Searched refs:half (Results 1 – 14 of 14) sorted by relevance
/openssl/test/ |
H A D | poly1305_internal_test.c | 1542 size_t half = inlen / 2; in test_poly1305() local 1545 Poly1305_Update(&poly1305, in, half); in test_poly1305() 1546 Poly1305_Update(&poly1305, in+half, inlen-half); in test_poly1305() 1554 for (half = 16; half < inlen; half += 16) { in test_poly1305() 1556 Poly1305_Update(&poly1305, in, half); in test_poly1305() 1557 Poly1305_Update(&poly1305, in+half, inlen-half); in test_poly1305() 1562 idx, half, inlen-half); in test_poly1305()
|
H A D | siphash_internal_test.c | 222 size_t half = inlen / 2; in test_siphash() local 227 SipHash_Update(&siphash, in, half); in test_siphash() 228 SipHash_Update(&siphash, in+half, inlen-half); in test_siphash() 237 for (half = 16; half < inlen; half += 16) { in test_siphash() 241 SipHash_Update(&siphash, in, half); in test_siphash() 242 SipHash_Update(&siphash, in+half, inlen-half); in test_siphash() 248 idx, half, inlen-half); in test_siphash()
|
/openssl/doc/man3/ |
H A D | BIO_s_bio.pod | 34 BIOs where data written to either half of the pair is buffered and can be read from 35 the other half. Both halves must usually by handled by the same application thread 39 one half of a BIO pair and have all the data processed by the chain under application 60 up any half of the pair will automatically destroy the association. 64 half of the pair will return any pending data or EOF when all pending data has 88 last read attempt at the other half of the BIO pair failed due to an 103 Both halves of a BIO pair should be freed. That is even if one half is implicit 104 freed due to a BIO_free_all() or SSL_free() call the other half needs to be freed. 108 on the other half of the pair and, if any data is pending, reading it and sending
|
H A D | DES_random_key.pod | 271 first 12 bits will come from the 1st input byte and the low half of
|
/openssl/doc/HOWTO/ |
H A D | keys.txt | 7 come in pairs, with one half being the public key and the other half
|
/openssl/doc/man7/ |
H A D | provider-keymgmt.pod | 206 to not compare the private half if it has compared the public half, 207 since a match of one half implies a match of the other half.
|
H A D | EVP_RAND.pod | 282 the (re-)seeding of the DRBG will fail. This corresponds to one and a half 283 times the security strength of the DRBG. The extra half is used for the
|
/openssl/crypto/bn/asm/ |
H A D | co-586.pl | 211 local($b,$tot,$end,$half);
|
/openssl/crypto/sha/asm/ |
H A D | keccak1600-armv4.pl | 1605 my ($mnemonic,$half,$reg,$ea) = @_; 1608 if ($half eq "l") {
|
/openssl/doc/man1/ |
H A D | openssl-dgst.pod.in | 93 since the default values are set to only supply half of the maximum security
|
/openssl/crypto/aes/asm/ |
H A D | bsaes-armv8.pl | 1836 …mov v13.d[0], v11.d[1] // just in case AES_encrypt corrupts top half of callee-saved … 1875 …mov v13.d[0], v11.d[1] // just in case AES_encrypt corrupts top half of callee-saved …
|
/openssl/crypto/des/asm/ |
H A D | des_enc.m4 | 245 ! In each round one half (work) is modified based on key and the 246 ! other half (use). 251 ! One half has the bits for the sboxes in the following positions:
|
/openssl/include/openssl/ |
H A D | bio.h.in | 62 # define BIO_TYPE_BIO (19|BIO_TYPE_SOURCE_SINK)/* half a BIO pair */
|
/openssl/ |
H A D | CHANGES.md | 12172 * buffer_gets() could terminate with the buffer only half 14263 * Add a SSL_SESS_CACHE_NO_INTERNAL_STORE flag to take over half 14821 'md_local' value, not just the half used for PRNG output. 14828 to me that the half of 'md_local' used for chaining was the 14829 half from which PRNG output bytes were taken -- I had always 14830 assumed that the secret half would be used.) The second 15855 chaining variable. However, the output function chains only half
|
Completed in 130 milliseconds