/openssl/providers/implementations/digests/ |
H A D | blake2b_prov.c | 87 P->key_length = 0; in ossl_blake2b_param_init() 88 P->fanout = 1; in ossl_blake2b_param_init() 89 P->depth = 1; in ossl_blake2b_param_init() 92 P->node_depth = 0; in ossl_blake2b_param_init() 93 P->inner_length = 0; in ossl_blake2b_param_init() 94 memset(P->reserved, 0, sizeof(P->reserved)); in ossl_blake2b_param_init() 95 memset(P->salt, 0, sizeof(P->salt)); in ossl_blake2b_param_init() 96 memset(P->personal, 0, sizeof(P->personal)); in ossl_blake2b_param_init() 106 P->key_length = keylen; in ossl_blake2b_param_set_key_length() 129 blake2b_init_param(c, P); in ossl_blake2b_init() [all …]
|
H A D | blake2s_prov.c | 79 P->key_length = 0; in ossl_blake2s_param_init() 80 P->fanout = 1; in ossl_blake2s_param_init() 81 P->depth = 1; in ossl_blake2s_param_init() 84 P->node_depth = 0; in ossl_blake2s_param_init() 85 P->inner_length = 0; in ossl_blake2s_param_init() 86 memset(P->salt, 0, sizeof(P->salt)); in ossl_blake2s_param_init() 87 memset(P->personal, 0, sizeof(P->personal)); in ossl_blake2s_param_init() 92 P->digest_length = outlen; in ossl_blake2s_param_set_digest_length() 97 P->key_length = keylen; in ossl_blake2s_param_set_key_length() 119 blake2s_init_param(c, P); in ossl_blake2s_init() [all …]
|
/openssl/crypto/bf/asm/ |
H A D | bf-586.pl | 23 $P="ebp"; 47 &mov($P,&wparam(1)); 61 &mov($tmp2,&DWP(0,$P,"",0)); 76 &mov($tmp4,&DWP(($BF_ROUNDS+1)*4,$P,"",0)); 80 &mov($tmp2,&DWP(($BF_ROUNDS+1)*4,$P,"",0)); 88 &BF_ENCRYPT($i,$R,$L,$P,$tmp1,$tmp2,$tmp3,$tmp4,0); 94 &mov($tmp4,&DWP(0,$P,"",0)); 106 local($i,$L,$R,$P,$tmp1,$tmp2,$tmp3,$tmp4,$enc)=@_; 122 &mov( $tmp1, &DWP(&n2a($BF_OFF+0x0000),$P,$tmp1,4)); 123 &mov( $tmp2, &DWP(&n2a($BF_OFF+0x0400),$P,$tmp2,4)); [all …]
|
/openssl/providers/implementations/include/prov/ |
H A D | blake2.h | 96 int ossl_blake2b_init(BLAKE2B_CTX *c, const BLAKE2B_PARAM *P); 97 int ossl_blake2b_init_key(BLAKE2B_CTX *c, const BLAKE2B_PARAM *P, 112 void ossl_blake2b_param_init(BLAKE2B_PARAM *P); 113 void ossl_blake2b_param_set_digest_length(BLAKE2B_PARAM *P, uint8_t outlen); 114 void ossl_blake2b_param_set_key_length(BLAKE2B_PARAM *P, uint8_t keylen); 117 void ossl_blake2b_param_set_salt(BLAKE2B_PARAM *P, const uint8_t *salt, 119 int ossl_blake2s_init(BLAKE2S_CTX *c, const BLAKE2S_PARAM *P); 120 int ossl_blake2s_init_key(BLAKE2S_CTX *c, const BLAKE2S_PARAM *P, 125 void ossl_blake2s_param_init(BLAKE2S_PARAM *P); 127 void ossl_blake2s_param_set_key_length(BLAKE2S_PARAM *P, uint8_t keylen); [all …]
|
/openssl/test/recipes/30-test_evp_data/ |
H A D | evppkey_ecdsa_rfc6979.txt | 29 PrivPubKeyPair=P-192_PRIV:P-192_PUB 32 Key = P-192_PRIV 38 Key = P-192_PUB 43 Key = P-192_PUB 55 Key = P-192_PUB 60 Key = P-192_PUB 72 Key = P-192_PUB 215 PrivPubKeyPair=P-224_PRIV:P-224_PUB 401 PrivPubKeyPair=P-256_PRIV:P-256_PUB 588 PrivPubKeyPair=P-384_PRIV:P-384_PUB [all …]
|
H A D | evppkey_ecdsa_sigalg.txt | 19 # EC P-256 key 21 PrivateKey=P-256 30 PublicKey=P-256-PUBLIC 36 PrivPubKeyPair = P-256:P-256-PUBLIC 41 Verify = ECDSA-SHA1:P-256-PUBLIC 47 Verify = ECDSA-SHA1:P-256-PUBLIC 54 Verify = ECDSA-SHA1:P-256-PUBLIC 99 PublicKey=P-384-PUBLIC 119 Sign = ECDSA-SHA256:P-256 218 Sign = ECDSA-SHA1:P-256 [all …]
|
H A D | evppkey_ecdsa.txt | 19 # EC P-256 key 21 PrivateKey=P-256 36 PrivPubKeyPair = P-256:P-256-PUBLIC 96 Key = P-256-PUBLIC 108 Key = P-384-PUBLIC 114 Key = P-256-PUBLIC 119 Sign = P-256 173 Key = P-256 218 Sign = P-256 250 Key = P-256 [all …]
|
H A D | evppkey_mismatch_ecx.txt | 28 PublicKey=P-256-PUBLIC 72 PrivPubKeyPair = Alice-25519:P-256-PUBLIC 75 PrivPubKeyPair = Alice-448:P-256-PUBLIC 78 PrivPubKeyPair = RSA-2048:P-256-PUBLIC
|
/openssl/test/ |
H A D | ectest.c | 148 EC_POINT_free(P); in group_order_tests() 198 || !TEST_true(EC_POINT_add(group, P, P, Q, ctx)) in prime_field_tests() 235 || !TEST_true(EC_POINT_add(group, P, P, Q, ctx))) in prime_field_tests() 532 || !TEST_true(EC_POINT_dbl(group, P, P, ctx)) in prime_field_tests() 596 EC_POINT_free(P); in prime_field_tests() 862 || !TEST_true(EC_POINT_dbl(group, P, P, ctx)) in char2_curve_test() 927 EC_POINT_free(P); in char2_curve_test() 973 || !TEST_true(EC_POINT_add(group, P, P, Q, ctx)) in char2_field_tests() 1020 || !TEST_true(EC_POINT_add(group, P, P, Q, ctx))) in char2_field_tests() 2418 if (P == NULL) { in ec_point_hex2point_test_helper() [all …]
|
H A D | modes_internal_test.c | 811 {sizeof(P##n), P##n}, \ 819 const SIZED_DATA P; member 851 SIZED_DATA P = gcm128_vectors[idx].P; in test_gcm128() local 860 if (P.size == 1) in test_gcm128() 861 P.data = NULL; in test_gcm128() 869 memset(out, 0, P.size); in test_gcm128() 872 if (P.data != NULL) in test_gcm128() 873 if (!TEST_int_ge(CRYPTO_gcm128_encrypt(&ctx, P.data, out, P.size), 0)) in test_gcm128() 877 && !TEST_mem_eq(out, P.size, C.data, P.size))) in test_gcm128() 881 memset(out, 0, P.size); in test_gcm128() [all …]
|
H A D | smcont.bin | 6 �sO������{1��P�A�\�F�٢]�ɭ�!�!;���n���a�q�PŌ���)M��"C^�^�8����#�ۚ��(<0��,�b>]�3\ N3f�q�… 11 …PΎ�u�P[X&�k� G�0^4���Ƭ=#ᥗZ��Y���A�j��T~@5�0����yQ!�bdO�l�ר�b �E��6W�_ҹk��!��&�Jâ����7��M�y… 16 pd��;H����T�y�P�m��{i���L3����=Dt�l���7�Q�3i���j��K 17 }�wx7l�u�|�z'5�mN�4�0G�P��i٥�>� 20 O�^7]�4�a �zC����1E�g��PJ��音�#L��5�Hܮ���'ͺ$�3�?�}P�&.��xp�k� 21 …�B>�F�4-b�$2AX�H]{ �"�b�悶Nj�Y���^��1"'h����Կ�Vn̢����v�=���f����<��s�Z�P�š*�¢oً� ��\}C{�… 25 Vzh.�E��»t�6�.XX��RDnH���O��~��F�����wI _��u�qw��º���3���/��g)XBe����O�F��Iݙ����E{P)Z 26 �����C�Wc��A���^���8U��+����%����'�*��~~D�l���ؓ��בϗ�����:s�t���[��F+z^��Cf��r;P}��i;���k�O<�… 30 v~q���C/��`�now>�K���m����@BÂh�v�5�A�l=5V�K�u�P T��@X�D�L��fT�*ERI]�3��z��qt�'���Vx���… 32 …2��6��H;?+��r脌�crG[V`��i�B�w�c�)�d$�#�z�V(�u�t�����2�'}�tժFZ�ϢB�1�P�-%�*���c$�Oӿ� …
|
/openssl/crypto/ec/ |
H A D | ecp_sm2p256.c | 196 if (is_zeros(P->Z)) { in ecp_sm2p256_point_double() 203 ecp_sm2p256_sqr(tmp0, P->Z); in ecp_sm2p256_point_double() 208 ecp_sm2p256_add(R->Y, P->Y, P->Y); in ecp_sm2p256_point_double() 234 if (is_zeros(P->Z)) { in ecp_sm2p256_point_add_affine() 296 if (is_zeros(P->Z)) { in ecp_sm2p256_point_add() 306 R->X[i] = P->X[i]; in ecp_sm2p256_point_add() 307 R->Y[i] = P->Y[i]; in ecp_sm2p256_point_add() 308 R->Z[i] = P->Z[i]; in ecp_sm2p256_point_add() 433 if (is_one(P->Z)) { in ecp_sm2p256_point_get_affine() 434 memcpy(R->X, P->X, 32); in ecp_sm2p256_point_get_affine() [all …]
|
/openssl/test/recipes/04-test_pem_reading_data/ |
H A D | dsa-onecolumn.pem | 113 P 172 P 241 P 287 P 305 P 380 P 429 P 507 P 519 P 522 P [all …]
|
/openssl/crypto/evp/ |
H A D | legacy_blake2.c | 20 BLAKE2S_PARAM P; in blake2s_init() local 22 ossl_blake2s_param_init(&P); in blake2s_init() 23 return ossl_blake2s_init(C, &P); in blake2s_init() 27 BLAKE2B_PARAM P; in blake2b_init() local 29 ossl_blake2b_param_init(&P); in blake2b_init() 30 return ossl_blake2b_init(C, &P); in blake2b_init()
|
/openssl/test/recipes/10-test_bn_data/ |
H A D | bnmod.txt | 2550 P = 2 2554 P = 2 2558 P = 2 2562 P = 2 2566 P = 2 2570 P = 3 2574 P = 3 2578 P = 3 2582 P = 3 2586 P = 3 [all …]
|
/openssl/test/ssl-tests/ |
H A D | 20-cert-select.cnf.in | 73 "ExpectedServerCertType" =>, "P-256", 88 "Groups" => "P-384" 93 "Groups" => "P-256:P-384", 97 "ExpectedServerCertType" =>, "P-256", 110 "Groups" => "P-256:P-384" 117 "Groups" => "P-384", 146 "ExpectedServerCertType" => "P-256", 172 "ExpectedServerCertType" => "P-256", 185 "ExpectedServerCertType" => "P-256", 202 "ExpectedServerCertType" => "P-256", [all …]
|
H A D | 28-seclevel.cnf | 9 test-4 = 4-SECLEVEL 3 with P-384 key, X25519 ECDHE 105 [4-SECLEVEL 3 with P-384 key, X25519 ECDHE] 106 ssl_conf = 4-SECLEVEL 3 with P-384 key, X25519 ECDHE-ssl 108 [4-SECLEVEL 3 with P-384 key, X25519 ECDHE-ssl] 109 server = 4-SECLEVEL 3 with P-384 key, X25519 ECDHE-server 110 client = 4-SECLEVEL 3 with P-384 key, X25519 ECDHE-client 112 [4-SECLEVEL 3 with P-384 key, X25519 ECDHE-server] 118 [4-SECLEVEL 3 with P-384 key, X25519 ECDHE-client]
|
H A D | 14-curves.cnf | 1223 Curves = sect233k1:P-256 1229 Curves = sect233k1:P-256 1253 Curves = sect233r1:P-256 1259 Curves = sect233r1:P-256 1283 Curves = sect283k1:P-256 1289 Curves = sect283k1:P-256 1313 Curves = sect283r1:P-256 1319 Curves = sect283r1:P-256 1343 Curves = sect409k1:P-256 1349 Curves = sect409k1:P-256 [all …]
|
H A D | 14-curves.cnf.in | 105 "Curves" => "$curve:P-256", 113 "Curves" => "$curve:P-256" 117 #succeed but fallback to P-256 118 "ExpectedTmpKeyType" => "P-256",
|
H A D | 20-cert-select.cnf | 93 ExpectedServerCertType = P-256 111 Groups = P-384 117 Groups = P-256:P-384 126 ExpectedServerCertType = P-256 144 Groups = P-256:P-384 150 Groups = P-384 223 ExpectedServerCertType = P-256 282 ExpectedServerCertType = P-256 316 ExpectedServerCertType = P-256 346 ExpectedServerCertType = P-256 [all …]
|
/openssl/demos/bio/ |
H A D | connect.cnf | 12 Curves = P-521:P-384:P-256
|
H A D | accept.cnf | 12 Curves = P-521:P-384:P-256
|
H A D | cmod.cnf | 22 Curves = P-521:P-384:P-256
|
/openssl/external/perl/Text-Template-1.56/t/ |
H A D | safe2.t | 23 our $P = 'main'; 24 $Q::P = $Q::P = 'Q';
|
/openssl/crypto/bf/ |
H A D | bf_local.h | 76 # define BF_ENC(LL,R,S,P) ( \ argument 77 LL^=P, \
|