/crypto/fipsmodule/cipher/ |
A D | e_aes.cc.inc | 426 out->key_len = 16; 427 out->iv_len = 16; 439 out->key_len = 16; 440 out->iv_len = 16; 465 out->iv_len = 16; 495 out->iv_len = 16; 508 out->iv_len = 16; 533 out->iv_len = 16; 563 out->iv_len = 16; 576 out->iv_len = 16; [all …]
|
/crypto/bytestring/ |
A D | cbs.cc | 91 *out = result; in cbs_get_u() 100 *out = *v; in CBS_get_u8() 109 *out = v; in CBS_get_u16() 117 *out = CRYPTO_bswap2(*out); in CBS_get_u16le() 143 *out = CRYPTO_bswap4(*out); in CBS_get_u32le() 153 *out = CRYPTO_bswap8(*out); in CBS_get_u64le() 236 *out = v; in CBS_get_u64_decimal() 263 *out = v; in parse_base128_integer() 302 *out = tag; in parse_asn1_tag() 413 if (out && !CBS_skip(out, header_len)) { in CBS_get_any_asn1() [all …]
|
/crypto/fipsmodule/aes/asm/ |
A D | aesni-x86_64.pl | 680 lea 0x80($out),$out # $out+=8*16 700 lea 0x80($out),$out # $out+=8*16 815 lea 0x80($out),$out # $out+=8*16 844 lea 0x80($out),$out # $out+=8*16 1055 lea 16($out),$out # $out+=16 1125 lea 16($out),$out # $out+=16 1485 lea 0x80($out),$out # $out+=8*16 1995 lea 16*5($out),$out # $out+=5*16 2009 lea 16*1($out),$out # $out+=1*16 2027 lea 16*2($out),$out # $out+=2*16 [all …]
|
A D | aesni-x86.pl | 480 &lea ($out,&DWP(0x60,$out)); 498 &lea ($out,&DWP(0x60,$out)); 580 &lea ($out,&DWP(0x60,$out)); 598 &lea ($out,&DWP(0x60,$out)); 743 &lea ($out,&DWP(16,$out)); 815 &lea ($out,&DWP(16,$out)); 1015 &lea ($out,&DWP(0x60,$out)); 1250 &lea ($out,&DWP(16*6,$out)); 1452 &lea ($out,&DWP(1,$out)); 1828 &lea ($out,&DWP(1,$out)); [all …]
|
A D | bsaes-armv7.pl | 1075 vldmia $out, {@XMM[6]} 1078 vstmia $out, {@XMM[7]} 1592 mov $out, r1 1938 sub r6, $out, #0x10 1942 ldrb r1, [$out, #-0x10] 1944 strb r1, [$out], #1 1996 mov $out, r1 2375 mov r6, $out 2377 ldrb r1, [$out] 2379 strb r1, [$out, #0x10] [all …]
|
/crypto/fipsmodule/digest/ |
A D | digests.cc.inc | 47 out->type = NID_sha1; 49 out->flags = 0; 50 out->init = sha1_init; 53 out->block_size = 64; 75 out->flags = 0; 79 out->block_size = 64; 100 out->flags = 0; 104 out->block_size = 64; 124 out->flags = 0; 149 out->flags = 0; [all …]
|
/crypto/chacha/asm/ |
A D | chacha-x86_64.pl | 357 lea 4*16($out),$out # out+=64 527 lea 0x40($out),$out # out+=64 965 lea 0x80($out),$out # out+=64*4 1009 lea 0x40($out),$out # out+=64*1 1049 lea 0x80($out),$out # out+=64*2 1894 lea 0x40($out),$out # out+=64 1916 lea 0x40($out),$out # out+=64 1938 lea 0x40($out),$out # out+=64 1960 lea 0x40($out),$out # out+=64 2344 lea 0x400($out),$out [all …]
|
/crypto/curve25519/ |
A D | x25519_test.cc | 67 uint8_t out[32], secret[32]; in TEST() local 124 CONSTTIME_DECLASSIFY(out, sizeof(out)); in TEST() 125 EXPECT_EQ(Bytes(out), Bytes(kPublicA)); in TEST() 130 CONSTTIME_DECLASSIFY(out, sizeof(out)); in TEST() 134 EXPECT_EQ(Bytes(out), Bytes(kSecret)); in TEST() 137 EXPECT_EQ(Bytes(out), Bytes(kSecret)); in TEST() 147 uint8_t out[32], private_key[32]; in TEST() local 150 OPENSSL_memset(out, 0xff, sizeof(out)); in TEST() 156 EXPECT_EQ(Bytes(kZeros), Bytes(out)); in TEST() 255 uint64_t out[4]; in TEST() local [all …]
|
/crypto/hrss/ |
A D | hrss.cc | 489 poly3_word_sub(&out->s.v[i], &out->a.v[i], out->s.v[i], out->a.v[i], in poly3_fmsub() 776 poly3_reverse_700(out, out); in poly3_invert_vec() 1156 out[low_len + i] = vec_add(out[low_len + i], scratch[i]); in poly_mul_vec_aux() 1236 scratch[i] -= out[i] + out[low_len * 2 + i]; in poly_mul_novec_aux() 1544 b = out; in poly_invert() 1583 out += 13; in poly_marshal() 1630 out->v[i] = (int16_t)(out->v[i] << 3) >> 3; in poly_unmarshal() 1709 sum += (unsigned)out->v[i] * out->v[i + 1]; in poly_short_sample_plus() 1717 out->v[i] = (unsigned)out->v[i] * scale; in poly_short_sample_plus() 2095 goto out; in HRSS_decap() [all …]
|
/crypto/perlasm/ |
A D | x86masm.pl | 19 *out=\@::out; 107 push(@out,$tmp); 121 push(@out,$func); 143 grep {s/\.[3-7]86/$xmmheader/} @out; 146 push(@out,"$segment ENDS\n"); 156 push (@out,$comm); 159 push (@out,"END\n"); 185 { push(@out,"ALIGN\t$_[0]\n"); } 210 push(@out,"ENDIF\n"); 215 push(@out,"%ifdef ${define}\n"); [all …]
|
A D | x86gas.pl | 19 *out=\@::out; 114 { push(@out,".text\n"); } 128 push(@out,".hidden\t$func\n"); 136 push(@out,".align\t$align\n"); 137 push(@out,"$func:\n"); 160 { push(@out,"\n"); } 184 else { push (@out,"$tmp\n"); } 199 push(@out,".align\t$val\n"); 273 { push(@out,".data\n"); } 277 push(@out,"#ifdef ${define}\n"); [all …]
|
A D | x86nasm.pl | 19 *out=\@::out; 106 push(@out,$tmp); 121 push(@out,"${drdecor}align 16\n"); 122 push(@out,"$func:\n"); 123 push(@out,"$begin:\n") if ($global); 140 push (@out,$comm) 142 push (@out,$initseg) if ($initseg); 163 { push(@out,"${drdecor}align\t$_[0]\n"); } 190 push(@out,"%endif\n"); 195 push(@out,"%ifdef ${define}\n"); [all …]
|
/crypto/fipsmodule/ec/ |
A D | p224-64.cc.inc | 255 out[0] = in[0]; 256 out[1] = in[1]; 257 out[2] = in[2]; 342 // Multiply a field element by a scalar: out = out * scalar 396 // ensures out[0] < 2^56, out[1] < 2^56, out[2] < 2^56, out[3] <= 2^56 + 2^16 453 // out[0] < 2^56, out[1] < 2^56, out[2] < 2^56, 461 // ensures out[0] < 2^56, out[1] < 2^56, out[2] < 2^56, out[3] <= 2^56 + 2^16 939 p224_point_add(out[j][0], out[j][1], out[j][2], out[1][0], out[1][1], 940 out[1][2], 0, out[j - 1][0], out[j - 1][1], out[j - 1][2]); 942 p224_point_double(out[j][0], out[j][1], out[j][2], out[j / 2][0], [all …]
|
A D | internal.h | 78 void ec_scalar_reduce(const EC_GROUP *group, EC_SCALAR *out, 83 int ec_random_scalar(const EC_GROUP *group, EC_SCALAR *out, 88 int ec_random_nonzero_scalar(const EC_GROUP *group, EC_SCALAR *out, 228 void ec_affine_to_jacobian(const EC_GROUP *group, EC_JACOBIAN *out, 313 int ec_init_precomp(const EC_GROUP *group, EC_PRECOMP *out, 420 void ec_set_to_safe_point(const EC_GROUP *group, EC_JACOBIAN *out); 473 int (*init_precomp)(const EC_GROUP *group, EC_PRECOMP *out, 498 int (*felem_from_bytes)(const EC_GROUP *group, EC_FELEM *out, 507 void (*felem_reduce)(const EC_GROUP *group, EC_FELEM *out, 607 void ec_GFp_mont_felem_exp(const EC_GROUP *group, EC_FELEM *out, [all …]
|
A D | ec.cc.inc | 85 out->generator.group = out; 88 out->has_order = 1; 113 out->generator.group = out; 120 out->has_order = 1; 138 out->generator.group = out; 163 out->generator.group = out; 531 out->X = p->X; 532 out->Y = p->Y; 577 out->X = *x; 578 out->Y = *y; [all …]
|
/crypto/cipher/ |
A D | e_aeseax.cc | 99 CRYPTO_xor16(out, in, out); in cbk_block() 100 AES_encrypt(out, out, &aes_ctx->ks.ks); in cbk_block() 108 CRYPTO_xor16(out, aes_ctx->b, in); in pad() 112 OPENSSL_memcpy(out, in, in_len); in pad() 113 out[in_len] = 0x80; in pad() 114 CRYPTO_xor16(out, aes_ctx->p, out); in pad() 126 AES_encrypt(out, out, &aes_ctx->ks.ks); in omac() 129 cbk_block(aes_ctx, in, out); in omac() 143 out[AES_BLOCK_SIZE - 1] = tag; in omac_with_tag() 144 omac(aes_ctx, out, in, in_len); in omac_with_tag() [all …]
|
A D | aead_test.cc | 210 ASSERT_TRUE(EVP_AEAD_CTX_seal(ctx.get(), out.data(), &out_len, out.size(), in TEST_P() 252 out.push_back(0); in TEST_P() 256 nonce.size(), out.data(), out.size(), ad.data(), ad.size())) in TEST_P() 267 out[0] ^= 0x80; in TEST_P() 268 out.resize(out.size() - 1); in TEST_P() 272 nonce.size(), out.data(), out.size(), ad.data(), ad.size())) in TEST_P() 885 EXPECT_TRUE(EVP_AEAD_CTX_seal(ctx.get(), out.data(), &out_len, out.size(), in TEST() 893 EXPECT_TRUE(EVP_AEAD_CTX_open(ctx.get(), out.data(), &out_len, out.size(), in TEST() 938 out = ct_and_tag; in RunWycheproofTestCase() 952 out = msg; in RunWycheproofTestCase() [all …]
|
/crypto/x509/ |
A D | t_crl.cc | 35 int X509_CRL_print(BIO *out, X509_CRL *x) { in X509_CRL_print() argument 47 !X509_signature_print(out, sig_alg, NULL)) { in X509_CRL_print() 58 if (BIO_printf(out, "%8sLast Update: ", "") <= 0 || in X509_CRL_print() 60 BIO_printf(out, "\n%8sNext Update: ", "") <= 0) { in X509_CRL_print() 68 if (BIO_printf(out, "NONE") <= 0) { in X509_CRL_print() 73 if (BIO_printf(out, "\n") <= 0 || in X509_CRL_print() 74 !X509V3_extensions_print(out, "CRL extensions", in X509_CRL_print() 81 if (BIO_printf(out, "Revoked Certificates:\n") <= 0) { in X509_CRL_print() 92 if (BIO_printf(out, " Serial Number: ") <= 0 || in X509_CRL_print() 96 BIO_printf(out, "\n") <= 0 || in X509_CRL_print() [all …]
|
/crypto/fipsmodule/aes/ |
A D | internal.h | 35 typedef void (*block128_f)(const uint8_t in[16], uint8_t out[16], 39 typedef void (*ctr128_f)(const uint8_t *in, uint8_t *out, size_t blocks, 95 void aes_hw_cbc_encrypt(const uint8_t *in, uint8_t *out, size_t length, 142 inline void aes_hw_encrypt(const uint8_t *in, uint8_t *out, in aes_hw_encrypt() argument 147 inline void aes_hw_decrypt(const uint8_t *in, uint8_t *out, in aes_hw_decrypt() argument 167 void aes_hw_ecb_encrypt(const uint8_t *in, uint8_t *out, size_t length, 174 void bsaes_cbc_encrypt(const uint8_t *in, uint8_t *out, size_t length, 222 void vpaes_cbc_encrypt(const uint8_t *in, uint8_t *out, size_t length, 264 void aes_nohw_ctr32_encrypt_blocks(const uint8_t *in, uint8_t *out, 267 void aes_nohw_cbc_encrypt(const uint8_t *in, uint8_t *out, size_t len, [all …]
|
A D | cbc.cc.inc | 36 (*block)(out, out, key); 37 iv = out; 40 out += 16; 48 out[n] = iv[n]; 50 (*block)(out, out, key); 51 iv = out; 57 out += 16; 87 CRYPTO_xor16(out, out, iv); 91 out += 16; 108 out += 16; [all …]
|
A D | aes_test.cc | 190 out.resize(msg.size() + 8); in TEST() 234 out.resize(msg.size() + 15); in TEST() 424 out->rounds = 10; in aes_ref_set_encrypt_key() 427 out->rounds = 12; in aes_ref_set_encrypt_key() 430 out->rounds = 14; in aes_ref_set_encrypt_key() 446 out->rd_key[i] = tmp ^ out->rd_key[i - words]; in aes_ref_set_encrypt_key() 451 out->rd_key[i] = CRYPTO_bswap4(out->rd_key[i]); in aes_ref_set_encrypt_key() 557 std::swap(out->rd_key[4 * i], out->rd_key[4 * (out->rounds - i)]); in aes_ref_set_decrypt_key() 558 std::swap(out->rd_key[4 * i + 1], out->rd_key[4 * (out->rounds - i) + 1]); in aes_ref_set_decrypt_key() 559 std::swap(out->rd_key[4 * i + 2], out->rd_key[4 * (out->rounds - i) + 2]); in aes_ref_set_decrypt_key() [all …]
|
/crypto/kyber/ |
A D | kyber.cc | 160 static void scalar_zero(scalar *out) { OPENSSL_memset(out, 0, sizeof(*out)); } in scalar_zero() argument 162 static void vector_zero(vector *out) { OPENSSL_memset(out, 0, sizeof(*out)); } in vector_zero() argument 256 out->c[2 * i] = in scalar_mult() 269 vector_zero(out); in matrix_mult() 281 vector_zero(out); in matrix_mult_transpose() 293 scalar_zero(out); in scalar_inner_product() 408 *out = out_byte; in scalar_encode() 409 out++; in scalar_encode() 423 *out = out_byte; in scalar_encode() 434 *out = out_byte; in scalar_encode_1() [all …]
|
/crypto/bn/ |
A D | convert.cc | 327 if (out) { in BN_bn2mpi() 340 out[3] = len; in BN_bn2mpi() 342 out[4] = 0; in BN_bn2mpi() 346 out[4] |= 0x80; in BN_bn2mpi() 367 out = BN_new(); in BN_mpi2bn() 375 BN_zero(out); in BN_mpi2bn() 376 return out; in BN_mpi2bn() 382 BN_free(out); in BN_mpi2bn() 387 if (out->neg) { in BN_mpi2bn() 388 BN_clear_bit(out, BN_num_bits(out) - 1); in BN_mpi2bn() [all …]
|
/crypto/evp/ |
A D | print.cc | 108 if (!BIO_indent(out, off, 128)) { in do_rsa_print() 126 if (!bn_print(out, str, rsa->n, off) || !bn_print(out, s, rsa->e, off)) { in do_rsa_print() 132 !bn_print(out, "prime1:", rsa->p, off) || in do_rsa_print() 133 !bn_print(out, "prime2:", rsa->q, off) || in do_rsa_print() 134 !bn_print(out, "exponent1:", rsa->dmp1, off) || in do_rsa_print() 135 !bn_print(out, "exponent2:", rsa->dmq1, off) || in do_rsa_print() 257 BIO_indent(out, indent, 128); in print_unsupported() 258 BIO_printf(out, "%s algorithm unsupported\n", kstr); in print_unsupported() 266 return method->pub_print(out, pkey, indent); in EVP_PKEY_print_public() 275 return method->priv_print(out, pkey, indent); in EVP_PKEY_print_private() [all …]
|
/crypto/asn1/ |
A D | tasn_enc.cc | 45 if (out && !*out) { in ASN1_item_i2d() 62 *out = buf; in ASN1_item_i2d() 154 int ret = ef->asn1_ex_i2d(pval, out, it); in asn1_item_ex_i2d_opt() 166 i = asn1_enc_restore(&seqcontlen, out, pval, it); in asn1_item_ex_i2d_opt() 201 if (!out || seqlen == -1) { in asn1_item_ex_i2d_opt() 335 if (!out || ret == -1) { in asn1_template_ex_i2d() 363 if (out && ret != -1) { in asn1_template_ex_i2d() 438 p = *out; in asn1_set_seq_out() 443 *out = p; in asn1_set_seq_out() 485 if (out) { in asn1_i2d_ex_primitive() [all …]
|