/openssl/crypto/sha/ |
H A D | sha3.c | 32 if (bsz <= sizeof(ctx->buf)) { in ossl_sha3_init() 34 ctx->block_size = bsz; in ossl_sha3_init() 66 rem = bsz - num; in ossl_sha3_update() 80 (void)SHA3_absorb(ctx->A, ctx->buf, bsz, bsz); in ossl_sha3_update() 85 if (len >= bsz) in ossl_sha3_update() 121 ctx->buf[bsz - 1] |= 0x80; in ossl_sha3_final() 123 (void)SHA3_absorb(ctx->A, ctx->buf, bsz, bsz); in ossl_sha3_final() 167 (void)SHA3_absorb(ctx->A, ctx->buf, bsz, bsz); in ossl_sha3_squeeze() 191 if (outlen >= bsz) { in ossl_sha3_squeeze() 192 len = bsz * (outlen / bsz); in ossl_sha3_squeeze() [all …]
|
/openssl/crypto/sha/asm/ |
H A D | keccak1600p8-ppc.pl | 378 my ($A_jagged,$inp,$len,$bsz) = map("r$_",(3..6)); 477 $UCMP $len,$bsz ; len < bsz? 480 sub $len,$len,$bsz ; len -= bsz 481 srwi r0,$bsz,3 685 my ($A_jagged,$out,$len,$bsz) = map("r$_",(3..6)); 695 mr r10,$bsz 750 mr r10,$bsz
|
H A D | keccak1600-avx512vl.pl | 182 my ($A_flat,$inp,$len,$bsz) = ("%rdi","%rsi","%rdx","%rcx"); 225 mov $bsz,%rax 226 sub $bsz,$len 244 lea ($inp,$bsz),$inp 271 lea ($len,$bsz),%rax # return value 283 shr \$3,$bsz 303 mov $bsz,%rax 332 mov $bsz,%rax
|
H A D | keccak1600-avx2.pl | 281 my ($A_flat,$inp,$len,$bsz) = ("%rdi","%rsi","%rdx","%rcx"); 316 mov $bsz,%rax 317 sub $bsz,$len 335 lea ($inp,$bsz),$inp 362 lea ($len,$bsz),%rax # return value 373 shr \$3,$bsz 386 mov $bsz,%rax 415 mov $bsz,%rax
|
H A D | keccak1600-avx512.pl | 279 my ($A_flat,$inp,$len,$bsz) = ("%rdi","%rsi","%rdx","%rcx"); 346 mov $bsz,%rax 347 sub $bsz,$len 362 lea ($inp,$bsz),$inp 385 lea ($len,$bsz),%rax # return value 396 cmp $bsz,$len 440 shr \$3,$bsz 442 mov $bsz,%rax 473 mov $bsz,%rax
|
H A D | keccak1600-x86_64.pl | 412 { my ($A_flat,$inp,$len,$bsz) = ("%rdi","%rsi","%rdx","%rcx"); 448 mov $bsz,216-100(%rsi) # save bsz 451 cmp $bsz,$len 454 shr \$3,$bsz 464 sub \$1,$bsz 472 mov 216-100(%rsi),$bsz # pull bsz 506 { my ($A_flat,$out,$len,$bsz,$next) = ("%rdi","%rsi","%rdx","%rcx","%r8"); 507 ($out,$len,$bsz) = ("%r12","%r13","%r14"); 526 mov %rcx,$bsz 548 mov $bsz,%rcx
|
H A D | keccak1600-s390x.pl | 395 { my ($A_flat,$inp,$len,$bsz) = map("%r$_",(2..5)); 427 cl${g}r $len,$bsz 430 srl${g} $bsz,3 440 brct $bsz,.Lblock_absorb 445 lm${g} $inp,$bsz,$frame+3*$SIZE_T($sp) 475 { my ($A_flat,$out,$len,$bsz,$next) = map("%r$_",(2..6)); 482 srl${g} $bsz,3 485 st${g} $bsz,5*$SIZE_T($sp) 503 brct $bsz,.Loop_squeeze # bsz-- 508 lm${g} $out,$bsz,3*$SIZE_T($sp)
|
H A D | keccak1600-armv8.pl | 470 my ($A_flat,$out,$len,$bsz) = map("x$_",(19..22)); 485 mov $bsz,x3 506 mov x3,$bsz 699 my ($ctx,$inp,$len,$bsz) = map("x$_",(0..3)); 726 subs $len,$len,$bsz // len - bsz 737 cmp $bsz,#8*($i+2) 771 add x0,$len,$bsz // return value 784 my ($ctx,$out,$len,$bsz) = map("x$_",(0..3)); 794 mov x10,$bsz 813 mov x10,$bsz
|
H A D | keccak1600-armv4.pl | 752 { my ($A_flat,$inp,$len,$bsz) = map("r$_",(10..12,14)); 790 mov $bsz,r3 832 subs r0,$len,$bsz 896 subs $bsz,$bsz,#8 936 { my ($out,$len,$A_flat,$bsz,$next) = map("r$_", (4,5,10,12,0)); 955 mov $bsz,r3 1049 subs $bsz,$bsz,#8 @ bsz -= 8
|
H A D | keccak1600-ppc64.pl | 652 my ($A_flat,$out,$len,$bsz) = map("r$_",(28..31)); 670 mr $bsz,r6 707 mr r6,$bsz
|
/openssl/providers/implementations/digests/ |
H A D | sha3_prov.c | 76 const size_t bsz = ctx->block_size; in keccak_update() local 85 rem = bsz - num; in keccak_update() 97 ctx->meth.absorb(ctx, ctx->buf, bsz); in keccak_update() 291 size_t bsz = ctx->block_size; in s390x_keccakc_final() local 306 memset(ctx->buf + num, 0, bsz - num); in s390x_keccakc_final() 308 ctx->buf[bsz - 1] |= 0x80; in s390x_keccakc_final() 309 s390x_kimd(ctx->buf, bsz, fc, ctx->A); in s390x_keccakc_final() 310 num = needed > bsz ? bsz : needed; in s390x_keccakc_final() 314 s390x_klmd(NULL, 0, out + bsz, needed, in s390x_keccakc_final()
|