Home
last modified time | relevance | path

Searched refs:from (Results 1 – 25 of 91) sorted by relevance

1234

/crypto/rsa/
A Drsa_crypt.cc45 const uint8_t *from, size_t from_len, in RSA_padding_add_PKCS1_OAEP_mgf1() argument
84 OPENSSL_memcpy(db + emlen - from_len - mdlen, from, from_len); in RSA_padding_add_PKCS1_OAEP_mgf1()
116 size_t max_out, const uint8_t *from, in RSA_padding_check_PKCS1_OAEP_mgf1() argument
147 const uint8_t *maskedseed = from + 1; in RSA_padding_check_PKCS1_OAEP_mgf1()
148 const uint8_t *maskeddb = from + 1 + mdlen; in RSA_padding_check_PKCS1_OAEP_mgf1()
172 bad |= ~constant_time_is_zero_w(from[0]); in RSA_padding_check_PKCS1_OAEP_mgf1()
239 OPENSSL_memcpy(to + to_len - from_len, from, from_len); in rsa_padding_add_PKCS1_type_2()
260 crypto_word_t first_byte_is_zero = constant_time_eq_w(from[0], 0); in rsa_padding_check_PKCS1_type_2()
261 crypto_word_t second_byte_is_two = constant_time_eq_w(from[1], 2); in rsa_padding_check_PKCS1_type_2()
265 crypto_word_t equals0 = constant_time_is_zero_w(from[i]); in rsa_padding_check_PKCS1_type_2()
[all …]
/crypto/conf/
A Dconf.cc176 len = strlen(from) + 1; in str_copy()
182 if (is_quote(*from)) { in str_copy()
183 q = *from; in str_copy()
184 from++; in str_copy()
185 while (*from != '\0' && *from != q) { in str_copy()
186 if (is_esc(*from)) { in str_copy()
187 from++; in str_copy()
194 if (*from == q) { in str_copy()
195 from++; in str_copy()
198 from++; in str_copy()
[all …]
/crypto/evp/
A Devp.cc104 int EVP_PKEY_copy_parameters(EVP_PKEY *to, const EVP_PKEY *from) { in EVP_PKEY_copy_parameters() argument
106 evp_pkey_set_method(to, from->ameth); in EVP_PKEY_copy_parameters()
107 } else if (EVP_PKEY_id(to) != EVP_PKEY_id(from)) { in EVP_PKEY_copy_parameters()
112 if (EVP_PKEY_missing_parameters(from)) { in EVP_PKEY_copy_parameters()
119 if (EVP_PKEY_cmp_parameters(to, from) == 1) { in EVP_PKEY_copy_parameters()
126 if (from->ameth && from->ameth->param_copy) { in EVP_PKEY_copy_parameters()
127 return from->ameth->param_copy(to, from); in EVP_PKEY_copy_parameters()
A Dp_dh_asn1.cc43 static int dh_param_copy(EVP_PKEY *to, const EVP_PKEY *from) { in dh_param_copy() argument
44 if (dh_param_missing(from)) { in dh_param_copy()
49 const DH *dh = reinterpret_cast<DH *>(from->pkey); in dh_param_copy()
A Dp_dsa_asn1.cc168 static int dsa_copy_parameters(EVP_PKEY *to, const EVP_PKEY *from) { in dsa_copy_parameters() argument
170 const DSA *from_dsa = reinterpret_cast<const DSA *>(from->pkey); in dsa_copy_parameters()
A Dp_ec_asn1.cc177 static int ec_copy_parameters(EVP_PKEY *to, const EVP_PKEY *from) { in ec_copy_parameters() argument
178 const EC_KEY *from_key = reinterpret_cast<const EC_KEY *>(from->pkey); in ec_copy_parameters()
/crypto/x509/
A Dx_name.cc383 unsigned char *to, *from; in asn1_string_canon() local
401 from = to; in asn1_string_canon()
408 while ((len > 0) && OPENSSL_isspace(*from)) { in asn1_string_canon()
409 from++; in asn1_string_canon()
413 to = from + len; in asn1_string_canon()
426 if (OPENSSL_isspace(*from)) { in asn1_string_canon()
433 from++; in asn1_string_canon()
435 } while (OPENSSL_isspace(*from)); in asn1_string_canon()
437 *to++ = OPENSSL_tolower(*from); in asn1_string_canon()
438 from++; in asn1_string_canon()
/crypto/fipsmodule/rsa/
A Dpadding.cc.inc33 const uint8_t *from, size_t from_len) {
49 OPENSSL_memcpy(to + to_len - from_len, from, from_len);
54 size_t max_out, const uint8_t *from,
64 if (from[0] != 0 || from[1] != 1) {
72 if (from[pad] == 0x00) {
76 if (from[pad] != 0xff) {
100 OPENSSL_memcpy(out, from + pad, from_len - pad);
105 int RSA_padding_add_none(uint8_t *to, size_t to_len, const uint8_t *from,
117 OPENSSL_memcpy(to, from, from_len);
227 // This step differs slightly from EMSA-PSS-VERIFY (RFC 8017) step 10 because
[all …]
A Dinternal.h109 const uint8_t *from, size_t from_len);
111 size_t max_out, const uint8_t *from,
113 int RSA_padding_add_none(uint8_t *to, size_t to_len, const uint8_t *from,
/crypto/fipsmodule/rand/
A Drand.cc.inc40 // available we don't need to worry about an RNG failure arising from fork()ing
44 // (We assume that the OS entropy is safe from fork()ing and VM duplication.
64 // last_block_valid is non-zero iff |last_block| contains data from
72 // last_block contains the previous block from |get_seed_entropy|.
184 // In passive entropy mode, entropy is supplied from outside of the module via
195 // obtained via a method other than from the kernel. In these cases entropy
196 // from the kernel is also provided via an additional input to the DRBG.
220 // get_seed_entropy fills |out_entropy_len| bytes of |out_entropy| from the
261 // No need to fill |state->last_block| with entropy from the read.
342 // don't reseed with it so, from the point of view of FIPS, this doesn't
[all …]
/crypto/cipher/test/
A Dcipher_tests.txt1 # RC4 tests (from rc4test)
95 # DES EDE3 CBC tests (from destest)
135 # AES 128 ECB tests (from FIPS-197 test vectors, encrypt)
147 # AES 256 ECB tests (from FIPS-197 test vectors, encrypt)
159 # AES tests from NIST document SP800-38A
272 # AES Counter test vectors from RFC 3686
329 # AES GCM test vectors from http://csrc.nist.gov/groups/ST/toolkit/BCM/documents/proposedmodes/gcm/…
589 # OFB tests from OpenSSL upstream.
687 # AES-192 CBC-mode test from upstream OpenSSL.
713 # AES-192-ECB tests from FIPS-197
[all …]
A Daes_128_ccm_matter_tests.txt1 # These test vectors were derived from those found in
4 # eight bytes of the tag is not equal to the tag from those vectors because CCM
/crypto/fipsmodule/
A DFIPS.md70 … (the primary interface for the rest of the system to get random data) takes its output from there.
74 …entropy are needed, *10n* bytes will be read from the entropy source and XORed down to *n* bytes. …
76 …hat the seed is taken from RDRAND, getrandom will also be queried with `GRND_NONBLOCK` to attempt …
82 … possible to state duplication from process forks and VM copies: for every call we read 32 bytes o…
104 The object files resulting from compiling (or assembling) those files is linked in partial-linking …
120 The most obvious cause of relocations are out-calls from the module to non-cryptographic functions …
126 In this diagram, the integrity check hashes from `module_start` to `module_end`. Since this does no…
152 …tegrity test, a constructor function within the module calculates an HMAC from `module_start` to `…
154 …incorrect. Another script (`inject_hash.go`) calculates the correct value from the assembled objec…
165 …rs, and we merge the assembly sources by appending them to the assembly output from the C compiler.
[all …]
/crypto/fipsmodule/aes/
A Daes_tests.txt1 # Test vectors from FIPS-197, Appendix C.
19 # Test vectors from
53 # Test vectors from https://tools.ietf.org/html/rfc5649#section-6
/crypto/fipsmodule/ec/
A Dutil.cc.inc54 // This representation from Booth's paper has since appeared in the
80 // integers from -16 to 16.
84 // to the wNAF): a direct computation obtains the recoded digit from the
109 // are applied from most significant to least significant, doubling between each
120 // above based on k's binary representation) from most to least significant. At
121 // iteration i (for i = ..., 3w, 2w, w, 0, starting from the most significant
155 // Note b_(i-1) is added in left-shifted by one (or doubled) from its place.
184 // such that k_H is the contribution from b_(l-1) .. b_w, k_M is the
185 // contribution from b_(w-1), and k_L is the contribution from b_(w-2) ... b_0.
/crypto/dh/
A Dparams.cc376 static int int_dh_param_copy(DH *to, const DH *from, int is_x942) { in int_dh_param_copy() argument
378 is_x942 = !!from->q; in int_dh_param_copy()
380 if (!int_dh_bn_cpy(&to->p, from->p) || in int_dh_param_copy()
381 !int_dh_bn_cpy(&to->g, from->g)) { in int_dh_param_copy()
389 if (!int_dh_bn_cpy(&to->q, from->q)) { in int_dh_param_copy()
/crypto/fipsmodule/bn/
A Dexponentiation.cc.inc36 // WARNING: This function implements Almost Montgomery Multiplication from
57 // WARNING: This function implements Almost Montgomery Multiplication from
114 // value returned from |BN_window_bits_for_exponent_size|.
117 // TABLE_BITS_SMALL is the smallest value returned from
552 // This optimization uses ideas from https://eprint.iacr.org/2011/239,
609 // Scan the exponent one window at a time starting from the most
636 // Read five bits from |bits-4| through |bits|, inclusive.
644 // Read five bits from |bits-4| through |bits|, inclusive.
660 // from Montgomery form with unreduced output, followed by an extra
698 // Scan the exponent one window at a time starting from the most
[all …]
A Dmontgomery.cc.inc59 BN_MONT_CTX *BN_MONT_CTX_copy(BN_MONT_CTX *to, const BN_MONT_CTX *from) {
60 if (to == from) {
64 if (!BN_copy(&to->RR, &from->RR) || !BN_copy(&to->N, &from->N)) {
68 to->n0[i] = from->n0[i];
295 // reduce from aRR to aR
A Dctx.cc.inc41 // used_ is the number of |BIGNUM|s from |bignums_| that have been used.
47 // error has been pushed to the queue yet. This is used to defer errors from
A Drsaz_exp.cc.inc68 // Convert |R2| from the usual radix, giving R = 2^1024, to RSAZ's radix,
132 // Convert from Montgomery.
/crypto/hmac/
A Dhmac_tests.txt8 # HMAC tests from RFC 2104
24 # HMAC tests from NIST test data
106 # Additional HMAC tests from OpenSSL.
/crypto/pem/
A Dpem_lib.cc449 const char *from; in load_iv() local
451 from = *fromp; in load_iv()
457 if (!OPENSSL_fromxdigit(&v, *from)) { in load_iv()
461 from++; in load_iv()
465 *fromp = from; in load_iv()
/crypto/asn1/
A Da_time.cc182 int ASN1_TIME_diff(int *out_days, int *out_seconds, const ASN1_TIME *from, in ASN1_TIME_diff() argument
185 if (!asn1_time_to_tm(&tm_from, from, /*allow_timezone_offset=*/1)) { in ASN1_TIME_diff()
A Dposix_time.cc224 int OPENSSL_gmtime_diff(int *out_days, int *out_secs, const struct tm *from, in OPENSSL_gmtime_diff() argument
228 !OPENSSL_tm_to_posix(from, &time_from)) { in OPENSSL_gmtime_diff()
/crypto/fipsmodule/dh/
A Ddh.cc.inc184 // from [1, min(2^N-1, q-1)].
197 // We set N from |dh->priv_length|. Section 5.6.1.1.4 of SP 800-56A Rev3
219 // Choose a private key uniformly from [1, M-1].
379 // This is the prime from https://tools.ietf.org/html/rfc7919#appendix-A.1,

Completed in 31 milliseconds

1234