/openssl/crypto/ec/ |
H A D | ecp_sm2p256.c | 209 ecp_sm2p256_mul(R->Z, R->Y, P->Z); in ecp_sm2p256_point_double() 210 ecp_sm2p256_sqr(R->Y, R->Y); in ecp_sm2p256_point_double() 212 ecp_sm2p256_sqr(R->Y, R->Y); in ecp_sm2p256_point_double() 213 ecp_sm2p256_div_by_2(R->Y, R->Y); in ecp_sm2p256_point_double() 216 ecp_sm2p256_sub(R->X, R->X, tmp0); in ecp_sm2p256_point_double() 278 ecp_sm2p256_sub(R->X, R->X, tmp0); in ecp_sm2p256_point_add_affine() 279 ecp_sm2p256_sub(R->X, R->X, tmp3); in ecp_sm2p256_point_add_affine() 325 ecp_sm2p256_mul(R->Y, tmp2, R->Y); in ecp_sm2p256_point_add() 328 ecp_sm2p256_mul(R->Z, tmp0, R->Z); in ecp_sm2p256_point_add() 334 ecp_sm2p256_sub(R->X, R->X, tmp2); in ecp_sm2p256_point_add() [all …]
|
/openssl/crypto/cast/asm/ |
H A D | cast-586.pl | 27 $R="esi"; 79 &mov($R,&DWP(4,$tmp2,"",0)); 95 &E_CAST( 0,$S,$L,$R,$K,@F1,$tmp1,$tmp2,$tmp3,$tmp4); 96 &E_CAST( 1,$S,$R,$L,$K,@F2,$tmp1,$tmp2,$tmp3,$tmp4); 97 &E_CAST( 2,$S,$L,$R,$K,@F3,$tmp1,$tmp2,$tmp3,$tmp4); 98 &E_CAST( 3,$S,$R,$L,$K,@F1,$tmp1,$tmp2,$tmp3,$tmp4); 99 &E_CAST( 4,$S,$L,$R,$K,@F2,$tmp1,$tmp2,$tmp3,$tmp4); 100 &E_CAST( 5,$S,$R,$L,$K,@F3,$tmp1,$tmp2,$tmp3,$tmp4); 101 &E_CAST( 6,$S,$L,$R,$K,@F1,$tmp1,$tmp2,$tmp3,$tmp4); 140 &mov(&DWP(0,$tmp3,"",0),$R); [all …]
|
/openssl/crypto/err/ |
H A D | openssl.ec | 49 R SSL_R_SSLV3_ALERT_UNEXPECTED_MESSAGE 1010 50 R SSL_R_SSLV3_ALERT_BAD_RECORD_MAC 1020 51 R SSL_R_TLSV1_ALERT_DECRYPTION_FAILED 1021 52 R SSL_R_TLSV1_ALERT_RECORD_OVERFLOW 1022 53 R SSL_R_SSLV3_ALERT_DECOMPRESSION_FAILURE 1030 54 R SSL_R_SSLV3_ALERT_HANDSHAKE_FAILURE 1040 55 R SSL_R_SSLV3_ALERT_NO_CERTIFICATE 1041 56 R SSL_R_SSLV3_ALERT_BAD_CERTIFICATE 1042 57 R SSL_R_SSLV3_ALERT_UNSUPPORTED_CERTIFICATE 1043 58 R SSL_R_SSLV3_ALERT_CERTIFICATE_REVOKED 1044 [all …]
|
/openssl/crypto/sha/asm/ |
H A D | keccak1600-armv4.pl | 173 my (@A,@R); (@A[0..4],@R) = @_; 368 str.h @E[1],[sp,#$R[0][0]+4] 375 str.h @E[3],[sp,#$R[0][1]+4] 380 str.h @E[1],[sp,#$R[0][2]+4] 385 str.h @E[3],[sp,#$R[0][3]+4] 395 str.h @E[1],[sp,#$R[0][4]+4] 440 str.h @E[1],[sp,#$R[1][0]+4] 445 str.h @E[3],[sp,#$R[1][1]+4] 454 str.h @E[1],[sp,#$R[1][2]+4] 683 add @E[2],sp,#$R[0][0] [all …]
|
/openssl/providers/implementations/kdfs/ |
H A D | scrypt.c | 331 x[4] ^= R(x[0] + x[12], 7); in salsa208_word_specification() 332 x[8] ^= R(x[4] + x[0], 9); in salsa208_word_specification() 335 x[9] ^= R(x[5] + x[1], 7); in salsa208_word_specification() 336 x[13] ^= R(x[9] + x[5], 9); in salsa208_word_specification() 344 x[7] ^= R(x[3] + x[15], 9); in salsa208_word_specification() 347 x[1] ^= R(x[0] + x[3], 7); in salsa208_word_specification() 348 x[2] ^= R(x[1] + x[0], 9); in salsa208_word_specification() 349 x[3] ^= R(x[2] + x[1], 13); in salsa208_word_specification() 350 x[0] ^= R(x[3] + x[2], 18); in salsa208_word_specification() 351 x[6] ^= R(x[5] + x[4], 7); in salsa208_word_specification() [all …]
|
/openssl/crypto/des/asm/ |
H A D | des-586.pl | 28 $R="esi"; 139 &mov($R,&wparam(0)); 145 &mov("eax",&DWP(0,$R,"",0)); 147 &mov($L,&DWP(4,$R,"",0)); 150 &IP_new("eax",$L,$R,3); 160 &mov($R,&DWP(0,"eax","",0)); 162 &rotl($R,3); 188 &FP_new($L,$R,"eax",3); 199 &rotr($R,3); # l 220 &xor( $u, $R); [all …]
|
H A D | desboth.pl | 11 $R="esi"; 29 &mov($R,&DWP(4,"ebx","",0)); 34 &IP_new($L,$R,"edx",0); 40 &mov(&DWP(4,"ebx","",0),$R); 48 &mov(&DWP(4,"ebx","",0),$R); 69 &mov($R,&DWP(4,"ebx","",0)); 73 &FP_new($L,$R,"eax",0); 76 &mov(&DWP(4,"ebx","",0),$R);
|
H A D | crypt586.pl | 21 $R="esi"; 40 &xor( $R, $R); 57 &D_ENCRYPT($i,$L,$R,$i*2,$trans,"eax","ebx","ecx","edx"); 66 &mov($L, $R); 67 &mov($R, "eax"); 75 &FP_new($R,$L,"eax",3); 86 local($r,$L,$R,$S,$trans,$u,$tmp1,$tmp2,$t)=@_; 89 &mov( $t, $R); 92 &xor( $t, $R); # 1 106 &xor( $u, $R); [all …]
|
/openssl/crypto/bf/asm/ |
H A D | bf-586.pl | 22 $R="esi"; 53 &mov($R,&DWP(4,$tmp2,"",0)); 69 &BF_ENCRYPT($i+1,$R,$L,$P,$tmp1,$tmp2,$tmp3,$tmp4,1); 73 &BF_ENCRYPT($i+2,$L,$R,$P,$tmp1,$tmp2,$tmp3,$tmp4,1); 88 &BF_ENCRYPT($i,$R,$L,$P,$tmp1,$tmp2,$tmp3,$tmp4,0); 91 &BF_ENCRYPT($i-1,$L,$R,$P,$tmp1,$tmp2,$tmp3,$tmp4,0); 97 &xor($R,$tmp4); 100 &mov(&DWP(0,$tmp1,"",0),$R); 106 local($i,$L,$R,$P,$tmp1,$tmp2,$tmp3,$tmp4,$enc)=@_; 110 &mov( $tmp2, $R); [all …]
|
/openssl/crypto/des/ |
H A D | des_local.h | 123 # define LOAD_DATA_tmp(R,S,u,t,E0,E1) \ argument 124 { DES_LONG tmp; LOAD_DATA(R,S,u,t,E0,E1,tmp); } 126 # define LOAD_DATA(R,S,u,t,E0,E1,tmp) \ argument 127 t=R^(R>>16L); \ 129 tmp=(u<<16); u^=R^s[S ]; u^=tmp; \ 130 tmp=(t<<16); t^=R^s[S+1]; t^=tmp 133 # define LOAD_DATA(R,S,u,t,E0,E1,tmp) \ argument 134 u=R^s[S ]; \ 135 t=R^s[S+1] 144 # define D_ENCRYPT(LL,R,S) { \ argument [all …]
|
/openssl/crypto/bn/asm/ |
H A D | x86-gf2m.pl | 59 $R="mm0"; 113 &pxor ($R,@T[1]); 118 &pxor ($R,$B30); 120 &pxor ($R,@T[1]); 123 &pxor ($R,$B31); 126 &pxor ($R,@T[0]); 239 &movq ("mm7",$R); 244 &movq ("mm6",$R); 251 &pxor ($R,"mm7"); 255 &movq ($A,$R); [all …]
|
H A D | x86_64-gf2m.pl | 51 ($R,$Tx)=("%xmm0","%xmm1"); 129 movq (%rsp,$i0,8),$R # half of calculations is done in SSE2 150 pxor $Tx,$R 157 movq $R,$i0 160 psrldq \$8,$R 162 movq $R,$i1
|
/openssl/crypto/modes/ |
H A D | wrap128.c | 53 unsigned char *A, B[16], *R; in CRYPTO_128_wrap() local 66 R = out + 8; in CRYPTO_128_wrap() 67 for (i = 0; i < inlen; i += 8, t++, R += 8) { in CRYPTO_128_wrap() 68 memcpy(B + 8, R, 8); in CRYPTO_128_wrap() 76 memcpy(R, B + 8, 8); in CRYPTO_128_wrap() 104 unsigned char *A, B[16], *R; in crypto_128_unwrap_raw() local 114 R = out + inlen - 8; in crypto_128_unwrap_raw() 115 for (i = 0; i < inlen; i += 8, t--, R -= 8) { in crypto_128_unwrap_raw() 122 memcpy(B + 8, R, 8); in crypto_128_unwrap_raw() 124 memcpy(R, B + 8, 8); in crypto_128_unwrap_raw()
|
/openssl/test/recipes/04-test_pem_reading_data/ |
H A D | cert-onecolumn.pem | 20 R 68 R 104 R 152 R 168 R 176 R 220 R 344 R 348 R 415 R [all …]
|
H A D | dsa-onecolumn.pem | 214 R 284 R 308 R 315 R 392 R 438 R 457 R 621 R 652 R 719 R [all …]
|
/openssl/crypto/bn/ |
H A D | bn_rsa_fips186_4.c | 283 BIGNUM *tmp, *R, *r1r2x2, *y1, *r1x2; in ossl_bn_rsa_fips186_4_derive_prime() local 290 R = BN_CTX_get(ctx); in ossl_bn_rsa_fips186_4_derive_prime() 332 && (BN_mod_inverse(R, r2, r1x2, ctx) != NULL) in ossl_bn_rsa_fips186_4_derive_prime() 333 && BN_mul(R, R, r2, ctx) /* R = (r2^-1 mod 2r1) * r2 */ in ossl_bn_rsa_fips186_4_derive_prime() 335 && BN_sub(R, R, tmp) in ossl_bn_rsa_fips186_4_derive_prime() 340 if (BN_is_negative(R) && !BN_add(R, R, r1r2x2)) in ossl_bn_rsa_fips186_4_derive_prime() 363 if (!BN_mod_sub(Y, R, X, r1r2x2, ctx) || !BN_add(Y, Y, X)) in ossl_bn_rsa_fips186_4_derive_prime()
|
H A D | bn_gcd.c | 45 R = BN_new(); in bn_mod_inverse_no_branch() 47 R = in; in bn_mod_inverse_no_branch() 48 if (R == NULL) in bn_mod_inverse_no_branch() 171 if (!BN_copy(R, Y)) in bn_mod_inverse_no_branch() 183 ret = R; in bn_mod_inverse_no_branch() 188 BN_free(R); in bn_mod_inverse_no_branch() 234 R = BN_new(); in int_bn_mod_inverse() 236 R = in; in int_bn_mod_inverse() 237 if (R == NULL) in int_bn_mod_inverse() 506 ret = R; in int_bn_mod_inverse() [all …]
|
H A D | bn_mont.c | 264 BIGNUM *Ri, *R; in BN_MONT_CTX_set() local 272 R = &(mont->RR); /* grab RR as a temp */ in BN_MONT_CTX_set() 302 BN_zero(R); in BN_MONT_CTX_set() 303 if (!(BN_set_bit(R, 2 * BN_BITS2))) in BN_MONT_CTX_set() 314 else if ((BN_mod_inverse(Ri, R, &tmod, ctx)) == NULL) in BN_MONT_CTX_set() 339 BN_zero(R); in BN_MONT_CTX_set() 340 if (!(BN_set_bit(R, BN_BITS2))) in BN_MONT_CTX_set() 349 else if ((BN_mod_inverse(Ri, R, &tmod, ctx)) == NULL) in BN_MONT_CTX_set() 373 BN_zero(R); in BN_MONT_CTX_set() 374 if (!BN_set_bit(R, mont->ri)) in BN_MONT_CTX_set() [all …]
|
/openssl/crypto/bf/ |
H A D | bf_local.h | 76 # define BF_ENC(LL,R,S,P) ( \ argument 78 LL^=((( S[ ((R>>24)&0xff)] + \ 79 S[0x0100+((R>>16)&0xff)])^ \ 80 S[0x0200+((R>> 8)&0xff)])+ \ 81 S[0x0300+((R )&0xff)])&0xffffffffU \
|
/openssl/crypto/sha/ |
H A D | keccak1600.c | 563 R[0][1] = C[1] ^ (~C[2] | C[3]); in Round() 564 R[0][2] = C[2] ^ ( C[3] & C[4]); in Round() 565 R[0][3] = C[3] ^ ( C[4] | C[0]); in Round() 566 R[0][4] = C[4] ^ ( C[0] & C[1]); in Round() 569 R[0][1] = C[1] ^ (~C[2] & C[3]); in Round() 570 R[0][2] = C[2] ^ (~C[3] & C[4]); in Round() 571 R[0][3] = C[3] ^ (~C[4] & C[0]); in Round() 572 R[0][4] = C[4] ^ (~C[0] & C[1]); in Round() 582 R[1][0] = C[0] ^ (C[1] | C[2]); in Round() 583 R[1][1] = C[1] ^ (C[2] & C[3]); in Round() [all …]
|
/openssl/crypto/cast/ |
H A D | cast_local.h | 85 # define E_CAST(n,key,L,R,OP1,OP2,OP3) \ argument 88 t=(key[n*2] OP1 R)&0xffffffffL; \ 101 # define E_CAST(n,key,L,R,OP1,OP2,OP3) \ argument 105 w=(key[n*2] OP1 R)&0xffffffffL; \ 123 # define E_CAST(n,key,L,R,OP1,OP2,OP3) \ argument 126 t=(key[n*2] OP1 R)&0xffffffff; \
|
/openssl/test/ |
H A D | smcont.bin | 6 …]�ɭ�!�!;���n���a�q�PŌ���)M��"C^�^�8����#�ۚ��(<0��,�b>]�3\ N3f�q��:4#xr�{p�R��9^��F���.� 7 d8�]m�R%�@D<�~ 10 ��ֻ۟Q!���,� 52�3e�$-�oW i���aQ���S.����2b�O��#�{=cɥ�2��7N_�FT�;+JV�'�R�oz�̐8��N�>w֬�1q�?�ɲ3pb… 19 …������ܞ+c�#6�*L�2}�N�^���i{�5�t���ϖ��/.�W������B$��9;�R�to U���$5O��sNϋ�T��u9�e@|R��Xi'… 21 …���<��s�Z�P�š*�¢oً� ��\}C{�8G�]��i@���v�����`�,�˙39�z2ql>ͧ?- �@�R�1&�݀���\K�+�%D��m@… 22 ��_�ƵYKnl �$��s������s����9w�a �#L._�R�����C 6���̸��W����m���D�����gL��J��DGs����I��c… 27 �R()b��)�&f0�
|
/openssl/test/recipes/25-test_rusext_data/ |
H A D | grfc.utf8 | 6 Signature Algorithm: GOST R 34.11-94 with GOST R 34.10-2001 32 Signature Algorithm: GOST R 34.11-94 with GOST R 34.10-2001
|
/openssl/doc/man3/ |
H A D | BN_mod_mul_montgomery.pod | 38 by precomputing its inverse and a value R. 46 BN_mod_mul_montgomery() computes Mont(I<a>,I<b>):=I<a>*I<b>*R^-1 and places 49 BN_from_montgomery() performs the Montgomery reduction I<r> = I<a>*R^-1. 51 BN_to_montgomery() computes Mont(I<a>,R^2), i.e. I<a>*R.
|
/openssl/test/recipes/25-test_eai_data/ |
H A D | kdc-cert.pem | 8 Yzyiplz5Oau+R/6sAgUwDlrD9xOlUxx/tA/MSDIfkK8qioU11uUZtO5VjkNQy/bT 20 oDQ9fKfUOAmUFth2/R/eGA==
|