Home
last modified time | relevance | path

Searched refs:y (Results 1 – 17 of 17) sorted by relevance

/crypto/
A Dtea.c75 z += ((y << 4) + k2) ^ (y + sum) ^ ((y >> 5) + k3); in tea_encrypt()
84 u32 y, z, n, sum; in tea_decrypt() local
101 z -= ((y << 4) + k2) ^ (y + sum) ^ ((y >> 5) + k3); in tea_decrypt()
126 u32 y, z, sum = 0; in xtea_encrypt() local
136 z += ((y << 4 ^ y >> 5) + y) ^ (sum + ctx->KEY[sum>>11 &3]); in xtea_encrypt()
145 u32 y, z, sum; in xtea_decrypt() local
154 z -= ((y << 4 ^ y >> 5) + y) ^ (sum + ctx->KEY[sum>>11 & 3]); in xtea_decrypt()
166 u32 y, z, sum = 0; in xeta_encrypt() local
176 z += (y << 4 ^ y >> 5) + (y ^ sum) + ctx->KEY[sum>>11 &3]; in xeta_encrypt()
185 u32 y, z, sum; in xeta_decrypt() local
[all …]
A Dstreebog_generic.c853 const struct streebog_uint512 *y, in streebog_xor() argument
856 z->qword[0] = x->qword[0] ^ y->qword[0]; in streebog_xor()
857 z->qword[1] = x->qword[1] ^ y->qword[1]; in streebog_xor()
858 z->qword[2] = x->qword[2] ^ y->qword[2]; in streebog_xor()
859 z->qword[3] = x->qword[3] ^ y->qword[3]; in streebog_xor()
860 z->qword[4] = x->qword[4] ^ y->qword[4]; in streebog_xor()
861 z->qword[5] = x->qword[5] ^ y->qword[5]; in streebog_xor()
862 z->qword[6] = x->qword[6] ^ y->qword[6]; in streebog_xor()
863 z->qword[7] = x->qword[7] ^ y->qword[7]; in streebog_xor()
867 const struct streebog_uint512 *y, in streebog_xlps() argument
[all …]
A Dtwofish_common.c538 y = rol32(y, 8); \
539 x += y; y += x; ctx->a[j] = x; \
540 ctx->a[(j) + 1] = rol32(y, 9)
551 y = rol32(y, 8); \
552 x += y; y += x; ctx->a[j] = x; \
553 ctx->a[(j) + 1] = rol32(y, 9)
563 y = CALC_K256_2 (m, n, 4); \
564 y = rol32(y, 8); \
565 x += y; y += x; ctx->a[j] = x; \
566 ctx->a[(j) + 1] = rol32(y, 9)
[all …]
A Dtwofish_generic.c54 x = G1 (a); y = G2 (b); \
55 x += y; y += x + ctx->k[2 * (n) + 1]; \
58 (d) = rol32((d), 1) ^ y
61 x = G1 (a); y = G2 (b); \
62 x += y; y += x; \
63 (d) ^= y + ctx->k[2 * (n) + 1]; \
103 u32 x, y; in twofish_encrypt() local
138 u32 x, y; in twofish_decrypt() local
A Decrdsa_defs.h53 .y = cp256a_g_y,
87 .y = cp256b_g_y,
125 .y = cp256c_g_y,
175 .y = tc512a_g_y,
221 .y = tc512b_g_y,
A Decc_curve_defs.h23 .y = nist_p192_g_y,
50 .y = nist_p256_g_y,
83 .y = nist_p384_g_y,
128 .y = nist_p521_g_y,
A Dmd5.c30 #define F1(x, y, z) (z ^ (x & (y ^ z))) argument
31 #define F2(x, y, z) F1(z, x, y) argument
32 #define F3(x, y, z) (x ^ y ^ z) argument
33 #define F4(x, y, z) (y ^ (x | ~z)) argument
35 #define MD5STEP(f, w, x, y, z, in, s) \ argument
36 (w += f(x, y, z) + in, w = (w<<s | w>>(32-s)) + x)
A Dmd4.c48 static inline u32 F(u32 x, u32 y, u32 z) in F() argument
50 return (x & y) | ((~x) & z); in F()
53 static inline u32 G(u32 x, u32 y, u32 z) in G() argument
55 return (x & y) | (x & z) | (y & z); in G()
58 static inline u32 H(u32 x, u32 y, u32 z) in H() argument
60 return x ^ y ^ z; in H()
A Drmd160.c33 #define F1(x, y, z) (x ^ y ^ z) /* XOR */ argument
34 #define F2(x, y, z) (z ^ (x & (y ^ z))) /* x ? y : z */ argument
35 #define F3(x, y, z) ((x | ~y) ^ z) argument
36 #define F4(x, y, z) (y ^ (z & (x ^ y))) /* z ? x : y */ argument
37 #define F5(x, y, z) (x ^ (y | ~z)) argument
A Decc.c119 p->y = ecc_alloc_digits_space(ndigits); in ecc_alloc_point()
120 if (!p->y) in ecc_alloc_point()
141 kfree_sensitive(p->y); in ecc_free_point()
1120 vli_is_zero(point->y, point->ndigits)); in ecc_point_is_zero()
1353 vli_set(ry[1], point->y, ndigits); in ecc_point_mult()
1388 vli_set(result->y, ry[0], ndigits); in ecc_point_mult()
1402 vli_set(result->y, q->y, ndigits); in ecc_point_add()
1405 vli_set(py, p->y, ndigits); in ecc_point_add()
1422 u64 *ry = result->y; in ecc_point_mult_shamir()
1444 vli_set(ry, point->y, ndigits); in ecc_point_mult_shamir()
[all …]
A Dadiantum.c189 u64 y = le64_to_cpu(v2->b); in le128_add() local
191 r->b = cpu_to_le64(x + y); in le128_add()
193 (x + y < x)); in le128_add()
200 u64 y = le64_to_cpu(v2->b); in le128_sub() local
202 r->b = cpu_to_le64(x - y); in le128_sub()
204 (x - y > x)); in le128_sub()
A Decdsa.c19 u64 y[ECC_MAX_DIGITS]; member
113 ctx->pub_key = ECC_POINT_INIT(ctx->x, ctx->y, in ecdsa_ecc_ctx_reset()
150 ecc_digits_from_bytes(&d[digitlen], digitlen, ctx->pub_key.y, ndigits); in ecdsa_set_pub_key()
A Ddh.c107 static int dh_is_pubkey_valid(struct dh_ctx *ctx, MPI y) in dh_is_pubkey_valid() argument
126 if (mpi_cmp_ui(y, 1) < 1 || mpi_cmp(y, ctx->p) >= 0) in dh_is_pubkey_valid()
149 mpi_powm(val, y, q, ctx->p); in dh_is_pubkey_valid()
A Decrdsa.c235 vli_from_le64(ctx->pub_key.y, ctx->key + ndigits * sizeof(u64), in ecrdsa_set_pub_key()
A DMakefile23 ifeq ($(CONFIG_BPF_SYSCALL),y)
A DKconfig159 def_tristate CRYPTO_MANAGER || (CRYPTO_MANAGER!=n && CRYPTO_ALGAPI=y)
789 default y
1200 default y
1418 default y
/crypto/asymmetric_keys/
A DKconfig70 depends on PKCS7_MESSAGE_PARSER=y
94 default y
96 depends on CRYPTO_SHA256=y || CRYPTO_SHA256=FIPS_SIGNATURE_SELFTEST
97 depends on CRYPTO_RSA=y || CRYPTO_RSA=FIPS_SIGNATURE_SELFTEST
101 default y
103 depends on CRYPTO_SHA256=y || CRYPTO_SHA256=FIPS_SIGNATURE_SELFTEST
104 depends on CRYPTO_ECDSA=y || CRYPTO_ECDSA=FIPS_SIGNATURE_SELFTEST

Completed in 37 milliseconds