| /crypto/ |
| A D | aegis.h | 64 const u8 *s = src->bytes; in crypto_aegis_aesenc() local 68 d0 = t[s[ 0]] ^ rol32(t[s[ 5]], 8) ^ rol32(t[s[10]], 16) ^ rol32(t[s[15]], 24); in crypto_aegis_aesenc() 69 d1 = t[s[ 4]] ^ rol32(t[s[ 9]], 8) ^ rol32(t[s[14]], 16) ^ rol32(t[s[ 3]], 24); in crypto_aegis_aesenc() 70 d2 = t[s[ 8]] ^ rol32(t[s[13]], 8) ^ rol32(t[s[ 2]], 16) ^ rol32(t[s[ 7]], 24); in crypto_aegis_aesenc() 71 d3 = t[s[12]] ^ rol32(t[s[ 1]], 8) ^ rol32(t[s[ 6]], 16) ^ rol32(t[s[11]], 24); in crypto_aegis_aesenc()
|
| A D | aegis128-neon-inner.c | 206 int8x8_t s = vpmin_s8(vget_low_s8(v), vget_high_s8(v)); in vminvq_s8() local 208 s = vpmin_s8(s, s); in vminvq_s8() 209 s = vpmin_s8(s, s); in vminvq_s8() 210 s = vpmin_s8(s, s); in vminvq_s8() 212 return vget_lane_s8(s, 0); in vminvq_s8() 232 uint8x16_t s = st.v[1] ^ (st.v[2] & st.v[3]) ^ st.v[4]; in crypto_aegis128_encrypt_chunk_neon() local 236 msg ^= s; in crypto_aegis128_encrypt_chunk_neon() 245 uint8x16_t s = st.v[1] ^ (st.v[2] & st.v[3]) ^ st.v[4]; in crypto_aegis128_encrypt_chunk_neon() local 260 vqtbl1q_u8(m ^ s, vld1q_u8(permute + size))); in crypto_aegis128_encrypt_chunk_neon() 291 uint8x16_t s = st.v[1] ^ (st.v[2] & st.v[3]) ^ st.v[4]; in crypto_aegis128_decrypt_chunk_neon() local [all …]
|
| A D | twofish_generic.c | 41 (ctx->s[0][(a) & 0xFF]) ^ (ctx->s[1][((a) >> 8) & 0xFF]) \ 42 ^ (ctx->s[2][((a) >> 16) & 0xFF]) ^ (ctx->s[3][(a) >> 24]) 45 (ctx->s[1][(b) & 0xFF]) ^ (ctx->s[2][((b) >> 8) & 0xFF]) \ 46 ^ (ctx->s[3][((b) >> 16) & 0xFF]) ^ (ctx->s[0][(b) >> 24])
|
| A D | acompress.c | 365 struct crypto_acomp_streams *s = in acomp_stream_workfn() local 370 for_each_cpu(cpu, &s->stream_want) { in acomp_stream_workfn() 378 ctx = s->alloc_ctx(); in acomp_stream_workfn() 396 s->streams = NULL; in crypto_acomp_free_streams() 400 cancel_work_sync(&s->stream_work); in crypto_acomp_free_streams() 401 free_ctx = s->free_ctx; in crypto_acomp_free_streams() 423 if (s->streams) in crypto_acomp_alloc_streams() 430 ctx = s->alloc_ctx(); in crypto_acomp_alloc_streams() 445 s->streams = streams; in crypto_acomp_alloc_streams() 465 cpumask_set_cpu(cpu, &s->stream_want); in crypto_acomp_lock_stream_bh() [all …]
|
| A D | deflate.c | 117 struct crypto_acomp_stream *s; in deflate_compress() local 121 s = crypto_acomp_lock_stream_bh(&deflate_streams); in deflate_compress() 122 ds = s->ctx; in deflate_compress() 135 crypto_acomp_unlock_stream_bh(s); in deflate_compress() 198 struct crypto_acomp_stream *s; in deflate_decompress() local 202 s = crypto_acomp_lock_stream_bh(&deflate_streams); in deflate_decompress() 203 ds = s->ctx; in deflate_decompress() 214 crypto_acomp_unlock_stream_bh(s); in deflate_decompress()
|
| A D | twofish_common.c | 484 ctx->s[0][i] = mds[0][q0[(a) ^ sa] ^ se]; \ 485 ctx->s[1][i] = mds[1][q0[(b) ^ sb] ^ sf]; \ 486 ctx->s[2][i] = mds[2][q1[(a) ^ sc] ^ sg]; \ 487 ctx->s[3][i] = mds[3][q1[(b) ^ sd] ^ sh] 492 ctx->s[0][i] = mds[0][q0[q0[(b) ^ sa] ^ se] ^ si]; \ 493 ctx->s[1][i] = mds[1][q0[q1[(b) ^ sb] ^ sf] ^ sj]; \ 494 ctx->s[2][i] = mds[2][q1[q0[(a) ^ sc] ^ sg] ^ sk]; \ 495 ctx->s[3][i] = mds[3][q1[q1[(a) ^ sd] ^ sh] ^ sl]; 500 ctx->s[0][i] = mds[0][q0[q0[q1[(b) ^ sa] ^ se] ^ si] ^ sm]; \ 501 ctx->s[1][i] = mds[1][q0[q1[q1[(a) ^ sb] ^ sf] ^ sj] ^ sn]; \ [all …]
|
| A D | zstd.c | 104 struct crypto_acomp_stream *s; in zstd_compress() local 116 s = crypto_acomp_lock_stream_bh(&zstd_streams); in zstd_compress() 117 ctx = s->ctx; in zstd_compress() 190 crypto_acomp_unlock_stream_bh(s); in zstd_compress() 215 struct crypto_acomp_stream *s; in zstd_decompress() local 225 s = crypto_acomp_lock_stream_bh(&zstd_streams); in zstd_decompress() 226 ctx = s->ctx; in zstd_decompress() 287 crypto_acomp_unlock_stream_bh(s); in zstd_decompress()
|
| A D | md4.c | 42 static inline u32 lshift(u32 x, unsigned int s) in lshift() argument 45 return ((x << s) & 0xFFFFFFFF) | (x >> (32 - s)); in lshift() 63 #define ROUND1(a,b,c,d,k,s) (a = lshift(a + F(b,c,d) + k, s)) argument 64 #define ROUND2(a,b,c,d,k,s) (a = lshift(a + G(b,c,d) + k + (u32)0x5A827999,s)) argument 65 #define ROUND3(a,b,c,d,k,s) (a = lshift(a + H(b,c,d) + k + (u32)0x6ED9EBA1,s)) argument
|
| A D | ecrdsa.c | 78 u64 s[ECRDSA_MAX_DIGITS]; /* second part of sig (s) */ in ecrdsa_verify() local 83 struct ecc_point cc = ECC_POINT_INIT(s, e, ndigits); /* reuse s, e */ in ecrdsa_verify() 103 vli_from_be64(s, src, ndigits); in ecrdsa_verify() 109 vli_is_zero(s, ndigits) || in ecrdsa_verify() 110 vli_cmp(s, ctx->curve->n, ndigits) >= 0) in ecrdsa_verify() 125 vli_mod_mult_slow(z1, s, v, ctx->curve->n, ndigits); in ecrdsa_verify()
|
| A D | ecdsa.c | 23 static int _ecdsa_verify(struct ecc_ctx *ctx, const u64 *hash, const u64 *r, const u64 *s) in _ecdsa_verify() argument 36 vli_is_zero(s, ndigits) || vli_cmp(s, curve->n, ndigits) >= 0) in _ecdsa_verify() 44 vli_mod_inv(s1, s, curve->n, ndigits); in _ecdsa_verify() 86 return _ecdsa_verify(ctx, hash, sig->r, sig->s); in ecdsa_verify()
|
| A D | blowfish_common.c | 314 const u32 *S = bctx->s; in encrypt_block() 349 u32 *S = ctx->s; in blowfish_setkey()
|
| A D | ecdsasignature.asn1 | 3 s INTEGER ({ ecdsa_get_signature_s })
|
| A D | blowfish_generic.c | 41 const u32 *S = ctx->s; in bf_encrypt() 73 const u32 *S = ctx->s; in bf_decrypt()
|
| A D | md5.c | 35 #define MD5STEP(f, w, x, y, z, in, s) \ argument 36 (w += f(x, y, z) + in, w = (w<<s | w>>(32-s)) + x)
|
| A D | ecdsa-p1363.c | 33 ecc_digits_from_bytes(src + keylen, keylen, sig.s, ndigits); in ecdsa_p1363_verify()
|
| A D | ecdsa-x962.c | 72 return ecdsa_get_signature_rs(sig_ctx->sig.s, hdrlen, tag, value, vlen, in ecdsa_get_signature_s()
|
| /crypto/async_tx/ |
| A D | async_tx.c | 152 enum submit_disposition s; in async_tx_submit() local 174 s = ASYNC_TX_SUBMITTED; in async_tx_submit() 176 s = ASYNC_TX_CHANNEL_SWITCH; in async_tx_submit() 182 s = ASYNC_TX_DIRECT_SUBMIT; in async_tx_submit() 184 s = ASYNC_TX_CHANNEL_SWITCH; in async_tx_submit() 188 switch (s) { in async_tx_submit()
|
| A D | async_pq.c | 382 void *p, *q, *s; in async_syndrome_val() local 407 s = page_address(spare) + s_off; in async_syndrome_val() 408 *pqres |= !!memcmp(p, s, len) << SUM_CHECK_P; in async_syndrome_val() 420 s = page_address(spare) + s_off; in async_syndrome_val() 421 *pqres |= !!memcmp(q, s, len) << SUM_CHECK_Q; in async_syndrome_val()
|
| A D | async_raid6_recov.c | 96 u8 *d, *s; in async_mult() local 144 s = page_address(src) + s_off; in async_mult() 147 *d++ = qmul[*s++]; in async_mult()
|
| /crypto/asymmetric_keys/ |
| A D | verify_pefile.c | 36 #define chkaddr(base, x, s) \ in pefile_parse_binary() argument 38 if ((x) < base || (s) >= datalen || (x) > datalen - (s)) \ in pefile_parse_binary()
|
| A D | x509_public_key.c | 34 sig->s = kmemdup(cert->raw_sig, cert->raw_sig_size, GFP_KERNEL); in x509_get_sig_params() 35 if (!sig->s) in x509_get_sig_params()
|
| A D | signature.c | 30 kfree(sig->s); in public_key_signature_free()
|
| A D | public_key.c | 381 BUG_ON(!sig->s); in public_key_verify_signature() 428 ret = crypto_sig_verify(tfm, sig->s, sig->s_size, in public_key_verify_signature()
|
| A D | pkcs7_parser.c | 658 ctx->sinfo->sig->s = kmemdup(value, vlen, GFP_KERNEL); in pkcs7_sig_note_signature() 659 if (!ctx->sinfo->sig->s) in pkcs7_sig_note_signature()
|
| A D | Kconfig | 76 This option provides support for verifying the signature(s) on a
|