Home
last modified time | relevance | path

Searched refs:F1 (Results 1 – 4 of 4) sorted by relevance

/crypto/
A Dmd5.c30 #define F1(x, y, z) (z ^ (x & (y ^ z))) macro
31 #define F2(x, y, z) F1(z, x, y)
47 MD5STEP(F1, a, b, c, d, in[0] + 0xd76aa478, 7); in md5_transform()
48 MD5STEP(F1, d, a, b, c, in[1] + 0xe8c7b756, 12); in md5_transform()
49 MD5STEP(F1, c, d, a, b, in[2] + 0x242070db, 17); in md5_transform()
50 MD5STEP(F1, b, c, d, a, in[3] + 0xc1bdceee, 22); in md5_transform()
51 MD5STEP(F1, a, b, c, d, in[4] + 0xf57c0faf, 7); in md5_transform()
52 MD5STEP(F1, d, a, b, c, in[5] + 0x4787c62a, 12); in md5_transform()
53 MD5STEP(F1, c, d, a, b, in[6] + 0xa8304613, 17); in md5_transform()
54 MD5STEP(F1, b, c, d, a, in[7] + 0xfd469501, 22); in md5_transform()
[all …]
A Drmd160.c33 #define F1(x, y, z) (x ^ y ^ z) /* XOR */ macro
64 ROUND(aa, bb, cc, dd, ee, F1, K1, in[0], 11); in rmd160_transform()
65 ROUND(ee, aa, bb, cc, dd, F1, K1, in[1], 14); in rmd160_transform()
66 ROUND(dd, ee, aa, bb, cc, F1, K1, in[2], 15); in rmd160_transform()
67 ROUND(cc, dd, ee, aa, bb, F1, K1, in[3], 12); in rmd160_transform()
68 ROUND(bb, cc, dd, ee, aa, F1, K1, in[4], 5); in rmd160_transform()
69 ROUND(aa, bb, cc, dd, ee, F1, K1, in[5], 8); in rmd160_transform()
70 ROUND(ee, aa, bb, cc, dd, F1, K1, in[6], 7); in rmd160_transform()
71 ROUND(dd, ee, aa, bb, cc, F1, K1, in[7], 9); in rmd160_transform()
72 ROUND(cc, dd, ee, aa, bb, F1, K1, in[8], 11); in rmd160_transform()
[all …]
A Dcast5_generic.c327 t = l; l = r; r = t ^ F1(r, Km[0], Kr[0]); in __cast5_encrypt()
330 t = l; l = r; r = t ^ F1(r, Km[3], Kr[3]); in __cast5_encrypt()
333 t = l; l = r; r = t ^ F1(r, Km[6], Kr[6]); in __cast5_encrypt()
336 t = l; l = r; r = t ^ F1(r, Km[9], Kr[9]); in __cast5_encrypt()
340 t = l; l = r; r = t ^ F1(r, Km[12], Kr[12]); in __cast5_encrypt()
343 t = l; l = r; r = t ^ F1(r, Km[15], Kr[15]); in __cast5_encrypt()
372 t = l; l = r; r = t ^ F1(r, Km[15], Kr[15]); in __cast5_decrypt()
379 t = l; l = r; r = t ^ F1(r, Km[9], Kr[9]); in __cast5_decrypt()
382 t = l; l = r; r = t ^ F1(r, Km[6], Kr[6]); in __cast5_decrypt()
385 t = l; l = r; r = t ^ F1(r, Km[3], Kr[3]); in __cast5_decrypt()
[all …]
A Dcast6_generic.c27 #define F1(D, r, m) ((I = ((m) + (D))), (I = rol32(I, (r))), \ macro
96 key[6] ^= F1(key[7], Tr[i % 4][0], Tm[i][0]); in W()
99 key[3] ^= F1(key[4], Tr[i % 4][3], Tm[i][3]); in W()
102 key[0] ^= F1(key[1], Tr[i % 4][6], Tm[i][6]); in W()
156 block[2] ^= F1(block[3], Kr[0], Km[0]); in Q()
159 block[3] ^= F1(block[0], Kr[3], Km[3]); in Q()
166 block[3] ^= F1(block[0], Kr[3], Km[3]); in QBAR()
169 block[2] ^= F1(block[3], Kr[0], Km[0]); in QBAR()

Completed in 6 milliseconds