Searched refs:A (Results 526 – 548 of 548) sorted by relevance
1...<<2122
74 # AES tests from NIST document SP800-38A79 Title = AES tests from NIST document SP800-38A
1797 OoNj/A+W9w==2175 5A==
205 MDoCAQAwEAYHKoZIzj0CAQYFK4EEACEEIzAhAgEBBBzyICZuEQW/4wg+A+x6OmVGUfReNxZ+iGAL
1858 600vCU8X+wkk1EMtnHU/A/oOhZey/zdc03h3UuwznOER8KWLB8/XidRZnT9NgMGb
23 Title = ECDH KATs (from NIST SP800-56A co-factor ECDH KATs3002 6A==3254 /A==4964 sEBdHF6AAQpzGn1qak9bQLLqqBDBkC2yeyjSl7wF83FMrK/A9711 A+27
2708 # Negative test: A weak curve with a strength < 112 fails in FIPS mode.
86 A look at the EVP_CIPHER hooking is most explanatory, the RSA, DSA (etc) cases
62 control. A controlled byte is any byte of application data in a STREAM frame
224 A failed search is indicated by a B<-1> return value.
234 A value <= 0 means no limitation (waiting indefinitely).241 A value <= 0 means no limitation (waiting indefinitely).
256 functionality of an ENGINE is required to be available. A functional
172 A few notes worth mentioning:
129 shlib_variant => A "variant" identifier inserted between the base
53 A X509_STORE_CTX is used while validating a single certificate.
192 * A zero passed to ASN1_STRING_TABLE_new_add for the flags is interpreted
50 the socket into nonblocking mode. A socket will be default be blocking. The
390 A C<0> argument indicates that any available port shall be chosen automatically.
106 A cipher list of TLSv1.2 and below ciphersuites to convert to a cipher
187 A current example:
53 // A lot of hand-scheduling has been performed. Consequently, this code
47 # << 'EOF' perl -pe 'BEGIN {$t = 0; $/="\n\n"} if (s/\A\s*# \d+\s*?\n//sm) {printf "# %d\n", ++$t}'
12 * 10.3.A Cryptographic Algorithm Self test Requirements593 * According to FIPS 140-3 10.3.A Note18: SSH KDF is not required, since it is
584 BIGNUM *N, *g, *s, *B, *A; member
Completed in 120 milliseconds