/openssl/test/recipes/80-test_cmp_http_data/Mock/ |
H A D | new_pass_12345.key | 4 0A/aH/nMGoifA4TKpLg1SobskugzWV7+N2qh3j9LZrz6GxB9jR64JBx8+eKBu5lv
|
/openssl/test/certs/ |
H A D | key-pass-12345.pem | 4 0A/aH/nMGoifA4TKpLg1SobskugzWV7+N2qh3j9LZrz6GxB9jR64JBx8+eKBu5lv
|
H A D | many-names1.pem | 282 BEiEhBxIsaIlws3qQa4baeVEEoxw+A+ISrYHTIFcV/i0bcIFt5p7v7wbu686a/w0 407 Ahc4co+A/7qzselNZL1pcFFyRtTeLAcREuZVTTRa/EXmlLqzMe+UEEinEtdktnPL
|
H A D | cyrillic.utf8 | 36 11:49:46:19:2A:4E:4D:D1:C8:FB:79:55:3D:81:99:22:EE:34:4F:22 38 A5:77:E3:20:78:77:2A:94:BF:62:8B:0E:61:4B:23:3E:BA:B7:04:1C
|
H A D | rootCA.pem | 39 85:56:89:35:E2:9F:00:1A:E1:86:03:0B:4B:AF:76:12:6B:33:6D:FD 41 keyid:85:56:89:35:E2:9F:00:1A:E1:86:03:0B:4B:AF:76:12:6B:33:6D:FD
|
/openssl/doc/man3/ |
H A D | SSL_CTX_set_psk_client_callback.pod | 41 A client application wishing to use TLSv1.3 PSKs should use either 69 =item A ciphersuite 101 A client application wishing to use PSK ciphersuites for TLSv1.2 and below must 134 A connection established via a TLSv1.3 PSK will appear as if session resumption
|
H A D | OpenSSL_version.pod | 143 if available, or C<OPENSSLDIR: N/A> otherwise. 148 if available, or C<ENGINESDIR: N/A> otherwise. This option is deprecated in 154 if available, or C<MODULESDIR: N/A> otherwise. 163 or C<CPUINFO: N/A> if not available.
|
H A D | SSL_CTX_set_stateless_cookie_generate_cb.pod | 52 length B<cookie_len>. A nonzero return value from verify_stateless_cookie_cb() 67 pointed to by B<cookie> and is of length B<cookie_len>. A nonzero return value
|
H A D | BN_CTX_new.pod | 22 A B<BN_CTX> is a structure that holds B<BIGNUM> temporary variables used by 44 A given B<BN_CTX> must only be used by a single thread of execution. No
|
H A D | OSSL_STORE_INFO.pod | 139 A name is exactly that, a name. 170 A keypair or just a private key (possibly with key parameters). 174 A public key (possibly with key parameters). 182 A X.509 certificate revocation list.
|
/openssl/doc/man7/ |
H A D | provider-object.pod | 5 provider-object - A specification for a provider-native object abstraction 40 =for comment A future extension might be to be able to specify encoding as a 92 A provider-native object abstraction is an L<OSSL_PARAM(3)> with a selection 163 A human readable text that describes extra details on the object.
|
H A D | provider-keyexch.pod | 82 A key exchange algorithm implementation may not implement all of these functions. 87 A key exchange algorithm must also implement some mechanism for generating, 95 A pointer to this context will be passed back in a number of the other key 128 A previously initialised key exchange context is passed in the I<ctx> 215 A getter that returns 1 if the operation is FIPS approved, or 0 otherwise.
|
H A D | EVP_KDF-PBKDF2.pod | 67 A getter that returns 1 if the operation is FIPS approved, or 0 otherwise. 76 A typical application of this algorithm is to derive keying material for an
|
H A D | EVP_MAC-HMAC.pod | 51 A flag to set the MAC digest to not initialise the implementation 59 A flag to set the MAC digest to be a one-shot operation.
|
H A D | EVP_MD-SHAKE.pod | 29 (see the description of KMAC128 in Appendix A of NIST SP 800-185). 36 (see the description of KMAC256 in Appendix A of NIST SP 800-185).
|
H A D | EVP_RAND-HASH-DRBG.pod | 81 A context for HASH DRBG can be obtained by calling: 108 NIST SP 800-90A and SP 800-90B
|
H A D | EVP_RAND-HMAC-DRBG.pod | 82 A context for HMAC DRBG can be obtained by calling: 110 NIST SP 800-90A and SP 800-90B
|
H A D | openssl-threads.pod | 35 A C<set0> passes ownership from the caller to the object and a 38 A C<set1> or C<get1> function does not change the ownership, but instead 79 A separate, although related, issue is modifying "factory" objects
|
/openssl/doc/ |
H A D | README.md | 14 A few how-to documents; not necessarily up-to-date
|
/openssl/Configurations/ |
H A D | descrip.mms.tmpl | 431 …BUG) sourcetop = F$PARSE("$(SRCDIR)","[]A.;",,,"SYNTAX_ONLY,NO_CONCEAL") - ".][000000" - "[000000.… 439 $(NODEBUG) IF staging_instdir - "]A.;" .NES. staging_instdir THEN - 441 $(NODEBUG) IF staging_instdir - "A.;" .NES. staging_instdir THEN - 445 $(NODEBUG) IF staging_datadir - "]A.;" .NES. staging_datadir THEN - 447 $(NODEBUG) IF staging_datadir - "A.;" .NES. staging_datadir THEN - 448 staging_datadir = staging_datadir - "A.;" + "[OPENSSL-COMMON]" 455 …PARSE(staging_instdir,"$(INSTALLTOP)","[]A.;",,"SYNTAX_ONLY,NO_CONCEAL") - ".][000000" - "[000000.… 457 …PARSE(staging_datadir,"$(OPENSSLDIR)","[]A.;",,"SYNTAX_ONLY,NO_CONCEAL") - ".][000000" - "[000000.… 466 $(NODEBUG) openssl_inc1 = F$PARSE("[.include.openssl]","A.;",,,"syntax_only") - "A.;" 467 … $(NODEBUG) openssl_inc2 = F$PARSE("sourcetop:[include.openssl]","A.;",,,"SYNTAX_ONLY") - "A.;" [all …]
|
/openssl/providers/implementations/ciphers/ |
H A D | cipher_aes_cbc_hmac_sha256_hw.c | 107 unsigned int A[8], B[8], C[8], D[8], E[8], F[8], G[8], H[8]; member 192 mctx->A[i] = sctx->md.h[0]; in tls1_multi_block_encrypt() 299 blocks[i].d[0] = BSWAP4(mctx->A[i]); in tls1_multi_block_encrypt() 300 mctx->A[i] = sctx->tail.h[0]; in tls1_multi_block_encrypt() 318 PUTU32(blocks[i].c + 0, mctx->A[i]); in tls1_multi_block_encrypt() 319 mctx->A[i] = sctx->tail.h[0]; in tls1_multi_block_encrypt() 354 PUTU32(out + 0, mctx->A[i]); in tls1_multi_block_encrypt()
|
/openssl/crypto/evp/ |
H A D | e_aes_cbc_hmac_sha1.c | 143 unsigned int A[8], B[8], C[8], D[8], E[8]; member 225 ctx->A[i] = key->md.h0; in tls1_1_multi_block_encrypt() 329 blocks[i].d[0] = BSWAP4(ctx->A[i]); in tls1_1_multi_block_encrypt() 330 ctx->A[i] = key->tail.h0; in tls1_1_multi_block_encrypt() 342 PUTU32(blocks[i].c + 0, ctx->A[i]); in tls1_1_multi_block_encrypt() 343 ctx->A[i] = key->tail.h0; in tls1_1_multi_block_encrypt() 372 PUTU32(out + 0, ctx->A[i]); in tls1_1_multi_block_encrypt()
|
/openssl/ |
H A D | NOTES-POSIX.md | 8 library, or where there are quirks that need working around. A notable
|
/openssl/test/recipes/80-test_policy_tree_data/ |
H A D | small_policy_tree.pem | 18 AxMLUG9saWN5IENBIDIwWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAT+p+A+K6MI
|
/openssl/providers/ |
H A D | decoders.inc | 87 * A decoder that takes a SubjectPublicKeyInfo and figures out the types of key 93 * A decoder that recognises PKCS#8 EncryptedPrivateKeyInfo structure
|