/openssl/crypto/camellia/ |
H A D | camellia.c | 305 s0 ^= k[0], s1 ^= k[1], s2 ^= k[2], s3 ^= k[3]; in Camellia_Ekeygen() 312 s0 ^= k[0], s1 ^= k[1], s2 ^= k[2], s3 ^= k[3]; in Camellia_Ekeygen() 318 k[4] = s0, k[5] = s1, k[6] = s2, k[7] = s3; in Camellia_Ekeygen() 332 s0 = k[0], s1 = k[1], s2 = k[2], s3 = k[3]; in Camellia_Ekeygen() 334 k[8] = s0, k[9] = s1, k[10] = s2, k[11] = s3; in Camellia_Ekeygen() 353 k[4] = s0, k[5] = s1, k[6] = s2, k[7] = s3; in Camellia_Ekeygen() 361 s0 = k[8], s1 = k[9], s2 = k[10], s3 = k[11]; in Camellia_Ekeygen() 363 k[8] = s0, k[9] = s1, k[10] = s2, k[11] = s3; in Camellia_Ekeygen() 381 s0 = k[0], s1 = k[1], s2 = k[2], s3 = k[3]; in Camellia_Ekeygen() 441 s2 ^= k[0], s3 ^= k[1], s0 ^= k[2], s1 ^= k[3]; in Camellia_EncryptBlock_Rounds() [all …]
|
/openssl/util/ |
H A D | mkinstallvars.pl | 44 $keys{$k} = 1; 45 push @{$values{$k}}, $v; 50 warn "No value given for $k\n" unless $keys{$k}; 53 warn "Unknown variable $k\n" unless $all{$k}; 58 foreach my $k (@absolutes) { 63 $values{$k} = $v; 115 foreach my $k (@absolutes) { 116 print " \@$k\n"; 132 foreach my $k (@absolutes) { 133 print "our \@$k" . ' ' x (27 - length($k)) . "= ( '", [all …]
|
H A D | check-format-commit.sh | 128 for k in $(grep ^$j $TEMPDIR/ranges.filter | awk '{print $2}') 130 RSTART=$(echo $k | awk -F',' '{print $1}') 131 RLEN=$(echo $k | awk -F',' '{print $2}') 150 for k in $(seq 0 1 $maxidx) 152 RSTART=${range_start[$k]} 153 REND=${range_end[$k]}
|
/openssl/crypto/chacha/asm/ |
H A D | chacha-ia64.pl | 59 { .mlx; ld4 @k[5]=[@k[11]],8 63 { .mlx; ld4 @k[7]=[@k[11]],8 66 ld4 @k[9]=[@k[11]],8 69 ld4 @k[11]=[@k[11]] 72 ld4 @k[13]=[@k[15]],8 75 ld4 @k[15]=[@k[15]] 78 mov @x[4]=@k[4] 216 { .mmi; add @k[12]=1,@k[12] // next counter 243 (p1) mov @x[$k-1]=@k[$k-1] };; 275 mov @k[5]=0 [all …]
|
/openssl/crypto/cast/ |
H A D | c_enc.c | 22 const CAST_LONG *k; in CAST_encrypt() local 24 k = &(key->data[0]); in CAST_encrypt() 28 E_CAST(0, k, l, r, +, ^, -); in CAST_encrypt() 29 E_CAST(1, k, r, l, ^, -, +); in CAST_encrypt() 30 E_CAST(2, k, l, r, -, +, ^); in CAST_encrypt() 31 E_CAST(3, k, r, l, +, ^, -); in CAST_encrypt() 32 E_CAST(4, k, l, r, ^, -, +); in CAST_encrypt() 33 E_CAST(5, k, r, l, -, +, ^); in CAST_encrypt() 34 E_CAST(6, k, l, r, +, ^, -); in CAST_encrypt() 54 const CAST_LONG *k; in CAST_decrypt() local [all …]
|
/openssl/crypto/rc2/ |
H A D | rc2_skey.c | 58 unsigned char *k; in RC2_set_key() local 62 k = (unsigned char *)&(key->data[0]); in RC2_set_key() 73 k[i] = data[i]; in RC2_set_key() 76 d = k[len - 1]; in RC2_set_key() 79 d = key_table[(k[j] + d) & 0xff]; in RC2_set_key() 80 k[i] = d; in RC2_set_key() 89 d = key_table[k[i] & c]; in RC2_set_key() 90 k[i] = d; in RC2_set_key() 92 d = key_table[k[i + j] ^ d]; in RC2_set_key() 93 k[i] = d; in RC2_set_key() [all …]
|
/openssl/apps/ |
H A D | speed.c | 2806 for (k = 0; k < 3; k++) { in speed_main() 2833 for (k = 0; k < 3; k++) { in speed_main() 4442 for (k = 0; k < ALGOR_NUM; k++) { in speed_main() 4468 for (k = 0; k < RSA_NUM; k++) { in speed_main() 4489 for (k = 0; k < DSA_NUM; k++) { in speed_main() 4526 for (k = 0; k < EC_NUM; k++) { in speed_main() 4589 for (k = 0; k < FFDH_NUM; k++) { in speed_main() 4662 for (k = 0; k < RSA_NUM; k++) { in speed_main() 4671 for (k = 0; k < FFDH_NUM; k++) in speed_main() 4675 for (k = 0; k < DSA_NUM; k++) { in speed_main() [all …]
|
H A D | list.c | 337 const EVP_KDF *k = sk_EVP_KDF_value(kdfs, i); in list_kdfs() local 352 const char *desc = EVP_KDF_get0_description(k); in list_kdfs() 357 EVP_KDF_gettable_params(k), 4); in list_kdfs() 536 OSSL_ENCODER *k = sk_OSSL_ENCODER_value(encoders, i); in list_encoders() local 549 OSSL_ENCODER_get0_properties(k)); in list_encoders() 601 OSSL_DECODER *k = sk_OSSL_DECODER_value(decoders, i); in list_decoders() local 614 OSSL_DECODER_get0_properties(k)); in list_decoders() 657 EVP_KEYMGMT *k = sk_EVP_KEYMGMT_value(km_stack, i); in list_keymanagers() local 665 const char *desc = EVP_KEYMGMT_get0_description(k); in list_keymanagers() 826 EVP_KEM *k = sk_EVP_KEM_value(kem_stack, i); in list_kems() local [all …]
|
H A D | engine.c | 399 int k, n; in engine_main() local 425 for (k = 0; k < n; ++k) in engine_main() 426 if (!append_buf(&cap_buf, &cap_size, OBJ_nid2sn(nids[k]))) in engine_main() 434 for (k = 0; k < n; ++k) in engine_main() 435 if (!append_buf(&cap_buf, &cap_size, OBJ_nid2sn(nids[k]))) in engine_main() 443 for (k = 0; k < n; ++k) in engine_main() 444 if (!append_buf(&cap_buf, &cap_size, OBJ_nid2sn(nids[k]))) in engine_main()
|
/openssl/crypto/rc5/ |
H A D | rc5_skey.c | 22 RC5_32_INT L[64], l, ll, A, B, *S, k; in RC5_32_set_key() local 43 k = len & 0x07; in RC5_32_set_key() 44 c2ln(data, l, ll, k); in RC5_32_set_key() 60 k = (S[ii] + A + B) & RC5_32_MASK; in RC5_32_set_key() 61 A = S[ii] = ROTATE_l32(k, 3); in RC5_32_set_key() 63 k = (L[jj] + A + B) & RC5_32_MASK; in RC5_32_set_key() 64 B = L[jj] = ROTATE_l32(k, m); in RC5_32_set_key()
|
/openssl/crypto/ |
H A D | punycode.c | 47 unsigned int k = 0; in adapt() local 54 k = k + base; in adapt() 57 return k + (((base - tmin + 1) * delta) / (delta + skew)); in adapt() 152 unsigned int k, t; in ossl_punycode_decode() local 155 for (k = base;; k += base) { in ossl_punycode_decode() 168 t = (k <= bias) ? tmin : (k >= bias + tmax) ? tmax : k - bias; in ossl_punycode_decode()
|
/openssl/crypto/md5/ |
H A D | md5_local.h | 64 #define R0(a,b,c,d,k,s,t) { \ argument 65 a+=((k)+(t)+F((b),(c),(d))); \ 69 #define R1(a,b,c,d,k,s,t) { \ argument 70 a+=((k)+(t)+G((b),(c),(d))); \ 74 #define R2(a,b,c,d,k,s,t) { \ argument 75 a+=((k)+(t)+H((b),(c),(d))); \ 79 #define R3(a,b,c,d,k,s,t) { \ argument 80 a+=((k)+(t)+I((b),(c),(d))); \
|
/openssl/providers/implementations/exchange/ |
H A D | ecdh_exch.c | 56 EC_KEY *k; member 114 EC_KEY_free(pecdhctx->k); in ecdh_init() 115 pecdhctx->k = vecdh; in ecdh_init() 183 EC_KEY_free(pecdhctx->k); in ecdh_freectx() 209 dstctx->k= NULL; in ecdh_dupctx() 216 if (srcctx->k != NULL && !EC_KEY_up_ref(srcctx->k)) in ecdh_dupctx() 219 dstctx->k = srcctx->k; in ecdh_dupctx() 458 size_t ecdh_size(const EC_KEY *k) in ecdh_size() argument 463 if (k == NULL in ecdh_size() 541 privk = pecdhctx->k; in ecdh_plain_derive() [all …]
|
/openssl/crypto/rc4/asm/ |
H A D | rc4-md5-x86_64.pl | 242 my $k=$i%$MOD; 254 #rc4# movl `4*(($k+1)%$MOD)`(`$k==$MOD-1?"$dat,$XX[0],4":"$XX[1]"`),$TX[1]#d 258 #rc4# movl $TY#d,4*$k($XX[1]) 282 my $k=$i%$MOD; 294 #rc4# movl `4*(($k+1)%$MOD)`(`$k==$MOD-1?"$dat,$XX[0],4":"$XX[1]"`),$TX[1]#d 298 #rc4# movl $TY#d,4*$k($XX[1]) 322 my $k=$i%$MOD; 334 #rc4# movl `4*(($k+1)%$MOD)`(`$k==$MOD-1?"$dat,$XX[0],4":"$XX[1]"`),$TX[1]#d 338 #rc4# movl $TY#d,4*$k($XX[1]) 361 my $k=$i%$MOD; [all …]
|
/openssl/crypto/md4/ |
H A D | md4_local.h | 50 #define R0(a,b,c,d,k,s,t) { \ argument 51 a+=((k)+(t)+F((b),(c),(d))); \ 54 #define R1(a,b,c,d,k,s,t) { \ argument 55 a+=((k)+(t)+G((b),(c),(d))); \ 58 #define R2(a,b,c,d,k,s,t) { \ argument 59 a+=((k)+(t)+H((b),(c),(d))); \
|
/openssl/crypto/dsa/ |
H A D | dsa_ossl.c | 39 static BIGNUM *dsa_mod_inverse_fermat(const BIGNUM *k, const BIGNUM *q, 224 BIGNUM *k, *kinv = NULL, *r = *rp; in dsa_sign_setup() local 248 k = BN_new(); in dsa_sign_setup() 250 if (k == NULL || l == NULL) in dsa_sign_setup() 264 || !bn_wexpand(k, q_words + 2) in dsa_sign_setup() 292 } while (ossl_bn_is_word_fixed_top(k, 0)); in dsa_sign_setup() 294 BN_set_flags(k, BN_FLG_CONSTTIME); in dsa_sign_setup() 318 if (!BN_add(l, k, dsa->params.q) in dsa_sign_setup() 319 || !BN_add(k, l, dsa->params.q)) in dsa_sign_setup() 350 BN_clear_free(k); in dsa_sign_setup() [all …]
|
/openssl/test/recipes/04-test_pem_reading_data/ |
H A D | dsa-onecolumn.pem | 31 k 148 k 173 k 186 k 198 k 330 k 352 k 411 k 475 k 490 k [all …]
|
H A D | cert-onecolumn.pem | 19 k 32 k 35 k 385 k 825 k 1075 k 1145 k 1216 k 1234 k 1249 k [all …]
|
/openssl/crypto/ec/ |
H A D | ec_mult.c | 146 BIGNUM *k = NULL; in ossl_ec_scalar_mul_ladder() local 190 k = BN_CTX_get(ctx); in ossl_ec_scalar_mul_ladder() 191 if (k == NULL) { in ossl_ec_scalar_mul_ladder() 215 if (!BN_copy(k, scalar)) { in ossl_ec_scalar_mul_ladder() 220 BN_set_flags(k, BN_FLG_CONSTTIME); in ossl_ec_scalar_mul_ladder() 222 if ((BN_num_bits(k) > cardinality_bits) || (BN_is_negative(k))) { in ossl_ec_scalar_mul_ladder() 227 if (!BN_nnmod(k, k, cardinality, ctx)) { in ossl_ec_scalar_mul_ladder() 414 int k; in ossl_ec_wNAF_mul() local 711 for (k = max_len - 1; k >= 0; k--) { in ossl_ec_wNAF_mul() 928 size_t k; in ossl_ec_wNAF_precompute_mult() local [all …]
|
H A D | ecdsa_ossl.c | 139 BIGNUM *k = NULL, *r = NULL, *X = NULL; in ecdsa_sign_setup() local 168 k = BN_secure_new(); /* this value is later returned in *kinvp */ in ecdsa_sign_setup() 171 if (k == NULL || r == NULL || X == NULL) { in ecdsa_sign_setup() 189 || !BN_set_bit(k, order_bits) in ecdsa_sign_setup() 202 res = ossl_gen_deterministic_nonce_rfc6979(k, order, in ecdsa_sign_setup() 213 res = ossl_bn_priv_rand_range_fixed_top(k, order, 0, ctx); in ecdsa_sign_setup() 219 } while (ossl_bn_is_word_fixed_top(k, 0)); in ecdsa_sign_setup() 222 if (!EC_POINT_mul(group, tmp_point, k, NULL, NULL, ctx)) { in ecdsa_sign_setup() 239 if (!ossl_ec_group_do_inverse_ord(group, k, k, ctx)) { in ecdsa_sign_setup() 249 *kinvp = k; in ecdsa_sign_setup() [all …]
|
/openssl/crypto/x509/ |
H A D | by_dir.c | 232 int i, j, k; in get_cert_by_subject_ex() local 281 k = hent->suffix; in get_cert_by_subject_ex() 284 k = 0; in get_cert_by_subject_ex() 288 k = 0; in get_cert_by_subject_ex() 314 "%s%08lx.%s%d", ent->dir, h, postfix, k); in get_cert_by_subject_ex() 341 k++; in get_cert_by_subject_ex() 350 if (k > 0) { in get_cert_by_subject_ex() 365 if (type == X509_LU_CRL && k > 0) { in get_cert_by_subject_ex() 385 hent->suffix = k; in get_cert_by_subject_ex() 399 } else if (hent->suffix < k) { in get_cert_by_subject_ex() [all …]
|
H A D | v3_admis.c | 121 int i, j, k; in i2r_ADMISSION_SYNTAX() local 172 for (k = 0; k < sk_ASN1_STRING_num(pinfo->professionItems); k++) { in i2r_ADMISSION_SYNTAX() 173 ASN1_STRING *val = sk_ASN1_STRING_value(pinfo->professionItems, k); in i2r_ADMISSION_SYNTAX() 185 for (k = 0; k < sk_ASN1_OBJECT_num(pinfo->professionOIDs); k++) { in i2r_ADMISSION_SYNTAX() 186 ASN1_OBJECT *obj = sk_ASN1_OBJECT_value(pinfo->professionOIDs, k); in i2r_ADMISSION_SYNTAX()
|
/openssl/ssl/record/methods/ |
H A D | ssl3_cbc.c | 145 num_starting_blocks, k, mac_end_offset, c, index_a, index_b; in ssl3_cbc_digest_record() local 292 k = 0; in ssl3_cbc_digest_record() 323 k = md_block_size * num_starting_blocks; in ssl3_cbc_digest_record() 358 if (k > 0) { in ssl3_cbc_digest_record() 380 for (i = 1; i < k / md_block_size - 1; i++) in ssl3_cbc_digest_record() 387 for (i = 1; i < k / md_block_size; i++) in ssl3_cbc_digest_record() 409 if (k < header_length) in ssl3_cbc_digest_record() 410 b = header[k]; in ssl3_cbc_digest_record() 411 else if (k < data_plus_mac_plus_padding_size + header_length) in ssl3_cbc_digest_record() 412 b = data[k - header_length]; in ssl3_cbc_digest_record() [all …]
|
/openssl/test/ |
H A D | ideatest.c | 25 static const unsigned char k[16] = { variable 66 IDEA_set_encrypt_key(k, &key); in test_idea_ecb() 82 IDEA_set_encrypt_key(k, &key); in test_idea_cbc() 84 memcpy(iv, k, sizeof(iv)); in test_idea_cbc() 86 memcpy(iv, k, sizeof(iv)); in test_idea_cbc()
|
H A D | curve448_internal_test.c | 653 uint8_t u[56], k[56], out[56]; in test_x448() local 666 memcpy(k, in_u3, sizeof(k)); in test_x448() 673 if (!TEST_true(ossl_x448(out, k, u))) in test_x448() 683 memcpy(u, k, sizeof(u)); in test_x448() 684 memcpy(k, out, sizeof(k)); in test_x448()
|