Home
last modified time | relevance | path

Searched refs:bit (Results 1 – 25 of 188) sorted by relevance

12345678

/openssl/doc/man3/
H A DOPENSSL_ia32cap.pod24 =item bit #4 denoting presence of Time-Stamp Counter.
30 =item bit #23 denoting MMX support;
32 =item bit #24, FXSR bit, denoting availability of XMM registers;
34 =item bit #25 denoting SSE support;
36 =item bit #26 denoting SSE2 support;
51 =item bit #57 denoting AES-NI instruction set extension;
53 =item bit #58, XSAVE bit, lack of which in combination with MOVBE is used
56 =item bit #59, OSXSAVE bit, denoting availability of YMM registers;
58 =item bit #60 denoting AVX extension;
64 For example, in 32-bit application context clearing bit #26 at run-time
[all …]
H A DEVP_des_cbc.pod54 DES in CBC, ECB, CFB with 64-bit shift, CFB with 1-bit shift, CFB with 8-bit
68 Two key triple DES in ECB, CBC, CFB with 64-bit shift and OFB modes.
79 Three-key triple DES in ECB, CBC, CFB with 64-bit shift, CFB with 1-bit shift,
80 CFB with 8-bit shift and OFB modes.
H A DEVP_aes_128_gcm.pod94 AES for 128, 192 and 256 bit keys in the following modes: CBC, CFB with 128-bit
95 shift, CFB with 1-bit shift, CFB with 8-bit shift, CTR, ECB, and OFB.
128 AES for 128, 192 and 256 bit keys in CBC-MAC Mode (CCM), Galois Counter Mode
140 AES key wrap with 128, 192 and 256 bit keys, as according to RFC 3394 section
153 In particular, XTS-AES-128 (B<EVP_aes_128_xts>) takes input of a 256-bit key to
154 achieve AES 128-bit security, and XTS-AES-256 (B<EVP_aes_256_xts>) takes input
155 of a 512-bit key to achieve AES 256-bit security.
H A DOPENSSL_s390xcap.pod34 The name of a processor generation. A bit in the environment variable's
42 The name of an instruction followed by two 64-bit masks. The part of the
44 set to the specified 128-bit mask. Possible values are B<kimd>, B<klmd>,
50 Store-facility-list-extended (stfle) followed by three 64-bit masks. The
52 instruction is set to the specified 192-bit mask.
61 The 64-bit masks are specified in hexadecimal notation. The 0x prefix is
65 rows separate the individual 64-bit masks. The bit numbers in the first
66 column are consistent with [1], that is, 0 denotes the leftmost bit and
67 the numbering is continuous across 64-bit mask boundaries.
H A DBN_set_bit.pod6 BN_lshift1, BN_rshift, BN_rshift1 - bit operations on BIGNUMs
27 BN_set_bit() sets bit B<n> in B<a> to 1 (C<a|=(1E<lt>E<lt>n)>). The
30 BN_clear_bit() sets bit B<n> in B<a> to 0 (C<a&=~(1E<lt>E<lt>n)>). An
33 BN_is_bit_set() tests if bit B<n> in B<a> is set.
35 BN_mask_bits() truncates B<a> to an B<n> bit number
54 BN_is_bit_set() returns 1 if the bit is set, 0 otherwise.
H A DEVP_aria_128_gcm.pod79 ARIA for 128, 192 and 256 bit keys in the following modes: CBC, CFB with
80 128-bit shift, CFB with 1-bit shift, CFB with 8-bit shift, CTR, ECB and OFB.
89 ARIA for 128, 192 and 256 bit keys in CBC-MAC Mode (CCM) and Galois Counter
H A DEVP_camellia_128_ecb.pod73 Camellia for 128, 192 and 256 bit keys in the following modes: CBC, CFB with
74 128-bit shift, CFB with 1-bit shift, CFB with 8-bit shift, CTR, ECB and OFB.
H A DEVP_chacha20.pod26 bit nonce. For example a nonce of:
38 (AAD) and produces a 128-bit authentication tag. See the
51 uses a 32 bit counter and a 96 bit nonce for the IV.
H A DCMS_add1_signer.pod79 algorithms in preference order: 256 bit AES, Gost R3411-94, Gost 28147-89, 192
80 bit AES, 128 bit AES, triple DES, 128 bit RC2, 64 bit RC2, DES and 40 bit RC2.
H A DRAND_set_DRBG_type.pod20 RAND_set_DRBG_type() specifies the random bit generator that will be
30 random bit generator.
38 These functions must be called before the random bit generators are first
H A DBF_encrypt.pod43 Blowfish is a block cipher that operates on 64 bit (8 byte) blocks of data.
44 It uses a variable size key, but typically, 128 bit (16 byte) keys are
47 of the faster block ciphers. It is quite a bit faster than DES, and much
84 BF_cfb64_encrypt() is the CFB mode for Blowfish with 64 bit feedback.
91 BF_ofb64_encrypt() is the OFB mode for Blowfish with 64 bit feedback.
100 each 32-bit chunk in host-byte order, which is little-endian on little-endian
H A DSSL_CTX_set_mode.pod21 SSL_CTX_set_mode() adds the mode set via bit-mask in B<mode> to B<ctx>.
23 SSL_CTX_clear_mode() removes the mode set via bit-mask in B<mode> from B<ctx>.
25 SSL_set_mode() adds the mode set via bit-mask in B<mode> to B<ssl>.
27 SSL_clear_mode() removes the mode set via bit-mask in B<mode> from B<ssl>.
127 SSL_CTX_set_mode() and SSL_set_mode() return the new mode bit-mask
130 SSL_CTX_get_mode() and SSL_get_mode() return the current bit-mask.
/openssl/crypto/
H A Dmem_sec.c349 for (; bit; bit >>= 1, list--) { in sh_getlist()
361 size_t bit; in sh_testbit() local
366 OPENSSL_assert(bit > 0 && bit < sh.bittable_size); in sh_testbit()
372 size_t bit; in sh_clearbit() local
377 OPENSSL_assert(bit > 0 && bit < sh.bittable_size); in sh_clearbit()
384 size_t bit; in sh_setbit() local
389 OPENSSL_assert(bit > 0 && bit < sh.bittable_size); in sh_setbit()
391 SETBIT(table, bit); in sh_setbit()
620 size_t bit; in sh_find_my_buddy() local
624 bit ^= 1; in sh_find_my_buddy()
[all …]
/openssl/crypto/bn/
H A Dbn_intern.c27 int bit, next_bit, mask; in bn_compute_wNAF() local
44 bit = 1 << w; /* at most 128 */ in bn_compute_wNAF()
45 next_bit = bit << 1; /* at most 256 */ in bn_compute_wNAF()
77 if (window_val & bit) { in bn_compute_wNAF()
96 if (digit <= -bit || digit >= bit || !(digit & 1)) { in bn_compute_wNAF()
108 && window_val != bit) { in bn_compute_wNAF()
117 window_val += bit * BN_is_bit_set(scalar, j + w); in bn_compute_wNAF()
H A Dbn_rand.c27 int b, ret = 0, bit, bytes, mask; in bnrand() local
40 bit = (bits - 1) % 8; in bnrand()
41 mask = 0xff << (bit + 1); in bnrand()
74 if (bit == 0) { in bnrand()
78 buf[0] |= (3 << (bit - 1)); in bnrand()
81 buf[0] |= (1 << bit); in bnrand()
/openssl/test/recipes/30-test_evp_data/
H A Devpciph_camellia_cts.txt33 # 128-bit Camellia key: 1DC46A8D763F4F93742BCBA3387576C3
44 # 128-bit Camellia key: 5027BC231D0F3A9D23333F1CA6FDBE7C
55 # 128-bit Camellia key: A1BB61E805F9BA6DDE8FDBDDC05CDEA0
66 # 128-bit Camellia key: 2CA27A5FAF5532244506434E1CEF6676
77 # 128-bit Camellia key: 7824F8C16F83FF354C6BF7515B973F43
88 # 256-bit Camellia key: B61C86CC4E5D2757545AD423399FB7031ECAB913CBB900BD7A3C6DD8BF92015B
99 # 256-bit Camellia key: 1B97FE0A190E2021EB30753E1B6E1E77B0754B1D684610355864104963463833
110 # 256-bit Camellia key: 32164C5B434D1D1538E4CFD9BE8040FE8C4AC7ACC4B93D3314D2133668147A05
121 # 256-bit Camellia key: B038B132CD8E06612267FAB7170066D88AECCBA0B744BFC60DC89BCA182D0715
132 # 256-bit Camellia key: CCFCD349BF4C6677E86E4B02B8EAB924A546AC731CF9BF6989B996E7D6BFBBA7
H A Devppkey_dsa_sigalg.txt272 # Test sign with a 2048 bit key with N == 160 is not allowed in fips mode
280 # Test sign with a 2048 bit key with N == 224 is allowed in fips mode
288 # Test sign with a 2048 bit key with N == 256 is allowed in fips mode
295 # Test sign with a 3072 bit key with N == 256 is allowed in fips mode
302 # Test sign with a 2048 bit SHA3 is allowed in fips mode
309 # Test verify with a 1024 bit key is allowed in fips mode
321 # Test verify with a 2048/160 bit key is allowed in fips mode
329 # Test sign with a 1024 bit key is not allowed in fips mode
345 # Test sign with a 3072 bit key with N == 224 is not allowed in fips mode
353 # Test sign with a 4096 bit key is not allowed in fips mode
[all …]
H A Devppkey_dsa.txt271 # Test sign with a 2048 bit key with N == 160 is not allowed in fips mode
279 # Test sign with a 2048 bit key with N == 224 is allowed in fips mode
287 # Test sign with a 2048 bit key with N == 256 is allowed in fips mode
294 # Test sign with a 3072 bit key with N == 256 is allowed in fips mode
301 # Test sign with a 2048 bit SHA3 is allowed in fips mode
308 # Test verify with a 1024 bit key is allowed in fips mode
320 # Test verify with a 2048/160 bit key is allowed in fips mode
329 # Test sign with a 1024 bit key is not allowed in fips mode
345 # Test sign with a 3072 bit key with N == 224 is not allowed in fips mode
353 # Test sign with a 4096 bit key is not allowed in fips mode
[all …]
/openssl/doc/man1/
H A Dopenssl-enc.pod.in381 rc4-64 64 bit RC4
405 aes-[128|192|256]-cfb 128/192/256 bit AES in 128 bit CFB mode
406 aes-[128|192|256]-cfb1 128/192/256 bit AES in 1 bit CFB mode
407 aes-[128|192|256]-cfb8 128/192/256 bit AES in 8 bit CFB mode
417 aria-[128|192|256]-cfb 128/192/256 bit ARIA in 128 bit CFB mode
418 aria-[128|192|256]-cfb1 128/192/256 bit ARIA in 1 bit CFB mode
419 aria-[128|192|256]-cfb8 128/192/256 bit ARIA in 8 bit CFB mode
426 camellia-[128|192|256]-cfb 128/192/256 bit Camellia in 128 bit CFB mode
427 camellia-[128|192|256]-cfb1 128/192/256 bit Camellia in 1 bit CFB mode
428 camellia-[128|192|256]-cfb8 128/192/256 bit Camellia in 8 bit CFB mode
[all …]
H A Dopenssl-genpkey.pod.in417 Encrypt output private key using 128 bit AES and the passphrase "hello":
421 Generate a 2048 bit RSA key using 3 as the public exponent:
426 Generate 2048 bit DSA parameters that can be validated: The output values for
437 Generate 4096 bit DH Key using safe prime group ffdhe4096:
441 Generate 2048 bit X9.42 DH key with 256 bit subgroup using RFC5114 group3:
453 Output 2048 bit X9.42 DH parameters with 224 bit subgroup using RFC5114 group2:
457 Output 2048 bit X9.42 DH parameters with 224 bit subgroup using FIP186-4 keygen:
463 Output 1024 bit X9.42 DH parameters with 160 bit subgroup using FIP186-2 keygen:
469 Output 2048 bit DH parameters:
474 Output 2048 bit DH parameters using a generator:
H A Dopenssl-verification-options.pod357 Enable the Suite B mode operation at 128 bit Level of Security, 128 bit or
358 192 bit, or only 192 bit Level of Security respectively.
573 keyCertSign bit set if the keyUsage extension is present.
592 digitalSignature bit set. The Netscape certificate type must be absent
593 or it must have the SSL client bit set.
614 be absent or the SSL CA bit must be set.
620 keyEncipherment bit set if the keyUsage extension is present. This isn't
628 S/MIME bit set. If the S/MIME bit is not set in the Netscape certificate type
630 This is because some Verisign certificates don't set the S/MIME bit.
635 the nonRepudiation bit must be set if the keyUsage extension is present.
[all …]
/openssl/crypto/ts/
H A Dts_rsp_print.c19 int bit; member
107 for (; a->bit >= 0; ++a) { in ts_status_map_print()
108 if (ASN1_BIT_STRING_get_bit(v, a->bit)) { in ts_status_map_print()
/openssl/include/crypto/
H A Driscv_arch.def13 * Each RISC-V capability ends up encoded as a single set bit in an array of
17 * and third argument as the index of the bit to be used to encode the
27 * RISCV_DEFINE_CAP(EXTENSION NAME, array index, bit index, hwprobe key, hwprobe value) */
H A Dbn_conf.h.in17 * both 32-bit and 64-bit builds are supported from a single run
/openssl/apps/
H A Drehash.c107 static void bit_set(unsigned char *set, unsigned int bit) in bit_set() argument
109 set[bit >> 3] |= 1 << (bit & 0x7); in bit_set()
112 static int bit_isset(unsigned char *set, unsigned int bit) in bit_isset() argument
114 return set[bit >> 3] & (1 << (bit & 0x7)); in bit_isset()

Completed in 96 milliseconds

12345678