Home
last modified time | relevance | path

Searched refs:half (Results 1 – 14 of 14) sorted by relevance

/openssl/test/
H A Dpoly1305_internal_test.c1542 size_t half = inlen / 2; in test_poly1305() local
1545 Poly1305_Update(&poly1305, in, half); in test_poly1305()
1546 Poly1305_Update(&poly1305, in+half, inlen-half); in test_poly1305()
1554 for (half = 16; half < inlen; half += 16) { in test_poly1305()
1556 Poly1305_Update(&poly1305, in, half); in test_poly1305()
1557 Poly1305_Update(&poly1305, in+half, inlen-half); in test_poly1305()
1562 idx, half, inlen-half); in test_poly1305()
H A Dsiphash_internal_test.c222 size_t half = inlen / 2; in test_siphash() local
227 SipHash_Update(&siphash, in, half); in test_siphash()
228 SipHash_Update(&siphash, in+half, inlen-half); in test_siphash()
237 for (half = 16; half < inlen; half += 16) { in test_siphash()
241 SipHash_Update(&siphash, in, half); in test_siphash()
242 SipHash_Update(&siphash, in+half, inlen-half); in test_siphash()
248 idx, half, inlen-half); in test_siphash()
/openssl/doc/man3/
H A DBIO_s_bio.pod34 BIOs where data written to either half of the pair is buffered and can be read from
35 the other half. Both halves must usually by handled by the same application thread
39 one half of a BIO pair and have all the data processed by the chain under application
60 up any half of the pair will automatically destroy the association.
64 half of the pair will return any pending data or EOF when all pending data has
88 last read attempt at the other half of the BIO pair failed due to an
103 Both halves of a BIO pair should be freed. That is even if one half is implicit
104 freed due to a BIO_free_all() or SSL_free() call the other half needs to be freed.
108 on the other half of the pair and, if any data is pending, reading it and sending
H A DDES_random_key.pod271 first 12 bits will come from the 1st input byte and the low half of
/openssl/doc/HOWTO/
H A Dkeys.txt7 come in pairs, with one half being the public key and the other half
/openssl/doc/man7/
H A Dprovider-keymgmt.pod206 to not compare the private half if it has compared the public half,
207 since a match of one half implies a match of the other half.
H A DEVP_RAND.pod282 the (re-)seeding of the DRBG will fail. This corresponds to one and a half
283 times the security strength of the DRBG. The extra half is used for the
/openssl/crypto/bn/asm/
H A Dco-586.pl211 local($b,$tot,$end,$half);
/openssl/crypto/sha/asm/
H A Dkeccak1600-armv4.pl1605 my ($mnemonic,$half,$reg,$ea) = @_;
1608 if ($half eq "l") {
/openssl/doc/man1/
H A Dopenssl-dgst.pod.in93 since the default values are set to only supply half of the maximum security
/openssl/crypto/aes/asm/
H A Dbsaes-armv8.pl1836 …mov v13.d[0], v11.d[1] // just in case AES_encrypt corrupts top half of callee-saved …
1875 …mov v13.d[0], v11.d[1] // just in case AES_encrypt corrupts top half of callee-saved …
/openssl/crypto/des/asm/
H A Ddes_enc.m4245 ! In each round one half (work) is modified based on key and the
246 ! other half (use).
251 ! One half has the bits for the sboxes in the following positions:
/openssl/include/openssl/
H A Dbio.h.in62 # define BIO_TYPE_BIO (19|BIO_TYPE_SOURCE_SINK)/* half a BIO pair */
/openssl/
H A DCHANGES.md12172 * buffer_gets() could terminate with the buffer only half
14263 * Add a SSL_SESS_CACHE_NO_INTERNAL_STORE flag to take over half
14821 'md_local' value, not just the half used for PRNG output.
14828 to me that the half of 'md_local' used for chaining was the
14829 half from which PRNG output bytes were taken -- I had always
14830 assumed that the secret half would be used.) The second
15855 chaining variable. However, the output function chains only half

Completed in 130 milliseconds