Home
last modified time | relevance | path

Searched refs:j (Results 1 – 25 of 94) sorted by relevance

1234

/crypto/fipsmodule/sha/asm/
A Dsha1-armv8.pl91 eor @Xw[$j],@Xw[$j],@Xw[($j+2)&15]
95 eor @Xw[$j],@Xw[$j],@Xw[($j+8)&15]
99 eor @Xw[$j],@Xw[$j],@Xw[($j+13)&15]
103 ror @Xw[$j],@Xw[$j],#31
118 eor @Xw[$j],@Xw[$j],@Xw[($j+2)&15]
122 eor @Xw[$j],@Xw[$j],@Xw[($j+8)&15]
126 eor @Xw[$j],@Xw[$j],@Xw[($j+13)&15]
129 ror @Xw[$j],@Xw[$j],#31
142 eor @Xw[$j],@Xw[$j],@Xw[($j+2)&15]
146 eor @Xw[$j],@Xw[$j],@Xw[($j+8)&15]
[all …]
A Dsha512-586.pl384 for ($j=0;$j<2;$j++) { # 2x unroll
466 my $j;
519 for ($j=0;$j<8;$j++) {
520 &movdqa (&QWP(16*(($j-1)%4),$frame),@X[3]) if ($j>4); # off-load
523 &movdqu (@X[1],&QWP(16*($j+1),"edi")) if ($j<7); # next input
524 &movdqa (@X[1],&QWP(16*(($j+1)%4),$frame)) if ($j==7);# restore @X[0]
613 for(;$j<16;$j++) {
672 for ($j=0;$j<8;$j++) { # load next or same block
675 &movdqa (&QWP(16*(($j-1)%4),$frame),@X[3]) if ($j>4); # off-load
678 &movdqu (@X[1],&QWP(16*($j+1),"ebx")) if ($j<7); # next input
[all …]
A Dsha512-x86_64.pl882 my $j = shift;
1040 &movdqa (16*$j."(%rsp)",$t2);
1043 for ($i=0,$j=0; $j<4; $j++) {
1243 my $j = shift;
1259 for ($i=0,$j=0; $j<4; $j++) {
1351 my $j = shift;
1366 for ($i=0,$j=0; $j<8; $j++) {
1591 my $j = shift;
1609 for ($i=0,$j=0; $j<4; $j++) {
1686 my $j = shift;
[all …]
A Dsha512-armv8.pl92 my $j=($i+1)&15;
148 ror $T1,@X[($j+1)&15],#$sigma0[0]
150 ror $T2,@X[($j+14)&15],#$sigma1[0]
155 eor $T1,$T1,@X[($j+1)&15],ror#$sigma0[1]
162 eor $T2,$T2,@X[($j+14)&15],ror#$sigma1[1]
163 eor $T1,$T1,@X[($j+1)&15],lsr#$sigma0[2] // sigma0(X[i+1])
167 eor $T2,$T2,@X[($j+14)&15],lsr#$sigma1[2] // sigma1(X[i+14])
168 add @X[$j],@X[$j],@X[($j+9)&15]
172 add @X[$j],@X[$j],$T1
174 add @X[$j],@X[$j],$T2
/crypto/fipsmodule/bn/asm/
A Dx86_64-mont.pl157 xor $j,$j # j=0
173 lea 1($j),$j # j++
192 lea 1($j),$j # j++
219 xor $j,$j # j=0
237 lea 1($j),$j # j++
259 lea 1($j),$j # j++
398 xor $j,$j # j=0
425 lea 4($j),$j # j++
481 lea 4($j),$j # j++
535 xor $j,$j # j=0
[all …]
A Dx86-mont.pl55 $j="ecx";
158 &xor ($j,$j); # j=0
180 &inc ($j); # j++
196 &lea ($j,&DWP(1,$j));
197 &cmp ($j,$num);
218 &xor ($j,$j); # j=0
244 &inc ($j); # j++
264 &lea ($j,&DWP(1,$j)); # j++
267 &mov ($num,$j);
299 &mov ($j,$num); # j=num-1
[all …]
A Dx86_64-mont5.pl73 $j="%r15";
239 xor $j,$j # j=0
255 lea 1($j),$j # j++
274 lea 1($j),$j # j++
331 xor $j,$j # j=0
350 lea 1($j),$j # j++
372 lea 1($j),$j # j++
1012 adc $j,$j # $j is zero
1306 mov $num,$j # $j=$num
1405 lea 32($j),$j
[all …]
A Dco-586.pl164 for ($j=$bs; $j<$end; $j++)
166 &xor($c2,$c2) if ($j == $bs);
167 if (($j+1) == $end)
174 if (($j+1) != $end)
252 for ($j=$bs; $j<$end; $j++)
254 &xor($c2,$c2) if ($j == $bs);
/crypto/cipher/
A Dtls_cbc.cc102 for (size_t i = scan_start, j = 0; i < orig_len; i++, j++) { in EVP_tls_cbc_copy_mac() local
104 j -= md_size; in EVP_tls_cbc_copy_mac()
120 for (size_t i = 0, j = offset; i < md_size; i++, j++) { in EVP_tls_cbc_copy_mac() local
197 for (size_t j = block_start; j < SHA_CBLOCK; j++) { in EVP_sha1_final_with_secret_suffix() local
214 for (size_t j = 0; j < 4; j++) { in EVP_sha1_final_with_secret_suffix() local
220 for (size_t j = 0; j < 5; j++) { in EVP_sha1_final_with_secret_suffix() local
221 result[j] |= is_last_block & ctx->h[j]; in EVP_sha1_final_with_secret_suffix()
290 for (size_t j = block_start; j < SHA256_CBLOCK; j++) { in EVP_sha256_final_with_secret_suffix() local
307 for (size_t j = 0; j < 4; j++) { in EVP_sha256_final_with_secret_suffix() local
313 for (size_t j = 0; j < 8; j++) { in EVP_sha256_final_with_secret_suffix() local
[all …]
/crypto/fipsmodule/keccak/
A Dkeccak_test.cc239 for (size_t j = 0; j < sizeof(input); j++) { in TEST() local
240 for (size_t i = 0; i < j; i++) { in TEST()
244 BORINGSSL_keccak_absorb(&ctx, &input[i], j - i); in TEST()
245 BORINGSSL_keccak_absorb(&ctx, &input[j], sizeof(input) - j); in TEST()
251 for (size_t j = 0; j < sizeof(input); j++) { in TEST() local
252 for (size_t i = 0; i < j; i++) { in TEST()
257 BORINGSSL_keccak_absorb(&ctx, &input[j], sizeof(input) - j); in TEST()
264 for (size_t j = 0; j < sizeof(shake128_output); j++) { in TEST() local
265 for (size_t i = 0; i < j; i++) { in TEST()
277 for (size_t j = 0; j < sizeof(shake256_output); j++) { in TEST() local
[all …]
/crypto/fipsmodule/ec/
A Dsimple_mul.cc.inc34 for (size_t j = 2; j < OPENSSL_ARRAY_SIZE(precomp); j++) {
35 if (j & 1) {
38 ec_GFp_mont_dbl(group, &precomp[j], &precomp[j / 2]);
61 for (size_t j = 0; j < OPENSSL_ARRAY_SIZE(precomp); j++) {
89 for (size_t j = 2; j < num; j++) {
93 ec_GFp_mont_dbl(group, &out[j], &out[j / 2]);
116 for (size_t j = 0; j < 17; j++) {
193 for (unsigned j = 1; j < stride; j++) {
198 for (unsigned j = 1; j < bit; j++) {
219 for (unsigned j = 0; j < EC_MONT_PRECOMP_COMB_SIZE; j++) {
[all …]
A Dmake_tables.go310 for j := 0; j < shift; j++ {
333 for j := 0; j < shift; j++ {
340 for j := 0; j < stride; j++ {
346 for j := 1; j < 1<<i; j++ {
347 x, y = curve.Add(ret[1<<i-1][0], ret[1<<i-1][1], ret[j-1][0], ret[j-1][1])
348 ret[1<<i+j-1] = [2]*big.Int{x, y}
/crypto/chacha/asm/
A Dchacha-armv4.pl486 add @x[$j+1],@x[$j+1],@t[1]
487 add @x[$j+2],@x[$j+2],@t[2]
496 add @x[$j+3],@x[$j+3],@t[3]
506 eor @x[$j+1],@t[1],@x[$j+1]
512 eor @x[$j+2],@t[2],@x[$j+2]
514 eor @x[$j+3],@t[3],@x[$j+3]
521 eor @x[$j+0],@t[0],@x[$j+0],lsr#8
523 eor @x[$j+1],@t[1],@x[$j+1],lsr#8
530 eor @x[$j+2],@t[2],@x[$j+2],lsr#8
532 eor @x[$j+3],@t[3],@x[$j+3],lsr#8
[all …]
/crypto/x509/
A Dx509_obj.cc35 int n, lold, l, l1, l2, num, j, type; in X509_NAME_oneline() local
86 for (j = 0; j < num; j++) { in X509_NAME_oneline()
87 if (q[j] != 0) { in X509_NAME_oneline()
88 gs_doit[j & 3] = 1; in X509_NAME_oneline()
102 for (l2 = j = 0; j < num; j++) { in X509_NAME_oneline()
103 if (!gs_doit[j & 3]) { in X509_NAME_oneline()
107 if ((q[j] < ' ') || (q[j] > '~')) { in X509_NAME_oneline()
135 for (j = 0; j < num; j++) { in X509_NAME_oneline()
136 if (!gs_doit[j & 3]) { in X509_NAME_oneline()
139 n = q[j]; in X509_NAME_oneline()
A Dv3_purp.cc162 int j; in setup_crldp() local
165 if (x->crldp == NULL && j != -1) { in setup_crldp()
181 int j; in x509v3_cache_extensions() local
227 } else if (j != -1) { in x509v3_cache_extensions()
243 } else if (j != -1) { in x509v3_cache_extensions()
291 } else if (j != -1) { in x509v3_cache_extensions()
297 if (x->skid == NULL && j != -1) { in x509v3_cache_extensions()
302 if (x->akid == NULL && j != -1) { in x509v3_cache_extensions()
316 if (x->altname == NULL && j != -1) { in x509v3_cache_extensions()
321 if (x->nc == NULL && j != -1) { in x509v3_cache_extensions()
[all …]
A Dt_x509a.cc29 int j; in X509_CERT_AUX_print() local
73 for (j = 0; j < aux->keyid->length; j++) { in X509_CERT_AUX_print()
74 BIO_printf(out, "%s%02X", j ? ":" : "", aux->keyid->data[j]); in X509_CERT_AUX_print()
/crypto/fipsmodule/aes/
A Daes_nohw.cc.inc906 for (size_t j = 0; j < AES_NOHW_BATCH_SIZE; j++) {
951 for (size_t j = 0; j < AES_NOHW_BLOCK_WORDS; j++) {
953 block[j] = aes_nohw_xor(block[j], aes_nohw_rcon_slice(rcon, j));
993 for (size_t j = 0; j < AES_NOHW_BLOCK_WORDS; j++) {
1018 block1[j] = aes_nohw_or(block1[j], aes_nohw_shift_left(block2[j], 8));
1035 for (size_t j = 0; j < AES_NOHW_BLOCK_WORDS; j++) {
1040 block2[j] = aes_nohw_or(block2[j], aes_nohw_shift_left(block1[j], 8));
1043 block2[j] = aes_nohw_xor(block2[j], aes_nohw_rcon_slice(rcon, j));
1089 for (size_t j = 0; j < AES_NOHW_BLOCK_WORDS; j++) {
1091 block1[j] = aes_nohw_xor(block1[j], aes_nohw_rcon_slice(rcon, j));
[all …]
/crypto/kyber/
A Dkyber.cc179 for (int j = k; j < k + offset; j++) { in scalar_ntt() local
210 for (int j = k; j < k + offset; j++) { in scalar_inverse_ntt() local
271 for (int j = 0; j < RANK; j++) { in matrix_mult() local
273 scalar_mult(&product, &m->v[i][j], &a->v[j]); in matrix_mult()
283 for (int j = 0; j < RANK; j++) { in matrix_mult_transpose() local
285 scalar_mult(&product, &m->v[j][i], &a->v[j]); in matrix_mult_transpose()
378 for (int j = 0; j < RANK; j++) { in matrix_expand() local
380 input[33] = j; in matrix_expand()
431 for (int j = 0; j < 8; j++) { in scalar_encode_1() local
432 out_byte |= (s->c[i + j] & 1) << j; in scalar_encode_1()
[all …]
/crypto/bn/
A Dconvert.cc59 for (int j = BN_BITS2 - 8; j >= 0; j -= 8) { in BN_bn2hex() local
61 int v = ((int)(bn->d[i] >> (long)j)) & 0xff; in BN_bn2hex()
94 int j; in decode_hex() local
95 for (j = todo; j > 0; j--) { in decode_hex()
114 int i, j; in decode_dec() local
118 j = BN_DEC_NUM - (in_len % BN_DEC_NUM); in decode_dec()
119 if (j == BN_DEC_NUM) { in decode_dec()
120 j = 0; in decode_dec()
126 if (++j == BN_DEC_NUM) { in decode_dec()
131 j = 0; in decode_dec()
[all …]
/crypto/fipsmodule/slhdsa/
A Dmerkle.cc.inc61 for (size_t j = 0; j < SLHDSA_SHA2_128S_TREE_HEIGHT; ++j) {
62 unsigned int k = (idx >> j) ^ 1;
63 slhdsa_treehash(sig + SLHDSA_SHA2_128S_WOTS_BYTES + j * BCM_SLHDSA_SHA2_128S_N,
64 sk_seed, k, j, pk_seed, addr);
125 for (size_t j = 1; j < SLHDSA_SHA2_128S_D; ++j) {
128 slhdsa_set_layer_addr(addr, j);
131 if (j < (SLHDSA_SHA2_128S_D - 1)) {
151 for (size_t j = 1; j < SLHDSA_SHA2_128S_D; ++j) {
154 slhdsa_set_layer_addr(addr, j);
157 slhdsa_xmss_pk_from_sig(node, sig + j * SLHDSA_SHA2_128S_XMSS_BYTES,
A Dfors.cc.inc103 for (size_t j = 0; j < SLHDSA_SHA2_128S_FORS_HEIGHT; ++j) {
104 size_t s = (indices[i] / (1 << j)) ^ 1;
108 (i * (SLHDSA_SHA2_128S_FORS_HEIGHT + 1) + j + 1),
109 sk_seed, i * (1ULL << (SLHDSA_SHA2_128S_FORS_HEIGHT - j)) + s, j,
143 for (size_t j = 0; j < SLHDSA_SHA2_128S_FORS_HEIGHT; ++j) {
144 slhdsa_set_tree_height(addr, j + 1);
147 if (((indices[i] / (1 << j)) % 2) == 0) {
150 OPENSSL_memcpy(tmp + BCM_SLHDSA_SHA2_128S_N, auth + j * BCM_SLHDSA_SHA2_128S_N,
155 OPENSSL_memcpy(tmp, auth + j * BCM_SLHDSA_SHA2_128S_N, BCM_SLHDSA_SHA2_128S_N);
/crypto/rand/
A Drand_test.cc159 for (size_t j = 0; j < i; j++) { in TEST() local
160 EXPECT_NE(Bytes(bufs[i]), Bytes(bufs[j])) in TEST()
161 << "buffers " << i << " and " << j << " matched"; in TEST()
185 for (size_t j = i + 1; j < num_threads; j++) { in RunConcurrentRands() local
186 EXPECT_NE(Bytes(bufs[i]), Bytes(bufs[j])); in RunConcurrentRands()
/crypto/fipsmodule/bn/test/
A Dmiller_rabin_tests.txt16 # # - b^(m*2^j) != -1 (mod w), for 0 <= j < a
21 # for j in range(a):
76 # Some b^(m*2^j) = w-1
81 # Some b^(m*2^j) = w-1
86 # Some b^(m*2^j) = w-1
217 # Some b^(m*2^j) = w-1
222 # Some b^(m*2^j) = w-1
227 # Some b^(m*2^j) = w-1
232 # Some b^(m*2^j) = w-1
247 # Some b^(m*2^j) = w-1
[all …]
/crypto/cipher/asm/
A Daes128gcmsiv-x86_64.pl591 my ($i, $j) = @_;
603 my ($i, $j) = @_;
667 my ($i, $j) = @_;
670 vaesenc $j, $BLOCK1, $BLOCK1
671 vaesenc $j, $BLOCK2, $BLOCK2
672 vaesenc $j, $BLOCK3, $BLOCK3
673 vaesenc $j, $BLOCK4, $BLOCK4
678 my ($i, $j) = @_;
1630 my ($i, $j) = @_;
2186 my ($i, $j) = @_;
[all …]
/crypto/pem/
A Dpem_lib.cc244 int dsize = 0, i, j, ret = 0; in PEM_ASN1_write_bio() local
315 i += j; in PEM_ASN1_write_bio()
338 int i = 0, j, o, pass_len; in PEM_do_header() local
365 j = (int)len; in PEM_do_header()
371 o = EVP_DecryptFinal_ex(ctx.get(), &(data[i]), &j); in PEM_do_header()
379 j += i; in PEM_do_header()
380 *plen = j; in PEM_do_header()
483 int nlen, n, i, j, outl; in PEM_write_bio() local
510 i = j = 0; in PEM_write_bio()
513 EVP_EncodeUpdate(&ctx, buf, &outl, &(data[j]), n); in PEM_write_bio()
[all …]

Completed in 805 milliseconds

1234