/crypto/rsa/ |
A D | rsa_crypt.cc | 45 const uint8_t *from, size_t from_len, in RSA_padding_add_PKCS1_OAEP_mgf1() argument 84 OPENSSL_memcpy(db + emlen - from_len - mdlen, from, from_len); in RSA_padding_add_PKCS1_OAEP_mgf1() 116 size_t max_out, const uint8_t *from, in RSA_padding_check_PKCS1_OAEP_mgf1() argument 147 const uint8_t *maskedseed = from + 1; in RSA_padding_check_PKCS1_OAEP_mgf1() 148 const uint8_t *maskeddb = from + 1 + mdlen; in RSA_padding_check_PKCS1_OAEP_mgf1() 172 bad |= ~constant_time_is_zero_w(from[0]); in RSA_padding_check_PKCS1_OAEP_mgf1() 239 OPENSSL_memcpy(to + to_len - from_len, from, from_len); in rsa_padding_add_PKCS1_type_2() 260 crypto_word_t first_byte_is_zero = constant_time_eq_w(from[0], 0); in rsa_padding_check_PKCS1_type_2() 261 crypto_word_t second_byte_is_two = constant_time_eq_w(from[1], 2); in rsa_padding_check_PKCS1_type_2() 265 crypto_word_t equals0 = constant_time_is_zero_w(from[i]); in rsa_padding_check_PKCS1_type_2() [all …]
|
/crypto/conf/ |
A D | conf.cc | 176 len = strlen(from) + 1; in str_copy() 182 if (is_quote(*from)) { in str_copy() 183 q = *from; in str_copy() 184 from++; in str_copy() 185 while (*from != '\0' && *from != q) { in str_copy() 186 if (is_esc(*from)) { in str_copy() 187 from++; in str_copy() 194 if (*from == q) { in str_copy() 195 from++; in str_copy() 198 from++; in str_copy() [all …]
|
/crypto/evp/ |
A D | evp.cc | 104 int EVP_PKEY_copy_parameters(EVP_PKEY *to, const EVP_PKEY *from) { in EVP_PKEY_copy_parameters() argument 106 evp_pkey_set_method(to, from->ameth); in EVP_PKEY_copy_parameters() 107 } else if (EVP_PKEY_id(to) != EVP_PKEY_id(from)) { in EVP_PKEY_copy_parameters() 112 if (EVP_PKEY_missing_parameters(from)) { in EVP_PKEY_copy_parameters() 119 if (EVP_PKEY_cmp_parameters(to, from) == 1) { in EVP_PKEY_copy_parameters() 126 if (from->ameth && from->ameth->param_copy) { in EVP_PKEY_copy_parameters() 127 return from->ameth->param_copy(to, from); in EVP_PKEY_copy_parameters()
|
A D | p_dh_asn1.cc | 43 static int dh_param_copy(EVP_PKEY *to, const EVP_PKEY *from) { in dh_param_copy() argument 44 if (dh_param_missing(from)) { in dh_param_copy() 49 const DH *dh = reinterpret_cast<DH *>(from->pkey); in dh_param_copy()
|
A D | p_dsa_asn1.cc | 168 static int dsa_copy_parameters(EVP_PKEY *to, const EVP_PKEY *from) { in dsa_copy_parameters() argument 170 const DSA *from_dsa = reinterpret_cast<const DSA *>(from->pkey); in dsa_copy_parameters()
|
A D | p_ec_asn1.cc | 177 static int ec_copy_parameters(EVP_PKEY *to, const EVP_PKEY *from) { in ec_copy_parameters() argument 178 const EC_KEY *from_key = reinterpret_cast<const EC_KEY *>(from->pkey); in ec_copy_parameters()
|
/crypto/x509/ |
A D | x_name.cc | 383 unsigned char *to, *from; in asn1_string_canon() local 401 from = to; in asn1_string_canon() 408 while ((len > 0) && OPENSSL_isspace(*from)) { in asn1_string_canon() 409 from++; in asn1_string_canon() 413 to = from + len; in asn1_string_canon() 426 if (OPENSSL_isspace(*from)) { in asn1_string_canon() 433 from++; in asn1_string_canon() 435 } while (OPENSSL_isspace(*from)); in asn1_string_canon() 437 *to++ = OPENSSL_tolower(*from); in asn1_string_canon() 438 from++; in asn1_string_canon()
|
/crypto/fipsmodule/rsa/ |
A D | padding.cc.inc | 33 const uint8_t *from, size_t from_len) { 49 OPENSSL_memcpy(to + to_len - from_len, from, from_len); 54 size_t max_out, const uint8_t *from, 64 if (from[0] != 0 || from[1] != 1) { 72 if (from[pad] == 0x00) { 76 if (from[pad] != 0xff) { 100 OPENSSL_memcpy(out, from + pad, from_len - pad); 105 int RSA_padding_add_none(uint8_t *to, size_t to_len, const uint8_t *from, 117 OPENSSL_memcpy(to, from, from_len); 227 // This step differs slightly from EMSA-PSS-VERIFY (RFC 8017) step 10 because [all …]
|
A D | internal.h | 109 const uint8_t *from, size_t from_len); 111 size_t max_out, const uint8_t *from, 113 int RSA_padding_add_none(uint8_t *to, size_t to_len, const uint8_t *from,
|
/crypto/fipsmodule/rand/ |
A D | rand.cc.inc | 40 // available we don't need to worry about an RNG failure arising from fork()ing 44 // (We assume that the OS entropy is safe from fork()ing and VM duplication. 64 // last_block_valid is non-zero iff |last_block| contains data from 72 // last_block contains the previous block from |get_seed_entropy|. 184 // In passive entropy mode, entropy is supplied from outside of the module via 195 // obtained via a method other than from the kernel. In these cases entropy 196 // from the kernel is also provided via an additional input to the DRBG. 220 // get_seed_entropy fills |out_entropy_len| bytes of |out_entropy| from the 261 // No need to fill |state->last_block| with entropy from the read. 342 // don't reseed with it so, from the point of view of FIPS, this doesn't [all …]
|
/crypto/cipher/test/ |
A D | cipher_tests.txt | 1 # RC4 tests (from rc4test) 95 # DES EDE3 CBC tests (from destest) 135 # AES 128 ECB tests (from FIPS-197 test vectors, encrypt) 147 # AES 256 ECB tests (from FIPS-197 test vectors, encrypt) 159 # AES tests from NIST document SP800-38A 272 # AES Counter test vectors from RFC 3686 329 # AES GCM test vectors from http://csrc.nist.gov/groups/ST/toolkit/BCM/documents/proposedmodes/gcm/… 589 # OFB tests from OpenSSL upstream. 687 # AES-192 CBC-mode test from upstream OpenSSL. 713 # AES-192-ECB tests from FIPS-197 [all …]
|
A D | aes_128_ccm_matter_tests.txt | 1 # These test vectors were derived from those found in 4 # eight bytes of the tag is not equal to the tag from those vectors because CCM
|
/crypto/fipsmodule/ |
A D | FIPS.md | 70 … (the primary interface for the rest of the system to get random data) takes its output from there. 74 …entropy are needed, *10n* bytes will be read from the entropy source and XORed down to *n* bytes. … 76 …hat the seed is taken from RDRAND, getrandom will also be queried with `GRND_NONBLOCK` to attempt … 82 … possible to state duplication from process forks and VM copies: for every call we read 32 bytes o… 104 The object files resulting from compiling (or assembling) those files is linked in partial-linking … 120 The most obvious cause of relocations are out-calls from the module to non-cryptographic functions … 126 In this diagram, the integrity check hashes from `module_start` to `module_end`. Since this does no… 152 …tegrity test, a constructor function within the module calculates an HMAC from `module_start` to `… 154 …incorrect. Another script (`inject_hash.go`) calculates the correct value from the assembled objec… 165 …rs, and we merge the assembly sources by appending them to the assembly output from the C compiler. [all …]
|
/crypto/fipsmodule/aes/ |
A D | aes_tests.txt | 1 # Test vectors from FIPS-197, Appendix C. 19 # Test vectors from 53 # Test vectors from https://tools.ietf.org/html/rfc5649#section-6
|
/crypto/fipsmodule/ec/ |
A D | util.cc.inc | 54 // This representation from Booth's paper has since appeared in the 80 // integers from -16 to 16. 84 // to the wNAF): a direct computation obtains the recoded digit from the 109 // are applied from most significant to least significant, doubling between each 120 // above based on k's binary representation) from most to least significant. At 121 // iteration i (for i = ..., 3w, 2w, w, 0, starting from the most significant 155 // Note b_(i-1) is added in left-shifted by one (or doubled) from its place. 184 // such that k_H is the contribution from b_(l-1) .. b_w, k_M is the 185 // contribution from b_(w-1), and k_L is the contribution from b_(w-2) ... b_0.
|
/crypto/dh/ |
A D | params.cc | 376 static int int_dh_param_copy(DH *to, const DH *from, int is_x942) { in int_dh_param_copy() argument 378 is_x942 = !!from->q; in int_dh_param_copy() 380 if (!int_dh_bn_cpy(&to->p, from->p) || in int_dh_param_copy() 381 !int_dh_bn_cpy(&to->g, from->g)) { in int_dh_param_copy() 389 if (!int_dh_bn_cpy(&to->q, from->q)) { in int_dh_param_copy()
|
/crypto/fipsmodule/bn/ |
A D | exponentiation.cc.inc | 36 // WARNING: This function implements Almost Montgomery Multiplication from 57 // WARNING: This function implements Almost Montgomery Multiplication from 114 // value returned from |BN_window_bits_for_exponent_size|. 117 // TABLE_BITS_SMALL is the smallest value returned from 552 // This optimization uses ideas from https://eprint.iacr.org/2011/239, 609 // Scan the exponent one window at a time starting from the most 636 // Read five bits from |bits-4| through |bits|, inclusive. 644 // Read five bits from |bits-4| through |bits|, inclusive. 660 // from Montgomery form with unreduced output, followed by an extra 698 // Scan the exponent one window at a time starting from the most [all …]
|
A D | montgomery.cc.inc | 59 BN_MONT_CTX *BN_MONT_CTX_copy(BN_MONT_CTX *to, const BN_MONT_CTX *from) { 60 if (to == from) { 64 if (!BN_copy(&to->RR, &from->RR) || !BN_copy(&to->N, &from->N)) { 68 to->n0[i] = from->n0[i]; 295 // reduce from aRR to aR
|
A D | ctx.cc.inc | 41 // used_ is the number of |BIGNUM|s from |bignums_| that have been used. 47 // error has been pushed to the queue yet. This is used to defer errors from
|
A D | rsaz_exp.cc.inc | 68 // Convert |R2| from the usual radix, giving R = 2^1024, to RSAZ's radix, 132 // Convert from Montgomery.
|
/crypto/hmac/ |
A D | hmac_tests.txt | 8 # HMAC tests from RFC 2104 24 # HMAC tests from NIST test data 106 # Additional HMAC tests from OpenSSL.
|
/crypto/pem/ |
A D | pem_lib.cc | 449 const char *from; in load_iv() local 451 from = *fromp; in load_iv() 457 if (!OPENSSL_fromxdigit(&v, *from)) { in load_iv() 461 from++; in load_iv() 465 *fromp = from; in load_iv()
|
/crypto/asn1/ |
A D | a_time.cc | 182 int ASN1_TIME_diff(int *out_days, int *out_seconds, const ASN1_TIME *from, in ASN1_TIME_diff() argument 185 if (!asn1_time_to_tm(&tm_from, from, /*allow_timezone_offset=*/1)) { in ASN1_TIME_diff()
|
A D | posix_time.cc | 224 int OPENSSL_gmtime_diff(int *out_days, int *out_secs, const struct tm *from, in OPENSSL_gmtime_diff() argument 228 !OPENSSL_tm_to_posix(from, &time_from)) { in OPENSSL_gmtime_diff()
|
/crypto/fipsmodule/dh/ |
A D | dh.cc.inc | 184 // from [1, min(2^N-1, q-1)]. 197 // We set N from |dh->priv_length|. Section 5.6.1.1.4 of SP 800-56A Rev3 219 // Choose a private key uniformly from [1, M-1]. 379 // This is the prime from https://tools.ietf.org/html/rfc7919#appendix-A.1,
|