Searched refs:sizes (Results 1 – 25 of 35) sorted by relevance
12
/openssl/test/ |
H A D | bio_comp_test.c | 25 static int sizes[NUM_SIZES] = { 64, 512, 2048, 16 * 1024 }; variable 83 int size = sizes[n % 4]; in do_bio_comp()
|
H A D | evp_test.c | 1863 OSSL_PARAM params[21], sizes[3], *psizes = sizes, *p; in mac_test_run_mac() local 1977 if (psizes != sizes) { in mac_test_run_mac() 1979 if (!TEST_true(EVP_MAC_CTX_get_params(ctx, sizes))) { in mac_test_run_mac()
|
/openssl/doc/man3/ |
H A D | SSL_CTX_set_security_level.pod | 131 signature algorithms, DH parameter sizes, certificate key sizes and 139 Some security levels require large key sizes for non-ECC public key
|
H A D | BN_mod_exp_mont.pod | 43 fixed and equal modulus sizes I<m1> and I<m2> it uses optimizations that allow
|
H A D | RC4_set_key.pod | 32 key sizes have been widely used due to export restrictions.
|
H A D | BIO_f_buffer.pod | 39 set the read, write or both read and write buffer sizes to B<size>. The initial
|
H A D | RSA_generate_key.pod | 47 modulus will be I<primes>, and the public exponent will be I<e>. Key sizes
|
H A D | PKCS12_create.pod | 72 had restrictions on the permissible sizes of keys which could be used for
|
H A D | EVP_MD_meth_new.pod | 178 indicated sizes or flags.
|
H A D | BIO_s_bio.pod | 75 with write buffer sizes B<writebuf1> and B<writebuf2>. If either size is
|
H A D | BIO_s_dgram_pair.pod | 48 pair of BIOs B<bio1>, B<bio2> with write buffer sizes B<writebuf1> and
|
H A D | OSSL_HPKE_CTX_new.pod | 446 harder to distinguish from a real use of HPKE. The buffer sizes should 449 a random value. The relevant sizes for buffers can be found using
|
H A D | UI_new.pod | 119 sizes of the result, not counting the final NUL character. The given
|
H A D | SSL_get_value_uint.pod | 278 buffer sizes are optimised in response to network conditions to optimise
|
H A D | OSSL_PARAM.pod | 278 If a I<responder> finds that some data sizes are too small for the
|
/openssl/doc/designs/ |
H A D | handling-some-max-defines.md | 7 The public headers contain multiple `#define` macros that limit sizes or 114 or multiple blocks. It is unlikely that symmetric ciphers with block sizes
|
/openssl/test/recipes/30-test_evp_data/ |
H A D | evppkey_dsa_sigalg.txt | 270 Title = FIPS Tests (using different key sizes and digests) 327 Title = Fips Negative Tests (using different key sizes and digests)
|
H A D | evppkey_dsa.txt | 269 Title = FIPS Tests (using different key sizes and digests) 327 Title = Fips Negative Tests (using different key sizes and digests)
|
/openssl/doc/man1/ |
H A D | openssl-mac.pod.in | 95 The default sizes are 32 or 64 bytes respectively.
|
H A D | openssl-fipsinstall.pod.in | 220 Configure the module to not allow small keys sizes when using HMAC. 225 Configure the module to not allow small keys sizes when using KMAC.
|
/openssl/doc/designs/ddd/ |
H A D | REPORT.md | 16 diff sizes to the baseline demos. 253 - Potential changes to buffer sizes used by applications to buffer
|
/openssl/doc/man7/ |
H A D | provider-mac.pod | 218 The default value of 1 causes an error when small key sizes are
|
H A D | provider.pod | 223 sizes (e.g. AES-128-CBC, AES-256-CBC)
|
H A D | EVP_PKEY-DH.pod | 129 112, 128, 152, 176 and 200 for key sizes of 2048, 3072, 4096, 6144 and 8192.
|
/openssl/doc/designs/quic-design/ |
H A D | tx-packetiser.md | 503 “belong” to their respective streams, and the encoded sizes of these frames are 595 about enforcing the amplification limit in terms of precise packet sizes. 678 ### Restricting packet sizes
|
Completed in 62 milliseconds
12