Home
last modified time | relevance | path

Searched refs:a (Results 76 – 100 of 1851) sorted by relevance

12345678910>>...75

/openssl/test/certs/
H A Dcyrillic.utf816 ba:bc:d5:9a:d6:dc:21:66:72:30:36:ca:94:43:3c:
17 37:22:81:31:af:bb:8f:31:df:20:e2:6a:04:ee:12:
19 38:7f:67:a8:bf:f4:8a:70:65:3d:5c:1f:60:0c:6a:
20 86:b9:68:4f:45:37:0c:89:ef:45:e8:ab:c4:bd:1a:
30 d3:77:bb:71:b4:1d:86:65:a8:0a:0a:a3:fe:f9:f5:
44 c5:c9:e1:d0:70:c0:bf:5d:21:58:da:df:4e:cf:27:6a:1b:bc:
46 02:0f:4b:20:7a:cb:83:3f:95:00:5b:1a:7a:3c:d7:dc:7a:cd:
48 95:5f:2a:d0:5c:ac:b8:5c:08:38:ea:e0:22:7a:aa:b7:af:36:
49 22:7a:2e:81:ba:3c:e4:d4:f9:3f:f0:ce:a5:e2:3f:2f:c1:57:
50 37:0b:1a:74:73:49:22:09:d5:ff:e2:c0:2c:2a:8f:bb:1b:61:
[all …]
H A Dcyrillic.msb16 ba:bc:d5:9a:d6:dc:21:66:72:30:36:ca:94:43:3c:
17 37:22:81:31:af:bb:8f:31:df:20:e2:6a:04:ee:12:
19 38:7f:67:a8:bf:f4:8a:70:65:3d:5c:1f:60:0c:6a:
30 d3:77:bb:71:b4:1d:86:65:a8:0a:0a:a3:fe:f9:f5:
44 c5:c9:e1:d0:70:c0:bf:5d:21:58:da:df:4e:cf:27:6a:1b:bc:
46 02:0f:4b:20:7a:cb:83:3f:95:00:5b:1a:7a:3c:d7:dc:7a:cd:
48 95:5f:2a:d0:5c:ac:b8:5c:08:38:ea:e0:22:7a:aa:b7:af:36:
49 22:7a:2e:81:ba:3c:e4:d4:f9:3f:f0:ce:a5:e2:3f:2f:c1:57:
50 37:0b:1a:74:73:49:22:09:d5:ff:e2:c0:2c:2a:8f:bb:1b:61:
52 e2:7b:9a:98:6e:33:b5:e4:ed:2f:2f:f9:59:28:3a:e6:fa:8d:
[all …]
/openssl/doc/man3/
H A DBN_cmp.pod12 int BN_cmp(const BIGNUM *a, const BIGNUM *b);
13 int BN_ucmp(const BIGNUM *a, const BIGNUM *b);
15 int BN_is_zero(const BIGNUM *a);
16 int BN_is_one(const BIGNUM *a);
17 int BN_is_word(const BIGNUM *a, const BN_ULONG w);
18 int BN_abs_is_word(const BIGNUM *a, const BN_ULONG w);
19 int BN_is_odd(const BIGNUM *a);
30 BN_is_odd() tests if I<a> is odd.
34 The values of B<a> and B<b> and B<ctx> must not be NULL.
38 BN_cmp() returns -1 if I<a> E<lt> I<b>, 0 if I<a> == I<b> and 1 if
[all …]
H A DASN1_INTEGER_get_int64.pod13 int ASN1_INTEGER_get_int64(int64_t *pr, const ASN1_INTEGER *a);
14 long ASN1_INTEGER_get(const ASN1_INTEGER *a);
16 int ASN1_INTEGER_set_int64(ASN1_INTEGER *a, int64_t r);
17 int ASN1_INTEGER_set(ASN1_INTEGER *a, long v);
20 int ASN1_INTEGER_set_uint64(ASN1_INTEGER *a, uint64_t r);
26 long ASN1_ENUMERATED_get(const ASN1_ENUMERATED *a);
29 int ASN1_ENUMERATED_set(ASN1_ENUMERATED *a, long v);
48 ASN1_INTEGER_get() also returns the value of I<a> but it returns 0 if I<a> is
75 ASN1_ENUMERATED_get() returns the value of I<a> in a similar way to
99 fail if a memory allocation error occurs.
[all …]
H A DUI_create_method.pod62 This function takes a reference to a UI and starts a session, for
63 example by opening a channel to a tty, or by creating a dialog box.
65 =item a writer
67 This function takes a reference to a UI and a UI String, and writes
73 =item a flusher
75 This function takes a reference to a UI, and flushes everything that
80 =item a reader
82 This function takes a reference to a UI and a UI string and reads off
83 the given prompt, maybe from the tty, maybe from a field in a dialog
88 =item a closer
[all …]
H A DBIO_find_type.pod17 The BIO_find_type() searches for a B<BIO> of a given type in a chain, starting
18 at B<BIO> I<b>. If I<type> is a specific type (such as B<BIO_TYPE_MEM>) then a
19 search is made for a B<BIO> of that type. If I<type> is a general type (such as
22 found. If I<type> is B<BIO_TYPE_NONE> it will not find a match.
30 in a chain or used in conjunction with BIO_find_type() to find all BIOs of a
33 BIO_method_type() returns the type of a BIO.
37 BIO_find_type() returns a matching BIO or NULL for no match.
39 BIO_next() returns the next BIO in a chain.
45 Traverse a chain looking for digest BIOs:
54 /* btmp is a digest BIO, do something with it ...*/
[all …]
H A DSSL_alert_type_string.pod25 SSL_alert_desc_string() returns a two letter string as a short form
34 a special situation, it sends an alert. The alert is sent as a special message
74 The connection shall be closed. This is a warning alert.
101 A client, that was asked to send a certificate, does not send a certificate
140 2^14+2048 bytes, or a record decrypted to a TLSCompressed record
165 unable to correctly verify a signature, decrypt a key exchange,
166 or validate a finished message.
171 detected; for example, attempting to transfer a 1024 bit
201 by a close_notify. This message is generally a warning.
211 appropriate would be where a server has spawned a process to
[all …]
H A DBN_zero.pod12 void BN_zero(BIGNUM *a);
13 int BN_one(BIGNUM *a);
17 int BN_set_word(BIGNUM *a, BN_ULONG w);
18 unsigned BN_ULONG BN_get_word(BIGNUM *a);
22 B<BN_ULONG> is a macro that will be an unsigned integral type optimized
25 BN_zero(), BN_one() and BN_set_word() set B<a> to the values 0, 1 and
28 BN_value_one() returns a B<BIGNUM> constant of value 1. This constant
31 BN_get_word() returns B<a>, if it can be represented as a B<BN_ULONG>.
35 BN_get_word() returns the value B<a>, or all-bits-set if B<a> cannot
36 be represented as a single integer.
[all …]
/openssl/crypto/objects/
H A Dobj_dat.c128 a = ca->obj; in added_obj_hash()
143 ret = a->nid; in added_obj_hash()
162 a = ca->obj; in added_obj_cmp()
169 return memcmp(a->data, b->data, (size_t)a->length); in added_obj_cmp()
194 a->obj->nid = 0; in cleanup1_doall()
201 a->obj->nid++; in cleanup2_doall()
208 OPENSSL_free(a); in cleanup3_doall()
381 return memcmp(a->data, b->data, a->length); in obj_cmp()
392 if (a == NULL) in ossl_obj_obj2nid()
481 if (a == NULL || a->data == NULL) in OBJ_obj2txt()
[all …]
/openssl/doc/designs/quic-design/
H A Dconnection-id-cache.md13 * pick a non-retired ID associated from those available for a connection and
33 * generate a new connection ID and associate it with a connection;
34 * query if a connection ID is present;
35 * for a server, map a connection ID to a QUIC_CONNECTION;
49 will be implemented as a dictionary.
79 a [RETIRE_CONNECTION_ID] frame and this is acknowledged by a
86 If we want to retire a frame, we send a retirement frame and mark the
140 * Add a remote connection ID to the cache
149 * Query a remote connection for a connection ID.
184 * Generate a new random local connection ID and associate it with a connection.
[all …]
H A Ddebugging.md21 because they work from a network viewpoint, they cannot provide direct
34 - Pro: Information on internal states and decisions made by a QUIC
36 - Pro: No need to obtain a keylog
40 - Con: Need to obtain a keylog
76 guarantee and must not be relied upon from a privacy perspective.)
86 **Using Wireshark.** Once you have obtained a packet capture as a standard
102 such a file is to enable a TLS or QUIC session to be decrypted for development
103 purposes in a lab environment. It should go without saying that the export of a
104 keylog file should never be used in a production environment.
116 Once you have a keylog file you can configure Wireshark to use it.
[all …]
/openssl/test/
H A Dlist_test.c33 OSSL_LIST(fizz) a; in test_fizzbuzz()
39 ossl_list_fizz_init(&a); in test_fizzbuzz()
42 if (!TEST_true(ossl_list_fizz_is_empty(&a))) in test_fizzbuzz()
50 ossl_list_fizz_insert_tail(&a, elem + i); in test_fizzbuzz()
59 if (!TEST_false(ossl_list_fizz_is_empty(&a)) in test_fizzbuzz()
60 || !TEST_size_t_eq(ossl_list_fizz_num(&a), na) in test_fizzbuzz()
62 || !TEST_ptr(ossl_list_fizz_head(&a)) in test_fizzbuzz()
63 || !TEST_ptr(ossl_list_fizz_tail(&a)) in test_fizzbuzz()
71 ossl_list_fizz_remove(&a, ossl_list_fizz_head(&a)); in test_fizzbuzz()
73 if (!TEST_size_t_eq(ossl_list_fizz_num(&a), --na) in test_fizzbuzz()
[all …]
/openssl/crypto/sha/asm/
H A Dsha1-alpha.pl68 sll $a,5,$t1
73 zapnot $a,0xf,$a
76 srl $a,27,$t0
93 sll $a,5,$t1
96 zapnot $a,0xf,$a
113 sll $a,5,$t1
118 zapnot $a,0xf,$a
146 sll $a,5,$t1
148 zapnot $a,0xf,$a
176 zapnot $a,0xf,$a
[all …]
H A Dsha1-ia64.pl60 my ($i,$a,$b,$c,$d,$e)=@_;
81 dep.z tmp5=$a,5,27 };; // a<<5
84 extr.u tmp1=$a,27,5 };; // a>>27
104 dep.z tmp5=$a,5,27 };; // a<<5
126 my ($i,$a,$b,$c,$d,$e)=@_;
132 dep.z tmp5=$a,5,27 } // a<<5
163 dep.z tmp5=$a,5,27 } // a<<5
184 dep.z tmp5=$a,5,27 } // a<<5
186 add $h1=$h1,$a };; // wrap up
204 my ($i,$a,$b,$c,$d,$e)=@_;
[all …]
/openssl/providers/implementations/macs/
H A Dbuild.info4 $GMAC_GOAL=../../libdefault.a ../../libfips.a
5 $HMAC_GOAL=../../libdefault.a ../../libfips.a
6 $KMAC_GOAL=../../libdefault.a ../../libfips.a
7 $CMAC_GOAL=../../libdefault.a ../../libfips.a
8 $BLAKE2_GOAL=../../libdefault.a
9 $SIPHASH_GOAL=../../libdefault.a
10 $POLY1305_GOAL=../../libdefault.a
/openssl/doc/internal/man3/
H A DOSSL_TIME.pod63 B<OSSL_TIME> can represent a duration, or a point in time. Where it is
64 used to represent a point in time, it does so by expressing a duration
102 B<ossl_time_to_timeval> converts a time to a I<struct timeval>.
104 B<ossl_time_from_timeval> converts a I<struct timeval> to a time.
106 B<ossl_time_to_time_t> converts a time to a I<time_t>.
108 B<ossl_time_from_time_t> converts a I<time_t> to a time.
110 B<ossl_time_compare> compares I<a> with I<b> and returns -1 if I<a>
119 returning I<a> + I<b>.
123 returning I<a> - I<b>.
126 B<ossl_time_multiply> performs a saturating multiplication of a time value by a
[all …]
H A DOSSL_SAFE_MATH_SIGNED.pod19 TYPE safe_add_TYPE(TYPE a, TYPE b, int *err);
20 TYPE safe_sub_TYPE(TYPE a, TYPE b, int *err);
21 TYPE safe_mul_TYPE(TYPE a, TYPE b, int *err);
22 TYPE safe_div_TYPE(TYPE a, TYPE b, int *err);
23 TYPE safe_mod_TYPE(TYPE a, TYPE b, int *err);
26 TYPE safe_neg_TYPE(TYPE a, int *err);
27 TYPE safe_abs_TYPE(TYPE a, int *err);
45 safe_sub_TYPE() subtracts I<b> from I<a>.
49 safe_div_TYPE() divides I<a> by I<b>.
53 safe_div_round_up_TYPE() calculates I<a> / I<b> + (I<a> % I<b> != 0).
[all …]
/openssl/crypto/md4/
H A Dmd4_local.h50 #define R0(a,b,c,d,k,s,t) { \ argument
51 a+=((k)+(t)+F((b),(c),(d))); \
52 a=ROTATE(a,s); };
54 #define R1(a,b,c,d,k,s,t) { \ argument
55 a+=((k)+(t)+G((b),(c),(d))); \
56 a=ROTATE(a,s); };
58 #define R2(a,b,c,d,k,s,t) { \ argument
59 a+=((k)+(t)+H((b),(c),(d))); \
60 a=ROTATE(a,s); };
/openssl/include/internal/
H A Dquic_types.h59 static ossl_unused ossl_inline QUIC_PN ossl_quic_pn_max(QUIC_PN a, QUIC_PN b) in ossl_quic_pn_max() argument
61 return a > b ? a : b; in ossl_quic_pn_max()
64 static ossl_unused ossl_inline QUIC_PN ossl_quic_pn_min(QUIC_PN a, QUIC_PN b) in ossl_quic_pn_min() argument
66 return a < b ? a : b; in ossl_quic_pn_min()
82 static ossl_unused ossl_inline int ossl_quic_conn_id_eq(const QUIC_CONN_ID *a, in ossl_quic_conn_id_eq() argument
85 if (a->id_len != b->id_len || a->id_len > QUIC_MAX_CONN_ID_LEN) in ossl_quic_conn_id_eq()
87 return memcmp(a->id, b->id, a->id_len) == 0; in ossl_quic_conn_id_eq()
/openssl/crypto/bn/asm/
H A Dco-586.pl28 local($a,$ai,$b,$bi,$c0,$c1,$c2,$pos,$i,$na,$nb)=@_;
61 &comment("sqr a[$ai]*a[$bi]");
90 &comment("sqr a[$ai]*a[$bi]");
118 local($a,$b,$c0,$c1,$c2);
127 $a="esi";
137 &mov($a,&wparam(1));
209 local($r,$a,$c0,$c1,$c2)=@_;
218 $a="esi";
226 &mov($a,&wparam(1));
266 &sqr_add_c($r,$a,$ai,$bi,
[all …]
/openssl/util/
H A Dcheck-format-test-positives.c79 int f (int a, /*@ space after fn before '(', reported unless sloppy-spc */
85 a] - /*@ unexpected closing bracket */
98 somefunc(a, /*@2 statement indent off by -1 */
108 if(a /*@ missing space after 'if', reported unless sloppy-spc */
114 (a^ 1) + /*@ missing space before '^', reported unless sloppy-spc */
116 a %2 / /*@ missing space after '%', reported unless sloppy-spc */
120 xx = a + b /*@ extra single-statement indent off by 1 */
122 if (a ++) /*@ space before postfix '++', reported unless sloppy-spc */
129 if (1) f(a, /*@ (non-brace) code after end of 'if' condition */
140 while (a+ 0); /*@2 missing space before '+', reported unless sloppy-spc */
/openssl/doc/man7/
H A Dbio.pod20 There are two types of BIO, a source/sink BIO and a filter BIO.
22 As its name implies a source/sink BIO is a source and/or sink of data,
23 examples include a socket BIO and a file BIO.
27 example a message digest BIO) or translated (for example an
33 BIOs can be joined together to form a chain (a single BIO is a chain
44 in a memory leak.
49 Normally the I<type> argument is supplied by a function which returns a
50 pointer to a BIO_METHOD. There is a naming convention for such functions:
51 a source/sink BIO typically starts with I<BIO_s_> and
52 a filter BIO with I<BIO_f_>.
[all …]
/openssl/crypto/ts/
H A Dts_req_print.c18 int TS_REQ_print_bio(BIO *bio, TS_REQ *a) in TS_REQ_print_bio() argument
23 if (a == NULL) in TS_REQ_print_bio()
26 v = TS_REQ_get_version(a); in TS_REQ_print_bio()
29 TS_MSG_IMPRINT_print_bio(bio, a->msg_imprint); in TS_REQ_print_bio()
32 policy_id = TS_REQ_get_policy_id(a); in TS_REQ_print_bio()
39 if (a->nonce == NULL) in TS_REQ_print_bio()
42 TS_ASN1_INTEGER_print_bio(bio, a->nonce); in TS_REQ_print_bio()
46 a->cert_req ? "yes" : "no"); in TS_REQ_print_bio()
48 TS_ext_print_bio(bio, a->extensions); in TS_REQ_print_bio()
/openssl/crypto/asn1/
H A Dd2i_param.c18 EVP_PKEY *d2i_KeyParams(int type, EVP_PKEY **a, const unsigned char **pp, in d2i_KeyParams() argument
23 if ((a == NULL) || (*a == NULL)) { in d2i_KeyParams()
27 ret = *a; in d2i_KeyParams()
40 if (a != NULL) in d2i_KeyParams()
41 (*a) = ret; in d2i_KeyParams()
44 if (a == NULL || *a != ret) in d2i_KeyParams()
49 EVP_PKEY *d2i_KeyParams_bio(int type, EVP_PKEY **a, BIO *in) in d2i_KeyParams_bio() argument
61 ret = d2i_KeyParams(type, a, &p, len); in d2i_KeyParams_bio()
/openssl/crypto/sha/
H A Dsha512.c540 # define ROTR(a,n) _rotr64((a),n) argument
673 a = ctx->h[0]; in sha512_block_data_order()
689 T2 = Sigma0(a) + Maj(a, b, c); in sha512_block_data_order()
696 b = a; in sha512_block_data_order()
697 a = T1 + T2; in sha512_block_data_order()
708 T2 = Sigma0(a) + Maj(a, b, c); in sha512_block_data_order()
715 b = a; in sha512_block_data_order()
719 ctx->h[0] += a; in sha512_block_data_order()
735 h = Sigma0(a) + Maj(a,b,c); \
758 a = ctx->h[0]; in sha512_block_data_order_c()
[all …]

Completed in 48 milliseconds

12345678910>>...75