Home
last modified time | relevance | path

Searched refs:power (Results 1 – 14 of 14) sorted by relevance

/openssl/doc/man3/
H A DBN_mod_exp_mont.pod28 BN_mod_exp_mont() computes I<a> to the I<p>-th power modulo I<m> (C<rr=a^p % m>)
33 BN_mod_exp_mont_consttime() computes I<a> to the I<p>-th power modulo I<m>
41 the I<p1>-th power modulo I<m1> (C<rr1=a1^p1 % m1>) and I<a2> to the I<p2>-th
42 power modulo I<m2> (C<rr2=a2^p2 % m2>) using Montgomery multiplication. For some
H A DBN_add.pod98 BN_exp() raises I<a> to the I<p>-th power and places the result in I<r>
102 BN_mod_exp() computes I<a> to the I<p>-th power modulo I<m> (C<r=a^p %
H A DOPENSSL_secure_malloc.pod57 Both C<size> and, if specified, C<minsize> must be a power of two and
H A DOPENSSL_malloc.pod106 needs. Note, the alignment value must be a power of 2, and the size
H A DOPENSSL_LH_COMPFUNC.pod102 normally truncated to a power of 2, so make sure that your hash
/openssl/crypto/ec/curve448/
H A Dcurve448.c510 int power, addend; member
567 control[position].power = -1; in recode_wnaf()
600 control[position].power = pos + 16 * (w - 1); in recode_wnaf()
662 i = control_var[0].power; in ossl_curve448_base_double_scalarmul_non_secret()
668 if (i > control_pre[0].power) { in ossl_curve448_base_double_scalarmul_non_secret()
671 } else if (i == control_pre[0].power && i >= 0) { in ossl_curve448_base_double_scalarmul_non_secret()
679 i = control_pre[0].power; in ossl_curve448_base_double_scalarmul_non_secret()
685 int cv = (i == control_var[contv].power); in ossl_curve448_base_double_scalarmul_non_secret()
686 int cp = (i == control_pre[contp].power); in ossl_curve448_base_double_scalarmul_non_secret()
/openssl/crypto/bn/
H A Drsaz_exp.c246 BN_ULONG k, const void *tbl, unsigned int power);
248 const void *n, BN_ULONG k, unsigned int power);
252 void rsaz_512_scatter4(void *tbl, const BN_ULONG *val, int power);
253 void rsaz_512_gather4(BN_ULONG *val, const void *tbl, int power);
H A Dbn_exp.c789 int power, int bits); in BN_mod_exp_mont_consttime()
792 int power, int bits); in BN_mod_exp_mont_consttime()
795 int power, int bits); in BN_mod_exp_mont_consttime()
798 int power, int bits); in BN_mod_exp_mont_consttime()
801 int power, int bits); in BN_mod_exp_mont_consttime()
836 const BN_ULONG *n0, int num, int power); in BN_mod_exp_mont_consttime()
838 void *table, size_t power); in BN_mod_exp_mont_consttime()
840 void *table, size_t power); in BN_mod_exp_mont_consttime()
945 const BN_ULONG *n0, int num, int power); in BN_mod_exp_mont_consttime()
947 void *table, size_t power); in BN_mod_exp_mont_consttime()
[all …]
H A DREADME.pod168 word arrays B<r> and B<t>. B<n2> must be a power of 2. It computes
/openssl/crypto/bn/asm/
H A Drsaz-avx2.pl1575 my ($out,$inp,$power) = $win64 ? ("%rcx","%rdx","%r8d") : ("%rdi","%rsi","%edx");
1585 shl \$4,$power
1586 lea ($out,$power),$out
1636 vmovd $power, %xmm4
1683 mov \$9,$power
1732 dec $power
H A Drsaz-x86_64.pl963 pshufd \$0,%xmm8,%xmm8 # broadcast $power
2127 my ($out,$inp,$power)= $win64 ? ("%rcx","%rdx","%r8d") : ("%rdi","%rsi","%edx");
2134 leaq ($out,$power,8), $out
2170 movd $power,%xmm8
2174 pshufd \$0,%xmm8,%xmm8 # broadcast $power
/openssl/test/recipes/30-test_evp_data/
H A Devpmac_poly1305.txt167 # 4th power of the key spills to 131th bit in SIMD key setup
/openssl/doc/man7/
H A DEVP_KDF-SCRYPT.pod20 has to be a positive power of two, is the general work factor and scales CPU
/openssl/
H A DLICENSE.txt19 "control" means (i) the power, direct or indirect, to cause the

Completed in 38 milliseconds