| /src/crypto/openssl/test/ |
| H A D | mlkem_parse.py | 25 def eprint(*args, **kwargs): function 71 eprint("Unsupported function " + function) 107 eprint("Unsupported mode " + mode) 109 eprint("Unsupported algorithm " + algorithm)
|
| H A D | slhdsa_parse.py | 29 def eprint(*args, **kwargs): function 147 eprint("Unsupported mode " + mode) 149 eprint("Unsupported algorithm " + algorithm)
|
| /src/contrib/bc/ |
| H A D | build.rig | 45 io.eprint("Testing NLS...\n"); 73 io.eprint("Forcing NLS...\n"); 87 io.eprint("NLS works.\n\n"); 88 io.eprint("Testing gencat...\n"); 97 io.eprint("Forcing NLS...\n"); 106 io.eprint("gencat works.\n\n"); 118 io.eprint("Testing history...\n"); 142 io.eprint("Forcing history...\n"); 156 io.eprint("History works.\n\n");
|
| H A D | build.pkg.rig | 750 io.eprint("Skipping test " +~ tgt_name +~ "\n"); 1982 io.eprint("Warning: " +~ timeconst +~ " does not exist\n"); 1983 io.eprint(timeconst +~ " is not part of this bc because of " +~ 1985 io.eprint("To test it, get it from the Linux kernel at " +~ 1987 io.eprint("Skipping...\n"); 2004 io.eprint("Other bc is not GNU compatible. Skipping...\n"); 2033 io.eprint("Python 3 with pexpect doesn't work. Skipping history tests");
|
| /src/contrib/netbsd-tests/lib/libc/regex/ |
| H A D | main.c | 52 static char *eprint(int); 112 eprint(err), len, (size_t)sizeof(erbuf), erbuf); in main() 130 eprint(err), len, (size_t)sizeof(erbuf), erbuf); in main() 257 line, type, eprint(err), len, in try() 288 line, type, eprint(err), len, in try() 502 eprint(int err) in eprint() function
|
| /src/lib/libc/regex/grot/ |
| H A D | main.c | 81 eprint(err), len, sizeof(erbuf), erbuf); in main() 99 eprint(err), len, sizeof(erbuf), erbuf); in main() 226 line, type, eprint(err), len, sizeof(erbuf), erbuf); in try() 256 line, type, eprint(err), len, sizeof(erbuf), erbuf); in try() 465 eprint(int err) in eprint() function
|
| /src/contrib/bc/scripts/ |
| H A D | release.pkg.yao | 238 io.eprint("\n*******************\n"); 239 io.eprint(msg); 240 io.eprint("\n*******************\n\n"); 366 io.eprint(cc +~ "generated warning(s):\n\n"); 367 io.eprint(str(res.stderr)); 410 io.eprint(cc +~ "generated warning(s):\n\n"); 411 io.eprint(str(res.stderr)); 1409 io.eprint("\nTests successful.\n");
|
| /src/contrib/one-true-awk/ |
| H A D | lib.c | 698 eprint(); in SYNTAX() 777 eprint(); in error() 781 void eprint(void) /* try to print context around error */ in eprint() function
|
| H A D | proto.h | 143 extern void eprint(void);
|
| /src/contrib/bmake/ |
| H A D | cond.c | 909 bool eprint, bool leftUnquotedOK) in CondEvalExpression() argument 931 else if (rval == CR_ERROR && eprint) in CondEvalExpression()
|
| /src/crypto/libecc/ |
| H A D | README.md | 59 bits can lead to devastating attacks exploiting the [Hidden Number Problem](https://eprint.iacr.org… 60 …deterministic version of ECDSA is susceptible to [fault attacks](https://eprint.iacr.org/2017/1014… 81 [fault attacks](https://eprint.iacr.org/2017/1014.pdf) without having a non-deterministic
|
| /src/crypto/openssl/test/recipes/10-test_bn_data/ |
| H A D | bnmod.txt | 2478 # "almost" reduction variant from https://eprint.iacr.org/2011/239
|
| /src/crypto/openssl/ |
| H A D | CHANGES.md | 6673 <http://eprint.iacr.org/2014/140> 9626 <http://eprint.iacr.org/2014/140> 10598 <http://eprint.iacr.org/2014/140> 10809 <http://eprint.iacr.org/2011/232.pdf> 12485 <http://eprint.iacr.org/2007/039> (O. Aciicmez, S. Gueron,
|