Home
last modified time | relevance | path

Searched refs:ROLc (Results 1 – 16 of 16) sorted by relevance

/optee_os-3.20.0/core/lib/libtomcrypt/src/stream/rabbit/
A Drabbit.c117 p_instance->x[0] = (ulong32)(g[0] + ROLc(g[7],16) + ROLc(g[6], 16)); in ss_rabbit_next_state()
118 p_instance->x[1] = (ulong32)(g[1] + ROLc(g[0], 8) + g[7]); in ss_rabbit_next_state()
119 p_instance->x[2] = (ulong32)(g[2] + ROLc(g[1],16) + ROLc(g[0], 16)); in ss_rabbit_next_state()
120 p_instance->x[3] = (ulong32)(g[3] + ROLc(g[2], 8) + g[1]); in ss_rabbit_next_state()
121 p_instance->x[4] = (ulong32)(g[4] + ROLc(g[3],16) + ROLc(g[2], 16)); in ss_rabbit_next_state()
122 p_instance->x[5] = (ulong32)(g[5] + ROLc(g[4], 8) + g[3]); in ss_rabbit_next_state()
123 p_instance->x[6] = (ulong32)(g[6] + ROLc(g[5],16) + ROLc(g[4], 16)); in ss_rabbit_next_state()
184 st->master_ctx.c[0] = ROLc(k2, 16); in rabbit_setup()
185 st->master_ctx.c[2] = ROLc(k3, 16); in rabbit_setup()
186 st->master_ctx.c[4] = ROLc(k0, 16); in rabbit_setup()
[all …]
/optee_os-3.20.0/core/lib/libtomcrypt/src/hashes/
A Drmd160.c46 (a) = ROLc((a), (s)) + (e);\
47 (c) = ROLc((c), 10);
52 (c) = ROLc((c), 10);
57 (c) = ROLc((c), 10);
62 (c) = ROLc((c), 10);
67 (c) = ROLc((c), 10);
72 (c) = ROLc((c), 10);
77 (c) = ROLc((c), 10);
82 (c) = ROLc((c), 10);
87 (c) = ROLc((c), 10);
[all …]
A Dsha1.c66 … #define FF0(a,b,c,d,e,i) e = (ROLc(a, 5) + F0(b,c,d) + e + W[i] + 0x5a827999UL); b = ROLc(b, 30); in ss_sha1_compress()
67 … #define FF1(a,b,c,d,e,i) e = (ROLc(a, 5) + F1(b,c,d) + e + W[i] + 0x6ed9eba1UL); b = ROLc(b, 30); in ss_sha1_compress()
68 … #define FF2(a,b,c,d,e,i) e = (ROLc(a, 5) + F2(b,c,d) + e + W[i] + 0x8f1bbcdcUL); b = ROLc(b, 30); in ss_sha1_compress()
69 … #define FF3(a,b,c,d,e,i) e = (ROLc(a, 5) + F3(b,c,d) + e + W[i] + 0xca62c1d6UL); b = ROLc(b, 30); in ss_sha1_compress()
A Drmd320.c41 (a) = ROLc((a), (s)) + (e);\
42 (c) = ROLc((c), 10);
47 (c) = ROLc((c), 10);
52 (c) = ROLc((c), 10);
57 (c) = ROLc((c), 10);
62 (c) = ROLc((c), 10);
67 (c) = ROLc((c), 10);
72 (c) = ROLc((c), 10);
77 (c) = ROLc((c), 10);
82 (c) = ROLc((c), 10);
[all …]
A Drmd128.c45 (a) = ROLc((a), (s));
49 (a) = ROLc((a), (s));
53 (a) = ROLc((a), (s));
57 (a) = ROLc((a), (s));
61 (a) = ROLc((a), (s));
65 (a) = ROLc((a), (s));
69 (a) = ROLc((a), (s));
73 (a) = ROLc((a), (s));
A Drmd256.c39 (a) = ROLc((a), (s));
43 (a) = ROLc((a), (s));
47 (a) = ROLc((a), (s));
51 (a) = ROLc((a), (s));
55 (a) = ROLc((a), (s));
59 (a) = ROLc((a), (s));
63 (a) = ROLc((a), (s));
67 (a) = ROLc((a), (s));
A Dmd5.c78 a = (a + F(b,c,d) + M + t); a = ROLc(a, s) + b;
81 a = (a + G(b,c,d) + M + t); a = ROLc(a, s) + b;
84 a = (a + H(b,c,d) + M + t); a = ROLc(a, s) + b;
87 a = (a + I(b,c,d) + M + t); a = ROLc(a, s) + b;
A Dmd4.c49 #define ROTATE_LEFT(x, n) ROLc(x, n)
/optee_os-3.20.0/core/lib/libtomcrypt/src/ciphers/
A Dnoekeon.c34 temp = a^c; temp = temp ^ ROLc(temp, 8) ^ RORc(temp, 8); \
36 temp = b^d; temp = temp ^ ROLc(temp, 8) ^ RORc(temp, 8); \
40 temp = a^c; temp = temp ^ ROLc(temp, 8) ^ RORc(temp, 8); \
42 temp = b^d; temp = temp ^ ROLc(temp, 8) ^ RORc(temp, 8); \
54 b = ROLc(b, 1); c = ROLc(c, 5); d = ROLc(d, 2);
A Drc6.c85 A = S[i] = ROLc(S[i] + A + B, 3); in s_rc6_setup()
133 t = (b * (b + b + 1)); t = ROLc(t, 5); \ in s_rc6_ecb_encrypt()
134 u = (d * (d + d + 1)); u = ROLc(u, 5); \ in s_rc6_ecb_encrypt()
188 t = (b * (b + b + 1)); t = ROLc(t, 5); \ in s_rc6_ecb_decrypt()
189 u = (d * (d + d + 1)); u = ROLc(u, 5); \ in s_rc6_ecb_decrypt()
A Dserpent.c31 a = ROLc(a, 13); \
32 c = ROLc(c, 3); \
33 d = ROLc(d ^ c ^ (a << 3), 7); \
34 b = ROLc(b ^ a ^ c, 1); \
35 a = ROLc(a ^ b ^ d, 5); \
36 c = ROLc(c ^ d ^ (b << 7), 22); \
462 k[i] = k0[i] = t = ROLc(k0[i] ^ k0[(i+3)%8] ^ k0[(i+5)%8] ^ t ^ 0x9e3779b9 ^ i, 11); in s_setup_key()
465 k[i] = t = ROLc(k[i-8] ^ k[i-5] ^ k[i-3] ^ t ^ 0x9e3779b9 ^ i, 11); in s_setup_key()
A Drc5.c95 A = S[i] = ROLc(S[i] + A + B, 3); in s_rc5_setup()
A Ddes.c1420 right = ROLc(right, 1); in desfunc()
1425 leftt = ROLc(leftt, 1); in desfunc()
/optee_os-3.20.0/core/lib/libtomcrypt/src/headers/
A Dtomcrypt_macros.h246 #define ROLc(x,n) ROL(x,n) macro
253 #define ROLc(x,n) ROL(x,n) macro
277 #define ROLc(word,i) ({ \ macro
296 #define ROLc ROL macro
322 static inline ulong32 ROLc(ulong32 word, const int i) in ROLc() function
340 #define ROLc ROL macro
351 #define ROLc(x, y) ( (((ulong32)(x)<<(ulong32)((y)&31)) | (((ulong32)(x)&0xFFFFFFFFUL)>>(ulong32)((… macro
/optee_os-3.20.0/core/lib/libtomcrypt/src/stream/sosemanuk/
A Dsosemanuk.c176 x0 = ROLc(x0, 13); \
177 x2 = ROLc(x2, 3); \
180 x1 = ROLc(x1, 1); \
181 x3 = ROLc(x3, 7); \
184 x0 = ROLc(x0, 5); \
185 x2 = ROLc(x2, 22); \
231 (wi) = ROLc(tt, 11); \ in sosemanuk_setup()
614 r2 = ROLc(tt, 7); \ in s_sosemanuk_internal()
/optee_os-3.20.0/core/lib/libtomcrypt/src/ciphers/twofish/
A Dtwofish.c315 #define g1_func(x, key) g_func(ROLc(x, 8), key)
396 B = ROLc(B, 8); in s_twofish_setup()
402 skey->twofish.K[x+x+1] = ROLc(B + B + A, 9); in s_twofish_setup()
500 d = ROLc(d, 1) ^ (t2 + t1 + k[1]); in s_twofish_ecb_encrypt()
505 b = ROLc(b, 1) ^ (t2 + t1 + k[3]); in s_twofish_ecb_encrypt()
576 a = ROLc(a, 1) ^ (t1 + k[2]); in s_twofish_ecb_decrypt()
581 c = ROLc(c, 1) ^ (t1 + k[0]); in s_twofish_ecb_decrypt()

Completed in 22 milliseconds