| /crypto/ |
| A D | md5.c | 30 #define F1(x, y, z) (z ^ (x & (y ^ z))) macro 31 #define F2(x, y, z) F1(z, x, y) 47 MD5STEP(F1, a, b, c, d, in[0] + 0xd76aa478, 7); in md5_transform() 48 MD5STEP(F1, d, a, b, c, in[1] + 0xe8c7b756, 12); in md5_transform() 49 MD5STEP(F1, c, d, a, b, in[2] + 0x242070db, 17); in md5_transform() 50 MD5STEP(F1, b, c, d, a, in[3] + 0xc1bdceee, 22); in md5_transform() 51 MD5STEP(F1, a, b, c, d, in[4] + 0xf57c0faf, 7); in md5_transform() 52 MD5STEP(F1, d, a, b, c, in[5] + 0x4787c62a, 12); in md5_transform() 53 MD5STEP(F1, c, d, a, b, in[6] + 0xa8304613, 17); in md5_transform() 54 MD5STEP(F1, b, c, d, a, in[7] + 0xfd469501, 22); in md5_transform() [all …]
|
| A D | rmd160.c | 33 #define F1(x, y, z) (x ^ y ^ z) /* XOR */ macro 64 ROUND(aa, bb, cc, dd, ee, F1, K1, in[0], 11); in rmd160_transform() 65 ROUND(ee, aa, bb, cc, dd, F1, K1, in[1], 14); in rmd160_transform() 66 ROUND(dd, ee, aa, bb, cc, F1, K1, in[2], 15); in rmd160_transform() 67 ROUND(cc, dd, ee, aa, bb, F1, K1, in[3], 12); in rmd160_transform() 68 ROUND(bb, cc, dd, ee, aa, F1, K1, in[4], 5); in rmd160_transform() 69 ROUND(aa, bb, cc, dd, ee, F1, K1, in[5], 8); in rmd160_transform() 70 ROUND(ee, aa, bb, cc, dd, F1, K1, in[6], 7); in rmd160_transform() 71 ROUND(dd, ee, aa, bb, cc, F1, K1, in[7], 9); in rmd160_transform() 72 ROUND(cc, dd, ee, aa, bb, F1, K1, in[8], 11); in rmd160_transform() [all …]
|
| A D | cast5_generic.c | 327 t = l; l = r; r = t ^ F1(r, Km[0], Kr[0]); in __cast5_encrypt() 330 t = l; l = r; r = t ^ F1(r, Km[3], Kr[3]); in __cast5_encrypt() 333 t = l; l = r; r = t ^ F1(r, Km[6], Kr[6]); in __cast5_encrypt() 336 t = l; l = r; r = t ^ F1(r, Km[9], Kr[9]); in __cast5_encrypt() 340 t = l; l = r; r = t ^ F1(r, Km[12], Kr[12]); in __cast5_encrypt() 343 t = l; l = r; r = t ^ F1(r, Km[15], Kr[15]); in __cast5_encrypt() 372 t = l; l = r; r = t ^ F1(r, Km[15], Kr[15]); in __cast5_decrypt() 379 t = l; l = r; r = t ^ F1(r, Km[9], Kr[9]); in __cast5_decrypt() 382 t = l; l = r; r = t ^ F1(r, Km[6], Kr[6]); in __cast5_decrypt() 385 t = l; l = r; r = t ^ F1(r, Km[3], Kr[3]); in __cast5_decrypt() [all …]
|
| A D | cast6_generic.c | 27 #define F1(D, r, m) ((I = ((m) + (D))), (I = rol32(I, (r))), \ macro 96 key[6] ^= F1(key[7], Tr[i % 4][0], Tm[i][0]); in W() 99 key[3] ^= F1(key[4], Tr[i % 4][3], Tm[i][3]); in W() 102 key[0] ^= F1(key[1], Tr[i % 4][6], Tm[i][6]); in W() 156 block[2] ^= F1(block[3], Kr[0], Km[0]); in Q() 159 block[3] ^= F1(block[0], Kr[3], Km[3]); in Q() 166 block[3] ^= F1(block[0], Kr[3], Km[3]); in QBAR() 169 block[2] ^= F1(block[3], Kr[0], Km[0]); in QBAR()
|