Home
last modified time | relevance | path

Searched refs:ROL (Results 1 – 11 of 11) sorted by relevance

/optee_os-3.20.0/core/lib/libtomcrypt/src/stream/salsa20/
A Dsalsa20_crypt.c15 x[b] ^= (ROL((x[a] + x[d]), 7)); \
16 x[c] ^= (ROL((x[b] + x[a]), 9)); \
17 x[d] ^= (ROL((x[c] + x[b]), 13)); \
18 x[a] ^= (ROL((x[d] + x[c]), 18));
A Dxsalsa20_setup.c18 x[b] ^= (ROL((x[a] + x[d]), 7)); \
19 x[c] ^= (ROL((x[b] + x[a]), 9)); \
20 x[d] ^= (ROL((x[c] + x[b]), 13)); \
21 x[a] ^= (ROL((x[d] + x[c]), 18));
/optee_os-3.20.0/core/lib/libtomcrypt/src/stream/chacha/
A Dchacha_crypt.c14 x[a] += x[b]; x[d] = ROL(x[d] ^ x[a], 16); \
15 x[c] += x[d]; x[b] = ROL(x[b] ^ x[c], 12); \
16 x[a] += x[b]; x[d] = ROL(x[d] ^ x[a], 8); \
17 x[c] += x[d]; x[b] = ROL(x[b] ^ x[c], 7);
/optee_os-3.20.0/core/lib/libtomcrypt/src/ciphers/
A Dmulti2.c21 t = (ROL(t, 1) + t - 1) & 0xFFFFFFFFUL; in s_pi2()
22 t = (ROL(t, 4) ^ t) & 0xFFFFFFFFUL; in s_pi2()
30 t = (ROL(t, 2) + t + 1) & 0xFFFFFFFFUL; in s_pi3()
31 t = (ROL(t, 8) ^ t) & 0xFFFFFFFFUL; in s_pi3()
33 t = (ROL(t, 1) - t) & 0xFFFFFFFFUL; in s_pi3()
34 t = ROL(t, 16) ^ (p[0] | t); in s_pi3()
42 t = (ROL(t, 2) + t + 1) & 0xFFFFFFFFUL; in s_pi4()
A Drc5.c96 B = L[j] = ROL(L[j] + A + B, (A+B)); in s_rc5_setup()
145 A = ROL(A ^ B, B) + K[0]; in s_rc5_ecb_encrypt()
146 B = ROL(B ^ A, A) + K[1]; in s_rc5_ecb_encrypt()
147 A = ROL(A ^ B, B) + K[2]; in s_rc5_ecb_encrypt()
148 B = ROL(B ^ A, A) + K[3]; in s_rc5_ecb_encrypt()
153 A = ROL(A ^ B, B) + K[0]; in s_rc5_ecb_encrypt()
154 B = ROL(B ^ A, A) + K[1]; in s_rc5_ecb_encrypt()
A Dcamellia.c453 b ^= ROL((a & (ulong32)(skey->camellia.kl[0] >> 32)), 1); in camellia_ecb_encrypt()
461 b ^= ROL((a & (ulong32)(skey->camellia.kl[1] >> 32)), 1); in camellia_ecb_encrypt()
475 b ^= ROL((a & (ulong32)(skey->camellia.kl[2] >> 32)), 1); in camellia_ecb_encrypt()
483 b ^= ROL((a & (ulong32)(skey->camellia.kl[3] >> 32)), 1); in camellia_ecb_encrypt()
499 b ^= ROL((a & (ulong32)(skey->camellia.kl[4] >> 32)), 1); in camellia_ecb_encrypt()
507 b ^= ROL((a & (ulong32)(skey->camellia.kl[5] >> 32)), 1); in camellia_ecb_encrypt()
550 b ^= ROL((a & (ulong32)(skey->camellia.kl[4] >> 32)), 1); in camellia_ecb_decrypt()
574 b ^= ROL((a & (ulong32)(skey->camellia.kl[2] >> 32)), 1); in camellia_ecb_decrypt()
580 b ^= ROL((a & (ulong32)(skey->camellia.kl[3] >> 32)), 1); in camellia_ecb_decrypt()
596 b ^= ROL((a & (ulong32)(skey->camellia.kl[0] >> 32)), 1); in camellia_ecb_decrypt()
[all …]
A Drc6.c86 B = L[j] = ROL(L[j] + A + B, (A+B)); in s_rc6_setup()
135 a = ROL(a^t,u) + K[0]; \ in s_rc6_ecb_encrypt()
136 c = ROL(c^u,t) + K[1]; K += 2; in s_rc6_ecb_encrypt()
A Dcast5.c498 I = ROL(I, Kr); in FI()
506 I = ROL(I, Kr); in FII()
514 I = ROL(I, Kr); in FIII()
/optee_os-3.20.0/core/lib/libtomcrypt/src/headers/
A Dtomcrypt_macros.h244 #define ROL(x,n) _rotl(x,n) macro
246 #define ROLc(x,n) ROL(x,n)
252 #define ROL(x,n) __builtin_rotateleft32(x,n) macro
253 #define ROLc(x,n) ROL(x,n)
259 static inline ulong32 ROL(ulong32 word, int i) in ROL() function
296 #define ROLc ROL
304 static inline ulong32 ROL(ulong32 word, int i) in ROL() function
340 #define ROLc ROL
349 #define ROL(x, y) ( (((ulong32)(x)<<(ulong32)((y)&31)) | (((ulong32)(x)&0xFFFFFFFFUL)>>(ulong32)((3… macro
/optee_os-3.20.0/core/lib/libtomcrypt/src/hashes/
A Dmd5.c39 a = (a + F(b,c,d) + M + t); a = ROL(a, s) + b;
42 a = (a + G(b,c,d) + M + t); a = ROL(a, s) + b;
45 a = (a + H(b,c,d) + M + t); a = ROL(a, s) + b;
48 a = (a + I(b,c,d) + M + t); a = ROL(a, s) + b;
A Dsha1.c61 W[i] = ROL(W[i-3] ^ W[i-8] ^ W[i-14] ^ W[i-16], 1); in ss_sha1_compress()

Completed in 12 milliseconds