/openssl-master/crypto/camellia/ |
A D | camellia.c | 305 s0 ^= k[0], s1 ^= k[1], s2 ^= k[2], s3 ^= k[3]; in Camellia_Ekeygen() 312 s0 ^= k[0], s1 ^= k[1], s2 ^= k[2], s3 ^= k[3]; in Camellia_Ekeygen() 318 k[4] = s0, k[5] = s1, k[6] = s2, k[7] = s3; in Camellia_Ekeygen() 332 s0 = k[0], s1 = k[1], s2 = k[2], s3 = k[3]; in Camellia_Ekeygen() 334 k[8] = s0, k[9] = s1, k[10] = s2, k[11] = s3; in Camellia_Ekeygen() 353 k[4] = s0, k[5] = s1, k[6] = s2, k[7] = s3; in Camellia_Ekeygen() 361 s0 = k[8], s1 = k[9], s2 = k[10], s3 = k[11]; in Camellia_Ekeygen() 363 k[8] = s0, k[9] = s1, k[10] = s2, k[11] = s3; in Camellia_Ekeygen() 381 s0 = k[0], s1 = k[1], s2 = k[2], s3 = k[3]; in Camellia_Ekeygen() 441 s2 ^= k[0], s3 ^= k[1], s0 ^= k[2], s1 ^= k[3]; in Camellia_EncryptBlock_Rounds() [all …]
|
/openssl-master/crypto/chacha/asm/ |
A D | chacha-ia64.pl | 57 { .mlx; ld4 @k[5]=[@k[11]],8 61 { .mlx; ld4 @k[7]=[@k[11]],8 64 ld4 @k[9]=[@k[11]],8 67 ld4 @k[11]=[@k[11]] 70 ld4 @k[13]=[@k[15]],8 73 ld4 @k[15]=[@k[15]] 76 mov @x[4]=@k[4] 214 { .mmi; add @k[12]=1,@k[12] // next counter 241 (p1) mov @x[$k-1]=@k[$k-1] };; 273 mov @k[5]=0 [all …]
|
/openssl-master/crypto/cast/ |
A D | c_enc.c | 22 const CAST_LONG *k; in CAST_encrypt() local 24 k = &(key->data[0]); in CAST_encrypt() 28 E_CAST(0, k, l, r, +, ^, -); in CAST_encrypt() 29 E_CAST(1, k, r, l, ^, -, +); in CAST_encrypt() 30 E_CAST(2, k, l, r, -, +, ^); in CAST_encrypt() 31 E_CAST(3, k, r, l, +, ^, -); in CAST_encrypt() 32 E_CAST(4, k, l, r, ^, -, +); in CAST_encrypt() 33 E_CAST(5, k, r, l, -, +, ^); in CAST_encrypt() 34 E_CAST(6, k, l, r, +, ^, -); in CAST_encrypt() 54 const CAST_LONG *k; in CAST_decrypt() local [all …]
|
/openssl-master/crypto/rc2/ |
A D | rc2_skey.c | 58 unsigned char *k; in RC2_set_key() local 62 k = (unsigned char *)&(key->data[0]); in RC2_set_key() 73 k[i] = data[i]; in RC2_set_key() 76 d = k[len - 1]; in RC2_set_key() 79 d = key_table[(k[j] + d) & 0xff]; in RC2_set_key() 80 k[i] = d; in RC2_set_key() 89 d = key_table[k[i] & c]; in RC2_set_key() 90 k[i] = d; in RC2_set_key() 92 d = key_table[k[i + j] ^ d]; in RC2_set_key() 93 k[i] = d; in RC2_set_key() [all …]
|
/openssl-master/apps/ |
A D | speed.c | 2063 for (k = 0; k < 3; k++) { in speed_main() 2089 for (k = 0; k < 3; k++) { in speed_main() 3126 for (k = 0; k < ALGOR_NUM; k++) { in speed_main() 3142 for (k = 0; k < RSA_NUM; k++) { in speed_main() 3158 for (k = 0; k < DSA_NUM; k++) { in speed_main() 3194 for (k = 0; k < EC_NUM; k++) { in speed_main() 3255 for (k = 0; k < FFDH_NUM; k++) { in speed_main() 3284 for (k = 0; k < RSA_NUM; k++) { in speed_main() 3291 for (k = 0; k < FFDH_NUM; k++) in speed_main() 3294 for (k = 0; k < DSA_NUM; k++) { in speed_main() [all …]
|
A D | list.c | 334 const EVP_KDF *k = sk_EVP_KDF_value(kdfs, i); in list_kdfs() local 349 const char *desc = EVP_KDF_get0_description(k); in list_kdfs() 354 EVP_KDF_gettable_params(k), 4); in list_kdfs() 533 OSSL_ENCODER *k = sk_OSSL_ENCODER_value(encoders, i); in list_encoders() local 546 OSSL_ENCODER_get0_properties(k)); in list_encoders() 598 OSSL_DECODER *k = sk_OSSL_DECODER_value(decoders, i); in list_decoders() local 611 OSSL_DECODER_get0_properties(k)); in list_decoders() 654 EVP_KEYMGMT *k = sk_EVP_KEYMGMT_value(km_stack, i); in list_keymanagers() local 662 const char *desc = EVP_KEYMGMT_get0_description(k); in list_keymanagers() 776 EVP_KEM *k = sk_EVP_KEM_value(kem_stack, i); in list_kems() local [all …]
|
A D | engine.c | 399 int k, n; in engine_main() local 422 for (k = 0; k < n; ++k) in engine_main() 423 if (!append_buf(&cap_buf, &cap_size, OBJ_nid2sn(nids[k]))) in engine_main() 431 for (k = 0; k < n; ++k) in engine_main() 432 if (!append_buf(&cap_buf, &cap_size, OBJ_nid2sn(nids[k]))) in engine_main() 440 for (k = 0; k < n; ++k) in engine_main() 441 if (!append_buf(&cap_buf, &cap_size, OBJ_nid2sn(nids[k]))) in engine_main()
|
/openssl-master/crypto/rc5/ |
A D | rc5_skey.c | 22 RC5_32_INT L[64], l, ll, A, B, *S, k; in RC5_32_set_key() local 43 k = len & 0x07; in RC5_32_set_key() 44 c2ln(data, l, ll, k); in RC5_32_set_key() 60 k = (S[ii] + A + B) & RC5_32_MASK; in RC5_32_set_key() 61 A = S[ii] = ROTATE_l32(k, 3); in RC5_32_set_key() 63 k = (L[jj] + A + B) & RC5_32_MASK; in RC5_32_set_key() 64 B = L[jj] = ROTATE_l32(k, m); in RC5_32_set_key()
|
/openssl-master/providers/implementations/exchange/ |
A D | ecdh_exch.c | 56 EC_KEY *k; member 111 EC_KEY_free(pecdhctx->k); in ecdh_init() 112 pecdhctx->k = vecdh; in ecdh_init() 164 EC_KEY_free(pecdhctx->k); in ecdh_freectx() 190 dstctx->k= NULL; in ecdh_dupctx() 197 if (srcctx->k != NULL && !EC_KEY_up_ref(srcctx->k)) in ecdh_dupctx() 200 dstctx->k = srcctx->k; in ecdh_dupctx() 414 size_t ecdh_size(const EC_KEY *k) in ecdh_size() argument 419 if (k == NULL in ecdh_size() 487 privk = pecdhctx->k; in ecdh_plain_derive() [all …]
|
/openssl-master/crypto/md5/ |
A D | md5_local.h | 62 #define R0(a,b,c,d,k,s,t) { \ argument 63 a+=((k)+(t)+F((b),(c),(d))); \ 67 #define R1(a,b,c,d,k,s,t) { \ argument 68 a+=((k)+(t)+G((b),(c),(d))); \ 72 #define R2(a,b,c,d,k,s,t) { \ argument 73 a+=((k)+(t)+H((b),(c),(d))); \ 77 #define R3(a,b,c,d,k,s,t) { \ argument 78 a+=((k)+(t)+I((b),(c),(d))); \
|
/openssl-master/crypto/ |
A D | punycode.c | 46 unsigned int k = 0; in adapt() local 53 k = k + base; in adapt() 56 return k + (((base - tmin + 1) * delta) / (delta + skew)); in adapt() 152 unsigned int k, t; in ossl_punycode_decode() local 155 for (k = base;; k += base) { in ossl_punycode_decode() 168 t = (k <= bias) ? tmin : (k >= bias + tmax) ? tmax : k - bias; in ossl_punycode_decode()
|
/openssl-master/crypto/rc4/asm/ |
A D | rc4-md5-x86_64.pl | 242 my $k=$i%$MOD; 254 #rc4# movl `4*(($k+1)%$MOD)`(`$k==$MOD-1?"$dat,$XX[0],4":"$XX[1]"`),$TX[1]#d 258 #rc4# movl $TY#d,4*$k($XX[1]) 282 my $k=$i%$MOD; 294 #rc4# movl `4*(($k+1)%$MOD)`(`$k==$MOD-1?"$dat,$XX[0],4":"$XX[1]"`),$TX[1]#d 298 #rc4# movl $TY#d,4*$k($XX[1]) 322 my $k=$i%$MOD; 334 #rc4# movl `4*(($k+1)%$MOD)`(`$k==$MOD-1?"$dat,$XX[0],4":"$XX[1]"`),$TX[1]#d 338 #rc4# movl $TY#d,4*$k($XX[1]) 361 my $k=$i%$MOD; [all …]
|
/openssl-master/crypto/md4/ |
A D | md4_local.h | 50 #define R0(a,b,c,d,k,s,t) { \ argument 51 a+=((k)+(t)+F((b),(c),(d))); \ 54 #define R1(a,b,c,d,k,s,t) { \ argument 55 a+=((k)+(t)+G((b),(c),(d))); \ 58 #define R2(a,b,c,d,k,s,t) { \ argument 59 a+=((k)+(t)+H((b),(c),(d))); \
|
/openssl-master/crypto/dsa/ |
A D | dsa_ossl.c | 33 static BIGNUM *dsa_mod_inverse_fermat(const BIGNUM *k, const BIGNUM *q, 202 BIGNUM *k, *kinv = NULL, *r = *rp; in dsa_sign_setup() local 224 k = BN_new(); in dsa_sign_setup() 226 if (k == NULL || l == NULL) in dsa_sign_setup() 239 if (!bn_wexpand(k, q_words + 2) in dsa_sign_setup() 255 } while (BN_is_zero(k)); in dsa_sign_setup() 257 BN_set_flags(k, BN_FLG_CONSTTIME); in dsa_sign_setup() 281 if (!BN_add(l, k, dsa->params.q) in dsa_sign_setup() 282 || !BN_add(k, l, dsa->params.q)) in dsa_sign_setup() 313 BN_clear_free(k); in dsa_sign_setup() [all …]
|
/openssl-master/test/recipes/04-test_pem_reading_data/ |
A D | dsa-onecolumn.pem | 31 k 148 k 173 k 186 k 198 k 330 k 352 k 411 k 475 k 490 k [all …]
|
A D | cert-onecolumn.pem | 19 k 32 k 35 k 385 k 825 k 1075 k 1145 k 1216 k 1234 k 1249 k [all …]
|
/openssl-master/crypto/ec/ |
A D | ec_mult.c | 152 BIGNUM *k = NULL; in ossl_ec_scalar_mul_ladder() local 196 k = BN_CTX_get(ctx); in ossl_ec_scalar_mul_ladder() 197 if (k == NULL) { in ossl_ec_scalar_mul_ladder() 221 if (!BN_copy(k, scalar)) { in ossl_ec_scalar_mul_ladder() 226 BN_set_flags(k, BN_FLG_CONSTTIME); in ossl_ec_scalar_mul_ladder() 228 if ((BN_num_bits(k) > cardinality_bits) || (BN_is_negative(k))) { in ossl_ec_scalar_mul_ladder() 233 if (!BN_nnmod(k, k, cardinality, ctx)) { in ossl_ec_scalar_mul_ladder() 420 int k; in ossl_ec_wNAF_mul() local 722 for (k = max_len - 1; k >= 0; k--) { in ossl_ec_wNAF_mul() 941 size_t k; in ossl_ec_wNAF_precompute_mult() local [all …]
|
A D | ecdsa_ossl.c | 79 BIGNUM *k = NULL, *r = NULL, *X = NULL; in ecdsa_sign_setup() local 108 k = BN_secure_new(); /* this value is later returned in *kinvp */ in ecdsa_sign_setup() 111 if (k == NULL || r == NULL || X == NULL) { in ecdsa_sign_setup() 123 if (!BN_set_bit(k, order_bits) in ecdsa_sign_setup() 132 if (!BN_generate_dsa_nonce(k, order, priv_key, in ecdsa_sign_setup() 138 if (!BN_priv_rand_range_ex(k, order, 0, ctx)) { in ecdsa_sign_setup() 143 } while (BN_is_zero(k)); in ecdsa_sign_setup() 146 if (!EC_POINT_mul(group, tmp_point, k, NULL, NULL, ctx)) { in ecdsa_sign_setup() 163 if (!ossl_ec_group_do_inverse_ord(group, k, k, ctx)) { in ecdsa_sign_setup() 173 *kinvp = k; in ecdsa_sign_setup() [all …]
|
/openssl-master/crypto/rsa/ |
A D | rsa_chk.c | 24 BIGNUM *i, *j, *k, *l, *m; in rsa_validate_keypair_multiprime() local 47 k = BN_new(); in rsa_validate_keypair_multiprime() 51 if (i == NULL || j == NULL || k == NULL || l == NULL in rsa_validate_keypair_multiprime() 129 if (!BN_sub(k, pinfo->r, BN_value_one())) { in rsa_validate_keypair_multiprime() 133 if (!BN_mul(l, l, k, ctx)) { in rsa_validate_keypair_multiprime() 137 if (!BN_gcd(m, m, k, ctx)) { in rsa_validate_keypair_multiprime() 142 if (!BN_div(k, NULL, l, m, ctx)) { /* remainder is 0 */ in rsa_validate_keypair_multiprime() 146 if (!BN_mod_mul(i, key->d, key->e, k, ctx)) { in rsa_validate_keypair_multiprime() 225 BN_free(k); in rsa_validate_keypair_multiprime()
|
/openssl-master/test/ |
A D | ideatest.c | 25 static const unsigned char k[16] = { variable 65 IDEA_set_encrypt_key(k, &key); in test_idea_ecb() 81 IDEA_set_encrypt_key(k, &key); in test_idea_cbc() 83 memcpy(iv, k, sizeof(iv)); in test_idea_cbc() 85 memcpy(iv, k, sizeof(iv)); in test_idea_cbc()
|
A D | curve448_internal_test.c | 653 uint8_t u[56], k[56], out[56]; in test_x448() local 666 memcpy(k, in_u3, sizeof(k)); in test_x448() 673 if (!TEST_true(ossl_x448(out, k, u))) in test_x448() 683 memcpy(u, k, sizeof(u)); in test_x448() 684 memcpy(k, out, sizeof(k)); in test_x448()
|
/openssl-master/ssl/ |
A D | s3_cbc.c | 177 num_starting_blocks, k, mac_end_offset, c, index_a, index_b; in ssl3_cbc_digest_record() local 321 k = 0; in ssl3_cbc_digest_record() 352 k = md_block_size * num_starting_blocks; in ssl3_cbc_digest_record() 387 if (k > 0) { in ssl3_cbc_digest_record() 409 for (i = 1; i < k / md_block_size - 1; i++) in ssl3_cbc_digest_record() 416 for (i = 1; i < k / md_block_size; i++) in ssl3_cbc_digest_record() 436 if (k < header_length) in ssl3_cbc_digest_record() 437 b = header[k]; in ssl3_cbc_digest_record() 438 else if (k < data_plus_mac_plus_padding_size + header_length) in ssl3_cbc_digest_record() 439 b = data[k - header_length]; in ssl3_cbc_digest_record() [all …]
|
/openssl-master/crypto/x509/ |
A D | by_dir.c | 236 int i, j, k; in get_cert_by_subject_ex() local 285 k = hent->suffix; in get_cert_by_subject_ex() 288 k = 0; in get_cert_by_subject_ex() 292 k = 0; in get_cert_by_subject_ex() 318 "%s%08lx.%s%d", ent->dir, h, postfix, k); in get_cert_by_subject_ex() 323 "%s%c%08lx.%s%d", ent->dir, c, h, postfix, k); in get_cert_by_subject_ex() 345 k++; in get_cert_by_subject_ex() 379 hent->suffix = k; in get_cert_by_subject_ex() 387 } else if (hent->suffix < k) { in get_cert_by_subject_ex() 388 hent->suffix = k; in get_cert_by_subject_ex()
|
A D | v3_admis.c | 122 int i, j, k; in i2r_ADMISSION_SYNTAX() local 172 for (k = 0; k < sk_ASN1_STRING_num(pinfo->professionItems); k++) { in i2r_ADMISSION_SYNTAX() 173 ASN1_STRING* val = sk_ASN1_STRING_value(pinfo->professionItems, k); in i2r_ADMISSION_SYNTAX() 185 for (k = 0; k < sk_ASN1_OBJECT_num(pinfo->professionOIDs); k++) { in i2r_ADMISSION_SYNTAX() 186 ASN1_OBJECT* obj = sk_ASN1_OBJECT_value(pinfo->professionOIDs, k); in i2r_ADMISSION_SYNTAX()
|
/openssl-master/doc/man3/ |
A D | X509_check_private_key.pod | 13 int X509_check_private_key(X509 *x, EVP_PKEY *k); 15 int X509_REQ_check_private_key(X509_REQ *x, EVP_PKEY *k); 20 key B<k> with the public key in B<x>. 35 The B<check_private_key> functions don't check if B<k> itself is indeed 38 of a key pair. So if you pass a public key to these functions in B<k>, it will
|