/openssl/apps/ |
H A D | speed.c | 656 for (count = 0; COND(c[algindex][testnum]); count++) in EVP_Cipher_loop() 723 for (count = 0; COND(c[D_RAND][testnum]); count++) in RAND_bytes_loop() 842 for (count = 0; COND(rsa_c[testnum][0]); count++) { in RSA_sign_loop() 864 for (count = 0; COND(rsa_c[testnum][1]); count++) { in RSA_verify_loop() 886 for (count = 0; COND(ffdh_c[testnum][0]); count++) { in FFDH_derive_key_loop() 906 for (count = 0; COND(dsa_c[testnum][0]); count++) { in DSA_sign_loop() 928 for (count = 0; COND(dsa_c[testnum][1]); count++) { in DSA_verify_loop() 996 for (count = 0; COND(ecdh_c[testnum][0]); count++) in ECDH_EVP_derive_key_loop() 1058 for (count = 0; COND(sm2_c[testnum][0]); count++) { in SM2_sign_loop() 1093 for (count = 0; COND(sm2_c[testnum][1]); count++) { in SM2_verify_loop() [all …]
|
/openssl/doc/man1/ |
H A D | openssl-pkcs12.pod.in | 65 [B<-iter> I<count>] 347 =item B<-iter> I<count> 349 This option specifies the iteration count for the encryption key and MAC. The 353 algorithm that derives keys from passwords can have an iteration count applied
|
H A D | openssl-verification-options.pod | 474 end-entity certificate nor the trust-anchor certificate count against the
|
/openssl/test/ |
H A D | sslapitest.c | 1057 static char count = 1; in ping_pong_query() local 1075 cbuf[0] = count++; in ping_pong_query()
|
H A D | timing_load_creds.c | 84 int i, debug = 0, count = 100, what = 'c'; in main() local 99 if ((count = atoi(optarg)) < 0) in main() 165 for (i = count; i > 0; i--) { in main()
|
H A D | evp_test.c | 120 size_t count; member 143 db->count = 1; in evp_test_buffer_append() 191 int count = atoi(value); in evp_test_buffer_set_count() local 193 if (count <= 0) in evp_test_buffer_set_count() 203 db->count = (size_t)count; in evp_test_buffer_set_count() 221 for (j = 0; j < tb->count; j++) { in evp_test_buffer_do()
|
/openssl/crypto/err/ |
H A D | openssl.txt | 279 CMP_R_WRONG_RP_COMPONENT_COUNT:188:wrong rp component count 1017 PROV_R_INVALID_ITERATION_COUNT:123:invalid iteration count 1153 RSA_R_BAD_PAD_BYTE_COUNT:103:bad pad byte count
|
/openssl/doc/man7/ |
H A D | migration_guide.pod | 275 MAC iteration count was changed to PKCS12_DEFAULT_ITER to make it equal 276 with the password-based encryption iteration count. The default digest 360 at least 112 bits, and that the iteration count is at least 1000.
|
/openssl/ |
H A D | Configure | 1621 my $count = 0; 1623 $count++ if /SIXTY_FOUR_BIT|SIXTY_FOUR_BIT_LONG|THIRTY_TWO_BIT/; 1634 if $count > 1;
|
H A D | CHANGES.md | 744 count of PKCS12_DEFAULT_ITER. 11202 iteration count can be set to 0 to omit the mac. 15169 (RSA objects have a reference count access to which is protected 15850 by seeding with STATE_SIZE dummy bytes (with zero entropy count). 16228 convention: After 'get1', the caller owns a reference count 16431 callback function now provide an iteration count for the outer 16434 function with an 'iteration count' of -1, meaning that a 16477 to seed the PRNG (previously an explicit byte count was required). 16960 reference count of the added key (they don't "swallow" the 17031 the reference count in the SSL_SESSION returned. [all …]
|
/openssl/include/openssl/ |
H A D | bio.h.in | 523 * WARNING WARNING, this ups the reference count on the read bio of the SSL
|
H A D | evp.h | 124 size_t count)); 144 const void *data, size_t count); 559 const void *data, size_t count); 563 const void *data, size_t count)); 717 __owur int EVP_Digest(const void *data, size_t count, 745 const unsigned char *data, int datal, int count,
|
/openssl/include/crypto/ |
H A D | evp.h | 257 int (*update) (EVP_MD_CTX *ctx, const void *data, size_t count);
|
/openssl/ssl/ |
H A D | ssl_lib.c | 1637 size_t SSL_get_finished(const SSL *s, void *buf, size_t count) in SSL_get_finished() argument 1646 if (count > ret) in SSL_get_finished() 1647 count = ret; in SSL_get_finished() 1648 memcpy(buf, sc->s3.tmp.finish_md, count); in SSL_get_finished() 1653 size_t SSL_get_peer_finished(const SSL *s, void *buf, size_t count) in SSL_get_peer_finished() argument 1662 if (count > ret) in SSL_get_peer_finished() 1663 count = ret; in SSL_get_peer_finished() 1664 memcpy(buf, sc->s3.tmp.peer_finish_md, count); in SSL_get_peer_finished() 5891 int count = scts != NULL ? sk_SCT_num(scts) : 0; in ct_strict() local 5894 for (i = 0; i < count; ++i) { in ct_strict()
|
/openssl/doc/man3/ |
H A D | X509_STORE_CTX_new.pod | 134 With L<X509_STORE_CTX_verify(3)>, this does not count the first chain element.
|
H A D | OPENSSL_malloc.pod | 140 respectively. If a pointer is NULL, then the corresponding count is not stored. 144 It is a set of fields separated by semicolons, which each field is a count 146 to 100). If the count is zero, then it lasts forever. For example,
|
H A D | EC_KEY_new.pod | 84 The reference count for the newly created EC_KEY is initially 106 Calling EC_KEY_free() decrements the reference count for the EC_KEY object, 114 EC_KEY_up_ref() increments the reference count associated with the EC_KEY
|
H A D | EVP_EncryptInit.pod | 269 Increments the reference count for an B<EVP_CIPHER> structure. 273 Decrements the reference count for the fetched B<EVP_CIPHER> structure. 274 If the reference count drops to 0 then the structure is freed.
|
H A D | X509_STORE_new.pod | 23 X509_STORE_up_ref() increments the reference count associated with the
|
H A D | X509_STORE_add_cert.pod | 83 added in this way. The added object's reference count is incremented by one,
|
/openssl/crypto/bn/ |
H A D | bn_rand.c | 137 int count = 100; in bnrand_range() local 179 if (!--count) { in bnrand_range() 193 if (!--count) { in bnrand_range()
|
/openssl/crypto/property/ |
H A D | property.c | 417 int i, count; in alg_cleanup_by_provider() local 423 for (count = 0, i = sk_IMPLEMENTATION_num(alg->impls); i-- > 0;) { in alg_cleanup_by_provider() 429 count++; in alg_cleanup_by_provider() 439 if (count > 0) in alg_cleanup_by_provider()
|
/openssl/crypto/evp/ |
H A D | evp_lib.c | 922 size_t count)) in EVP_MD_meth_set_update() argument 988 size_t count) in EVP_MD_meth_get_update() 1072 const void *data, size_t count) in EVP_MD_CTX_update_fn() 1079 const void *data, size_t count)) in EVP_MD_CTX_set_update_fn() argument
|
/openssl/util/ |
H A D | check-format.pl | 298 if $count != $comment_indent; 302 if $count + $tweak != $comment_indent; 334 if (!$sloppy_cmt && $count != $ref_indent) { 350 return if $stmt_indent < $count && $count < $expr_indent && 358 if $count != $ref_indent && $count != $alt_indent; 484 $count = length($1); # actual indentation 496 $count = -1; # do not check indentation 541 if ($count > 0) { 544 $count--; 726 report("indent = $count != 0 for '#'") if $count != 0; [all …]
|
/openssl/crypto/ |
H A D | provider_core.c | 1023 int count; in provider_deactivate() local 1060 if ((count = --prov->activatecnt) < 1) in provider_deactivate() 1088 return count; in provider_deactivate() 1097 int count = -1; in provider_activate() local 1134 count = ++prov->activatecnt; in provider_activate() 1148 return count; in provider_activate() 1225 int count; in ossl_provider_activate() local 1237 if ((count = provider_activate(prov, 1, upcalls)) > 0) in ossl_provider_activate() 1238 return count == 1 ? provider_flush_store_cache(prov) : 1; in ossl_provider_activate() 1245 int count; in ossl_provider_deactivate() local [all …]
|