| /crypto/ |
| A D | tea.c | 75 z += ((y << 4) + k2) ^ (y + sum) ^ ((y >> 5) + k3); in tea_encrypt() 84 u32 y, z, n, sum; in tea_decrypt() local 101 z -= ((y << 4) + k2) ^ (y + sum) ^ ((y >> 5) + k3); in tea_decrypt() 126 u32 y, z, sum = 0; in xtea_encrypt() local 136 z += ((y << 4 ^ y >> 5) + y) ^ (sum + ctx->KEY[sum>>11 &3]); in xtea_encrypt() 145 u32 y, z, sum; in xtea_decrypt() local 154 z -= ((y << 4 ^ y >> 5) + y) ^ (sum + ctx->KEY[sum>>11 & 3]); in xtea_decrypt() 166 u32 y, z, sum = 0; in xeta_encrypt() local 176 z += (y << 4 ^ y >> 5) + (y ^ sum) + ctx->KEY[sum>>11 &3]; in xeta_encrypt() 185 u32 y, z, sum; in xeta_decrypt() local [all …]
|
| A D | streebog_generic.c | 853 const struct streebog_uint512 *y, in streebog_xor() argument 856 z->qword[0] = x->qword[0] ^ y->qword[0]; in streebog_xor() 857 z->qword[1] = x->qword[1] ^ y->qword[1]; in streebog_xor() 858 z->qword[2] = x->qword[2] ^ y->qword[2]; in streebog_xor() 859 z->qword[3] = x->qword[3] ^ y->qword[3]; in streebog_xor() 860 z->qword[4] = x->qword[4] ^ y->qword[4]; in streebog_xor() 861 z->qword[5] = x->qword[5] ^ y->qword[5]; in streebog_xor() 862 z->qword[6] = x->qword[6] ^ y->qword[6]; in streebog_xor() 863 z->qword[7] = x->qword[7] ^ y->qword[7]; in streebog_xor() 867 const struct streebog_uint512 *y, in streebog_xlps() argument [all …]
|
| A D | twofish_common.c | 538 y = rol32(y, 8); \ 539 x += y; y += x; ctx->a[j] = x; \ 540 ctx->a[(j) + 1] = rol32(y, 9) 551 y = rol32(y, 8); \ 552 x += y; y += x; ctx->a[j] = x; \ 553 ctx->a[(j) + 1] = rol32(y, 9) 563 y = CALC_K256_2 (m, n, 4); \ 564 y = rol32(y, 8); \ 565 x += y; y += x; ctx->a[j] = x; \ 566 ctx->a[(j) + 1] = rol32(y, 9) [all …]
|
| A D | twofish_generic.c | 54 x = G1 (a); y = G2 (b); \ 55 x += y; y += x + ctx->k[2 * (n) + 1]; \ 58 (d) = rol32((d), 1) ^ y 61 x = G1 (a); y = G2 (b); \ 62 x += y; y += x; \ 63 (d) ^= y + ctx->k[2 * (n) + 1]; \ 103 u32 x, y; in twofish_encrypt() local 138 u32 x, y; in twofish_decrypt() local
|
| A D | ecrdsa_defs.h | 53 .y = cp256a_g_y, 87 .y = cp256b_g_y, 125 .y = cp256c_g_y, 175 .y = tc512a_g_y, 221 .y = tc512b_g_y,
|
| A D | ecc_curve_defs.h | 23 .y = nist_p192_g_y, 50 .y = nist_p256_g_y, 83 .y = nist_p384_g_y, 128 .y = nist_p521_g_y,
|
| A D | md5.c | 30 #define F1(x, y, z) (z ^ (x & (y ^ z))) argument 31 #define F2(x, y, z) F1(z, x, y) argument 32 #define F3(x, y, z) (x ^ y ^ z) argument 33 #define F4(x, y, z) (y ^ (x | ~z)) argument 35 #define MD5STEP(f, w, x, y, z, in, s) \ argument 36 (w += f(x, y, z) + in, w = (w<<s | w>>(32-s)) + x)
|
| A D | md4.c | 48 static inline u32 F(u32 x, u32 y, u32 z) in F() argument 50 return (x & y) | ((~x) & z); in F() 53 static inline u32 G(u32 x, u32 y, u32 z) in G() argument 55 return (x & y) | (x & z) | (y & z); in G() 58 static inline u32 H(u32 x, u32 y, u32 z) in H() argument 60 return x ^ y ^ z; in H()
|
| A D | rmd160.c | 33 #define F1(x, y, z) (x ^ y ^ z) /* XOR */ argument 34 #define F2(x, y, z) (z ^ (x & (y ^ z))) /* x ? y : z */ argument 35 #define F3(x, y, z) ((x | ~y) ^ z) argument 36 #define F4(x, y, z) (y ^ (z & (x ^ y))) /* z ? x : y */ argument 37 #define F5(x, y, z) (x ^ (y | ~z)) argument
|
| A D | ecc.c | 119 p->y = ecc_alloc_digits_space(ndigits); in ecc_alloc_point() 120 if (!p->y) in ecc_alloc_point() 141 kfree_sensitive(p->y); in ecc_free_point() 1120 vli_is_zero(point->y, point->ndigits)); in ecc_point_is_zero() 1353 vli_set(ry[1], point->y, ndigits); in ecc_point_mult() 1388 vli_set(result->y, ry[0], ndigits); in ecc_point_mult() 1402 vli_set(result->y, q->y, ndigits); in ecc_point_add() 1405 vli_set(py, p->y, ndigits); in ecc_point_add() 1422 u64 *ry = result->y; in ecc_point_mult_shamir() 1444 vli_set(ry, point->y, ndigits); in ecc_point_mult_shamir() [all …]
|
| A D | adiantum.c | 189 u64 y = le64_to_cpu(v2->b); in le128_add() local 191 r->b = cpu_to_le64(x + y); in le128_add() 193 (x + y < x)); in le128_add() 200 u64 y = le64_to_cpu(v2->b); in le128_sub() local 202 r->b = cpu_to_le64(x - y); in le128_sub() 204 (x - y > x)); in le128_sub()
|
| A D | ecdsa.c | 19 u64 y[ECC_MAX_DIGITS]; member 113 ctx->pub_key = ECC_POINT_INIT(ctx->x, ctx->y, in ecdsa_ecc_ctx_reset() 150 ecc_digits_from_bytes(&d[digitlen], digitlen, ctx->pub_key.y, ndigits); in ecdsa_set_pub_key()
|
| A D | dh.c | 107 static int dh_is_pubkey_valid(struct dh_ctx *ctx, MPI y) in dh_is_pubkey_valid() argument 126 if (mpi_cmp_ui(y, 1) < 1 || mpi_cmp(y, ctx->p) >= 0) in dh_is_pubkey_valid() 149 mpi_powm(val, y, q, ctx->p); in dh_is_pubkey_valid()
|
| A D | ecrdsa.c | 235 vli_from_le64(ctx->pub_key.y, ctx->key + ndigits * sizeof(u64), in ecrdsa_set_pub_key()
|
| A D | Makefile | 23 ifeq ($(CONFIG_BPF_SYSCALL),y)
|
| A D | Kconfig | 159 def_tristate CRYPTO_MANAGER || (CRYPTO_MANAGER!=n && CRYPTO_ALGAPI=y) 789 default y 1200 default y 1418 default y
|
| /crypto/asymmetric_keys/ |
| A D | Kconfig | 70 depends on PKCS7_MESSAGE_PARSER=y 94 default y 96 depends on CRYPTO_SHA256=y || CRYPTO_SHA256=FIPS_SIGNATURE_SELFTEST 97 depends on CRYPTO_RSA=y || CRYPTO_RSA=FIPS_SIGNATURE_SELFTEST 101 default y 103 depends on CRYPTO_SHA256=y || CRYPTO_SHA256=FIPS_SIGNATURE_SELFTEST 104 depends on CRYPTO_ECDSA=y || CRYPTO_ECDSA=FIPS_SIGNATURE_SELFTEST
|