Home
last modified time | relevance | path

Searched refs:v2 (Results 1 – 25 of 27) sorted by relevance

12

/openssl-master/crypto/siphash/
A Dsiphash.c56 v2 += v3; \
58 v3 ^= v2; \
65 v2 = ROTL(v2, 32); \
130 ctx->v2 = 0x6c7967656e657261ULL ^ k0; in SipHash_Init()
147 uint64_t v2 = ctx->v2; in SipHash_Update() local
193 ctx->v2 = v2; in SipHash_Update()
204 uint64_t v2 = ctx->v2; in SipHash_Final() local
240 v2 ^= 0xee; in SipHash_Final()
242 v2 ^= 0xff; in SipHash_Final()
245 b = v0 ^ v1 ^ v2 ^ v3; in SipHash_Final()
[all …]
/openssl-master/test/
A Dverify_extra_test.c108 ASN1_OCTET_STRING *v = NULL, *v2 = NULL; in test_distinguishing_id() local
127 v2 = X509_get0_distinguishing_id(x); in test_distinguishing_id()
128 if (!TEST_ptr(v2) in test_distinguishing_id()
129 || !TEST_int_eq(ASN1_OCTET_STRING_cmp(v, v2), 0)) in test_distinguishing_id()
143 ASN1_OCTET_STRING *v = NULL, *v2 = NULL; in test_req_distinguishing_id() local
166 v2 = X509_REQ_get0_distinguishing_id(x); in test_req_distinguishing_id()
167 if (!TEST_ptr(v2) in test_req_distinguishing_id()
168 || !TEST_int_eq(ASN1_OCTET_STRING_cmp(v, v2), 0)) in test_req_distinguishing_id()
/openssl-master/doc/man1/
A Dopenssl-pkcs8.pod.in23 [B<-v2> I<alg>]
37 format with a variety of PKCS#5 (v1.5 and v2.0) and PKCS#12 algorithms.
117 =item B<-v2> I<alg>
119 This option sets the PKCS#5 v2.0 algorithm.
138 If not specified PKCS#5 v2.0 form is used.
145 B<-scrypt_p> and B<-v2> options.
168 Private keys encrypted using PKCS#5 v2.0 algorithms and high iteration
215 Convert a private key to PKCS#5 v2.0 format using triple DES:
217 openssl pkcs8 -in key.pem -topk8 -v2 des3 -out enckey.pem
249 Test vectors from this PKCS#5 v2.0 implementation were posted to the
[all …]
A Dopenssl.pod29 v2/v3) and Transport Layer Security (TLS v1) network protocols and related
750 PKCS#5 v2 keygen.
A Dopenssl-pkcs12.pod.in330 is used with PKCS#5 v2.0. For interoperability reasons it is advisable to only
A Dopenssl-smime.pod.in467 The current code can only handle S/MIME v2 messages, the more complex S/MIME v3
A Dopenssl-ca.pod.in399 insensitive. Setting any revocation reason will make the CRL v2.
/openssl-master/crypto/perlasm/
A Ds390x.pm2689 my ($opcode,$v1,$v2,$v3,$i4,$m5)=(shift,get_V(shift),get_V(shift),
2695 $out.=sprintf("%#06x",($m5<<12|RXB($v1,$v2,$v3)<<8|$opcode&0xff));
2710 $out.=sprintf("%#06x",($m4<<12|RXB($v1,$v2)<<8|$opcode&0xff));
2785 $out.=sprintf("%#06x",($m3<<12|RXB($v1,$v2)<<8|$opcode&0xff));
2883 my ($opcode,$v1,$v2,$m3)=(shift,get_V(shift),get_V(shift),
2888 $out.=sprintf("%#06x",(($v2&0xf)<<12|$m3<<4)).",";
2889 $out.=sprintf("%#06x",(RXB(0,$v1,$v2)<<8|$opcode&0xff));
2898 my ($opcode,$r1,$v2,$m3)=(shift,get_R(shift),get_V(shift),
2902 $out.=sprintf("%#06x",($opcode&0xff00|$r1<<4|($v2&0xf))).",";
2904 $out.=sprintf("%#06x",(RXB(0,$v2)<<8|$opcode&0xff));
[all …]
/openssl-master/ssl/record/
A Ddtls1_bitmap.c14 static int satsub64be(const unsigned char *v1, const unsigned char *v2) in satsub64be() argument
20 n2l8(v2, l2); in satsub64be()
/openssl-master/test/recipes/15-test_dsaparam_data/invalid/
A Dp2048_q256_bad_q.pem8 H57M3PwkTsq+v2/dAoIBADKkGYUe9qsp4mqxkBKaEdpcjmjfLrvtE+3ikipPPGHh
/openssl-master/include/crypto/
A Dsiphash.h37 uint64_t v2; member
/openssl-master/doc/man3/
A DRSA_padding_add_PKCS1_type_1.pod81 PKCS #1 v2.0 EMSA-PKCS1-v1_5 (PKCS #1 v1.5 block type 1); used for signatures
85 PKCS #1 v2.0 EME-PKCS1-v1_5 (PKCS #1 v1.5 block type 2)
89 PKCS #1 v2.0 EME-OAEP
A DRSA_public_encrypt.pod44 EME-OAEP as defined in PKCS #1 v2.0 with SHA-1, MGF1 and an empty
97 SSL, PKCS #1 v2.0
A Dd2i_PKCS8PrivateKey_bio.pod35 PKCS#5 v1.5 and PKCS#5 v2.0 password based encryption algorithms.
A DRSA_sign.pod56 SSL, PKCS #1 v2.0
A DEVP_BytesToKey.pod40 defined in PKCS#5v2.1 and provided by PKCS5_PBKDF2_HMAC.
A DPEM_read.pod110 v2.0 PBE.
A DSSL_CTX_set_mode.pod90 This flag has no effect on SSL v2 connections, or on DTLS connections.
A DOSSL_trace_set_channel.pod157 Traces PKCS#5 v2 key generation.
A DPEM_read_bio_PrivateKey.pod225 PKCS#5 v2.0 password based encryption algorithms. The I<cipher> argument
/openssl-master/ssl/
A Dssl_local.h142 # define DTLS_VERSION_GT(v1, v2) (dtls_ver_ordinal(v1) < dtls_ver_ordinal(v2)) argument
143 # define DTLS_VERSION_GE(v1, v2) (dtls_ver_ordinal(v1) <= dtls_ver_ordinal(v2)) argument
144 # define DTLS_VERSION_LT(v1, v2) (dtls_ver_ordinal(v1) > dtls_ver_ordinal(v2)) argument
145 # define DTLS_VERSION_LE(v1, v2) (dtls_ver_ordinal(v1) >= dtls_ver_ordinal(v2)) argument
/openssl-master/test/recipes/30-test_evp_data/
A Devppkey_rsa.txt276 # ftp://ftp.rsasecurity.com/pub/pkcs/pkcs-1/pkcs-1v2-1-vec.zip
A Devppkey_rsa_common.txt463 # ftp://ftp.rsasecurity.com/pub/pkcs/pkcs-1/pkcs-1v2-1-vec.zip
/openssl-master/crypto/err/
A Dopenssl.txt643 ESS_R_ESS_SIGNING_CERT_V2_ADD_ERROR:101:ess signing cert v2 add error
1540 TS_R_ESS_ADD_SIGNING_CERT_V2_ERROR:139:ess add signing cert v2 error
/openssl-master/
A DNEWS.md36 * Changed the license to the Apache License v2.0.
1324 * PKCS#5 v2.0 implementation

Completed in 50 milliseconds

12