| /crypto/perlasm/ |
| A D | sparcv9_modes.pl | 42 my ($alg,$bits) = @_; 93 .L${bits}_cbc_enc_loop: 195 .L${bits}cbc_enc_blk: 255 .size ${alg}${bits}_t4_cbc_encrypt,.-${alg}${bits}_t4_cbc_encrypt 260 my ($alg,$bits) = @_; 528 .L${bits}cbc_dec_blk: 617 .size ${alg}${bits}_t4_cbc_decrypt,.-${alg}${bits}_t4_cbc_decrypt 622 my ($alg,$bits) = @_; 666 .L${bits}_ctr32_loop: 831 .L${bits}_ctr32_blk: [all …]
|
| /crypto/whrlpool/ |
| A D | wp_dgst.c | 104 c->bitlen[0] += bits; in WHIRLPOOL_BitUpdate() 115 while (bits) { in WHIRLPOOL_BitUpdate() 119 bits %= WHIRLPOOL_BBLOCK; in WHIRLPOOL_BitUpdate() 124 if (bits >= bitrem) { in WHIRLPOOL_BitUpdate() 125 bits -= bitrem; in WHIRLPOOL_BitUpdate() 134 bits = 0; in WHIRLPOOL_BitUpdate() 154 while (bits) { in WHIRLPOOL_BitUpdate() 164 bits -= inpgap; in WHIRLPOOL_BitUpdate() 175 if (bits > 8) { in WHIRLPOOL_BitUpdate() 183 bits -= 8; in WHIRLPOOL_BitUpdate() [all …]
|
| /crypto/asn1/ |
| A D | a_bitstr.c | 23 int ret, j, bits, len; in ossl_i2c_ASN1_BIT_STRING() local 41 bits = 0; in ossl_i2c_ASN1_BIT_STRING() 45 bits = 0; in ossl_i2c_ASN1_BIT_STRING() 47 bits = 1; in ossl_i2c_ASN1_BIT_STRING() 49 bits = 2; in ossl_i2c_ASN1_BIT_STRING() 51 bits = 3; in ossl_i2c_ASN1_BIT_STRING() 53 bits = 4; in ossl_i2c_ASN1_BIT_STRING() 55 bits = 5; in ossl_i2c_ASN1_BIT_STRING() 57 bits = 6; in ossl_i2c_ASN1_BIT_STRING() 59 bits = 7; in ossl_i2c_ASN1_BIT_STRING() [all …]
|
| /crypto/bn/ |
| A D | bn_prime.c | 76 if (bits <= 512) in calc_trial_divisions() 78 else if (bits <= 1024) in calc_trial_divisions() 80 else if (bits <= 2048) in calc_trial_divisions() 82 else if (bits <= 4096) in calc_trial_divisions() 94 static int bn_mr_min_checks(int bits) in bn_mr_min_checks() argument 96 if (bits > 2048) in bn_mr_min_checks() 131 int checks = bn_mr_min_checks(bits); in BN_generate_prime_ex2() 133 if (bits < 2) { in BN_generate_prime_ex2() 137 } else if (add == NULL && safe && bits < 6 && bits != 3) { in BN_generate_prime_ex2() 531 if (BN_num_bits(rnd) != bits) in probable_prime() [all …]
|
| A D | bn_rand.c | 30 if (bits == 0) { in bnrand() 36 if (bits < 0 || (bits == 1 && top > 0)) in bnrand() 39 bytes = (bits + 7) / 8; in bnrand() 40 bit = (bits - 1) % 8; in bnrand() 100 int BN_rand_ex(BIGNUM *rnd, int bits, int top, int bottom, in BN_rand_ex() argument 106 int BN_rand(BIGNUM *rnd, int bits, int top, int bottom) in BN_rand() argument 108 return bnrand(NORMAL, rnd, bits, top, bottom, 0, NULL); in BN_rand() 113 return bnrand(TESTING, rnd, bits, top, bottom, 0, NULL); in BN_bntest_rand() 124 int BN_priv_rand(BIGNUM *rnd, int bits, int top, int bottom) in BN_priv_rand() argument 126 return bnrand(PRIVATE, rnd, bits, top, bottom, 0, NULL); in BN_priv_rand() [all …]
|
| A D | bn_exp.c | 51 int i, bits, ret = 0; in BN_exp() local 69 bits = BN_num_bits(p); in BN_exp() 187 bits = BN_num_bits(p); in BN_mod_exp_recp() 188 if (bits == 0) { in BN_mod_exp_recp() 340 if (bits == 0) { in BN_mod_exp_mont() 643 if (bits == 0) { in bn_mod_exp_mont_fixed_top() 880 bits -= window0; in bn_mod_exp_mont_fixed_top() 1012 bits -= window0; in bn_mod_exp_mont_fixed_top() 1088 bits -= window0; in bn_mod_exp_mont_fixed_top() 1216 if (bits == 0) { in BN_mod_exp_mont_word() [all …]
|
| A D | bn_mpi.c | 16 int bits; in BN_bn2mpi() local 21 bits = BN_num_bits(a); in BN_bn2mpi() 22 num = (bits + 7) / 8; in BN_bn2mpi() 23 if (bits > 0) { in BN_bn2mpi() 24 ext = ((bits & 0x07) == 0); in BN_bn2mpi()
|
| A D | bn_rsa_fips186_4.c | 282 int bits = nlen >> 1; in ossl_bn_rsa_fips186_4_derive_prime() local 311 if (bits < BN_num_bits(&ossl_bn_inv_sqrt_2)) in ossl_bn_rsa_fips186_4_derive_prime() 314 bits - BN_num_bits(&ossl_bn_inv_sqrt_2)) in ossl_bn_rsa_fips186_4_derive_prime() 315 || !BN_lshift(range, BN_value_one(), bits) in ossl_bn_rsa_fips186_4_derive_prime() 352 imax = 20 * bits; /* max = 20/2 * nbits */ in ossl_bn_rsa_fips186_4_derive_prime() 369 if (BN_num_bits(Y) > bits) { in ossl_bn_rsa_fips186_4_derive_prime()
|
| A D | bn_lib.c | 104 int bits = (l != 0); in BN_num_bits_word() local 110 bits += 32 & mask; in BN_num_bits_word() 117 bits += 16 & mask; in BN_num_bits_word() 123 bits += 8 & mask; in BN_num_bits_word() 129 bits += 4 & mask; in BN_num_bits_word() 135 bits += 2 & mask; in BN_num_bits_word() 141 bits += 1 & mask; in BN_num_bits_word() 143 return bits; in BN_num_bits_word() 1020 bits = N / 2; in BN_security_bits() 1021 if (bits < 80) in BN_security_bits() [all …]
|
| A D | bn_depr.c | 22 BIGNUM *BN_generate_prime(BIGNUM *ret, int bits, int safe, in BN_generate_prime() argument 36 if (!BN_generate_prime_ex(rnd, bits, safe, add, rem, &cb)) in BN_generate_prime()
|
| /crypto/rc2/ |
| A D | rc2_skey.c | 55 void RC2_set_key(RC2_KEY *key, int len, const unsigned char *data, int bits) in RC2_set_key() argument 67 if (bits <= 0) in RC2_set_key() 68 bits = 1024; in RC2_set_key() 69 if (bits > 1024) in RC2_set_key() 70 bits = 1024; in RC2_set_key() 85 j = (bits + 7) >> 3; in RC2_set_key() 87 c = (0xff >> (-bits & 0x07)); in RC2_set_key()
|
| /crypto/ec/ |
| A D | ecp_s390x_nistp.c | 290 #define EC_GFP_S390X_NISTP_METHOD(bits) \ argument 292 static int ec_GFp_s390x_nistp##bits##_mul(const EC_GROUP *group, \ 302 S390X_SCALAR_MULTIPLY_P##bits, \ 303 S390X_SIZE_P##bits); \ 306 static ECDSA_SIG *ecdsa_s390x_nistp##bits##_sign_sig(const unsigned \ 314 S390X_ECDSA_SIGN_P##bits, \ 315 S390X_SIZE_P##bits); \ 318 static int ecdsa_s390x_nistp##bits##_verify_sig(const \ 325 S390X_ECDSA_VERIFY_P##bits, \ 326 S390X_SIZE_P##bits); \ [all …]
|
| A D | ecp_nistp224.c | 1148 u64 bits; in batch_mul() local 1169 bits = get_bit(g_scalar, i + 196) << 3; in batch_mul() 1170 bits |= get_bit(g_scalar, i + 140) << 2; in batch_mul() 1171 bits |= get_bit(g_scalar, i + 84) << 1; in batch_mul() 1172 bits |= get_bit(g_scalar, i + 28); in batch_mul() 1186 bits = get_bit(g_scalar, i + 168) << 3; in batch_mul() 1187 bits |= get_bit(g_scalar, i + 112) << 2; in batch_mul() 1188 bits |= get_bit(g_scalar, i + 56) << 1; in batch_mul() 1189 bits |= get_bit(g_scalar, i); in batch_mul() 1205 bits |= get_bit(scalars[num], i) << 1; in batch_mul() [all …]
|
| /crypto/camellia/ |
| A D | cmll_misc.c | 20 int Camellia_set_key(const unsigned char *userKey, const int bits, in Camellia_set_key() argument 25 if (bits != 128 && bits != 192 && bits != 256) in Camellia_set_key() 27 key->grand_rounds = Camellia_Ekeygen(bits, userKey, key->u.rd_key); in Camellia_set_key()
|
| /crypto/dsa/ |
| A D | dsa_gen.c | 47 int DSA_generate_parameters_ex(DSA *dsa, int bits, in DSA_generate_parameters_ex() argument 53 return dsa->meth->dsa_paramgen(dsa, bits, seed_in, seed_len, in DSA_generate_parameters_ex() 61 if (bits < 2048 && seed_len <= 20) { in DSA_generate_parameters_ex() 63 bits, 160, cb)) in DSA_generate_parameters_ex() 67 bits, 0, cb)) in DSA_generate_parameters_ex()
|
| A D | dsa_depr.c | 31 DSA *DSA_generate_parameters(int bits, in DSA_generate_parameters() argument 48 if (DSA_generate_parameters_ex(ret, bits, seed_in, seed_len, in DSA_generate_parameters()
|
| /crypto/rsa/ |
| A D | rsa_gen.c | 44 return rsa->meth->rsa_keygen(rsa, bits, e_value, cb); in RSA_generate_key_ex() 50 int RSA_generate_multi_prime_key(RSA *rsa, int bits, int primes, in RSA_generate_multi_prime_key() argument 56 return rsa->meth->rsa_multi_prime_keygen(rsa, bits, primes, in RSA_generate_multi_prime_key() 66 return rsa->meth->rsa_keygen(rsa, bits, e_value, cb); in RSA_generate_multi_prime_key() 82 int ossl_rsa_multiprime_derive(RSA *rsa, int bits, int primes, in DEFINE_STACK_OF() 263 static int rsa_multiprime_keygen(RSA *rsa, int bits, int primes, in rsa_multiprime_keygen() argument 279 if (bits < RSA_MIN_MODULUS_BITS) { in rsa_multiprime_keygen() 321 quo = bits / primes; in rsa_multiprime_keygen() 322 rmd = bits % primes; in rsa_multiprime_keygen() 561 if (!ossl_rsa_multiprime_derive(rsa, bits, primes, e_value, in rsa_multiprime_keygen() [all …]
|
| A D | rsa_mp.c | 98 int ossl_rsa_multip_cap(int bits) in ossl_rsa_multip_cap() argument 102 if (bits < 1024) in ossl_rsa_multip_cap() 104 else if (bits < 4096) in ossl_rsa_multip_cap() 106 else if (bits < 8192) in ossl_rsa_multip_cap()
|
| A D | rsa_local.h | 144 int (*rsa_keygen) (RSA *rsa, int bits, BIGNUM *e, BN_GENCB *cb); 145 int (*rsa_multi_prime_keygen) (RSA *rsa, int bits, int primes, 152 int ossl_rsa_multiprime_derive(RSA *rsa, int bits, int primes, 166 int ossl_rsa_multip_cap(int bits);
|
| A D | rsa_depr.c | 29 RSA *RSA_generate_key(int bits, unsigned long e_value, in RSA_generate_key() argument 52 if (RSA_generate_key_ex(rsa, bits, e, cb)) { in RSA_generate_key()
|
| A D | rsa_meth.c | 263 (RSA *rsa, int bits, BIGNUM *e, BN_GENCB *cb) in RSA_meth_get_keygen() 269 int (*keygen) (RSA *rsa, int bits, BIGNUM *e, in RSA_meth_set_keygen() argument 277 (RSA *rsa, int bits, int primes, BIGNUM *e, BN_GENCB *cb) in RSA_meth_get_multi_prime_keygen() 283 int (*keygen) (RSA *rsa, int bits, in RSA_meth_set_multi_prime_keygen() argument
|
| /crypto/ml_kem/ |
| A D | ml_kem.c | 113 DECLARE_ML_KEM_PUBKEYDATA(pubkey_##bits, ML_KEM_##bits##_RANK); \ 114 DECLARE_ML_KEM_PRVKEYDATA(prvkey_##bits, ML_KEM_##bits##_RANK) 653 if (used + bits < 64) { in scalar_encode() 655 used += bits; in scalar_encode() 706 if (todo == bits && accum_bits >= bits) { in scalar_decode() 709 accum >>= bits; in scalar_decode() 710 accum_bits -= bits; in scalar_decode() 717 todo = bits; in scalar_decode() 842 uint32_t power = 1 << bits; in decompress() 896 int stride = bits * DEGREE / 8; in vector_encode() [all …]
|
| /crypto/aria/ |
| A D | aria.c | 546 int Nr = (bits + 256) / 32; in ossl_aria_set_encrypt_key() 551 if (bits != 128 && bits != 192 && bits != 256) { in ossl_aria_set_encrypt_key() 557 ck = &Key_RC[(bits - 128) / 64][0]; in ossl_aria_set_encrypt_key() 571 if (bits > 128) { in ossl_aria_set_encrypt_key() 574 if (bits > 192) { in ossl_aria_set_encrypt_key() 653 if (bits > 128) { in ossl_aria_set_encrypt_key() 659 if (bits > 192) { in ossl_aria_set_encrypt_key() 679 const int r = ossl_aria_set_encrypt_key(userKey, bits, key); in ossl_aria_set_decrypt_key() 930 const unsigned int bytes = n / 8, bits = n % 8; in rotnr() local 937 o->c[i] = ((t.c[i] >> bits) | in rotnr() [all …]
|
| /crypto/aes/ |
| A D | aes_core.c | 638 if (bits != 128 && bits != 192 && bits != 256) in AES_set_encrypt_key() 643 if (bits == 128) in AES_set_encrypt_key() 1288 if (bits != 128 && bits != 192 && bits != 256) in AES_set_encrypt_key() 1293 if (bits == 128) in AES_set_encrypt_key() 1304 if (bits == 128) { in AES_set_encrypt_key() 1324 if (bits == 192) { in AES_set_encrypt_key() 1346 if (bits == 256) { in AES_set_encrypt_key() 1866 if (bits != 128 && bits != 192 && bits != 256) in AES_set_encrypt_key() 1871 if (bits == 128) in AES_set_encrypt_key() 1882 if (bits == 128) { in AES_set_encrypt_key() [all …]
|
| /crypto/slh_dsa/ |
| A D | slh_fors.c | 309 uint32_t bits = 0; in slh_base_2b() local 314 while (bits < b) { in slh_base_2b() 317 bits += 8; in slh_base_2b() 319 bits -= b; in slh_base_2b() 320 *out++ = (total >> bits) & mask; in slh_base_2b()
|