| /crypto/ |
| A D | md5.c | 32 #define F3(x, y, z) (x ^ y ^ z) macro 81 MD5STEP(F3, a, b, c, d, in[5] + 0xfffa3942, 4); in md5_transform() 82 MD5STEP(F3, d, a, b, c, in[8] + 0x8771f681, 11); in md5_transform() 85 MD5STEP(F3, a, b, c, d, in[1] + 0xa4beea44, 4); in md5_transform() 86 MD5STEP(F3, d, a, b, c, in[4] + 0x4bdecfa9, 11); in md5_transform() 87 MD5STEP(F3, c, d, a, b, in[7] + 0xf6bb4b60, 16); in md5_transform() 89 MD5STEP(F3, a, b, c, d, in[13] + 0x289b7ec6, 4); in md5_transform() 90 MD5STEP(F3, d, a, b, c, in[0] + 0xeaa127fa, 11); in md5_transform() 91 MD5STEP(F3, c, d, a, b, in[3] + 0xd4ef3085, 16); in md5_transform() 92 MD5STEP(F3, b, c, d, a, in[6] + 0x04881d05, 23); in md5_transform() [all …]
|
| A D | rmd160.c | 35 #define F3(x, y, z) ((x | ~y) ^ z) macro 100 ROUND(dd, ee, aa, bb, cc, F3, K3, in[3], 11); in rmd160_transform() 101 ROUND(cc, dd, ee, aa, bb, F3, K3, in[10], 13); in rmd160_transform() 102 ROUND(bb, cc, dd, ee, aa, F3, K3, in[14], 6); in rmd160_transform() 103 ROUND(aa, bb, cc, dd, ee, F3, K3, in[4], 7); in rmd160_transform() 104 ROUND(ee, aa, bb, cc, dd, F3, K3, in[9], 14); in rmd160_transform() 105 ROUND(dd, ee, aa, bb, cc, F3, K3, in[15], 9); in rmd160_transform() 106 ROUND(cc, dd, ee, aa, bb, F3, K3, in[8], 13); in rmd160_transform() 107 ROUND(bb, cc, dd, ee, aa, F3, K3, in[1], 15); in rmd160_transform() 108 ROUND(aa, bb, cc, dd, ee, F3, K3, in[2], 14); in rmd160_transform() [all …]
|
| A D | cast5_generic.c | 299 #define F3(D, m, r) ((I = ((m) - (D))), (I = rol32(I, (r))), \ macro 329 t = l; l = r; r = t ^ F3(r, Km[2], Kr[2]); in __cast5_encrypt() 332 t = l; l = r; r = t ^ F3(r, Km[5], Kr[5]); in __cast5_encrypt() 335 t = l; l = r; r = t ^ F3(r, Km[8], Kr[8]); in __cast5_encrypt() 338 t = l; l = r; r = t ^ F3(r, Km[11], Kr[11]); in __cast5_encrypt() 342 t = l; l = r; r = t ^ F3(r, Km[14], Kr[14]); in __cast5_encrypt() 373 t = l; l = r; r = t ^ F3(r, Km[14], Kr[14]); in __cast5_decrypt() 377 t = l; l = r; r = t ^ F3(r, Km[11], Kr[11]); in __cast5_decrypt() 380 t = l; l = r; r = t ^ F3(r, Km[8], Kr[8]); in __cast5_decrypt() 383 t = l; l = r; r = t ^ F3(r, Km[5], Kr[5]); in __cast5_decrypt() [all …]
|
| A D | cast6_generic.c | 31 #define F3(D, r, m) ((I = ((m) - (D))), (I = rol32(I, (r))), \ macro 98 key[4] ^= F3(key[5], Tr[i % 4][2], Tm[i][2]); in W() 101 key[1] ^= F3(key[2], Tr[i % 4][5], Tm[i][5]); in W() 158 block[0] ^= F3(block[1], Kr[2], Km[2]); in Q() 167 block[0] ^= F3(block[1], Kr[2], Km[2]); in QBAR()
|