/openssl/crypto/bn/asm/ |
H A D | mips.pl | 187 sltu $at,$t1,$at 200 sltu $at,$t3,$at 214 sltu $at,$ta1,$at 226 sltu $at,$ta3,$at 247 sltu $at,$t1,$at 262 sltu $at,$t1,$at 276 sltu $at,$t1,$at 938 or $a0,$at 963 or $t3,$at 972 or $at,$t2 [all …]
|
H A D | mips-mont.pl | 144 slt $at,$num,4 145 bnez $at,1f 187 li $at,-4096 189 and $sp,$at 209 $ADDU $hi1,$at 236 $ADDU $hi1,$at 256 $ADDU $hi1,$at 282 $ADDU $hi0,$at 296 $ADDU $hi1,$at 326 $ADDU $hi0,$at [all …]
|
/openssl/test/ |
H A D | time_offset_test.c | 69 ASN1_TIME at; in test_offset() local 74 at.data = (unsigned char*)testdata->data; in test_offset() 75 at.length = strlen(testdata->data); in test_offset() 76 at.type = testdata->type; in test_offset() 77 at.flags = 0; in test_offset() 79 if (!TEST_true(ASN1_TIME_diff(&day, &sec, &the_asn1_time, &at))) { in test_offset() 80 TEST_info("ASN1_TIME_diff() failed for %s\n", at.data); in test_offset() 95 TEST_info("ASN1_TIME_diff() test failed for %s day=%d sec=%d\n", at.data, day, sec); in test_offset() 99 ret = ASN1_TIME_cmp_time_t(&at, the_time); in test_offset() 102 TEST_info("ASN1_UTCTIME_cmp_time_t() test failed for %s\n", at.data); in test_offset()
|
H A D | data2.bin | 13 vitae justo eget. Enim tortor at auctor urna nunc id. Laoreet non 16 scelerisque felis imperdiet proin fermentum. Semper quis lectus nulla at 18 Augue ut lectus arcu bibendum at varius vel pharetra. Nisl nunc mi ipsum 31 Sed arcu non odio euismod lacinia at. Enim praesent elementum facilisis 33 arcu. Arcu dictum varius duis at. Pretium lectus quam id leo in vitae. 38 lacus vestibulum. Urna molestie at elementum eu. Mi in nulla posuere 53 aliquam sem fringilla ut. Viverra accumsan in nisl nisi. Nam at lectus 56 Aliquet enim tortor at auctor urna nunc id cursus metus. Sit amet luctus
|
H A D | README-external.md | 40 You will need a git checkout of krb5 at the top level: 74 You will need a git checkout of gost-engine at the top level: 97 You will need a git checkout of oqsprovider at the top level: 118 The names of all supported quantum-safe algorithms are available at 126 You will need a git checkout of pkcs11-provider at the top level: 148 Kryoptic tests will not run at this point. Currently no test fails.
|
/openssl/crypto/cms/ |
H A D | cms_att.c | 215 X509_ATTRIBUTE *at; in cms_attrib_get() local 222 at = X509at_get_attr(attrs, loc); in cms_attrib_get() 224 return at; in cms_attrib_get() 232 X509_ATTRIBUTE *at = cms_attrib_get(nid, attrs, &lastpos); in cms_check_attribute() local 234 if (at != NULL) { in cms_check_attribute() 235 int count = X509_ATTRIBUTE_count(at); in cms_check_attribute()
|
/openssl/apps/ |
H A D | asn1parse.c | 63 ASN1_TYPE *at = NULL; in asn1parse_main() local 245 atmp = at; in asn1parse_main() 247 at = d2i_ASN1_TYPE(NULL, &ctmpbuf, tmplen); in asn1parse_main() 249 if (!at) { in asn1parse_main() 254 typ = ASN1_TYPE_get(at); in asn1parse_main() 263 tmpbuf = at->value.asn1_string->data; in asn1parse_main() 264 tmplen = at->value.asn1_string->length; in asn1parse_main() 315 ASN1_TYPE_free(at); in asn1parse_main()
|
/openssl/crypto/x509/ |
H A D | t_acert.c | 43 ASN1_TYPE *at; in print_attribute() local 47 at = X509_ATTRIBUTE_get0_type(a, i); in print_attribute() 48 type = at->type; in print_attribute() 56 bs = at->value.asn1_string; in print_attribute() 65 ASN1_parse_dump(bp, at->value.sequence->data, in print_attribute() 66 at->value.sequence->length, i, 1); in print_attribute()
|
H A D | t_req.c | 115 ASN1_TYPE *at; in X509_REQ_print_ex() local 135 at = X509_ATTRIBUTE_get0_type(a, ii); in X509_REQ_print_ex() 136 type = at->type; in X509_REQ_print_ex() 137 bs = at->value.asn1_string; in X509_REQ_print_ex()
|
/openssl/doc/man3/ |
H A D | RAND_egd.pod | 21 The protocol used is defined by the EGDs available at 24 RAND_egd_bytes() requests B<num> bytes of randomness from an EGD at the 28 RAND_query_egd_bytes() requests B<num> bytes of randomness from an EGD at 34 OpenSSL can be configured at build time to try to use the EGD for seeding 58 in the file LICENSE in the source distribution or at
|
H A D | BN_bn2bin.pod | 45 and stores it at B<to>. B<to> must point to BN_num_bytes(B<a>) bytes of 49 and stores it at B<to>. B<tolen> indicates the length of the output buffer 54 complements form and stores it at B<to>. B<tolen> indicates the length of 61 B<len> at B<s> into a B<BIGNUM> and places it in B<ret>. If B<ret> is 65 form of length B<len> at B<s> into a B<BIGNUM> and places it in B<ret>. If 100 BN_bn2mpi() stores the representation of B<a> at B<to>, where B<to> 104 BN_mpi2bn() converts the B<len> bytes long representation at B<s> to 105 a B<BIGNUM> and stores it at B<ret>, or in a newly allocated B<BIGNUM> 110 BN_bn2bin() returns the length of the big-endian number placed at B<to>. 141 in the file LICENSE in the source distribution or at
|
H A D | BIO_f_base64.pod | 25 characters and there is a newline at the end of output. 28 For reading, the first line of base64 content should be at most 1024 bytes long 31 in the input) and a newline at the end of input is not needed. 37 the newline) and consists of only (at least one) valid base64 characters plus 56 newline at the end. 104 character when it occurs at the start of a base64 group of 4 encoded 133 in the file LICENSE in the source distribution or at
|
H A D | ERR_error_string.pod | 26 error code I<e>, and places it at I<buf>. I<buf> must be at least 256 33 at most I<len> characters (including the terminating 0) 78 in the file LICENSE in the source distribution or at
|
H A D | BIO_socket_wait.pod | 23 else for writing, at most until B<max_time>. 26 BIO_wait() waits at most until B<max_time> on the given (typically socket-based) 31 at most the given B<nap_milliseconds> in order to avoid a tight busy loop. 66 in the file LICENSE in the source distribution or at
|
H A D | RC4_set_key.pod | 38 key at B<data>. 40 RC4() encrypts or decrypts the B<len> bytes of data at B<indata> using 41 B<key> and places the result at B<outdata>. Repeated RC4() calls with 75 in the file LICENSE in the source distribution or at
|
H A D | RSA_private_encrypt.pod | 28 These functions handle RSA signatures at a low-level. 30 RSA_private_encrypt() signs the B<flen> bytes at B<from> (usually a 55 bytes long signature at B<from> using the signer's public key 85 in the file LICENSE in the source distribution or at
|
H A D | EVP_PKEY_CTX_get_algor.pod | 42 function is supported at all by the B<EVP_I<TYPE>> implementation. 50 function is supported at all by the B<EVP_I<TYPE>> implementation. 59 function is supported at all by the B<EVP_I<TYPE>> implementation. 73 in the file LICENSE in the source distribution or at
|
H A D | OSSL_CRMF_pbmp_new.pod | 48 RFC 4210 recommends that the salt SHOULD be at least 8 bytes (64 bits) long, 51 The iteration count must be at least 100, as stipulated by RFC 4211, and is 52 limited to at most 100000 to avoid DoS through manipulated or otherwise 89 in the file LICENSE in the source distribution or at
|
H A D | SSL_SESSION_get_time.pod | 34 SSL_SESSION_get_time_ex() returns the time at which the session B<s> was 58 Both are set at creation time of the session to the actual time and the 59 default timeout value at creation, respectively, as set by 94 in the file LICENSE in the source distribution or at
|
H A D | ERR_GET_LIB.pod | 48 codes. Error codes are subject to change at any time (even in patch releases of 51 still appear at any time. 69 in the file LICENSE in the source distribution or at
|
/openssl/doc/man7/ |
H A D | EVP_MAC-BLAKE2.pod | 43 It may be at most 64 bytes for BLAKE2BMAC or 32 for BLAKE2SMAC and at 50 It is an optional value of at most 16 bytes for BLAKE2BMAC or 8 for 56 It is an optional value of at most 16 bytes for BLAKE2BMAC or 8 for 88 in the file LICENSE in the source distribution or at
|
H A D | EVP_KDF-PBKDF2.pod | 52 =item - the iteration count is at least 1000. 54 =item - the salt length is at least 128 bits. 56 =item - the derived key length is at least 112 bits. 112 in the file LICENSE in the source distribution or at
|
/openssl/doc/internal/man3/ |
H A D | ossl_rand_get_entropy.pod | 39 The seeding material will have at least I<entropy> bytes of randomness and is 40 stored in a buffer which contains at least I<min_len> and at most I<max_len> 61 The output is stored in a buffer which contains at least I<min_len> and at 101 in the file LICENSE in the source distribution or at
|
/openssl/test/recipes/30-test_evp_data/ |
H A D | evppkey_ecc.txt | 82 Reason=point at infinity 90 Reason=point at infinity 160 Reason=point at infinity 168 Reason=point at infinity 238 Reason=point at infinity 246 Reason=point at infinity 316 Reason=point at infinity 324 Reason=point at infinity 396 Reason=point at infinity 404 Reason=point at infinity [all …]
|
/openssl/external/perl/Text-Template-1.56/ |
H A D | Changes | 129 Note that the default message used to report the line number at which the 130 program fragment began; it now reports the line number at which the error 142 - Note that the default message used to report the line number at which the 143 program fragment began; it now reports the line number at which the error 159 line number of the template at which the error occurred: 161 Illegal division by zero at template line 37. 165 Illegal division by zero at catalog.tmpl line 37. 177 line number of the template at which the error occurred: 179 Illegal division by zero at template line 37. 183 Illegal division by zero at catalog.tmpl line 37. [all …]
|