Home
last modified time | relevance | path

Searched refs:at (Results 1 – 25 of 1256) sorted by relevance

12345678910>>...51

/openssl/crypto/bn/asm/
H A Dmips.pl187 sltu $at,$t1,$at
200 sltu $at,$t3,$at
214 sltu $at,$ta1,$at
226 sltu $at,$ta3,$at
247 sltu $at,$t1,$at
262 sltu $at,$t1,$at
276 sltu $at,$t1,$at
938 or $a0,$at
963 or $t3,$at
972 or $at,$t2
[all …]
H A Dmips-mont.pl144 slt $at,$num,4
145 bnez $at,1f
187 li $at,-4096
189 and $sp,$at
209 $ADDU $hi1,$at
236 $ADDU $hi1,$at
256 $ADDU $hi1,$at
282 $ADDU $hi0,$at
296 $ADDU $hi1,$at
326 $ADDU $hi0,$at
[all …]
/openssl/test/
H A Dtime_offset_test.c69 ASN1_TIME at; in test_offset() local
74 at.data = (unsigned char*)testdata->data; in test_offset()
75 at.length = strlen(testdata->data); in test_offset()
76 at.type = testdata->type; in test_offset()
77 at.flags = 0; in test_offset()
79 if (!TEST_true(ASN1_TIME_diff(&day, &sec, &the_asn1_time, &at))) { in test_offset()
80 TEST_info("ASN1_TIME_diff() failed for %s\n", at.data); in test_offset()
95 TEST_info("ASN1_TIME_diff() test failed for %s day=%d sec=%d\n", at.data, day, sec); in test_offset()
99 ret = ASN1_TIME_cmp_time_t(&at, the_time); in test_offset()
102 TEST_info("ASN1_UTCTIME_cmp_time_t() test failed for %s\n", at.data); in test_offset()
H A Ddata2.bin13 vitae justo eget. Enim tortor at auctor urna nunc id. Laoreet non
16 scelerisque felis imperdiet proin fermentum. Semper quis lectus nulla at
18 Augue ut lectus arcu bibendum at varius vel pharetra. Nisl nunc mi ipsum
31 Sed arcu non odio euismod lacinia at. Enim praesent elementum facilisis
33 arcu. Arcu dictum varius duis at. Pretium lectus quam id leo in vitae.
38 lacus vestibulum. Urna molestie at elementum eu. Mi in nulla posuere
53 aliquam sem fringilla ut. Viverra accumsan in nisl nisi. Nam at lectus
56 Aliquet enim tortor at auctor urna nunc id cursus metus. Sit amet luctus
H A DREADME-external.md40 You will need a git checkout of krb5 at the top level:
74 You will need a git checkout of gost-engine at the top level:
97 You will need a git checkout of oqsprovider at the top level:
118 The names of all supported quantum-safe algorithms are available at
126 You will need a git checkout of pkcs11-provider at the top level:
148 Kryoptic tests will not run at this point. Currently no test fails.
/openssl/crypto/cms/
H A Dcms_att.c215 X509_ATTRIBUTE *at; in cms_attrib_get() local
222 at = X509at_get_attr(attrs, loc); in cms_attrib_get()
224 return at; in cms_attrib_get()
232 X509_ATTRIBUTE *at = cms_attrib_get(nid, attrs, &lastpos); in cms_check_attribute() local
234 if (at != NULL) { in cms_check_attribute()
235 int count = X509_ATTRIBUTE_count(at); in cms_check_attribute()
/openssl/apps/
H A Dasn1parse.c63 ASN1_TYPE *at = NULL; in asn1parse_main() local
245 atmp = at; in asn1parse_main()
247 at = d2i_ASN1_TYPE(NULL, &ctmpbuf, tmplen); in asn1parse_main()
249 if (!at) { in asn1parse_main()
254 typ = ASN1_TYPE_get(at); in asn1parse_main()
263 tmpbuf = at->value.asn1_string->data; in asn1parse_main()
264 tmplen = at->value.asn1_string->length; in asn1parse_main()
315 ASN1_TYPE_free(at); in asn1parse_main()
/openssl/crypto/x509/
H A Dt_acert.c43 ASN1_TYPE *at; in print_attribute() local
47 at = X509_ATTRIBUTE_get0_type(a, i); in print_attribute()
48 type = at->type; in print_attribute()
56 bs = at->value.asn1_string; in print_attribute()
65 ASN1_parse_dump(bp, at->value.sequence->data, in print_attribute()
66 at->value.sequence->length, i, 1); in print_attribute()
H A Dt_req.c115 ASN1_TYPE *at; in X509_REQ_print_ex() local
135 at = X509_ATTRIBUTE_get0_type(a, ii); in X509_REQ_print_ex()
136 type = at->type; in X509_REQ_print_ex()
137 bs = at->value.asn1_string; in X509_REQ_print_ex()
/openssl/doc/man3/
H A DRAND_egd.pod21 The protocol used is defined by the EGDs available at
24 RAND_egd_bytes() requests B<num> bytes of randomness from an EGD at the
28 RAND_query_egd_bytes() requests B<num> bytes of randomness from an EGD at
34 OpenSSL can be configured at build time to try to use the EGD for seeding
58 in the file LICENSE in the source distribution or at
H A DBN_bn2bin.pod45 and stores it at B<to>. B<to> must point to BN_num_bytes(B<a>) bytes of
49 and stores it at B<to>. B<tolen> indicates the length of the output buffer
54 complements form and stores it at B<to>. B<tolen> indicates the length of
61 B<len> at B<s> into a B<BIGNUM> and places it in B<ret>. If B<ret> is
65 form of length B<len> at B<s> into a B<BIGNUM> and places it in B<ret>. If
100 BN_bn2mpi() stores the representation of B<a> at B<to>, where B<to>
104 BN_mpi2bn() converts the B<len> bytes long representation at B<s> to
105 a B<BIGNUM> and stores it at B<ret>, or in a newly allocated B<BIGNUM>
110 BN_bn2bin() returns the length of the big-endian number placed at B<to>.
141 in the file LICENSE in the source distribution or at
H A DBIO_f_base64.pod25 characters and there is a newline at the end of output.
28 For reading, the first line of base64 content should be at most 1024 bytes long
31 in the input) and a newline at the end of input is not needed.
37 the newline) and consists of only (at least one) valid base64 characters plus
56 newline at the end.
104 character when it occurs at the start of a base64 group of 4 encoded
133 in the file LICENSE in the source distribution or at
H A DERR_error_string.pod26 error code I<e>, and places it at I<buf>. I<buf> must be at least 256
33 at most I<len> characters (including the terminating 0)
78 in the file LICENSE in the source distribution or at
H A DBIO_socket_wait.pod23 else for writing, at most until B<max_time>.
26 BIO_wait() waits at most until B<max_time> on the given (typically socket-based)
31 at most the given B<nap_milliseconds> in order to avoid a tight busy loop.
66 in the file LICENSE in the source distribution or at
H A DRC4_set_key.pod38 key at B<data>.
40 RC4() encrypts or decrypts the B<len> bytes of data at B<indata> using
41 B<key> and places the result at B<outdata>. Repeated RC4() calls with
75 in the file LICENSE in the source distribution or at
H A DRSA_private_encrypt.pod28 These functions handle RSA signatures at a low-level.
30 RSA_private_encrypt() signs the B<flen> bytes at B<from> (usually a
55 bytes long signature at B<from> using the signer's public key
85 in the file LICENSE in the source distribution or at
H A DEVP_PKEY_CTX_get_algor.pod42 function is supported at all by the B<EVP_I<TYPE>> implementation.
50 function is supported at all by the B<EVP_I<TYPE>> implementation.
59 function is supported at all by the B<EVP_I<TYPE>> implementation.
73 in the file LICENSE in the source distribution or at
H A DOSSL_CRMF_pbmp_new.pod48 RFC 4210 recommends that the salt SHOULD be at least 8 bytes (64 bits) long,
51 The iteration count must be at least 100, as stipulated by RFC 4211, and is
52 limited to at most 100000 to avoid DoS through manipulated or otherwise
89 in the file LICENSE in the source distribution or at
H A DSSL_SESSION_get_time.pod34 SSL_SESSION_get_time_ex() returns the time at which the session B<s> was
58 Both are set at creation time of the session to the actual time and the
59 default timeout value at creation, respectively, as set by
94 in the file LICENSE in the source distribution or at
H A DERR_GET_LIB.pod48 codes. Error codes are subject to change at any time (even in patch releases of
51 still appear at any time.
69 in the file LICENSE in the source distribution or at
/openssl/doc/man7/
H A DEVP_MAC-BLAKE2.pod43 It may be at most 64 bytes for BLAKE2BMAC or 32 for BLAKE2SMAC and at
50 It is an optional value of at most 16 bytes for BLAKE2BMAC or 8 for
56 It is an optional value of at most 16 bytes for BLAKE2BMAC or 8 for
88 in the file LICENSE in the source distribution or at
H A DEVP_KDF-PBKDF2.pod52 =item - the iteration count is at least 1000.
54 =item - the salt length is at least 128 bits.
56 =item - the derived key length is at least 112 bits.
112 in the file LICENSE in the source distribution or at
/openssl/doc/internal/man3/
H A Dossl_rand_get_entropy.pod39 The seeding material will have at least I<entropy> bytes of randomness and is
40 stored in a buffer which contains at least I<min_len> and at most I<max_len>
61 The output is stored in a buffer which contains at least I<min_len> and at
101 in the file LICENSE in the source distribution or at
/openssl/test/recipes/30-test_evp_data/
H A Devppkey_ecc.txt82 Reason=point at infinity
90 Reason=point at infinity
160 Reason=point at infinity
168 Reason=point at infinity
238 Reason=point at infinity
246 Reason=point at infinity
316 Reason=point at infinity
324 Reason=point at infinity
396 Reason=point at infinity
404 Reason=point at infinity
[all …]
/openssl/external/perl/Text-Template-1.56/
H A DChanges129 Note that the default message used to report the line number at which the
130 program fragment began; it now reports the line number at which the error
142 - Note that the default message used to report the line number at which the
143 program fragment began; it now reports the line number at which the error
159 line number of the template at which the error occurred:
161 Illegal division by zero at template line 37.
165 Illegal division by zero at catalog.tmpl line 37.
177 line number of the template at which the error occurred:
179 Illegal division by zero at template line 37.
183 Illegal division by zero at catalog.tmpl line 37.
[all …]

Completed in 56 milliseconds

12345678910>>...51