/crypto/ |
D | serpent_generic.c | 34 ({ b ^= d; b ^= c; b ^= a; b ^= PHI ^ i; b = rol32(b, 11); k[j] = b; }) 37 ({ x0 = k[i]; x1 = k[i+1]; x2 = k[i+2]; x3 = k[i+3]; }) 40 ({ k[i] = x0; k[i+1] = x1; k[i+2] = x2; k[i+3] = x3; }) 46 x3 ^= k[4*(i)+3]; x2 ^= k[4*(i)+2]; \ 47 x1 ^= k[4*(i)+1]; x0 ^= k[4*(i)+0]; \ 57 x0 ^= x3; x2 ^= x4; x3 ^= k[4*i+3]; \ 58 x1 ^= k[4*i+1]; x0 = rol32(x0, 5); x2 = rol32(x2, 22);\ 59 x0 ^= k[4*i+0]; x2 ^= k[4*i+2]; \ 63 x0 ^= k[4*i+0]; x1 ^= k[4*i+1]; x2 ^= k[4*i+2]; \ 64 x3 ^= k[4*i+3]; x0 = ror32(x0, 5); x2 = ror32(x2, 22);\ [all …]
|
D | aes_generic.c | 1300 #define f_rn(bo, bi, n, k) do { \ argument 1304 crypto_ft_tab[3][byte(bi[(n + 3) & 3], 3)] ^ *(k + n); \ 1307 #define f_nround(bo, bi, k) do {\ argument 1308 f_rn(bo, bi, 0, k); \ 1309 f_rn(bo, bi, 1, k); \ 1310 f_rn(bo, bi, 2, k); \ 1311 f_rn(bo, bi, 3, k); \ 1312 k += 4; \ 1315 #define f_rl(bo, bi, n, k) do { \ argument 1319 crypto_fl_tab[3][byte(bi[(n + 3) & 3], 3)] ^ *(k + n); \ [all …]
|
D | fcrypt.c | 66 #define ror56_64(k, n) \ argument 68 k = (k >> n) | ((k & ((1 << n) - 1)) << (56 - n)); \ 311 u64 k; /* k holds all 56 non-parity bits */ in fcrypt_setkey() local 314 k = (*key++) >> 1; in fcrypt_setkey() 315 k <<= 7; in fcrypt_setkey() 316 k |= (*key++) >> 1; in fcrypt_setkey() 317 k <<= 7; in fcrypt_setkey() 318 k |= (*key++) >> 1; in fcrypt_setkey() 319 k <<= 7; in fcrypt_setkey() 320 k |= (*key++) >> 1; in fcrypt_setkey() [all …]
|
D | twofish_common.c | 549 #define CALC_K(a, j, k, l, m, n) \ argument 550 x = CALC_K_2 (k, l, k, l, 0); \ 562 #define CALC_K192(a, j, k, l, m, n) \ argument 563 x = CALC_K192_2 (l, l, k, k, 0); \ 575 #define CALC_K256(a, j, k, l, m, n) \ argument 576 x = CALC_K256_2 (k, l, 0); \ 586 int i, j, k; in __twofish_setkey() local 651 for ( i = j = 0, k = 1; i < 256; i++, j += 2, k += 2 ) { in __twofish_setkey() 652 CALC_SB256_2( i, calc_sb_tbl[j], calc_sb_tbl[k] ); in __twofish_setkey() 669 CALC_K256 (k, i, q0[i+8], q1[i+8], q0[i+9], q1[i+9]); in __twofish_setkey() [all …]
|
D | testmgr.c | 197 unsigned int i, j, k, temp; in __test_hash() local 317 for (k = 0; k < template[i].np; k++) { in __test_hash() 318 if (WARN_ON(offset_in_page(IDX[k]) + in __test_hash() 319 template[i].tap[k] > PAGE_SIZE)) in __test_hash() 321 sg_set_buf(&sg[k], in __test_hash() 322 memcpy(xbuf[IDX[k] >> PAGE_SHIFT] + in __test_hash() 323 offset_in_page(IDX[k]), in __test_hash() 325 template[i].tap[k]), in __test_hash() 326 template[i].tap[k]); in __test_hash() 327 temp += template[i].tap[k]; in __test_hash() [all …]
|
D | gf128mul.c | 269 int i, j, k; in gf128mul_init_64k_lle() local 290 for (k = 1; k < j; ++k) in gf128mul_init_64k_lle() 291 be128_xor(&t->t[i]->t[j + k], in gf128mul_init_64k_lle() 292 &t->t[i]->t[j], &t->t[i]->t[k]); in gf128mul_init_64k_lle() 311 int i, j, k; in gf128mul_init_64k_bbe() local 332 for (k = 1; k < j; ++k) in gf128mul_init_64k_bbe() 333 be128_xor(&t->t[i]->t[j + k], in gf128mul_init_64k_bbe() 334 &t->t[i]->t[j], &t->t[i]->t[k]); in gf128mul_init_64k_bbe() 405 int j, k; in gf128mul_init_4k_lle() local 416 for (k = 1; k < j; ++k) in gf128mul_init_4k_lle() [all …]
|
D | cast5_generic.c | 412 static void key_schedule(u32 *x, u32 *z, u32 *k) in key_schedule() argument 426 k[0] = s5[zi(8)] ^ s6[zi(9)] ^ s7[zi(7)] ^ sb8[zi(6)] ^ s5[zi(2)]; in key_schedule() 427 k[1] = s5[zi(10)] ^ s6[zi(11)] ^ s7[zi(5)] ^ sb8[zi(4)] ^ in key_schedule() 429 k[2] = s5[zi(12)] ^ s6[zi(13)] ^ s7[zi(3)] ^ sb8[zi(2)] ^ in key_schedule() 431 k[3] = s5[zi(14)] ^ s6[zi(15)] ^ s7[zi(1)] ^ sb8[zi(0)] ^ in key_schedule() 442 k[4] = s5[xi(3)] ^ s6[xi(2)] ^ s7[xi(12)] ^ sb8[xi(13)] ^ in key_schedule() 444 k[5] = s5[xi(1)] ^ s6[xi(0)] ^ s7[xi(14)] ^ sb8[xi(15)] ^ in key_schedule() 446 k[6] = s5[xi(7)] ^ s6[xi(6)] ^ s7[xi(8)] ^ sb8[xi(9)] ^ s7[xi(3)]; in key_schedule() 447 k[7] = s5[xi(5)] ^ s6[xi(4)] ^ s7[xi(10)] ^ sb8[xi(11)] ^ in key_schedule() 458 k[8] = s5[zi(3)] ^ s6[zi(2)] ^ s7[zi(12)] ^ sb8[zi(13)] ^ in key_schedule() [all …]
|
D | des_generic.c | 631 unsigned long des_ekey(u32 *pe, const u8 *k) in des_ekey() argument 637 d = k[4]; d &= 0x0e; d <<= 4; d |= k[0] & 0x1e; d = pc1[d]; in des_ekey() 638 c = k[5]; c &= 0x0e; c <<= 4; c |= k[1] & 0x1e; c = pc1[c]; in des_ekey() 639 b = k[6]; b &= 0x0e; b <<= 4; b |= k[2] & 0x1e; b = pc1[b]; in des_ekey() 640 a = k[7]; a &= 0x0e; a <<= 4; a |= k[3] & 0x1e; a = pc1[a]; in des_ekey() 665 d = k[0]; d &= 0xe0; d >>= 4; d |= k[4] & 0xf0; d = pc1[d + 1]; in des_ekey() 666 c = k[1]; c &= 0xe0; c >>= 4; c |= k[5] & 0xf0; c = pc1[c + 1]; in des_ekey() 667 b = k[2]; b &= 0xe0; b >>= 4; b |= k[6] & 0xf0; b = pc1[b + 1]; in des_ekey() 668 a = k[3]; a &= 0xe0; a >>= 4; a |= k[7] & 0xf0; a = pc1[a + 1]; in des_ekey() 714 static void dkey(u32 *pe, const u8 *k) in dkey() argument [all …]
|
D | salsa20_generic.c | 107 static void salsa20_keysetup(struct salsa20_ctx *ctx, const u8 *k, u32 kbytes) in salsa20_keysetup() argument 111 ctx->input[1] = U8TO32_LITTLE(k + 0); in salsa20_keysetup() 112 ctx->input[2] = U8TO32_LITTLE(k + 4); in salsa20_keysetup() 113 ctx->input[3] = U8TO32_LITTLE(k + 8); in salsa20_keysetup() 114 ctx->input[4] = U8TO32_LITTLE(k + 12); in salsa20_keysetup() 116 k += 16; in salsa20_keysetup() 121 ctx->input[11] = U8TO32_LITTLE(k + 0); in salsa20_keysetup() 122 ctx->input[12] = U8TO32_LITTLE(k + 4); in salsa20_keysetup() 123 ctx->input[13] = U8TO32_LITTLE(k + 8); in salsa20_keysetup() 124 ctx->input[14] = U8TO32_LITTLE(k + 12); in salsa20_keysetup()
|
D | arc4.c | 33 int i, j = 0, k = 0; in arc4_set_key() local 43 j = (j + in_key[k] + a) & 0xff; in arc4_set_key() 46 if (++k >= key_len) in arc4_set_key() 47 k = 0; in arc4_set_key()
|
D | twofish_generic.c | 69 x += y; y += x + ctx->k[2 * (n) + 1]; \ 70 (c) ^= x + ctx->k[2 * (n)]; \ 77 (d) ^= y + ctx->k[2 * (n) + 1]; \ 80 (c) ^= (x + ctx->k[2 * (n)])
|
D | md4.c | 63 #define ROUND1(a,b,c,d,k,s) (a = lshift(a + F(b,c,d) + k, s)) argument 64 #define ROUND2(a,b,c,d,k,s) (a = lshift(a + G(b,c,d) + k + (u32)0x5A827999,s)) argument 65 #define ROUND3(a,b,c,d,k,s) (a = lshift(a + H(b,c,d) + k + (u32)0x6ED9EBA1,s)) argument
|
D | tcrypt.c | 251 int k, rem; in sg_init_aead() local 260 for (k = 0; k < np; ++k) { in sg_init_aead() 261 if (k == (np-1)) in sg_init_aead() 262 sg_set_buf(&sg[k], xbuf[k], rem); in sg_init_aead() 264 sg_set_buf(&sg[k], xbuf[k], PAGE_SIZE); in sg_init_aead() 1081 unsigned int ret, i, j, k, iv_len; in test_acipher_speed() local 1157 k = *keysize + *b_size; in test_acipher_speed() 1158 if (k > PAGE_SIZE) { in test_acipher_speed() 1161 k -= PAGE_SIZE; in test_acipher_speed() 1163 while (k > PAGE_SIZE) { in test_acipher_speed() [all …]
|
D | rmd256.c | 45 #define ROUND(a, b, c, d, f, k, x, s) { \ argument 46 (a) += f((b), (c), (d)) + le32_to_cpup(&(x)) + (k); \
|
D | rmd128.c | 45 #define ROUND(a, b, c, d, f, k, x, s) { \ argument 46 (a) += f((b), (c), (d)) + le32_to_cpup(&(x)) + (k); \
|
D | rmd160.c | 48 #define ROUND(a, b, c, d, e, f, k, x, s) { \ argument 49 (a) += f((b), (c), (d)) + le32_to_cpup(&(x)) + (k); \
|
D | rmd320.c | 48 #define ROUND(a, b, c, d, e, f, k, x, s) { \ argument 49 (a) += f((b), (c), (d)) + le32_to_cpup(&(x)) + (k); \
|
/crypto/asymmetric_keys/ |
D | rsa.c | 163 static int RSA_verify(const u8 *H, const u8 *EM, size_t k, size_t hash_size, in RSA_verify() argument 168 kenter(",,%zu,%zu,%zu", k, hash_size, asn1_size); in RSA_verify() 170 if (k < 2 + 1 + asn1_size + hash_size) in RSA_verify() 179 T_offset = k - (asn1_size + hash_size); in RSA_verify() 220 size_t k; in RSA_verify_signature() local 228 k = mpi_get_nbits(key->rsa.n); in RSA_verify_signature() 236 pr_devel("step 1: k=%zu size(S)=%zu\n", k, tsize); in RSA_verify_signature() 237 if (k < tsize) { in RSA_verify_signature() 243 k = (k + 7) / 8; in RSA_verify_signature() 256 ret = RSA_I2OSP(m, k, &EM); in RSA_verify_signature() [all …]
|