Home
last modified time | relevance | path

Searched refs:step (Results 1 – 25 of 40) sorted by relevance

12

/openssl/test/
H A Dcmsapitest.c320 const int step = 256; in read_all() local
327 tmp = OPENSSL_realloc(buf, *p_len + step); in read_all()
331 ret = BIO_read(bio, buf + *p_len, step); in read_all()
340 if (ret < step) in read_all()
/openssl/crypto/poly1305/asm/
H A Dpoly1305-sparcv9.pl448 my ($i1,$step,$shr,$shl) = map("%l$_",(0..7));
449 my $i2=$step;
644 mov 16,$step
651 ldxa [$inp+$step]0x88,$in4
664 movrz $len,0,$step
666 add $step,$inp,$inp ! conditional advance
692 movrz $len,0,$step
712 add $step,$inp,$inp ! conditional advance
740 movrz $len,0,$step
748 add $step,$inp,$inp ! conditional advance
/openssl/crypto/aes/asm/
H A Daesv8-armx.pl555 mov $step,#16
557 cclr $step,eq
1260 mov $step,#16
1262 cclr $step,eq
1329 cclr $step,eq
1366 cclr $step,eq
2548 mov $step,#16
3107 mov $step,#16
3109 csel $step,xzr,$step,eq
3781 mov $step,#16
[all …]
/openssl/crypto/camellia/asm/
H A Dcmll-x86_64.pl441 { my $step=0;
511 &Camellia_Feistel($step++);
512 &Camellia_Feistel($step++);
519 &Camellia_Feistel($step++);
520 &Camellia_Feistel($step++);
570 &Camellia_Feistel($step++);
571 &Camellia_Feistel($step++);
H A Dcmll-x86.pl557 { my $step=0;
612 &mov ($idx,&DWP($step*8,$key)); # prefetch SIGMA[0]
617 &Camellia_Feistel($step++);
618 &Camellia_Feistel($step++);
628 &mov ($idx,&DWP($step*8,$key)); # prefetch SIGMA[4]
633 &Camellia_Feistel($step++);
634 &Camellia_Feistel($step++);
679 &mov ($idx,&DWP($step*8,$key)); # prefetch SIGMA[8]
684 &Camellia_Feistel($step++);
685 &Camellia_Feistel($step++);
/openssl/doc/HOWTO/
H A Dkeys.txt40 Generating a key for the DSA algorithm is a two-step process. First,
65 two-step processes. First, you have to get the EC parameters from which
85 You can also directly generate the key in one step:
H A Ddocumenting-functions-and-macros.md116 The explanation for this is that one important step is still missing,
/openssl/doc/man3/
H A DECDSA_sign.pod111 First step: create an EC_KEY object (note: this part is B<not> ECDSA
124 Second step: compute the ECDSA signature of a SHA-256 hash value
142 Third step: verify the created ECDSA signature using ECDSA_do_verify():
H A DSSL_set_retry_verify.pod19 is resumed again by the application, retrying the verification step.
H A DEVP_PKEY_sign.pod164 * step. signing_key must be an RSA private key and md must
209 * step. signing_key must be an RSA private key and md must
255 * the next step. signing_key must be an RSA private key,
300 * the next step. signing_key must be an RSA private key,
H A DDH_generate_key.pod28 DH_generate_key() performs the first step of a Diffie-Hellman key
H A DCMAC_CTX.pod51 Alternatively, for a single-step MAC computation, use the L<EVP_Q_mac(3)>
H A DSSL_CTX_set_cert_verify_callback.pod50 attempt by retrying the server certificate verification step.
H A DEVP_PKEY_gettable_params.pod100 * NB: assumes 'key' is set up before the next step. In this example the key
H A DEVP_PKEY_verify.pod255 * the next step. signing_key must be an RSA private key,
293 * the next step. signing_key must be an RSA private key,
H A DBIO_f_ssl.pod114 case where this happens is when step up occurs.
H A DOSSL_HPKE_CTX_new.pod249 KEM, then a KDF and finally an AEAD. The first step is to encapsulate (using
253 encapsulation step, the sender can then make one or more calls to
/openssl/
H A DREADME-FIPS.md63 The Installation of the FIPS provider consists of two steps. In the first step,
69 In the second step, the `openssl fipsinstall` command is executed, which completes
/openssl/doc/man7/
H A Dprovider-decoder.pod64 The last decoding step in the decoding chain is usually supposed to create
67 can be called as the final step of the decoding process.
H A Dpassphrase-encoding.pod43 proceeds with step 2.
H A Dossl-guide-tls-client-block.pod46 The first step is to create an B<SSL_CTX> object for our client. We use the
130 Socket creation for use by a client is typically a 2 step process, i.e.
H A Dossl-guide-tls-server-block.pod40 The first step is to create an B<SSL_CTX> object for our server. We use the
/openssl/doc/man1/
H A Dopenssl-rehash.pod.in63 To skip the removal step, use the B<-n> flag.
H A Dopenssl-verification-options.pod150 The first step is to check that each certificate is well-formed.
153 The second step is to check the extensions of every untrusted certificate
164 The third step is to check the trust settings on the last certificate
170 The fourth, and final, step is to check the validity of the certificate chain.
/openssl/dev/
H A Drelease.sh47 figure out the next step.

Completed in 30 milliseconds

12