| /crypto/ |
| A D | md5.c | 40 u32 a, b, c, d; in md5_transform() local 42 a = hash[0]; in md5_transform() 47 MD5STEP(F1, a, b, c, d, in[0] + 0xd76aa478, 7); in md5_transform() 48 MD5STEP(F1, d, a, b, c, in[1] + 0xe8c7b756, 12); in md5_transform() 49 MD5STEP(F1, c, d, a, b, in[2] + 0x242070db, 17); in md5_transform() 50 MD5STEP(F1, b, c, d, a, in[3] + 0xc1bdceee, 22); in md5_transform() 51 MD5STEP(F1, a, b, c, d, in[4] + 0xf57c0faf, 7); in md5_transform() 55 MD5STEP(F1, a, b, c, d, in[8] + 0x698098d8, 7); in md5_transform() 64 MD5STEP(F2, a, b, c, d, in[1] + 0xf61e2562, 5); in md5_transform() 65 MD5STEP(F2, d, a, b, c, in[6] + 0xc040b340, 9); in md5_transform() [all …]
|
| A D | md4.c | 63 #define ROUND1(a,b,c,d,k,s) (a = lshift(a + F(b,c,d) + k, s)) argument 64 #define ROUND2(a,b,c,d,k,s) (a = lshift(a + G(b,c,d) + k + (u32)0x5A827999,s)) argument 65 #define ROUND3(a,b,c,d,k,s) (a = lshift(a + H(b,c,d) + k + (u32)0x6ED9EBA1,s)) argument 69 u32 a, b, c, d; in md4_transform() local 71 a = hash[0]; in md4_transform() 76 ROUND1(a, b, c, d, in[0], 3); in md4_transform() 77 ROUND1(d, a, b, c, in[1], 7); in md4_transform() 80 ROUND1(a, b, c, d, in[4], 3); in md4_transform() 81 ROUND1(d, a, b, c, in[5], 7); in md4_transform() 84 ROUND1(a, b, c, d, in[8], 3); in md4_transform() [all …]
|
| A D | twofish_generic.c | 40 #define G1(a) \ argument 41 (ctx->s[0][(a) & 0xFF]) ^ (ctx->s[1][((a) >> 8) & 0xFF]) \ 42 ^ (ctx->s[2][((a) >> 16) & 0xFF]) ^ (ctx->s[3][(a) >> 24]) 54 x = G1 (a); y = G2 (b); \ 61 x = G1 (a); y = G2 (b); \ 100 u32 a, b, c, d; in twofish_encrypt() local 106 INPACK (0, a, 0); in twofish_encrypt() 124 OUTUNPACK (2, a, 6); in twofish_encrypt() 135 u32 a, b, c, d; in twofish_decrypt() local 143 INPACK (2, a, 6); in twofish_decrypt() [all …]
|
| A D | twofish_common.c | 483 #define CALC_SB_2(i, a, b) \ argument 491 #define CALC_SB192_2(i, a, b) \ argument 499 #define CALC_SB256_2(i, a, b) \ argument 529 #define CALC_K_2(a, b, c, d, j) \ argument 535 #define CALC_K(a, j, k, l, m, n) \ argument 540 ctx->a[(j) + 1] = rol32(y, 9) 553 ctx->a[(j) + 1] = rol32(y, 9) 555 #define CALC_K256_2(a, b, j) \ argument 557 q1[a ^ key[(j) + 25]], \ 558 q0[a ^ key[(j) + 26]], \ [all …]
|
| A D | ecc_curve_defs.h | 28 .a = nist_p192_a, 55 .a = nist_p256_a, 88 .a = nist_p384_a, 133 .a = nist_p521_a, 152 .a = curve25519_a,
|
| A D | ecrdsa_defs.h | 58 .a = cp256a_a, 92 .a = cp256b_a, 130 .a = cp256c_a, 180 .a = tc512a_a, 226 .a = tc512b_a,
|
| A D | blake2b_generic.c | 46 #define G(r,i,a,b,c,d) \ argument 48 a = a + b + m[blake2b_sigma[r][2*i+0]]; \ 49 d = ror64(d ^ a, 32); \ 52 a = a + b + m[blake2b_sigma[r][2*i+1]]; \ 53 d = ror64(d ^ a, 16); \
|
| A D | echainiv.c | 60 u64 a; in echainiv_encrypt() local 62 memcpy(&a, ctx->salt + ivsize - 8, 8); in echainiv_encrypt() 64 a |= 1; in echainiv_encrypt() 65 a *= seqno; in echainiv_encrypt() 67 memcpy(info + ivsize - 8, &a, 8); in echainiv_encrypt()
|
| A D | Kconfig | 32 required if you want the system to operate in a FIPS 200 222 This converts an arbitrary crypto algorithm into a parallel 231 This is a generic software asynchronous crypto daemon that 389 with a more dramatic performance hit) 574 Tiny Encryption Algorithm is a simple cipher that uses 578 Xtendend Tiny Encryption Algorithm is a modification to 579 the TEA algorithm to address a potential key weakness 767 implementation currently can't handle a sectorsize which is not a 852 a sequence number xored with a salt. This is the default 963 This is used in HCTR2. It is not a general-purpose [all …]
|
| A D | testmgr.h | 715 be64_to_cpua(5a, 8b, 82, 69, 7e, 8a, 0a, 09), 724 be64_to_cpua(6a, 14, 4f, 53, 75, c8, 02, 48), 745 be64_to_cpua(01, 48, fb, 5f, 72, 2a, d4, 8f), 746 be64_to_cpua(6b, 1a, 58, 56, f1, 8f, f7, fd), 754 be64_to_cpua(7d, 3a, 97, d9, cd, 1a, 6a, 49), 755 be64_to_cpua(32, dd, 41, 74, 6a, 51, c7, d9), 993 be64_to_cpua(76, 31, 79, 4a, e9, 81, 6a, ee), 1177 be64_to_cpua(c4, 6a, 03, 5f, 8d, 7a, f9, fb), 1179 be64_to_cpua(de, 3a, 3d, 16, af, b4, 52, 6a), 1207 be64_to_cpua(46, 6b, c7, af, 7a, b9, 19, 0a), [all …]
|
| A D | aegis128-neon-inner.c | 182 static uint8x16_t vqtbl1q_u8(uint8x16_t a, uint8x16_t b) in vqtbl1q_u8() argument 187 } __a = { a }; in vqtbl1q_u8() 193 static uint8x16_t vqtbx1q_u8(uint8x16_t v, uint8x16_t a, uint8x16_t b) in vqtbx1q_u8() argument 198 } __a = { a }; in vqtbx1q_u8()
|
| A D | adiantum.c | 192 r->a = cpu_to_le64(le64_to_cpu(v1->a) + le64_to_cpu(v2->a) + in le128_add() 203 r->a = cpu_to_le64(le64_to_cpu(v1->a) - le64_to_cpu(v2->a) - in le128_sub()
|
| A D | blowfish_common.c | 305 #define ROUND(a, b, n) ({ b ^= P[n]; a ^= bf_F(b); }) argument
|
| A D | blowfish_generic.c | 35 #define ROUND(a, b, n) ({ b ^= P[n]; a ^= bf_F(b); }) argument
|
| A D | polyval-generic.c | 71 u64 a = get_unaligned((const u64 *)&src[0]); in copy_and_reverse() local 74 put_unaligned(swab64(a), (u64 *)&dst[8]); in copy_and_reverse()
|
| A D | ecc.c | 405 static uint128_t add_128_128(uint128_t a, uint128_t b) in add_128_128() argument 409 result.m_low = a.m_low + b.m_low; in add_128_128() 410 result.m_high = a.m_high + b.m_high + (result.m_low < a.m_low); in add_128_128() 1042 u64 a[ECC_MAX_DIGITS], b[ECC_MAX_DIGITS]; in vli_mod_inv() local 1052 vli_set(a, input, ndigits); in vli_mod_inv() 1058 while ((cmp_result = vli_cmp(a, b, ndigits)) != 0) { in vli_mod_inv() 1061 if (EVEN(a)) { in vli_mod_inv() 1062 vli_rshift1(a, ndigits); in vli_mod_inv() 1080 vli_sub(a, a, b, ndigits); in vli_mod_inv() 1081 vli_rshift1(a, ndigits); in vli_mod_inv() [all …]
|
| A D | algapi.c | 1003 static inline void crypto_inc_byte(u8 *a, unsigned int size) in crypto_inc_byte() argument 1005 u8 *b = (a + size); in crypto_inc_byte() 1016 void crypto_inc(u8 *a, unsigned int size) in crypto_inc() argument 1018 __be32 *b = (__be32 *)(a + size); in crypto_inc() 1030 crypto_inc_byte(a, size); in crypto_inc()
|
| A D | ccm.c | 146 static int format_adata(u8 *adata, unsigned int a) in format_adata() argument 153 if (a < 65280) { in format_adata() 154 *(__be16 *)adata = cpu_to_be16(a); in format_adata() 158 *(__be32 *)&adata[2] = cpu_to_be32(a); in format_adata()
|
| A D | rmd160.c | 39 #define ROUND(a, b, c, d, e, f, k, x, s) { \ argument 40 (a) += f((b), (c), (d)) + le32_to_cpup(&(x)) + (k); \ 41 (a) = rol32((a), (s)) + (e); \
|
| A D | serpent_generic.c | 24 #define keyiter(a, b, c, d, i, j) \ argument 25 ({ b ^= d; b ^= c; b ^= a; b ^= PHI ^ i; b = rol32(b, 11); k[j] = b; })
|
| /crypto/asymmetric_keys/ |
| A D | Kconfig | 6 This option provides support for a key type that holds the data for 33 data and provides the ability to instantiate a crypto key from a 43 private key data and provides the ability to instantiate a crypto key 60 This option provides a type of key that can be loaded up from a 61 PKCS#7 message - provided the message is signed by a trusted key. If 76 This option provides support for verifying the signature(s) on a
|
| A D | x509_public_key.c | 108 bool a = asymmetric_key_id_same(cert->skid, cert->sig->auth_ids[1]); in x509_check_for_self_signed() local 111 if (!a && !b) in x509_check_for_self_signed() 115 if (((a && !b) || (b && !a)) && in x509_check_for_self_signed()
|
| A D | verify_pefile.c | 208 static int pefile_compare_shdrs(const void *a, const void *b) in pefile_compare_shdrs() argument 210 const struct section_header *shdra = a; in pefile_compare_shdrs()
|
| /crypto/async_tx/ |
| A D | async_raid6_recov.c | 28 u8 *a, *b, *c; in async_sum_product() local 73 a = page_address(srcs[0]) + src_offs[0]; in async_sum_product() 78 ax = amul[*a++]; in async_sum_product() 158 struct page *p, *q, *a, *b; in __2data_recov_4() local 173 a = blocks[faila]; in __2data_recov_4() 196 tx = async_xor_offs(a, a_off, srcs, src_offs, 2, bytes, submit); in __2data_recov_4()
|
| /crypto/krb5/ |
| A D | Kconfig | 18 Provide a library for provision of Kerberos-5-based crypto. This is
|