default provider:
90 Sets the type of parameter generation. For B<DH> valid values are:
127 Where s is the security strength of the key which has values of
135 values used for FFC parameter generation are also required for parameter
136 validation. This means that optional FFC domain parameter values for
235 B<DER> data, additional values used during generation may be required to
240 the actual validation. In production code the return values should be checked.
/openssl/doc/internal/man3/
H A DOSSL_TIME.pod94 time values.
96 B<ossl_time_min> returns the lesser of two time values.
98 B<ossl_time_max> returns the greater of two time values.
131 input time values.
133 B<ossl_time_min> and B<ossl_time_max> choose and return one of the input values.
H A Dossl_DER_w_precompiled.pod19 the buffer held by I<pkt>. For example, precompiled values, such as
32 mean that the values given to the functions are invalid, such as the provided
/openssl/doc/man5/
H A Dx509v3_config.pod29 The format of B<values> depends on the value of B<name>, many have a
44 is a comma-separated list of names and values:
48 The long form allows the values to be placed in a separate section:
85 will only recognize the last value. To specify multiple values append a
132 the permitted key usages. The defined values are: C<digitalSignature>,
232 The B<email> option has two special values.
297 Possible values for access_id include B<OCSP> (OCSP responder),
341 values are: C<keyCompromise>, C<CACompromise>, C<affiliationChanged>,
391 values are: C<keyCompromise>, C<CACompromise>, C<affiliationChanged>,
541 Acceptable values for nsCertType are: B<client>, B<server>, B<email>,
[all …]
/openssl/crypto/conf/
H A Dconf_mod.c120 STACK_OF(CONF_VALUE) *values; in CONF_modules_load()
147 values = NCONF_get_section(cnf, vsection); in CONF_modules_load()
149 if (values == NULL) { in CONF_modules_load()
162 for (i = 0; i < sk_CONF_VALUE_num(values); i++) { in CONF_modules_load()
163 vl = sk_CONF_VALUE_value(values, i); in CONF_modules_load()

Completed in 80 milliseconds

12345678910>>...13