Searched refs:odd (Results 1 – 21 of 21) sorted by relevance
/openssl-master/test/ssl-tests/ |
A D | 13-fragmentation.cnf | 14 test-9 = 9-large-app-data-odd-fragment-size 17 test-12 = 12-large-app-data-aes-sha1-multibuffer-odd-fragment 238 [9-large-app-data-odd-fragment-size] 239 ssl_conf = 9-large-app-data-odd-fragment-size-ssl 241 [9-large-app-data-odd-fragment-size-ssl] 242 server = 9-large-app-data-odd-fragment-size-server 243 client = 9-large-app-data-odd-fragment-size-client 245 [9-large-app-data-odd-fragment-size-server] 250 [9-large-app-data-odd-fragment-size-client] 312 [12-large-app-data-aes-sha1-multibuffer-odd-fragment] [all …]
|
A D | 13-fragmentation.cnf.in | 96 name => "large-app-data-odd-fragment-size", 137 name => "large-app-data-aes-sha1-multibuffer-odd-fragment", 149 name => "large-app-data-aes-sha2-multibuffer-odd-fragment",
|
/openssl-master/crypto/chacha/asm/ |
A D | chacha-armv4.pl | 69 my $odd = $d0&1; 71 my ($xd,$xd_) = $odd ? (@t[2],@x[$d1]) : (@x[$d0],@t[2]); 124 "&ldr ($xd,'[sp,#4*(16+$d2)]')" ) if ($odd); 130 "&ldr ($xd_,'[sp,#4*(16+$d3)]')" ) if (!$odd); 135 $xd=@x[$d2] if (!$odd); 136 $xd_=@x[$d3] if ($odd); 642 my $odd = pop; 666 "&vext_8 ($b,$b,$b,$odd?12:4)", 667 "&vext_8 ($d,$d,$d,$odd?4:12)"
|
A D | chacha-armv8.pl | 815 my $odd = pop; 838 "&ext ('$d','$d','$d',$odd?4:12)", 839 "&ext ('$b','$b','$b',$odd?12:4)"
|
A D | chacha-ppc.pl | 425 my $odd = pop; 446 "&vrldoi ('$b','$b',$odd?4:12)", 447 "&vrldoi ('$d','$d',$odd?12:4)"
|
A D | chacha-s390x.pl | 218 my $odd=@_[24]; 237 vsldb (@b[$_],@b[$_],@b[$_],$odd?12:4) for (0..5); 238 vsldb (@d[$_],@d[$_],@d[$_],$odd?4:12) for (0..5);
|
/openssl-master/doc/man3/ |
A D | BN_rand.pod | 54 If I<bottom> is B<BN_RAND_BOTTOM_ODD>, the number will be odd; if it 55 is B<BN_RAND_BOTTOM_ANY> it can be odd or even.
|
A D | BN_cmp.pod | 27 BN_is_odd() tests if I<a> is odd.
|
A D | OPENSSL_hexchar2int.pod | 36 An odd number of hex digits is an error.
|
A D | RSA_generate_key.pod | 46 with I<num> E<lt> 1024 should be considered insecure. The exponent is an odd
|
A D | DES_random_key.pod | 111 consists of 8 bytes with odd parity. The least significant bit in 125 DES_set_key_checked() will check that the key passed is of odd parity 133 DES_set_odd_parity() sets the parity of the passed I<key> to odd.
|
A D | DH_generate_parameters.pod | 75 The parameter B<p> has been determined to not being an odd prime.
|
A D | EVP_PKEY_CTX_ctrl.pod | 301 generation to the value stored in I<pubexp>. Currently it should be an odd
|
A D | EVP_EncryptInit.pod | 832 the key to odd parity).
|
/openssl-master/crypto/modes/asm/ |
A D | ghash-x86.pl | 390 my $odd = $cnt&1; 391 my $nix = $odd ? $nlo : $nhi; 393 &shl (&LB($nlo),4) if ($odd); 398 &mov (&LB($nlo),&BP($cnt/2,$inp)) if (!$odd && $cnt>=0); 400 &and ($nhi,0xf0) if ($odd); 404 &mov ($nhi,$nlo) if (!$odd && $cnt>=0);
|
/openssl-master/crypto/ec/curve448/ |
A D | curve448.c | 585 uint32_t odd = (uint32_t)current >> pos; in recode_wnaf() local 586 int32_t delta = odd & mask; in recode_wnaf() 589 if (odd & (1 << (table_bits + 1))) in recode_wnaf()
|
/openssl-master/doc/man1/ |
A D | openssl-namedisplay-options.pod | 101 will result in rather odd looking output.
|
/openssl-master/doc/man7/ |
A D | EVP_PKEY-RSA.pod | 128 The RSA "e" value. The value may be any odd number greater than or equal to
|
/openssl-master/crypto/err/ |
A D | openssl.txt | 91 ASN1_R_ODD_NUMBER_OF_CHARS:145:odd number of chars 439 CRYPTO_R_ODD_NUMBER_OF_DIGITS:103:odd number of digits
|
/openssl-master/include/openssl/ |
A D | asn1.h.in | 428 * strings are 1 byte per character. This will produce some pretty odd
|
/openssl-master/ |
A D | CHANGES.md | 12737 used only if the modulus is odd. On 32-bit systems, it is faster 16540 functions called *_PublicKey_* which used various odd formats so
|
Completed in 74 milliseconds