/crypto/ |
D | des_generic.c | 617 #define DES_PC2(a, b, c, d) (T4(d) | T3(c) | T2(b) | T1(a)) argument 634 unsigned long a, b, c, d, w; in des_ekey() local 638 c = k[5]; c &= 0x0e; c <<= 4; c |= k[1] & 0x1e; c = pc1[c]; in des_ekey() 642 pe[15 * 2 + 0] = DES_PC2(a, b, c, d); d = rs[d]; in des_ekey() 643 pe[14 * 2 + 0] = DES_PC2(d, a, b, c); c = rs[c]; b = rs[b]; in des_ekey() 644 pe[13 * 2 + 0] = DES_PC2(b, c, d, a); a = rs[a]; d = rs[d]; in des_ekey() 645 pe[12 * 2 + 0] = DES_PC2(d, a, b, c); c = rs[c]; b = rs[b]; in des_ekey() 646 pe[11 * 2 + 0] = DES_PC2(b, c, d, a); a = rs[a]; d = rs[d]; in des_ekey() 647 pe[10 * 2 + 0] = DES_PC2(d, a, b, c); c = rs[c]; b = rs[b]; in des_ekey() 648 pe[ 9 * 2 + 0] = DES_PC2(b, c, d, a); a = rs[a]; d = rs[d]; in des_ekey() [all …]
|
D | md4.c | 63 #define ROUND1(a,b,c,d,k,s) (a = lshift(a + F(b,c,d) + k, s)) argument 64 #define ROUND2(a,b,c,d,k,s) (a = lshift(a + G(b,c,d) + k + (u32)0x5A827999,s)) argument 65 #define ROUND3(a,b,c,d,k,s) (a = lshift(a + H(b,c,d) + k + (u32)0x6ED9EBA1,s)) argument 86 u32 a, b, c, d; in md4_transform() local 90 c = hash[2]; in md4_transform() 93 ROUND1(a, b, c, d, in[0], 3); in md4_transform() 94 ROUND1(d, a, b, c, in[1], 7); in md4_transform() 95 ROUND1(c, d, a, b, in[2], 11); in md4_transform() 96 ROUND1(b, c, d, a, in[3], 19); in md4_transform() 97 ROUND1(a, b, c, d, in[4], 3); in md4_transform() [all …]
|
D | cast6_generic.c | 114 int __cast6_setkey(struct cast6_ctx *c, const u8 *in_key, in __cast6_setkey() argument 142 c->Kr[i][0] = key[0] & 0x1f; in __cast6_setkey() 143 c->Kr[i][1] = key[2] & 0x1f; in __cast6_setkey() 144 c->Kr[i][2] = key[4] & 0x1f; in __cast6_setkey() 145 c->Kr[i][3] = key[6] & 0x1f; in __cast6_setkey() 147 c->Km[i][0] = key[7]; in __cast6_setkey() 148 c->Km[i][1] = key[5]; in __cast6_setkey() 149 c->Km[i][2] = key[3]; in __cast6_setkey() 150 c->Km[i][3] = key[1]; in __cast6_setkey() 184 void __cast6_encrypt(struct cast6_ctx *c, u8 *outbuf, const u8 *inbuf) in __cast6_encrypt() argument [all …]
|
D | sha256_generic.c | 56 u32 a, b, c, d, e, f, g, h, t1, t2; in sha256_transform() local 69 a=state[0]; b=state[1]; c=state[2]; d=state[3]; in sha256_transform() 74 t2 = e0(a) + Maj(a,b,c); d+=t1; h=t1+t2; in sha256_transform() 76 t2 = e0(h) + Maj(h,a,b); c+=t1; g=t1+t2; in sha256_transform() 77 t1 = f + e1(c) + Ch(c,d,e) + 0xb5c0fbcf + W[ 2]; in sha256_transform() 79 t1 = e + e1(b) + Ch(b,c,d) + 0xe9b5dba5 + W[ 3]; in sha256_transform() 81 t1 = d + e1(a) + Ch(a,b,c) + 0x3956c25b + W[ 4]; in sha256_transform() 83 t1 = c + e1(h) + Ch(h,a,b) + 0x59f111f1 + W[ 5]; in sha256_transform() 84 t2 = e0(d) + Maj(d,e,f); g+=t1; c=t1+t2; in sha256_transform() 86 t2 = e0(c) + Maj(c,d,e); f+=t1; b=t1+t2; in sha256_transform() [all …]
|
D | tgr192.c | 38 u64 a, b, c; member 405 u64 c = *rc; in tgr192_round() local 407 c ^= x; in tgr192_round() 408 a -= sbox1[c & 0xff] ^ sbox2[(c >> 16) & 0xff] in tgr192_round() 409 ^ sbox3[(c >> 32) & 0xff] ^ sbox4[(c >> 48) & 0xff]; in tgr192_round() 410 b += sbox4[(c >> 8) & 0xff] ^ sbox3[(c >> 24) & 0xff] in tgr192_round() 411 ^ sbox2[(c >> 40) & 0xff] ^ sbox1[(c >> 56) & 0xff]; in tgr192_round() 416 *rc = c; in tgr192_round() 424 u64 c = *rc; in tgr192_pass() local 426 tgr192_round(&a, &b, &c, x[0], mul); in tgr192_pass() [all …]
|
D | twofish_generic.c | 67 #define ENCROUND(n, a, b, c, d) \ argument 70 (c) ^= x + ctx->k[2 * (n)]; \ 71 (c) = ror32((c), 1); \ 74 #define DECROUND(n, a, b, c, d) \ argument 79 (c) = rol32((c), 1); \ 80 (c) ^= (x + ctx->k[2 * (n)]) 86 ENCROUND (2 * (n), a, b, c, d); \ 87 ENCROUND (2 * (n) + 1, c, d, a, b) 90 DECROUND (2 * (n) + 1, c, d, a, b); \ 91 DECROUND (2 * (n), a, b, c, d) [all …]
|
D | sha512_generic.c | 83 u64 a, b, c, d, e, f, g, h, t1, t2; in sha512_transform() local 89 a=state[0]; b=state[1]; c=state[2]; d=state[3]; in sha512_transform() 109 t2 = e0(a) + Maj(a,b,c); d+=t1; h=t1+t2; in sha512_transform() 111 t2 = e0(h) + Maj(h,a,b); c+=t1; g=t1+t2; in sha512_transform() 112 t1 = f + e1(c) + Ch(c,d,e) + sha512_K[i+2] + W[(i & 15) + 2]; in sha512_transform() 114 t1 = e + e1(b) + Ch(b,c,d) + sha512_K[i+3] + W[(i & 15) + 3]; in sha512_transform() 116 t1 = d + e1(a) + Ch(a,b,c) + sha512_K[i+4] + W[(i & 15) + 4]; in sha512_transform() 118 t1 = c + e1(h) + Ch(h,a,b) + sha512_K[i+5] + W[(i & 15) + 5]; in sha512_transform() 119 t2 = e0(d) + Maj(d,e,f); g+=t1; c=t1+t2; in sha512_transform() 121 t2 = e0(c) + Maj(c,d,e); f+=t1; b=t1+t2; in sha512_transform() [all …]
|
D | cast5_generic.c | 311 void __cast5_encrypt(struct cast5_ctx *c, u8 *outbuf, const u8 *inbuf) in __cast5_encrypt() argument 320 Km = c->Km; in __cast5_encrypt() 321 Kr = c->Kr; in __cast5_encrypt() 349 if (!(c->rr)) { in __cast5_encrypt() 368 void __cast5_decrypt(struct cast5_ctx *c, u8 *outbuf, const u8 *inbuf) in __cast5_decrypt() argument 377 Km = c->Km; in __cast5_decrypt() 378 Kr = c->Kr; in __cast5_decrypt() 383 if (!(c->rr)) { in __cast5_decrypt() 489 struct cast5_ctx *c = crypto_tfm_ctx(tfm); in cast5_setkey() local 496 c->rr = key_len <= 10 ? 1 : 0; in cast5_setkey() [all …]
|
D | twofish_common.c | 482 #define CALC_S(a, b, c, d, i, w, x, y, z) \ argument 487 (c) ^= exp_to_poly[tmp + (y)]; \ 543 #define CALC_K_2(a, b, c, d, j) \ argument 546 ^ mds[2][q1[c ^ key[(j) + 10]] ^ key[(j) + 2]] \ 556 #define CALC_K192_2(a, b, c, d, j) \ argument 559 q0[c ^ key[(j) + 18]], \
|
D | algapi.c | 938 u8 c; in crypto_inc_byte() local 941 c = *--b + 1; in crypto_inc_byte() 942 *b = c; in crypto_inc_byte() 943 if (c) in crypto_inc_byte() 951 u32 c; in crypto_inc() local 954 c = be32_to_cpu(*--b) + 1; in crypto_inc() 955 *b = cpu_to_be32(c); in crypto_inc() 956 if (c) in crypto_inc()
|
D | khazad.c | 750 static const u64 c[KHAZAD_ROUNDS + 1] = { variable 779 c[r] ^ K2; in khazad_setkey()
|
D | fcrypt.c | 228 union lc4 { __be32 l; u8 c[4]; } u; \ 230 L ^= sbox0[u.c[0]] ^ sbox1[u.c[1]] ^ sbox2[u.c[2]] ^ sbox3[u.c[3]]; \
|
D | rmd160.c | 48 #define ROUND(a, b, c, d, e, f, k, x, s) { \ argument 49 (a) += f((b), (c), (d)) + le32_to_cpup(&(x)) + (k); \ 51 (c) = rol32((c), 10); \
|
D | rmd320.c | 48 #define ROUND(a, b, c, d, e, f, k, x, s) { \ argument 49 (a) += f((b), (c), (d)) + le32_to_cpup(&(x)) + (k); \ 51 (c) = rol32((c), 10); \
|
D | crypto_user.c | 491 struct netlink_dump_control c = { in crypto_user_rcv_msg() local 496 err = netlink_dump_start(crypto_nlsk, skb, nlh, &c); in crypto_user_rcv_msg()
|
D | gf128mul.c | 105 (i & 0x08 ? xx(04, 38) : 0) ^ (i & 0x04 ? xx(02, 1c) : 0) ^ \ 111 (i & 0x20 ? xx(38, 40) : 0) ^ (i & 0x10 ? xx(1c, 20) : 0) ^ \
|
D | rmd256.c | 45 #define ROUND(a, b, c, d, f, k, x, s) { \ argument 46 (a) += f((b), (c), (d)) + le32_to_cpup(&(x)) + (k); \
|
D | rmd128.c | 45 #define ROUND(a, b, c, d, f, k, x, s) { \ argument 46 (a) += f((b), (c), (d)) + le32_to_cpup(&(x)) + (k); \
|
D | serpent_generic.c | 33 #define keyiter(a, b, c, d, i, j) \ argument 34 ({ b ^= d; b ^= c; b ^= a; b ^= PHI ^ i; b = rol32(b, 11); k[j] = b; })
|
D | Kconfig | 920 generic c and the assembler implementations. 1039 generic c and the assembler implementations. 1328 generic c and the assembler implementations.
|
/crypto/asymmetric_keys/ |
D | Makefile | 23 $(obj)/x509-asn1.o: $(obj)/x509-asn1.c $(obj)/x509-asn1.h 24 $(obj)/x509_rsakey-asn1.o: $(obj)/x509_rsakey-asn1.c $(obj)/x509_rsakey-asn1.h 26 clean-files += x509-asn1.c x509-asn1.h 27 clean-files += x509_rsakey-asn1.c x509_rsakey-asn1.h 40 $(obj)/pkcs7-asn1.o: $(obj)/pkcs7-asn1.c $(obj)/pkcs7-asn1.h 42 clean-files += pkcs7-asn1.c pkcs7-asn1.h 62 $(obj)/mscode-asn1.o: $(obj)/mscode-asn1.c $(obj)/mscode-asn1.h 64 clean-files += mscode-asn1.c mscode-asn1.h
|
/crypto/async_tx/ |
D | async_raid6_recov.c | 41 u8 *a, *b, *c; in async_sum_product() local 85 c = page_address(dest); in async_sum_product() 90 *c++ = ax ^ bx; in async_sum_product()
|