Home
last modified time | relevance | path

Searched refs:c (Results 1 – 22 of 22) sorted by relevance

/crypto/
Ddes_generic.c617 #define DES_PC2(a, b, c, d) (T4(d) | T3(c) | T2(b) | T1(a)) argument
634 unsigned long a, b, c, d, w; in des_ekey() local
638 c = k[5]; c &= 0x0e; c <<= 4; c |= k[1] & 0x1e; c = pc1[c]; in des_ekey()
642 pe[15 * 2 + 0] = DES_PC2(a, b, c, d); d = rs[d]; in des_ekey()
643 pe[14 * 2 + 0] = DES_PC2(d, a, b, c); c = rs[c]; b = rs[b]; in des_ekey()
644 pe[13 * 2 + 0] = DES_PC2(b, c, d, a); a = rs[a]; d = rs[d]; in des_ekey()
645 pe[12 * 2 + 0] = DES_PC2(d, a, b, c); c = rs[c]; b = rs[b]; in des_ekey()
646 pe[11 * 2 + 0] = DES_PC2(b, c, d, a); a = rs[a]; d = rs[d]; in des_ekey()
647 pe[10 * 2 + 0] = DES_PC2(d, a, b, c); c = rs[c]; b = rs[b]; in des_ekey()
648 pe[ 9 * 2 + 0] = DES_PC2(b, c, d, a); a = rs[a]; d = rs[d]; in des_ekey()
[all …]
Dmd4.c63 #define ROUND1(a,b,c,d,k,s) (a = lshift(a + F(b,c,d) + k, s)) argument
64 #define ROUND2(a,b,c,d,k,s) (a = lshift(a + G(b,c,d) + k + (u32)0x5A827999,s)) argument
65 #define ROUND3(a,b,c,d,k,s) (a = lshift(a + H(b,c,d) + k + (u32)0x6ED9EBA1,s)) argument
86 u32 a, b, c, d; in md4_transform() local
90 c = hash[2]; in md4_transform()
93 ROUND1(a, b, c, d, in[0], 3); in md4_transform()
94 ROUND1(d, a, b, c, in[1], 7); in md4_transform()
95 ROUND1(c, d, a, b, in[2], 11); in md4_transform()
96 ROUND1(b, c, d, a, in[3], 19); in md4_transform()
97 ROUND1(a, b, c, d, in[4], 3); in md4_transform()
[all …]
Dcast6_generic.c114 int __cast6_setkey(struct cast6_ctx *c, const u8 *in_key, in __cast6_setkey() argument
142 c->Kr[i][0] = key[0] & 0x1f; in __cast6_setkey()
143 c->Kr[i][1] = key[2] & 0x1f; in __cast6_setkey()
144 c->Kr[i][2] = key[4] & 0x1f; in __cast6_setkey()
145 c->Kr[i][3] = key[6] & 0x1f; in __cast6_setkey()
147 c->Km[i][0] = key[7]; in __cast6_setkey()
148 c->Km[i][1] = key[5]; in __cast6_setkey()
149 c->Km[i][2] = key[3]; in __cast6_setkey()
150 c->Km[i][3] = key[1]; in __cast6_setkey()
184 void __cast6_encrypt(struct cast6_ctx *c, u8 *outbuf, const u8 *inbuf) in __cast6_encrypt() argument
[all …]
Dsha256_generic.c56 u32 a, b, c, d, e, f, g, h, t1, t2; in sha256_transform() local
69 a=state[0]; b=state[1]; c=state[2]; d=state[3]; in sha256_transform()
74 t2 = e0(a) + Maj(a,b,c); d+=t1; h=t1+t2; in sha256_transform()
76 t2 = e0(h) + Maj(h,a,b); c+=t1; g=t1+t2; in sha256_transform()
77 t1 = f + e1(c) + Ch(c,d,e) + 0xb5c0fbcf + W[ 2]; in sha256_transform()
79 t1 = e + e1(b) + Ch(b,c,d) + 0xe9b5dba5 + W[ 3]; in sha256_transform()
81 t1 = d + e1(a) + Ch(a,b,c) + 0x3956c25b + W[ 4]; in sha256_transform()
83 t1 = c + e1(h) + Ch(h,a,b) + 0x59f111f1 + W[ 5]; in sha256_transform()
84 t2 = e0(d) + Maj(d,e,f); g+=t1; c=t1+t2; in sha256_transform()
86 t2 = e0(c) + Maj(c,d,e); f+=t1; b=t1+t2; in sha256_transform()
[all …]
Dtgr192.c38 u64 a, b, c; member
405 u64 c = *rc; in tgr192_round() local
407 c ^= x; in tgr192_round()
408 a -= sbox1[c & 0xff] ^ sbox2[(c >> 16) & 0xff] in tgr192_round()
409 ^ sbox3[(c >> 32) & 0xff] ^ sbox4[(c >> 48) & 0xff]; in tgr192_round()
410 b += sbox4[(c >> 8) & 0xff] ^ sbox3[(c >> 24) & 0xff] in tgr192_round()
411 ^ sbox2[(c >> 40) & 0xff] ^ sbox1[(c >> 56) & 0xff]; in tgr192_round()
416 *rc = c; in tgr192_round()
424 u64 c = *rc; in tgr192_pass() local
426 tgr192_round(&a, &b, &c, x[0], mul); in tgr192_pass()
[all …]
Dtwofish_generic.c67 #define ENCROUND(n, a, b, c, d) \ argument
70 (c) ^= x + ctx->k[2 * (n)]; \
71 (c) = ror32((c), 1); \
74 #define DECROUND(n, a, b, c, d) \ argument
79 (c) = rol32((c), 1); \
80 (c) ^= (x + ctx->k[2 * (n)])
86 ENCROUND (2 * (n), a, b, c, d); \
87 ENCROUND (2 * (n) + 1, c, d, a, b)
90 DECROUND (2 * (n) + 1, c, d, a, b); \
91 DECROUND (2 * (n), a, b, c, d)
[all …]
Dsha512_generic.c83 u64 a, b, c, d, e, f, g, h, t1, t2; in sha512_transform() local
89 a=state[0]; b=state[1]; c=state[2]; d=state[3]; in sha512_transform()
109 t2 = e0(a) + Maj(a,b,c); d+=t1; h=t1+t2; in sha512_transform()
111 t2 = e0(h) + Maj(h,a,b); c+=t1; g=t1+t2; in sha512_transform()
112 t1 = f + e1(c) + Ch(c,d,e) + sha512_K[i+2] + W[(i & 15) + 2]; in sha512_transform()
114 t1 = e + e1(b) + Ch(b,c,d) + sha512_K[i+3] + W[(i & 15) + 3]; in sha512_transform()
116 t1 = d + e1(a) + Ch(a,b,c) + sha512_K[i+4] + W[(i & 15) + 4]; in sha512_transform()
118 t1 = c + e1(h) + Ch(h,a,b) + sha512_K[i+5] + W[(i & 15) + 5]; in sha512_transform()
119 t2 = e0(d) + Maj(d,e,f); g+=t1; c=t1+t2; in sha512_transform()
121 t2 = e0(c) + Maj(c,d,e); f+=t1; b=t1+t2; in sha512_transform()
[all …]
Dcast5_generic.c311 void __cast5_encrypt(struct cast5_ctx *c, u8 *outbuf, const u8 *inbuf) in __cast5_encrypt() argument
320 Km = c->Km; in __cast5_encrypt()
321 Kr = c->Kr; in __cast5_encrypt()
349 if (!(c->rr)) { in __cast5_encrypt()
368 void __cast5_decrypt(struct cast5_ctx *c, u8 *outbuf, const u8 *inbuf) in __cast5_decrypt() argument
377 Km = c->Km; in __cast5_decrypt()
378 Kr = c->Kr; in __cast5_decrypt()
383 if (!(c->rr)) { in __cast5_decrypt()
489 struct cast5_ctx *c = crypto_tfm_ctx(tfm); in cast5_setkey() local
496 c->rr = key_len <= 10 ? 1 : 0; in cast5_setkey()
[all …]
Dtwofish_common.c482 #define CALC_S(a, b, c, d, i, w, x, y, z) \ argument
487 (c) ^= exp_to_poly[tmp + (y)]; \
543 #define CALC_K_2(a, b, c, d, j) \ argument
546 ^ mds[2][q1[c ^ key[(j) + 10]] ^ key[(j) + 2]] \
556 #define CALC_K192_2(a, b, c, d, j) \ argument
559 q0[c ^ key[(j) + 18]], \
Dalgapi.c938 u8 c; in crypto_inc_byte() local
941 c = *--b + 1; in crypto_inc_byte()
942 *b = c; in crypto_inc_byte()
943 if (c) in crypto_inc_byte()
951 u32 c; in crypto_inc() local
954 c = be32_to_cpu(*--b) + 1; in crypto_inc()
955 *b = cpu_to_be32(c); in crypto_inc()
956 if (c) in crypto_inc()
Dkhazad.c750 static const u64 c[KHAZAD_ROUNDS + 1] = { variable
779 c[r] ^ K2; in khazad_setkey()
Dfcrypt.c228 union lc4 { __be32 l; u8 c[4]; } u; \
230 L ^= sbox0[u.c[0]] ^ sbox1[u.c[1]] ^ sbox2[u.c[2]] ^ sbox3[u.c[3]]; \
Drmd160.c48 #define ROUND(a, b, c, d, e, f, k, x, s) { \ argument
49 (a) += f((b), (c), (d)) + le32_to_cpup(&(x)) + (k); \
51 (c) = rol32((c), 10); \
Drmd320.c48 #define ROUND(a, b, c, d, e, f, k, x, s) { \ argument
49 (a) += f((b), (c), (d)) + le32_to_cpup(&(x)) + (k); \
51 (c) = rol32((c), 10); \
Dcrypto_user.c491 struct netlink_dump_control c = { in crypto_user_rcv_msg() local
496 err = netlink_dump_start(crypto_nlsk, skb, nlh, &c); in crypto_user_rcv_msg()
Dgf128mul.c105 (i & 0x08 ? xx(04, 38) : 0) ^ (i & 0x04 ? xx(02, 1c) : 0) ^ \
111 (i & 0x20 ? xx(38, 40) : 0) ^ (i & 0x10 ? xx(1c, 20) : 0) ^ \
Drmd256.c45 #define ROUND(a, b, c, d, f, k, x, s) { \ argument
46 (a) += f((b), (c), (d)) + le32_to_cpup(&(x)) + (k); \
Drmd128.c45 #define ROUND(a, b, c, d, f, k, x, s) { \ argument
46 (a) += f((b), (c), (d)) + le32_to_cpup(&(x)) + (k); \
Dserpent_generic.c33 #define keyiter(a, b, c, d, i, j) \ argument
34 ({ b ^= d; b ^= c; b ^= a; b ^= PHI ^ i; b = rol32(b, 11); k[j] = b; })
DKconfig920 generic c and the assembler implementations.
1039 generic c and the assembler implementations.
1328 generic c and the assembler implementations.
/crypto/asymmetric_keys/
DMakefile23 $(obj)/x509-asn1.o: $(obj)/x509-asn1.c $(obj)/x509-asn1.h
24 $(obj)/x509_rsakey-asn1.o: $(obj)/x509_rsakey-asn1.c $(obj)/x509_rsakey-asn1.h
26 clean-files += x509-asn1.c x509-asn1.h
27 clean-files += x509_rsakey-asn1.c x509_rsakey-asn1.h
40 $(obj)/pkcs7-asn1.o: $(obj)/pkcs7-asn1.c $(obj)/pkcs7-asn1.h
42 clean-files += pkcs7-asn1.c pkcs7-asn1.h
62 $(obj)/mscode-asn1.o: $(obj)/mscode-asn1.c $(obj)/mscode-asn1.h
64 clean-files += mscode-asn1.c mscode-asn1.h
/crypto/async_tx/
Dasync_raid6_recov.c41 u8 *a, *b, *c; in async_sum_product() local
85 c = page_address(dest); in async_sum_product()
90 *c++ = ax ^ bx; in async_sum_product()