Home
last modified time | relevance | path

Searched refs:A (Results 176 – 200 of 548) sorted by relevance

12345678910>>...22

/openssl/test/recipes/80-test_cmp_http_data/Mock/
H A Dnew_pass_12345.key4 0A/aH/nMGoifA4TKpLg1SobskugzWV7+N2qh3j9LZrz6GxB9jR64JBx8+eKBu5lv
/openssl/test/certs/
H A Dkey-pass-12345.pem4 0A/aH/nMGoifA4TKpLg1SobskugzWV7+N2qh3j9LZrz6GxB9jR64JBx8+eKBu5lv
H A Dmany-names1.pem282 BEiEhBxIsaIlws3qQa4baeVEEoxw+A+ISrYHTIFcV/i0bcIFt5p7v7wbu686a/w0
407 Ahc4co+A/7qzselNZL1pcFFyRtTeLAcREuZVTTRa/EXmlLqzMe+UEEinEtdktnPL
H A Dcyrillic.utf836 11:49:46:19:2A:4E:4D:D1:C8:FB:79:55:3D:81:99:22:EE:34:4F:22
38 A5:77:E3:20:78:77:2A:94:BF:62:8B:0E:61:4B:23:3E:BA:B7:04:1C
H A DrootCA.pem39 85:56:89:35:E2:9F:00:1A:E1:86:03:0B:4B:AF:76:12:6B:33:6D:FD
41 keyid:85:56:89:35:E2:9F:00:1A:E1:86:03:0B:4B:AF:76:12:6B:33:6D:FD
/openssl/doc/man3/
H A DSSL_CTX_set_psk_client_callback.pod41 A client application wishing to use TLSv1.3 PSKs should use either
69 =item A ciphersuite
101 A client application wishing to use PSK ciphersuites for TLSv1.2 and below must
134 A connection established via a TLSv1.3 PSK will appear as if session resumption
H A DOpenSSL_version.pod143 if available, or C<OPENSSLDIR: N/A> otherwise.
148 if available, or C<ENGINESDIR: N/A> otherwise. This option is deprecated in
154 if available, or C<MODULESDIR: N/A> otherwise.
163 or C<CPUINFO: N/A> if not available.
H A DSSL_CTX_set_stateless_cookie_generate_cb.pod52 length B<cookie_len>. A nonzero return value from verify_stateless_cookie_cb()
67 pointed to by B<cookie> and is of length B<cookie_len>. A nonzero return value
H A DBN_CTX_new.pod22 A B<BN_CTX> is a structure that holds B<BIGNUM> temporary variables used by
44 A given B<BN_CTX> must only be used by a single thread of execution. No
H A DOSSL_STORE_INFO.pod139 A name is exactly that, a name.
170 A keypair or just a private key (possibly with key parameters).
174 A public key (possibly with key parameters).
182 A X.509 certificate revocation list.
/openssl/doc/man7/
H A Dprovider-object.pod5 provider-object - A specification for a provider-native object abstraction
40 =for comment A future extension might be to be able to specify encoding as a
92 A provider-native object abstraction is an L<OSSL_PARAM(3)> with a selection
163 A human readable text that describes extra details on the object.
H A Dprovider-keyexch.pod82 A key exchange algorithm implementation may not implement all of these functions.
87 A key exchange algorithm must also implement some mechanism for generating,
95 A pointer to this context will be passed back in a number of the other key
128 A previously initialised key exchange context is passed in the I<ctx>
215 A getter that returns 1 if the operation is FIPS approved, or 0 otherwise.
H A DEVP_KDF-PBKDF2.pod67 A getter that returns 1 if the operation is FIPS approved, or 0 otherwise.
76 A typical application of this algorithm is to derive keying material for an
H A DEVP_MAC-HMAC.pod51 A flag to set the MAC digest to not initialise the implementation
59 A flag to set the MAC digest to be a one-shot operation.
H A DEVP_MD-SHAKE.pod29 (see the description of KMAC128 in Appendix A of NIST SP 800-185).
36 (see the description of KMAC256 in Appendix A of NIST SP 800-185).
H A DEVP_RAND-HASH-DRBG.pod81 A context for HASH DRBG can be obtained by calling:
108 NIST SP 800-90A and SP 800-90B
H A DEVP_RAND-HMAC-DRBG.pod82 A context for HMAC DRBG can be obtained by calling:
110 NIST SP 800-90A and SP 800-90B
H A Dopenssl-threads.pod35 A C<set0> passes ownership from the caller to the object and a
38 A C<set1> or C<get1> function does not change the ownership, but instead
79 A separate, although related, issue is modifying "factory" objects
/openssl/doc/
H A DREADME.md14 A few how-to documents; not necessarily up-to-date
/openssl/Configurations/
H A Ddescrip.mms.tmpl431 …BUG) sourcetop = F$PARSE("$(SRCDIR)","[]A.;",,,"SYNTAX_ONLY,NO_CONCEAL") - ".][000000" - "[000000.…
439 $(NODEBUG) IF staging_instdir - "]A.;" .NES. staging_instdir THEN -
441 $(NODEBUG) IF staging_instdir - "A.;" .NES. staging_instdir THEN -
445 $(NODEBUG) IF staging_datadir - "]A.;" .NES. staging_datadir THEN -
447 $(NODEBUG) IF staging_datadir - "A.;" .NES. staging_datadir THEN -
448 staging_datadir = staging_datadir - "A.;" + "[OPENSSL-COMMON]"
455 …PARSE(staging_instdir,"$(INSTALLTOP)","[]A.;",,"SYNTAX_ONLY,NO_CONCEAL") - ".][000000" - "[000000.…
457 …PARSE(staging_datadir,"$(OPENSSLDIR)","[]A.;",,"SYNTAX_ONLY,NO_CONCEAL") - ".][000000" - "[000000.…
466 $(NODEBUG) openssl_inc1 = F$PARSE("[.include.openssl]","A.;",,,"syntax_only") - "A.;"
467 … $(NODEBUG) openssl_inc2 = F$PARSE("sourcetop:[include.openssl]","A.;",,,"SYNTAX_ONLY") - "A.;"
[all …]
/openssl/providers/implementations/ciphers/
H A Dcipher_aes_cbc_hmac_sha256_hw.c107 unsigned int A[8], B[8], C[8], D[8], E[8], F[8], G[8], H[8]; member
192 mctx->A[i] = sctx->md.h[0]; in tls1_multi_block_encrypt()
299 blocks[i].d[0] = BSWAP4(mctx->A[i]); in tls1_multi_block_encrypt()
300 mctx->A[i] = sctx->tail.h[0]; in tls1_multi_block_encrypt()
318 PUTU32(blocks[i].c + 0, mctx->A[i]); in tls1_multi_block_encrypt()
319 mctx->A[i] = sctx->tail.h[0]; in tls1_multi_block_encrypt()
354 PUTU32(out + 0, mctx->A[i]); in tls1_multi_block_encrypt()
/openssl/crypto/evp/
H A De_aes_cbc_hmac_sha1.c143 unsigned int A[8], B[8], C[8], D[8], E[8]; member
225 ctx->A[i] = key->md.h0; in tls1_1_multi_block_encrypt()
329 blocks[i].d[0] = BSWAP4(ctx->A[i]); in tls1_1_multi_block_encrypt()
330 ctx->A[i] = key->tail.h0; in tls1_1_multi_block_encrypt()
342 PUTU32(blocks[i].c + 0, ctx->A[i]); in tls1_1_multi_block_encrypt()
343 ctx->A[i] = key->tail.h0; in tls1_1_multi_block_encrypt()
372 PUTU32(out + 0, ctx->A[i]); in tls1_1_multi_block_encrypt()
/openssl/
H A DNOTES-POSIX.md8 library, or where there are quirks that need working around. A notable
/openssl/test/recipes/80-test_policy_tree_data/
H A Dsmall_policy_tree.pem18 AxMLUG9saWN5IENBIDIwWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAT+p+A+K6MI
/openssl/providers/
H A Ddecoders.inc87 * A decoder that takes a SubjectPublicKeyInfo and figures out the types of key
93 * A decoder that recognises PKCS#8 EncryptedPrivateKeyInfo structure

Completed in 53 milliseconds

12345678910>>...22