| /crypto/ |
| A D | md5.c | 40 u32 a, b, c, d; in md5_transform() local 44 c = hash[2]; in md5_transform() 47 MD5STEP(F1, a, b, c, d, in[0] + 0xd76aa478, 7); in md5_transform() 48 MD5STEP(F1, d, a, b, c, in[1] + 0xe8c7b756, 12); in md5_transform() 49 MD5STEP(F1, c, d, a, b, in[2] + 0x242070db, 17); in md5_transform() 50 MD5STEP(F1, b, c, d, a, in[3] + 0xc1bdceee, 22); in md5_transform() 51 MD5STEP(F1, a, b, c, d, in[4] + 0xf57c0faf, 7); in md5_transform() 55 MD5STEP(F1, a, b, c, d, in[8] + 0x698098d8, 7); in md5_transform() 64 MD5STEP(F2, a, b, c, d, in[1] + 0xf61e2562, 5); in md5_transform() 65 MD5STEP(F2, d, a, b, c, in[6] + 0xc040b340, 9); in md5_transform() [all …]
|
| A D | md4.c | 63 #define ROUND1(a,b,c,d,k,s) (a = lshift(a + F(b,c,d) + k, s)) argument 64 #define ROUND2(a,b,c,d,k,s) (a = lshift(a + G(b,c,d) + k + (u32)0x5A827999,s)) argument 65 #define ROUND3(a,b,c,d,k,s) (a = lshift(a + H(b,c,d) + k + (u32)0x6ED9EBA1,s)) argument 69 u32 a, b, c, d; in md4_transform() local 73 c = hash[2]; in md4_transform() 76 ROUND1(a, b, c, d, in[0], 3); in md4_transform() 77 ROUND1(d, a, b, c, in[1], 7); in md4_transform() 80 ROUND1(a, b, c, d, in[4], 3); in md4_transform() 81 ROUND1(d, a, b, c, in[5], 7); in md4_transform() 84 ROUND1(a, b, c, d, in[8], 3); in md4_transform() [all …]
|
| A D | cast6_generic.c | 184 Km = c->Km[0]; Kr = c->Kr[0]; Q(block, Kr, Km); in __cast6_encrypt() 185 Km = c->Km[1]; Kr = c->Kr[1]; Q(block, Kr, Km); in __cast6_encrypt() 186 Km = c->Km[2]; Kr = c->Kr[2]; Q(block, Kr, Km); in __cast6_encrypt() 187 Km = c->Km[3]; Kr = c->Kr[3]; Q(block, Kr, Km); in __cast6_encrypt() 188 Km = c->Km[4]; Kr = c->Kr[4]; Q(block, Kr, Km); in __cast6_encrypt() 189 Km = c->Km[5]; Kr = c->Kr[5]; Q(block, Kr, Km); in __cast6_encrypt() 221 Km = c->Km[11]; Kr = c->Kr[11]; Q(block, Kr, Km); in __cast6_decrypt() 223 Km = c->Km[9]; Kr = c->Kr[9]; Q(block, Kr, Km); in __cast6_decrypt() 224 Km = c->Km[8]; Kr = c->Kr[8]; Q(block, Kr, Km); in __cast6_decrypt() 225 Km = c->Km[7]; Kr = c->Kr[7]; Q(block, Kr, Km); in __cast6_decrypt() [all …]
|
| A D | twofish_generic.c | 53 #define ENCROUND(n, a, b, c, d) \ argument 56 (c) ^= x + ctx->k[2 * (n)]; \ 57 (c) = ror32((c), 1); \ 65 (c) = rol32((c), 1); \ 66 (c) ^= (x + ctx->k[2 * (n)]) 100 u32 a, b, c, d; in twofish_encrypt() local 108 INPACK (2, c, 2); in twofish_encrypt() 122 OUTUNPACK (0, c, 4); in twofish_encrypt() 135 u32 a, b, c, d; in twofish_decrypt() local 141 INPACK (0, c, 4); in twofish_decrypt() [all …]
|
| A D | rsa.c | 62 return mpi_powm(c, m, key->e, key->n); in _rsa_enc() 82 if (rsa_check_payload(c, key->n)) in _rsa_dec_crt() 96 ret = mpi_powm(m2, c, key->dq, key->q); in _rsa_dec_crt() 124 MPI m, c = mpi_alloc(0); in rsa_enc() local 128 if (!c) in rsa_enc() 141 ret = _rsa_enc(pkey, c, m); in rsa_enc() 155 mpi_free(c); in rsa_enc() 163 MPI c, m = mpi_alloc(0); in rsa_dec() local 177 if (!c) in rsa_dec() 180 ret = _rsa_dec_crt(pkey, m, c); in rsa_dec() [all …]
|
| A D | blake2b_generic.c | 46 #define G(r,i,a,b,c,d) \ argument 50 c = c + d; \ 51 b = ror64(b ^ c, 24); \ 54 c = c + d; \ 55 b = ror64(b ^ c, 63); \
|
| A D | testmgr.h | 228 .c = 291 .c = 392 .c = 434 .c = 617 .c = 1364 .c = 1382 .c = 1400 .c = 1419 .c = 1439 .c = [all …]
|
| A D | cast5_generic.c | 303 void __cast5_encrypt(struct cast5_ctx *c, u8 *outbuf, const u8 *inbuf) in __cast5_encrypt() argument 310 Km = c->Km; in __cast5_encrypt() 311 Kr = c->Kr; in __cast5_encrypt() 339 if (!(c->rr)) { in __cast5_encrypt() 365 Km = c->Km; in __cast5_decrypt() 366 Kr = c->Kr; in __cast5_decrypt() 371 if (!(c->rr)) { in __cast5_decrypt() 477 struct cast5_ctx *c = crypto_tfm_ctx(tfm); in cast5_setkey() local 484 c->rr = key_len <= 10 ? 1 : 0; in cast5_setkey() 497 c->Km[i] = k[i]; in cast5_setkey() [all …]
|
| A D | twofish_common.c | 468 #define CALC_S(a, b, c, d, i, w, x, y, z) \ argument 473 (c) ^= exp_to_poly[tmp + (y)]; \ 529 #define CALC_K_2(a, b, c, d, j) \ argument 532 ^ mds[2][q1[c ^ key[(j) + 10]] ^ key[(j) + 2]] \ 542 #define CALC_K192_2(a, b, c, d, j) \ argument 545 q0[c ^ key[(j) + 18]], \
|
| A D | Makefile | 43 $(obj)/rsapubkey.asn1.o: $(obj)/rsapubkey.asn1.c $(obj)/rsapubkey.asn1.h 44 $(obj)/rsaprivkey.asn1.o: $(obj)/rsaprivkey.asn1.c $(obj)/rsaprivkey.asn1.h 55 $(obj)/ecdsasignature.asn1.o: $(obj)/ecdsasignature.asn1.c $(obj)/ecdsasignature.asn1.h 191 $(obj)/ecrdsa_params.asn1.o: $(obj)/ecrdsa_params.asn1.c $(obj)/ecrdsa_params.asn1.h 192 $(obj)/ecrdsa_pub_key.asn1.o: $(obj)/ecrdsa_pub_key.asn1.c $(obj)/ecrdsa_pub_key.asn1.h
|
| A D | algapi.c | 1006 u8 c; in crypto_inc_byte() local 1009 c = *--b + 1; in crypto_inc_byte() 1010 *b = c; in crypto_inc_byte() 1011 if (c) in crypto_inc_byte() 1019 u32 c; in crypto_inc() local 1024 c = be32_to_cpu(*--b) + 1; in crypto_inc() 1025 *b = cpu_to_be32(c); in crypto_inc() 1026 if (likely(c)) in crypto_inc()
|
| A D | khazad.c | 750 static const u64 c[KHAZAD_ROUNDS + 1] = { variable 777 c[r] ^ K2; in khazad_setkey()
|
| A D | fcrypt.c | 225 union lc4 { __be32 l; u8 c[4]; } u; \ 227 L ^= sbox0[u.c[0]] ^ sbox1[u.c[1]] ^ sbox2[u.c[2]] ^ sbox3[u.c[3]]; \
|
| A D | rmd160.c | 39 #define ROUND(a, b, c, d, e, f, k, x, s) { \ argument 40 (a) += f((b), (c), (d)) + le32_to_cpup(&(x)) + (k); \ 42 (c) = rol32((c), 10); \
|
| A D | crypto_user.c | 441 struct netlink_dump_control c = { in crypto_user_rcv_msg() local 446 err = netlink_dump_start(net->crypto_nlsk, skb, nlh, &c); in crypto_user_rcv_msg()
|
| A D | serpent_generic.c | 24 #define keyiter(a, b, c, d, i, j) \ argument 25 ({ b ^= d; b ^= c; b ^= a; b ^= PHI ^ i; b = rol32(b, 11); k[j] = b; }) 458 void __serpent_encrypt(const void *c, u8 *dst, const u8 *src) in __serpent_encrypt() argument 460 const struct serpent_ctx *ctx = c; in __serpent_encrypt() 517 void __serpent_decrypt(const void *c, u8 *dst, const u8 *src) in __serpent_decrypt() argument 519 const struct serpent_ctx *ctx = c; in __serpent_decrypt()
|
| A D | testmgr.c | 3868 const char *c; in test_akcipher_one() local 3896 c = vecs->c; in test_akcipher_one() 3918 if (c) { in test_akcipher_one() 3925 if (memcmp(c, outbuf_enc, c_size) != 0) { in test_akcipher_one() 3947 if (!c) { in test_akcipher_one() 3948 c = outbuf_enc; in test_akcipher_one() 3955 memcpy(xbuf[0], c, c_size); in test_akcipher_one() 4062 err = crypto_sig_verify(tfm, vecs->c, vecs->c_size, in test_sig_one() 4095 memcmp(sig, vecs->c, vecs->c_size) || in test_sig_one()
|
| A D | Kconfig | 444 generic c and the assembler implementations. 463 generic c and the assembler implementations. 603 generic c and the assembler implementations.
|
| A D | ecc.c | 557 u64 c = -mod[0]; in vli_mmod_special() local 563 vli_umult(t, r + ndigits, c, ndigits); in vli_mmod_special()
|
| /crypto/asymmetric_keys/ |
| A D | Makefile | 34 $(obj)/x509.asn1.o: $(obj)/x509.asn1.c $(obj)/x509.asn1.h 35 $(obj)/x509_akid.asn1.o: $(obj)/x509_akid.asn1.c $(obj)/x509_akid.asn1.h 46 $(obj)/pkcs8-asn1.o: $(obj)/pkcs8.asn1.c $(obj)/pkcs8.asn1.h 48 clean-files += pkcs8.asn1.c pkcs8.asn1.h 61 $(obj)/pkcs7.asn1.o: $(obj)/pkcs7.asn1.c $(obj)/pkcs7.asn1.h 81 $(obj)/mscode.asn1.o: $(obj)/mscode.asn1.c $(obj)/mscode.asn1.h
|
| /crypto/async_tx/ |
| A D | async_raid6_recov.c | 28 u8 *a, *b, *c; in async_sum_product() local 75 c = page_address(dest) + d_off; in async_sum_product() 80 *c++ = ax ^ bx; in async_sum_product()
|