| /crypto/ |
| A D | aegis128-neon-inner.c | 88 w = (v << 1) ^ (uint8x16_t)(((int8x16_t)v >> 7) & 0x1b); in aegis_aes_round() 111 st.v[4] ^= aegis_aes_round(st.v[3]); in aegis128_update_neon() 112 st.v[3] ^= aegis_aes_round(st.v[2]); in aegis128_update_neon() 113 st.v[2] ^= aegis_aes_round(st.v[1]); in aegis128_update_neon() 114 st.v[1] ^= aegis_aes_round(st.v[0]); in aegis128_update_neon() 232 uint8x16_t s = st.v[1] ^ (st.v[2] & st.v[3]) ^ st.v[4]; in crypto_aegis128_encrypt_chunk_neon() 245 uint8x16_t s = st.v[1] ^ (st.v[2] & st.v[3]) ^ st.v[4]; in crypto_aegis128_encrypt_chunk_neon() 281 msg = vld1q_u8(src) ^ st.v[1] ^ (st.v[2] & st.v[3]) ^ st.v[4]; in crypto_aegis128_decrypt_chunk_neon() 291 uint8x16_t s = st.v[1] ^ (st.v[2] & st.v[3]) ^ st.v[4]; in crypto_aegis128_decrypt_chunk_neon() 334 v = st.v[0] ^ st.v[1] ^ st.v[2] ^ st.v[3] ^ st.v[4]; in crypto_aegis128_final_neon() [all …]
|
| A D | blake2b_generic.c | 60 G(r,0,v[ 0],v[ 4],v[ 8],v[12]); \ 61 G(r,1,v[ 1],v[ 5],v[ 9],v[13]); \ 62 G(r,2,v[ 2],v[ 6],v[10],v[14]); \ 63 G(r,3,v[ 3],v[ 7],v[11],v[15]); \ 64 G(r,4,v[ 0],v[ 5],v[10],v[15]); \ 65 G(r,5,v[ 1],v[ 6],v[11],v[12]); \ 66 G(r,6,v[ 2],v[ 7],v[ 8],v[13]); \ 67 G(r,7,v[ 3],v[ 4],v[ 9],v[14]); \ 74 u64 v[16]; in blake2b_compress_one_generic() local 81 v[i] = S->h[i]; in blake2b_compress_one_generic() [all …]
|
| A D | anubis.c | 559 u32 v = ctx->E[R - r][i]; in anubis_setkey() local 561 T0[T4[(v >> 24) ] & 0xff] ^ in anubis_setkey() 562 T1[T4[(v >> 16) & 0xff] & 0xff] ^ in anubis_setkey() 563 T2[T4[(v >> 8) & 0xff] & 0xff] ^ in anubis_setkey() 564 T3[T4[(v ) & 0xff] & 0xff]; in anubis_setkey()
|
| A D | ecc.c | 666 if (diff != v[i][j]) in vli_mmod_slow() 668 v[1 - i][j] = diff; in vli_mmod_slow() 1056 vli_clear(v, ndigits); in vli_mod_inv() 1073 if (!EVEN(v)) in vli_mod_inv() 1074 carry = vli_add(v, v, mod, ndigits); in vli_mod_inv() 1076 vli_rshift1(v, ndigits); in vli_mod_inv() 1098 vli_add(v, v, mod, ndigits); in vli_mod_inv() 1100 vli_sub(v, v, u, ndigits); in vli_mod_inv() 1101 if (!EVEN(v)) in vli_mod_inv() 1102 carry = vli_add(v, v, mod, ndigits); in vli_mod_inv() [all …]
|
| A D | internal.h | 152 int crypto_probing_notify(unsigned long val, void *v); 198 static inline void crypto_notify(unsigned long val, void *v) in crypto_notify() argument 200 blocking_notifier_call_chain(&crypto_chain, val, v); in crypto_notify()
|
| A D | ecrdsa.c | 80 u64 *v = e; /* e^{-1} \mod q */ in ecrdsa_verify() local 122 vli_mod_inv(v, e, ctx->curve->n, ndigits); in ecrdsa_verify() 125 vli_mod_mult_slow(z1, s, v, ctx->curve->n, ndigits); in ecrdsa_verify() 127 vli_mod_mult_slow(z2, _r, v, ctx->curve->n, ndigits); in ecrdsa_verify()
|
| A D | api.c | 323 int crypto_probing_notify(unsigned long val, void *v) in crypto_probing_notify() argument 327 ok = blocking_notifier_call_chain(&crypto_chain, val, v); in crypto_probing_notify() 330 ok = blocking_notifier_call_chain(&crypto_chain, val, v); in crypto_probing_notify()
|
| A D | testmgr.h | 125 const char *v; member 23618 .v = "\x80\x00\x00\x00\x00\x00\x00\x00" 23632 .v = "\xc0\x00\x00\x00\x00\x00\x00\x00" 23646 .v = "\xe0\x00\x00\x00\x00\x00\x00\x00" 23660 .v = "\xf0\x00\x00\x00\x00\x00\x00\x00" 23674 .v = "\xf8\x00\x00\x00\x00\x00\x00\x00" 23688 .v = "\x57\x2c\x8e\x76\x87\x26\x47\x97"
|
| A D | testmgr.c | 3466 memcpy(seed, template[i].v, template[i].vlen); in test_cprng()
|
| /crypto/asymmetric_keys/ |
| A D | x509_cert_parser.c | 559 if (v[0] != ASN1_OTS || v[1] != vlen - 2) in x509_process_extension() 561 v += 2; in x509_process_extension() 565 ctx->cert->raw_skid = v; in x509_process_extension() 587 if (v[0] != ASN1_BTS) in x509_process_extension() 591 if (v[2] >= 8) in x509_process_extension() 593 if (v[3] & 0x80) in x509_process_extension() 595 if (v[1] == 0x02 && v[2] <= 2 && (v[3] & 0x04)) in x509_process_extension() 597 else if (vlen > 4 && v[1] == 0x03 && (v[3] & 0x04)) in x509_process_extension() 604 ctx->raw_akid = v; in x509_process_extension() 624 if (v[1] != vlen - 2) in x509_process_extension() [all …]
|