/openssl/crypto/sha/asm/ |
H A D | sha512-armv4.pl | 78 $inp="r1"; 349 ldrb $Tlo,[$inp,#7] 350 ldrb $t0, [$inp,#6] 351 ldrb $t1, [$inp,#5] 352 ldrb $t2, [$inp,#4] 353 ldrb $Thi,[$inp,#3] 354 ldrb $t3, [$inp,#2] 364 ldr $Tlo,[$inp,#4] 365 ldr $Thi,[$inp],#8 501 teq $inp,$len [all …]
|
H A D | sha1-thumb.pl | 44 $inp="r10"; 134 mov $inp,r1 @ save inp 136 add $len,$inp @ $len to point at inp end 158 mov $inp,$t1 @ update $inp 236 mov $t1,$inp @ restore inp
|
H A D | keccak1600-avx512vl.pl | 182 my ($A_flat,$inp,$len,$bsz) = ("%rdi","%rsi","%rdx","%rcx"); 183 my $out = $inp; # in squeeze 196 lea 96($inp),$inp 230 vpbroadcastq 0-96($inp),@T[0] 231 vmovdqu 8-96($inp),@T[1] 238 mov 8*$i-96($inp),%r8 244 lea ($inp,$bsz),$inp
|
H A D | keccak1600-avx2.pl | 281 my ($A_flat,$inp,$len,$bsz) = ("%rdi","%rsi","%rdx","%rcx"); 282 my $out = $inp; # in squeeze 295 lea 96($inp),$inp 321 vpbroadcastq 0-96($inp),@T[0] 322 vmovdqu 8-96($inp),@T[1] 329 mov 8*$i-96($inp),%r8 335 lea ($inp,$bsz),$inp
|
H A D | sha1-mips.pl | 96 $inp=$a1; 135 lw @X[$j],$j*4($inp) 137 lwl @X[$j],$j*4+$MSB($inp) 138 lwr @X[$j],$j*4+$LSB($inp) 145 lwl @X[$j],$j*4+$MSB($inp) 380 $PTR_ADD $num,$inp 393 lw @X[0],($inp) 396 lwl @X[0],$MSB($inp) 398 lwr @X[0],$LSB($inp) 420 $PTR_ADD $inp,64 [all …]
|
H A D | sha512-s390x.pl | 62 $inp="%r3"; 117 $LD $T1,`$i*$SZ`($inp) ### $i 256 lgr %r2,$inp 266 la $len,0($len,$inp) 295 la $inp,`16*$SZ`($inp) 312 cl${g} $inp,`$frame+4*$SIZE_T`($sp)
|
H A D | sha1-sparcv9.pl | 54 $inp="%i1"; 289 add $inp,$len,$len 300 andn $inp,7,$tmp0 316 and $inp,7,$tmp1 352 add $inp,64,$inp 354 cmp $inp,$len 368 andn $inp,7,$tmp0
|
H A D | sha1-s390x.pl | 61 $inp="%r3"; 86 lg $X[0],`$i*4`($inp) ### Xload($i) 184 lgr %r2,$inp 229 la $inp,64($inp)
|
/openssl/crypto/aes/asm/ |
H A D | aesni-sha256-x86_64.pl | 370 sub $inp,$out # re-bias 371 sub $inp,$in0 400 mov $inp,%r12 # borrow $a4 686 sub $inp,$out # re-bias 687 sub $inp,$in0 1001 sub $inp,$out # re-bias 1002 sub $inp,$in0 1415 movdqu ($inp),@MSG[0] 1416 movdqu 0x10($inp),@MSG[1] 1417 movdqu 0x20($inp),@MSG[2] [all …]
|
/openssl/crypto/poly1305/asm/ |
H A D | poly1305-ppc.pl | 115 $UCMP $inp,r0 120 ld $d1,8($inp) 186 ld $t1,8($inp) 200 addi $inp,$inp,16 387 $UCMP $inp,r0 392 lw $h1,4($inp) 393 lw $h2,8($inp) 496 addi $inp,$inp,16 1405 addi $inp,$inp,0x40 1626 addi $inp,$inp,0x40 [all …]
|
H A D | poly1305-x86_64.pl | 269 lea 16($inp),$inp 606 lea 16($inp),$inp 713 lea 16($inp),$inp 993 lea 16*4($inp),$inp 1531 lea 16($inp),$inp 1644 lea 16($inp),$inp 1789 lea 16*4($inp),$inp 1885 lea 16*4($inp),$inp 2276 lea 16*8($inp),$inp 2859 lea 16($inp),$inp [all …]
|
H A D | poly1305-armv8.pl | 53 my ($mac,$nonce)=($inp,$len); 76 cmp $inp,xzr 86 ldp $r0,$r1,[$inp] // load key 137 ldp $t0,$t1,[$inp],#16 // load input 337 ldp $d0,$d1,[$inp],#16 // load input 444 add $in2,$inp,#32 456 add $in2,$inp,#32 508 ldp x8,x12,[$inp],#16 // inp[0:1] 509 ldp x9,x13,[$inp],#48 635 ldp x8,x12,[$inp],#16 // inp[0:1] [all …]
|
/openssl/test/ |
H A D | bio_enc_test.c | 42 static unsigned char inp[BUF_SIZE] = { 0 }; in do_bio_cipher() local 47 if (!TEST_int_gt(RAND_bytes(inp, DATA_SIZE), 0)) in do_bio_cipher() 58 mem = BIO_new_mem_buf(inp, DATA_SIZE); in do_bio_cipher() 74 mem = BIO_new_mem_buf(inp, DATA_SIZE); in do_bio_cipher() 106 mem = BIO_new_mem_buf(inp, DATA_SIZE); in do_bio_cipher() 140 if (!TEST_mem_eq(inp, DATA_SIZE, out, len)) in do_bio_cipher() 167 if (!TEST_mem_eq(inp, DATA_SIZE, out, len)) { in do_bio_cipher() 194 if (!TEST_mem_eq(inp, DATA_SIZE, out, len)) { in do_bio_cipher()
|
/openssl/crypto/modes/asm/ |
H A D | ghash-armv4.pl | 100 $inp="r2"; 116 $rem_4bit=$inp; # used in gcm_gmult_4bit 190 add $len,$inp,$len @ $len to point at the end 196 ldrb $nlo,[$inp,#15] 207 ldrb $nlo,[$inp,#14] 241 ldrplb $nlo,[$inp,$cnt] 275 add $inp,$inp,#16 278 &Zsmash("cmp\t$inp,$len","\n". 282 " ldrneb $nlo,[$inp,#15]"); 488 vld1.64 $IN#hi,[$inp]! @ load inp [all …]
|
H A D | ghash-s390x.pl | 69 $inp="%r4"; 127 .long 0xb93e0004 # kimd %r0,$inp 150 xg $Zhi,0($inp) # Xi ^= inp 151 xg $Zlo,8($inp) 231 la $inp,16($inp)
|
H A D | aesni-gcm-x86_64.pl | 349 vpxor 0x00($inp),$T1,$T2 351 vpxor 0x10($inp),$T1,$Ii 353 vpxor 0x20($inp),$T1,$Z1 366 lea 0x60($inp),$inp 477 lea ($inp),$in0 478 vmovdqu 0x40($inp),$Z0 480 vmovdqu 0x30($inp),$Z1 483 vmovdqu 0x20($inp),$Z2 485 vmovdqu 0x10($inp),$T2 487 vmovdqu ($inp),$Hkey [all …]
|
H A D | ghash-parisc.pl | 65 $inp="%r24"; 121 addl $inp,$len,$len 374 addl $inp,$len,$len 391 ldb 15($inp),$nhi 403 ldb 14($inp),$byte 430 ldbx $cnt($inp),$byte 477 ldo 16($inp),$inp 494 ldb 15($inp),$byte 505 ldb 14($inp),$byte 541 ldbx $cnt($inp),$byte [all …]
|
H A D | ghash-c64xplus.pl | 31 ($Xip,$Htable,$inp,$len)=("A4","B4","A6","B6"); # arguments 98 || [B0] LDNDW *${inp}[1],$H1x:$H0x 100 || [B0] LDNDW *${inp}++[2],$H3x:$H2x 200 [B0] LDNDW *${inp}[1],$H1x:$H0x ; 8/- 201 [B0] LDNDW *${inp}++[2],$H3x:$H2x ; 9/-
|
/openssl/crypto/ec/asm/ |
H A D | ecp_nistz256-sparcv9.pl | 1366 ld [$inp+4],%l1 1367 ld [$inp+8],%l2 1373 add $inp,32,$inp 1392 add $inp,32,$inp 1437 add $inp,$index,$inp 1447 add $inp,64*8,$inp 1474 add $inp,64*8,$inp 1533 ld [$inp],%l0 1534 add $inp,4,$inp 1562 add $inp,$index,$inp [all …]
|
/openssl/providers/implementations/digests/ |
H A D | sha3_prov.c | 68 static int keccak_update(void *vctx, const unsigned char *inp, size_t len) in keccak_update() argument 83 memcpy(ctx->buf + num, inp, len); in keccak_update() 88 memcpy(ctx->buf + num, inp, rem); in keccak_update() 90 inp += rem; in keccak_update() 96 rem = ctx->meth.absorb(ctx, inp, len); in keccak_update() 99 memcpy(ctx->buf, inp + len - rem, rem); in keccak_update() 123 static size_t generic_sha3_absorb(void *vctx, const void *inp, size_t len) in generic_sha3_absorb() argument 127 return SHA3_absorb(ctx->A, inp, len, ctx->block_size); in generic_sha3_absorb() 150 static size_t s390x_sha3_absorb(void *vctx, const void *inp, size_t len) in s390x_sha3_absorb() argument 155 s390x_kimd(inp, len - rem, ctx->pad, ctx->A); in s390x_sha3_absorb()
|
/openssl/include/openssl/ |
H A D | whrlpool.h | 49 const void *inp, size_t bytes); 51 const void *inp, size_t bits); 53 OSSL_DEPRECATEDIN_3_0 unsigned char *WHIRLPOOL(const void *inp, size_t bytes,
|
/openssl/crypto/chacha/asm/ |
H A D | chacha-s390x.pl | 286 la ("%r14","0($inp)"); 573 la ($inp,"0x40($inp)"); 600 la ($inp,"0x40($inp)"); 627 la ($inp,"0x40($inp)"); 836 vlm ($t0,$t3,"0($inp)"); 847 la ($inp,"0x40($inp)"); 872 la ($inp,"0x40($inp)"); 898 la ($inp,"0x40($inp)"); 926 la ($inp,"0x40($inp)"); 955 la ($inp,"0x40($inp)"); [all …]
|
H A D | chacha-ia64.pl | 24 my ($out,$inp,$len,$key,$counter) = map("r$_",(32..36)); 221 { .mmi; (p0) ld1 @z[0]=[$inp],1 223 { .mmi; (p1) ld1 @z[1]=[$inp],1 225 { .mmi; (p2) ld1 @z[2]=[$inp],1 234 { .mmi; (p$i3) ld1 @z[3]=[$inp],1 237 { .mmi; (p$i4) ld1 @z[0]=[$inp],1 242 { .mfi; (p$i5) ld1 @z[1]=[$inp],1 246 { .mfi; (p$i6) ld1 @z[2]=[$inp],1 260 { .mmi; (p63) ld1 @z[3]=[$inp],1
|
/openssl/crypto/poly1305/ |
H A D | poly1305_ppc.c | 16 void poly1305_blocks(void *ctx, const unsigned char *inp, size_t len, 21 void poly1305_blocks_fpu(void *ctx, const unsigned char *inp, size_t len, 26 void poly1305_blocks_vsx(void *ctx, const unsigned char *inp, size_t len,
|
/openssl/engines/ |
H A D | e_padlock.c | 208 void padlock_aes_block(void *out, const void *inp, 210 int padlock_ecb_encrypt(void *out, const void *inp, 212 int padlock_cbc_encrypt(void *out, const void *inp, 214 int padlock_cfb_encrypt(void *out, const void *inp, 216 int padlock_ofb_encrypt(void *out, const void *inp, 218 int padlock_ctr32_encrypt(void *out, const void *inp, 221 void padlock_sha1_oneshot(void *ctx, const void *inp, size_t len); 222 void padlock_sha1(void *ctx, const void *inp, size_t len); 223 void padlock_sha256_oneshot(void *ctx, const void *inp, size_t len); 224 void padlock_sha256(void *ctx, const void *inp, size_t len);
|