/lib/crypto/ |
A D | sm3.c | 46 h += GG ## i(e, f, g) + ss1 + (w1); \ 52 #define R1(a, b, c, d, e, f, g, h, t, w1, w2) \ argument 53 R(1, a, b, c, d, e, f, g, h, t, w1, w2) 54 #define R2(a, b, c, d, e, f, g, h, t, w1, w2) \ argument 55 R(2, a, b, c, d, e, f, g, h, t, w1, w2) 77 u32 a, b, c, d, e, f, g, h, ss1, ss2; in sm3_transform() local 85 g = sctx->state[6]; in sm3_transform() 88 R1(a, b, c, d, e, f, g, h, K[0], I(0), I(4)); in sm3_transform() 89 R1(d, a, b, c, h, e, f, g, K[1], I(1), I(5)); in sm3_transform() 90 R1(c, d, a, b, g, h, e, f, K[2], I(2), I(6)); in sm3_transform() [all …]
|
A D | sha256.c | 78 u32 a, b, c, d, e, f, g, h; in sha256_block_generic() local 112 g = state->h[6]; in sha256_block_generic() 117 SHA256_ROUND(i + 0, a, b, c, d, e, f, g, h); in sha256_block_generic() 118 SHA256_ROUND(i + 1, h, a, b, c, d, e, f, g); in sha256_block_generic() 119 SHA256_ROUND(i + 2, g, h, a, b, c, d, e, f); in sha256_block_generic() 120 SHA256_ROUND(i + 3, f, g, h, a, b, c, d, e); in sha256_block_generic() 121 SHA256_ROUND(i + 4, e, f, g, h, a, b, c, d); in sha256_block_generic() 122 SHA256_ROUND(i + 5, d, e, f, g, h, a, b, c); in sha256_block_generic() 123 SHA256_ROUND(i + 6, c, d, e, f, g, h, a, b); in sha256_block_generic() 124 SHA256_ROUND(i + 7, b, c, d, e, f, g, h, a); in sha256_block_generic() [all …]
|
A D | sha512.c | 81 u64 g = state->h[6]; in sha512_block_generic() local 97 t1 = h + e1(e) + Ch(e, f, g) + sha512_K[i] + W[(i & 15)]; in sha512_block_generic() 99 t1 = g + e1(d) + Ch(d, e, f) + sha512_K[i+1] + W[(i & 15) + 1]; in sha512_block_generic() 100 t2 = e0(h) + Maj(h, a, b); c += t1; g = t1 + t2; in sha512_block_generic() 102 t2 = e0(g) + Maj(g, h, a); b += t1; f = t1 + t2; in sha512_block_generic() 104 t2 = e0(f) + Maj(f, g, h); a += t1; e = t1 + t2; in sha512_block_generic() 106 t2 = e0(e) + Maj(e, f, g); h += t1; d = t1 + t2; in sha512_block_generic() 108 t2 = e0(d) + Maj(d, e, f); g += t1; c = t1 + t2; in sha512_block_generic() 109 t1 = b + e1(g) + Ch(g, h, a) + sha512_K[i+6] + W[(i & 15) + 6]; in sha512_block_generic() 111 t1 = a + e1(f) + Ch(f, g, h) + sha512_K[i+7] + W[(i & 15) + 7]; in sha512_block_generic() [all …]
|
A D | gf128mul.c | 243 struct gf128mul_64k *gf128mul_init_64k_bbe(const be128 *g) in gf128mul_init_64k_bbe() argument 261 t->t[0]->t[1] = *g; in gf128mul_init_64k_bbe() 324 struct gf128mul_4k *gf128mul_init_4k_lle(const be128 *g) in gf128mul_init_4k_lle() argument 333 t->t[128] = *g; in gf128mul_init_4k_lle()
|
A D | Kconfig | 43 fallback, e.g., for SIMD implementations. If no arch specific 60 library interface that require the generic code as a fallback, e.g., 84 fallback, e.g., for SIMD implementations. If no arch specific 123 library interface that require the generic code as a fallback, e.g.,
|
A D | curve25519-fiat32.c | 264 static __always_inline void fe_add(fe_loose *h, const fe *f, const fe *g) in fe_add() argument 266 fe_add_impl(h->v, f->v, g->v); in fe_add() 309 fe_sub_impl(h->v, f->v, g->v); in fe_sub() 428 static __always_inline void fe_mul_ttt(fe *h, const fe *f, const fe *g) in fe_mul_ttt() argument 430 fe_mul_impl(h->v, f->v, g->v); in fe_mul_ttt() 435 fe_mul_impl(h->v, f->v, g->v); in fe_mul_tlt() 439 fe_mul_tll(fe *h, const fe_loose *f, const fe_loose *g) in fe_mul_tll() argument 441 fe_mul_impl(h->v, f->v, g->v); in fe_mul_tll() 622 static noinline void fe_cswap(fe *f, fe *g, unsigned int b) in fe_cswap() argument 627 u32 x = f->v[i] ^ g->v[i]; in fe_cswap() [all …]
|
/lib/ |
A D | ts_bm.c | 115 static int subpattern(u8 *pattern, int i, int j, int g) in subpattern() argument 117 int x = i+g-1, y = j+g-1, ret = 0; in subpattern() 124 if (--g == 0) { in subpattern() 135 int i, j, g; in compute_prefix_tbl() local 151 for (i = bm->patlen-1, g = 1; i > 0; g++, i--) { in compute_prefix_tbl() 152 for (j = i-1; j >= 1-g ; j--) in compute_prefix_tbl() 153 if (subpattern(bm->pattern, i, j, g)) { in compute_prefix_tbl() 154 bm->good_shift[g] = bm->patlen-j-g; in compute_prefix_tbl()
|
A D | test_fpu_impl.c | 15 volatile double a, b, c, d, e, f, g; in test_fpu() local 31 g = a + c * f; in test_fpu() 33 if (d > a && e > a && g > a) in test_fpu()
|
A D | bch.c | 872 *g = f; in factor_polynomial() 1195 struct gf_poly *g; in compute_generator_polynomial() local 1217 g->deg = 0; in compute_generator_polynomial() 1218 g->c[0] = 1; in compute_generator_polynomial() 1223 g->c[g->deg+1] = 1; in compute_generator_polynomial() 1225 g->c[j] = gf_mul(bch, g->c[j], r)^g->c[j-1]; in compute_generator_polynomial() 1227 g->c[0] = gf_mul(bch, g->c[0], r); in compute_generator_polynomial() 1228 g->deg++; in compute_generator_polynomial() 1232 n = g->deg+1; in compute_generator_polynomial() 1238 if (g->c[n-1-j]) in compute_generator_polynomial() [all …]
|
A D | inflate.c | 339 int g; /* maximum code length */ in huft_build() local 403 g = i; /* maximum code length */ in huft_build() 439 n = x[g]; /* set n to length of v */ in huft_build() 454 for (; k <= g; k++) in huft_build() 470 z = (z = g - w) > (unsigned)l ? l : z; /* upper limit on table size */ in huft_build() 558 ret = y != 0 && g != 1; in huft_build()
|
A D | kstrtox.c | 412 #define kstrto_from_user(f, g, type) \ argument 422 return g(buf, base, res); \
|
/lib/crypto/powerpc/ |
A D | sha256-spe-asm.S | 109 andc rT1,g,e; /* 1: ch' = ~e and g */ \ 139 add g,g,rT0; /* 2: temp1 = h + S1 */ \ 142 add g,g,rT3; /* 2: temp1 = temp1 + temp1' */ \ 144 add g,g,rT2; /* 2: temp1 = temp1 + K */ \ 151 add c,c,g; /* 2: d = d + temp1 */ \ 154 add g,g,rT3 /* 2: h = temp1 + temp2 */ 197 add g,g,rT1; /* 2: temp1 = temp1 + wk */ \ 207 add g,g,rT0; /* 2: temp1 = h + S1 */ \ 210 add g,g,rT3; /* 2: temp1 = temp1 + ch */ \ 219 add c,c,g; /* 2: d = d + temp1 */ \ [all …]
|
/lib/crypto/x86/ |
A D | sha256-avx2-asm.S | 105 g = %r10d define 143 h = g 144 g = f define 181 xor g, y2 # y2 = CH = ((f^g)&e)^g # CH 231 xor g, y2 # y2 = CH = ((f^g)&e)^g # CH 280 xor g, y2 # y2 = CH = ((f^g)&e)^g # CH 328 xor g, y2 # y2 = CH = ((f^g)&e)^g # CH 369 xor g, y2 # y2 = CH = ((f^g)&e)^g # CH 407 xor g, y2 # y2 = CH = ((f^g)&e)^g # CH 447 xor g, y2 # y2 = CH = ((f^g)&e)^g # CH [all …]
|
A D | sha512-avx2-asm.S | 90 g = %r10 define 145 h = g 146 g = f define 202 xor g, y2 # y2 = CH = ((f^g)&e)^g # CH 266 xor g, y2 # y2 = CH = ((f^g)&e)^g # CH 320 xor g, y2 # y2 = CH = ((f^g)&e)^g # CH 377 xor g, y2 # y2 = CH = ((f^g)&e)^g # CH 416 xor g, y2 # y2 = CH = ((f^g)&e)^g # CH 454 xor g, y2 # y2 = CH = ((f^g)&e)^g # CH 492 xor g, y2 # y2 = CH = ((f^g)&e)^g # CH [all …]
|
A D | sha256-avx-asm.S | 143 h = g 144 g = f define 166 xor g, y2 # y2 = f^g 175 xor g, y2 # y2 = CH = ((f^g)&e)^g 202 xor g, y2 # y2 = f^g 210 xor g, y2 # y2 = CH = ((f^g)&e)^g 240 xor g, y2 # y2 = f^g 247 xor g, y2 # y2 = CH = ((f^g)&e)^g 278 xor g, y2 # y2 = f^g 286 xor g, y2 # y2 = CH = ((f^g)&e)^g [all …]
|
A D | sha256-ssse3-asm.S | 137 h = g 138 g = f define 161 xor g, y2 # y2 = f^g 170 xor g, y2 # y2 = CH = ((f^g)&e)^g 202 xor g, y2 # y2 = f^g 210 xor g, y2 # y2 = CH = ((f^g)&e)^g 243 xor g, y2 # y2 = f^g 250 xor g, y2 # y2 = CH = ((f^g)&e)^g 292 xor g, y2 # y2 = CH = ((f^g)&e)^g 325 xor g, y2 # y2 = f^g [all …]
|
A D | sha512-avx-asm.S | 125 xor g_64, T1 # T1 = f ^ g 127 and e_64, T1 # T1 = (f ^ g) & e 129 xor g_64, T1 # T1 = ((f ^ g) & e) ^ g = CH(e,f,g) 135 add h_64, T1 # T1 = CH(e,f,g) + W[t] + K[t] + h 137 add tmp0, T1 # T1 = CH(e,f,g) + W[t] + K[t] + S1(e)
|
A D | sha512-ssse3-asm.S | 119 xor g_64, T1 # T1 = f ^ g 121 and e_64, T1 # T1 = (f ^ g) & e 123 xor g_64, T1 # T1 = ((f ^ g) & e) ^ g = CH(e,f,g) 129 add h_64, T1 # T1 = CH(e,f,g) + W[t] + K[t] + h 131 add tmp0, T1 # T1 = CH(e,f,g) + W[t] + K[t] + S1(e)
|
/lib/fonts/ |
A D | fonts.c | 116 const struct font_desc *f, *g; in get_default_font() local 118 g = NULL; in get_default_font() 147 g = f; in get_default_font() 150 return g; in get_default_font()
|
/lib/crypto/arm/ |
A D | sha256-armv4.pl | 72 my ($i,$a,$b,$c,$d,$e,$f,$g,$h) = @_; 106 eor $t1,$f,$g 110 eor $t1,$t1,$g @ Ch(e,f,g) 140 my ($i,$a,$b,$c,$d,$e,$f,$g,$h) = @_; 310 my ($a,$b,$c,$d,$e,$f,$g,$h); 411 my ($a,$b,$c,$d,$e,$f,$g,$h);
|
A D | blake2s-core.S | 48 .macro _le32_bswap_8x a, b, c, d, e, f, g, h, tmp 55 _le32_bswap \g, \tmp
|
A D | sha512-armv4.pl | 506 my ($a,$b,$c,$d,$e,$f,$g,$h)=@_; 530 vbsl $Ch,$f,$g @ Ch(e,f,g)
|
/lib/tests/ |
A D | randstruct_kunit.c | 27 macro(g, args) \ 77 uintptr_t g; \ 238 .g = 17, \ in randstruct_initializers()
|
/lib/crypto/tests/ |
A D | Kconfig | 23 # included, for consistency with the naming used elsewhere (e.g. CRYPTO_SHA256). 35 # included, for consistency with the naming used elsewhere (e.g. CRYPTO_SHA512).
|
/lib/crypto/arm64/ |
A D | sha2-armv8.pl | 107 my ($i,$a,$b,$c,$d,$e,$f,$g,$h)=@_; 144 bic $t2,$g,$e 167 bic $t2,$g,$e 481 my ($a,$b,$c,$d,$e,$f,$g,$h); 588 my ($a,$b,$c,$d,$e,$f,$g,$h);
|