/openssl-master/doc/man3/ |
A D | OPENSSL_ia32cap.pod | 24 =item bit #4 denoting presence of Time-Stamp Counter. 30 =item bit #23 denoting MMX support; 32 =item bit #24, FXSR bit, denoting availability of XMM registers; 34 =item bit #25 denoting SSE support; 36 =item bit #26 denoting SSE2 support; 51 =item bit #57 denoting AES-NI instruction set extension; 53 =item bit #58, XSAVE bit, lack of which in combination with MOVBE is used 56 =item bit #59, OSXSAVE bit, denoting availability of YMM registers; 58 =item bit #60 denoting AVX extension; 64 For example, in 32-bit application context clearing bit #26 at run-time [all …]
|
A D | EVP_des_cbc.pod | 54 DES in CBC, ECB, CFB with 64-bit shift, CFB with 1-bit shift, CFB with 8-bit 68 Two key triple DES in ECB, CBC, CFB with 64-bit shift and OFB modes. 79 Three-key triple DES in ECB, CBC, CFB with 64-bit shift, CFB with 1-bit shift, 80 CFB with 8-bit shift and OFB modes.
|
A D | EVP_aes_128_gcm.pod | 94 AES for 128, 192 and 256 bit keys in the following modes: CBC, CFB with 128-bit 95 shift, CFB with 1-bit shift, CFB with 8-bit shift, CTR, ECB, and OFB. 128 AES for 128, 192 and 256 bit keys in CBC-MAC Mode (CCM), Galois Counter Mode 146 AES key wrap with 128, 192 and 256 bit keys, as according to RFC 3394 section 159 In particular, XTS-AES-128 (B<EVP_aes_128_xts>) takes input of a 256-bit key to 160 achieve AES 128-bit security, and XTS-AES-256 (B<EVP_aes_256_xts>) takes input 161 of a 512-bit key to achieve AES 256-bit security.
|
A D | OPENSSL_s390xcap.pod | 34 The name of a processor generation. A bit in the environment variable's 42 The name of an instruction followed by two 64-bit masks. The part of the 44 set to the specified 128-bit mask. Possible values are B<kimd>, B<klmd>, 50 Store-facility-list-extended (stfle) followed by three 64-bit masks. The 52 instruction is set to the specified 192-bit mask. 56 The 64-bit masks are specified in hexadecimal notation. The 0x prefix is 60 rows separate the individual 64-bit masks. The bit numbers in the first 61 column are consistent with [1], that is, 0 denotes the leftmost bit and 62 the numbering is continuous across 64-bit mask boundaries.
|
A D | EVP_aria_128_gcm.pod | 79 ARIA for 128, 192 and 256 bit keys in the following modes: CBC, CFB with 80 128-bit shift, CFB with 1-bit shift, CFB with 8-bit shift, CTR, ECB and OFB. 89 ARIA for 128, 192 and 256 bit keys in CBC-MAC Mode (CCM) and Galois Counter
|
A D | BN_set_bit.pod | 6 BN_lshift1, BN_rshift, BN_rshift1 - bit operations on BIGNUMs 27 BN_set_bit() sets bit B<n> in B<a> to 1 (C<a|=(1E<lt>E<lt>n)>). The 30 BN_clear_bit() sets bit B<n> in B<a> to 0 (C<a&=~(1E<lt>E<lt>n)>). An 33 BN_is_bit_set() tests if bit B<n> in B<a> is set. 35 BN_mask_bits() truncates B<a> to an B<n> bit number 51 BN_is_bit_set() returns 1 if the bit is set, 0 otherwise.
|
A D | EVP_camellia_128_ecb.pod | 73 Camellia for 128, 192 and 256 bit keys in the following modes: CBC, CFB with 74 128-bit shift, CFB with 1-bit shift, CFB with 8-bit shift, CTR, ECB and OFB.
|
A D | CMS_add1_signer.pod | 79 algorithms in preference order: 256 bit AES, Gost R3411-94, Gost 28147-89, 192 80 bit AES, 128 bit AES, triple DES, 128 bit RC2, 64 bit RC2, DES and 40 bit RC2.
|
A D | BF_encrypt.pod | 43 Blowfish is a block cipher that operates on 64 bit (8 byte) blocks of data. 44 It uses a variable size key, but typically, 128 bit (16 byte) keys are 47 of the faster block ciphers. It is quite a bit faster than DES, and much 84 BF_cfb64_encrypt() is the CFB mode for Blowfish with 64 bit feedback. 91 BF_ofb64_encrypt() is the OFB mode for Blowfish with 64 bit feedback. 100 each 32-bit chunk in host-byte order, which is little-endian on little-endian
|
A D | SSL_CTX_set_mode.pod | 21 SSL_CTX_set_mode() adds the mode set via bit-mask in B<mode> to B<ctx>. 23 SSL_CTX_clear_mode() removes the mode set via bit-mask in B<mode> from B<ctx>. 25 SSL_set_mode() adds the mode set via bit-mask in B<mode> to B<ssl>. 27 SSL_clear_mode() removes the mode set via bit-mask in B<mode> from B<ssl>. 124 SSL_CTX_set_mode() and SSL_set_mode() return the new mode bit-mask 127 SSL_CTX_get_mode() and SSL_get_mode() return the current bit-mask.
|
A D | CMS_sign.pod | 67 algorithms in preference order: 256 bit AES, Gost R3411-94, Gost 28147-89, 192 68 bit AES, 128 bit AES, triple DES, 128 bit RC2, 64 bit RC2, DES and 40 bit RC2.
|
A D | EVP_blake2b512.pod | 26 The BLAKE2s algorithm that produces a 256-bit output from a given input. 30 The BLAKE2b algorithm that produces a 512-bit output from a given input.
|
A D | EVP_chacha20.pod | 26 bit nonce. For example a nonce of: 38 (AAD) and produces a 128-bit authentication tag. See the
|
/openssl-master/crypto/ |
A D | mem_sec.c | 308 for (; bit; bit >>= 1, list--) { in sh_getlist() 320 size_t bit; in sh_testbit() local 325 OPENSSL_assert(bit > 0 && bit < sh.bittable_size); in sh_testbit() 331 size_t bit; in sh_clearbit() local 336 OPENSSL_assert(bit > 0 && bit < sh.bittable_size); in sh_clearbit() 343 size_t bit; in sh_setbit() local 348 OPENSSL_assert(bit > 0 && bit < sh.bittable_size); in sh_setbit() 350 SETBIT(table, bit); in sh_setbit() 579 size_t bit; in sh_find_my_buddy() local 583 bit ^= 1; in sh_find_my_buddy() [all …]
|
/openssl-master/doc/man1/ |
A D | openssl-enc.pod.in | 341 rc4-64 64 bit RC4 365 aes-[128|192|256]-cfb 128/192/256 bit AES in 128 bit CFB mode 366 aes-[128|192|256]-cfb1 128/192/256 bit AES in 1 bit CFB mode 367 aes-[128|192|256]-cfb8 128/192/256 bit AES in 8 bit CFB mode 374 aria-[128|192|256]-cfb 128/192/256 bit ARIA in 128 bit CFB mode 375 aria-[128|192|256]-cfb1 128/192/256 bit ARIA in 1 bit CFB mode 376 aria-[128|192|256]-cfb8 128/192/256 bit ARIA in 8 bit CFB mode 383 camellia-[128|192|256]-cfb 128/192/256 bit Camellia in 128 bit CFB mode 384 camellia-[128|192|256]-cfb1 128/192/256 bit Camellia in 1 bit CFB mode 385 camellia-[128|192|256]-cfb8 128/192/256 bit Camellia in 8 bit CFB mode [all …]
|
A D | openssl-genpkey.pod.in | 399 Encrypt output private key using 128 bit AES and the passphrase "hello": 403 Generate a 2048 bit RSA key using 3 as the public exponent: 408 Generate 2048 bit DSA parameters that can be validated: The output values for 419 Generate 4096 bit DH Key using safe prime group ffdhe4096: 423 Generate 2048 bit X9.42 DH key with 256 bit subgroup using RFC5114 group3: 435 Output 2048 bit X9.42 DH parameters with 224 bit subgroup using RFC5114 group2: 439 Output 2048 bit X9.42 DH parameters with 224 bit subgroup using FIP186-4 keygen: 445 Output 1024 bit X9.42 DH parameters with 160 bit subgroup using FIP186-2 keygen: 451 Output 2048 bit DH parameters: 456 Output 2048 bit DH parameters using a generator:
|
A D | openssl-verification-options.pod | 357 Enable the Suite B mode operation at 128 bit Level of Security, 128 bit or 358 192 bit, or only 192 bit Level of Security respectively. 573 keyCertSign bit set if the keyUsage extension is present. 592 digitalSignature bit set. The Netscape certificate type must be absent 593 or it must have the SSL client bit set. 614 be absent or the SSL CA bit must be set. 620 keyEncipherment bit set if the keyUsage extension is present. This isn't 628 S/MIME bit set. If the S/MIME bit is not set in the Netscape certificate type 630 This is because some Verisign certificates don't set the S/MIME bit. 635 the nonRepudiation bit must be set if the keyUsage extension is present. [all …]
|
/openssl-master/crypto/bn/ |
A D | bn_intern.c | 27 int bit, next_bit, mask; in bn_compute_wNAF() local 46 bit = 1 << w; /* at most 128 */ in bn_compute_wNAF() 47 next_bit = bit << 1; /* at most 256 */ in bn_compute_wNAF() 81 if (window_val & bit) { in bn_compute_wNAF() 100 if (digit <= -bit || digit >= bit || !(digit & 1)) { in bn_compute_wNAF() 112 && window_val != bit) { in bn_compute_wNAF() 121 window_val += bit * BN_is_bit_set(scalar, j + w); in bn_compute_wNAF()
|
A D | bn_rand.c | 27 int b, ret = 0, bit, bytes, mask; in bnrand() local 40 bit = (bits - 1) % 8; in bnrand() 41 mask = 0xff << (bit + 1); in bnrand() 76 if (bit == 0) { in bnrand() 80 buf[0] |= (3 << (bit - 1)); in bnrand() 83 buf[0] |= (1 << bit); in bnrand()
|
/openssl-master/test/recipes/30-test_evp_data/ |
A D | evpciph_camellia_cts.txt | 33 # 128-bit Camellia key: 1DC46A8D763F4F93742BCBA3387576C3 44 # 128-bit Camellia key: 5027BC231D0F3A9D23333F1CA6FDBE7C 55 # 128-bit Camellia key: A1BB61E805F9BA6DDE8FDBDDC05CDEA0 66 # 128-bit Camellia key: 2CA27A5FAF5532244506434E1CEF6676 77 # 128-bit Camellia key: 7824F8C16F83FF354C6BF7515B973F43 88 # 256-bit Camellia key: B61C86CC4E5D2757545AD423399FB7031ECAB913CBB900BD7A3C6DD8BF92015B 99 # 256-bit Camellia key: 1B97FE0A190E2021EB30753E1B6E1E77B0754B1D684610355864104963463833 110 # 256-bit Camellia key: 32164C5B434D1D1538E4CFD9BE8040FE8C4AC7ACC4B93D3314D2133668147A05 121 # 256-bit Camellia key: B038B132CD8E06612267FAB7170066D88AECCBA0B744BFC60DC89BCA182D0715 132 # 256-bit Camellia key: CCFCD349BF4C6677E86E4B02B8EAB924A546AC731CF9BF6989B996E7D6BFBBA7
|
A D | evppkey_dsa.txt | 255 # Test sign with a 2048 bit key with N == 224 is allowed in fips mode 262 # Test sign with a 2048 bit key with N == 256 is allowed in fips mode 268 # Test sign with a 3072 bit key with N == 256 is allowed in fips mode 274 # Test sign with a 2048 bit SHA3 is allowed in fips mode 280 # Test verify with a 1024 bit key is allowed in fips mode 294 # Test sign with a 1024 bit key is not allowed in fips mode 310 # Test sign with a 3072 bit key with N == 224 is not allowed in fips mode 318 # Test sign with a 4096 bit key is not allowed in fips mode
|
A D | evppkey_rsa.txt | 19 # RSA 2048 bit key. 279 # 1025 bit key 324 # 1026 bit key 369 # 1027 bit key 414 # 1028 bit key 460 # 1029 bit key 505 # 1030 bit key 550 # 1031 bit key
|
/openssl-master/crypto/ts/ |
A D | ts_rsp_print.c | 19 int bit; member 107 for (; a->bit >= 0; ++a) { in ts_status_map_print() 108 if (ASN1_BIT_STRING_get_bit(v, a->bit)) { in ts_status_map_print()
|
/openssl-master/include/crypto/ |
A D | bn_conf.h.in | 17 * both 32-bit and 64-bit builds are supported from a single run
|
/openssl-master/apps/ |
A D | rehash.c | 109 static void bit_set(unsigned char *set, unsigned int bit) in bit_set() argument 111 set[bit >> 3] |= 1 << (bit & 0x7); in bit_set() 114 static int bit_isset(unsigned char *set, unsigned int bit) in bit_isset() argument 116 return set[bit >> 3] & (1 << (bit & 0x7)); in bit_isset()
|