/openssl/crypto/siphash/ |
H A D | siphash.c | 57 v3 = ROTL(v3, 16); \ 60 v3 = ROTL(v3, 21); \ 131 ctx->v3 = 0x7465646279746573ULL ^ k1; in SipHash_Init() 148 uint64_t v3 = ctx->v3; in SipHash_Update() local 170 v3 ^= m; in SipHash_Update() 180 v3 ^= m; in SipHash_Update() 194 ctx->v3 = v3; in SipHash_Update() 205 uint64_t v3 = ctx->v3; in SipHash_Final() local 235 v3 ^= b; in SipHash_Final() 245 b = v0 ^ v1 ^ v2 ^ v3; in SipHash_Final() [all …]
|
/openssl/crypto/aes/asm/ |
H A D | bsaes-armv8.pl | 1353 eor v3.16b, v7.16b, v3.16b 1389 eor v3.16b, v3.16b, v20.16b 1540 and v3.16b, v3.16b, v8.16b 1548 ext v3.16b, v3.16b, v3.16b, #8 1564 eor v3.16b, v3.16b, v14.16b 1605 eor v3.16b, v3.16b, v15.16b 1634 and v3.16b, v3.16b, v8.16b 1687 eor v3.16b, v3.16b, v14.16b 1711 eor v3.16b, v3.16b, v15.16b 1740 eor v3.16b, v3.16b, v15.16b [all …]
|
/openssl/crypto/perlasm/ |
H A D | s390x.pm | 2674 my ($opcode,$v1,$v3,$i2,$m4)=(shift,get_V(shift),get_V(shift), 2680 $out.=sprintf("%#06x",($m4<<12|RXB($v1,$v3)<<8|$opcode&0xff)); 2694 $out.=sprintf("%#06x",(($v3&0xf)<<12|$i4)).","; 2724 $out.=sprintf("%#06x",(($v3&0xf)<<12|$m5<<4)|$i4>>4).","; 2799 $out.=sprintf("%#06x",(($v3&0xf)<<12|$m5<<4)).","; 2814 $out.=sprintf("%#06x",(($v3&0xf)<<12|$m6<<4|$m5)).","; 2829 $out.=sprintf("%#06x",(($v3&0xf)<<12|$m5<<8|$m6<<4)).","; 2844 $out.=sprintf("%#06x",(($v3&0xf)<<12|$m6<<8|$m5)).","; 2919 $out.=sprintf("%#06x",($m4<<12|RXB($v1,$v3)<<8|$opcode&0xff)); 2947 $out.=sprintf("%#06x",($opcode&0xff00|$r1<<4|($v3&0xf))).","; [all …]
|
/openssl/doc/man3/ |
H A D | X509V3_set_ctx.pod | 6 X509V3_set_issuer_pkey - X.509 v3 extension generation utilities 19 providing details potentially needed by functions producing X509 v3 extensions. 36 or B<X509V3_CTX_REPLACE>, which means that each X.509v3 extension added as
|
H A D | EVP_md5.pod | 32 A hash algorithm of SSL v3 that combines MD5 with SHA-1 as described in RFC
|
H A D | ASN1_generate_nconf.pod | 23 which will typically be used by X509 v3 certificate extension
|
H A D | SSL_CTX_set_options.pod | 379 B<handshake_failure> alert in SSL v3.0.
|
H A D | OSSL_CMP_CTX_new.pod | 561 OSSL_CMP_CTX_set0_reqExtensions() sets the X.509v3 extensions to be used in
|
/openssl/include/crypto/ |
H A D | siphash.h | 38 uint64_t v3; member
|
/openssl/doc/internal/man3/ |
H A D | x509v3_cache_extensions.pod | 6 - cache info on various X.509v3 extensions and further derived certificate data
|
/openssl/apps/ |
H A D | openssl.cnf | 28 # X.509v3 extensions to use: 31 # X.509v3 extensions in its main [= default] section.)
|
H A D | openssl-vms.cnf | 28 # X.509v3 extensions to use: 31 # X.509v3 extensions in its main [= default] section.)
|
/openssl/doc/man1/ |
H A D | openssl-ciphers.pod.in | 128 suites using the digest algorithm SHA1 and B<SSLv3> represents all SSL v3 285 SSL v3.0 respectively. 425 =head2 SSL v3.0 cipher suites 537 Note: these ciphers can also be used in SSL v3.
|
H A D | openssl-verification-options.pod | 317 The authorityKeyIdentifier must be given for X.509v3 certs unless they 322 The subjectKeyIdentifier must be given for all X.509v3 CA certs.
|
H A D | openssl-smime.pod.in | 467 The current code can only handle S/MIME v2 messages, the more complex S/MIME v3
|
H A D | openssl.pod | 743 Generates the complete policy tree at various points during X.509 v3
|
H A D | openssl-cms.pod.in | 127 This command handles data in CMS format such as S/MIME v3.1 email messages.
|
/openssl/include/openssl/ |
H A D | x509v3.h.in | 93 /* Context specific info for producing X509 v3 extensions*/
|
/openssl/crypto/objects/ |
H A D | objects.txt | 259 id-smime-mod 4 : id-smime-mod-msg-v3 1090 cades-attributes 5 : id-aa-ATSHashIndex-v3
|
/openssl/ |
H A D | NEWS.md | 1389 * Initial support for X.509v3 extensions
|
H A D | CHANGES.md | 1430 * The `x509`, `req`, and `ca` commands now make sure that X.509v3 certificates 1453 * The authorityKeyIdentifier must be given for X.509v3 certs 1455 * The subjectKeyIdentifier must be given for all X.509v3 CA certs. 7067 built with the no-ssl3 option and a SSL v3 ClientHello is received the ssl 8132 built with the no-ssl3 option and a SSL v3 ClientHello is received the ssl 13575 * New '-extfile ...' option to 'openssl ca' for reading X.509v3
|