Home
last modified time | relevance | path

Searched refs:bit (Results 1 – 25 of 164) sorted by relevance

1234567

/openssl-master/doc/man3/
A DOPENSSL_ia32cap.pod24 =item bit #4 denoting presence of Time-Stamp Counter.
30 =item bit #23 denoting MMX support;
32 =item bit #24, FXSR bit, denoting availability of XMM registers;
34 =item bit #25 denoting SSE support;
36 =item bit #26 denoting SSE2 support;
51 =item bit #57 denoting AES-NI instruction set extension;
53 =item bit #58, XSAVE bit, lack of which in combination with MOVBE is used
56 =item bit #59, OSXSAVE bit, denoting availability of YMM registers;
58 =item bit #60 denoting AVX extension;
64 For example, in 32-bit application context clearing bit #26 at run-time
[all …]
A DEVP_des_cbc.pod54 DES in CBC, ECB, CFB with 64-bit shift, CFB with 1-bit shift, CFB with 8-bit
68 Two key triple DES in ECB, CBC, CFB with 64-bit shift and OFB modes.
79 Three-key triple DES in ECB, CBC, CFB with 64-bit shift, CFB with 1-bit shift,
80 CFB with 8-bit shift and OFB modes.
A DEVP_aes_128_gcm.pod94 AES for 128, 192 and 256 bit keys in the following modes: CBC, CFB with 128-bit
95 shift, CFB with 1-bit shift, CFB with 8-bit shift, CTR, ECB, and OFB.
128 AES for 128, 192 and 256 bit keys in CBC-MAC Mode (CCM), Galois Counter Mode
146 AES key wrap with 128, 192 and 256 bit keys, as according to RFC 3394 section
159 In particular, XTS-AES-128 (B<EVP_aes_128_xts>) takes input of a 256-bit key to
160 achieve AES 128-bit security, and XTS-AES-256 (B<EVP_aes_256_xts>) takes input
161 of a 512-bit key to achieve AES 256-bit security.
A DOPENSSL_s390xcap.pod34 The name of a processor generation. A bit in the environment variable's
42 The name of an instruction followed by two 64-bit masks. The part of the
44 set to the specified 128-bit mask. Possible values are B<kimd>, B<klmd>,
50 Store-facility-list-extended (stfle) followed by three 64-bit masks. The
52 instruction is set to the specified 192-bit mask.
56 The 64-bit masks are specified in hexadecimal notation. The 0x prefix is
60 rows separate the individual 64-bit masks. The bit numbers in the first
61 column are consistent with [1], that is, 0 denotes the leftmost bit and
62 the numbering is continuous across 64-bit mask boundaries.
A DEVP_aria_128_gcm.pod79 ARIA for 128, 192 and 256 bit keys in the following modes: CBC, CFB with
80 128-bit shift, CFB with 1-bit shift, CFB with 8-bit shift, CTR, ECB and OFB.
89 ARIA for 128, 192 and 256 bit keys in CBC-MAC Mode (CCM) and Galois Counter
A DBN_set_bit.pod6 BN_lshift1, BN_rshift, BN_rshift1 - bit operations on BIGNUMs
27 BN_set_bit() sets bit B<n> in B<a> to 1 (C<a|=(1E<lt>E<lt>n)>). The
30 BN_clear_bit() sets bit B<n> in B<a> to 0 (C<a&=~(1E<lt>E<lt>n)>). An
33 BN_is_bit_set() tests if bit B<n> in B<a> is set.
35 BN_mask_bits() truncates B<a> to an B<n> bit number
51 BN_is_bit_set() returns 1 if the bit is set, 0 otherwise.
A DEVP_camellia_128_ecb.pod73 Camellia for 128, 192 and 256 bit keys in the following modes: CBC, CFB with
74 128-bit shift, CFB with 1-bit shift, CFB with 8-bit shift, CTR, ECB and OFB.
A DCMS_add1_signer.pod79 algorithms in preference order: 256 bit AES, Gost R3411-94, Gost 28147-89, 192
80 bit AES, 128 bit AES, triple DES, 128 bit RC2, 64 bit RC2, DES and 40 bit RC2.
A DBF_encrypt.pod43 Blowfish is a block cipher that operates on 64 bit (8 byte) blocks of data.
44 It uses a variable size key, but typically, 128 bit (16 byte) keys are
47 of the faster block ciphers. It is quite a bit faster than DES, and much
84 BF_cfb64_encrypt() is the CFB mode for Blowfish with 64 bit feedback.
91 BF_ofb64_encrypt() is the OFB mode for Blowfish with 64 bit feedback.
100 each 32-bit chunk in host-byte order, which is little-endian on little-endian
A DSSL_CTX_set_mode.pod21 SSL_CTX_set_mode() adds the mode set via bit-mask in B<mode> to B<ctx>.
23 SSL_CTX_clear_mode() removes the mode set via bit-mask in B<mode> from B<ctx>.
25 SSL_set_mode() adds the mode set via bit-mask in B<mode> to B<ssl>.
27 SSL_clear_mode() removes the mode set via bit-mask in B<mode> from B<ssl>.
124 SSL_CTX_set_mode() and SSL_set_mode() return the new mode bit-mask
127 SSL_CTX_get_mode() and SSL_get_mode() return the current bit-mask.
A DCMS_sign.pod67 algorithms in preference order: 256 bit AES, Gost R3411-94, Gost 28147-89, 192
68 bit AES, 128 bit AES, triple DES, 128 bit RC2, 64 bit RC2, DES and 40 bit RC2.
A DEVP_blake2b512.pod26 The BLAKE2s algorithm that produces a 256-bit output from a given input.
30 The BLAKE2b algorithm that produces a 512-bit output from a given input.
A DEVP_chacha20.pod26 bit nonce. For example a nonce of:
38 (AAD) and produces a 128-bit authentication tag. See the
/openssl-master/crypto/
A Dmem_sec.c308 for (; bit; bit >>= 1, list--) { in sh_getlist()
320 size_t bit; in sh_testbit() local
325 OPENSSL_assert(bit > 0 && bit < sh.bittable_size); in sh_testbit()
331 size_t bit; in sh_clearbit() local
336 OPENSSL_assert(bit > 0 && bit < sh.bittable_size); in sh_clearbit()
343 size_t bit; in sh_setbit() local
348 OPENSSL_assert(bit > 0 && bit < sh.bittable_size); in sh_setbit()
350 SETBIT(table, bit); in sh_setbit()
579 size_t bit; in sh_find_my_buddy() local
583 bit ^= 1; in sh_find_my_buddy()
[all …]
/openssl-master/doc/man1/
A Dopenssl-enc.pod.in341 rc4-64 64 bit RC4
365 aes-[128|192|256]-cfb 128/192/256 bit AES in 128 bit CFB mode
366 aes-[128|192|256]-cfb1 128/192/256 bit AES in 1 bit CFB mode
367 aes-[128|192|256]-cfb8 128/192/256 bit AES in 8 bit CFB mode
374 aria-[128|192|256]-cfb 128/192/256 bit ARIA in 128 bit CFB mode
375 aria-[128|192|256]-cfb1 128/192/256 bit ARIA in 1 bit CFB mode
376 aria-[128|192|256]-cfb8 128/192/256 bit ARIA in 8 bit CFB mode
383 camellia-[128|192|256]-cfb 128/192/256 bit Camellia in 128 bit CFB mode
384 camellia-[128|192|256]-cfb1 128/192/256 bit Camellia in 1 bit CFB mode
385 camellia-[128|192|256]-cfb8 128/192/256 bit Camellia in 8 bit CFB mode
[all …]
A Dopenssl-genpkey.pod.in399 Encrypt output private key using 128 bit AES and the passphrase "hello":
403 Generate a 2048 bit RSA key using 3 as the public exponent:
408 Generate 2048 bit DSA parameters that can be validated: The output values for
419 Generate 4096 bit DH Key using safe prime group ffdhe4096:
423 Generate 2048 bit X9.42 DH key with 256 bit subgroup using RFC5114 group3:
435 Output 2048 bit X9.42 DH parameters with 224 bit subgroup using RFC5114 group2:
439 Output 2048 bit X9.42 DH parameters with 224 bit subgroup using FIP186-4 keygen:
445 Output 1024 bit X9.42 DH parameters with 160 bit subgroup using FIP186-2 keygen:
451 Output 2048 bit DH parameters:
456 Output 2048 bit DH parameters using a generator:
A Dopenssl-verification-options.pod357 Enable the Suite B mode operation at 128 bit Level of Security, 128 bit or
358 192 bit, or only 192 bit Level of Security respectively.
573 keyCertSign bit set if the keyUsage extension is present.
592 digitalSignature bit set. The Netscape certificate type must be absent
593 or it must have the SSL client bit set.
614 be absent or the SSL CA bit must be set.
620 keyEncipherment bit set if the keyUsage extension is present. This isn't
628 S/MIME bit set. If the S/MIME bit is not set in the Netscape certificate type
630 This is because some Verisign certificates don't set the S/MIME bit.
635 the nonRepudiation bit must be set if the keyUsage extension is present.
[all …]
/openssl-master/crypto/bn/
A Dbn_intern.c27 int bit, next_bit, mask; in bn_compute_wNAF() local
46 bit = 1 << w; /* at most 128 */ in bn_compute_wNAF()
47 next_bit = bit << 1; /* at most 256 */ in bn_compute_wNAF()
81 if (window_val & bit) { in bn_compute_wNAF()
100 if (digit <= -bit || digit >= bit || !(digit & 1)) { in bn_compute_wNAF()
112 && window_val != bit) { in bn_compute_wNAF()
121 window_val += bit * BN_is_bit_set(scalar, j + w); in bn_compute_wNAF()
A Dbn_rand.c27 int b, ret = 0, bit, bytes, mask; in bnrand() local
40 bit = (bits - 1) % 8; in bnrand()
41 mask = 0xff << (bit + 1); in bnrand()
76 if (bit == 0) { in bnrand()
80 buf[0] |= (3 << (bit - 1)); in bnrand()
83 buf[0] |= (1 << bit); in bnrand()
/openssl-master/test/recipes/30-test_evp_data/
A Devpciph_camellia_cts.txt33 # 128-bit Camellia key: 1DC46A8D763F4F93742BCBA3387576C3
44 # 128-bit Camellia key: 5027BC231D0F3A9D23333F1CA6FDBE7C
55 # 128-bit Camellia key: A1BB61E805F9BA6DDE8FDBDDC05CDEA0
66 # 128-bit Camellia key: 2CA27A5FAF5532244506434E1CEF6676
77 # 128-bit Camellia key: 7824F8C16F83FF354C6BF7515B973F43
88 # 256-bit Camellia key: B61C86CC4E5D2757545AD423399FB7031ECAB913CBB900BD7A3C6DD8BF92015B
99 # 256-bit Camellia key: 1B97FE0A190E2021EB30753E1B6E1E77B0754B1D684610355864104963463833
110 # 256-bit Camellia key: 32164C5B434D1D1538E4CFD9BE8040FE8C4AC7ACC4B93D3314D2133668147A05
121 # 256-bit Camellia key: B038B132CD8E06612267FAB7170066D88AECCBA0B744BFC60DC89BCA182D0715
132 # 256-bit Camellia key: CCFCD349BF4C6677E86E4B02B8EAB924A546AC731CF9BF6989B996E7D6BFBBA7
A Devppkey_dsa.txt255 # Test sign with a 2048 bit key with N == 224 is allowed in fips mode
262 # Test sign with a 2048 bit key with N == 256 is allowed in fips mode
268 # Test sign with a 3072 bit key with N == 256 is allowed in fips mode
274 # Test sign with a 2048 bit SHA3 is allowed in fips mode
280 # Test verify with a 1024 bit key is allowed in fips mode
294 # Test sign with a 1024 bit key is not allowed in fips mode
310 # Test sign with a 3072 bit key with N == 224 is not allowed in fips mode
318 # Test sign with a 4096 bit key is not allowed in fips mode
A Devppkey_rsa.txt19 # RSA 2048 bit key.
279 # 1025 bit key
324 # 1026 bit key
369 # 1027 bit key
414 # 1028 bit key
460 # 1029 bit key
505 # 1030 bit key
550 # 1031 bit key
/openssl-master/crypto/ts/
A Dts_rsp_print.c19 int bit; member
107 for (; a->bit >= 0; ++a) { in ts_status_map_print()
108 if (ASN1_BIT_STRING_get_bit(v, a->bit)) { in ts_status_map_print()
/openssl-master/include/crypto/
A Dbn_conf.h.in17 * both 32-bit and 64-bit builds are supported from a single run
/openssl-master/apps/
A Drehash.c109 static void bit_set(unsigned char *set, unsigned int bit) in bit_set() argument
111 set[bit >> 3] |= 1 << (bit & 0x7); in bit_set()
114 static int bit_isset(unsigned char *set, unsigned int bit) in bit_isset() argument
116 return set[bit >> 3] & (1 << (bit & 0x7)); in bit_isset()

Completed in 31 milliseconds

1234567