Searched refs:power (Results 1 – 14 of 14) sorted by relevance
/openssl/doc/man3/ |
H A D | BN_mod_exp_mont.pod | 28 BN_mod_exp_mont() computes I<a> to the I<p>-th power modulo I<m> (C<rr=a^p % m>) 33 BN_mod_exp_mont_consttime() computes I<a> to the I<p>-th power modulo I<m> 41 the I<p1>-th power modulo I<m1> (C<rr1=a1^p1 % m1>) and I<a2> to the I<p2>-th 42 power modulo I<m2> (C<rr2=a2^p2 % m2>) using Montgomery multiplication. For some
|
H A D | BN_add.pod | 98 BN_exp() raises I<a> to the I<p>-th power and places the result in I<r> 102 BN_mod_exp() computes I<a> to the I<p>-th power modulo I<m> (C<r=a^p %
|
H A D | OPENSSL_secure_malloc.pod | 57 Both C<size> and, if specified, C<minsize> must be a power of two and
|
H A D | OPENSSL_malloc.pod | 106 needs. Note, the alignment value must be a power of 2, and the size
|
H A D | OPENSSL_LH_COMPFUNC.pod | 102 normally truncated to a power of 2, so make sure that your hash
|
/openssl/crypto/ec/curve448/ |
H A D | curve448.c | 510 int power, addend; member 567 control[position].power = -1; in recode_wnaf() 600 control[position].power = pos + 16 * (w - 1); in recode_wnaf() 662 i = control_var[0].power; in ossl_curve448_base_double_scalarmul_non_secret() 668 if (i > control_pre[0].power) { in ossl_curve448_base_double_scalarmul_non_secret() 671 } else if (i == control_pre[0].power && i >= 0) { in ossl_curve448_base_double_scalarmul_non_secret() 679 i = control_pre[0].power; in ossl_curve448_base_double_scalarmul_non_secret() 685 int cv = (i == control_var[contv].power); in ossl_curve448_base_double_scalarmul_non_secret() 686 int cp = (i == control_pre[contp].power); in ossl_curve448_base_double_scalarmul_non_secret()
|
/openssl/crypto/bn/ |
H A D | rsaz_exp.c | 246 BN_ULONG k, const void *tbl, unsigned int power); 248 const void *n, BN_ULONG k, unsigned int power); 252 void rsaz_512_scatter4(void *tbl, const BN_ULONG *val, int power); 253 void rsaz_512_gather4(BN_ULONG *val, const void *tbl, int power);
|
H A D | bn_exp.c | 789 int power, int bits); in BN_mod_exp_mont_consttime() 792 int power, int bits); in BN_mod_exp_mont_consttime() 795 int power, int bits); in BN_mod_exp_mont_consttime() 798 int power, int bits); in BN_mod_exp_mont_consttime() 801 int power, int bits); in BN_mod_exp_mont_consttime() 836 const BN_ULONG *n0, int num, int power); in BN_mod_exp_mont_consttime() 838 void *table, size_t power); in BN_mod_exp_mont_consttime() 840 void *table, size_t power); in BN_mod_exp_mont_consttime() 945 const BN_ULONG *n0, int num, int power); in BN_mod_exp_mont_consttime() 947 void *table, size_t power); in BN_mod_exp_mont_consttime() [all …]
|
H A D | README.pod | 168 word arrays B<r> and B<t>. B<n2> must be a power of 2. It computes
|
/openssl/crypto/bn/asm/ |
H A D | rsaz-avx2.pl | 1575 my ($out,$inp,$power) = $win64 ? ("%rcx","%rdx","%r8d") : ("%rdi","%rsi","%edx"); 1585 shl \$4,$power 1586 lea ($out,$power),$out 1636 vmovd $power, %xmm4 1683 mov \$9,$power 1732 dec $power
|
H A D | rsaz-x86_64.pl | 963 pshufd \$0,%xmm8,%xmm8 # broadcast $power 2127 my ($out,$inp,$power)= $win64 ? ("%rcx","%rdx","%r8d") : ("%rdi","%rsi","%edx"); 2134 leaq ($out,$power,8), $out 2170 movd $power,%xmm8 2174 pshufd \$0,%xmm8,%xmm8 # broadcast $power
|
/openssl/test/recipes/30-test_evp_data/ |
H A D | evpmac_poly1305.txt | 167 # 4th power of the key spills to 131th bit in SIMD key setup
|
/openssl/doc/man7/ |
H A D | EVP_KDF-SCRYPT.pod | 20 has to be a positive power of two, is the general work factor and scales CPU
|
/openssl/ |
H A D | LICENSE.txt | 19 "control" means (i) the power, direct or indirect, to cause the
|
Completed in 46 milliseconds