Home
last modified time | relevance | path

Searched refs:a (Results 1 – 25 of 26) sorted by relevance

12

/crypto/
A Dmd5.c40 u32 a, b, c, d; in md5_transform() local
42 a = hash[0]; in md5_transform()
47 MD5STEP(F1, a, b, c, d, in[0] + 0xd76aa478, 7); in md5_transform()
48 MD5STEP(F1, d, a, b, c, in[1] + 0xe8c7b756, 12); in md5_transform()
49 MD5STEP(F1, c, d, a, b, in[2] + 0x242070db, 17); in md5_transform()
50 MD5STEP(F1, b, c, d, a, in[3] + 0xc1bdceee, 22); in md5_transform()
51 MD5STEP(F1, a, b, c, d, in[4] + 0xf57c0faf, 7); in md5_transform()
55 MD5STEP(F1, a, b, c, d, in[8] + 0x698098d8, 7); in md5_transform()
64 MD5STEP(F2, a, b, c, d, in[1] + 0xf61e2562, 5); in md5_transform()
65 MD5STEP(F2, d, a, b, c, in[6] + 0xc040b340, 9); in md5_transform()
[all …]
A Dmd4.c63 #define ROUND1(a,b,c,d,k,s) (a = lshift(a + F(b,c,d) + k, s)) argument
64 #define ROUND2(a,b,c,d,k,s) (a = lshift(a + G(b,c,d) + k + (u32)0x5A827999,s)) argument
65 #define ROUND3(a,b,c,d,k,s) (a = lshift(a + H(b,c,d) + k + (u32)0x6ED9EBA1,s)) argument
69 u32 a, b, c, d; in md4_transform() local
71 a = hash[0]; in md4_transform()
76 ROUND1(a, b, c, d, in[0], 3); in md4_transform()
77 ROUND1(d, a, b, c, in[1], 7); in md4_transform()
80 ROUND1(a, b, c, d, in[4], 3); in md4_transform()
81 ROUND1(d, a, b, c, in[5], 7); in md4_transform()
84 ROUND1(a, b, c, d, in[8], 3); in md4_transform()
[all …]
A Dtwofish_generic.c40 #define G1(a) \ argument
41 (ctx->s[0][(a) & 0xFF]) ^ (ctx->s[1][((a) >> 8) & 0xFF]) \
42 ^ (ctx->s[2][((a) >> 16) & 0xFF]) ^ (ctx->s[3][(a) >> 24])
54 x = G1 (a); y = G2 (b); \
61 x = G1 (a); y = G2 (b); \
100 u32 a, b, c, d; in twofish_encrypt() local
106 INPACK (0, a, 0); in twofish_encrypt()
124 OUTUNPACK (2, a, 6); in twofish_encrypt()
135 u32 a, b, c, d; in twofish_decrypt() local
143 INPACK (2, a, 6); in twofish_decrypt()
[all …]
A Dtwofish_common.c483 #define CALC_SB_2(i, a, b) \ argument
491 #define CALC_SB192_2(i, a, b) \ argument
499 #define CALC_SB256_2(i, a, b) \ argument
529 #define CALC_K_2(a, b, c, d, j) \ argument
535 #define CALC_K(a, j, k, l, m, n) \ argument
540 ctx->a[(j) + 1] = rol32(y, 9)
553 ctx->a[(j) + 1] = rol32(y, 9)
555 #define CALC_K256_2(a, b, j) \ argument
557 q1[a ^ key[(j) + 25]], \
558 q0[a ^ key[(j) + 26]], \
[all …]
A Decc_curve_defs.h28 .a = nist_p192_a,
55 .a = nist_p256_a,
88 .a = nist_p384_a,
133 .a = nist_p521_a,
152 .a = curve25519_a,
A Decrdsa_defs.h58 .a = cp256a_a,
92 .a = cp256b_a,
130 .a = cp256c_a,
180 .a = tc512a_a,
226 .a = tc512b_a,
A Dblake2b_generic.c46 #define G(r,i,a,b,c,d) \ argument
48 a = a + b + m[blake2b_sigma[r][2*i+0]]; \
49 d = ror64(d ^ a, 32); \
52 a = a + b + m[blake2b_sigma[r][2*i+1]]; \
53 d = ror64(d ^ a, 16); \
A Dechainiv.c60 u64 a; in echainiv_encrypt() local
62 memcpy(&a, ctx->salt + ivsize - 8, 8); in echainiv_encrypt()
64 a |= 1; in echainiv_encrypt()
65 a *= seqno; in echainiv_encrypt()
67 memcpy(info + ivsize - 8, &a, 8); in echainiv_encrypt()
A DKconfig32 required if you want the system to operate in a FIPS 200
222 This converts an arbitrary crypto algorithm into a parallel
231 This is a generic software asynchronous crypto daemon that
389 with a more dramatic performance hit)
574 Tiny Encryption Algorithm is a simple cipher that uses
578 Xtendend Tiny Encryption Algorithm is a modification to
579 the TEA algorithm to address a potential key weakness
767 implementation currently can't handle a sectorsize which is not a
852 a sequence number xored with a salt. This is the default
963 This is used in HCTR2. It is not a general-purpose
[all …]
A Dtestmgr.h715 be64_to_cpua(5a, 8b, 82, 69, 7e, 8a, 0a, 09),
724 be64_to_cpua(6a, 14, 4f, 53, 75, c8, 02, 48),
745 be64_to_cpua(01, 48, fb, 5f, 72, 2a, d4, 8f),
746 be64_to_cpua(6b, 1a, 58, 56, f1, 8f, f7, fd),
754 be64_to_cpua(7d, 3a, 97, d9, cd, 1a, 6a, 49),
755 be64_to_cpua(32, dd, 41, 74, 6a, 51, c7, d9),
993 be64_to_cpua(76, 31, 79, 4a, e9, 81, 6a, ee),
1177 be64_to_cpua(c4, 6a, 03, 5f, 8d, 7a, f9, fb),
1179 be64_to_cpua(de, 3a, 3d, 16, af, b4, 52, 6a),
1207 be64_to_cpua(46, 6b, c7, af, 7a, b9, 19, 0a),
[all …]
A Daegis128-neon-inner.c182 static uint8x16_t vqtbl1q_u8(uint8x16_t a, uint8x16_t b) in vqtbl1q_u8() argument
187 } __a = { a }; in vqtbl1q_u8()
193 static uint8x16_t vqtbx1q_u8(uint8x16_t v, uint8x16_t a, uint8x16_t b) in vqtbx1q_u8() argument
198 } __a = { a }; in vqtbx1q_u8()
A Dadiantum.c192 r->a = cpu_to_le64(le64_to_cpu(v1->a) + le64_to_cpu(v2->a) + in le128_add()
203 r->a = cpu_to_le64(le64_to_cpu(v1->a) - le64_to_cpu(v2->a) - in le128_sub()
A Dblowfish_common.c305 #define ROUND(a, b, n) ({ b ^= P[n]; a ^= bf_F(b); }) argument
A Dblowfish_generic.c35 #define ROUND(a, b, n) ({ b ^= P[n]; a ^= bf_F(b); }) argument
A Dpolyval-generic.c71 u64 a = get_unaligned((const u64 *)&src[0]); in copy_and_reverse() local
74 put_unaligned(swab64(a), (u64 *)&dst[8]); in copy_and_reverse()
A Decc.c405 static uint128_t add_128_128(uint128_t a, uint128_t b) in add_128_128() argument
409 result.m_low = a.m_low + b.m_low; in add_128_128()
410 result.m_high = a.m_high + b.m_high + (result.m_low < a.m_low); in add_128_128()
1042 u64 a[ECC_MAX_DIGITS], b[ECC_MAX_DIGITS]; in vli_mod_inv() local
1052 vli_set(a, input, ndigits); in vli_mod_inv()
1058 while ((cmp_result = vli_cmp(a, b, ndigits)) != 0) { in vli_mod_inv()
1061 if (EVEN(a)) { in vli_mod_inv()
1062 vli_rshift1(a, ndigits); in vli_mod_inv()
1080 vli_sub(a, a, b, ndigits); in vli_mod_inv()
1081 vli_rshift1(a, ndigits); in vli_mod_inv()
[all …]
A Dalgapi.c1003 static inline void crypto_inc_byte(u8 *a, unsigned int size) in crypto_inc_byte() argument
1005 u8 *b = (a + size); in crypto_inc_byte()
1016 void crypto_inc(u8 *a, unsigned int size) in crypto_inc() argument
1018 __be32 *b = (__be32 *)(a + size); in crypto_inc()
1030 crypto_inc_byte(a, size); in crypto_inc()
A Dccm.c146 static int format_adata(u8 *adata, unsigned int a) in format_adata() argument
153 if (a < 65280) { in format_adata()
154 *(__be16 *)adata = cpu_to_be16(a); in format_adata()
158 *(__be32 *)&adata[2] = cpu_to_be32(a); in format_adata()
A Drmd160.c39 #define ROUND(a, b, c, d, e, f, k, x, s) { \ argument
40 (a) += f((b), (c), (d)) + le32_to_cpup(&(x)) + (k); \
41 (a) = rol32((a), (s)) + (e); \
A Dserpent_generic.c24 #define keyiter(a, b, c, d, i, j) \ argument
25 ({ b ^= d; b ^= c; b ^= a; b ^= PHI ^ i; b = rol32(b, 11); k[j] = b; })
/crypto/asymmetric_keys/
A DKconfig6 This option provides support for a key type that holds the data for
33 data and provides the ability to instantiate a crypto key from a
43 private key data and provides the ability to instantiate a crypto key
60 This option provides a type of key that can be loaded up from a
61 PKCS#7 message - provided the message is signed by a trusted key. If
76 This option provides support for verifying the signature(s) on a
A Dx509_public_key.c108 bool a = asymmetric_key_id_same(cert->skid, cert->sig->auth_ids[1]); in x509_check_for_self_signed() local
111 if (!a && !b) in x509_check_for_self_signed()
115 if (((a && !b) || (b && !a)) && in x509_check_for_self_signed()
A Dverify_pefile.c208 static int pefile_compare_shdrs(const void *a, const void *b) in pefile_compare_shdrs() argument
210 const struct section_header *shdra = a; in pefile_compare_shdrs()
/crypto/async_tx/
A Dasync_raid6_recov.c28 u8 *a, *b, *c; in async_sum_product() local
73 a = page_address(srcs[0]) + src_offs[0]; in async_sum_product()
78 ax = amul[*a++]; in async_sum_product()
158 struct page *p, *q, *a, *b; in __2data_recov_4() local
173 a = blocks[faila]; in __2data_recov_4()
196 tx = async_xor_offs(a, a_off, srcs, src_offs, 2, bytes, submit); in __2data_recov_4()
/crypto/krb5/
A DKconfig18 Provide a library for provision of Kerberos-5-based crypto. This is

Completed in 75 milliseconds

12