/openssl/test/ |
H A D | cmsapitest.c | 320 const int step = 256; in read_all() local 327 tmp = OPENSSL_realloc(buf, *p_len + step); in read_all() 331 ret = BIO_read(bio, buf + *p_len, step); in read_all() 340 if (ret < step) in read_all()
|
/openssl/crypto/poly1305/asm/ |
H A D | poly1305-sparcv9.pl | 448 my ($i1,$step,$shr,$shl) = map("%l$_",(0..7)); 449 my $i2=$step; 644 mov 16,$step 651 ldxa [$inp+$step]0x88,$in4 664 movrz $len,0,$step 666 add $step,$inp,$inp ! conditional advance 692 movrz $len,0,$step 712 add $step,$inp,$inp ! conditional advance 740 movrz $len,0,$step 748 add $step,$inp,$inp ! conditional advance
|
/openssl/crypto/aes/asm/ |
H A D | aesv8-armx.pl | 555 mov $step,#16 557 cclr $step,eq 1260 mov $step,#16 1262 cclr $step,eq 1329 cclr $step,eq 1366 cclr $step,eq 2548 mov $step,#16 3107 mov $step,#16 3109 csel $step,xzr,$step,eq 3781 mov $step,#16 [all …]
|
/openssl/crypto/camellia/asm/ |
H A D | cmll-x86_64.pl | 441 { my $step=0; 511 &Camellia_Feistel($step++); 512 &Camellia_Feistel($step++); 519 &Camellia_Feistel($step++); 520 &Camellia_Feistel($step++); 570 &Camellia_Feistel($step++); 571 &Camellia_Feistel($step++);
|
H A D | cmll-x86.pl | 557 { my $step=0; 612 &mov ($idx,&DWP($step*8,$key)); # prefetch SIGMA[0] 617 &Camellia_Feistel($step++); 618 &Camellia_Feistel($step++); 628 &mov ($idx,&DWP($step*8,$key)); # prefetch SIGMA[4] 633 &Camellia_Feistel($step++); 634 &Camellia_Feistel($step++); 679 &mov ($idx,&DWP($step*8,$key)); # prefetch SIGMA[8] 684 &Camellia_Feistel($step++); 685 &Camellia_Feistel($step++);
|
/openssl/doc/HOWTO/ |
H A D | keys.txt | 40 Generating a key for the DSA algorithm is a two-step process. First, 65 two-step processes. First, you have to get the EC parameters from which 85 You can also directly generate the key in one step:
|
H A D | documenting-functions-and-macros.md | 116 The explanation for this is that one important step is still missing,
|
/openssl/doc/man3/ |
H A D | ECDSA_sign.pod | 111 First step: create an EC_KEY object (note: this part is B<not> ECDSA 124 Second step: compute the ECDSA signature of a SHA-256 hash value 142 Third step: verify the created ECDSA signature using ECDSA_do_verify():
|
H A D | SSL_set_retry_verify.pod | 19 is resumed again by the application, retrying the verification step.
|
H A D | EVP_PKEY_sign.pod | 164 * step. signing_key must be an RSA private key and md must 209 * step. signing_key must be an RSA private key and md must 255 * the next step. signing_key must be an RSA private key, 300 * the next step. signing_key must be an RSA private key,
|
H A D | DH_generate_key.pod | 28 DH_generate_key() performs the first step of a Diffie-Hellman key
|
H A D | CMAC_CTX.pod | 51 Alternatively, for a single-step MAC computation, use the L<EVP_Q_mac(3)>
|
H A D | SSL_CTX_set_cert_verify_callback.pod | 50 attempt by retrying the server certificate verification step.
|
H A D | EVP_PKEY_gettable_params.pod | 100 * NB: assumes 'key' is set up before the next step. In this example the key
|
H A D | EVP_PKEY_verify.pod | 255 * the next step. signing_key must be an RSA private key, 293 * the next step. signing_key must be an RSA private key,
|
H A D | BIO_f_ssl.pod | 114 case where this happens is when step up occurs.
|
H A D | OSSL_HPKE_CTX_new.pod | 249 KEM, then a KDF and finally an AEAD. The first step is to encapsulate (using 253 encapsulation step, the sender can then make one or more calls to
|
/openssl/ |
H A D | README-FIPS.md | 63 The Installation of the FIPS provider consists of two steps. In the first step, 69 In the second step, the `openssl fipsinstall` command is executed, which completes
|
/openssl/doc/man7/ |
H A D | provider-decoder.pod | 64 The last decoding step in the decoding chain is usually supposed to create 67 can be called as the final step of the decoding process.
|
H A D | passphrase-encoding.pod | 43 proceeds with step 2.
|
H A D | ossl-guide-tls-client-block.pod | 46 The first step is to create an B<SSL_CTX> object for our client. We use the 130 Socket creation for use by a client is typically a 2 step process, i.e.
|
H A D | ossl-guide-tls-server-block.pod | 40 The first step is to create an B<SSL_CTX> object for our server. We use the
|
/openssl/doc/man1/ |
H A D | openssl-rehash.pod.in | 63 To skip the removal step, use the B<-n> flag.
|
H A D | openssl-verification-options.pod | 150 The first step is to check that each certificate is well-formed. 153 The second step is to check the extensions of every untrusted certificate 164 The third step is to check the trust settings on the last certificate 170 The fourth, and final, step is to check the validity of the certificate chain.
|
/openssl/dev/ |
H A D | release.sh | 47 figure out the next step.
|