Home
last modified time | relevance | path

Searched refs:F2 (Results 1 – 7 of 7) sorted by relevance

/crypto/
Drmd256.c41 #define F2(x, y, z) (z ^ (x & (y ^ z))) /* x ? y : z */ macro
106 ROUND(aa, bb, cc, dd, F2, K2, in[7], 7); in rmd256_transform()
107 ROUND(dd, aa, bb, cc, F2, K2, in[4], 6); in rmd256_transform()
108 ROUND(cc, dd, aa, bb, F2, K2, in[13], 8); in rmd256_transform()
109 ROUND(bb, cc, dd, aa, F2, K2, in[1], 13); in rmd256_transform()
110 ROUND(aa, bb, cc, dd, F2, K2, in[10], 11); in rmd256_transform()
111 ROUND(dd, aa, bb, cc, F2, K2, in[6], 9); in rmd256_transform()
112 ROUND(cc, dd, aa, bb, F2, K2, in[15], 7); in rmd256_transform()
113 ROUND(bb, cc, dd, aa, F2, K2, in[3], 15); in rmd256_transform()
114 ROUND(aa, bb, cc, dd, F2, K2, in[12], 7); in rmd256_transform()
[all …]
Drmd128.c41 #define F2(x, y, z) (z ^ (x & (y ^ z))) /* x ? y : z */ macro
85 ROUND(aa, bb, cc, dd, F2, K2, in[7], 7); in rmd128_transform()
86 ROUND(dd, aa, bb, cc, F2, K2, in[4], 6); in rmd128_transform()
87 ROUND(cc, dd, aa, bb, F2, K2, in[13], 8); in rmd128_transform()
88 ROUND(bb, cc, dd, aa, F2, K2, in[1], 13); in rmd128_transform()
89 ROUND(aa, bb, cc, dd, F2, K2, in[10], 11); in rmd128_transform()
90 ROUND(dd, aa, bb, cc, F2, K2, in[6], 9); in rmd128_transform()
91 ROUND(cc, dd, aa, bb, F2, K2, in[15], 7); in rmd128_transform()
92 ROUND(bb, cc, dd, aa, F2, K2, in[3], 15); in rmd128_transform()
93 ROUND(aa, bb, cc, dd, F2, K2, in[12], 7); in rmd128_transform()
[all …]
Dmd5.c31 #define F2(x, y, z) F1(z, x, y) macro
70 MD5STEP(F2, a, b, c, d, in[1] + 0xf61e2562, 5); in md5_transform()
71 MD5STEP(F2, d, a, b, c, in[6] + 0xc040b340, 9); in md5_transform()
72 MD5STEP(F2, c, d, a, b, in[11] + 0x265e5a51, 14); in md5_transform()
73 MD5STEP(F2, b, c, d, a, in[0] + 0xe9b6c7aa, 20); in md5_transform()
74 MD5STEP(F2, a, b, c, d, in[5] + 0xd62f105d, 5); in md5_transform()
75 MD5STEP(F2, d, a, b, c, in[10] + 0x02441453, 9); in md5_transform()
76 MD5STEP(F2, c, d, a, b, in[15] + 0xd8a1e681, 14); in md5_transform()
77 MD5STEP(F2, b, c, d, a, in[4] + 0xe7d3fbc8, 20); in md5_transform()
78 MD5STEP(F2, a, b, c, d, in[9] + 0x21e1cde6, 5); in md5_transform()
[all …]
Drmd160.c43 #define F2(x, y, z) (z ^ (x & (y ^ z))) /* x ? y : z */ macro
91 ROUND(ee, aa, bb, cc, dd, F2, K2, in[7], 7); in rmd160_transform()
92 ROUND(dd, ee, aa, bb, cc, F2, K2, in[4], 6); in rmd160_transform()
93 ROUND(cc, dd, ee, aa, bb, F2, K2, in[13], 8); in rmd160_transform()
94 ROUND(bb, cc, dd, ee, aa, F2, K2, in[1], 13); in rmd160_transform()
95 ROUND(aa, bb, cc, dd, ee, F2, K2, in[10], 11); in rmd160_transform()
96 ROUND(ee, aa, bb, cc, dd, F2, K2, in[6], 9); in rmd160_transform()
97 ROUND(dd, ee, aa, bb, cc, F2, K2, in[15], 7); in rmd160_transform()
98 ROUND(cc, dd, ee, aa, bb, F2, K2, in[3], 15); in rmd160_transform()
99 ROUND(bb, cc, dd, ee, aa, F2, K2, in[12], 7); in rmd160_transform()
[all …]
Drmd320.c43 #define F2(x, y, z) (z ^ (x & (y ^ z))) /* x ? y : z */ macro
112 ROUND(ee, aa, bb, cc, dd, F2, K2, in[7], 7); in rmd320_transform()
113 ROUND(dd, ee, aa, bb, cc, F2, K2, in[4], 6); in rmd320_transform()
114 ROUND(cc, dd, ee, aa, bb, F2, K2, in[13], 8); in rmd320_transform()
115 ROUND(bb, cc, dd, ee, aa, F2, K2, in[1], 13); in rmd320_transform()
116 ROUND(aa, bb, cc, dd, ee, F2, K2, in[10], 11); in rmd320_transform()
117 ROUND(ee, aa, bb, cc, dd, F2, K2, in[6], 9); in rmd320_transform()
118 ROUND(dd, ee, aa, bb, cc, F2, K2, in[15], 7); in rmd320_transform()
119 ROUND(cc, dd, ee, aa, bb, F2, K2, in[3], 15); in rmd320_transform()
120 ROUND(bb, cc, dd, ee, aa, F2, K2, in[12], 7); in rmd320_transform()
[all …]
Dcast5.c574 #define F2(D,m,r) ( (I = ((m) ^ (D))), (I=rol32(I,(r))), \ macro
609 t = l; l = r; r = t ^ F2(r, Km[1], Kr[1]); in cast5_encrypt()
612 t = l; l = r; r = t ^ F2(r, Km[4], Kr[4]); in cast5_encrypt()
615 t = l; l = r; r = t ^ F2(r, Km[7], Kr[7]); in cast5_encrypt()
618 t = l; l = r; r = t ^ F2(r, Km[10], Kr[10]); in cast5_encrypt()
621 t = l; l = r; r = t ^ F2(r, Km[13], Kr[13]); in cast5_encrypt()
626 t = l; l = r; r = t ^ F2(r, Km[1], Kr[1]); in cast5_encrypt()
629 t = l; l = r; r = t ^ F2(r, Km[4], Kr[4]); in cast5_encrypt()
632 t = l; l = r; r = t ^ F2(r, Km[7], Kr[7]); in cast5_encrypt()
635 t = l; l = r; r = t ^ F2(r, Km[10], Kr[10]); in cast5_encrypt()
[all …]
Dcast6.c40 #define F2(D,r,m) ( (I = ((m) ^ (D))), (I=rol32(I,(r))), \ macro
375 key[5] ^= F2(key[6], Tr[i % 4][1], Tm[i][1]); in W()
378 key[2] ^= F2(key[3], Tr[i % 4][4], Tm[i][4]); in W()
381 key[7] ^= F2(key[0], Tr[i % 4][7], Tm[i][7]); in W()
434 block[1] ^= F2(block[2], Kr[1], Km[1]); in Q()
444 block[1] ^= F2(block[2], Kr[1], Km[1]); in QBAR()