Home
last modified time | relevance | path

Searched refs:big (Results 1 – 22 of 22) sorted by relevance

/openssl-master/doc/man3/
A DBN_bn2bin.pod37 BN_bn2bin() converts the absolute value of B<a> into big-endian form
41 BN_bn2binpad() also converts the absolute value of B<a> into big-endian form
46 BN_bin2bn() converts the positive integer in big-endian form of length
55 byte first on big-endian platforms, and least significant byte first on
77 big-endian number, and the number itself in big-endian format, where
91 BN_bn2bin() returns the length of the big-endian number placed at B<to>.
A DRAND_set_DRBG_type.pod30 random big generator.
A DBF_encrypt.pod101 platforms and big-endian on big-endian ones.
A DASN1_STRING_length.pod75 character in big endian format, and for a UTF8String it will be in UTF8 format.
A DEVP_PKEY_gettable_params.pod76 EVP_PKEY_get_octet_string_param() if I<max_buf_sz> is not big enough to hold the
A DEVP_PKEY_set1_encoded_public_key.pod38 DH it should be encoded as a positive integer in big-endian form. For EC is
A DASN1_INTEGER_get_int64.pod41 (due to invalid type or the value being too big to fit into an B<int64_t> type)
A DEC_POINT_new.pod173 not included. B<BIGNUM> form is the octet form interpreted as a big endian
A DOSSL_PARAM_int.pod170 for defining UTF8 strings, OCTET strings and big numbers.
A DEVP_EncryptInit.pod623 keys of a specific form. I<key> must point to a buffer at least as big as the
/openssl-master/providers/implementations/kdfs/
A Dkbkdf.c88 uint32_t big = 0; in be32() local
94 big |= (host & 0xff000000) >> 24; in be32()
95 big |= (host & 0x00ff0000) >> 8; in be32()
96 big |= (host & 0x0000ff00) << 8; in be32()
97 big |= (host & 0x000000ff) << 24; in be32()
98 return big; in be32()
/openssl-master/test/recipes/04-test_params_conversion_data/
A Dnative_types.txt313 # big
321 # big
/openssl-master/crypto/bn/
A Dbn_lib.c478 typedef enum {big, little} endianess_t; enumerator
514 if (endianess == big) in bn2binpad()
521 if (endianess == big) in bn2binpad()
535 return bn2binpad(a, to, tolen, big); in BN_bn2binpad()
540 return bn2binpad(a, to, -1, big); in BN_bn2bin()
/openssl-master/providers/implementations/ciphers/
A Dcipher_aes_gcm_hw_s390x.inc139 * big-endian.
203 * success. Code is big-endian.
A Dcipher_aes_ccm_hw_s390x.inc46 * Process additional authenticated data. Code is big-endian.
/openssl-master/test/recipes/80-test_cmp_http_data/
A Dtest_credentials.csv32 1,extracerts big file, -section,,BLANK,,BLANK,, -cert,signer.crt, -key,signer.p12, -keypass,pass:12…
/openssl-master/doc/man7/
A Dpassphrase-encoding.pod32 encoded in big endian (UCS-2 BE).
A Dmigration_guide.pod1611 formats are not individual big-endian integers.
/openssl-master/crypto/err/
A Dopenssl.txt515 DSO_R_FILENAME_TOO_BIG:101:filename too big
1144 RSA_R_DIGEST_TOO_BIG_FOR_RSA_KEY:112:digest too big for rsa key
1319 SSL_R_DTLS_MESSAGE_TOO_BIG:334:dtls message too big
/openssl-master/test/recipes/30-test_evp_data/
A Devpciph_aes_common.txt596 # Self-generated vector to trigger false carry on big-endian platforms
/openssl-master/crypto/objects/
A Dobjects.txt1731 dstu4145le 1 1 : dstu4145be : DSTU 4145-2002 big endian
/openssl-master/
A DCHANGES.md4858 values of len that are too big and therefore p + len < limit.
6059 values of len that are too big and therefore p + len < limit.
14403 * Add configuration option to build on Linux on both big-endian and
16475 There are two big advantages in doing things this way. The extensions
16488 to garbage. This is because not salting is a big security hole, so people
18057 * DES quad checksum was broken on big-endian architectures. Fixed.

Completed in 48 milliseconds