Searched refs:fixed (Results 1 – 25 of 41) sorted by relevance
12
/openssl-master/doc/man7/ |
A D | EVP_KDF-HKDF.pod | 14 and "extracts" from it a fixed-length pseudorandom key K. The second stage 57 intermediate fixed-length pseudorandom key K is not returned. 65 operation. The value returned will be the intermediate fixed-length pseudorandom 75 operation. The input key should be set to the intermediate fixed-length 95 the intermediate fixed-length pseudorandom key otherwise an error will occur. 96 For that mode, the fixed output size can be looked up by calling EVP_KDF_CTX_get_kdf_size()
|
A D | EVP_KDF-TLS13_KDF.pod | 62 operation. The value returned will be the intermediate fixed-length pseudorandom 72 operation. The input key should be set to the intermediate fixed-length 99 the intermediate fixed-length pseudorandom key otherwise an error will occur. 100 For that mode, the fixed output size can be looked up by calling
|
A D | EVP_KDF-SCRYPT.pod | 67 fixed digest internally. NULL is used if this value is not set.
|
A D | EVP_PKEY-FFC.pod | 176 testing purposes only. This will either produce fixed values for the generated
|
/openssl-master/doc/man3/ |
A D | EVP_PKEY_CTX_set_hkdf_md.pod | 32 and "extracts" from it a fixed-length pseudorandom key K. The second stage 46 intermediate fixed-length pseudorandom key K is not returned. 54 operation. The value returned will be the intermediate fixed-length pseudorandom 63 operation. The input key should be set to the intermediate fixed-length
|
A D | EVP_OpenInit.pod | 42 key length. If the cipher is a fixed length cipher then the recovered 43 key length must match the fixed cipher length.
|
A D | BN_mod_exp_mont.pod | 35 L<BN_mod_exp_mont(3)> that uses fixed windows and the special precomputation 43 fixed and equal modulus sizes I<m1> and I<m2> it uses optimizations that allow
|
A D | EC_POINT_add.pod | 50 …LL, and B<n> non-NULL, in which case the result is just generator * B<n> (fixed point multiplicati… 51 When performing a single fixed or variable point multiplication, the underlying implementation uses… 55 When performing a fixed point multiplication (B<n> is non-NULL and B<num> is 0) or a variable point…
|
A D | EVP_blake2b512.pod | 47 this implementation outputs a digest of a fixed length (the maximum length
|
A D | DH_generate_key.pod | 46 DH_compute_key_padded() is similar but stores a fixed number of bytes.
|
A D | EVP_KDF.pod | 107 If the algorithm produces a fixed amount of output then an error will 157 EVP_KDF_CTX_get_kdf_size() returns the output size if the algorithm produces a fixed amount 160 calculate a fixed output size have not yet been supplied.
|
A D | EVP_VerifyInit.pod | 83 The previous two bugs are fixed in the newer EVP_DigestVerify*() function.
|
A D | BN_BLINDING_new.pod | 80 of the B<BN_BLINDING> parameters after a fixed number of uses (currently
|
A D | SSL_set1_host.pod | 52 rather than a fixed name, the matched peer name may be a sub-domain
|
A D | EVP_SignInit.pod | 88 The previous two bugs are fixed in the newer EVP_SignDigest*() function.
|
A D | EVP_EncryptInit.pod | 500 key length for all ciphers. Note: although EVP_CIPHER_get_key_length() is fixed for 507 If the cipher is a fixed length cipher then attempting to set the key 508 length to any value other than the fixed value is an error. 914 Sets the fixed portion of an IV for an AEAD cipher used in a TLS record 918 AEAD IVs in TLSv1.2 consist of an implicit "fixed" part and an explicit part 920 Setting a TLS fixed IV changes a cipher to encrypt/decrypt TLS records. 1250 All algorithms have a fixed key length unless otherwise stated. 1481 define a generic key as a fixed unsigned char array containing
|
A D | SSL_CTX_set_tlsext_servername_callback.pod | 156 corner cases. This has been fixed from OpenSSL 1.1.1e.
|
A D | SSL_CIPHER_get_name.pod | 194 rather than a fixed string, in OpenSSL 1.1.0.
|
/openssl-master/providers/implementations/ciphers/ |
A D | cipher_chacha20_poly1305.h | 39 int (*tls_iv_set_fixed)(PROV_CIPHER_CTX *ctx, unsigned char *fixed,
|
A D | cipher_chacha20_poly1305_hw.c | 46 unsigned char *fixed, size_t flen) in chacha_poly1305_tls_iv_set_fixed() argument 52 ctx->nonce[0] = ctx->chacha.counter[1] = CHACHA_U8TOU32(fixed); in chacha_poly1305_tls_iv_set_fixed() 53 ctx->nonce[1] = ctx->chacha.counter[2] = CHACHA_U8TOU32(fixed + 4); in chacha_poly1305_tls_iv_set_fixed() 54 ctx->nonce[2] = ctx->chacha.counter[3] = CHACHA_U8TOU32(fixed + 8); in chacha_poly1305_tls_iv_set_fixed()
|
A D | ciphercommon_ccm.c | 52 static int ccm_tls_iv_set_fixed(PROV_CCM_CTX *ctx, unsigned char *fixed, in ccm_tls_iv_set_fixed() argument 59 memcpy(ctx->iv, fixed, flen); in ccm_tls_iv_set_fixed()
|
/openssl-master/crypto/bn/ |
A D | build.info | 82 $BNASM_ppc64=$BNASM_ppc32 ppc64-mont-fixed.s 174 GENERATE[ppc64-mont-fixed.s]=asm/ppc64-mont-fixed.pl
|
/openssl-master/test/ |
A D | wpackettest.c | 24 static const unsigned char fixed[] = { 0xff, 0xff, 0xff }; variable 98 || !TEST_mem_eq(sbuf, written, fixed, sizeof(sbuf)) in test_WPACKET_init()
|
/openssl-master/ |
A D | SUPPORT.md | 56 The fastest way to get a bug fixed is to fix it yourself ;-). If you are
|
/openssl-master/external/perl/Text-Template-1.56/ |
A D | Changes | 96 memory leaks in long-running applications. This should be fixed now, and 261 - More documentation. Errors fixed.
|
Completed in 27 milliseconds
12