Home
last modified time | relevance | path

Searched refs:fixed (Results 1 – 25 of 41) sorted by relevance

12

/openssl-master/doc/man7/
A DEVP_KDF-HKDF.pod14 and "extracts" from it a fixed-length pseudorandom key K. The second stage
57 intermediate fixed-length pseudorandom key K is not returned.
65 operation. The value returned will be the intermediate fixed-length pseudorandom
75 operation. The input key should be set to the intermediate fixed-length
95 the intermediate fixed-length pseudorandom key otherwise an error will occur.
96 For that mode, the fixed output size can be looked up by calling EVP_KDF_CTX_get_kdf_size()
A DEVP_KDF-TLS13_KDF.pod62 operation. The value returned will be the intermediate fixed-length pseudorandom
72 operation. The input key should be set to the intermediate fixed-length
99 the intermediate fixed-length pseudorandom key otherwise an error will occur.
100 For that mode, the fixed output size can be looked up by calling
A DEVP_KDF-SCRYPT.pod67 fixed digest internally. NULL is used if this value is not set.
A DEVP_PKEY-FFC.pod176 testing purposes only. This will either produce fixed values for the generated
/openssl-master/doc/man3/
A DEVP_PKEY_CTX_set_hkdf_md.pod32 and "extracts" from it a fixed-length pseudorandom key K. The second stage
46 intermediate fixed-length pseudorandom key K is not returned.
54 operation. The value returned will be the intermediate fixed-length pseudorandom
63 operation. The input key should be set to the intermediate fixed-length
A DEVP_OpenInit.pod42 key length. If the cipher is a fixed length cipher then the recovered
43 key length must match the fixed cipher length.
A DBN_mod_exp_mont.pod35 L<BN_mod_exp_mont(3)> that uses fixed windows and the special precomputation
43 fixed and equal modulus sizes I<m1> and I<m2> it uses optimizations that allow
A DEC_POINT_add.pod50 …LL, and B<n> non-NULL, in which case the result is just generator * B<n> (fixed point multiplicati…
51 When performing a single fixed or variable point multiplication, the underlying implementation uses…
55 When performing a fixed point multiplication (B<n> is non-NULL and B<num> is 0) or a variable point…
A DEVP_blake2b512.pod47 this implementation outputs a digest of a fixed length (the maximum length
A DDH_generate_key.pod46 DH_compute_key_padded() is similar but stores a fixed number of bytes.
A DEVP_KDF.pod107 If the algorithm produces a fixed amount of output then an error will
157 EVP_KDF_CTX_get_kdf_size() returns the output size if the algorithm produces a fixed amount
160 calculate a fixed output size have not yet been supplied.
A DEVP_VerifyInit.pod83 The previous two bugs are fixed in the newer EVP_DigestVerify*() function.
A DBN_BLINDING_new.pod80 of the B<BN_BLINDING> parameters after a fixed number of uses (currently
A DSSL_set1_host.pod52 rather than a fixed name, the matched peer name may be a sub-domain
A DEVP_SignInit.pod88 The previous two bugs are fixed in the newer EVP_SignDigest*() function.
A DEVP_EncryptInit.pod500 key length for all ciphers. Note: although EVP_CIPHER_get_key_length() is fixed for
507 If the cipher is a fixed length cipher then attempting to set the key
508 length to any value other than the fixed value is an error.
914 Sets the fixed portion of an IV for an AEAD cipher used in a TLS record
918 AEAD IVs in TLSv1.2 consist of an implicit "fixed" part and an explicit part
920 Setting a TLS fixed IV changes a cipher to encrypt/decrypt TLS records.
1250 All algorithms have a fixed key length unless otherwise stated.
1481 define a generic key as a fixed unsigned char array containing
A DSSL_CTX_set_tlsext_servername_callback.pod156 corner cases. This has been fixed from OpenSSL 1.1.1e.
A DSSL_CIPHER_get_name.pod194 rather than a fixed string, in OpenSSL 1.1.0.
/openssl-master/providers/implementations/ciphers/
A Dcipher_chacha20_poly1305.h39 int (*tls_iv_set_fixed)(PROV_CIPHER_CTX *ctx, unsigned char *fixed,
A Dcipher_chacha20_poly1305_hw.c46 unsigned char *fixed, size_t flen) in chacha_poly1305_tls_iv_set_fixed() argument
52 ctx->nonce[0] = ctx->chacha.counter[1] = CHACHA_U8TOU32(fixed); in chacha_poly1305_tls_iv_set_fixed()
53 ctx->nonce[1] = ctx->chacha.counter[2] = CHACHA_U8TOU32(fixed + 4); in chacha_poly1305_tls_iv_set_fixed()
54 ctx->nonce[2] = ctx->chacha.counter[3] = CHACHA_U8TOU32(fixed + 8); in chacha_poly1305_tls_iv_set_fixed()
A Dciphercommon_ccm.c52 static int ccm_tls_iv_set_fixed(PROV_CCM_CTX *ctx, unsigned char *fixed, in ccm_tls_iv_set_fixed() argument
59 memcpy(ctx->iv, fixed, flen); in ccm_tls_iv_set_fixed()
/openssl-master/crypto/bn/
A Dbuild.info82 $BNASM_ppc64=$BNASM_ppc32 ppc64-mont-fixed.s
174 GENERATE[ppc64-mont-fixed.s]=asm/ppc64-mont-fixed.pl
/openssl-master/test/
A Dwpackettest.c24 static const unsigned char fixed[] = { 0xff, 0xff, 0xff }; variable
98 || !TEST_mem_eq(sbuf, written, fixed, sizeof(sbuf)) in test_WPACKET_init()
/openssl-master/
A DSUPPORT.md56 The fastest way to get a bug fixed is to fix it yourself ;-). If you are
/openssl-master/external/perl/Text-Template-1.56/
A DChanges96 memory leaks in long-running applications. This should be fixed now, and
261 - More documentation. Errors fixed.

Completed in 27 milliseconds

12