Home
last modified time | relevance | path

Searched refs:odd (Results 1 – 21 of 21) sorted by relevance

/openssl-master/test/ssl-tests/
A D13-fragmentation.cnf14 test-9 = 9-large-app-data-odd-fragment-size
17 test-12 = 12-large-app-data-aes-sha1-multibuffer-odd-fragment
238 [9-large-app-data-odd-fragment-size]
239 ssl_conf = 9-large-app-data-odd-fragment-size-ssl
241 [9-large-app-data-odd-fragment-size-ssl]
242 server = 9-large-app-data-odd-fragment-size-server
243 client = 9-large-app-data-odd-fragment-size-client
245 [9-large-app-data-odd-fragment-size-server]
250 [9-large-app-data-odd-fragment-size-client]
312 [12-large-app-data-aes-sha1-multibuffer-odd-fragment]
[all …]
A D13-fragmentation.cnf.in96 name => "large-app-data-odd-fragment-size",
137 name => "large-app-data-aes-sha1-multibuffer-odd-fragment",
149 name => "large-app-data-aes-sha2-multibuffer-odd-fragment",
/openssl-master/crypto/chacha/asm/
A Dchacha-armv4.pl69 my $odd = $d0&1;
71 my ($xd,$xd_) = $odd ? (@t[2],@x[$d1]) : (@x[$d0],@t[2]);
124 "&ldr ($xd,'[sp,#4*(16+$d2)]')" ) if ($odd);
130 "&ldr ($xd_,'[sp,#4*(16+$d3)]')" ) if (!$odd);
135 $xd=@x[$d2] if (!$odd);
136 $xd_=@x[$d3] if ($odd);
642 my $odd = pop;
666 "&vext_8 ($b,$b,$b,$odd?12:4)",
667 "&vext_8 ($d,$d,$d,$odd?4:12)"
A Dchacha-armv8.pl815 my $odd = pop;
838 "&ext ('$d','$d','$d',$odd?4:12)",
839 "&ext ('$b','$b','$b',$odd?12:4)"
A Dchacha-ppc.pl425 my $odd = pop;
446 "&vrldoi ('$b','$b',$odd?4:12)",
447 "&vrldoi ('$d','$d',$odd?12:4)"
A Dchacha-s390x.pl218 my $odd=@_[24];
237 vsldb (@b[$_],@b[$_],@b[$_],$odd?12:4) for (0..5);
238 vsldb (@d[$_],@d[$_],@d[$_],$odd?4:12) for (0..5);
/openssl-master/doc/man3/
A DBN_rand.pod54 If I<bottom> is B<BN_RAND_BOTTOM_ODD>, the number will be odd; if it
55 is B<BN_RAND_BOTTOM_ANY> it can be odd or even.
A DBN_cmp.pod27 BN_is_odd() tests if I<a> is odd.
A DOPENSSL_hexchar2int.pod36 An odd number of hex digits is an error.
A DRSA_generate_key.pod46 with I<num> E<lt> 1024 should be considered insecure. The exponent is an odd
A DDES_random_key.pod111 consists of 8 bytes with odd parity. The least significant bit in
125 DES_set_key_checked() will check that the key passed is of odd parity
133 DES_set_odd_parity() sets the parity of the passed I<key> to odd.
A DDH_generate_parameters.pod75 The parameter B<p> has been determined to not being an odd prime.
A DEVP_PKEY_CTX_ctrl.pod301 generation to the value stored in I<pubexp>. Currently it should be an odd
A DEVP_EncryptInit.pod832 the key to odd parity).
/openssl-master/crypto/modes/asm/
A Dghash-x86.pl390 my $odd = $cnt&1;
391 my $nix = $odd ? $nlo : $nhi;
393 &shl (&LB($nlo),4) if ($odd);
398 &mov (&LB($nlo),&BP($cnt/2,$inp)) if (!$odd && $cnt>=0);
400 &and ($nhi,0xf0) if ($odd);
404 &mov ($nhi,$nlo) if (!$odd && $cnt>=0);
/openssl-master/crypto/ec/curve448/
A Dcurve448.c585 uint32_t odd = (uint32_t)current >> pos; in recode_wnaf() local
586 int32_t delta = odd & mask; in recode_wnaf()
589 if (odd & (1 << (table_bits + 1))) in recode_wnaf()
/openssl-master/doc/man1/
A Dopenssl-namedisplay-options.pod101 will result in rather odd looking output.
/openssl-master/doc/man7/
A DEVP_PKEY-RSA.pod128 The RSA "e" value. The value may be any odd number greater than or equal to
/openssl-master/crypto/err/
A Dopenssl.txt91 ASN1_R_ODD_NUMBER_OF_CHARS:145:odd number of chars
439 CRYPTO_R_ODD_NUMBER_OF_DIGITS:103:odd number of digits
/openssl-master/include/openssl/
A Dasn1.h.in428 * strings are 1 byte per character. This will produce some pretty odd
/openssl-master/
A DCHANGES.md12737 used only if the modulus is odd. On 32-bit systems, it is faster
16540 functions called *_PublicKey_* which used various odd formats so

Completed in 74 milliseconds