代码搜索:OpenSSL

找到约 8,687 项符合「OpenSSL」的源代码

代码结果 8,687
www.eeworm.com/read/427042/1980275

pod asn1parse.pod

=pod =head1 NAME asn1parse - ASN.1 parsing tool =head1 SYNOPSIS B B [B] [B] [B] [B] [B] [B
www.eeworm.com/read/427042/1980280

pod genrsa.pod

=pod =head1 NAME genrsa - generate an RSA private key =head1 SYNOPSIS B B [B] [B] [B] [B] [B] [B] [B] [B]
www.eeworm.com/read/427042/1980432

tsid

#!/bin/sh cmd='../util/shlib_wrap.sh ../apps/openssl sess_id' if [ "$1"x != "x" ]; then t=$1 else t=testsid.pem fi echo testing session-id conversions cp $t fff.p echo "p -> d" $cmd -in fff.p -i
www.eeworm.com/read/422785/2031574

makefile

# # OpenSSL/crypto/rc4/Makefile # DIR= rc4 TOP= ../.. CC= cc CPP= $(CC) -E INCLUDES= CFLAG=-g AR= ar r RC4_ENC=rc4_enc.o rc4_skey.o CFLAGS= $(INCLUDES) $(CFLAG) ASFLAGS= $(INCLUDES) $(ASFLAG) A
www.eeworm.com/read/422785/2031597

makefile

# # OpenSSL/crypto/bn/Makefile # DIR= bn TOP= ../.. CC= cc CPP= $(CC) -E INCLUDES= -I.. -I$(TOP) -I../../include CFLAG=-g MAKEFILE= Makefile AR= ar r BN_ASM= bn_asm.o # or use #BN_ASM= bn86-elf
www.eeworm.com/read/422785/2031653

pl bn-586.pl

#!/usr/local/bin/perl push(@INC,"perlasm","../../perlasm"); require "x86asm.pl"; &asm_init($ARGV[0],$0); $sse2=0; for (@ARGV) { $sse2=1 if (/-DOPENSSL_IA32_SSE2/); } &external_label("OPENSSL_ia32c
www.eeworm.com/read/422785/2032475

pod rsa_new.pod

=pod =head1 NAME RSA_new, RSA_free - allocate and free RSA objects =head1 SYNOPSIS #include RSA * RSA_new(void); void RSA_free(RSA *rsa); =head1 DESCRIPTION RSA_new() alloca
www.eeworm.com/read/422785/2032482

pod bn_cmp.pod

=pod =head1 NAME BN_cmp, BN_ucmp, BN_is_zero, BN_is_one, BN_is_word, BN_is_odd - BIGNUM comparison and test functions =head1 SYNOPSIS #include int BN_cmp(BIGNUM *a, BIGNUM *b);
www.eeworm.com/read/422785/2032483

pod ecdsa.pod

=pod =head1 NAME ecdsa - Elliptic Curve Digital Signature Algorithm =head1 SYNOPSIS #include ECDSA_SIG* ECDSA_SIG_new(void); void ECDSA_SIG_free(ECDSA_SIG *sig); int i2d_E
www.eeworm.com/read/422785/2032507

pod dh_generate_key.pod

=pod =head1 NAME DH_generate_key, DH_compute_key - perform Diffie-Hellman key exchange =head1 SYNOPSIS #include int DH_generate_key(DH *dh); int DH_compute_key(unsigned char *k