/crypto/fipsmodule/sha/asm/ |
A D | sha1-armv8.pl | 91 eor @Xw[$j],@Xw[$j],@Xw[($j+2)&15] 95 eor @Xw[$j],@Xw[$j],@Xw[($j+8)&15] 99 eor @Xw[$j],@Xw[$j],@Xw[($j+13)&15] 103 ror @Xw[$j],@Xw[$j],#31 118 eor @Xw[$j],@Xw[$j],@Xw[($j+2)&15] 122 eor @Xw[$j],@Xw[$j],@Xw[($j+8)&15] 126 eor @Xw[$j],@Xw[$j],@Xw[($j+13)&15] 129 ror @Xw[$j],@Xw[$j],#31 142 eor @Xw[$j],@Xw[$j],@Xw[($j+2)&15] 146 eor @Xw[$j],@Xw[$j],@Xw[($j+8)&15] [all …]
|
A D | sha512-586.pl | 384 for ($j=0;$j<2;$j++) { # 2x unroll 466 my $j; 519 for ($j=0;$j<8;$j++) { 520 &movdqa (&QWP(16*(($j-1)%4),$frame),@X[3]) if ($j>4); # off-load 523 &movdqu (@X[1],&QWP(16*($j+1),"edi")) if ($j<7); # next input 524 &movdqa (@X[1],&QWP(16*(($j+1)%4),$frame)) if ($j==7);# restore @X[0] 613 for(;$j<16;$j++) { 672 for ($j=0;$j<8;$j++) { # load next or same block 675 &movdqa (&QWP(16*(($j-1)%4),$frame),@X[3]) if ($j>4); # off-load 678 &movdqu (@X[1],&QWP(16*($j+1),"ebx")) if ($j<7); # next input [all …]
|
A D | sha512-x86_64.pl | 882 my $j = shift; 1040 &movdqa (16*$j."(%rsp)",$t2); 1043 for ($i=0,$j=0; $j<4; $j++) { 1243 my $j = shift; 1259 for ($i=0,$j=0; $j<4; $j++) { 1351 my $j = shift; 1366 for ($i=0,$j=0; $j<8; $j++) { 1591 my $j = shift; 1609 for ($i=0,$j=0; $j<4; $j++) { 1686 my $j = shift; [all …]
|
A D | sha512-armv8.pl | 92 my $j=($i+1)&15; 148 ror $T1,@X[($j+1)&15],#$sigma0[0] 150 ror $T2,@X[($j+14)&15],#$sigma1[0] 155 eor $T1,$T1,@X[($j+1)&15],ror#$sigma0[1] 162 eor $T2,$T2,@X[($j+14)&15],ror#$sigma1[1] 163 eor $T1,$T1,@X[($j+1)&15],lsr#$sigma0[2] // sigma0(X[i+1]) 167 eor $T2,$T2,@X[($j+14)&15],lsr#$sigma1[2] // sigma1(X[i+14]) 168 add @X[$j],@X[$j],@X[($j+9)&15] 172 add @X[$j],@X[$j],$T1 174 add @X[$j],@X[$j],$T2
|
/crypto/fipsmodule/bn/asm/ |
A D | x86_64-mont.pl | 157 xor $j,$j # j=0 173 lea 1($j),$j # j++ 192 lea 1($j),$j # j++ 219 xor $j,$j # j=0 237 lea 1($j),$j # j++ 259 lea 1($j),$j # j++ 398 xor $j,$j # j=0 425 lea 4($j),$j # j++ 481 lea 4($j),$j # j++ 535 xor $j,$j # j=0 [all …]
|
A D | x86-mont.pl | 55 $j="ecx"; 158 &xor ($j,$j); # j=0 180 &inc ($j); # j++ 196 &lea ($j,&DWP(1,$j)); 197 &cmp ($j,$num); 218 &xor ($j,$j); # j=0 244 &inc ($j); # j++ 264 &lea ($j,&DWP(1,$j)); # j++ 267 &mov ($num,$j); 299 &mov ($j,$num); # j=num-1 [all …]
|
A D | x86_64-mont5.pl | 73 $j="%r15"; 239 xor $j,$j # j=0 255 lea 1($j),$j # j++ 274 lea 1($j),$j # j++ 331 xor $j,$j # j=0 350 lea 1($j),$j # j++ 372 lea 1($j),$j # j++ 1012 adc $j,$j # $j is zero 1306 mov $num,$j # $j=$num 1405 lea 32($j),$j [all …]
|
A D | co-586.pl | 164 for ($j=$bs; $j<$end; $j++) 166 &xor($c2,$c2) if ($j == $bs); 167 if (($j+1) == $end) 174 if (($j+1) != $end) 252 for ($j=$bs; $j<$end; $j++) 254 &xor($c2,$c2) if ($j == $bs);
|
/crypto/cipher/ |
A D | tls_cbc.cc | 102 for (size_t i = scan_start, j = 0; i < orig_len; i++, j++) { in EVP_tls_cbc_copy_mac() local 104 j -= md_size; in EVP_tls_cbc_copy_mac() 120 for (size_t i = 0, j = offset; i < md_size; i++, j++) { in EVP_tls_cbc_copy_mac() local 197 for (size_t j = block_start; j < SHA_CBLOCK; j++) { in EVP_sha1_final_with_secret_suffix() local 214 for (size_t j = 0; j < 4; j++) { in EVP_sha1_final_with_secret_suffix() local 220 for (size_t j = 0; j < 5; j++) { in EVP_sha1_final_with_secret_suffix() local 221 result[j] |= is_last_block & ctx->h[j]; in EVP_sha1_final_with_secret_suffix() 290 for (size_t j = block_start; j < SHA256_CBLOCK; j++) { in EVP_sha256_final_with_secret_suffix() local 307 for (size_t j = 0; j < 4; j++) { in EVP_sha256_final_with_secret_suffix() local 313 for (size_t j = 0; j < 8; j++) { in EVP_sha256_final_with_secret_suffix() local [all …]
|
/crypto/fipsmodule/keccak/ |
A D | keccak_test.cc | 239 for (size_t j = 0; j < sizeof(input); j++) { in TEST() local 240 for (size_t i = 0; i < j; i++) { in TEST() 244 BORINGSSL_keccak_absorb(&ctx, &input[i], j - i); in TEST() 245 BORINGSSL_keccak_absorb(&ctx, &input[j], sizeof(input) - j); in TEST() 251 for (size_t j = 0; j < sizeof(input); j++) { in TEST() local 252 for (size_t i = 0; i < j; i++) { in TEST() 257 BORINGSSL_keccak_absorb(&ctx, &input[j], sizeof(input) - j); in TEST() 264 for (size_t j = 0; j < sizeof(shake128_output); j++) { in TEST() local 265 for (size_t i = 0; i < j; i++) { in TEST() 277 for (size_t j = 0; j < sizeof(shake256_output); j++) { in TEST() local [all …]
|
/crypto/fipsmodule/ec/ |
A D | simple_mul.cc.inc | 34 for (size_t j = 2; j < OPENSSL_ARRAY_SIZE(precomp); j++) { 35 if (j & 1) { 38 ec_GFp_mont_dbl(group, &precomp[j], &precomp[j / 2]); 61 for (size_t j = 0; j < OPENSSL_ARRAY_SIZE(precomp); j++) { 89 for (size_t j = 2; j < num; j++) { 93 ec_GFp_mont_dbl(group, &out[j], &out[j / 2]); 116 for (size_t j = 0; j < 17; j++) { 193 for (unsigned j = 1; j < stride; j++) { 198 for (unsigned j = 1; j < bit; j++) { 219 for (unsigned j = 0; j < EC_MONT_PRECOMP_COMB_SIZE; j++) { [all …]
|
A D | make_tables.go | 310 for j := 0; j < shift; j++ { 333 for j := 0; j < shift; j++ { 340 for j := 0; j < stride; j++ { 346 for j := 1; j < 1<<i; j++ { 347 x, y = curve.Add(ret[1<<i-1][0], ret[1<<i-1][1], ret[j-1][0], ret[j-1][1]) 348 ret[1<<i+j-1] = [2]*big.Int{x, y}
|
/crypto/chacha/asm/ |
A D | chacha-armv4.pl | 486 add @x[$j+1],@x[$j+1],@t[1] 487 add @x[$j+2],@x[$j+2],@t[2] 496 add @x[$j+3],@x[$j+3],@t[3] 506 eor @x[$j+1],@t[1],@x[$j+1] 512 eor @x[$j+2],@t[2],@x[$j+2] 514 eor @x[$j+3],@t[3],@x[$j+3] 521 eor @x[$j+0],@t[0],@x[$j+0],lsr#8 523 eor @x[$j+1],@t[1],@x[$j+1],lsr#8 530 eor @x[$j+2],@t[2],@x[$j+2],lsr#8 532 eor @x[$j+3],@t[3],@x[$j+3],lsr#8 [all …]
|
/crypto/x509/ |
A D | x509_obj.cc | 35 int n, lold, l, l1, l2, num, j, type; in X509_NAME_oneline() local 86 for (j = 0; j < num; j++) { in X509_NAME_oneline() 87 if (q[j] != 0) { in X509_NAME_oneline() 88 gs_doit[j & 3] = 1; in X509_NAME_oneline() 102 for (l2 = j = 0; j < num; j++) { in X509_NAME_oneline() 103 if (!gs_doit[j & 3]) { in X509_NAME_oneline() 107 if ((q[j] < ' ') || (q[j] > '~')) { in X509_NAME_oneline() 135 for (j = 0; j < num; j++) { in X509_NAME_oneline() 136 if (!gs_doit[j & 3]) { in X509_NAME_oneline() 139 n = q[j]; in X509_NAME_oneline()
|
A D | v3_purp.cc | 162 int j; in setup_crldp() local 165 if (x->crldp == NULL && j != -1) { in setup_crldp() 181 int j; in x509v3_cache_extensions() local 227 } else if (j != -1) { in x509v3_cache_extensions() 243 } else if (j != -1) { in x509v3_cache_extensions() 291 } else if (j != -1) { in x509v3_cache_extensions() 297 if (x->skid == NULL && j != -1) { in x509v3_cache_extensions() 302 if (x->akid == NULL && j != -1) { in x509v3_cache_extensions() 316 if (x->altname == NULL && j != -1) { in x509v3_cache_extensions() 321 if (x->nc == NULL && j != -1) { in x509v3_cache_extensions() [all …]
|
A D | t_x509a.cc | 29 int j; in X509_CERT_AUX_print() local 73 for (j = 0; j < aux->keyid->length; j++) { in X509_CERT_AUX_print() 74 BIO_printf(out, "%s%02X", j ? ":" : "", aux->keyid->data[j]); in X509_CERT_AUX_print()
|
/crypto/fipsmodule/aes/ |
A D | aes_nohw.cc.inc | 906 for (size_t j = 0; j < AES_NOHW_BATCH_SIZE; j++) { 951 for (size_t j = 0; j < AES_NOHW_BLOCK_WORDS; j++) { 953 block[j] = aes_nohw_xor(block[j], aes_nohw_rcon_slice(rcon, j)); 993 for (size_t j = 0; j < AES_NOHW_BLOCK_WORDS; j++) { 1018 block1[j] = aes_nohw_or(block1[j], aes_nohw_shift_left(block2[j], 8)); 1035 for (size_t j = 0; j < AES_NOHW_BLOCK_WORDS; j++) { 1040 block2[j] = aes_nohw_or(block2[j], aes_nohw_shift_left(block1[j], 8)); 1043 block2[j] = aes_nohw_xor(block2[j], aes_nohw_rcon_slice(rcon, j)); 1089 for (size_t j = 0; j < AES_NOHW_BLOCK_WORDS; j++) { 1091 block1[j] = aes_nohw_xor(block1[j], aes_nohw_rcon_slice(rcon, j)); [all …]
|
/crypto/kyber/ |
A D | kyber.cc | 179 for (int j = k; j < k + offset; j++) { in scalar_ntt() local 210 for (int j = k; j < k + offset; j++) { in scalar_inverse_ntt() local 271 for (int j = 0; j < RANK; j++) { in matrix_mult() local 273 scalar_mult(&product, &m->v[i][j], &a->v[j]); in matrix_mult() 283 for (int j = 0; j < RANK; j++) { in matrix_mult_transpose() local 285 scalar_mult(&product, &m->v[j][i], &a->v[j]); in matrix_mult_transpose() 378 for (int j = 0; j < RANK; j++) { in matrix_expand() local 380 input[33] = j; in matrix_expand() 431 for (int j = 0; j < 8; j++) { in scalar_encode_1() local 432 out_byte |= (s->c[i + j] & 1) << j; in scalar_encode_1() [all …]
|
/crypto/bn/ |
A D | convert.cc | 59 for (int j = BN_BITS2 - 8; j >= 0; j -= 8) { in BN_bn2hex() local 61 int v = ((int)(bn->d[i] >> (long)j)) & 0xff; in BN_bn2hex() 94 int j; in decode_hex() local 95 for (j = todo; j > 0; j--) { in decode_hex() 114 int i, j; in decode_dec() local 118 j = BN_DEC_NUM - (in_len % BN_DEC_NUM); in decode_dec() 119 if (j == BN_DEC_NUM) { in decode_dec() 120 j = 0; in decode_dec() 126 if (++j == BN_DEC_NUM) { in decode_dec() 131 j = 0; in decode_dec() [all …]
|
/crypto/fipsmodule/slhdsa/ |
A D | merkle.cc.inc | 61 for (size_t j = 0; j < SLHDSA_SHA2_128S_TREE_HEIGHT; ++j) { 62 unsigned int k = (idx >> j) ^ 1; 63 slhdsa_treehash(sig + SLHDSA_SHA2_128S_WOTS_BYTES + j * BCM_SLHDSA_SHA2_128S_N, 64 sk_seed, k, j, pk_seed, addr); 125 for (size_t j = 1; j < SLHDSA_SHA2_128S_D; ++j) { 128 slhdsa_set_layer_addr(addr, j); 131 if (j < (SLHDSA_SHA2_128S_D - 1)) { 151 for (size_t j = 1; j < SLHDSA_SHA2_128S_D; ++j) { 154 slhdsa_set_layer_addr(addr, j); 157 slhdsa_xmss_pk_from_sig(node, sig + j * SLHDSA_SHA2_128S_XMSS_BYTES,
|
A D | fors.cc.inc | 103 for (size_t j = 0; j < SLHDSA_SHA2_128S_FORS_HEIGHT; ++j) { 104 size_t s = (indices[i] / (1 << j)) ^ 1; 108 (i * (SLHDSA_SHA2_128S_FORS_HEIGHT + 1) + j + 1), 109 sk_seed, i * (1ULL << (SLHDSA_SHA2_128S_FORS_HEIGHT - j)) + s, j, 143 for (size_t j = 0; j < SLHDSA_SHA2_128S_FORS_HEIGHT; ++j) { 144 slhdsa_set_tree_height(addr, j + 1); 147 if (((indices[i] / (1 << j)) % 2) == 0) { 150 OPENSSL_memcpy(tmp + BCM_SLHDSA_SHA2_128S_N, auth + j * BCM_SLHDSA_SHA2_128S_N, 155 OPENSSL_memcpy(tmp, auth + j * BCM_SLHDSA_SHA2_128S_N, BCM_SLHDSA_SHA2_128S_N);
|
/crypto/rand/ |
A D | rand_test.cc | 159 for (size_t j = 0; j < i; j++) { in TEST() local 160 EXPECT_NE(Bytes(bufs[i]), Bytes(bufs[j])) in TEST() 161 << "buffers " << i << " and " << j << " matched"; in TEST() 185 for (size_t j = i + 1; j < num_threads; j++) { in RunConcurrentRands() local 186 EXPECT_NE(Bytes(bufs[i]), Bytes(bufs[j])); in RunConcurrentRands()
|
/crypto/fipsmodule/bn/test/ |
A D | miller_rabin_tests.txt | 16 # # - b^(m*2^j) != -1 (mod w), for 0 <= j < a 21 # for j in range(a): 76 # Some b^(m*2^j) = w-1 81 # Some b^(m*2^j) = w-1 86 # Some b^(m*2^j) = w-1 217 # Some b^(m*2^j) = w-1 222 # Some b^(m*2^j) = w-1 227 # Some b^(m*2^j) = w-1 232 # Some b^(m*2^j) = w-1 247 # Some b^(m*2^j) = w-1 [all …]
|
/crypto/cipher/asm/ |
A D | aes128gcmsiv-x86_64.pl | 591 my ($i, $j) = @_; 603 my ($i, $j) = @_; 667 my ($i, $j) = @_; 670 vaesenc $j, $BLOCK1, $BLOCK1 671 vaesenc $j, $BLOCK2, $BLOCK2 672 vaesenc $j, $BLOCK3, $BLOCK3 673 vaesenc $j, $BLOCK4, $BLOCK4 678 my ($i, $j) = @_; 1630 my ($i, $j) = @_; 2186 my ($i, $j) = @_; [all …]
|
/crypto/pem/ |
A D | pem_lib.cc | 244 int dsize = 0, i, j, ret = 0; in PEM_ASN1_write_bio() local 315 i += j; in PEM_ASN1_write_bio() 338 int i = 0, j, o, pass_len; in PEM_do_header() local 365 j = (int)len; in PEM_do_header() 371 o = EVP_DecryptFinal_ex(ctx.get(), &(data[i]), &j); in PEM_do_header() 379 j += i; in PEM_do_header() 380 *plen = j; in PEM_do_header() 483 int nlen, n, i, j, outl; in PEM_write_bio() local 510 i = j = 0; in PEM_write_bio() 513 EVP_EncodeUpdate(&ctx, buf, &outl, &(data[j]), n); in PEM_write_bio() [all …]
|