Searched refs:pseudo (Results 1 – 23 of 23) sorted by relevance
/openssl/doc/man3/ |
H A D | SSL_CTX_set_msg_callback.pod | 61 B<OSSL_QUIC1_VERSION> etc. For the SSL3_RT_HEADER pseudo 70 messages). Alternatively it may be a "pseudo" content type. These pseudo 77 case of pseudo content types), which consists of I<len> bytes. The buffer is no 115 of data. The following pseudo content types are currently defined: 154 callback will supply all the padding frames in one go via this pseudo content 170 The pseudo content type B<SSL3_RT_INNER_CONTENT_TYPE> was added in OpenSSL 1.1.1. 172 The pseudo content types B<SSL3_RT_QUIC_DATAGRAM>, B<SSL3_RT_QUIC_PACKET>, 177 the pseudo content type B<SSL3_RT_HEADER> for TLS records. 180 the pseudo content type B<SSL3_RT_HEADER> for DTLS records.
|
H A D | BN_rand.pod | 8 - generate pseudo-random number 39 BN_rand_ex() generates a cryptographically strong pseudo-random 61 BN_rand_range_ex() generates a cryptographically strong pseudo-random
|
H A D | SSL_CTX_set_generate_session_id.pod | 43 session id from pseudo random numbers of the maximum possible length. 96 server id given, and will fill the rest with pseudo random bytes:
|
H A D | RC4_set_key.pod | 44 Since RC4 is a stream cipher (the input is XORed with a pseudo-random
|
H A D | CMS_get1_ReceiptRequest.pod | 31 or it is set to 32 bytes of pseudo random data if I<id> is NULL.
|
H A D | EVP_PBE_CipherInit.pod | 56 EVP_PBE_TYPE_PRF - A pseudo-random function
|
H A D | RAND_bytes.pod | 29 secure pseudo random generator (CSPRNG) and stores them in B<buf>. B<buf> B<MUST NOT> be NULL.
|
H A D | EVP_PKEY_decrypt.pod | 66 instead it returns a pseudo-randomly generated message, removing the need
|
H A D | DH_generate_parameters.pod | 44 structure. The pseudo-random number generator must be
|
H A D | BN_generate_prime.pod | 63 BN_generate_prime_ex2() generates a pseudo-random prime number of
|
H A D | BIO_f_ssl.pod | 206 It creates a pseudo web page containing the actual request from
|
H A D | PEM_read_bio_PrivateKey.pod | 444 The pseudo code to derive the key would look similar to:
|
H A D | EVP_EncryptInit.pod | 866 Gets the updated pseudo-IV state for the associated cipher context, e.g.,
|
/openssl/doc/man1/ |
H A D | openssl-rand.pod.in | 6 openssl-rand - generate pseudo-random bytes 22 secure pseudo random number generator (CSPRNG). A suffix [K|M|G|T] may be
|
H A D | openssl.pod | 56 not able to detect pseudo-commands such as B<quit>, 219 Generate pseudo-random bytes.
|
H A D | openssl-ts.pod.in | 166 given. Otherwise, a 64-bit long pseudo-random nonce is
|
/openssl/doc/man7/ |
H A D | RAND.pod | 13 can be used as a cryptographically-secure pseudo-random number generator 61 A DRBG is a certain type of cryptographically-secure pseudo-random
|
H A D | life_cycle-kdf.pod | 9 All key derivation functions (KDFs) and pseudo random functions (PRFs)
|
H A D | EVP_RAND.pod | 22 A DRBG is a certain type of cryptographically-secure pseudo-random
|
H A D | ossl-guide-libcrypto-introduction.pod | 19 pseudo-random number generators, message authentication codes (MACs), key
|
/openssl/ssl/quic/ |
H A D | quic_ackm.c | 935 const OSSL_ACKM_TX_PKT *lpkt, int pseudo) in ackm_on_pkts_lost() argument 955 if (!pseudo) { in ackm_on_pkts_lost()
|
/openssl/doc/designs/ |
H A D | xof.md | 10 At a minimum an XOF needs to support the following pseudo-code
|
/openssl/ |
H A D | CHANGES.md | 12643 * Implement fast modular reduction for pseudo-Mersenne primes 13198 * Use (SSL_RANDOM_VALUE - 4) bytes of pseudo random data when generating 13205 1. Server and client random values still have 24 bytes of pseudo random 17559 'openssl XXX' exists, the new pseudo-command 'openssl no-XXX' 17568 ('openssl no-XXX' is not able to detect pseudo-commands such 17659 * New 'rand' application for creating pseudo-random output.
|
Completed in 92 milliseconds