/third_party/node/deps/openssl/openssl/crypto/bn/ |
H A D | bn_blind.c | 18 BIGNUM *Ai; member 30 BN_BLINDING *BN_BLINDING_new(const BIGNUM *A, const BIGNUM *Ai, BIGNUM *mod) in BN_BLINDING_new() argument 55 if (Ai != NULL) { in BN_BLINDING_new() 56 if ((ret->Ai = BN_dup(Ai)) == NULL) in BN_BLINDING_new() 86 BN_free(r->Ai); in BN_BLINDING_free() 97 if ((b->A == NULL) || (b->Ai == NULL)) { in BN_BLINDING_update() 112 if (!bn_mul_mont_fixed_top(b->Ai, b->Ai, b->Ai, in BN_BLINDING_update() [all...] |
/third_party/openssl/crypto/bn/ |
H A D | bn_blind.c | 18 BIGNUM *Ai; member 30 BN_BLINDING *BN_BLINDING_new(const BIGNUM *A, const BIGNUM *Ai, BIGNUM *mod) in BN_BLINDING_new() argument 55 if (Ai != NULL) { in BN_BLINDING_new() 56 if ((ret->Ai = BN_dup(Ai)) == NULL) in BN_BLINDING_new() 86 BN_free(r->Ai); in BN_BLINDING_free() 97 if ((b->A == NULL) || (b->Ai == NULL)) { in BN_BLINDING_update() 112 if (!bn_mul_mont_fixed_top(b->Ai, b->Ai, b->Ai, in BN_BLINDING_update() [all...] |
/third_party/node/deps/openssl/openssl/providers/implementations/kdfs/ |
H A D | tls1_prf.c | 294 unsigned char Ai[EVP_MAX_MD_SIZE]; in tls1_prf_P_hash() local 312 if (!EVP_MAC_final(ctx_Ai, Ai, &Ai_len, sizeof(Ai))) in tls1_prf_P_hash() 321 if (!EVP_MAC_update(ctx, Ai, Ai_len)) in tls1_prf_P_hash() 332 /* last chunk - use Ai as temp bounce buffer */ in tls1_prf_P_hash() 333 if (!EVP_MAC_final(ctx, Ai, &Ai_len, sizeof(Ai))) in tls1_prf_P_hash() 335 memcpy(out, Ai, olen); in tls1_prf_P_hash() 349 OPENSSL_cleanse(Ai, sizeof(Ai)); in tls1_prf_P_hash() [all...] |
H A D | pkcs12kdf.c | 53 unsigned char *B = NULL, *D = NULL, *I = NULL, *p = NULL, *Ai = NULL; in pkcs12kdf_derive() local 74 Ai = OPENSSL_malloc(u); in pkcs12kdf_derive() 83 if (D == NULL || Ai == NULL || B == NULL || I == NULL) { in pkcs12kdf_derive() 98 || !EVP_DigestFinal_ex(ctx, Ai, NULL)) in pkcs12kdf_derive() 102 || !EVP_DigestUpdate(ctx, Ai, u) in pkcs12kdf_derive() 103 || !EVP_DigestFinal_ex(ctx, Ai, NULL)) in pkcs12kdf_derive() 106 memcpy(out, Ai, n < u ? n : u); in pkcs12kdf_derive() 114 B[j] = Ai[j % u]; in pkcs12kdf_derive() 130 OPENSSL_free(Ai); in pkcs12kdf_derive()
|
/third_party/openssl/providers/implementations/kdfs/ |
H A D | tls1_prf.c | 294 unsigned char Ai[EVP_MAX_MD_SIZE]; in tls1_prf_P_hash() local 312 if (!EVP_MAC_final(ctx_Ai, Ai, &Ai_len, sizeof(Ai))) in tls1_prf_P_hash() 321 if (!EVP_MAC_update(ctx, Ai, Ai_len)) in tls1_prf_P_hash() 332 /* last chunk - use Ai as temp bounce buffer */ in tls1_prf_P_hash() 333 if (!EVP_MAC_final(ctx, Ai, &Ai_len, sizeof(Ai))) in tls1_prf_P_hash() 335 memcpy(out, Ai, olen); in tls1_prf_P_hash() 349 OPENSSL_cleanse(Ai, sizeof(Ai)); in tls1_prf_P_hash() [all...] |
H A D | pkcs12kdf.c | 53 unsigned char *B = NULL, *D = NULL, *I = NULL, *p = NULL, *Ai = NULL; in pkcs12kdf_derive() local 74 Ai = OPENSSL_malloc(u); in pkcs12kdf_derive() 83 if (D == NULL || Ai == NULL || B == NULL || I == NULL) { in pkcs12kdf_derive() 98 || !EVP_DigestFinal_ex(ctx, Ai, NULL)) in pkcs12kdf_derive() 102 || !EVP_DigestUpdate(ctx, Ai, u) in pkcs12kdf_derive() 103 || !EVP_DigestFinal_ex(ctx, Ai, NULL)) in pkcs12kdf_derive() 106 memcpy(out, Ai, n < u ? n : u); in pkcs12kdf_derive() 114 B[j] = Ai[j % u]; in pkcs12kdf_derive() 130 OPENSSL_free(Ai); in pkcs12kdf_derive()
|
/third_party/node/deps/openssl/openssl/crypto/sha/ |
H A D | keccak1600.c | 985 static uint64_t BitInterleave(uint64_t Ai) in BitInterleave() argument 988 uint32_t hi = (uint32_t)(Ai >> 32), lo = (uint32_t)Ai; in BitInterleave() 1015 Ai = ((uint64_t)(hi | lo) << 32) | (t1 | t0); in BitInterleave() 1018 return Ai; in BitInterleave() 1021 static uint64_t BitDeinterleave(uint64_t Ai) in BitDeinterleave() argument 1024 uint32_t hi = (uint32_t)(Ai >> 32), lo = (uint32_t)Ai; in BitDeinterleave() 1051 Ai = ((uint64_t)(hi | lo) << 32) | (t1 | t0); in BitDeinterleave() 1054 return Ai; in BitDeinterleave() 1077 uint64_t Ai = (uint64_t)inp[0] | (uint64_t)inp[1] << 8 | SHA3_absorb() local 1105 uint64_t Ai = BitDeinterleave(A_flat[i]); SHA3_squeeze() local [all...] |
/third_party/openssl/crypto/sha/ |
H A D | keccak1600.c | 985 static uint64_t BitInterleave(uint64_t Ai) in BitInterleave() argument 988 uint32_t hi = (uint32_t)(Ai >> 32), lo = (uint32_t)Ai; in BitInterleave() 1015 Ai = ((uint64_t)(hi | lo) << 32) | (t1 | t0); in BitInterleave() 1018 return Ai; in BitInterleave() 1021 static uint64_t BitDeinterleave(uint64_t Ai) in BitDeinterleave() argument 1024 uint32_t hi = (uint32_t)(Ai >> 32), lo = (uint32_t)Ai; in BitDeinterleave() 1051 Ai = ((uint64_t)(hi | lo) << 32) | (t1 | t0); in BitDeinterleave() 1054 return Ai; in BitDeinterleave() 1077 uint64_t Ai = (uint64_t)inp[0] | (uint64_t)inp[1] << 8 | SHA3_absorb() local 1105 uint64_t Ai = BitDeinterleave(A_flat[i]); SHA3_squeeze() local [all...] |
/third_party/mbedtls/include/psa/ |
H A D | crypto_builtin_key_derivation.h | 89 uint8_t MBEDTLS_PRIVATE(Ai)[PSA_HASH_MAX_SIZE];
|
/third_party/node/deps/openssl/openssl/crypto/ec/ |
H A D | curve25519.c | 4548 ge_cached Ai[8]; /* A,3A,5A,7A,9A,11A,13A,15A */ in ge_double_scalarmult_vartime() local 4557 ge_p3_to_cached(&Ai[0], A); in ge_double_scalarmult_vartime() 4560 ge_add(&t, &A2, &Ai[0]); in ge_double_scalarmult_vartime() 4562 ge_p3_to_cached(&Ai[1], &u); in ge_double_scalarmult_vartime() 4563 ge_add(&t, &A2, &Ai[1]); in ge_double_scalarmult_vartime() 4565 ge_p3_to_cached(&Ai[2], &u); in ge_double_scalarmult_vartime() 4566 ge_add(&t, &A2, &Ai[2]); in ge_double_scalarmult_vartime() 4568 ge_p3_to_cached(&Ai[3], &u); in ge_double_scalarmult_vartime() 4569 ge_add(&t, &A2, &Ai[3]); in ge_double_scalarmult_vartime() 4571 ge_p3_to_cached(&Ai[ in ge_double_scalarmult_vartime() [all...] |
/third_party/openssl/crypto/ec/ |
H A D | curve25519.c | 4548 ge_cached Ai[8]; /* A,3A,5A,7A,9A,11A,13A,15A */ in ge_double_scalarmult_vartime() local 4557 ge_p3_to_cached(&Ai[0], A); in ge_double_scalarmult_vartime() 4560 ge_add(&t, &A2, &Ai[0]); in ge_double_scalarmult_vartime() 4562 ge_p3_to_cached(&Ai[1], &u); in ge_double_scalarmult_vartime() 4563 ge_add(&t, &A2, &Ai[1]); in ge_double_scalarmult_vartime() 4565 ge_p3_to_cached(&Ai[2], &u); in ge_double_scalarmult_vartime() 4566 ge_add(&t, &A2, &Ai[2]); in ge_double_scalarmult_vartime() 4568 ge_p3_to_cached(&Ai[3], &u); in ge_double_scalarmult_vartime() 4569 ge_add(&t, &A2, &Ai[3]); in ge_double_scalarmult_vartime() 4571 ge_p3_to_cached(&Ai[ in ge_double_scalarmult_vartime() [all...] |
/third_party/openssl/ohos_lite/crypto/ec/ |
H A D | curve25519.c | 4538 ge_cached Ai[8]; /* A,3A,5A,7A,9A,11A,13A,15A */ in ge_double_scalarmult_vartime() local 4547 ge_p3_to_cached(&Ai[0], A); in ge_double_scalarmult_vartime() 4550 ge_add(&t, &A2, &Ai[0]); in ge_double_scalarmult_vartime() 4552 ge_p3_to_cached(&Ai[1], &u); in ge_double_scalarmult_vartime() 4553 ge_add(&t, &A2, &Ai[1]); in ge_double_scalarmult_vartime() 4555 ge_p3_to_cached(&Ai[2], &u); in ge_double_scalarmult_vartime() 4556 ge_add(&t, &A2, &Ai[2]); in ge_double_scalarmult_vartime() 4558 ge_p3_to_cached(&Ai[3], &u); in ge_double_scalarmult_vartime() 4559 ge_add(&t, &A2, &Ai[3]); in ge_double_scalarmult_vartime() 4561 ge_p3_to_cached(&Ai[ in ge_double_scalarmult_vartime() [all...] |
/third_party/openssl/ohos_lite/include/openssl/ |
H A D | bn.h | 376 BN_BLINDING *BN_BLINDING_new(const BIGNUM *A, const BIGNUM *Ai, BIGNUM *mod);
|
/third_party/node/deps/openssl/openssl/include/openssl/ |
H A D | bn.h | 418 BN_BLINDING *BN_BLINDING_new(const BIGNUM *A, const BIGNUM *Ai, BIGNUM *mod);
|
/third_party/openssl/include/openssl/ |
H A D | bn.h | 418 BN_BLINDING *BN_BLINDING_new(const BIGNUM *A, const BIGNUM *Ai, BIGNUM *mod);
|
/third_party/mbedtls/library/ |
H A D | psa_crypto.c | 5519 /* We leave the fields Ai and output_block to be erased safely by the in psa_key_derivation_abort() 5734 status = psa_mac_update(&hmac, tls12_prf->Ai, hash_length); in psa_key_derivation_tls12_prf_generate_next_block() 5741 tls12_prf->Ai, hash_length, in psa_key_derivation_tls12_prf_generate_next_block() 5758 status = psa_mac_update(&hmac, tls12_prf->Ai, hash_length); in psa_key_derivation_tls12_prf_generate_next_block()
|