/openssl/crypto/sm3/ |
H A D | sm3.c | 25 c->H = SM3_H; in ossl_sm3_init() 32 register unsigned MD32_REG_T A, B, C, D, E, F, G, H; in ossl_sm3_block_data_order() local 46 H = ctx->H; in ossl_sm3_block_data_order() 69 R1(A, B, C, D, E, F, G, H, 0x79CC4519, W00, W00 ^ W04); in ossl_sm3_block_data_order() 71 R1(D, A, B, C, H, E, F, G, 0xF3988A32, W01, W01 ^ W05); in ossl_sm3_block_data_order() 73 R1(C, D, A, B, G, H, E, F, 0xE7311465, W02, W02 ^ W06); in ossl_sm3_block_data_order() 75 R1(B, C, D, A, F, G, H, E, 0xCE6228CB, W03, W03 ^ W07); in ossl_sm3_block_data_order() 77 R1(A, B, C, D, E, F, G, H, 0x9CC45197, W04, W04 ^ W08); in ossl_sm3_block_data_order() 79 R1(D, A, B, C, H, E, F, G, 0x3988A32F, W05, W05 ^ W09); in ossl_sm3_block_data_order() 81 R1(C, D, A, B, G, H, E, F, 0x7311465E, W06, W06 ^ W10); in ossl_sm3_block_data_order() [all …]
|
H A D | sm3_local.h | 33 ll=(c)->H; (void)HOST_l2c(ll, (s)); \ 93 #define RND(A, B, C, D, E, F, G, H, TJ, Wi, Wj, FF, GG) \ argument 99 const SM3_WORD TT2 = GG(E, F, G) + H + SS1 + Wi; \ 103 H = P0(TT2); \ 106 #define R1(A,B,C,D,E,F,G,H,TJ,Wi,Wj) \ argument 107 RND(A,B,C,D,E,F,G,H,TJ,Wi,Wj,FF0,GG0) 109 #define R2(A,B,C,D,E,F,G,H,TJ,Wi,Wj) \ argument 110 RND(A,B,C,D,E,F,G,H,TJ,Wi,Wj,FF1,GG1)
|
/openssl/crypto/sha/asm/ |
H A D | sha512-armv8.pl | 271 add $H,$H,@X[7] 720 add $H,$H,$t3 776 orr $CD,@H[1],@H[1] 777 orr $EF,@H[2],@H[2] 778 orr $GH,@H[3],@H[3] 793 add.i64 @H[4],@H[1],@H[3] // "D + T1" 794 sha512h2 @H[3],$H[1],@H[0] 797 @H = (@H[3],@H[0],@H[4],@H[2],@H[1]); 815 add.i64 @H[4],@H[1],@H[3] // "D + T1" 816 sha512h2 @H[3],$H[1],@H[0] [all …]
|
H A D | sha256-c64xplus.pl | 36 ($E,$Ectx,$F,$Fctx,$G,$Gctx,$H,$Hctx,$T1,$S1,$s0,$t0e,$t1e,$t2e,$X1,$X15) 100 || LDW *${CTXB}[7],$H 116 || MVD $H,$Hctx 137 || ADD $K,$H,$T1 ; T1 = h + K256[i] 148 || ROTL $G,0,$H ; h = g 176 || ADD $K,$H,$T1 ; T1 = h + K256[i] 187 || ROTL $G,0,$H ; h = g 230 || ADD $H,$K,$T1 ; T1 = h + K256[i] 240 || ROTL $G,0,$H ; h = g 271 || ADD $Hctx,$H,$H [all …]
|
H A D | sha512p8-ppc.pl | 100 @V=($A,$B,$C,$D,$E,$F,$G,$H)=map("v$_",(0..7)); 207 vsldoi $H,$E,$E,12 217 vsldoi $H,$G,$G,8 228 stvx $A,$x00,$offload # offload $A-$H 235 stvx $H,$x70,$offload 236 vaddu${sz}m $H,$H,$Ki # h+K[i] 266 vaddu${sz}m $H,$H,@X[9] 277 vperm $E,$E,$H,@X[1] 285 vperm $G,$G,$H,$Ki
|
H A D | sha256-armv4.pl | 75 $H="r11"; 76 @V=($A,$B,$C,$D,$E,$F,$G,$H); 250 ldmia $ctx,{$A,$B,$C,$D,$E,$F,$G,$H} 290 add $H,$H,$t1 291 stmia $t3,{$A,$B,$C,$D,$E,$F,$G,$H} 493 sub $H,sp,#16*4+16 495 bic $H,$H,#15 @ align for 128-bit stores 497 mov sp,$H @ alloca 526 ldmia $ctx,{$A-$H} 584 add $H,$H,$t4 [all …]
|
H A D | sha512-riscv64-zvkb-zvknhb.pl | 72 my ($H, $INP, $LEN, $KT, $H2, $INDEX_PATTERN) = ("a0", "a1", "a2", "a3", "t3", "t4"); 96 addi $H2, $H, 16 100 @{[vluxei8_v $V22, $H, $V1]} 210 @{[vsuxei8_v $V22, ($H), $V1]}
|
H A D | sha512-s390x.pl | 72 $H="%r12"; @V=($A,$B,$C,$D,$E,$F,$G,$H); 280 $LD $H,`7*$SZ`($ctx) 303 $ADD $H,`7*$SZ`($ctx) 311 $ST $H,`7*$SZ`($ctx)
|
H A D | sha256-mb-x86_64.pl | 325 movdqu 0xe0-0x80($ctx),$H 383 pand $Xn,$H 389 paddd $Xi,$H 395 movdqu $H,0xe0-0x80($ctx) 1030 vmovdqu 0xe0-0x80($ctx),$H 1086 vpand $Xn,$H,$H 1092 vpaddd $Xi,$H,$H 1098 vmovdqu $H,0xe0-0x80($ctx) 1221 vmovdqu 0xe0-0x80($ctx),$H 1278 vpand $Xn,$H,$H [all …]
|
H A D | sha512-sparcv9.pl | 88 $H="%o7"; 89 @V=($A,$B,$C,$D,$E,$F,$G,$H); 115 $H="%l7"; 116 @V=($A,$B,$C,$D,$E,$F,$G,$H); 696 $LD [$ctx+`7*$SZ`],$H 734 add $H,@X[7],$H 735 $ST $H,[$ctx+`7*$SZ`] 787 add $T1,$H,$H 788 $ST $H,[$ctx+`7*$SZ`]
|
H A D | sha256-riscv64-zvkb-zvknha_or_zvknhb.pl | 72 my ($H, $INP, $LEN, $KT, $H2, $INDEX_PATTERN) = ("a0", "a1", "a2", "a3", "t3", "t4"); 137 addi $H2, $H, 8 141 @{[vluxei8_v $V6, $H, $V26]} 286 @{[vsuxei8_v $V6, $H, $V26]}
|
/openssl/external/perl/Text-Template-1.56/t/ |
H A D | safe2.t | 59 $text = $t->fill_in(HASH => { H => 'good5' }); 63 $Q::H = $Q2::H = undef; 66 $text = $t->fill_in(HASH => { H => 'good6' }, PACKAGE => 'Q'); 72 $text = $t->fill_in(HASH => { H => 'good7' }, SAFE => $c); 78 our $H; 81 $text = $t->fill_in(HASH => { H => 'good8' }, SAFE => $c, PACKAGE => 'Q2'); 87 ok !defined $H; 88 $H = $H; 91 is $Q::H, 'good7'; 94 is $Q2::H, 'good8';
|
/openssl/crypto/modes/asm/ |
H A D | ghashp8-ppc.pl | 90 lvx_u $H,0,r4 # load H 103 vsl $H,$H,$t0 # H<<=1 111 vsldoi $Hh,$H,$zero,8 116 stvx_u $H, r9,r3 187 vsldoi $H,$Xl,$Xl,8 189 vsldoi $Hl,$zero,$H,8 190 vsldoi $Hh,$H,$zero,8 196 stvx_u $H,r9,r3 226 lvx_u $H, r9,$Htbl 277 lvx_u $H, r9,$Htbl [all …]
|
H A D | ghashv8-armx.pl | 133 vext.8 $t0,$H,$H,#8 @ Karatsuba pre-processing 134 vpmull.p64 $Xl,$H,$H 135 veor $t0,$t0,$H 136 vpmull2.p64 $Xh,$H,$H 165 vpmull.p64 $Xl,$H, $H2 167 vpmull2.p64 $Xh,$H, $H2 423 vpmull2.p64 $Xhn,$H,$In 551 vpmull2.p64 $Yh,$H,$I3 606 vpmull2.p64 $Yh,$H,$I3 778 vpmull.p64 $Xl,$H,$IN [all …]
|
H A D | ghash-riscv64-zvkg.pl | 73 my ($Htable,$H,$VAL0,$VAL1,$TMP0) = ("a0","a1","a2","a3","t0"); 80 ld $VAL0, 0($H) 81 ld $VAL1, 8($H) 90 my ($Htable,$H,$V0) = ("a0","a1","v0"); 98 @{[vle64_v $V0, $H]} # vle64.v v0, (a1)
|
H A D | ghash-riscv64.pl | 70 my ($Htable,$H,$VAL0,$VAL1,$TMP0,$TMP1,$TMP2) = ("a0","a1","a2","a3","t0","t1","t2"); 77 ld $VAL0,0($H) 78 ld $VAL1,8($H) 89 my ($Htable,$H,$VAL0,$VAL1,$TMP0,$TMP1,$TMP2) = ("a0","a1","a2","a3","t0","t1","t2"); 96 ld $VAL0,0($H) 97 ld $VAL1,8($H) 110 my ($Htable,$H,$TMP0,$TMP1) = ("a0","a1","t0","t1"); 117 ld $TMP0,0($H) 118 ld $TMP1,8($H)
|
H A D | ghash-riscv64-zvkb-zvbc.pl | 68 my ($Htable,$H,$TMP0,$TMP1,$TMP2) = ("a0","a1","t0","t1","t2"); 78 add $H, $H, 8 85 @{[vlse64_v $V1, $H, $TMP0]} # vlse64.v v1, (a1), t0
|
/openssl/crypto/whrlpool/ |
H A D | wp_block.c | 506 } S, K, *H = (void *)ctx->H.q; in whirlpool_block() local 536 H->c[i] ^= S.c[i] ^ p[i]; in whirlpool_block() 543 S.q[0] ^= (K.q[0] = H->q[0]); in whirlpool_block() 793 H->q[0] ^= S.q[0] ^ pa[0]; in whirlpool_block() 794 H->q[1] ^= S.q[1] ^ pa[1]; in whirlpool_block() 795 H->q[2] ^= S.q[2] ^ pa[2]; in whirlpool_block() 796 H->q[3] ^= S.q[3] ^ pa[3]; in whirlpool_block() 797 H->q[4] ^= S.q[4] ^ pa[4]; in whirlpool_block() 798 H->q[5] ^= S.q[5] ^ pa[5]; in whirlpool_block() 799 H->q[6] ^= S.q[6] ^ pa[6]; in whirlpool_block() [all …]
|
/openssl/test/ |
H A D | smcont.bin | 11 …D��dN�ۂ�O�`�Sgz��r����fj ���,rX��S��re*.Ԕ�Q�P�?Wl�� |(��CB��H�Y�A�������1���z�H/S6���Z�T�ӫ… 16 pd��;H����T�y�P�m��{i���L3����=Dt�l���7�Q�3i���j��K 20 O�^7]�4�a �zC����1E�g��PJ��音�#L��5�Hܮ���'ͺ$�3�?�}P�&.��xp�k� 21 …A���m��9oA�|�:���\Q��7�"�����A�t~r��H�>�l������A� whˡAgP�}�U{#�4M}�����I��x3C�h�e�B>�… 26 …Y���)��W��<��d��;i���=#��}���"��dR�E��>������D�*���*ذx@I�$�+h�>�-��¤�=H宮i�"y)� �c�y)� 28 ͯ��F���H�N���0�� >� 30 …5�A�l=5V�K�u�P T��@X�D�L��fT�*ERI]�3��z��qt�'���Vx����&°���EҕsM��/H'q3_�%��C�Z`�p7e�qd… 32 l��3���;T${[��c~V���3�C3�'�zc�مE��o�gh`K�$#�9F��Hx#O��WAM<?�8w�)2��6��H;?+��r脌�crG[V`��i�B…
|
/openssl/test/recipes/04-test_pem_reading_data/ |
H A D | cert-onecolumn.pem | 73 H 151 H 167 H 323 H 371 H 446 H 513 H 591 H 607 H 763 H [all …]
|
H A D | dsa-onecolumn.pem | 20 H 45 H 150 H 252 H 359 H 424 H 524 H 584 H 681 H 760 H [all …]
|
/openssl/crypto/rsa/ |
H A D | rsa_pss.c | 53 const unsigned char *H; in ossl_rsa_verify_PKCS1_PSS_mgf1() local 107 H = EM + maskedDBLen; in ossl_rsa_verify_PKCS1_PSS_mgf1() 111 if (PKCS1_MGF1(DB, maskedDBLen, H, hLen, mgf1Hash) < 0) in ossl_rsa_verify_PKCS1_PSS_mgf1() 142 if (memcmp(H_, H, hLen)) { in ossl_rsa_verify_PKCS1_PSS_mgf1() 182 unsigned char *H, *salt = NULL, *p; in ossl_rsa_padding_add_PKCS1_PSS_mgf1() local 246 H = EM + maskedDBLen; in ossl_rsa_padding_add_PKCS1_PSS_mgf1() 256 if (!EVP_DigestFinal_ex(ctx, H, NULL)) in ossl_rsa_padding_add_PKCS1_PSS_mgf1() 260 if (PKCS1_MGF1(EM, maskedDBLen, H, hLen, mgf1Hash)) in ossl_rsa_padding_add_PKCS1_PSS_mgf1()
|
/openssl/doc/man7/ |
H A D | EVP_KDF-SS.pod | 18 The implementation uses a selectable auxiliary function H, which can be one of: 22 =item B<H(x) = hash(x, digest=md)> 24 =item B<H(x) = HMAC_hash(x, key=salt, digest=md)> 26 =item B<H(x) = KMACxxx(x, key=salt, custom="KDF", outlen=mac_size)> 102 This example derives 10 bytes using H(x) = SHA-256, with the secret key "secret" 127 This example derives 10 bytes using H(x) = HMAC(SHA-256), with the secret key "secret", 156 This example derives 10 bytes using H(x) = KMAC128(x,salt,outlen), with the secret key "secret"
|
/openssl/util/ |
H A D | fix-includes.sed | 2 …ha.h|(aes|des|cmll)_platform.h|ctype.h|__DECC_INCLUDE_EPILOGUE.H|__DECC_INCLUDE_PROLOGUE.H|dso_con…
|
/openssl/crypto/ec/asm/ |
H A D | ecp_nistz256-ppc64.pl | 1175 addi $rp,$sp,$H 1222 ld $a0,$H+0($sp) 1223 ld $a1,$H+8($sp) 1230 ld $a0,$H+0($sp) 1231 ld $a1,$H+8($sp) 1246 ld $bi,$H($sp) 1251 addi $bp,$sp,$H 1510 addi $rp,$sp,$H 1518 ld $a0,$H+0($sp) 1553 ld $bi,$H($sp) [all …]
|