/crypto/ |
D | gf128mul.c | 269 int i, j, k; in gf128mul_init_64k_lle() local 285 for (j = 64; j > 0; j >>= 1) in gf128mul_init_64k_lle() 286 gf128mul_x_lle(&t->t[0]->t[j], &t->t[0]->t[j + j]); in gf128mul_init_64k_lle() 289 for (j = 2; j < 256; j += j) in gf128mul_init_64k_lle() 290 for (k = 1; k < j; ++k) in gf128mul_init_64k_lle() 291 be128_xor(&t->t[i]->t[j + k], in gf128mul_init_64k_lle() 292 &t->t[i]->t[j], &t->t[i]->t[k]); in gf128mul_init_64k_lle() 297 for (j = 128; j > 0; j >>= 1) { in gf128mul_init_64k_lle() 298 t->t[i]->t[j] = t->t[i - 1]->t[j]; in gf128mul_init_64k_lle() 299 gf128mul_x8_lle(&t->t[i]->t[j]); in gf128mul_init_64k_lle() [all …]
|
D | twofish_common.c | 543 #define CALC_K_2(a, b, c, d, j) \ argument 544 mds[0][q0[a ^ key[(j) + 8]] ^ key[j]] \ 545 ^ mds[1][q0[b ^ key[(j) + 9]] ^ key[(j) + 1]] \ 546 ^ mds[2][q1[c ^ key[(j) + 10]] ^ key[(j) + 2]] \ 547 ^ mds[3][q1[d ^ key[(j) + 11]] ^ key[(j) + 3]] 549 #define CALC_K(a, j, k, l, m, n) \ argument 553 x += y; y += x; ctx->a[j] = x; \ 554 ctx->a[(j) + 1] = rol32(y, 9) 556 #define CALC_K192_2(a, b, c, d, j) \ argument 557 CALC_K_2 (q0[a ^ key[(j) + 16]], \ [all …]
|
D | blowfish_common.c | 354 short i, j, count; in blowfish_setkey() local 359 for (j = 0; j < 4; j++, count++) in blowfish_setkey() 367 for (j = 0, i = 0; i < 16 + 2; i++) { in blowfish_setkey() 368 temp = (((u32)key[j] << 24) | in blowfish_setkey() 369 ((u32)key[(j + 1) % keylen] << 16) | in blowfish_setkey() 370 ((u32)key[(j + 2) % keylen] << 8) | in blowfish_setkey() 371 ((u32)key[(j + 3) % keylen])); in blowfish_setkey() 374 j = (j + 4) % keylen; in blowfish_setkey() 388 for (j = 0, count = i * 256; j < 256; j += 2, count += 2) { in blowfish_setkey()
|
D | anubis.c | 535 int j = i; in anubis_setkey() local 536 inter[i] = T0[(kappa[j--] >> 24) ]; in anubis_setkey() 537 if (j < 0) in anubis_setkey() 538 j = N - 1; in anubis_setkey() 539 inter[i] ^= T1[(kappa[j--] >> 16) & 0xff]; in anubis_setkey() 540 if (j < 0) in anubis_setkey() 541 j = N - 1; in anubis_setkey() 542 inter[i] ^= T2[(kappa[j--] >> 8) & 0xff]; in anubis_setkey() 543 if (j < 0) in anubis_setkey() 544 j = N - 1; in anubis_setkey() [all …]
|
D | testmgr.c | 191 unsigned int i, j, k, temp; in test_hash() local 214 j = 0; in test_hash() 219 j++; in test_hash() 233 "test %d for %s: ret=%d\n", j, algo, in test_hash() 245 "for %s: ret=%d\n", j, algo, -ret); in test_hash() 253 "for %s: ret=%d\n", j, algo, -ret); in test_hash() 260 "for %s: ret=%d\n", j, algo, -ret); in test_hash() 267 "for %s: ret=%d\n", j, algo, -ret); in test_hash() 275 j, algo); in test_hash() 282 j = 0; in test_hash() [all …]
|
D | sha512_generic.c | 94 int j; in sha512_transform() local 98 for (j = 0; j < 16; j++) in sha512_transform() 99 LOAD_OP(i + j, W, input); in sha512_transform() 101 for (j = 0; j < 16; j++) { in sha512_transform() 102 BLEND_OP(i + j, W); in sha512_transform()
|
D | arc4.c | 33 int i, j = 0, k = 0; in arc4_set_key() local 43 j = (j + in_key[k] + a) & 0xff; in arc4_set_key() 44 ctx->S[i] = ctx->S[j]; in arc4_set_key() 45 ctx->S[j] = a; in arc4_set_key()
|
D | tcrypt.c | 146 unsigned int ret, i, j, iv_len; in test_cipher_speed() local 192 for (j = 0; j < tcount; j++) { in test_cipher_speed() 193 if (template[j].klen == *keysize) { in test_cipher_speed() 194 key = template[j].key; in test_cipher_speed() 209 for (j = 1; j < TVMEMSIZE; j++) { in test_cipher_speed() 210 sg_set_buf(sg + j, tvmem[j], PAGE_SIZE); in test_cipher_speed() 211 memset (tvmem[j], 0xff, PAGE_SIZE); in test_cipher_speed() 806 unsigned int ret, i, j, k, iv_len; in test_acipher_speed() local 863 for (j = 0; j < tcount; j++) { in test_acipher_speed() 864 if (template[j].klen == *keysize) { in test_acipher_speed() [all …]
|
D | xor.c | 67 unsigned long now, j; in do_xor_speed() local 82 j = jiffies; in do_xor_speed() 84 while ((now = jiffies) == j) in do_xor_speed()
|
D | aes_generic.c | 1220 u32 i, t, u, v, w, j; in crypto_aes_expand_key() local 1264 j = key_len + 24 - (i & ~3) + (i & 3); in crypto_aes_expand_key() 1265 imix_col(ctx->key_dec[j], ctx->key_enc[i]); in crypto_aes_expand_key()
|
D | serpent_generic.c | 33 #define keyiter(a, b, c, d, i, j) \ argument 34 ({ b ^= d; b ^= c; b ^= a; b ^= PHI ^ i; b = rol32(b, 11); k[j] = b; })
|
/crypto/async_tx/ |
D | raid6test.c | 130 static int test_disks(int i, int j, int disks) in test_disks() argument 138 dataptrs[j] = recovj; in test_disks() 140 raid6_dual_recov(disks, PAGE_SIZE, i, j, dataptrs); in test_disks() 143 errb = memcmp(page_address(data[j]), page_address(recovj), PAGE_SIZE); in test_disks() 146 __func__, i, j, i, disk_type(i, disks), j, disk_type(j, disks), in test_disks() 150 dataptrs[j] = data[j]; in test_disks() 161 int i, j; in test() local 186 for (j = i+1; j < disks; j++) { in test() 188 err += test_disks(i, j, disks); in test()
|