/openssl/crypto/bn/ |
H A D | bn_blind.c | 17 BIGNUM *A; member 48 if (A != NULL) { in BN_BLINDING_new() 49 if ((ret->A = BN_dup(A)) == NULL) in BN_BLINDING_new() 83 BN_free(r->A); in BN_BLINDING_free() 95 if ((b->A == NULL) || (b->Ai == NULL)) { in BN_BLINDING_update() 111 || !bn_mul_mont_fixed_top(b->A, b->A, b->A, b->m_ctx, ctx)) in BN_BLINDING_update() 115 || !BN_mod_mul(b->A, b->A, b->A, b->mod, ctx)) in BN_BLINDING_update() 253 if (ret->A == NULL && (ret->A = BN_new()) == NULL) in BN_BLINDING_create_param() 290 if (!ret->bn_mod_exp(ret->A, ret->A, ret->e, ret->mod, ctx, ret->m_ctx)) in BN_BLINDING_create_param() 293 if (!BN_mod_exp(ret->A, ret->A, ret->e, ret->mod, ctx)) in BN_BLINDING_create_param() [all …]
|
H A D | bn_gcd.c | 34 A = BN_CTX_get(ctx); in bn_mod_inverse_no_branch() 56 if (BN_copy(A, n) == NULL) in bn_mod_inverse_no_branch() 58 A->neg = 0; in bn_mod_inverse_no_branch() 118 A = B; in bn_mod_inverse_no_branch() 168 if (BN_is_one(A)) { in bn_mod_inverse_no_branch() 223 A = BN_CTX_get(ctx); in int_bn_mod_inverse() 247 A->neg = 0; in int_bn_mod_inverse() 318 if (!BN_rshift(A, A, shift)) in int_bn_mod_inverse() 351 if (!BN_usub(A, A, B)) in int_bn_mod_inverse() 422 A = B; in int_bn_mod_inverse() [all …]
|
H A D | bn_sqrt.c | 24 BIGNUM *A, *b, *q, *t, *x, *y; in BN_mod_sqrt() local 63 A = BN_CTX_get(ctx); in BN_mod_sqrt() 78 if (!BN_nnmod(A, a, p, ctx)) in BN_mod_sqrt() 101 if (!BN_mod_exp(ret, A, q, p, ctx)) in BN_mod_sqrt() 137 if (!BN_mod_lshift1_quick(t, A, p)) in BN_mod_sqrt() 158 if (!BN_mod_mul(x, A, b, p, ctx)) in BN_mod_sqrt() 259 if (!BN_nnmod(t, A, p, ctx)) in BN_mod_sqrt() 269 if (!BN_mod_exp(x, A, t, p, ctx)) in BN_mod_sqrt() 282 if (!BN_mod_mul(b, b, A, p, ctx)) in BN_mod_sqrt() 286 if (!BN_mod_mul(x, x, A, p, ctx)) in BN_mod_sqrt() [all …]
|
/openssl/test/certs/ |
H A D | embeddedSCTs3.sct | 3 Log ID : 68:F6:98:F8:1F:64:82:BE:3A:8C:EE:B9:28:1D:4C:FC: 4 71:51:5D:67:93:D4:44:D1:0A:67:AC:BB:4F:4F:FB:C4 8 30:44:02:20:58:2D:0A:BE:78:41:8A:E7:89:A9:5E:66: 9 21:C5:6A:16:79:DF:33:85:8A:D3:F3:1D:71:AF:75:30: 11 3A:95:0B:BE:F4:98:75:D4:CA:49:97:FD:25:2E:E3:78: 15 Log ID : 56:14:06:9A:2F:D7:C2:EC:D3:F5:E1:BD:44:B2:3E:C7: 20 30:45:02:20:79:68:E9:70:38:5A:63:F3:A6:B1:97:0E: 22 EF:2A:4E:74:02:21:00:8E:B7:BB:ED:85:5D:85:1B:54: 23 5E:3C:C5:EC:F2:13:9C:09:D1:0A:01:C2:59:5F:7C:31: 27 Log ID : A4:B9:09:90:B4:18:58:14:87:BB:13:A2:CC:67:70:0A: [all …]
|
/openssl/crypto/sha/asm/ |
H A D | sha512p8-ppc.pl | 202 vsldoi $B,$A,$A,4 # unpack 203 vsldoi $C,$A,$A,8 204 vsldoi $D,$A,$A,12 210 lvx_u $A,$x00,$ctx 213 vsldoi $B,$A,$A,8 # unpack 228 stvx $A,$x00,$offload # offload $A-$H 253 vaddu${sz}m $A,$A,@X[2] 271 vperm $A,$A,$B,$Ki # pack the answer 274 vperm $A,$A,$C,@X[0] 276 vperm $A,$A,$D,@X[1] [all …]
|
H A D | sha512-586.pl | 91 $A="mm0"; # B-D and 143 &pand ($BxC,$A); # (b^c)&(a^b) 156 ($A,$BxC) = ($BxC,$A); # rotate registers 159 &movq ($BxC,$A); 324 &movq ($A,&QWP(0,"esi")); 350 &movq ("mm3",$A); # magic 381 &pxor ($A,$A); # A is in %mm3 437 &paddq ($A,&QWP(0,"esi")); 447 &movq (&QWP(0,"esi"),$A); 665 &paddq ($A,&QWP(0,"esi")); [all …]
|
H A D | sha256-armv4.pl | 68 $A="r4"; 76 @V=($A,$B,$C,$D,$E,$F,$G,$H); 250 ldmia $ctx,{$A,$B,$C,$D,$E,$F,$G,$H} 272 add $A,$A,$t2 @ h+=Maj(a,b,c) from the past 276 add $A,$A,$t0 291 stmia $t3,{$A,$B,$C,$D,$E,$F,$G,$H} 526 ldmia $ctx,{$A-$H} 566 add $A,$A,$t2 @ h+=Maj(a,b,c) from the past 570 add $A,$A,$t0 @ accumulate 579 str $A,[$t1],#4
|
H A D | sha1-586.pl | 154 $A="eax"; 162 @V=($A,$B,$C,$D,$E,$T); 341 &mov ($A,&DWP(0,$T)); 355 &or ($A,$D); 356 &cmp ($A,1<<28|1<<30); 366 &shl($A,6); 367 &add($A,$T); 381 &bswap($A); 385 &mov(&swtmp($i+0),$A); 411 &add($A,&DWP(8,$tmp1)); [all …]
|
/openssl/crypto/modes/ |
H A D | wrap128.c | 53 unsigned char *A, B[16], *R; in CRYPTO_128_wrap() local 57 A = B; in CRYPTO_128_wrap() 63 memcpy(A, iv, 8); in CRYPTO_128_wrap() 70 A[7] ^= (unsigned char)(t & 0xff); in CRYPTO_128_wrap() 72 A[6] ^= (unsigned char)((t >> 8) & 0xff); in CRYPTO_128_wrap() 79 memcpy(out, A, 8); in CRYPTO_128_wrap() 104 unsigned char *A, B[16], *R; in crypto_128_unwrap_raw() local 109 A = B; in crypto_128_unwrap_raw() 111 memcpy(A, in, 8); in crypto_128_unwrap_raw() 116 A[7] ^= (unsigned char)(t & 0xff); in crypto_128_unwrap_raw() [all …]
|
/openssl/crypto/bn/asm/ |
H A D | c64xplus-gf2m.pl | 33 ($A,$B)=($Alo,$B_1); 37 my ($A,$B)=@_; 42 SHRU $A,16, $Ahi ; smash $A to two halfwords 43 || EXTU $A,16,16,$Alo 57 my ($OUTlo,$OUThi,$A,$B)=@_; 62 SHRU $A,16, $Ahi ; smash $A to two halfwords 63 || EXTU $A,16,16,$Alo 132 MV $a1,$A 134 &mul_1x1_merged("A28","B28",$A,$B); # a0·b0/a1·b1 137 XOR $a0,$a1,$A [all …]
|
H A D | x86_64-mont.pl | 436 mov %rax,$A[0] 440 mov %rdx,$A[1] 449 add %rax,$A[1] 452 mov %rdx,$A[0] 467 add %rax,$A[0] 470 mov %rdx,$A[1] 482 add %rax,$A[1] 485 mov %rdx,$A[0] 497 add %rax,$A[0] 500 mov %rdx,$A[1] [all …]
|
H A D | x86-gf2m.pl | 61 ($A,$B,$B30,$B31)=("mm2","mm3","mm4","mm5"); 73 &movd ($A,$a); 82 &pcmpgtd($B31,$A); # broadcast 31st bit 83 &paddd ($A,$A); # $A<<=1 88 &pcmpgtd($B30,$A); # broadcast 30th bit 255 &movq ($A,$R); 258 &psrlq ($A,32); 262 &pxor ($A,"mm7"); 265 &movq (&QWP(8,$a),$A);
|
/openssl/doc/designs/ddd/ |
H A D | README.md | 71 | librabbitmq | A | BIOx | 72 | ngircd | A | AOSF | 73 | stunnel | A | AOSFx | 74 | Postfix | A | AOSF | 75 | socat | A | AOSF | 76 | HAProxy | A | BIOx | 77 | Dovecot | A | BIOm | 78 | Apache httpd | A | BIOx | 79 | UnrealIRCd | A | AOSF | 80 | wpa_supplicant | A | BIOm | [all …]
|
/openssl/test/recipes/04-test_pem_reading_data/ |
H A D | cert-onecolumn.pem | 10 A 28 A 42 A 46 A 50 A 63 A 194 A 238 A 427 A 460 A [all …]
|
H A D | dsa-onecolumn.pem | 108 A 199 A 253 A 274 A 289 A 338 A 419 A 569 A 645 A 683 A [all …]
|
/openssl/test/recipes/10-test_bn_data/ |
H A D | bnexp.txt | 10 # These test vectors satisfy A ^ E = Exp. 13 A = d0e07 17 A = 1a18cf6 21 A = 2a3acbd2 25 A = 54b3ae461 29 A = fccec0f6df
|
/openssl/crypto/sha/ |
H A D | sha3.c | 16 void SHA3_squeeze(uint64_t A[5][5], unsigned char *out, size_t len, size_t r, int next); 23 memset(ctx->A, 0, sizeof(ctx->A)); in ossl_sha3_reset() 80 (void)SHA3_absorb(ctx->A, ctx->buf, bsz, bsz); in ossl_sha3_update() 86 rem = SHA3_absorb(ctx->A, inp, len, bsz); in ossl_sha3_update() 123 (void)SHA3_absorb(ctx->A, ctx->buf, bsz, bsz); in ossl_sha3_final() 126 SHA3_squeeze(ctx->A, out, outlen, bsz, 0); in ossl_sha3_final() 167 (void)SHA3_absorb(ctx->A, ctx->buf, bsz, bsz); in ossl_sha3_squeeze() 193 SHA3_squeeze(ctx->A, out, len, bsz, next); in ossl_sha3_squeeze() 200 SHA3_squeeze(ctx->A, ctx->buf, bsz, bsz, next); in ossl_sha3_squeeze()
|
/openssl/crypto/rc5/ |
H A D | rc5_skey.c | 22 RC5_32_INT L[64], l, ll, A, B, *S, k; in RC5_32_set_key() local 58 A = B = 0; in RC5_32_set_key() 60 k = (S[ii] + A + B) & RC5_32_MASK; in RC5_32_set_key() 61 A = S[ii] = ROTATE_l32(k, 3); in RC5_32_set_key() 62 m = (int)(A + B); in RC5_32_set_key() 63 k = (L[jj] + A + B) & RC5_32_MASK; in RC5_32_set_key()
|
/openssl/crypto/srp/ |
H A D | srp_lib.c | 67 return srp_Calc_xy(A, B, N, libctx, propq); in SRP_Calc_u_ex() 70 BIGNUM *SRP_Calc_u(const BIGNUM *A, const BIGNUM *B, const BIGNUM *N) in SRP_Calc_u() argument 73 return srp_Calc_xy(A, B, N, NULL, NULL); in SRP_Calc_u() 92 if (!BN_mod_mul(tmp, A, tmp, N, bn_ctx)) in SRP_Calc_server_key() 199 BIGNUM *A = NULL; in SRP_Calc_A() local 204 if ((A = BN_new()) != NULL && !BN_mod_exp(A, g, a, N, bn_ctx)) { in SRP_Calc_A() 205 BN_free(A); in SRP_Calc_A() 206 A = NULL; in SRP_Calc_A() 209 return A; in SRP_Calc_A() 287 int SRP_Verify_A_mod_N(const BIGNUM *A, const BIGNUM *N) in SRP_Verify_A_mod_N() argument [all …]
|
/openssl/crypto/sm3/ |
H A D | sm3_local.h | 26 ll=(c)->A; (void)HOST_l2c(ll, (s)); \ 93 #define RND(A, B, C, D, E, F, G, H, TJ, Wi, Wj, FF, GG) \ argument 95 const SM3_WORD A12 = ROTATE(A, 12); \ 98 const SM3_WORD TT1 = FF(A, B, C) + D + (SS1 ^ A12) + (Wj); \ 106 #define R1(A,B,C,D,E,F,G,H,TJ,Wi,Wj) \ argument 107 RND(A,B,C,D,E,F,G,H,TJ,Wi,Wj,FF0,GG0) 109 #define R2(A,B,C,D,E,F,G,H,TJ,Wi,Wj) \ argument 110 RND(A,B,C,D,E,F,G,H,TJ,Wi,Wj,FF1,GG1)
|
/openssl/test/ |
H A D | smcont.bin | 6 �sO������{1��P�A�\�F�٢]�ɭ�!�!;���n���a�q�PŌ���)M��"C^�^�8����#�ۚ��(<0��,�b>]�3\ N3f�q�… 11 …A�j��T~@5�0����yQ!�bdO�l�ר�b �E��6W�_ҹk��!��&�Jâ����7��M�y3� �lDw��t�ןL��2ʰ�D��dN�ۂ�O�`�Sgz… 19 …�^���i{�5�t���ϖ��/.�W������B$��9;�R�to U���$5O��sNϋ�T��u9�e@|R��Xi'L�,��=�I#�:�p��`���A�� 21 �@��A���m��9oA�|�:���\Q��7�"�����A�t~r��H�>�l������A� whˡAgP�}�U{#�4M}�����I��x3C�h�e�… 22 …����<<D_�������*ח�n7�:�o�A�!��Ya�j:����o�,��"�,… 24 �7A=٫�jf�$�^�%�F�膋���5Ր�����-I�U�}؇'��9�=����C�����u0U�/`�p1 26 �����C�Wc��A���^���8U��+����%����'�*��~~D�l���ؓ��בϗ�����:s�t���[��F+z^��Cf��r;P}��i;���k�O<�… 30 v~q���C/��`�now>�K���m����@BÂh�v�5�A�l=5V�K�u�P T��@X�D�L��fT�*ERI]�3��z��qt�'���Vx���… 33 …j ��M�7�q���d��1�#��(~X<c��i�w��Is����Y������c�]�xB/κ�U��"B�۴/F��A]�)q�SH����(U�l…
|
H A D | modes_internal_test.c | 810 {sizeof(A##n), A##n}, \ 818 const SIZED_DATA A; member 850 SIZED_DATA A = gcm128_vectors[idx].A; in test_gcm128() local 858 if (A.size == 1) in test_gcm128() 859 A.data = NULL; in test_gcm128() 870 if (A.data != NULL) in test_gcm128() 871 CRYPTO_gcm128_aad(&ctx, A.data, A.size); in test_gcm128() 882 if (A.data != NULL) in test_gcm128() 883 CRYPTO_gcm128_aad(&ctx, A.data, A.size); in test_gcm128()
|
/openssl/doc/man3/ |
H A D | SSL_alert_type_string.pod | 47 by the TLS RFC. A fatal alert always leads to a connection abort. 106 A certificate was corrupt, contained signatures that did not 111 A certificate was of an unsupported type. 115 A certificate was revoked by its signer. 119 A certificate has expired or is not currently valid. 128 A field in the handshake was out of range or inconsistent with 133 A TLSCiphertext decrypted in an invalid way: either it wasn't an 139 A TLSCiphertext record was received which had a length more than 152 A valid certificate was received, but when access control was 164 A handshake cryptographic operation failed, including being [all …]
|
/openssl/providers/implementations/digests/ |
H A D | sha3_prov.c | 157 return SHA3_absorb(ctx->A, inp, len, ctx->block_size); in generic_sha3_absorb() 205 s390x_kimd(inp, len - rem, fc, ctx->A); in s390x_sha3_absorb() 223 s390x_klmd(ctx->buf, ctx->bufsz, NULL, 0, fc, ctx->A); in s390x_sha3_final() 224 memcpy(out, ctx->A, outlen); in s390x_sha3_final() 241 s390x_klmd(ctx->buf, ctx->bufsz, out, outlen, fc, ctx->A); in s390x_shake_final() 272 memcpy(out, (char *)ctx->A + ctx->bufsz, len); in s390x_shake_squeeze() 309 s390x_kimd(ctx->buf, bsz, fc, ctx->A); in s390x_keccakc_final() 311 memcpy(out, ctx->A, num); in s390x_keccakc_final() 353 s390x_kimd(ctx->buf, ctx->block_size, fc, ctx->A); in s390x_keccakc_squeeze() 361 memcpy(out, (char *)ctx->A + ctx->bufsz, len); in s390x_keccakc_squeeze() [all …]
|
/openssl/doc/man7/ |
H A D | property.pod | 23 A I<reserved> property name consists of a single C-style identifier 30 A I<user defined> property name is similar, but it B<must> consist of 42 A I<property> is a I<name=value> pair. 43 A I<property definition> is a sequence of comma separated properties. 63 A I<property query clause> is a single conditional test. 71 A I<property query> is a sequence of comma separated property query clauses. 128 A context based property query that applies to all fetch operations and a local 157 UnquotedString ::= [A-Za-z] [^{space},]+ 158 NumberLiteral ::= '0' ( [0-7]* | 'x' [0-9A-Fa-f]+ ) | '-'? [1-9] [0-9]+ 159 PropertyName ::= [A-Za-z] [A-Za-z0-9_]* ( '.' [A-Za-z] [A-Za-z0-9_]* )*
|