| /src/crypto/openssl/crypto/modes/ |
| H A D | gcm128.c | 331 #define GHASH(ctx, in, len) ctx->funcs.ghash((ctx)->Xi.u, (ctx)->Htable, in, len) macro 745 #ifdef GHASH in CRYPTO_gcm128_aad() 747 GHASH(ctx, aad, i); in CRYPTO_gcm128_aad() 790 #if defined(GHASH) && !defined(OPENSSL_SMALL_FOOTPRINT) in CRYPTO_gcm128_encrypt() 820 #if defined(GHASH) in CRYPTO_gcm128_encrypt() 827 GHASH(ctx, ctx->Xn, mres); in CRYPTO_gcm128_encrypt() 852 #if defined(GHASH) in CRYPTO_gcm128_encrypt() 854 GHASH(ctx, ctx->Xn, mres); in CRYPTO_gcm128_encrypt() 881 GHASH(ctx, out - GHASH_CHUNK, GHASH_CHUNK); in CRYPTO_gcm128_encrypt() 908 GHASH(ctx, out - j, j); in CRYPTO_gcm128_encrypt() [all …]
|
| /src/sys/contrib/openzfs/ |
| H A D | COPYRIGHT | 25 * GHASH Implementation: module/icp/asm-x86_64/modes/THIRDPARTYLICENSE.cryptogams 26 * GHASH Implementation: module/icp/asm-x86_64/modes/THIRDPARTYLICENSE.openssl
|
| /src/sys/contrib/openzfs/module/icp/asm-x86_64/modes/ |
| H A D | THIRDPARTYLICENSE.cryptogams.descrip | 1 PORTIONS OF GCM and GHASH FUNCTIONALITY
|
| H A D | THIRDPARTYLICENSE.openssl.descrip | 1 PORTIONS OF GCM and GHASH FUNCTIONALITY
|
| H A D | THIRDPARTYLICENSE.boringssl.descrip | 1 PORTIONS OF AES GCM and GHASH FUNCTIONALITY
|
| H A D | ghash-x86_64.S | 19 # The module implements "4-bit" GCM GHASH function and underlying 21 # it uses 256 bytes per-key table [+128 bytes shared table]. GHASH 24 # Performance results are for this streamed GHASH subroutine and are
|
| H A D | aesni-gcm-x86_64.S | 18 # AES-NI-CTR+GHASH stitch. 25 # PCLMULQDQ-enabled GHASH. Unfortunately, as no stitch implementation
|
| /src/sys/contrib/openzfs/module/icp/algs/modes/ |
| H A D | gcm.c | 40 #define GHASH(c, d, t, o) \ macro 180 GHASH(ctx, ctx->gcm_tmp, ctx->gcm_ghash, gops); in gcm_mode_encrypt_contiguous_blocks() 261 GHASH(ctx, macp, ghash, gops); in gcm_encrypt_final() 268 GHASH(ctx, ctx->gcm_len_a_len_c, ghash, gops); in gcm_encrypt_final() 320 GHASH(ctx, ctx->gcm_tmp, ctx->gcm_ghash, gcm_impl_get_ops()); in gcm_decrypt_incomplete_block() 416 GHASH(ctx, blockp, ghash, gops); in gcm_decrypt_final() 439 GHASH(ctx, ctx->gcm_len_a_len_c, ghash, gops); in gcm_decrypt_final() 522 GHASH(ctx, datap, ghash, gops); in gcm_format_initial_blocks() 527 GHASH(ctx, len_a_len_c, ctx->gcm_J0, gops); in gcm_format_initial_blocks() 585 GHASH(ctx, datap, ghash, gops); in gcm_init()
|
| /src/crypto/openssl/providers/implementations/ciphers/ |
| H A D | cipher_aes_gcm_hw_s390x.inc | 61 * The GHASH of this value can then be calculated. 73 /* Copy the 128 bit GHASH result into J0 and clear the tag */
|
| H A D | cipher_aes_gcm_hw_vaes_avx512.inc | 157 /* Finalize GHASH(AAD) if AAD partial blocks left unprocessed */
|
| /src/sys/crypto/openssl/powerpc64/ |
| H A D | aes-gcm-ppc.S | 518 # initialize ICB: GHASH( IV ), IV - r7 706 # initialize ICB: GHASH( IV ), IV - r7
|
| /src/sys/crypto/openssl/powerpc/ |
| H A D | aes-gcm-ppc.S | 518 # initialize ICB: GHASH( IV ), IV - r7 706 # initialize ICB: GHASH( IV ), IV - r7
|
| /src/sys/crypto/openssl/powerpc64le/ |
| H A D | aes-gcm-ppc.S | 518 # initialize ICB: GHASH( IV ), IV - r7 706 # initialize ICB: GHASH( IV ), IV - r7
|
| /src/crypto/openssl/doc/man3/ |
| H A D | OPENSSL_s390xcap.pod | 96 # 65 1<<62 KIMD-GHASH
|
| H A D | OPENSSL_ppccap.pod | 69 GHASH, and Poly1305.
|
| /src/crypto/openssl/crypto/modes/asm/ |
| H A D | aes-gcm-avx512.pl | 1001 my $GHASH = $_[1]; # [out] ghash output 1216 @{[XWORD($GHASH)]}, 4127 my $GHASH = $_[4]; # [in] ZMM with AAD (low 128 bits) 4240 if ($GHASH ne "no_ghash") { 4243 vpxorq $GHASH,$B00_03,$B00_03
|
| /src/crypto/openssl/ |
| H A D | CHANGES.md | 1317 * Enable extra Arm64 optimization on Windows for GHASH, RAND and AES. 8208 This covers AES, SHA256/512 and GHASH. "Initial" means that most 8219 SHA1, SHA256 and GHASH. "Initial" means that most common cases 8231 SHA256/512, MD5, GHASH and modular exponentiation. 9844 - `*`: GHASH and GF(2^m) multiplication implementations;
|