Home
last modified time | relevance | path

Searched refs:out (Results 1 – 25 of 282) sorted by relevance

12345678910>>...12

/crypto/fipsmodule/cipher/
A De_aes.cc.inc426 out->key_len = 16;
427 out->iv_len = 16;
439 out->key_len = 16;
440 out->iv_len = 16;
465 out->iv_len = 16;
495 out->iv_len = 16;
508 out->iv_len = 16;
533 out->iv_len = 16;
563 out->iv_len = 16;
576 out->iv_len = 16;
[all …]
/crypto/bytestring/
A Dcbs.cc91 *out = result; in cbs_get_u()
100 *out = *v; in CBS_get_u8()
109 *out = v; in CBS_get_u16()
117 *out = CRYPTO_bswap2(*out); in CBS_get_u16le()
143 *out = CRYPTO_bswap4(*out); in CBS_get_u32le()
153 *out = CRYPTO_bswap8(*out); in CBS_get_u64le()
236 *out = v; in CBS_get_u64_decimal()
263 *out = v; in parse_base128_integer()
302 *out = tag; in parse_asn1_tag()
413 if (out && !CBS_skip(out, header_len)) { in CBS_get_any_asn1()
[all …]
/crypto/fipsmodule/aes/asm/
A Daesni-x86_64.pl680 lea 0x80($out),$out # $out+=8*16
700 lea 0x80($out),$out # $out+=8*16
815 lea 0x80($out),$out # $out+=8*16
844 lea 0x80($out),$out # $out+=8*16
1055 lea 16($out),$out # $out+=16
1125 lea 16($out),$out # $out+=16
1485 lea 0x80($out),$out # $out+=8*16
1995 lea 16*5($out),$out # $out+=5*16
2009 lea 16*1($out),$out # $out+=1*16
2027 lea 16*2($out),$out # $out+=2*16
[all …]
A Daesni-x86.pl480 &lea ($out,&DWP(0x60,$out));
498 &lea ($out,&DWP(0x60,$out));
580 &lea ($out,&DWP(0x60,$out));
598 &lea ($out,&DWP(0x60,$out));
743 &lea ($out,&DWP(16,$out));
815 &lea ($out,&DWP(16,$out));
1015 &lea ($out,&DWP(0x60,$out));
1250 &lea ($out,&DWP(16*6,$out));
1452 &lea ($out,&DWP(1,$out));
1828 &lea ($out,&DWP(1,$out));
[all …]
A Dbsaes-armv7.pl1075 vldmia $out, {@XMM[6]}
1078 vstmia $out, {@XMM[7]}
1592 mov $out, r1
1938 sub r6, $out, #0x10
1942 ldrb r1, [$out, #-0x10]
1944 strb r1, [$out], #1
1996 mov $out, r1
2375 mov r6, $out
2377 ldrb r1, [$out]
2379 strb r1, [$out, #0x10]
[all …]
/crypto/fipsmodule/digest/
A Ddigests.cc.inc47 out->type = NID_sha1;
49 out->flags = 0;
50 out->init = sha1_init;
53 out->block_size = 64;
75 out->flags = 0;
79 out->block_size = 64;
100 out->flags = 0;
104 out->block_size = 64;
124 out->flags = 0;
149 out->flags = 0;
[all …]
/crypto/chacha/asm/
A Dchacha-x86_64.pl357 lea 4*16($out),$out # out+=64
527 lea 0x40($out),$out # out+=64
965 lea 0x80($out),$out # out+=64*4
1009 lea 0x40($out),$out # out+=64*1
1049 lea 0x80($out),$out # out+=64*2
1894 lea 0x40($out),$out # out+=64
1916 lea 0x40($out),$out # out+=64
1938 lea 0x40($out),$out # out+=64
1960 lea 0x40($out),$out # out+=64
2344 lea 0x400($out),$out
[all …]
/crypto/curve25519/
A Dx25519_test.cc67 uint8_t out[32], secret[32]; in TEST() local
124 CONSTTIME_DECLASSIFY(out, sizeof(out)); in TEST()
125 EXPECT_EQ(Bytes(out), Bytes(kPublicA)); in TEST()
130 CONSTTIME_DECLASSIFY(out, sizeof(out)); in TEST()
134 EXPECT_EQ(Bytes(out), Bytes(kSecret)); in TEST()
137 EXPECT_EQ(Bytes(out), Bytes(kSecret)); in TEST()
147 uint8_t out[32], private_key[32]; in TEST() local
150 OPENSSL_memset(out, 0xff, sizeof(out)); in TEST()
156 EXPECT_EQ(Bytes(kZeros), Bytes(out)); in TEST()
255 uint64_t out[4]; in TEST() local
[all …]
/crypto/hrss/
A Dhrss.cc489 poly3_word_sub(&out->s.v[i], &out->a.v[i], out->s.v[i], out->a.v[i], in poly3_fmsub()
776 poly3_reverse_700(out, out); in poly3_invert_vec()
1156 out[low_len + i] = vec_add(out[low_len + i], scratch[i]); in poly_mul_vec_aux()
1236 scratch[i] -= out[i] + out[low_len * 2 + i]; in poly_mul_novec_aux()
1544 b = out; in poly_invert()
1583 out += 13; in poly_marshal()
1630 out->v[i] = (int16_t)(out->v[i] << 3) >> 3; in poly_unmarshal()
1709 sum += (unsigned)out->v[i] * out->v[i + 1]; in poly_short_sample_plus()
1717 out->v[i] = (unsigned)out->v[i] * scale; in poly_short_sample_plus()
2095 goto out; in HRSS_decap()
[all …]
/crypto/perlasm/
A Dx86masm.pl19 *out=\@::out;
107 push(@out,$tmp);
121 push(@out,$func);
143 grep {s/\.[3-7]86/$xmmheader/} @out;
146 push(@out,"$segment ENDS\n");
156 push (@out,$comm);
159 push (@out,"END\n");
185 { push(@out,"ALIGN\t$_[0]\n"); }
210 push(@out,"ENDIF\n");
215 push(@out,"%ifdef ${define}\n");
[all …]
A Dx86gas.pl19 *out=\@::out;
114 { push(@out,".text\n"); }
128 push(@out,".hidden\t$func\n");
136 push(@out,".align\t$align\n");
137 push(@out,"$func:\n");
160 { push(@out,"\n"); }
184 else { push (@out,"$tmp\n"); }
199 push(@out,".align\t$val\n");
273 { push(@out,".data\n"); }
277 push(@out,"#ifdef ${define}\n");
[all …]
A Dx86nasm.pl19 *out=\@::out;
106 push(@out,$tmp);
121 push(@out,"${drdecor}align 16\n");
122 push(@out,"$func:\n");
123 push(@out,"$begin:\n") if ($global);
140 push (@out,$comm)
142 push (@out,$initseg) if ($initseg);
163 { push(@out,"${drdecor}align\t$_[0]\n"); }
190 push(@out,"%endif\n");
195 push(@out,"%ifdef ${define}\n");
[all …]
/crypto/fipsmodule/ec/
A Dp224-64.cc.inc255 out[0] = in[0];
256 out[1] = in[1];
257 out[2] = in[2];
342 // Multiply a field element by a scalar: out = out * scalar
396 // ensures out[0] < 2^56, out[1] < 2^56, out[2] < 2^56, out[3] <= 2^56 + 2^16
453 // out[0] < 2^56, out[1] < 2^56, out[2] < 2^56,
461 // ensures out[0] < 2^56, out[1] < 2^56, out[2] < 2^56, out[3] <= 2^56 + 2^16
939 p224_point_add(out[j][0], out[j][1], out[j][2], out[1][0], out[1][1],
940 out[1][2], 0, out[j - 1][0], out[j - 1][1], out[j - 1][2]);
942 p224_point_double(out[j][0], out[j][1], out[j][2], out[j / 2][0],
[all …]
A Dinternal.h78 void ec_scalar_reduce(const EC_GROUP *group, EC_SCALAR *out,
83 int ec_random_scalar(const EC_GROUP *group, EC_SCALAR *out,
88 int ec_random_nonzero_scalar(const EC_GROUP *group, EC_SCALAR *out,
228 void ec_affine_to_jacobian(const EC_GROUP *group, EC_JACOBIAN *out,
313 int ec_init_precomp(const EC_GROUP *group, EC_PRECOMP *out,
420 void ec_set_to_safe_point(const EC_GROUP *group, EC_JACOBIAN *out);
473 int (*init_precomp)(const EC_GROUP *group, EC_PRECOMP *out,
498 int (*felem_from_bytes)(const EC_GROUP *group, EC_FELEM *out,
507 void (*felem_reduce)(const EC_GROUP *group, EC_FELEM *out,
607 void ec_GFp_mont_felem_exp(const EC_GROUP *group, EC_FELEM *out,
[all …]
A Dec.cc.inc85 out->generator.group = out;
88 out->has_order = 1;
113 out->generator.group = out;
120 out->has_order = 1;
138 out->generator.group = out;
163 out->generator.group = out;
531 out->X = p->X;
532 out->Y = p->Y;
577 out->X = *x;
578 out->Y = *y;
[all …]
/crypto/cipher/
A De_aeseax.cc99 CRYPTO_xor16(out, in, out); in cbk_block()
100 AES_encrypt(out, out, &aes_ctx->ks.ks); in cbk_block()
108 CRYPTO_xor16(out, aes_ctx->b, in); in pad()
112 OPENSSL_memcpy(out, in, in_len); in pad()
113 out[in_len] = 0x80; in pad()
114 CRYPTO_xor16(out, aes_ctx->p, out); in pad()
126 AES_encrypt(out, out, &aes_ctx->ks.ks); in omac()
129 cbk_block(aes_ctx, in, out); in omac()
143 out[AES_BLOCK_SIZE - 1] = tag; in omac_with_tag()
144 omac(aes_ctx, out, in, in_len); in omac_with_tag()
[all …]
A Daead_test.cc210 ASSERT_TRUE(EVP_AEAD_CTX_seal(ctx.get(), out.data(), &out_len, out.size(), in TEST_P()
252 out.push_back(0); in TEST_P()
256 nonce.size(), out.data(), out.size(), ad.data(), ad.size())) in TEST_P()
267 out[0] ^= 0x80; in TEST_P()
268 out.resize(out.size() - 1); in TEST_P()
272 nonce.size(), out.data(), out.size(), ad.data(), ad.size())) in TEST_P()
885 EXPECT_TRUE(EVP_AEAD_CTX_seal(ctx.get(), out.data(), &out_len, out.size(), in TEST()
893 EXPECT_TRUE(EVP_AEAD_CTX_open(ctx.get(), out.data(), &out_len, out.size(), in TEST()
938 out = ct_and_tag; in RunWycheproofTestCase()
952 out = msg; in RunWycheproofTestCase()
[all …]
/crypto/x509/
A Dt_crl.cc35 int X509_CRL_print(BIO *out, X509_CRL *x) { in X509_CRL_print() argument
47 !X509_signature_print(out, sig_alg, NULL)) { in X509_CRL_print()
58 if (BIO_printf(out, "%8sLast Update: ", "") <= 0 || in X509_CRL_print()
60 BIO_printf(out, "\n%8sNext Update: ", "") <= 0) { in X509_CRL_print()
68 if (BIO_printf(out, "NONE") <= 0) { in X509_CRL_print()
73 if (BIO_printf(out, "\n") <= 0 || in X509_CRL_print()
74 !X509V3_extensions_print(out, "CRL extensions", in X509_CRL_print()
81 if (BIO_printf(out, "Revoked Certificates:\n") <= 0) { in X509_CRL_print()
92 if (BIO_printf(out, " Serial Number: ") <= 0 || in X509_CRL_print()
96 BIO_printf(out, "\n") <= 0 || in X509_CRL_print()
[all …]
/crypto/fipsmodule/aes/
A Dinternal.h35 typedef void (*block128_f)(const uint8_t in[16], uint8_t out[16],
39 typedef void (*ctr128_f)(const uint8_t *in, uint8_t *out, size_t blocks,
95 void aes_hw_cbc_encrypt(const uint8_t *in, uint8_t *out, size_t length,
142 inline void aes_hw_encrypt(const uint8_t *in, uint8_t *out, in aes_hw_encrypt() argument
147 inline void aes_hw_decrypt(const uint8_t *in, uint8_t *out, in aes_hw_decrypt() argument
167 void aes_hw_ecb_encrypt(const uint8_t *in, uint8_t *out, size_t length,
174 void bsaes_cbc_encrypt(const uint8_t *in, uint8_t *out, size_t length,
222 void vpaes_cbc_encrypt(const uint8_t *in, uint8_t *out, size_t length,
264 void aes_nohw_ctr32_encrypt_blocks(const uint8_t *in, uint8_t *out,
267 void aes_nohw_cbc_encrypt(const uint8_t *in, uint8_t *out, size_t len,
[all …]
A Dcbc.cc.inc36 (*block)(out, out, key);
37 iv = out;
40 out += 16;
48 out[n] = iv[n];
50 (*block)(out, out, key);
51 iv = out;
57 out += 16;
87 CRYPTO_xor16(out, out, iv);
91 out += 16;
108 out += 16;
[all …]
A Daes_test.cc190 out.resize(msg.size() + 8); in TEST()
234 out.resize(msg.size() + 15); in TEST()
424 out->rounds = 10; in aes_ref_set_encrypt_key()
427 out->rounds = 12; in aes_ref_set_encrypt_key()
430 out->rounds = 14; in aes_ref_set_encrypt_key()
446 out->rd_key[i] = tmp ^ out->rd_key[i - words]; in aes_ref_set_encrypt_key()
451 out->rd_key[i] = CRYPTO_bswap4(out->rd_key[i]); in aes_ref_set_encrypt_key()
557 std::swap(out->rd_key[4 * i], out->rd_key[4 * (out->rounds - i)]); in aes_ref_set_decrypt_key()
558 std::swap(out->rd_key[4 * i + 1], out->rd_key[4 * (out->rounds - i) + 1]); in aes_ref_set_decrypt_key()
559 std::swap(out->rd_key[4 * i + 2], out->rd_key[4 * (out->rounds - i) + 2]); in aes_ref_set_decrypt_key()
[all …]
/crypto/kyber/
A Dkyber.cc160 static void scalar_zero(scalar *out) { OPENSSL_memset(out, 0, sizeof(*out)); } in scalar_zero() argument
162 static void vector_zero(vector *out) { OPENSSL_memset(out, 0, sizeof(*out)); } in vector_zero() argument
256 out->c[2 * i] = in scalar_mult()
269 vector_zero(out); in matrix_mult()
281 vector_zero(out); in matrix_mult_transpose()
293 scalar_zero(out); in scalar_inner_product()
408 *out = out_byte; in scalar_encode()
409 out++; in scalar_encode()
423 *out = out_byte; in scalar_encode()
434 *out = out_byte; in scalar_encode_1()
[all …]
/crypto/bn/
A Dconvert.cc327 if (out) { in BN_bn2mpi()
340 out[3] = len; in BN_bn2mpi()
342 out[4] = 0; in BN_bn2mpi()
346 out[4] |= 0x80; in BN_bn2mpi()
367 out = BN_new(); in BN_mpi2bn()
375 BN_zero(out); in BN_mpi2bn()
376 return out; in BN_mpi2bn()
382 BN_free(out); in BN_mpi2bn()
387 if (out->neg) { in BN_mpi2bn()
388 BN_clear_bit(out, BN_num_bits(out) - 1); in BN_mpi2bn()
[all …]
/crypto/evp/
A Dprint.cc108 if (!BIO_indent(out, off, 128)) { in do_rsa_print()
126 if (!bn_print(out, str, rsa->n, off) || !bn_print(out, s, rsa->e, off)) { in do_rsa_print()
132 !bn_print(out, "prime1:", rsa->p, off) || in do_rsa_print()
133 !bn_print(out, "prime2:", rsa->q, off) || in do_rsa_print()
134 !bn_print(out, "exponent1:", rsa->dmp1, off) || in do_rsa_print()
135 !bn_print(out, "exponent2:", rsa->dmq1, off) || in do_rsa_print()
257 BIO_indent(out, indent, 128); in print_unsupported()
258 BIO_printf(out, "%s algorithm unsupported\n", kstr); in print_unsupported()
266 return method->pub_print(out, pkey, indent); in EVP_PKEY_print_public()
275 return method->priv_print(out, pkey, indent); in EVP_PKEY_print_private()
[all …]
/crypto/asn1/
A Dtasn_enc.cc45 if (out && !*out) { in ASN1_item_i2d()
62 *out = buf; in ASN1_item_i2d()
154 int ret = ef->asn1_ex_i2d(pval, out, it); in asn1_item_ex_i2d_opt()
166 i = asn1_enc_restore(&seqcontlen, out, pval, it); in asn1_item_ex_i2d_opt()
201 if (!out || seqlen == -1) { in asn1_item_ex_i2d_opt()
335 if (!out || ret == -1) { in asn1_template_ex_i2d()
363 if (out && ret != -1) { in asn1_template_ex_i2d()
438 p = *out; in asn1_set_seq_out()
443 *out = p; in asn1_set_seq_out()
485 if (out) { in asn1_i2d_ex_primitive()
[all …]

Completed in 57 milliseconds

12345678910>>...12