DXR is a code search and navigation tool aimed at making sense of large projects. It supports full-text and regex searches as well as structural queries.

Name Description Modified (UTC) Size
ecl ***** BEGIN LICENSE BLOCK *****
mpi ***** BEGIN LICENSE BLOCK *****
Makefile 21.4 kB
aeskeywrap.c implement AES Key Wrap algorithm from RFC 3394 10.2 kB
alg2268.c implementation of the algorithm in RFC 2268 12.9 kB
alghmac.c 4.3 kB
alghmac.h destroy HMAC context 1.9 kB
arcfive.c stubs for RC5 - NOT a working implementation 2.6 kB
arcfour-amd64-gas.s 2.5 kB
arcfour-amd64-masm.asm 3.9 kB
arcfour-amd64-sun.s 2.4 kB
arcfour.c the arc four algorithm 16.7 kB
blapi.h public prototypes for the freebl library 58.8 kB
blapii.h private data structures and prototypes for the freebl library 1.0 kB
blapit.h public data structures for the freebl library 12.2 kB
camellia.c key constants 63.2 kB
camellia.h CamelliaContextStr * * Values which maintain the state for Camellia encryption/decryption. * * k 1.4 kB
config.mk 2.5 kB
ctr.c void 6.0 kB
ctr.h void 1.6 kB
cts.c PRBool freeit 10.7 kB
cts.h PRBool freeit 1.1 kB
des.c 150 library 25.4 kB
des.h 150 library 1.1 kB
desblapi.c Intel X86 CPUs do unaligned loads and stores without complaint. 7.1 kB
dh.c Diffie-Hellman parameter generation, key generation, and secret derivation. * KEA secret generation 12.2 kB
drbg.c PRNG_SEEDLEN defined in NIST SP 800-90 section 10.1 * for SHA-1, SHA-224, and SHA-256 it's 440 bit 31.3 kB
dsa.c FIPS 186-2 requires result from random output to be reduced mod q when * generating random numbers 18.8 kB
ec.c Returns true if pointP is the point at infinity, false otherwise 30.9 kB
ec.h 394 Bytes
ecdecode.c Initializes a SECItem from a hexadecimal string * * Warning: This function ignores leading 00's, s 17.2 kB
freebl.def 1.2 kB
freebl.rc 1.9 kB
freebl_hash.def 1.4 kB
freeblver.c Library identity and versioning 786 Bytes
gcm.c unsigned char 24.6 kB
gcm.h PRBool freeit 1.1 kB
genload.c This file is meant to be included by other .c files. * This file takes a "parameter", the scope whi 5.4 kB
hmacct.c MAX_HASH_BIT_COUNT_BYTES is the maximum number of bytes in the hash's length * field. (SHA-384/512 12.4 kB
hmacct.h 1.0 kB
intel-aes-x64-masm.asm 21.3 kB
intel-aes-x86-masm.asm 20.3 kB
intel-aes.h Prototypes of the functions defined in the assembler file. 5.9 kB
intel-aes.s in %rdi : the key in %rsi : buffer for expanded key 100.5 kB
intel-gcm-wrap.c Copyright(c) 2013, Intel Corp. 7.1 kB
intel-gcm-x64-masm.asm 34.8 kB
intel-gcm-x86-masm.asm 31.8 kB
intel-gcm.h This submission to NSS is to be made available under the terms of the 4.1 kB
intel-gcm.s 32.8 kB
jpake.c Hash an item's length and then its value. Only items smaller than 2^16 bytes * are allowed. Lengths 14.0 kB
ldvector.c platform dependent DSO containing freebl implementation 5.8 kB
loader.c load platform dependent DSO containing freebl implementation 59.8 kB
loader.h load platform dependent DSO containing freebl implementation 29.5 kB
manifest.mn 3.0 kB
md2.c 6.5 kB
md5.c 14.7 kB
mknewpc2.c two 28-bit registers defined in key schedule production process 5.8 kB
mksp.c sboxes - the tables for the s-box functions * from FIPS 46, pages 15-16. 3.8 kB
nsslowhash.c FIPS preprocessor directives for message digests 10.8 kB
nsslowhash.h Provide FIPS validated hashing for applications that only need hashing. * NOTE: mac'ing requires ke 1.2 kB
os2_rand.c 8.0 kB
pqg.c PQG parameter generation/verification. Based on FIPS 186-3. 59.7 kB
pqg.h pqg.h * * header file for pqg functions exported just to freebl 963 Bytes
rawhash.c 5.0 kB
ret_cr16.s ENTRY 629 Bytes
rijndael.c There are currently five ways to build this code, varying in performance * and code size. * * RIJ 38.9 kB
rijndael.h RIJNDAEL_NUM_ROUNDS * * Number of rounds per execution * Nk - number of key bytes * Nb - blocksi 2.2 kB
rijndael32.tab 79.0 kB
rijndael_tables.c what follows is code thrown together to generate the myriad of tables * used by Rijndael, the AES c 8.9 kB
rsa.c RSA key generation, public key op, private key op. 48.6 kB
rsapkcs.c RSA PKCS#1 v2.1 (RFC 3447) operations 40.1 kB
secmpi.h 1.5 kB
secrng.h public data structures and prototypes for the secure random 1.9 kB
seed.c 24.8 kB
seed.h 3.8 kB
sha-fast-amd64-sun.s 37.6 kB
sha256.h 544 Bytes
sha512.c implementation of SHA224 39.8 kB
sha_fast.c SHA: initialize context 14.7 kB
sha_fast.h 4.2 kB
shsign.h 446 Bytes
shvfy.c Most modern version of Linux support a speed optimization scheme where an * application called prel 12.8 kB
stubs.c Allow freebl and softoken to be loaded without util or NSPR. * * These symbols are overridden once 15.9 kB
stubs.h Allow freebl and softoken to be loaded without util or NSPR. * * These symbols are overridden once 2.1 kB
sysrand.c Normal RNG_SystemRNG() isn't available, use the system noise to collect * the required amount of en 1.0 kB
tlsprfalg.c TLS Pseudo Random Function 3.8 kB
unix_rand.c When copying data to the buffer we want the least signicant bytes * from the input since those bits 27.2 kB
win_rand.c 4.6 kB