Home
last modified time | relevance | path

Searched refs:at (Results 1 – 25 of 1100) sorted by relevance

12345678910>>...44

/openssl/crypto/bn/asm/
H A Dmips.pl187 sltu $at,$t1,$at
200 sltu $at,$t3,$at
214 sltu $at,$ta1,$at
226 sltu $at,$ta3,$at
247 sltu $at,$t1,$at
262 sltu $at,$t1,$at
276 sltu $at,$t1,$at
938 or $a0,$at
963 or $t3,$at
972 or $at,$t2
[all …]
H A Dmips-mont.pl144 slt $at,$num,4
145 bnez $at,1f
187 li $at,-4096
189 and $sp,$at
209 $ADDU $hi1,$at
236 $ADDU $hi1,$at
256 $ADDU $hi1,$at
282 $ADDU $hi0,$at
296 $ADDU $hi1,$at
326 $ADDU $hi0,$at
[all …]
/openssl/test/
H A Dtime_offset_test.c69 ASN1_TIME at; in test_offset() local
74 at.data = (unsigned char*)testdata->data; in test_offset()
75 at.length = strlen(testdata->data); in test_offset()
76 at.type = testdata->type; in test_offset()
77 at.flags = 0; in test_offset()
79 if (!TEST_true(ASN1_TIME_diff(&day, &sec, &the_asn1_time, &at))) { in test_offset()
80 TEST_info("ASN1_TIME_diff() failed for %s\n", at.data); in test_offset()
95 TEST_info("ASN1_TIME_diff() test failed for %s day=%d sec=%d\n", at.data, day, sec); in test_offset()
99 ret = ASN1_TIME_cmp_time_t(&at, the_time); in test_offset()
102 TEST_info("ASN1_UTCTIME_cmp_time_t() test failed for %s\n", at.data); in test_offset()
H A Ddata2.bin13 vitae justo eget. Enim tortor at auctor urna nunc id. Laoreet non
16 scelerisque felis imperdiet proin fermentum. Semper quis lectus nulla at
18 Augue ut lectus arcu bibendum at varius vel pharetra. Nisl nunc mi ipsum
31 Sed arcu non odio euismod lacinia at. Enim praesent elementum facilisis
33 arcu. Arcu dictum varius duis at. Pretium lectus quam id leo in vitae.
38 lacus vestibulum. Urna molestie at elementum eu. Mi in nulla posuere
53 aliquam sem fringilla ut. Viverra accumsan in nisl nisi. Nam at lectus
56 Aliquet enim tortor at auctor urna nunc id cursus metus. Sit amet luctus
/openssl/doc/internal/man3/
H A Dossl_rand_get_entropy.pod27 The seeding material will have at least I<entropy> bytes of randomness and is
28 stored in a buffer which contains at least I<min_len> and at most I<max_len>
40 The output is stored in a buffer which contains at least I<min_len> and at
63 in the file LICENSE in the source distribution or at
/openssl/crypto/cms/
H A Dcms_att.c213 X509_ATTRIBUTE *at; in cms_attrib_get() local
220 at = X509at_get_attr(attrs, loc); in cms_attrib_get()
222 return at; in cms_attrib_get()
230 X509_ATTRIBUTE *at = cms_attrib_get(nid, attrs, &lastpos); in cms_check_attribute() local
232 if (at != NULL) { in cms_check_attribute()
233 int count = X509_ATTRIBUTE_count(at); in cms_check_attribute()
/openssl/apps/
H A Dasn1parse.c63 ASN1_TYPE *at = NULL; in asn1parse_main() local
242 atmp = at; in asn1parse_main()
244 at = d2i_ASN1_TYPE(NULL, &ctmpbuf, tmplen); in asn1parse_main()
246 if (!at) { in asn1parse_main()
251 typ = ASN1_TYPE_get(at); in asn1parse_main()
260 tmpbuf = at->value.asn1_string->data; in asn1parse_main()
261 tmplen = at->value.asn1_string->length; in asn1parse_main()
312 ASN1_TYPE_free(at); in asn1parse_main()
/openssl/doc/man3/
H A DRAND_egd.pod21 The protocol used is defined by the EGDs available at
24 RAND_egd_bytes() requests B<num> bytes of randomness from an EGD at the
28 RAND_query_egd_bytes() requests B<num> bytes of randomness from an EGD at
34 OpenSSL can be configured at build time to try to use the EGD for seeding
58 in the file LICENSE in the source distribution or at
H A DBN_bn2bin.pod45 and stores it at B<to>. B<to> must point to BN_num_bytes(B<a>) bytes of
49 and stores it at B<to>. B<tolen> indicates the length of the output buffer
54 complements form and stores it at B<to>. B<tolen> indicates the length of
61 B<len> at B<s> into a B<BIGNUM> and places it in B<ret>. If B<ret> is
65 form of length B<len> at B<s> into a B<BIGNUM> and places it in B<ret>. If
100 BN_bn2mpi() stores the representation of B<a> at B<to>, where B<to>
104 BN_mpi2bn() converts the B<len> bytes long representation at B<s> to
105 a B<BIGNUM> and stores it at B<ret>, or in a newly allocated B<BIGNUM>
110 BN_bn2bin() returns the length of the big-endian number placed at B<to>.
141 in the file LICENSE in the source distribution or at
H A DSSL_SESSION_get_time.pod26 SSL_SESSION_get_time() returns the time at which the session B<s> was
45 Both are set at creation time of the session to the actual time and the
46 default timeout value at creation, respectively, as set by
73 in the file LICENSE in the source distribution or at
H A DBIO_f_base64.pod25 characters and there is always a newline at the end of output.
27 For reading, first line should be at most 1024
30 at the end of input.
40 newline at the end.
100 in the file LICENSE in the source distribution or at
H A DERR_error_string.pod26 error code I<e>, and places it at I<buf>. I<buf> must be at least 256
33 at most I<len> characters (including the terminating 0)
78 in the file LICENSE in the source distribution or at
H A DBIO_socket_wait.pod23 else for writing, at most until B<max_time>.
26 BIO_wait() waits at most until B<max_time> on the given (typically socket-based)
31 at most the given B<nap_milliseconds> in order to avoid a tight busy loop.
66 in the file LICENSE in the source distribution or at
H A DRC4_set_key.pod38 key at B<data>.
40 RC4() encrypts or decrypts the B<len> bytes of data at B<indata> using
41 B<key> and places the result at B<outdata>. Repeated RC4() calls with
75 in the file LICENSE in the source distribution or at
H A DRSA_private_encrypt.pod28 These functions handle RSA signatures at a low-level.
30 RSA_private_encrypt() signs the B<flen> bytes at B<from> (usually a
55 bytes long signature at B<from> using the signer's public key
85 in the file LICENSE in the source distribution or at
H A DOSSL_CRMF_pbmp_new.pod48 RFC 4210 recommends that the salt SHOULD be at least 8 bytes (64 bits) long,
51 The iteration count must be at least 100, as stipulated by RFC 4211, and is
52 limited to at most 100000 to avoid DoS through manipulated or otherwise
89 in the file LICENSE in the source distribution or at
H A DEVP_SignInit.pod31 EVP_SignUpdate() hashes I<cnt> bytes of data at I<d> into the
38 I<pkey>. I<sig> must be at least C<EVP_PKEY_get_size(pkey)> bytes in size.
41 will be written to the integer at I<s>, at most C<EVP_PKEY_get_size(pkey)>
110 in the file LICENSE in the source distribution or at
H A DBF_encrypt.pod54 at B<data>.
59 or decryption (B<BF_DECRYPT>) shall be performed. The vector pointed at by
81 decryption (BF_DECRYPT) shall be performed. B<ivec> must point at an 8 byte
87 or decryption (B<BF_DECRYPT>) shall be performed. B<ivec> must point at an
88 8 byte long initialization vector. B<num> must point at an integer which must
128 in the file LICENSE in the source distribution or at
H A DSSL_CTX_set_security_level.pod80 that signatures using SHA1 and MD5 are also forbidden at this level as they
82 DTLS 1.0 are all disabled at this level.
124 for example) could not be checked at all.
141 of security requires the use of RSA keys of at least 15360 bits in size.
151 or a certificate with a signature with SHA1 digest at level 1 using
154 not set at all because it had been rejected.
186 in the file LICENSE in the source distribution or at
/openssl/doc/man7/
H A DEVP_MAC-BLAKE2.pod42 It may be at most 64 bytes for BLAKE2BMAC or 32 for BLAKE2SMAC and at
49 It is an optional value of at most 16 bytes for BLAKE2BMAC or 8 for
55 It is an optional value of at most 16 bytes for BLAKE2BMAC or 8 for
87 in the file LICENSE in the source distribution or at
H A DEVP_KDF-PBKDF2.pod50 =item - the iteration count is at least 1000.
52 =item - the salt length is at least 128 bits.
54 =item - the derived key length is at least 112 bits.
101 in the file LICENSE in the source distribution or at
/openssl/test/recipes/30-test_evp_data/
H A Devppkey_ecc.txt82 Reason=point at infinity
90 Reason=point at infinity
160 Reason=point at infinity
168 Reason=point at infinity
238 Reason=point at infinity
246 Reason=point at infinity
316 Reason=point at infinity
324 Reason=point at infinity
396 Reason=point at infinity
404 Reason=point at infinity
[all …]
/openssl/crypto/x509/
H A Dt_req.c115 ASN1_TYPE *at; in X509_REQ_print_ex() local
135 at = X509_ATTRIBUTE_get0_type(a, ii); in X509_REQ_print_ex()
136 type = at->type; in X509_REQ_print_ex()
137 bs = at->value.asn1_string; in X509_REQ_print_ex()
/openssl/external/perl/Text-Template-1.56/
H A DChanges129 Note that the default message used to report the line number at which the
130 program fragment began; it now reports the line number at which the error
142 - Note that the default message used to report the line number at which the
143 program fragment began; it now reports the line number at which the error
159 line number of the template at which the error occurred:
161 Illegal division by zero at template line 37.
165 Illegal division by zero at catalog.tmpl line 37.
177 line number of the template at which the error occurred:
179 Illegal division by zero at template line 37.
183 Illegal division by zero at catalog.tmpl line 37.
[all …]
/openssl/crypto/perlasm/
H A DREADME.md22 `&asm_finish()` which should be called at the end.
41 &function_end(name) Call at end of function.
44 &function_end_B(name) Call at end but with pop or ret.
51 &set_label("loop") Set a label at this point.

Completed in 52 milliseconds

12345678910>>...44