/openssl-master/crypto/bn/ |
A D | bn_rand.c | 139 if (range->neg || BN_is_zero(range)) { in bnrand_range() 144 n = BN_num_bits(range); /* n > 0 */ in bnrand_range() 150 else if (!BN_is_bit_set(range, n - 2) && !BN_is_bit_set(range, n - 3)) { in bnrand_range() 166 if (BN_cmp(r, range) >= 0) { in bnrand_range() 167 if (!BN_sub(r, r, range)) in bnrand_range() 169 if (BN_cmp(r, range) >= 0) in bnrand_range() 170 if (!BN_sub(r, r, range)) in bnrand_range() 180 while (BN_cmp(r, range) >= 0); in bnrand_range() 193 while (BN_cmp(r, range) >= 0); in bnrand_range() 233 return BN_rand_range(r, range); in BN_pseudo_rand_range() [all …]
|
A D | bn_rsa_fips186_4.c | 253 BIGNUM *base, *range; in ossl_bn_rsa_fips186_4_derive_prime() local 258 range = BN_CTX_get(ctx); in ossl_bn_rsa_fips186_4_derive_prime() 284 || !BN_lshift(range, BN_value_one(), bits) in ossl_bn_rsa_fips186_4_derive_prime() 285 || !BN_sub(range, range, base)) in ossl_bn_rsa_fips186_4_derive_prime() 313 if (!BN_priv_rand_range_ex(X, range, 0, ctx) || !BN_add(X, X, base)) in ossl_bn_rsa_fips186_4_derive_prime()
|
/openssl-master/crypto/x509/ |
A D | v3_asid.c | 41 ASN1_SIMPLE(ASIdOrRange, u.range, ASRange) 130 a->u.range->min != NULL && a->u.range->max != NULL)); in ASIdOrRange_cmp() 134 b->u.range->min != NULL && b->u.range->max != NULL)); in ASIdOrRange_cmp() 140 int r = ASN1_INTEGER_cmp(a->u.range->min, b->u.range->min); in ASIdOrRange_cmp() 219 aor->u.range->min = min; in X509v3_asid_add_id_or_range() 221 aor->u.range->max = max; in X509v3_asid_add_id_or_range() 246 *min = aor->u.range->min; in extract_min_max() 247 *max = aor->u.range->max; in extract_min_max() 450 a->u.range = r; in ASIdentifierChoice_canonize() 454 a->u.range->max = b_max; in ASIdentifierChoice_canonize() [all …]
|
/openssl-master/doc/man3/ |
A D | BN_rand.pod | 22 int BN_rand_range_ex(BIGNUM *rnd, const BIGNUM *range, unsigned int strength, 24 int BN_rand_range(BIGNUM *rnd, const BIGNUM *range); 26 int BN_priv_rand_range_ex(BIGNUM *rnd, const BIGNUM *range, unsigned int strength, 28 int BN_priv_rand_range(BIGNUM *rnd, const BIGNUM *range); 35 int BN_pseudo_rand_range(BIGNUM *rnd, const BIGNUM *range); 63 in the range 0 E<lt>= I<rnd> E<lt> I<range> using the random number
|
A D | ASN1_ITEM_lookup.pod | 19 returns NULL if the index I<i> is out of range.
|
A D | DEFINE_STACK_OF.pod | 107 zero. If I<idx> is out of range then NULL is returned. 145 element or NULL if I<i> is out of range. 152 of range the new element is appended to I<sk>. B<sk_I<TYPE>_insert>() either 171 this will only happen if I<sk> is NULL or I<idx> is out of range. 249 index is out of range.
|
A D | OPENSSL_ia32cap.pod | 13 OpenSSL supports a range of x86[_64] instruction set extensions. These 19 range of processors. For the moment of this writing following bits are
|
A D | EVP_PKEY_meth_get_count.pod | 40 out of range.
|
A D | EC_POINT_add.pod | 51 …ant time algorithm, when the input scalar (either B<n> or B<m>) is in the range [0, ec_group_order… 55 … time algorithm, when the input scalar (either B<n> or B<m[0]>) is in the range [0, ec_group_order…
|
A D | BN_mod_mul_montgomery.pod | 70 outside the expected range.
|
A D | EVP_PKEY_asn1_get_count.pod | 63 out of range.
|
A D | SSL_CTX_set_split_send_fragment.pod | 51 functions will only accept a value in the range 512 - SSL3_RT_MAX_PLAIN_LENGTH. 57 in the range 1 - SSL_MAX_PIPELINES (32). Setting this to a value > 1 will also
|
A D | X509_cmp_time.pod | 64 reference time is before, else 0 to indicate that the reference time is in range
|
A D | SSL_alert_type_string.pod | 128 A field in the handshake was out of range or inconsistent with 159 specified range or the length of the message was incorrect. This
|
A D | OCSP_REQUEST_new.pod | 68 or B<NULL> if the index value is out or range.
|
A D | SSL_get_shared_sigalgs.pod | 35 signature algorithms or B<0> if the B<idx> parameter is out of range.
|
/openssl-master/test/ |
A D | bn_rand_range.h | 14 unsigned int range; member
|
A D | bntest.c | 2070 unsigned int range; member 2079 const unsigned int range = rand_range_cases[n].range; in test_rand_range_single() local 2082 const double expected = iterations / (double)range; in test_rand_range_single() 2089 if (!TEST_ptr(counts = OPENSSL_zalloc(sizeof(*counts) * range)) in test_rand_range_single() 2092 || !TEST_true(BN_set_word(rng, range))) in test_rand_range_single() 2096 || !TEST_uint_lt(v = (unsigned int)BN_get_word(val), range)) in test_rand_range_single() 2101 for (i = 0; i < range; i++) { in test_rand_range_single() 2109 TEST_note("test case %zu range %u iterations %u", n + 1, range, in test_rand_range_single()
|
/openssl-master/include/openssl/ |
A D | bn.h | 223 int BN_rand_range_ex(BIGNUM *r, const BIGNUM *range, unsigned int strength, 225 int BN_rand_range(BIGNUM *rnd, const BIGNUM *range); 226 int BN_priv_rand_range_ex(BIGNUM *r, const BIGNUM *range, 228 int BN_priv_rand_range(BIGNUM *rnd, const BIGNUM *range); 233 int BN_pseudo_rand_range(BIGNUM *rnd, const BIGNUM *range); 550 int BN_generate_dsa_nonce(BIGNUM *out, const BIGNUM *range,
|
/openssl-master/test/recipes/80-test_cmp_http_data/ |
A D | test_connection.csv | 11 0,server port out of range, -section,, -server,_SERVER_HOST:65536,,,,,BLANK,,,,BLANK,,BLANK,,BLANK, 21 0,proxy port out of range, -section,, -server,_SERVER_HOST:_SERVER_PORT, -proxy,127.0.0.1:65536, -n…
|
/openssl-master/demos/certs/ |
A D | README.txt | 4 The range of command line options can be daunting for a beginner.
|
/openssl-master/crypto/perlasm/ |
A D | arm-xlate.pl | 112 sub range { subroutine
|
/openssl-master/crypto/ |
A D | sparse_array.c | 41 # error OPENSSL_SA_BLOCK_BITS is out of range
|
/openssl-master/doc/internal/man3/ |
A D | OPTIONS.pod | 262 necessary range-checking. They return 1 if successful and fill in the 264 will also do range-check on the argument if the appropriate B<valtype> 269 It parses and returns an integer, assuming its range has been checked before.
|
/openssl-master/doc/man7/ |
A D | evp.pod | 38 The EVP_PKEY functions support the full range of asymmetric algorithm operations:
|