| /crypto/ |
| A D | serpent_generic.c | 28 ({ x0 = k[i]; x1 = k[i+1]; x2 = k[i+2]; x3 = k[i+3]; }) 31 ({ k[i] = x0; k[i+1] = x1; k[i+2] = x2; k[i+3] = x3; }) 37 x3 ^= k[4*(i)+3]; x2 ^= k[4*(i)+2]; \ 38 x1 ^= k[4*(i)+1]; x0 ^= k[4*(i)+0]; \ 50 x0 ^= k[4*i+0]; x2 ^= k[4*i+2]; \ 54 x0 ^= k[4*i+0]; x1 ^= k[4*i+1]; x2 ^= k[4*i+2]; \ 231 k += 100; in __serpent_setkey_sbox() 246 k -= 50; in __serpent_setkey_sbox() 258 k -= 50; in __serpent_setkey_sbox() 339 k += 50; in __serpent_setkey() [all …]
|
| A D | aes_generic.c | 1155 f_rn(bo, bi, 0, k); \ 1156 f_rn(bo, bi, 1, k); \ 1157 f_rn(bo, bi, 2, k); \ 1158 f_rn(bo, bi, 3, k); \ 1159 k += 4; \ 1170 f_rl(bo, bi, 0, k); \ 1171 f_rl(bo, bi, 1, k); \ 1172 f_rl(bo, bi, 2, k); \ 1173 f_rl(bo, bi, 3, k); \ 1225 i_rn(bo, bi, 0, k); \ [all …]
|
| A D | fcrypt.c | 66 #define ror56_64(k, n) (k = (k >> n) | ((k & ((1 << n) - 1)) << (56 - n))) argument 312 k <<= 7; in fcrypt_setkey() 314 k <<= 7; in fcrypt_setkey() 316 k <<= 7; in fcrypt_setkey() 318 k <<= 7; in fcrypt_setkey() 320 k <<= 7; in fcrypt_setkey() 322 k <<= 7; in fcrypt_setkey() 324 k <<= 7; in fcrypt_setkey() 328 ctx->sched[0x0] = cpu_to_be32(k); ror56_64(k, 11); in fcrypt_setkey() 329 ctx->sched[0x1] = cpu_to_be32(k); ror56_64(k, 11); in fcrypt_setkey() [all …]
|
| A D | twofish_common.c | 535 #define CALC_K(a, j, k, l, m, n) \ argument 536 x = CALC_K_2 (k, l, k, l, 0); \ 548 #define CALC_K192(a, j, k, l, m, n) \ argument 549 x = CALC_K192_2 (l, l, k, k, 0); \ 561 #define CALC_K256(a, j, k, l, m, n) \ argument 562 x = CALC_K256_2 (k, l, 0); \ 572 int i, j, k; in __twofish_setkey() local 634 for ( i = j = 0, k = 1; i < 256; i++, j += 2, k += 2 ) { in __twofish_setkey() 656 for ( i = j = 0, k = 1; i < 256; i++, j += 2, k += 2 ) { in __twofish_setkey() 669 for ( i = j = 0, k = 1; i < 256; i++, j += 2, k += 2 ) { in __twofish_setkey() [all …]
|
| A D | cast5_generic.c | 400 static void key_schedule(u32 *x, u32 *z, u32 *k) in key_schedule() argument 415 k[1] = s5[zi(10)] ^ s6[zi(11)] ^ s7[zi(5)] ^ sb8[zi(4)] ^ in key_schedule() 417 k[2] = s5[zi(12)] ^ s6[zi(13)] ^ s7[zi(3)] ^ sb8[zi(2)] ^ in key_schedule() 419 k[3] = s5[zi(14)] ^ s6[zi(15)] ^ s7[zi(1)] ^ sb8[zi(0)] ^ in key_schedule() 430 k[4] = s5[xi(3)] ^ s6[xi(2)] ^ s7[xi(12)] ^ sb8[xi(13)] ^ in key_schedule() 432 k[5] = s5[xi(1)] ^ s6[xi(0)] ^ s7[xi(14)] ^ sb8[xi(15)] ^ in key_schedule() 481 u32 k[16]; in cast5_setkey() local 495 key_schedule(x, z, k); in cast5_setkey() 497 c->Km[i] = k[i]; in cast5_setkey() 498 key_schedule(x, z, k); in cast5_setkey() [all …]
|
| A D | polyval-generic.c | 82 be128 k; in polyval_setkey() local 89 BUILD_BUG_ON(sizeof(k) != POLYVAL_BLOCK_SIZE); in polyval_setkey() 90 copy_and_reverse((u8 *)&k, key); in polyval_setkey() 91 gf128mul_x_lle(&k, &k); in polyval_setkey() 93 ctx->gf128 = gf128mul_init_4k_lle(&k); in polyval_setkey() 94 memzero_explicit(&k, POLYVAL_BLOCK_SIZE); in polyval_setkey()
|
| A D | ghash-generic.c | 59 be128 k; in ghash_setkey() local 67 BUILD_BUG_ON(sizeof(k) != GHASH_BLOCK_SIZE); in ghash_setkey() 68 memcpy(&k, key, GHASH_BLOCK_SIZE); /* avoid violating alignment rules */ in ghash_setkey() 69 ctx->gf128 = gf128mul_init_4k_lle(&k); in ghash_setkey() 70 memzero_explicit(&k, GHASH_BLOCK_SIZE); in ghash_setkey()
|
| A D | ecc.c | 420 unsigned int i, k; in vli_mult() local 425 for (k = 0; k < ndigits * 2 - 1; k++) { in vli_mult() 428 if (k < ndigits) in vli_mult() 456 unsigned int k; in vli_umult() local 458 for (k = 0; k < ndigits; k++) { in vli_umult() 469 for (++k; k < ndigits * 2; k++) in vli_umult() 470 result[k] = 0; in vli_umult() 477 int i, k; in vli_square() local 479 for (k = 0; k < ndigits * 2 - 1; k++) { in vli_square() 482 if (k < ndigits) in vli_square() [all …]
|
| A D | twofish_generic.c | 55 x += y; y += x + ctx->k[2 * (n) + 1]; \ 56 (c) ^= x + ctx->k[2 * (n)]; \ 63 (d) ^= y + ctx->k[2 * (n) + 1]; \ 66 (c) ^= (x + ctx->k[2 * (n)])
|
| A D | md4.c | 63 #define ROUND1(a,b,c,d,k,s) (a = lshift(a + F(b,c,d) + k, s)) argument 64 #define ROUND2(a,b,c,d,k,s) (a = lshift(a + G(b,c,d) + k + (u32)0x5A827999,s)) argument 65 #define ROUND3(a,b,c,d,k,s) (a = lshift(a + H(b,c,d) + k + (u32)0x6ED9EBA1,s)) argument
|
| A D | aegis128-neon-inner.c | 145 uint8x16_t k = vld1q_u8(key); in crypto_aegis128_init_neon() local 146 uint8x16_t kiv = k ^ vld1q_u8(iv); in crypto_aegis128_init_neon() 151 k ^ vld1q_u8(const0), in crypto_aegis128_init_neon() 152 k ^ vld1q_u8(const1), in crypto_aegis128_init_neon() 159 st = aegis128_update_neon(st, k); in crypto_aegis128_init_neon()
|
| A D | tcrypt.c | 110 int k, rem; in sg_init_aead() local 125 for (k = 0; k < np; k++) in sg_init_aead() 126 sg_set_buf(&sg[k + 1], xbuf[k], PAGE_SIZE); in sg_init_aead() 129 sg_set_buf(&sg[k + 1], xbuf[k], rem); in sg_init_aead() 1160 unsigned int k = bs; in test_mb_skcipher_speed() local 1166 while (k > PAGE_SIZE) { in test_mb_skcipher_speed() 1171 k -= PAGE_SIZE; in test_mb_skcipher_speed() 1371 k = *keysize + bs; in test_skcipher_speed() 1374 if (k > PAGE_SIZE) { in test_skcipher_speed() 1377 k -= PAGE_SIZE; in test_skcipher_speed() [all …]
|
| A D | jitterentropy.c | 559 unsigned int k = 0, safety_factor = 0; in jent_gen_entropy() local 576 if (++k >= ((DATA_SIZE_BITS + safety_factor) * ec->osr)) in jent_gen_entropy()
|
| A D | rmd160.c | 39 #define ROUND(a, b, c, d, e, f, k, x, s) { \ argument 40 (a) += f((b), (c), (d)) + le32_to_cpup(&(x)) + (k); \
|
| A D | testmgr.c | 2724 unsigned int i, j, k; in test_cipher() local 2778 for (k = 0; k < template[i].len; in test_cipher() 2779 k += crypto_cipher_blocksize(tfm)) { in test_cipher() 2781 crypto_cipher_encrypt_one(tfm, data + k, in test_cipher() 2782 data + k); in test_cipher() 2784 crypto_cipher_decrypt_one(tfm, data + k, in test_cipher() 2785 data + k); in test_cipher()
|
| /crypto/krb5/ |
| A D | rfc8009_aes2.c | 32 unsigned int k, in rfc8009_calc_KDF_HMAC_SHA2() argument 45 if (WARN_ON(result->len != k / 8)) in rfc8009_calc_KDF_HMAC_SHA2() 56 if (WARN_ON(crypto_shash_digestsize(shash) * 8 < k)) in rfc8009_calc_KDF_HMAC_SHA2() 84 tmp = htonl(k); in rfc8009_calc_KDF_HMAC_SHA2()
|
| A D | rfc6803_camellia.c | 36 u32 i = 0, k = result->len * 8; in rfc6803_calc_KDF_FEEDBACK_CMAC() local 73 tmp = htonl(k); in rfc6803_calc_KDF_FEEDBACK_CMAC()
|