Searched refs:half (Results 1 – 15 of 15) sorted by relevance
/openssl/test/ |
H A D | poly1305_internal_test.c | 1542 size_t half = inlen / 2; in test_poly1305() local 1545 Poly1305_Update(&poly1305, in, half); in test_poly1305() 1546 Poly1305_Update(&poly1305, in+half, inlen-half); in test_poly1305() 1554 for (half = 16; half < inlen; half += 16) { in test_poly1305() 1556 Poly1305_Update(&poly1305, in, half); in test_poly1305() 1557 Poly1305_Update(&poly1305, in+half, inlen-half); in test_poly1305() 1562 idx, half, inlen-half); in test_poly1305()
|
H A D | siphash_internal_test.c | 222 size_t half = inlen / 2; in test_siphash() local 227 SipHash_Update(&siphash, in, half); in test_siphash() 228 SipHash_Update(&siphash, in+half, inlen-half); in test_siphash() 237 for (half = 16; half < inlen; half += 16) { in test_siphash() 241 SipHash_Update(&siphash, in, half); in test_siphash() 242 SipHash_Update(&siphash, in+half, inlen-half); in test_siphash() 248 idx, half, inlen-half); in test_siphash()
|
/openssl/doc/man3/ |
H A D | BIO_s_bio.pod | 34 BIOs where data written to either half of the pair is buffered and can be read from 35 the other half. Both halves must usually by handled by the same application thread 39 one half of a BIO pair and have all the data processed by the chain under application 60 up any half of the pair will automatically destroy the association. 64 half of the pair will return any pending data or EOF when all pending data has 88 last read attempt at the other half of the BIO pair failed due to an 103 Both halves of a BIO pair should be freed. That is even if one half is implicit 104 freed due to a BIO_free_all() or SSL_free() call the other half needs to be freed. 108 on the other half of the pair and, if any data is pending, reading it and sending
|
H A D | BIO_s_dgram_pair.pod | 43 The BIO datagram pair allows each half of a pair to signal to the other half 56 Freeing either half of the pair will automatically destroy the association. 91 truncation mode for the given half of a BIO datagram pair. When no-truncate mode 119 other L<BIO_ctrl(3)> operation, on either half of a BIO datagram pair while any 120 other BIO call is also in progress to either half of the same BIO datagram pair 132 Each half of a BIO datagram pair can have capability flags set on it which 186 indicate that the application using that half of a BIO datagram pair promises to 188 that half of the BIO datagram pair. However, these capability flags do not
|
H A D | DES_random_key.pod | 271 first 12 bits will come from the 1st input byte and the low half of
|
/openssl/doc/HOWTO/ |
H A D | keys.txt | 7 come in pairs, with one half being the public key and the other half
|
/openssl/crypto/bn/asm/ |
H A D | co-586.pl | 211 local($b,$tot,$end,$half);
|
/openssl/doc/man7/ |
H A D | provider-keymgmt.pod | 215 to not compare the private half if it has compared the public half, 216 since a match of one half implies a match of the other half.
|
H A D | EVP_RAND.pod | 288 the (re-)seeding of the DRBG will fail. This corresponds to one and a half 289 times the security strength of the DRBG. The extra half is used for the
|
/openssl/crypto/sha/asm/ |
H A D | keccak1600-armv4.pl | 1616 my ($mnemonic,$half,$reg,$ea) = @_; 1619 if ($half eq "l") {
|
/openssl/doc/man1/ |
H A D | openssl-dgst.pod.in | 93 since the default values are set to only supply half of the maximum security
|
/openssl/crypto/aes/asm/ |
H A D | bsaes-armv8.pl | 1838 …mov v13.d[0], v11.d[1] // just in case AES_encrypt corrupts top half of callee-saved … 1877 …mov v13.d[0], v11.d[1] // just in case AES_encrypt corrupts top half of callee-saved …
|
/openssl/crypto/des/asm/ |
H A D | des_enc.m4 | 245 ! In each round one half (work) is modified based on key and the 246 ! other half (use). 251 ! One half has the bits for the sboxes in the following positions:
|
/openssl/include/openssl/ |
H A D | bio.h.in | 62 # define BIO_TYPE_BIO (19|BIO_TYPE_SOURCE_SINK)/* half a BIO pair */
|
/openssl/ |
H A D | CHANGES.md | 144 half the size necessary for full collision resistance supported by these 13650 * buffer_gets() could terminate with the buffer only half 15741 * Add a SSL_SESS_CACHE_NO_INTERNAL_STORE flag to take over half 16299 'md_local' value, not just the half used for PRNG output. 16306 to me that the half of 'md_local' used for chaining was the 16307 half from which PRNG output bytes were taken -- I had always 16308 assumed that the secret half would be used.) The second 17333 chaining variable. However, the output function chains only half
|
Completed in 95 milliseconds