/openssl/crypto/des/ |
H A D | str2key.c | 46 void DES_string_to_2keys(const char *str, DES_cblock *key1, DES_cblock *key2) in DES_string_to_2keys() argument 51 memset(key1, 0, 8); in DES_string_to_2keys() 59 (*key1)[i % 8] ^= (j << 1); in DES_string_to_2keys() 67 (*key1)[7 - (i % 8)] ^= j; in DES_string_to_2keys() 73 memcpy(key2, key1, 8); in DES_string_to_2keys() 74 DES_set_odd_parity(key1); in DES_string_to_2keys() 76 DES_set_key_unchecked(key1, &ks); in DES_string_to_2keys() 77 DES_cbc_cksum((const unsigned char *)str, key1, length, &ks, key1); in DES_string_to_2keys() 81 DES_set_odd_parity(key1); in DES_string_to_2keys()
|
/openssl/providers/implementations/keymgmt/ |
H A D | mac_legacy_kmgmt.c | 157 const MAC_KEY *key1 = keydata1; in mac_match() local 165 if ((key1->priv_key == NULL && key2->priv_key != NULL) in mac_match() 166 || (key1->priv_key != NULL && key2->priv_key == NULL) in mac_match() 167 || key1->priv_key_len != key2->priv_key_len in mac_match() 168 || (key1->cipher.cipher == NULL && key2->cipher.cipher != NULL) in mac_match() 169 || (key1->cipher.cipher != NULL && key2->cipher.cipher == NULL)) in mac_match() 172 ok = ok && (key1->priv_key == NULL /* implies key2->privkey == NULL */ in mac_match() 173 || CRYPTO_memcmp(key1->priv_key, key2->priv_key, in mac_match() 174 key1->priv_key_len) == 0); in mac_match() 175 if (key1->cipher.cipher != NULL) in mac_match() [all …]
|
H A D | ecx_kmgmt.c | 150 const ECX_KEY *key1 = keydata1; in ecx_match() local 158 ok = ok && key1->type == key2->type; in ecx_match() 163 const unsigned char *pa = key1->haspubkey ? key1->pubkey : NULL; in ecx_match() 165 size_t pal = key1->keylen; in ecx_match() 170 && key1->type == key2->type in ecx_match() 178 const unsigned char *pa = key1->privkey; in ecx_match() 180 size_t pal = key1->keylen; in ecx_match() 185 && key1->type == key2->type in ecx_match()
|
/openssl/crypto/sm4/asm/ |
H A D | sm4-armv8.pl | 139 my ($key0,$key1,$key2,$key3,$key4,$key5,$key6,$key7)=map("v$_",(0..7)); 159 sm4ekey $key1.4S,$key0.4S,$const1.4S 160 sm4ekey $key2.4S,$key1.4S,$const2.4S 163 st1 {$key0.4s,$key1.4s,$key2.4s,$key3.4s},[$keys],64 176 my ($key7,$key6,$key5,$key4,$key3,$key2,$key1,$key0)=map("v$_",(0..7)); 196 sm4ekey $key1.4S,$key0.4S,$const1.4S 197 sm4ekey $key2.4S,$key1.4S,$const2.4S 199 rev64 $key1.4s,$key1.4s 201 ext $key1.16b,$key1.16b,$key1.16b,#8 220 st1 {$key3.4s,$key2.4s,$key1.4s,$key0.4s},[$keys]
|
/openssl/include/crypto/ |
H A D | aes_platform.h | 40 size_t len, const AES_KEY *key1, 43 size_t len, const AES_KEY *key1, 55 const AES_KEY *key1, const AES_KEY *key2, 58 const AES_KEY *key1, const AES_KEY *key2, 237 const AES_KEY *key1, const AES_KEY *key2, 333 size_t blocks, const AES_KEY *key1, 336 size_t blocks, const AES_KEY *key1, 339 size_t blocks, const AES_KEY *key1, 342 size_t blocks, const AES_KEY *key1, 560 size_t len, const AES_KEY *key1, [all …]
|
H A D | sm4_platform.h | 91 size_t len, const SM4_KEY *key1, const SM4_KEY *key2, 94 size_t len, const SM4_KEY *key1, const SM4_KEY *key2, 115 size_t len, const SM4_KEY *key1, const SM4_KEY *key2, 118 size_t len, const SM4_KEY *key1,
|
H A D | modes.h | 154 void *key1, *key2; member
|
/openssl/test/ |
H A D | igetest.c | 81 const unsigned char key1[32]; member 194 AES_KEY key1; in test_bi_ige_vectors() local 202 AES_set_encrypt_key(v->key1, 8 * v->keysize, &key1); in test_bi_ige_vectors() 205 AES_set_decrypt_key(v->key1, 8 * v->keysize, &key1); in test_bi_ige_vectors() 209 AES_bi_ige_encrypt(v->in, buf, v->length, &key1, &key2, v->iv, in test_bi_ige_vectors() 213 test_output_memory("key 1", v->key1, sizeof(v->key1)); in test_bi_ige_vectors()
|
H A D | rsa_test.c | 48 static int key1(RSA *key, unsigned char *c) in key1() function 222 clen = key1(*key, ctext); in rsa_setkey()
|
H A D | tls-provider.c | 875 const XORKEY *key1 = keydata1; in xor_match() local 879 if (key1->tls_name != NULL && key2->tls_name != NULL) in xor_match() 880 ok = ok & (strcmp(key1->tls_name, key2->tls_name) == 0); in xor_match() 883 if (key1->hasprivkey) { in xor_match() 885 ok = ok & (CRYPTO_memcmp(key1->privkey, key2->privkey, in xor_match() 888 ok = ok & xor_recreate(key1->privkey, key2->pubkey); in xor_match() 891 ok = ok & xor_recreate(key2->privkey, key1->pubkey); in xor_match() 898 if (key1->haspubkey) { in xor_match() 900 ok = ok & (CRYPTO_memcmp(key1->pubkey, key2->pubkey, XOR_KEY_SIZE) == 0); in xor_match() 902 ok = ok & xor_recreate(key1->pubkey, key2->privkey); in xor_match() [all …]
|
/openssl/crypto/aes/asm/ |
H A D | aesp8-ppc.pl | 2479 lvx v30,$x10,$key1 2480 addi $key1,$key1,0x20 2481 lvx v31,$x00,$key1 2488 lvx v30,$x10,$key1 2489 addi $key1,$key1,0x20 2492 lvx v31,$x00,$key1 2497 lvx v26,$x10,$key1 2499 lvx v27,$x20,$key1 2502 lvx v28,$x30,$key1 3158 addi $key1,$key1,0x20 [all …]
|
H A D | aesv8-armx.pl | 3050 ldr $rounds,[$key1,#240] 3159 add $key_,$key1,#32 3268 mov $key_,$key1 3493 mov $key_,$key1 3646 vld1.32 {$dat0},[$key1] 3727 ldr $rounds,[$key1,#240] 3847 add $key_,$key1,#32 3951 mov $key_,$key1 4188 mov $key_,$key1 4312 ldr $rounds,[$key1,#240] [all …]
|
H A D | aes-s390x.pl | 1655 la %r1,0($key1) # restore $key1 1682 la %r1,0($key1) # restore pointer to $key1 1844 l %r0,240($key1) 1845 la %r1,0($key1) # $key1 is not needed anymore 1928 la $key,0($key1) 1978 la $key,0($key1) 2047 l %r0,240($key1) 2048 la %r1,0($key1) # $key1 is not needed anymore 2170 la $key,0($key1) 2229 la $key,0($key1) [all …]
|
/openssl/crypto/modes/ |
H A D | xts128.c | 55 (*ctx->block1) (scratch.c, scratch.c, ctx->key1); in CRYPTO_xts128_encrypt() 100 (*ctx->block1) (scratch.c, scratch.c, ctx->key1); in CRYPTO_xts128_encrypt() 138 (*ctx->block1) (scratch.c, scratch.c, ctx->key1); in CRYPTO_xts128_encrypt() 149 (*ctx->block1) (scratch.c, scratch.c, ctx->key1); in CRYPTO_xts128_encrypt()
|
H A D | xts128gb.c | 55 (*ctx->block1) (scratch.c, scratch.c, ctx->key1); in ossl_crypto_xts128gb_encrypt() 119 (*ctx->block1) (scratch.c, scratch.c, ctx->key1); in ossl_crypto_xts128gb_encrypt() 176 (*ctx->block1) (scratch.c, scratch.c, ctx->key1); in ossl_crypto_xts128gb_encrypt() 187 (*ctx->block1) (scratch.c, scratch.c, ctx->key1); in ossl_crypto_xts128gb_encrypt()
|
/openssl/providers/implementations/ciphers/ |
H A D | cipher_sm4_xts.c | 106 if (in->xts.key1 != NULL) { in sm4_xts_dupctx() 107 if (in->xts.key1 != &in->ks1) in sm4_xts_dupctx() 127 || ctx->xts.key1 == NULL in sm4_xts_cipher() 147 (*ctx->stream)(in, out, inl, ctx->xts.key1, ctx->xts.key2, in sm4_xts_cipher() 154 (*ctx->stream_gb)(in, out, inl, ctx->xts.key1, ctx->xts.key2, in sm4_xts_cipher()
|
H A D | cipher_aes_xts.c | 161 if (in->xts.key1 != NULL) { in aes_xts_dupctx() 162 if (in->xts.key1 != &in->ks1) in aes_xts_dupctx() 187 || ctx->xts.key1 == NULL in aes_xts_cipher() 207 (*ctx->stream)(in, out, inl, ctx->xts.key1, ctx->xts.key2, ctx->base.iv); in aes_xts_cipher()
|
H A D | cipher_sm4_xts_hw.c | 26 xctx->xts.key1 = &xctx->ks1; \ 81 dctx->xts.key1 = &dctx->ks1.ks; in cipher_hw_sm4_xts_copyctx()
|
H A D | cipher_sm4_xts.h | 16 const SM4_KEY *key1, const SM4_KEY *key2,
|
H A D | cipher_aes_xts.h | 22 const AES_KEY *key1, const AES_KEY *key2,
|
H A D | cipher_aes_xts_hw.c | 33 xctx->xts.key1 = &xctx->ks1; \ 96 dctx->xts.key1 = &dctx->ks1.ks; in cipher_hw_aes_xts_copyctx()
|
/openssl/providers/implementations/kem/ |
H A D | ecx_kem.c | 179 static int ecx_match_params(const ECX_KEY *key1, const ECX_KEY *key2) in ecx_match_params() argument 181 return (key1->type == key2->type && key1->keylen == key2->keylen); in ecx_match_params()
|
H A D | ec_kem.c | 214 static int ossl_ec_match_params(const EC_KEY *key1, const EC_KEY *key2) in ossl_ec_match_params() argument 218 const EC_GROUP *group1 = EC_KEY_get0_group(key1); in ossl_ec_match_params() 221 ctx = BN_CTX_new_ex(ossl_ec_key_get_libctx(key1)); in ossl_ec_match_params()
|
/openssl/doc/man7/ |
H A D | des_modes.pod | 189 Encrypt with key1, decrypt with key2 and encrypt with key3 again. 224 Encrypt with key1, decrypt with key2 and then encrypt with key3.
|
/openssl/include/openssl/ |
H A D | des.h | 195 void DES_string_to_2keys(const char *str, DES_cblock *key1, DES_cblock *key2);
|