/openssl/doc/man3/ |
H A D | OPENSSL_ia32cap.pod | 24 =item bit #4 denoting presence of Time-Stamp Counter. 30 =item bit #23 denoting MMX support; 32 =item bit #24, FXSR bit, denoting availability of XMM registers; 34 =item bit #25 denoting SSE support; 36 =item bit #26 denoting SSE2 support; 51 =item bit #57 denoting AES-NI instruction set extension; 53 =item bit #58, XSAVE bit, lack of which in combination with MOVBE is used 56 =item bit #59, OSXSAVE bit, denoting availability of YMM registers; 58 =item bit #60 denoting AVX extension; 64 For example, in 32-bit application context clearing bit #26 at run-time [all …]
|
H A D | EVP_des_cbc.pod | 54 DES in CBC, ECB, CFB with 64-bit shift, CFB with 1-bit shift, CFB with 8-bit 68 Two key triple DES in ECB, CBC, CFB with 64-bit shift and OFB modes. 79 Three-key triple DES in ECB, CBC, CFB with 64-bit shift, CFB with 1-bit shift, 80 CFB with 8-bit shift and OFB modes.
|
H A D | EVP_aes_128_gcm.pod | 94 AES for 128, 192 and 256 bit keys in the following modes: CBC, CFB with 128-bit 95 shift, CFB with 1-bit shift, CFB with 8-bit shift, CTR, ECB, and OFB. 128 AES for 128, 192 and 256 bit keys in CBC-MAC Mode (CCM), Galois Counter Mode 140 AES key wrap with 128, 192 and 256 bit keys, as according to RFC 3394 section 153 In particular, XTS-AES-128 (B<EVP_aes_128_xts>) takes input of a 256-bit key to 154 achieve AES 128-bit security, and XTS-AES-256 (B<EVP_aes_256_xts>) takes input 155 of a 512-bit key to achieve AES 256-bit security.
|
H A D | OPENSSL_s390xcap.pod | 34 The name of a processor generation. A bit in the environment variable's 42 The name of an instruction followed by two 64-bit masks. The part of the 44 set to the specified 128-bit mask. Possible values are B<kimd>, B<klmd>, 50 Store-facility-list-extended (stfle) followed by three 64-bit masks. The 52 instruction is set to the specified 192-bit mask. 61 The 64-bit masks are specified in hexadecimal notation. The 0x prefix is 65 rows separate the individual 64-bit masks. The bit numbers in the first 66 column are consistent with [1], that is, 0 denotes the leftmost bit and 67 the numbering is continuous across 64-bit mask boundaries.
|
H A D | BN_set_bit.pod | 6 BN_lshift1, BN_rshift, BN_rshift1 - bit operations on BIGNUMs 27 BN_set_bit() sets bit B<n> in B<a> to 1 (C<a|=(1E<lt>E<lt>n)>). The 30 BN_clear_bit() sets bit B<n> in B<a> to 0 (C<a&=~(1E<lt>E<lt>n)>). An 33 BN_is_bit_set() tests if bit B<n> in B<a> is set. 35 BN_mask_bits() truncates B<a> to an B<n> bit number 54 BN_is_bit_set() returns 1 if the bit is set, 0 otherwise.
|
H A D | EVP_aria_128_gcm.pod | 79 ARIA for 128, 192 and 256 bit keys in the following modes: CBC, CFB with 80 128-bit shift, CFB with 1-bit shift, CFB with 8-bit shift, CTR, ECB and OFB. 89 ARIA for 128, 192 and 256 bit keys in CBC-MAC Mode (CCM) and Galois Counter
|
H A D | EVP_camellia_128_ecb.pod | 73 Camellia for 128, 192 and 256 bit keys in the following modes: CBC, CFB with 74 128-bit shift, CFB with 1-bit shift, CFB with 8-bit shift, CTR, ECB and OFB.
|
H A D | EVP_chacha20.pod | 26 bit nonce. For example a nonce of: 38 (AAD) and produces a 128-bit authentication tag. See the 51 uses a 32 bit counter and a 96 bit nonce for the IV.
|
H A D | CMS_add1_signer.pod | 79 algorithms in preference order: 256 bit AES, Gost R3411-94, Gost 28147-89, 192 80 bit AES, 128 bit AES, triple DES, 128 bit RC2, 64 bit RC2, DES and 40 bit RC2.
|
H A D | RAND_set_DRBG_type.pod | 20 RAND_set_DRBG_type() specifies the random bit generator that will be 30 random bit generator. 38 These functions must be called before the random bit generators are first
|
H A D | BF_encrypt.pod | 43 Blowfish is a block cipher that operates on 64 bit (8 byte) blocks of data. 44 It uses a variable size key, but typically, 128 bit (16 byte) keys are 47 of the faster block ciphers. It is quite a bit faster than DES, and much 84 BF_cfb64_encrypt() is the CFB mode for Blowfish with 64 bit feedback. 91 BF_ofb64_encrypt() is the OFB mode for Blowfish with 64 bit feedback. 100 each 32-bit chunk in host-byte order, which is little-endian on little-endian
|
H A D | SSL_CTX_set_mode.pod | 21 SSL_CTX_set_mode() adds the mode set via bit-mask in B<mode> to B<ctx>. 23 SSL_CTX_clear_mode() removes the mode set via bit-mask in B<mode> from B<ctx>. 25 SSL_set_mode() adds the mode set via bit-mask in B<mode> to B<ssl>. 27 SSL_clear_mode() removes the mode set via bit-mask in B<mode> from B<ssl>. 127 SSL_CTX_set_mode() and SSL_set_mode() return the new mode bit-mask 130 SSL_CTX_get_mode() and SSL_get_mode() return the current bit-mask.
|
/openssl/crypto/ |
H A D | mem_sec.c | 349 for (; bit; bit >>= 1, list--) { in sh_getlist() 361 size_t bit; in sh_testbit() local 366 OPENSSL_assert(bit > 0 && bit < sh.bittable_size); in sh_testbit() 372 size_t bit; in sh_clearbit() local 377 OPENSSL_assert(bit > 0 && bit < sh.bittable_size); in sh_clearbit() 384 size_t bit; in sh_setbit() local 389 OPENSSL_assert(bit > 0 && bit < sh.bittable_size); in sh_setbit() 391 SETBIT(table, bit); in sh_setbit() 620 size_t bit; in sh_find_my_buddy() local 624 bit ^= 1; in sh_find_my_buddy() [all …]
|
/openssl/crypto/bn/ |
H A D | bn_intern.c | 27 int bit, next_bit, mask; in bn_compute_wNAF() local 44 bit = 1 << w; /* at most 128 */ in bn_compute_wNAF() 45 next_bit = bit << 1; /* at most 256 */ in bn_compute_wNAF() 77 if (window_val & bit) { in bn_compute_wNAF() 96 if (digit <= -bit || digit >= bit || !(digit & 1)) { in bn_compute_wNAF() 108 && window_val != bit) { in bn_compute_wNAF() 117 window_val += bit * BN_is_bit_set(scalar, j + w); in bn_compute_wNAF()
|
H A D | bn_rand.c | 27 int b, ret = 0, bit, bytes, mask; in bnrand() local 40 bit = (bits - 1) % 8; in bnrand() 41 mask = 0xff << (bit + 1); in bnrand() 74 if (bit == 0) { in bnrand() 78 buf[0] |= (3 << (bit - 1)); in bnrand() 81 buf[0] |= (1 << bit); in bnrand()
|
/openssl/test/recipes/30-test_evp_data/ |
H A D | evpciph_camellia_cts.txt | 33 # 128-bit Camellia key: 1DC46A8D763F4F93742BCBA3387576C3 44 # 128-bit Camellia key: 5027BC231D0F3A9D23333F1CA6FDBE7C 55 # 128-bit Camellia key: A1BB61E805F9BA6DDE8FDBDDC05CDEA0 66 # 128-bit Camellia key: 2CA27A5FAF5532244506434E1CEF6676 77 # 128-bit Camellia key: 7824F8C16F83FF354C6BF7515B973F43 88 # 256-bit Camellia key: B61C86CC4E5D2757545AD423399FB7031ECAB913CBB900BD7A3C6DD8BF92015B 99 # 256-bit Camellia key: 1B97FE0A190E2021EB30753E1B6E1E77B0754B1D684610355864104963463833 110 # 256-bit Camellia key: 32164C5B434D1D1538E4CFD9BE8040FE8C4AC7ACC4B93D3314D2133668147A05 121 # 256-bit Camellia key: B038B132CD8E06612267FAB7170066D88AECCBA0B744BFC60DC89BCA182D0715 132 # 256-bit Camellia key: CCFCD349BF4C6677E86E4B02B8EAB924A546AC731CF9BF6989B996E7D6BFBBA7
|
H A D | evppkey_dsa_sigalg.txt | 272 # Test sign with a 2048 bit key with N == 160 is not allowed in fips mode 280 # Test sign with a 2048 bit key with N == 224 is allowed in fips mode 288 # Test sign with a 2048 bit key with N == 256 is allowed in fips mode 295 # Test sign with a 3072 bit key with N == 256 is allowed in fips mode 302 # Test sign with a 2048 bit SHA3 is allowed in fips mode 309 # Test verify with a 1024 bit key is allowed in fips mode 321 # Test verify with a 2048/160 bit key is allowed in fips mode 329 # Test sign with a 1024 bit key is not allowed in fips mode 345 # Test sign with a 3072 bit key with N == 224 is not allowed in fips mode 353 # Test sign with a 4096 bit key is not allowed in fips mode [all …]
|
H A D | evppkey_dsa.txt | 271 # Test sign with a 2048 bit key with N == 160 is not allowed in fips mode 279 # Test sign with a 2048 bit key with N == 224 is allowed in fips mode 287 # Test sign with a 2048 bit key with N == 256 is allowed in fips mode 294 # Test sign with a 3072 bit key with N == 256 is allowed in fips mode 301 # Test sign with a 2048 bit SHA3 is allowed in fips mode 308 # Test verify with a 1024 bit key is allowed in fips mode 320 # Test verify with a 2048/160 bit key is allowed in fips mode 329 # Test sign with a 1024 bit key is not allowed in fips mode 345 # Test sign with a 3072 bit key with N == 224 is not allowed in fips mode 353 # Test sign with a 4096 bit key is not allowed in fips mode [all …]
|
/openssl/doc/man1/ |
H A D | openssl-enc.pod.in | 381 rc4-64 64 bit RC4 405 aes-[128|192|256]-cfb 128/192/256 bit AES in 128 bit CFB mode 406 aes-[128|192|256]-cfb1 128/192/256 bit AES in 1 bit CFB mode 407 aes-[128|192|256]-cfb8 128/192/256 bit AES in 8 bit CFB mode 417 aria-[128|192|256]-cfb 128/192/256 bit ARIA in 128 bit CFB mode 418 aria-[128|192|256]-cfb1 128/192/256 bit ARIA in 1 bit CFB mode 419 aria-[128|192|256]-cfb8 128/192/256 bit ARIA in 8 bit CFB mode 426 camellia-[128|192|256]-cfb 128/192/256 bit Camellia in 128 bit CFB mode 427 camellia-[128|192|256]-cfb1 128/192/256 bit Camellia in 1 bit CFB mode 428 camellia-[128|192|256]-cfb8 128/192/256 bit Camellia in 8 bit CFB mode [all …]
|
H A D | openssl-genpkey.pod.in | 417 Encrypt output private key using 128 bit AES and the passphrase "hello": 421 Generate a 2048 bit RSA key using 3 as the public exponent: 426 Generate 2048 bit DSA parameters that can be validated: The output values for 437 Generate 4096 bit DH Key using safe prime group ffdhe4096: 441 Generate 2048 bit X9.42 DH key with 256 bit subgroup using RFC5114 group3: 453 Output 2048 bit X9.42 DH parameters with 224 bit subgroup using RFC5114 group2: 457 Output 2048 bit X9.42 DH parameters with 224 bit subgroup using FIP186-4 keygen: 463 Output 1024 bit X9.42 DH parameters with 160 bit subgroup using FIP186-2 keygen: 469 Output 2048 bit DH parameters: 474 Output 2048 bit DH parameters using a generator:
|
H A D | openssl-verification-options.pod | 357 Enable the Suite B mode operation at 128 bit Level of Security, 128 bit or 358 192 bit, or only 192 bit Level of Security respectively. 573 keyCertSign bit set if the keyUsage extension is present. 592 digitalSignature bit set. The Netscape certificate type must be absent 593 or it must have the SSL client bit set. 614 be absent or the SSL CA bit must be set. 620 keyEncipherment bit set if the keyUsage extension is present. This isn't 628 S/MIME bit set. If the S/MIME bit is not set in the Netscape certificate type 630 This is because some Verisign certificates don't set the S/MIME bit. 635 the nonRepudiation bit must be set if the keyUsage extension is present. [all …]
|
/openssl/crypto/ts/ |
H A D | ts_rsp_print.c | 19 int bit; member 107 for (; a->bit >= 0; ++a) { in ts_status_map_print() 108 if (ASN1_BIT_STRING_get_bit(v, a->bit)) { in ts_status_map_print()
|
/openssl/include/crypto/ |
H A D | riscv_arch.def | 13 * Each RISC-V capability ends up encoded as a single set bit in an array of 17 * and third argument as the index of the bit to be used to encode the 27 * RISCV_DEFINE_CAP(EXTENSION NAME, array index, bit index, hwprobe key, hwprobe value) */
|
H A D | bn_conf.h.in | 17 * both 32-bit and 64-bit builds are supported from a single run
|
/openssl/apps/ |
H A D | rehash.c | 107 static void bit_set(unsigned char *set, unsigned int bit) in bit_set() argument 109 set[bit >> 3] |= 1 << (bit & 0x7); in bit_set() 112 static int bit_isset(unsigned char *set, unsigned int bit) in bit_isset() argument 114 return set[bit >> 3] & (1 << (bit & 0x7)); in bit_isset()
|