/openssl/crypto/des/ |
H A D | str2key.c | 46 void DES_string_to_2keys(const char *str, DES_cblock *key1, DES_cblock *key2) in DES_string_to_2keys() argument 52 memset(key2, 0, 8); in DES_string_to_2keys() 61 (*key2)[i % 8] ^= (j << 1); in DES_string_to_2keys() 69 (*key2)[7 - (i % 8)] ^= j; in DES_string_to_2keys() 73 memcpy(key2, key1, 8); in DES_string_to_2keys() 75 DES_set_odd_parity(key2); in DES_string_to_2keys() 78 DES_set_key_unchecked(key2, &ks); in DES_string_to_2keys() 79 DES_cbc_cksum((const unsigned char *)str, key2, length, &ks, key2); in DES_string_to_2keys() 82 DES_set_odd_parity(key2); in DES_string_to_2keys()
|
/openssl/test/ |
H A D | igetest.c | 82 const unsigned char key2[32]; member 195 AES_KEY key2; in test_bi_ige_vectors() local 203 AES_set_encrypt_key(v->key2, 8 * v->keysize, &key2); in test_bi_ige_vectors() 206 AES_set_decrypt_key(v->key2, 8 * v->keysize, &key2); in test_bi_ige_vectors() 214 test_output_memory("key 2", v->key2, sizeof(v->key2)); in test_bi_ige_vectors() 329 AES_KEY key, key2; in test_bi_ige_enc_dec() local 336 AES_set_encrypt_key(rkey2, 8 * sizeof(rkey2), &key2); in test_bi_ige_enc_dec() 341 AES_set_decrypt_key(rkey2, 8 * sizeof(rkey2), &key2); in test_bi_ige_enc_dec() 350 AES_KEY key, key2; in test_bi_ige_garble1() local 381 AES_KEY key, key2; in test_bi_ige_garble2() local [all …]
|
H A D | pkcs12_api_test.c | 68 EVP_PKEY *key2 = NULL; in changepass() local 83 if (!TEST_true(PKCS12_parse(p12new, "NEWPASS", &key2, &cert2, &ca2))) in changepass() 86 if (!TEST_ptr(key2) || !TEST_int_eq(EVP_PKEY_eq(key, key2), 1)) in changepass() 97 EVP_PKEY_free(key2); in changepass()
|
H A D | tls-provider.c | 876 const XORKEY *key2 = keydata2; in xor_match() local 879 if (key1->tls_name != NULL && key2->tls_name != NULL) in xor_match() 880 ok = ok & (strcmp(key1->tls_name, key2->tls_name) == 0); in xor_match() 884 if (key2->hasprivkey) in xor_match() 888 ok = ok & xor_recreate(key1->privkey, key2->pubkey); in xor_match() 890 if (key2->hasprivkey) in xor_match() 891 ok = ok & xor_recreate(key2->privkey, key1->pubkey); in xor_match() 899 if (key2->haspubkey) in xor_match() 902 ok = ok & xor_recreate(key1->pubkey, key2->privkey); in xor_match() 904 if (key2->haspubkey) in xor_match() [all …]
|
H A D | rsa_test.c | 97 static int key2(RSA *key, unsigned char *c) in key2() function 225 clen = key2(*key, ctext); in rsa_setkey()
|
/openssl/crypto/sm4/asm/ |
H A D | sm4-armv8.pl | 139 my ($key0,$key1,$key2,$key3,$key4,$key5,$key6,$key7)=map("v$_",(0..7)); 160 sm4ekey $key2.4S,$key1.4S,$const2.4S 161 sm4ekey $key3.4S,$key2.4S,$const3.4S 163 st1 {$key0.4s,$key1.4s,$key2.4s,$key3.4s},[$keys],64 176 my ($key7,$key6,$key5,$key4,$key3,$key2,$key1,$key0)=map("v$_",(0..7)); 197 sm4ekey $key2.4S,$key1.4S,$const2.4S 202 sm4ekey $key3.4S,$key2.4S,$const3.4S 204 rev64 $key2.4s,$key2.4s 206 ext $key2.16b,$key2.16b,$key2.16b,#8 220 st1 {$key3.4s,$key2.4s,$key1.4s,$key0.4s},[$keys]
|
/openssl/include/crypto/ |
H A D | aes_platform.h | 41 const AES_KEY *key2, const unsigned char iv[16]); 44 const AES_KEY *key2, const unsigned char iv[16]); 55 const AES_KEY *key1, const AES_KEY *key2, 58 const AES_KEY *key1, const AES_KEY *key2, 237 const AES_KEY *key1, const AES_KEY *key2, 243 const AES_KEY *key1, const AES_KEY *key2, 334 const AES_KEY *key2, const unsigned char *ivec); 497 const AES_KEY *key2, 503 const AES_KEY *key2, 561 const AES_KEY *key2, const unsigned char iv[16]); [all …]
|
H A D | sm4_platform.h | 91 size_t len, const SM4_KEY *key1, const SM4_KEY *key2, 94 size_t len, const SM4_KEY *key1, const SM4_KEY *key2, 115 size_t len, const SM4_KEY *key1, const SM4_KEY *key2, 119 const SM4_KEY *key2, const unsigned char ivec[16],
|
/openssl/providers/implementations/keymgmt/ |
H A D | mac_legacy_kmgmt.c | 158 const MAC_KEY *key2 = keydata2; in mac_match() local 165 if ((key1->priv_key == NULL && key2->priv_key != NULL) in mac_match() 166 || (key1->priv_key != NULL && key2->priv_key == NULL) in mac_match() 167 || key1->priv_key_len != key2->priv_key_len in mac_match() 168 || (key1->cipher.cipher == NULL && key2->cipher.cipher != NULL) in mac_match() 169 || (key1->cipher.cipher != NULL && key2->cipher.cipher == NULL)) in mac_match() 173 || CRYPTO_memcmp(key1->priv_key, key2->priv_key, in mac_match() 177 EVP_CIPHER_get0_name(key2->cipher.cipher)); in mac_match()
|
H A D | ecx_kmgmt.c | 151 const ECX_KEY *key2 = keydata2; in ecx_match() local 158 ok = ok && key1->type == key2->type; in ecx_match() 164 const unsigned char *pb = key2->haspubkey ? key2->pubkey : NULL; in ecx_match() 166 size_t pbl = key2->keylen; in ecx_match() 170 && key1->type == key2->type in ecx_match() 179 const unsigned char *pb = key2->privkey; in ecx_match() 181 size_t pbl = key2->keylen; in ecx_match() 185 && key1->type == key2->type in ecx_match()
|
/openssl/providers/implementations/ciphers/ |
H A D | cipher_sm4_xts.c | 110 if (in->xts.key2 != NULL) { in sm4_xts_dupctx() 111 if (in->xts.key2 != &in->ks2) in sm4_xts_dupctx() 128 || ctx->xts.key2 == NULL in sm4_xts_cipher() 147 (*ctx->stream)(in, out, inl, ctx->xts.key1, ctx->xts.key2, in sm4_xts_cipher() 154 (*ctx->stream_gb)(in, out, inl, ctx->xts.key1, ctx->xts.key2, in sm4_xts_cipher()
|
H A D | cipher_aes_xts.c | 165 if (in->xts.key2 != NULL) { in aes_xts_dupctx() 166 if (in->xts.key2 != &in->ks2) in aes_xts_dupctx() 188 || ctx->xts.key2 == NULL in aes_xts_cipher() 207 (*ctx->stream)(in, out, inl, ctx->xts.key1, ctx->xts.key2, ctx->base.iv); in aes_xts_cipher()
|
H A D | cipher_sm4_xts_hw.c | 27 xctx->xts.key2 = &xctx->ks2; \ 82 dctx->xts.key2 = &dctx->ks2.ks; in cipher_hw_sm4_xts_copyctx()
|
H A D | cipher_sm4_xts.h | 16 const SM4_KEY *key1, const SM4_KEY *key2,
|
H A D | cipher_aes_xts.h | 22 const AES_KEY *key1, const AES_KEY *key2,
|
H A D | cipher_aes_xts_hw.c | 34 xctx->xts.key2 = &xctx->ks2; \ 97 dctx->xts.key2 = &dctx->ks2.ks; in cipher_hw_aes_xts_copyctx()
|
/openssl/crypto/aes/asm/ |
H A D | aesv8-armx.pl | 3025 ldr $rounds,[$key2,#240] 3026 vld1.32 {$dat},[$key2],#16 3034 vld1.32 {$dat},[$key2],#16 3043 vld1.32 {$dat},[$key2] 3112 ldr $rounds,[$key2,#240] 3113 vld1.32 {$dat},[$key2],#16 3130 vld1.32 {$dat},[$key2] 3702 ldr $rounds,[$key2,#240] 3720 vld1.32 {$dat},[$key2] 3785 ldr $rounds,[$key2,#240] [all …]
|
H A D | aesp8-ppc.pl | 1932 my $taillen = $key2; 1972 lwz $rounds,240($key2) 1977 lvx $rndkey0,0,$key2 1978 lvx $rndkey1,$idx,$key2 1982 lvx $rndkey0,$idx,$key2 1989 lvx $rndkey1,$idx,$key2 1993 lvx $rndkey0,$idx,$key2 1999 lvx $rndkey1,$idx,$key2 2188 lwz $rounds,240($key2) 2193 lvx $rndkey0,0,$key2 [all …]
|
H A D | aes-s390x.pl | 1637 my $key2="%r6"; # $i2 1823 llgf %r0,240($key2) 1840 la %r1,0($key2) # $key2 is not needed anymore 1896 la $key,0($key2) 2026 llgf %r0,240($key2) 2043 la %r1,0($key2) # $key2 is not needed past this point 2136 la $key,0($key2)
|
/openssl/include/openssl/ |
H A D | aes.h | 94 size_t length, const AES_KEY *key, const AES_KEY *key2,
|
/openssl/providers/implementations/kem/ |
H A D | ecx_kem.c | 179 static int ecx_match_params(const ECX_KEY *key1, const ECX_KEY *key2) in ecx_match_params() argument 181 return (key1->type == key2->type && key1->keylen == key2->keylen); in ecx_match_params()
|
/openssl/crypto/modes/ |
H A D | xts128.c | 41 (*ctx->block2) (tweak.c, tweak.c, ctx->key2); in CRYPTO_xts128_encrypt()
|
/openssl/providers/implementations/encode_decode/ |
H A D | encode_key2ms.c | 208 return key2##output##_encode(vctx, key, selection, cout, type##_set1, \
|
/openssl/doc/designs/quic-design/ |
H A D | json-encoder.md | 30 ossl_json_key(&z, "key2");
|
/openssl/doc/man7/ |
H A D | des_modes.pod | 189 Encrypt with key1, decrypt with key2 and encrypt with key3 again. 224 Encrypt with key1, decrypt with key2 and then encrypt with key3.
|