Searched refs:fill (Results 1 – 17 of 17) sorted by relevance
/openssl-master/crypto/ec/curve448/ |
A D | f_generic.c | 23 unsigned int j = 0, fill = 0; in gf_serialize() local 34 if (fill < 8 && j < NLIMBS) { in gf_serialize() 35 buffer |= ((dword_t) red->limb[LIMBPERM(j)]) << fill; in gf_serialize() 36 fill += LIMB_PLACE_VALUE(LIMBPERM(j)); in gf_serialize() 40 fill -= 8; in gf_serialize() 69 unsigned int j = 0, fill = 0; in gf_deserialize() local 77 while (fill < LIMB_PLACE_VALUE(LIMBPERM(i)) && j < nbytes) { in gf_deserialize() 83 buffer |= ((dword_t) sj) << fill; in gf_deserialize() 84 fill += 8; in gf_deserialize() 89 fill -= LIMB_PLACE_VALUE(LIMBPERM(i)); in gf_deserialize()
|
/openssl-master/providers/implementations/digests/ |
A D | blake2b_prov.c | 261 size_t fill; in ossl_blake2b_update() local 271 fill = sizeof(c->buf) - c->buflen; in ossl_blake2b_update() 272 if (datalen > fill) { in ossl_blake2b_update() 274 memcpy(c->buf + c->buflen, in, fill); /* Fill buffer */ in ossl_blake2b_update() 277 in += fill; in ossl_blake2b_update() 278 datalen -= fill; in ossl_blake2b_update()
|
A D | blake2s_prov.c | 252 size_t fill; in ossl_blake2s_update() local 262 fill = sizeof(c->buf) - c->buflen; in ossl_blake2s_update() 263 if (datalen > fill) { in ossl_blake2s_update() 265 memcpy(c->buf + c->buflen, in, fill); /* Fill buffer */ in ossl_blake2s_update() 268 in += fill; in ossl_blake2s_update() 269 datalen -= fill; in ossl_blake2s_update()
|
/openssl-master/external/perl/Text-Template-1.56/ |
A D | README | 7 `fill in' a template, you evaluate the little programs and replace 45 You can fill in the template in a `Safe' compartment. This means that
|
/openssl-master/doc/man3/ |
A D | SSL_CTX_set_generate_session_id.pod | 56 callback may only fill part of the possible length and leave B<id_len> 70 fill in the bytes not used to code special information with random data 96 server id given, and will fill the rest with pseudo random bytes:
|
A D | OPENSSL_instrument_bus.pod | 32 performs at most B<max> probes in attempt to fill the B<vector[num]>,
|
A D | BIO_ADDR.pod | 37 with routines that will fill it with information, such as
|
A D | OSSL_PARAM.pod | 281 must fill all I<data_size> bytes and ensure correct padding for the 332 could fill in the parameters like this:
|
A D | SSL_CTX_load_verify_locations.pod | 109 try to fill in missing certificates from B<CAfile>/B<CApath>, if the
|
A D | BIO_s_bio.pod | 172 flush the write buffer and/or fill the read buffer.
|
A D | OSSL_PARAM_int.pod | 377 could fill in the parameters like this:
|
A D | SSL_read_early_data.pod | 255 transmitted if enough data to fill an entire TCP packet is accumulated, or if
|
/openssl-master/crypto/x509/ |
A D | v3_addr.c | 102 const int length, const unsigned char fill) in addr_expand() argument 110 if (fill == 0) in addr_expand() 116 memset(addr + bs->length, fill, length - bs->length); in addr_expand() 130 const unsigned char fill, const ASN1_BIT_STRING *bs) in i2r_address() argument 139 if (!addr_expand(addr, bs, 4, fill)) in i2r_address() 144 if (!addr_expand(addr, bs, 16, fill)) in i2r_address()
|
/openssl-master/doc/man7/ |
A D | proxy-certificates.pod | 150 right time. You also need to fill in the defaults when the EE 253 * another, temporary bit array and fill it with
|
/openssl-master/doc/internal/man3/ |
A D | ossl_cmp_certreq_new.pod | 48 The allocate a new message, fill it with the relevant data derived from
|
A D | OPTIONS.pod | 262 necessary range-checking. They return 1 if successful and fill in the
|
/openssl-master/ |
A D | CHANGES.md | 3705 For EVP_MD and EVP_CIPHER, complete APIs to create, fill and 15058 (which will fill the cache with candidate certificates) 16721 and have it automatically work out the correct field type and fill in
|
Completed in 40 milliseconds