/openssl/crypto/bn/asm/ |
H A D | x86_64-mont5.pl | 693 mov %rax,$A[0] 698 mov %rdx,$A[1] 707 add %rax,$A[1] 710 mov %rdx,$A[0] 727 add %rax,$A[0] 731 mov %rdx,$A[1] 743 add %rax,$A[1] 746 mov %rdx,$A[0] 758 add %rax,$A[0] 761 mov %rdx,$A[1] [all …]
|
/openssl/test/certs/ |
H A D | embeddedSCTs1.sct | 8 30:45:02:20:55:52:EF:85:00:1E:C7:6A:26:94:59:DB: 11 2A:D9:12:42:B6:85:A0:B3:F1:74:06:C7:D4:16:78:49: 12 93:F9:5A:BF:C3:68:34
|
/openssl/test/ct/ |
H A D | tls1.sct | 9 D6:64:0F:3D:BF:9A:41:42:94:95:92:45:30:28:8F:A3: 10 E5:E2:3E:06:02:21:00:E4:ED:C0:DB:3A:C5:72:B1:E2: 11 F5:E8:AB:6A:68:06:53:98:7D:CF:41:02:7D:FE:FF:A1:
|
/openssl/doc/man7/ |
H A D | EVP_KDF-SSHKDF.pod | 54 A single char of value 65 (ASCII char 'A'). 59 A single char of value 66 (ASCII char 'B'). 64 A single char of value 67 (ASCII char 'C'). 69 A single char of value 68 (ASCII char 'D'). 74 A single char of value 69 (ASCII char 'E'). 79 A single char of value 70 (ASCII char 'F'). 91 A getter that returns 1 if the operation is FIPS approved, or 0 otherwise. 121 A context for SSHKDF can be obtained by calling:
|
H A D | EVP_RAND-CTR-DRBG.pod | 56 A nonzero value (the default) uses the derivation function. A zero value 63 A context for CTR DRBG can be obtained by calling: 91 NIST SP 800-90A and SP 800-90B
|
/openssl/crypto/sha/asm/ |
H A D | sha512-armv8.pl | 100 @V=($A,$B,$C,$D,$E,$F,$G,$H)=map("$reg_t$_",(20..27)); 233 ldp $A,$B,[$ctx] // load context 261 add $A,$A,@X[0] 266 stp $A,$B,[$ctx] 449 my @V = ($A,$B,$C,$D,$E,$F,$G,$H) = map("w$_",(3..10)); 668 ldp $A,$B,[$ctx] 703 add $A,$A,$t4 // h+=Sigma0(a) from the past 705 add $A,$A,$t2 // h+=Maj(a,b,c) from the past 707 add $A,$A,$t0 // accumulate 716 stp $A,$B,[$ctx,#0]
|
H A D | sha1-ia64.pl | 42 ($A,$B,$C,$D,$E) = ("A","B","C","D","E"); 50 ($A,$B,$C,$D,$E) = ("loc0","loc1","loc2","loc3","loc4"); 275 { .mmi; mov $A=$h0 285 my @V=($A,$B,$C,$D,$E); 293 (($V[0] eq $A) and ($V[4] eq $E)) or die; # double-check 297 { .mmb; add $h0=$h0,$A
|
H A D | sha1-s390x.pl | 64 $A="%r5"; 68 $E="%r9"; @V=($A,$B,$C,$D,$E); 201 llgf $A,0($ctx) 230 al $A,0($ctx) 235 st $A,0($ctx)
|
H A D | sha512-x86_64.pl | 334 mov $SZ*0($ctx),$A 861 mov $A,$a1 1089 mov $a1,$A 1225 mov $A,$a1 1387 mov $A,$a1 1479 mov $a1,$A 1621 mov $A,$a1 1735 mov $A,$a1 1805 mov $a1,$A 2201 add $a1,$A [all …]
|
H A D | sha1-alpha.pl | 29 $A="a3"; 33 $E="t9"; @V=($A,$B,$C,$D,$E); 263 ldl $A,0($ctx) 298 addl @X[0],$A,$A 303 stl $A,0($ctx)
|
H A D | sha512-s390x.pl | 65 $A="%r5"; 72 $H="%r12"; @V=($A,$B,$C,$D,$E,$F,$G,$H); 273 $LD $A,`0*$SZ`($ctx) 296 $ADD $A,`0*$SZ`($ctx) 304 $ST $A,`0*$SZ`($ctx)
|
H A D | sha1-x86_64.pl | 147 $A="%esi"; 153 @V=($A,$B,$C,$D,$E); 313 mov 0($ctx),$A 328 add 0($ctx),$A 333 mov $A,0($ctx) 906 mov $A,0($ctx) 931 mov $A,0($ctx) 1280 mov $A,0($ctx) 1307 mov $A,0($ctx) 1695 mov @ROTX[0],$A # A=d [all …]
|
H A D | sha1-mb-x86_64.pl | 99 @V=($A,$B,$C,$D,$E)=map("%xmm$_",(0..4)); 435 movdqu 0x00($ctx),$A # load context 472 pand @Xi[1],$A 475 paddd $t0,$A 484 movdqu $A,0x00($ctx) 1139 vpand $t1,$A,$A 1141 vpaddd 0x00($ctx),$A,$A 1149 vmovdqu $A,0x00($ctx) 1310 vpand $t1,$A,$A 1312 vpaddd 0x00($ctx),$A,$A [all …]
|
/openssl/doc/man3/ |
H A D | SSL_want.pod | 57 A call to L<SSL_get_error(3)> should return B<SSL_ERROR_WANT_WRITE>. 63 A call to L<SSL_get_error(3)> should return B<SSL_ERROR_WANT_READ>. 69 A call to L<SSL_get_error(3)> should return B<SSL_ERROR_WANT_X509_LOOKUP>. 75 A call to L<SSL_get_error(3)> should return B<SSL_ERROR_WANT_RETRY_VERIFY>. 80 L<SSL_get_all_async_fds(3)>. A call to L<SSL_get_error(3)> should return 86 available in the pool (see ASYNC_init_thread(3)). A call to L<SSL_get_error(3)> 93 A call to L<SSL_get_error(3)> should return B<SSL_ERROR_WANT_CLIENT_HELLO_CB>.
|
H A D | BIO_s_null.pod | 20 A null sink BIO behaves in a similar manner to the Unix /dev/null 23 A null bio can be placed on the end of a chain to discard any data 26 A null sink is useful if, for example, an application wishes to digest some
|
/openssl/test/recipes/30-test_evp_data/ |
H A D | evpencod.txt | 113 Output = "A" 116 Output = "A\n" 119 Output = "A=" 122 Output = "A==\n" 125 Output = "A===\n" 128 Output = "A====\n"
|
H A D | evpciph_chacha.txt | 16 # A.1 Test Vector 1 23 # A.1 Test Vector 2 30 # A.2 Test Vector 1 is the same as A.1 Test Vector 1 31 # A.2 Test Vector 2 39 # A.2 Test Vector 3
|
H A D | evpkdf_ssh.txt | 22 Ctrl.type = type:A 70 Ctrl.type = type:A 118 Ctrl.type = type:A 166 Ctrl.type = type:A 214 Ctrl.type = type:A 262 Ctrl.type = type:A 310 Ctrl.type = type:A 358 Ctrl.type = type:A 406 Ctrl.type = type:A 454 Ctrl.type = type:A [all …]
|
/openssl/VMS/ |
H A D | openssl_ivp.com.in | 12 $ INSTALLTOP_ = F$PARSE("A.;",INSTALLTOP,,,"NO_CONCEAL") - 13 - ".][000000" - "[000000." - "][" - "]A.;" + "." 14 $ OPENSSLDIR_ = F$PARSE("A.;",OPENSSLDIR,,,"NO_CONCEAL") - 15 - ".][000000" - "[000000." - "][" - "]A.;" + "."
|
/openssl/ssl/ |
H A D | tls_srp.c | 42 BN_free(ctx->srp_ctx.A); in ssl_ctx_srp_ctx_free_intern() 70 BN_free(s->srp_ctx.A); in ssl_srp_ctx_free_intern() 121 ((ctx->srp_ctx.A != NULL) && in ssl_srp_ctx_init_intern() 122 ((s->srp_ctx.A = BN_dup(ctx->srp_ctx.A)) == NULL)) || in ssl_srp_ctx_init_intern() 152 BN_free(s->srp_ctx.A); in ssl_srp_ctx_init_intern() 333 if (!SRP_Verify_A_mod_N(s->srp_ctx.A, s->srp_ctx.N)) in srp_generate_server_master_secret() 335 if ((u = SRP_Calc_u_ex(s->srp_ctx.A, s->srp_ctx.B, s->srp_ctx.N, in srp_generate_server_master_secret() 338 if ((K = SRP_Calc_server_key(s->srp_ctx.A, s->srp_ctx.v, u, s->srp_ctx.b, in srp_generate_server_master_secret() 369 || (u = SRP_Calc_u_ex(s->srp_ctx.A, s->srp_ctx.B, s->srp_ctx.N, in srp_generate_client_master_secret() 457 if (!(s->srp_ctx.A = SRP_Calc_A(s->srp_ctx.a, s->srp_ctx.N, s->srp_ctx.g))) in ssl_srp_calc_a_param_intern()
|
/openssl/crypto/objects/ |
H A D | obj_dat.pl | 213 my $A = $obj_len{$obj{$nid{$a}}}; 215 my $r = $A - $B; 218 $A = $obj_der{$obj{$nid{$a}}}; 220 return $A cmp $B;
|
/openssl/.github/ISSUE_TEMPLATE/ |
H A D | question.md | 4 about: Please use Q&A in Discussions instead 9 Instead, please use the [Q&A category in Discussions](<https://github.com/openssl/openssl/discussio…
|
/openssl/demos/ |
H A D | README.txt | 36 quic-client-block.c: A simple blocking QUIC client 37 quic-client-non-block.c: A simple non-blocking QUIC client 38 quic-multi-stream.c: A simple QUIC client using multiple streams 39 tls-client-block.c: A simple blocking SSL/TLS client 40 tls-client-non-block.c: A simple non-blocking SSL/TLS client
|
/openssl/doc/designs/ |
H A D | xof.md | 38 A decision has to be made as to whether a new API is required, as well as 96 - A call to EVP_DigestSqueeze() after EVP_DigestFinalXOF() would fail since 98 - A call to EVP_DigestFinalXOF() after the EVP_DigestSqueeze() would fail. 166 A reset can be done by calling: 188 SHA3_squeeze(uint64_t A[5][5], unsigned char *out, size_t outlen, size_t r) 191 It contains an opaque object for storing the state B<A>, that can be used to 192 output to B<out>. After every B<r> bits, the state B<A> is updated internally 203 position within the state B<A>. 216 state A being different. 233 was not intended to be exposed since the internal format of the state B<A>
|
/openssl/crypto/aes/asm/ |
H A D | aesni-sha1-x86_64.pl | 249 mov 0($ctx),$A # load context 690 mov $A,0($ctx) 718 mov $A,0($ctx) 913 mov 0($ctx),$A # load context 982 mov $A,0($ctx) 1008 mov $A,0($ctx) 1126 mov 0($ctx),$A # load context 1438 mov $A,0($ctx) 1466 mov $A,0($ctx) 1667 mov $A,0($ctx) [all …]
|