Searched refs:big (Results 1 – 22 of 22) sorted by relevance
/openssl-master/doc/man3/ |
A D | BN_bn2bin.pod | 37 BN_bn2bin() converts the absolute value of B<a> into big-endian form 41 BN_bn2binpad() also converts the absolute value of B<a> into big-endian form 46 BN_bin2bn() converts the positive integer in big-endian form of length 55 byte first on big-endian platforms, and least significant byte first on 77 big-endian number, and the number itself in big-endian format, where 91 BN_bn2bin() returns the length of the big-endian number placed at B<to>.
|
A D | RAND_set_DRBG_type.pod | 30 random big generator.
|
A D | BF_encrypt.pod | 101 platforms and big-endian on big-endian ones.
|
A D | ASN1_STRING_length.pod | 75 character in big endian format, and for a UTF8String it will be in UTF8 format.
|
A D | EVP_PKEY_gettable_params.pod | 76 EVP_PKEY_get_octet_string_param() if I<max_buf_sz> is not big enough to hold the
|
A D | EVP_PKEY_set1_encoded_public_key.pod | 38 DH it should be encoded as a positive integer in big-endian form. For EC is
|
A D | ASN1_INTEGER_get_int64.pod | 41 (due to invalid type or the value being too big to fit into an B<int64_t> type)
|
A D | EC_POINT_new.pod | 173 not included. B<BIGNUM> form is the octet form interpreted as a big endian
|
A D | OSSL_PARAM_int.pod | 170 for defining UTF8 strings, OCTET strings and big numbers.
|
A D | EVP_EncryptInit.pod | 623 keys of a specific form. I<key> must point to a buffer at least as big as the
|
/openssl-master/providers/implementations/kdfs/ |
A D | kbkdf.c | 88 uint32_t big = 0; in be32() local 94 big |= (host & 0xff000000) >> 24; in be32() 95 big |= (host & 0x00ff0000) >> 8; in be32() 96 big |= (host & 0x0000ff00) << 8; in be32() 97 big |= (host & 0x000000ff) << 24; in be32() 98 return big; in be32()
|
/openssl-master/test/recipes/04-test_params_conversion_data/ |
A D | native_types.txt | 313 # big 321 # big
|
/openssl-master/crypto/bn/ |
A D | bn_lib.c | 478 typedef enum {big, little} endianess_t; enumerator 514 if (endianess == big) in bn2binpad() 521 if (endianess == big) in bn2binpad() 535 return bn2binpad(a, to, tolen, big); in BN_bn2binpad() 540 return bn2binpad(a, to, -1, big); in BN_bn2bin()
|
/openssl-master/providers/implementations/ciphers/ |
A D | cipher_aes_gcm_hw_s390x.inc | 139 * big-endian. 203 * success. Code is big-endian.
|
A D | cipher_aes_ccm_hw_s390x.inc | 46 * Process additional authenticated data. Code is big-endian.
|
/openssl-master/test/recipes/80-test_cmp_http_data/ |
A D | test_credentials.csv | 32 1,extracerts big file, -section,,BLANK,,BLANK,, -cert,signer.crt, -key,signer.p12, -keypass,pass:12…
|
/openssl-master/doc/man7/ |
A D | passphrase-encoding.pod | 32 encoded in big endian (UCS-2 BE).
|
A D | migration_guide.pod | 1611 formats are not individual big-endian integers.
|
/openssl-master/crypto/err/ |
A D | openssl.txt | 515 DSO_R_FILENAME_TOO_BIG:101:filename too big 1144 RSA_R_DIGEST_TOO_BIG_FOR_RSA_KEY:112:digest too big for rsa key 1319 SSL_R_DTLS_MESSAGE_TOO_BIG:334:dtls message too big
|
/openssl-master/test/recipes/30-test_evp_data/ |
A D | evpciph_aes_common.txt | 596 # Self-generated vector to trigger false carry on big-endian platforms
|
/openssl-master/crypto/objects/ |
A D | objects.txt | 1731 dstu4145le 1 1 : dstu4145be : DSTU 4145-2002 big endian
|
/openssl-master/ |
A D | CHANGES.md | 4858 values of len that are too big and therefore p + len < limit. 6059 values of len that are too big and therefore p + len < limit. 14403 * Add configuration option to build on Linux on both big-endian and 16475 There are two big advantages in doing things this way. The extensions 16488 to garbage. This is because not salting is a big security hole, so people 18057 * DES quad checksum was broken on big-endian architectures. Fixed.
|
Completed in 48 milliseconds