Lines Matching refs:not

173 A signature algorithm implementation may not implement all of these functions.
236 The I<params>, if not NULL, should be set on the context in a manner similar to
248 to by the I<sig> parameter and it should not exceed I<sigsize> bytes in length.
262 The I<params>, if not NULL, should be set on the context in a manner similar to
279 if I<sig> is not NULL, the signature should be written to the location pointed
280 to by I<sig>, and it should not exceed I<sigsize> bytes in length.
290 The I<params>, if not NULL, should be set on the context in a manner similar to
312 The I<params>, if not NULL, should be set on the context in a manner similar to
336 The I<params>, if not NULL, should be set on the context in a manner similar to
347 pointed to by I<rout> which should not exceed I<routsize> bytes in length.
357 The I<params>, if not NULL, should be set on the context in a manner similar to
376 and it should not exceed I<sigsize> bytes in length. The length of the signature
385 parameter and it should not exceed I<sigsize> bytes in length. The length of the
394 The I<params>, if not NULL, should be set on the context in a manner similar to
447 NULL is used if this optional value is not set.
452 like RSA-SHA256, the "digest" and "properties" parameters should not be used.
455 implementations, however, it is not acceptable to have them in the B<OSSL_PARAM>
469 The length of the "digest-size" parameter should not exceed that of a B<size_t>.
496 otherwise the sign operation is only tried once and returns whether or not it
526 The default value of 1 causes an error during the init if the key is not FIPS
536 not FIPS approved (e.g. SHA1 is used for signing). Setting this to 0 will ignore
616 Licensed under the Apache License 2.0 (the "License"). You may not use