/openssl-master/crypto/siphash/ |
A D | siphash.c | 56 v2 += v3; \ 58 v3 ^= v2; \ 65 v2 = ROTL(v2, 32); \ 130 ctx->v2 = 0x6c7967656e657261ULL ^ k0; in SipHash_Init() 147 uint64_t v2 = ctx->v2; in SipHash_Update() local 193 ctx->v2 = v2; in SipHash_Update() 204 uint64_t v2 = ctx->v2; in SipHash_Final() local 240 v2 ^= 0xee; in SipHash_Final() 242 v2 ^= 0xff; in SipHash_Final() 245 b = v0 ^ v1 ^ v2 ^ v3; in SipHash_Final() [all …]
|
/openssl-master/test/ |
A D | verify_extra_test.c | 108 ASN1_OCTET_STRING *v = NULL, *v2 = NULL; in test_distinguishing_id() local 127 v2 = X509_get0_distinguishing_id(x); in test_distinguishing_id() 128 if (!TEST_ptr(v2) in test_distinguishing_id() 129 || !TEST_int_eq(ASN1_OCTET_STRING_cmp(v, v2), 0)) in test_distinguishing_id() 143 ASN1_OCTET_STRING *v = NULL, *v2 = NULL; in test_req_distinguishing_id() local 166 v2 = X509_REQ_get0_distinguishing_id(x); in test_req_distinguishing_id() 167 if (!TEST_ptr(v2) in test_req_distinguishing_id() 168 || !TEST_int_eq(ASN1_OCTET_STRING_cmp(v, v2), 0)) in test_req_distinguishing_id()
|
/openssl-master/doc/man1/ |
A D | openssl-pkcs8.pod.in | 23 [B<-v2> I<alg>] 37 format with a variety of PKCS#5 (v1.5 and v2.0) and PKCS#12 algorithms. 117 =item B<-v2> I<alg> 119 This option sets the PKCS#5 v2.0 algorithm. 138 If not specified PKCS#5 v2.0 form is used. 145 B<-scrypt_p> and B<-v2> options. 168 Private keys encrypted using PKCS#5 v2.0 algorithms and high iteration 215 Convert a private key to PKCS#5 v2.0 format using triple DES: 217 openssl pkcs8 -in key.pem -topk8 -v2 des3 -out enckey.pem 249 Test vectors from this PKCS#5 v2.0 implementation were posted to the [all …]
|
A D | openssl.pod | 29 v2/v3) and Transport Layer Security (TLS v1) network protocols and related 750 PKCS#5 v2 keygen.
|
A D | openssl-pkcs12.pod.in | 330 is used with PKCS#5 v2.0. For interoperability reasons it is advisable to only
|
A D | openssl-smime.pod.in | 467 The current code can only handle S/MIME v2 messages, the more complex S/MIME v3
|
A D | openssl-ca.pod.in | 399 insensitive. Setting any revocation reason will make the CRL v2.
|
/openssl-master/crypto/perlasm/ |
A D | s390x.pm | 2689 my ($opcode,$v1,$v2,$v3,$i4,$m5)=(shift,get_V(shift),get_V(shift), 2695 $out.=sprintf("%#06x",($m5<<12|RXB($v1,$v2,$v3)<<8|$opcode&0xff)); 2710 $out.=sprintf("%#06x",($m4<<12|RXB($v1,$v2)<<8|$opcode&0xff)); 2785 $out.=sprintf("%#06x",($m3<<12|RXB($v1,$v2)<<8|$opcode&0xff)); 2883 my ($opcode,$v1,$v2,$m3)=(shift,get_V(shift),get_V(shift), 2888 $out.=sprintf("%#06x",(($v2&0xf)<<12|$m3<<4)).","; 2889 $out.=sprintf("%#06x",(RXB(0,$v1,$v2)<<8|$opcode&0xff)); 2898 my ($opcode,$r1,$v2,$m3)=(shift,get_R(shift),get_V(shift), 2902 $out.=sprintf("%#06x",($opcode&0xff00|$r1<<4|($v2&0xf))).","; 2904 $out.=sprintf("%#06x",(RXB(0,$v2)<<8|$opcode&0xff)); [all …]
|
/openssl-master/ssl/record/ |
A D | dtls1_bitmap.c | 14 static int satsub64be(const unsigned char *v1, const unsigned char *v2) in satsub64be() argument 20 n2l8(v2, l2); in satsub64be()
|
/openssl-master/test/recipes/15-test_dsaparam_data/invalid/ |
A D | p2048_q256_bad_q.pem | 8 H57M3PwkTsq+v2/dAoIBADKkGYUe9qsp4mqxkBKaEdpcjmjfLrvtE+3ikipPPGHh
|
/openssl-master/include/crypto/ |
A D | siphash.h | 37 uint64_t v2; member
|
/openssl-master/doc/man3/ |
A D | RSA_padding_add_PKCS1_type_1.pod | 81 PKCS #1 v2.0 EMSA-PKCS1-v1_5 (PKCS #1 v1.5 block type 1); used for signatures 85 PKCS #1 v2.0 EME-PKCS1-v1_5 (PKCS #1 v1.5 block type 2) 89 PKCS #1 v2.0 EME-OAEP
|
A D | RSA_public_encrypt.pod | 44 EME-OAEP as defined in PKCS #1 v2.0 with SHA-1, MGF1 and an empty 97 SSL, PKCS #1 v2.0
|
A D | d2i_PKCS8PrivateKey_bio.pod | 35 PKCS#5 v1.5 and PKCS#5 v2.0 password based encryption algorithms.
|
A D | RSA_sign.pod | 56 SSL, PKCS #1 v2.0
|
A D | EVP_BytesToKey.pod | 40 defined in PKCS#5v2.1 and provided by PKCS5_PBKDF2_HMAC.
|
A D | PEM_read.pod | 110 v2.0 PBE.
|
A D | SSL_CTX_set_mode.pod | 90 This flag has no effect on SSL v2 connections, or on DTLS connections.
|
A D | OSSL_trace_set_channel.pod | 157 Traces PKCS#5 v2 key generation.
|
A D | PEM_read_bio_PrivateKey.pod | 225 PKCS#5 v2.0 password based encryption algorithms. The I<cipher> argument
|
/openssl-master/ssl/ |
A D | ssl_local.h | 142 # define DTLS_VERSION_GT(v1, v2) (dtls_ver_ordinal(v1) < dtls_ver_ordinal(v2)) argument 143 # define DTLS_VERSION_GE(v1, v2) (dtls_ver_ordinal(v1) <= dtls_ver_ordinal(v2)) argument 144 # define DTLS_VERSION_LT(v1, v2) (dtls_ver_ordinal(v1) > dtls_ver_ordinal(v2)) argument 145 # define DTLS_VERSION_LE(v1, v2) (dtls_ver_ordinal(v1) >= dtls_ver_ordinal(v2)) argument
|
/openssl-master/test/recipes/30-test_evp_data/ |
A D | evppkey_rsa.txt | 276 # ftp://ftp.rsasecurity.com/pub/pkcs/pkcs-1/pkcs-1v2-1-vec.zip
|
A D | evppkey_rsa_common.txt | 463 # ftp://ftp.rsasecurity.com/pub/pkcs/pkcs-1/pkcs-1v2-1-vec.zip
|
/openssl-master/crypto/err/ |
A D | openssl.txt | 643 ESS_R_ESS_SIGNING_CERT_V2_ADD_ERROR:101:ess signing cert v2 add error 1540 TS_R_ESS_ADD_SIGNING_CERT_V2_ERROR:139:ess add signing cert v2 error
|
/openssl-master/ |
A D | NEWS.md | 36 * Changed the license to the Apache License v2.0. 1324 * PKCS#5 v2.0 implementation
|