Home
last modified time | relevance | path

Searched refs:d (Results 1 – 17 of 17) sorted by relevance

/crypto/
A Dmd5.c40 u32 a, b, c, d; in md5_transform() local
45 d = hash[3]; in md5_transform()
47 MD5STEP(F1, a, b, c, d, in[0] + 0xd76aa478, 7); in md5_transform()
48 MD5STEP(F1, d, a, b, c, in[1] + 0xe8c7b756, 12); in md5_transform()
49 MD5STEP(F1, c, d, a, b, in[2] + 0x242070db, 17); in md5_transform()
50 MD5STEP(F1, b, c, d, a, in[3] + 0xc1bdceee, 22); in md5_transform()
51 MD5STEP(F1, a, b, c, d, in[4] + 0xf57c0faf, 7); in md5_transform()
55 MD5STEP(F1, a, b, c, d, in[8] + 0x698098d8, 7); in md5_transform()
64 MD5STEP(F2, a, b, c, d, in[1] + 0xf61e2562, 5); in md5_transform()
65 MD5STEP(F2, d, a, b, c, in[6] + 0xc040b340, 9); in md5_transform()
[all …]
A Dmd4.c63 #define ROUND1(a,b,c,d,k,s) (a = lshift(a + F(b,c,d) + k, s)) argument
64 #define ROUND2(a,b,c,d,k,s) (a = lshift(a + G(b,c,d) + k + (u32)0x5A827999,s)) argument
65 #define ROUND3(a,b,c,d,k,s) (a = lshift(a + H(b,c,d) + k + (u32)0x6ED9EBA1,s)) argument
69 u32 a, b, c, d; in md4_transform() local
74 d = hash[3]; in md4_transform()
76 ROUND1(a, b, c, d, in[0], 3); in md4_transform()
77 ROUND1(d, a, b, c, in[1], 7); in md4_transform()
80 ROUND1(a, b, c, d, in[4], 3); in md4_transform()
81 ROUND1(d, a, b, c, in[5], 7); in md4_transform()
84 ROUND1(a, b, c, d, in[8], 3); in md4_transform()
[all …]
A Dtwofish_generic.c53 #define ENCROUND(n, a, b, c, d) \ argument
58 (d) = rol32((d), 1) ^ y
60 #define DECROUND(n, a, b, c, d) \ argument
64 (d) = ror32((d), 1); \
77 DECROUND (2 * (n), a, b, c, d)
100 u32 a, b, c, d; in twofish_encrypt() local
109 INPACK (3, d, 3); in twofish_encrypt()
123 OUTUNPACK (1, d, 5); in twofish_encrypt()
135 u32 a, b, c, d; in twofish_decrypt() local
142 INPACK (1, d, 5); in twofish_decrypt()
[all …]
A Dcts.c113 scatterwalk_map_and_copy(d + bsize, sg, 0, bsize, 0); in cts_cbc_encrypt()
115 memset(d, 0, bsize); in cts_cbc_encrypt()
118 scatterwalk_map_and_copy(d, sg, 0, bsize + lastn, 1); in cts_cbc_encrypt()
119 memzero_explicit(d, sizeof(d)); in cts_cbc_encrypt()
197 scatterwalk_map_and_copy(d + bsize, sg, 0, bsize, 0); in cts_cbc_decrypt()
199 crypto_xor(d + bsize, space, bsize); in cts_cbc_decrypt()
201 memset(d, 0, bsize); in cts_cbc_decrypt()
205 crypto_xor(d + bsize, d, lastn); in cts_cbc_decrypt()
208 memcpy(d + lastn, d + bsize + lastn, bsize - lastn); in cts_cbc_decrypt()
211 scatterwalk_map_and_copy(d, sg, 0, bsize + lastn, 1); in cts_cbc_decrypt()
[all …]
A Dblake2b_generic.c46 #define G(r,i,a,b,c,d) \ argument
49 d = ror64(d ^ a, 32); \
50 c = c + d; \
53 d = ror64(d ^ a, 16); \
54 c = c + d; \
A Drsa.c19 MPI d; member
170 if (unlikely(!pkey->n || !pkey->d)) { in rsa_dec()
199 mpi_free(key->d); in rsa_free_mpi_key()
207 key->d = NULL; in rsa_free_mpi_key()
322 mpi_key->d = mpi_read_raw_data(raw_key.d, raw_key.d_sz); in rsa_set_priv_key()
323 if (!mpi_key->d) in rsa_set_priv_key()
A Decdsa-x962.c34 const char *d = value; in ecdsa_get_signature_rs() local
45 if (*d == 0) { in ecdsa_get_signature_rs()
47 d++; in ecdsa_get_signature_rs()
53 ecc_digits_from_bytes(d, vlen, dest, ndigits); in ecdsa_get_signature_rs()
A Dtestmgr.h692 be64_to_cpua(10, 68, 01, 9d, ba, ce, 83, 08),
747 be64_to_cpua(3f, 72, 3f, 1f, 42, d2, 3f, 1d),
754 be64_to_cpua(7d, 3a, 97, d9, cd, 1a, 6a, 49),
858 be64_to_cpua(fb, 9d, 8b, de, d4, 8d, 6f, ad),
918 be64_to_cpua(08, 31, fa, 74, 0d, 1d, 21, 5d),
1103 be64_to_cpua(4f, 8d, de, 1e, 93, 8d, 95, bb),
1132 be64_to_cpua(2d, 7a, 91, 5f, 49, 2d, 22, 08),
1138 be64_to_cpua(ab, 8d, 4e, de, e6, 6d, 9b, 66),
1223 be64_to_cpua(26, 0d, 55, cd, 23, 1e, 7d, a0),
1250 be64_to_cpua(50, 9f, 7d, 1f, ca, 8b, a8, 2d),
[all …]
A Decdsa.c127 const unsigned char *d = key; in ecdsa_set_pub_key() local
137 if (d[0] != 4) in ecdsa_set_pub_key()
147 d++; in ecdsa_set_pub_key()
149 ecc_digits_from_bytes(d, digitlen, ctx->pub_key.x, ndigits); in ecdsa_set_pub_key()
150 ecc_digits_from_bytes(&d[digitlen], digitlen, ctx->pub_key.y, ndigits); in ecdsa_set_pub_key()
A Dtwofish_common.c468 #define CALC_S(a, b, c, d, i, w, x, y, z) \ argument
474 (d) ^= exp_to_poly[tmp + (z)]; \
529 #define CALC_K_2(a, b, c, d, j) \ argument
533 ^ mds[3][q1[d ^ key[(j) + 11]] ^ key[(j) + 3]]
542 #define CALC_K192_2(a, b, c, d, j) \ argument
546 q1[d ^ key[(j) + 19]], j)
A Drsaprivkey.asn112 d INTEGER ({ rsa_get_d }),
A Drsa_helper.c70 key->d = value; in rsa_get_d()
A Drmd160.c39 #define ROUND(a, b, c, d, e, f, k, x, s) { \ argument
40 (a) += f((b), (c), (d)) + le32_to_cpup(&(x)) + (k); \
A Dserpent_generic.c24 #define keyiter(a, b, c, d, i, j) \ argument
25 ({ b ^= d; b ^= c; b ^= a; b ^= PHI ^ i; b = rol32(b, 11); k[j] = b; })
/crypto/async_tx/
A Draid6test.c46 static char disk_type(int d, int disks) in disk_type() argument
48 if (d == disks - 2) in disk_type()
50 else if (d == disks - 1) in disk_type()
A Dasync_pq.c26 #define P(b, d) (b[d-2]) argument
27 #define Q(b, d) (b[d-1]) argument
A Dasync_raid6_recov.c96 u8 *d, *s; in async_mult() local
143 d = page_address(dest) + d_off; in async_mult()
147 *d++ = qmul[*s++]; in async_mult()

Completed in 843 milliseconds