/openssl/crypto/bn/asm/ |
H A D | mips.pl | 187 sltu $at,$t1,$at 200 sltu $at,$t3,$at 214 sltu $at,$ta1,$at 226 sltu $at,$ta3,$at 247 sltu $at,$t1,$at 262 sltu $at,$t1,$at 276 sltu $at,$t1,$at 938 or $a0,$at 963 or $t3,$at 972 or $at,$t2 [all …]
|
H A D | mips-mont.pl | 144 slt $at,$num,4 145 bnez $at,1f 187 li $at,-4096 189 and $sp,$at 209 $ADDU $hi1,$at 236 $ADDU $hi1,$at 256 $ADDU $hi1,$at 282 $ADDU $hi0,$at 296 $ADDU $hi1,$at 326 $ADDU $hi0,$at [all …]
|
/openssl/test/ |
H A D | time_offset_test.c | 69 ASN1_TIME at; in test_offset() local 74 at.data = (unsigned char*)testdata->data; in test_offset() 75 at.length = strlen(testdata->data); in test_offset() 76 at.type = testdata->type; in test_offset() 77 at.flags = 0; in test_offset() 79 if (!TEST_true(ASN1_TIME_diff(&day, &sec, &the_asn1_time, &at))) { in test_offset() 80 TEST_info("ASN1_TIME_diff() failed for %s\n", at.data); in test_offset() 95 TEST_info("ASN1_TIME_diff() test failed for %s day=%d sec=%d\n", at.data, day, sec); in test_offset() 99 ret = ASN1_TIME_cmp_time_t(&at, the_time); in test_offset() 102 TEST_info("ASN1_UTCTIME_cmp_time_t() test failed for %s\n", at.data); in test_offset()
|
H A D | data2.bin | 13 vitae justo eget. Enim tortor at auctor urna nunc id. Laoreet non 16 scelerisque felis imperdiet proin fermentum. Semper quis lectus nulla at 18 Augue ut lectus arcu bibendum at varius vel pharetra. Nisl nunc mi ipsum 31 Sed arcu non odio euismod lacinia at. Enim praesent elementum facilisis 33 arcu. Arcu dictum varius duis at. Pretium lectus quam id leo in vitae. 38 lacus vestibulum. Urna molestie at elementum eu. Mi in nulla posuere 53 aliquam sem fringilla ut. Viverra accumsan in nisl nisi. Nam at lectus 56 Aliquet enim tortor at auctor urna nunc id cursus metus. Sit amet luctus
|
/openssl/doc/internal/man3/ |
H A D | ossl_rand_get_entropy.pod | 27 The seeding material will have at least I<entropy> bytes of randomness and is 28 stored in a buffer which contains at least I<min_len> and at most I<max_len> 40 The output is stored in a buffer which contains at least I<min_len> and at 63 in the file LICENSE in the source distribution or at
|
/openssl/crypto/cms/ |
H A D | cms_att.c | 213 X509_ATTRIBUTE *at; in cms_attrib_get() local 220 at = X509at_get_attr(attrs, loc); in cms_attrib_get() 222 return at; in cms_attrib_get() 230 X509_ATTRIBUTE *at = cms_attrib_get(nid, attrs, &lastpos); in cms_check_attribute() local 232 if (at != NULL) { in cms_check_attribute() 233 int count = X509_ATTRIBUTE_count(at); in cms_check_attribute()
|
/openssl/apps/ |
H A D | asn1parse.c | 63 ASN1_TYPE *at = NULL; in asn1parse_main() local 242 atmp = at; in asn1parse_main() 244 at = d2i_ASN1_TYPE(NULL, &ctmpbuf, tmplen); in asn1parse_main() 246 if (!at) { in asn1parse_main() 251 typ = ASN1_TYPE_get(at); in asn1parse_main() 260 tmpbuf = at->value.asn1_string->data; in asn1parse_main() 261 tmplen = at->value.asn1_string->length; in asn1parse_main() 312 ASN1_TYPE_free(at); in asn1parse_main()
|
/openssl/doc/man3/ |
H A D | RAND_egd.pod | 21 The protocol used is defined by the EGDs available at 24 RAND_egd_bytes() requests B<num> bytes of randomness from an EGD at the 28 RAND_query_egd_bytes() requests B<num> bytes of randomness from an EGD at 34 OpenSSL can be configured at build time to try to use the EGD for seeding 58 in the file LICENSE in the source distribution or at
|
H A D | BN_bn2bin.pod | 45 and stores it at B<to>. B<to> must point to BN_num_bytes(B<a>) bytes of 49 and stores it at B<to>. B<tolen> indicates the length of the output buffer 54 complements form and stores it at B<to>. B<tolen> indicates the length of 61 B<len> at B<s> into a B<BIGNUM> and places it in B<ret>. If B<ret> is 65 form of length B<len> at B<s> into a B<BIGNUM> and places it in B<ret>. If 100 BN_bn2mpi() stores the representation of B<a> at B<to>, where B<to> 104 BN_mpi2bn() converts the B<len> bytes long representation at B<s> to 105 a B<BIGNUM> and stores it at B<ret>, or in a newly allocated B<BIGNUM> 110 BN_bn2bin() returns the length of the big-endian number placed at B<to>. 141 in the file LICENSE in the source distribution or at
|
H A D | SSL_SESSION_get_time.pod | 26 SSL_SESSION_get_time() returns the time at which the session B<s> was 45 Both are set at creation time of the session to the actual time and the 46 default timeout value at creation, respectively, as set by 73 in the file LICENSE in the source distribution or at
|
H A D | BIO_f_base64.pod | 25 characters and there is always a newline at the end of output. 27 For reading, first line should be at most 1024 30 at the end of input. 40 newline at the end. 100 in the file LICENSE in the source distribution or at
|
H A D | ERR_error_string.pod | 26 error code I<e>, and places it at I<buf>. I<buf> must be at least 256 33 at most I<len> characters (including the terminating 0) 78 in the file LICENSE in the source distribution or at
|
H A D | BIO_socket_wait.pod | 23 else for writing, at most until B<max_time>. 26 BIO_wait() waits at most until B<max_time> on the given (typically socket-based) 31 at most the given B<nap_milliseconds> in order to avoid a tight busy loop. 66 in the file LICENSE in the source distribution or at
|
H A D | RC4_set_key.pod | 38 key at B<data>. 40 RC4() encrypts or decrypts the B<len> bytes of data at B<indata> using 41 B<key> and places the result at B<outdata>. Repeated RC4() calls with 75 in the file LICENSE in the source distribution or at
|
H A D | RSA_private_encrypt.pod | 28 These functions handle RSA signatures at a low-level. 30 RSA_private_encrypt() signs the B<flen> bytes at B<from> (usually a 55 bytes long signature at B<from> using the signer's public key 85 in the file LICENSE in the source distribution or at
|
H A D | OSSL_CRMF_pbmp_new.pod | 48 RFC 4210 recommends that the salt SHOULD be at least 8 bytes (64 bits) long, 51 The iteration count must be at least 100, as stipulated by RFC 4211, and is 52 limited to at most 100000 to avoid DoS through manipulated or otherwise 89 in the file LICENSE in the source distribution or at
|
H A D | EVP_SignInit.pod | 31 EVP_SignUpdate() hashes I<cnt> bytes of data at I<d> into the 38 I<pkey>. I<sig> must be at least C<EVP_PKEY_get_size(pkey)> bytes in size. 41 will be written to the integer at I<s>, at most C<EVP_PKEY_get_size(pkey)> 110 in the file LICENSE in the source distribution or at
|
H A D | BF_encrypt.pod | 54 at B<data>. 59 or decryption (B<BF_DECRYPT>) shall be performed. The vector pointed at by 81 decryption (BF_DECRYPT) shall be performed. B<ivec> must point at an 8 byte 87 or decryption (B<BF_DECRYPT>) shall be performed. B<ivec> must point at an 88 8 byte long initialization vector. B<num> must point at an integer which must 128 in the file LICENSE in the source distribution or at
|
H A D | SSL_CTX_set_security_level.pod | 80 that signatures using SHA1 and MD5 are also forbidden at this level as they 82 DTLS 1.0 are all disabled at this level. 124 for example) could not be checked at all. 141 of security requires the use of RSA keys of at least 15360 bits in size. 151 or a certificate with a signature with SHA1 digest at level 1 using 154 not set at all because it had been rejected. 186 in the file LICENSE in the source distribution or at
|
/openssl/doc/man7/ |
H A D | EVP_MAC-BLAKE2.pod | 42 It may be at most 64 bytes for BLAKE2BMAC or 32 for BLAKE2SMAC and at 49 It is an optional value of at most 16 bytes for BLAKE2BMAC or 8 for 55 It is an optional value of at most 16 bytes for BLAKE2BMAC or 8 for 87 in the file LICENSE in the source distribution or at
|
H A D | EVP_KDF-PBKDF2.pod | 50 =item - the iteration count is at least 1000. 52 =item - the salt length is at least 128 bits. 54 =item - the derived key length is at least 112 bits. 101 in the file LICENSE in the source distribution or at
|
/openssl/test/recipes/30-test_evp_data/ |
H A D | evppkey_ecc.txt | 82 Reason=point at infinity 90 Reason=point at infinity 160 Reason=point at infinity 168 Reason=point at infinity 238 Reason=point at infinity 246 Reason=point at infinity 316 Reason=point at infinity 324 Reason=point at infinity 396 Reason=point at infinity 404 Reason=point at infinity [all …]
|
/openssl/crypto/x509/ |
H A D | t_req.c | 115 ASN1_TYPE *at; in X509_REQ_print_ex() local 135 at = X509_ATTRIBUTE_get0_type(a, ii); in X509_REQ_print_ex() 136 type = at->type; in X509_REQ_print_ex() 137 bs = at->value.asn1_string; in X509_REQ_print_ex()
|
/openssl/external/perl/Text-Template-1.56/ |
H A D | Changes | 129 Note that the default message used to report the line number at which the 130 program fragment began; it now reports the line number at which the error 142 - Note that the default message used to report the line number at which the 143 program fragment began; it now reports the line number at which the error 159 line number of the template at which the error occurred: 161 Illegal division by zero at template line 37. 165 Illegal division by zero at catalog.tmpl line 37. 177 line number of the template at which the error occurred: 179 Illegal division by zero at template line 37. 183 Illegal division by zero at catalog.tmpl line 37. [all …]
|
/openssl/crypto/perlasm/ |
H A D | README.md | 22 `&asm_finish()` which should be called at the end. 41 &function_end(name) Call at end of function. 44 &function_end_B(name) Call at end but with pop or ret. 51 &set_label("loop") Set a label at this point.
|