/openssl/crypto/chacha/asm/ |
H A D | chacha-c64xplus.pl | 140 || SWAP2 @X[$d2],@X[$d2] 180 || ROTL @X[$d2],8,@X[$d2] 182 || SWAP2 @Y[$d2],@Y[$d2] 237 || ROTL @Y[$d2],8,@Y[$d2] 240 || SWAP2 @X[$d2],@X[$d2] 297 || SWAP2 @Y[$d2],@Y[$d2] 299 ROTL @X[$d2],8,@X[$d2] 357 ROTL @Y[$d2],8,@Y[$d2] 605 || SWAP2 @X[$d2],@X[$d2] 664 SWAP2 @X[$d2],@X[$d2] [all …]
|
H A D | chacha-ia64.pl | 101 my ($a2,$b2,$c2,$d2)=map(($_&~3)+(($_+1)&3),($a1,$b1,$c1,$d1)); 102 my ($a3,$b3,$c3,$d3)=map(($_&~3)+(($_+1)&3),($a2,$b2,$c2,$d2)); 111 { .mmi; xor @x[$d2]=@x[$d2],@x[$a2] 117 extr.u @y[2]=@x[$d2],16,16 123 dep @x[$d2]=@x[$d2],@y[2],16,16 125 { .mmi; add @x[$c2]=@x[$c2],@x[$d2] 153 xor @x[$d2]=@x[$d2],@x[$a2] 156 extr.u @y[2]=@x[$d2],24,8 157 dep.z @x[$d2]=@x[$d2],8,24 };; 161 { .mmi; or @x[$d2]=@x[$d2],@y[2] [all …]
|
H A D | chacha-s390x.pl | 128 rll (@x[$d2],@x[$d2],16); 131 alr ($xc,@x[$d2]); 142 rll (@x[$d2],@x[$d2],8); 145 alr ($xc,@x[$d2]); 167 vx (@x[$d2],@x[$d2],@x[$a2]); 168 verllf (@x[$d2],@x[$d2],16); 193 vx (@x[$d2],@x[$d2],@x[$a2]); 194 verllf (@x[$d2],@x[$d2],8); 799 vlr ($t2,$d2); 834 vaf ($d2,$d2,$t2); # +K[3]+2 [all …]
|
H A D | chacha-armv4.pl | 124 "&ldr ($xd,'[sp,#4*(16+$d2)]')" ) if ($odd); 135 $xd=@x[$d2] if (!$odd); 731 vadd.i32 $d2,$d1,$t0 @ counter+2 754 @thread2=&NEONROUND($a2,$b2,$c2,$d2,$t2,1); 797 vadd.i32 $d2#lo,$d2#lo,$t1#lo @ counter+2 801 vadd.i32 $d2,$d2,$t3 833 veor $d2,$d2,$t3 845 vst1.8 {$c2-$d2},[r14]! 1051 vst1.8 {$c2-$d2},[@t[0]] 1080 veor $d2,$d2,$t3 [all …]
|
H A D | chacha-armv8.pl | 86 "&eor_32 (@x[$d2],@x[$d2],@x[$a2])", 90 "&ror_32 (@x[$d2],@x[$d2],16)", 95 "&add_32 (@x[$c2],@x[$c2],@x[$d2])", 112 "&eor_32 (@x[$d2],@x[$d2],@x[$a2])", 116 "&ror_32 (@x[$d2],@x[$d2],24)", 121 "&add_32 (@x[$c2],@x[$c2],@x[$d2])", 407 "&eor (@x[$d2],@x[$d2],@x[$a2])", 411 "&rev32_16 (@x[$d2],@x[$d2])", 416 "&add (@x[$c2],@x[$c2],@x[$d2])", 437 "&eor ('$xt2',@x[$d2],@x[$a2])", [all …]
|
H A D | chacha-ppc.pl | 107 "&xor (@x[$d2],@x[$d2],@x[$a2])", 111 "&rotlwi (@x[$d2],@x[$d2],16)", 116 "&add (@x[$c2],@x[$c2],@x[$d2])", 133 "&xor (@x[$d2],@x[$d2],@x[$a2])", 137 "&rotlwi (@x[$d2],@x[$d2],8)", 142 "&add (@x[$c2],@x[$c2],@x[$d2])", 941 "&vxor (@x[$d2],@x[$d2],@x[$a2])", 945 "&vrlw (@x[$d2],@x[$d2],'$sixteen')", 950 "&vadduwm (@x[$c2],@x[$c2],@x[$d2])", 967 "&vxor (@x[$d2],@x[$d2],@x[$a2])", [all …]
|
H A D | chachap10-ppc.pl | 119 "&vxor (@x[$d2],@x[$d2],@x[$a2])", 123 "&vrlw (@x[$d2],@x[$d2],'$sixteen')", 128 "&vadduwm (@x[$c2],@x[$c2],@x[$d2])", 145 "&vxor (@x[$d2],@x[$d2],@x[$a2])", 149 "&vrlw (@x[$d2],@x[$d2],'$eight')", 154 "&vadduwm (@x[$c2],@x[$c2],@x[$d2])", 530 "&vxor (@x[$d2],@x[$d2],@x[$a2])", 539 "&vrlw (@x[$d2],@x[$d2],@x[$c7])", 552 "&vadduwm (@x[$c2],@x[$c2],@x[$d2])", 593 "&vxor (@x[$d2],@x[$d2],@x[$a2])", [all …]
|
H A D | chacha-x86_64.pl | 1392 "&vpxor (@x[$d2],@x[$a2],@x[$d2])", 1396 "&vprotd (@x[$d2],@x[$d2],16)", 1418 "&vpxor (@x[$d2],@x[$a2],@x[$d2])", 1422 "&vprotd (@x[$d2],@x[$d2],8)", 1903 "&vpxor (@x[$d2],@x[$a2],@x[$d2])", 1904 "&vpshufb (@x[$d2],@x[$d2],$t1)", 1922 "&vpxor (@x[$d2],@x[$a2],@x[$d2])", 1923 "&vpshufb (@x[$d2],@x[$d2],$t0)", 2909 "&vpxord (@x[$d2],@x[$d2],@x[$a2])", 2913 "&vprold (@x[$d2],@x[$d2],16)", [all …]
|
H A D | chacha-armv8-sve.pl | 156 my ($a0,$b0,$c0,$d0,$a1,$b1,$c1,$d1,$a2,$b2,$c2,$d2,$a3,$b3,$c3,$d3) = @_; 160 &SVE_EOR($d0,$a0,$d1,$a1,$d2,$a2,$d3,$a3); 161 &SVE_REV16($d0,$d1,$d2,$d3); 163 &SVE2_XAR(16,$d0,$a0,$d1,$a1,$d2,$a2,$d3,$a3); 166 &SVE_ADD($c0,$d0,$c1,$d1,$c2,$d2,$c3,$d3); 178 &SVE_EOR($d0,$a0,$d1,$a1,$d2,$a2,$d3,$a3); 179 &SVE_ROT8($d0,$d1,$d2,$d3); 181 &SVE2_XAR(8,$d0,$a0,$d1,$a1,$d2,$a2,$d3,$a3); 184 &SVE_ADD($c0,$d0,$c1,$d1,$c2,$d2,$c3,$d3);
|
/openssl/crypto/poly1305/asm/ |
H A D | poly1305-armv8.pl | 156 umulh $d2,$h0,$r1 160 adc $d2,$d2,xzr 165 adc $d2,$d2,$t1 169 adc $d2,$d2,$t1 172 and $h2,$d2,#3 200 adc $d2,$h2,xzr 249 adc $d2,$d2,xzr 254 adc $d2,$d2,$t1 258 adc $d2,$d2,$t1 261 and $h2,$d2,#3 [all …]
|
H A D | poly1305-ppcfp.pl | 581 andc $d2,$d2,$mask 595 adde $h3,$h3,$d2 600 addze $d2,$h2 615 and $d2,$d2,$mask 620 or $h2,$h2,$d2 635 add $h3,$h3,$d2 641 srdi $d2,$h2,32 642 add $h3,$h3,$d2 651 addze $d2,$h4 667 rotldi $d2,$d2,32 # flip nonce words [all …]
|
H A D | poly1305-sparcv9.pl | 171 set 16,$d2 186 ldxa [$inp+$d2]0x88,$d2 191 sllx $d2,$shl,$d2 192 or $d2,$d1,$d1 216 add $t2,$d2,$d2 225 add $t0,$d2,$d2 234 add $t1,$d2,$d2 242 add $t1,$d2,$d2 252 set 16,$d2 941 andn $d2,$mask,$d2 [all …]
|
H A D | poly1305-mips.pl | 174 my ($h0,$h1,$h2,$r0,$r1,$s1,$d0,$d1,$d2) = 293 mfhi ($d2,$r1,$h0) 302 daddu $d2,$tmp2 306 daddu $d2,$tmp1 311 daddu $d2,$tmp0 315 daddu $d2,$tmp3 317 daddu $d2,$tmp2 320 and $tmp0,$d2 321 dsrl $tmp1,$d2,2 322 andi $h2,$d2,3
|
H A D | poly1305-ppc.pl | 217 addze $d2,$d2 222 adde $d2,$d2,$t1 227 adde $d2,$d2,$t1 492 lwbrx $d2,$d2,$inp 532 addc $d2,$d2,$t0 552 addc $d2,$d2,$t0 572 addc $d2,$d2,$t0 582 addc $d2,$d2,$t1 848 addze $d2,$d2 853 adde $d2,$d2,$t1 [all …]
|
H A D | poly1305-x86_64.pl | 112 mov %rax,$d2 122 add %rax,$d2 132 add $h1,$d2 137 add $d2,$h1 376 mov $r0,$d2 401 or $d2,%rdx 411 mov $r1,$d2 434 lea ($d2,$d2,4),$d2 # *5 581 adc $d2,$h1 591 and $h2,$d2 [all …]
|
H A D | poly1305-s390x.pl | 233 my ($d2,$d0,$h0,$d1,$h1,$h2)=map("%r$_",(9..14)); 246 lg ($d2,"16($ctx)"); 252 srlg ($h2,$d2,32); 272 xgr ($h2,$d2); 278 xgr ($h2,$d2); 898 lg ($d2,"16($ctx)"); 904 srlg ($h2,$d2,32); 924 xgr ($h2,$d2); 930 xgr ($h2,$d2); 942 lg ($d2,"0($nonce)"); # load nonce [all …]
|
/openssl/crypto/poly1305/ |
H A D | poly1305_base2_44.c | 88 u128 d0, d1, d2; in poly1305_blocks() local 116 d2 = ((u128)h0 * r2) + ((u128)h1 * r1) + ((u128)h2 * r0); in poly1305_blocks() 121 h2 = (u64)(d2 += (u64)(d1 >> 44)) & 0x03ffffffffff; /* last 42 bits */ in poly1305_blocks() 123 c = (d2 >> 42); in poly1305_blocks()
|
H A D | poly1305.c | 296 u64 d0, d1, d2, d3; in poly1305_blocks() local 317 h2 = (u32)(d2 = (u64)h2 + (d1 >> 32) + U8TOU32(inp + 8)); in poly1305_blocks() 318 h3 = (u32)(d3 = (u64)h3 + (d2 >> 32) + U8TOU32(inp + 12)); in poly1305_blocks() 331 d2 = ((u64)h0 * r2) + in poly1305_blocks() 347 h2 = (u32)(d2 += d1 >> 32); in poly1305_blocks() 348 h3 = (u32)(d3 += d2 >> 32); in poly1305_blocks()
|
/openssl/test/recipes/30-test_evp_pkey_provided/ |
H A D | EC.priv.txt | 3 33:d0:43:83:a9:89:56:03:d2:d7:fe:6b:01:6f:e4: 9 bd:c9:d2:80:ec:e9:a7:08:29:71:2f:c9:56:82:ee:
|
H A D | DSA.pub.txt | 19 3d:e8:65:09:7b:b7:12:64:d2:0a:53:60:48:d1:8a: 46 d2:92:5b:29:5c:61:b8:c9:2b:d6:f7:59:fd:d8:70: 48 f4:2e:e6:12:3e:cc:f8:02:b8:c6:c3:47:d2:f5:aa:
|
H A D | DSA.priv.txt | 23 3d:e8:65:09:7b:b7:12:64:d2:0a:53:60:48:d1:8a: 50 d2:92:5b:29:5c:61:b8:c9:2b:d6:f7:59:fd:d8:70: 52 f4:2e:e6:12:3e:cc:f8:02:b8:c6:c3:47:d2:f5:aa:
|
H A D | X448.pub.txt | 4 4a:27:3b:d2:b8:3d:e0:9c:63:fa:a7:3d:2c:22:c5:
|
H A D | EC.pub.txt | 5 bd:c9:d2:80:ec:e9:a7:08:29:71:2f:c9:56:82:ee:
|
/openssl/crypto/perlasm/ |
H A D | s390x.pm | 2623 $out.=sprintf("%#06x",($b2<<12|($d2&0xfff))).","; 2624 $out.=sprintf("%#06x",(($d2>>12)<<8|$opcode&0xff)); 2633 my ($opcode,$d2,$b2)=(shift,get_DB(shift)); 2635 $out.="\t.long\t".sprintf("%#010x",($opcode<<16|$b2<<12|$d2)); 2918 $out.=sprintf("%#06x",($b2<<12|$d2)).","; 2933 $out.=sprintf("%#06x",($b2<<12|$d2)).","; 2948 $out.=sprintf("%#06x",($b2<<12|$d2)).","; 2963 $out.=sprintf("%#06x",($b2<<12|$d2)).","; 2978 $out.=sprintf("%#06x",($b2<<12|$d2)).","; 2993 $out.=sprintf("%#06x",($b2<<12|$d2)).","; [all …]
|
/openssl/crypto/asn1/ |
H A D | tasn_enc.c | 390 const DER_ENC *d1 = a, *d2 = b; in der_cmp() local 392 cmplen = (d1->length < d2->length) ? d1->length : d2->length; in der_cmp() 393 i = memcmp(d1->data, d2->data, cmplen); in der_cmp() 396 return d1->length - d2->length; in der_cmp()
|