Home
last modified time | relevance | path

Searched refs:k (Results 1 – 25 of 171) sorted by relevance

1234567

/openssl-master/crypto/camellia/
A Dcamellia.c305 s0 ^= k[0], s1 ^= k[1], s2 ^= k[2], s3 ^= k[3]; in Camellia_Ekeygen()
312 s0 ^= k[0], s1 ^= k[1], s2 ^= k[2], s3 ^= k[3]; in Camellia_Ekeygen()
318 k[4] = s0, k[5] = s1, k[6] = s2, k[7] = s3; in Camellia_Ekeygen()
332 s0 = k[0], s1 = k[1], s2 = k[2], s3 = k[3]; in Camellia_Ekeygen()
334 k[8] = s0, k[9] = s1, k[10] = s2, k[11] = s3; in Camellia_Ekeygen()
353 k[4] = s0, k[5] = s1, k[6] = s2, k[7] = s3; in Camellia_Ekeygen()
361 s0 = k[8], s1 = k[9], s2 = k[10], s3 = k[11]; in Camellia_Ekeygen()
363 k[8] = s0, k[9] = s1, k[10] = s2, k[11] = s3; in Camellia_Ekeygen()
381 s0 = k[0], s1 = k[1], s2 = k[2], s3 = k[3]; in Camellia_Ekeygen()
441 s2 ^= k[0], s3 ^= k[1], s0 ^= k[2], s1 ^= k[3]; in Camellia_EncryptBlock_Rounds()
[all …]
/openssl-master/crypto/chacha/asm/
A Dchacha-ia64.pl57 { .mlx; ld4 @k[5]=[@k[11]],8
61 { .mlx; ld4 @k[7]=[@k[11]],8
64 ld4 @k[9]=[@k[11]],8
67 ld4 @k[11]=[@k[11]]
70 ld4 @k[13]=[@k[15]],8
73 ld4 @k[15]=[@k[15]]
76 mov @x[4]=@k[4]
214 { .mmi; add @k[12]=1,@k[12] // next counter
241 (p1) mov @x[$k-1]=@k[$k-1] };;
273 mov @k[5]=0
[all …]
/openssl-master/crypto/cast/
A Dc_enc.c22 const CAST_LONG *k; in CAST_encrypt() local
24 k = &(key->data[0]); in CAST_encrypt()
28 E_CAST(0, k, l, r, +, ^, -); in CAST_encrypt()
29 E_CAST(1, k, r, l, ^, -, +); in CAST_encrypt()
30 E_CAST(2, k, l, r, -, +, ^); in CAST_encrypt()
31 E_CAST(3, k, r, l, +, ^, -); in CAST_encrypt()
32 E_CAST(4, k, l, r, ^, -, +); in CAST_encrypt()
33 E_CAST(5, k, r, l, -, +, ^); in CAST_encrypt()
34 E_CAST(6, k, l, r, +, ^, -); in CAST_encrypt()
54 const CAST_LONG *k; in CAST_decrypt() local
[all …]
/openssl-master/crypto/rc2/
A Drc2_skey.c58 unsigned char *k; in RC2_set_key() local
62 k = (unsigned char *)&(key->data[0]); in RC2_set_key()
73 k[i] = data[i]; in RC2_set_key()
76 d = k[len - 1]; in RC2_set_key()
79 d = key_table[(k[j] + d) & 0xff]; in RC2_set_key()
80 k[i] = d; in RC2_set_key()
89 d = key_table[k[i] & c]; in RC2_set_key()
90 k[i] = d; in RC2_set_key()
92 d = key_table[k[i + j] ^ d]; in RC2_set_key()
93 k[i] = d; in RC2_set_key()
[all …]
/openssl-master/apps/
A Dspeed.c2063 for (k = 0; k < 3; k++) { in speed_main()
2089 for (k = 0; k < 3; k++) { in speed_main()
3126 for (k = 0; k < ALGOR_NUM; k++) { in speed_main()
3142 for (k = 0; k < RSA_NUM; k++) { in speed_main()
3158 for (k = 0; k < DSA_NUM; k++) { in speed_main()
3194 for (k = 0; k < EC_NUM; k++) { in speed_main()
3255 for (k = 0; k < FFDH_NUM; k++) { in speed_main()
3284 for (k = 0; k < RSA_NUM; k++) { in speed_main()
3291 for (k = 0; k < FFDH_NUM; k++) in speed_main()
3294 for (k = 0; k < DSA_NUM; k++) { in speed_main()
[all …]
A Dlist.c334 const EVP_KDF *k = sk_EVP_KDF_value(kdfs, i); in list_kdfs() local
349 const char *desc = EVP_KDF_get0_description(k); in list_kdfs()
354 EVP_KDF_gettable_params(k), 4); in list_kdfs()
533 OSSL_ENCODER *k = sk_OSSL_ENCODER_value(encoders, i); in list_encoders() local
546 OSSL_ENCODER_get0_properties(k)); in list_encoders()
598 OSSL_DECODER *k = sk_OSSL_DECODER_value(decoders, i); in list_decoders() local
611 OSSL_DECODER_get0_properties(k)); in list_decoders()
654 EVP_KEYMGMT *k = sk_EVP_KEYMGMT_value(km_stack, i); in list_keymanagers() local
662 const char *desc = EVP_KEYMGMT_get0_description(k); in list_keymanagers()
776 EVP_KEM *k = sk_EVP_KEM_value(kem_stack, i); in list_kems() local
[all …]
A Dengine.c399 int k, n; in engine_main() local
422 for (k = 0; k < n; ++k) in engine_main()
423 if (!append_buf(&cap_buf, &cap_size, OBJ_nid2sn(nids[k]))) in engine_main()
431 for (k = 0; k < n; ++k) in engine_main()
432 if (!append_buf(&cap_buf, &cap_size, OBJ_nid2sn(nids[k]))) in engine_main()
440 for (k = 0; k < n; ++k) in engine_main()
441 if (!append_buf(&cap_buf, &cap_size, OBJ_nid2sn(nids[k]))) in engine_main()
/openssl-master/crypto/rc5/
A Drc5_skey.c22 RC5_32_INT L[64], l, ll, A, B, *S, k; in RC5_32_set_key() local
43 k = len & 0x07; in RC5_32_set_key()
44 c2ln(data, l, ll, k); in RC5_32_set_key()
60 k = (S[ii] + A + B) & RC5_32_MASK; in RC5_32_set_key()
61 A = S[ii] = ROTATE_l32(k, 3); in RC5_32_set_key()
63 k = (L[jj] + A + B) & RC5_32_MASK; in RC5_32_set_key()
64 B = L[jj] = ROTATE_l32(k, m); in RC5_32_set_key()
/openssl-master/providers/implementations/exchange/
A Decdh_exch.c56 EC_KEY *k; member
111 EC_KEY_free(pecdhctx->k); in ecdh_init()
112 pecdhctx->k = vecdh; in ecdh_init()
164 EC_KEY_free(pecdhctx->k); in ecdh_freectx()
190 dstctx->k= NULL; in ecdh_dupctx()
197 if (srcctx->k != NULL && !EC_KEY_up_ref(srcctx->k)) in ecdh_dupctx()
200 dstctx->k = srcctx->k; in ecdh_dupctx()
414 size_t ecdh_size(const EC_KEY *k) in ecdh_size() argument
419 if (k == NULL in ecdh_size()
487 privk = pecdhctx->k; in ecdh_plain_derive()
[all …]
/openssl-master/crypto/md5/
A Dmd5_local.h62 #define R0(a,b,c,d,k,s,t) { \ argument
63 a+=((k)+(t)+F((b),(c),(d))); \
67 #define R1(a,b,c,d,k,s,t) { \ argument
68 a+=((k)+(t)+G((b),(c),(d))); \
72 #define R2(a,b,c,d,k,s,t) { \ argument
73 a+=((k)+(t)+H((b),(c),(d))); \
77 #define R3(a,b,c,d,k,s,t) { \ argument
78 a+=((k)+(t)+I((b),(c),(d))); \
/openssl-master/crypto/
A Dpunycode.c46 unsigned int k = 0; in adapt() local
53 k = k + base; in adapt()
56 return k + (((base - tmin + 1) * delta) / (delta + skew)); in adapt()
152 unsigned int k, t; in ossl_punycode_decode() local
155 for (k = base;; k += base) { in ossl_punycode_decode()
168 t = (k <= bias) ? tmin : (k >= bias + tmax) ? tmax : k - bias; in ossl_punycode_decode()
/openssl-master/crypto/rc4/asm/
A Drc4-md5-x86_64.pl242 my $k=$i%$MOD;
254 #rc4# movl `4*(($k+1)%$MOD)`(`$k==$MOD-1?"$dat,$XX[0],4":"$XX[1]"`),$TX[1]#d
258 #rc4# movl $TY#d,4*$k($XX[1])
282 my $k=$i%$MOD;
294 #rc4# movl `4*(($k+1)%$MOD)`(`$k==$MOD-1?"$dat,$XX[0],4":"$XX[1]"`),$TX[1]#d
298 #rc4# movl $TY#d,4*$k($XX[1])
322 my $k=$i%$MOD;
334 #rc4# movl `4*(($k+1)%$MOD)`(`$k==$MOD-1?"$dat,$XX[0],4":"$XX[1]"`),$TX[1]#d
338 #rc4# movl $TY#d,4*$k($XX[1])
361 my $k=$i%$MOD;
[all …]
/openssl-master/crypto/md4/
A Dmd4_local.h50 #define R0(a,b,c,d,k,s,t) { \ argument
51 a+=((k)+(t)+F((b),(c),(d))); \
54 #define R1(a,b,c,d,k,s,t) { \ argument
55 a+=((k)+(t)+G((b),(c),(d))); \
58 #define R2(a,b,c,d,k,s,t) { \ argument
59 a+=((k)+(t)+H((b),(c),(d))); \
/openssl-master/crypto/dsa/
A Ddsa_ossl.c33 static BIGNUM *dsa_mod_inverse_fermat(const BIGNUM *k, const BIGNUM *q,
202 BIGNUM *k, *kinv = NULL, *r = *rp; in dsa_sign_setup() local
224 k = BN_new(); in dsa_sign_setup()
226 if (k == NULL || l == NULL) in dsa_sign_setup()
239 if (!bn_wexpand(k, q_words + 2) in dsa_sign_setup()
255 } while (BN_is_zero(k)); in dsa_sign_setup()
257 BN_set_flags(k, BN_FLG_CONSTTIME); in dsa_sign_setup()
281 if (!BN_add(l, k, dsa->params.q) in dsa_sign_setup()
282 || !BN_add(k, l, dsa->params.q)) in dsa_sign_setup()
313 BN_clear_free(k); in dsa_sign_setup()
[all …]
/openssl-master/test/recipes/04-test_pem_reading_data/
A Ddsa-onecolumn.pem31 k
148 k
173 k
186 k
198 k
330 k
352 k
411 k
475 k
490 k
[all …]
A Dcert-onecolumn.pem19 k
32 k
35 k
385 k
825 k
1075 k
1145 k
1216 k
1234 k
1249 k
[all …]
/openssl-master/crypto/ec/
A Dec_mult.c152 BIGNUM *k = NULL; in ossl_ec_scalar_mul_ladder() local
196 k = BN_CTX_get(ctx); in ossl_ec_scalar_mul_ladder()
197 if (k == NULL) { in ossl_ec_scalar_mul_ladder()
221 if (!BN_copy(k, scalar)) { in ossl_ec_scalar_mul_ladder()
226 BN_set_flags(k, BN_FLG_CONSTTIME); in ossl_ec_scalar_mul_ladder()
228 if ((BN_num_bits(k) > cardinality_bits) || (BN_is_negative(k))) { in ossl_ec_scalar_mul_ladder()
233 if (!BN_nnmod(k, k, cardinality, ctx)) { in ossl_ec_scalar_mul_ladder()
420 int k; in ossl_ec_wNAF_mul() local
722 for (k = max_len - 1; k >= 0; k--) { in ossl_ec_wNAF_mul()
941 size_t k; in ossl_ec_wNAF_precompute_mult() local
[all …]
A Decdsa_ossl.c79 BIGNUM *k = NULL, *r = NULL, *X = NULL; in ecdsa_sign_setup() local
108 k = BN_secure_new(); /* this value is later returned in *kinvp */ in ecdsa_sign_setup()
111 if (k == NULL || r == NULL || X == NULL) { in ecdsa_sign_setup()
123 if (!BN_set_bit(k, order_bits) in ecdsa_sign_setup()
132 if (!BN_generate_dsa_nonce(k, order, priv_key, in ecdsa_sign_setup()
138 if (!BN_priv_rand_range_ex(k, order, 0, ctx)) { in ecdsa_sign_setup()
143 } while (BN_is_zero(k)); in ecdsa_sign_setup()
146 if (!EC_POINT_mul(group, tmp_point, k, NULL, NULL, ctx)) { in ecdsa_sign_setup()
163 if (!ossl_ec_group_do_inverse_ord(group, k, k, ctx)) { in ecdsa_sign_setup()
173 *kinvp = k; in ecdsa_sign_setup()
[all …]
/openssl-master/crypto/rsa/
A Drsa_chk.c24 BIGNUM *i, *j, *k, *l, *m; in rsa_validate_keypair_multiprime() local
47 k = BN_new(); in rsa_validate_keypair_multiprime()
51 if (i == NULL || j == NULL || k == NULL || l == NULL in rsa_validate_keypair_multiprime()
129 if (!BN_sub(k, pinfo->r, BN_value_one())) { in rsa_validate_keypair_multiprime()
133 if (!BN_mul(l, l, k, ctx)) { in rsa_validate_keypair_multiprime()
137 if (!BN_gcd(m, m, k, ctx)) { in rsa_validate_keypair_multiprime()
142 if (!BN_div(k, NULL, l, m, ctx)) { /* remainder is 0 */ in rsa_validate_keypair_multiprime()
146 if (!BN_mod_mul(i, key->d, key->e, k, ctx)) { in rsa_validate_keypair_multiprime()
225 BN_free(k); in rsa_validate_keypair_multiprime()
/openssl-master/test/
A Dideatest.c25 static const unsigned char k[16] = { variable
65 IDEA_set_encrypt_key(k, &key); in test_idea_ecb()
81 IDEA_set_encrypt_key(k, &key); in test_idea_cbc()
83 memcpy(iv, k, sizeof(iv)); in test_idea_cbc()
85 memcpy(iv, k, sizeof(iv)); in test_idea_cbc()
A Dcurve448_internal_test.c653 uint8_t u[56], k[56], out[56]; in test_x448() local
666 memcpy(k, in_u3, sizeof(k)); in test_x448()
673 if (!TEST_true(ossl_x448(out, k, u))) in test_x448()
683 memcpy(u, k, sizeof(u)); in test_x448()
684 memcpy(k, out, sizeof(k)); in test_x448()
/openssl-master/ssl/
A Ds3_cbc.c177 num_starting_blocks, k, mac_end_offset, c, index_a, index_b; in ssl3_cbc_digest_record() local
321 k = 0; in ssl3_cbc_digest_record()
352 k = md_block_size * num_starting_blocks; in ssl3_cbc_digest_record()
387 if (k > 0) { in ssl3_cbc_digest_record()
409 for (i = 1; i < k / md_block_size - 1; i++) in ssl3_cbc_digest_record()
416 for (i = 1; i < k / md_block_size; i++) in ssl3_cbc_digest_record()
436 if (k < header_length) in ssl3_cbc_digest_record()
437 b = header[k]; in ssl3_cbc_digest_record()
438 else if (k < data_plus_mac_plus_padding_size + header_length) in ssl3_cbc_digest_record()
439 b = data[k - header_length]; in ssl3_cbc_digest_record()
[all …]
/openssl-master/crypto/x509/
A Dby_dir.c236 int i, j, k; in get_cert_by_subject_ex() local
285 k = hent->suffix; in get_cert_by_subject_ex()
288 k = 0; in get_cert_by_subject_ex()
292 k = 0; in get_cert_by_subject_ex()
318 "%s%08lx.%s%d", ent->dir, h, postfix, k); in get_cert_by_subject_ex()
323 "%s%c%08lx.%s%d", ent->dir, c, h, postfix, k); in get_cert_by_subject_ex()
345 k++; in get_cert_by_subject_ex()
379 hent->suffix = k; in get_cert_by_subject_ex()
387 } else if (hent->suffix < k) { in get_cert_by_subject_ex()
388 hent->suffix = k; in get_cert_by_subject_ex()
A Dv3_admis.c122 int i, j, k; in i2r_ADMISSION_SYNTAX() local
172 for (k = 0; k < sk_ASN1_STRING_num(pinfo->professionItems); k++) { in i2r_ADMISSION_SYNTAX()
173 ASN1_STRING* val = sk_ASN1_STRING_value(pinfo->professionItems, k); in i2r_ADMISSION_SYNTAX()
185 for (k = 0; k < sk_ASN1_OBJECT_num(pinfo->professionOIDs); k++) { in i2r_ADMISSION_SYNTAX()
186 ASN1_OBJECT* obj = sk_ASN1_OBJECT_value(pinfo->professionOIDs, k); in i2r_ADMISSION_SYNTAX()
/openssl-master/doc/man3/
A DX509_check_private_key.pod13 int X509_check_private_key(X509 *x, EVP_PKEY *k);
15 int X509_REQ_check_private_key(X509_REQ *x, EVP_PKEY *k);
20 key B<k> with the public key in B<x>.
35 The B<check_private_key> functions don't check if B<k> itself is indeed
38 of a key pair. So if you pass a public key to these functions in B<k>, it will

Completed in 49 milliseconds

1234567