| /crypto/ |
| A D | md5.c | 40 u32 a, b, c, d; in md5_transform() local 45 d = hash[3]; in md5_transform() 47 MD5STEP(F1, a, b, c, d, in[0] + 0xd76aa478, 7); in md5_transform() 48 MD5STEP(F1, d, a, b, c, in[1] + 0xe8c7b756, 12); in md5_transform() 49 MD5STEP(F1, c, d, a, b, in[2] + 0x242070db, 17); in md5_transform() 50 MD5STEP(F1, b, c, d, a, in[3] + 0xc1bdceee, 22); in md5_transform() 51 MD5STEP(F1, a, b, c, d, in[4] + 0xf57c0faf, 7); in md5_transform() 55 MD5STEP(F1, a, b, c, d, in[8] + 0x698098d8, 7); in md5_transform() 64 MD5STEP(F2, a, b, c, d, in[1] + 0xf61e2562, 5); in md5_transform() 65 MD5STEP(F2, d, a, b, c, in[6] + 0xc040b340, 9); in md5_transform() [all …]
|
| A D | md4.c | 63 #define ROUND1(a,b,c,d,k,s) (a = lshift(a + F(b,c,d) + k, s)) argument 64 #define ROUND2(a,b,c,d,k,s) (a = lshift(a + G(b,c,d) + k + (u32)0x5A827999,s)) argument 65 #define ROUND3(a,b,c,d,k,s) (a = lshift(a + H(b,c,d) + k + (u32)0x6ED9EBA1,s)) argument 69 u32 a, b, c, d; in md4_transform() local 74 d = hash[3]; in md4_transform() 76 ROUND1(a, b, c, d, in[0], 3); in md4_transform() 77 ROUND1(d, a, b, c, in[1], 7); in md4_transform() 80 ROUND1(a, b, c, d, in[4], 3); in md4_transform() 81 ROUND1(d, a, b, c, in[5], 7); in md4_transform() 84 ROUND1(a, b, c, d, in[8], 3); in md4_transform() [all …]
|
| A D | twofish_generic.c | 53 #define ENCROUND(n, a, b, c, d) \ argument 58 (d) = rol32((d), 1) ^ y 60 #define DECROUND(n, a, b, c, d) \ argument 64 (d) = ror32((d), 1); \ 77 DECROUND (2 * (n), a, b, c, d) 100 u32 a, b, c, d; in twofish_encrypt() local 109 INPACK (3, d, 3); in twofish_encrypt() 123 OUTUNPACK (1, d, 5); in twofish_encrypt() 135 u32 a, b, c, d; in twofish_decrypt() local 142 INPACK (1, d, 5); in twofish_decrypt() [all …]
|
| A D | cts.c | 113 scatterwalk_map_and_copy(d + bsize, sg, 0, bsize, 0); in cts_cbc_encrypt() 115 memset(d, 0, bsize); in cts_cbc_encrypt() 118 scatterwalk_map_and_copy(d, sg, 0, bsize + lastn, 1); in cts_cbc_encrypt() 119 memzero_explicit(d, sizeof(d)); in cts_cbc_encrypt() 197 scatterwalk_map_and_copy(d + bsize, sg, 0, bsize, 0); in cts_cbc_decrypt() 199 crypto_xor(d + bsize, space, bsize); in cts_cbc_decrypt() 201 memset(d, 0, bsize); in cts_cbc_decrypt() 205 crypto_xor(d + bsize, d, lastn); in cts_cbc_decrypt() 208 memcpy(d + lastn, d + bsize + lastn, bsize - lastn); in cts_cbc_decrypt() 211 scatterwalk_map_and_copy(d, sg, 0, bsize + lastn, 1); in cts_cbc_decrypt() [all …]
|
| A D | blake2b_generic.c | 46 #define G(r,i,a,b,c,d) \ argument 49 d = ror64(d ^ a, 32); \ 50 c = c + d; \ 53 d = ror64(d ^ a, 16); \ 54 c = c + d; \
|
| A D | rsa.c | 19 MPI d; member 170 if (unlikely(!pkey->n || !pkey->d)) { in rsa_dec() 199 mpi_free(key->d); in rsa_free_mpi_key() 207 key->d = NULL; in rsa_free_mpi_key() 322 mpi_key->d = mpi_read_raw_data(raw_key.d, raw_key.d_sz); in rsa_set_priv_key() 323 if (!mpi_key->d) in rsa_set_priv_key()
|
| A D | ecdsa-x962.c | 34 const char *d = value; in ecdsa_get_signature_rs() local 45 if (*d == 0) { in ecdsa_get_signature_rs() 47 d++; in ecdsa_get_signature_rs() 53 ecc_digits_from_bytes(d, vlen, dest, ndigits); in ecdsa_get_signature_rs()
|
| A D | testmgr.h | 692 be64_to_cpua(10, 68, 01, 9d, ba, ce, 83, 08), 747 be64_to_cpua(3f, 72, 3f, 1f, 42, d2, 3f, 1d), 754 be64_to_cpua(7d, 3a, 97, d9, cd, 1a, 6a, 49), 858 be64_to_cpua(fb, 9d, 8b, de, d4, 8d, 6f, ad), 918 be64_to_cpua(08, 31, fa, 74, 0d, 1d, 21, 5d), 1103 be64_to_cpua(4f, 8d, de, 1e, 93, 8d, 95, bb), 1132 be64_to_cpua(2d, 7a, 91, 5f, 49, 2d, 22, 08), 1138 be64_to_cpua(ab, 8d, 4e, de, e6, 6d, 9b, 66), 1223 be64_to_cpua(26, 0d, 55, cd, 23, 1e, 7d, a0), 1250 be64_to_cpua(50, 9f, 7d, 1f, ca, 8b, a8, 2d), [all …]
|
| A D | ecdsa.c | 127 const unsigned char *d = key; in ecdsa_set_pub_key() local 137 if (d[0] != 4) in ecdsa_set_pub_key() 147 d++; in ecdsa_set_pub_key() 149 ecc_digits_from_bytes(d, digitlen, ctx->pub_key.x, ndigits); in ecdsa_set_pub_key() 150 ecc_digits_from_bytes(&d[digitlen], digitlen, ctx->pub_key.y, ndigits); in ecdsa_set_pub_key()
|
| A D | twofish_common.c | 468 #define CALC_S(a, b, c, d, i, w, x, y, z) \ argument 474 (d) ^= exp_to_poly[tmp + (z)]; \ 529 #define CALC_K_2(a, b, c, d, j) \ argument 533 ^ mds[3][q1[d ^ key[(j) + 11]] ^ key[(j) + 3]] 542 #define CALC_K192_2(a, b, c, d, j) \ argument 546 q1[d ^ key[(j) + 19]], j)
|
| A D | rsaprivkey.asn1 | 12 d INTEGER ({ rsa_get_d }),
|
| A D | rsa_helper.c | 70 key->d = value; in rsa_get_d()
|
| A D | rmd160.c | 39 #define ROUND(a, b, c, d, e, f, k, x, s) { \ argument 40 (a) += f((b), (c), (d)) + le32_to_cpup(&(x)) + (k); \
|
| A D | serpent_generic.c | 24 #define keyiter(a, b, c, d, i, j) \ argument 25 ({ b ^= d; b ^= c; b ^= a; b ^= PHI ^ i; b = rol32(b, 11); k[j] = b; })
|
| /crypto/async_tx/ |
| A D | raid6test.c | 46 static char disk_type(int d, int disks) in disk_type() argument 48 if (d == disks - 2) in disk_type() 50 else if (d == disks - 1) in disk_type()
|
| A D | async_pq.c | 26 #define P(b, d) (b[d-2]) argument 27 #define Q(b, d) (b[d-1]) argument
|
| A D | async_raid6_recov.c | 96 u8 *d, *s; in async_mult() local 143 d = page_address(dest) + d_off; in async_mult() 147 *d++ = qmul[*s++]; in async_mult()
|