Home
last modified time | relevance | path

Searched refs:k (Results 1 – 18 of 18) sorted by relevance

/crypto/
Dserpent_generic.c34 ({ b ^= d; b ^= c; b ^= a; b ^= PHI ^ i; b = rol32(b, 11); k[j] = b; })
37 ({ x0 = k[i]; x1 = k[i+1]; x2 = k[i+2]; x3 = k[i+3]; })
40 ({ k[i] = x0; k[i+1] = x1; k[i+2] = x2; k[i+3] = x3; })
46 x3 ^= k[4*(i)+3]; x2 ^= k[4*(i)+2]; \
47 x1 ^= k[4*(i)+1]; x0 ^= k[4*(i)+0]; \
57 x0 ^= x3; x2 ^= x4; x3 ^= k[4*i+3]; \
58 x1 ^= k[4*i+1]; x0 = rol32(x0, 5); x2 = rol32(x2, 22);\
59 x0 ^= k[4*i+0]; x2 ^= k[4*i+2]; \
63 x0 ^= k[4*i+0]; x1 ^= k[4*i+1]; x2 ^= k[4*i+2]; \
64 x3 ^= k[4*i+3]; x0 = ror32(x0, 5); x2 = ror32(x2, 22);\
[all …]
Daes_generic.c1300 #define f_rn(bo, bi, n, k) do { \ argument
1304 crypto_ft_tab[3][byte(bi[(n + 3) & 3], 3)] ^ *(k + n); \
1307 #define f_nround(bo, bi, k) do {\ argument
1308 f_rn(bo, bi, 0, k); \
1309 f_rn(bo, bi, 1, k); \
1310 f_rn(bo, bi, 2, k); \
1311 f_rn(bo, bi, 3, k); \
1312 k += 4; \
1315 #define f_rl(bo, bi, n, k) do { \ argument
1319 crypto_fl_tab[3][byte(bi[(n + 3) & 3], 3)] ^ *(k + n); \
[all …]
Dfcrypt.c66 #define ror56_64(k, n) \ argument
68 k = (k >> n) | ((k & ((1 << n) - 1)) << (56 - n)); \
311 u64 k; /* k holds all 56 non-parity bits */ in fcrypt_setkey() local
314 k = (*key++) >> 1; in fcrypt_setkey()
315 k <<= 7; in fcrypt_setkey()
316 k |= (*key++) >> 1; in fcrypt_setkey()
317 k <<= 7; in fcrypt_setkey()
318 k |= (*key++) >> 1; in fcrypt_setkey()
319 k <<= 7; in fcrypt_setkey()
320 k |= (*key++) >> 1; in fcrypt_setkey()
[all …]
Dtwofish_common.c549 #define CALC_K(a, j, k, l, m, n) \ argument
550 x = CALC_K_2 (k, l, k, l, 0); \
562 #define CALC_K192(a, j, k, l, m, n) \ argument
563 x = CALC_K192_2 (l, l, k, k, 0); \
575 #define CALC_K256(a, j, k, l, m, n) \ argument
576 x = CALC_K256_2 (k, l, 0); \
586 int i, j, k; in __twofish_setkey() local
651 for ( i = j = 0, k = 1; i < 256; i++, j += 2, k += 2 ) { in __twofish_setkey()
652 CALC_SB256_2( i, calc_sb_tbl[j], calc_sb_tbl[k] ); in __twofish_setkey()
669 CALC_K256 (k, i, q0[i+8], q1[i+8], q0[i+9], q1[i+9]); in __twofish_setkey()
[all …]
Dtestmgr.c197 unsigned int i, j, k, temp; in __test_hash() local
317 for (k = 0; k < template[i].np; k++) { in __test_hash()
318 if (WARN_ON(offset_in_page(IDX[k]) + in __test_hash()
319 template[i].tap[k] > PAGE_SIZE)) in __test_hash()
321 sg_set_buf(&sg[k], in __test_hash()
322 memcpy(xbuf[IDX[k] >> PAGE_SHIFT] + in __test_hash()
323 offset_in_page(IDX[k]), in __test_hash()
325 template[i].tap[k]), in __test_hash()
326 template[i].tap[k]); in __test_hash()
327 temp += template[i].tap[k]; in __test_hash()
[all …]
Dgf128mul.c269 int i, j, k; in gf128mul_init_64k_lle() local
290 for (k = 1; k < j; ++k) in gf128mul_init_64k_lle()
291 be128_xor(&t->t[i]->t[j + k], in gf128mul_init_64k_lle()
292 &t->t[i]->t[j], &t->t[i]->t[k]); in gf128mul_init_64k_lle()
311 int i, j, k; in gf128mul_init_64k_bbe() local
332 for (k = 1; k < j; ++k) in gf128mul_init_64k_bbe()
333 be128_xor(&t->t[i]->t[j + k], in gf128mul_init_64k_bbe()
334 &t->t[i]->t[j], &t->t[i]->t[k]); in gf128mul_init_64k_bbe()
405 int j, k; in gf128mul_init_4k_lle() local
416 for (k = 1; k < j; ++k) in gf128mul_init_4k_lle()
[all …]
Dcast5_generic.c412 static void key_schedule(u32 *x, u32 *z, u32 *k) in key_schedule() argument
426 k[0] = s5[zi(8)] ^ s6[zi(9)] ^ s7[zi(7)] ^ sb8[zi(6)] ^ s5[zi(2)]; in key_schedule()
427 k[1] = s5[zi(10)] ^ s6[zi(11)] ^ s7[zi(5)] ^ sb8[zi(4)] ^ in key_schedule()
429 k[2] = s5[zi(12)] ^ s6[zi(13)] ^ s7[zi(3)] ^ sb8[zi(2)] ^ in key_schedule()
431 k[3] = s5[zi(14)] ^ s6[zi(15)] ^ s7[zi(1)] ^ sb8[zi(0)] ^ in key_schedule()
442 k[4] = s5[xi(3)] ^ s6[xi(2)] ^ s7[xi(12)] ^ sb8[xi(13)] ^ in key_schedule()
444 k[5] = s5[xi(1)] ^ s6[xi(0)] ^ s7[xi(14)] ^ sb8[xi(15)] ^ in key_schedule()
446 k[6] = s5[xi(7)] ^ s6[xi(6)] ^ s7[xi(8)] ^ sb8[xi(9)] ^ s7[xi(3)]; in key_schedule()
447 k[7] = s5[xi(5)] ^ s6[xi(4)] ^ s7[xi(10)] ^ sb8[xi(11)] ^ in key_schedule()
458 k[8] = s5[zi(3)] ^ s6[zi(2)] ^ s7[zi(12)] ^ sb8[zi(13)] ^ in key_schedule()
[all …]
Ddes_generic.c631 unsigned long des_ekey(u32 *pe, const u8 *k) in des_ekey() argument
637 d = k[4]; d &= 0x0e; d <<= 4; d |= k[0] & 0x1e; d = pc1[d]; in des_ekey()
638 c = k[5]; c &= 0x0e; c <<= 4; c |= k[1] & 0x1e; c = pc1[c]; in des_ekey()
639 b = k[6]; b &= 0x0e; b <<= 4; b |= k[2] & 0x1e; b = pc1[b]; in des_ekey()
640 a = k[7]; a &= 0x0e; a <<= 4; a |= k[3] & 0x1e; a = pc1[a]; in des_ekey()
665 d = k[0]; d &= 0xe0; d >>= 4; d |= k[4] & 0xf0; d = pc1[d + 1]; in des_ekey()
666 c = k[1]; c &= 0xe0; c >>= 4; c |= k[5] & 0xf0; c = pc1[c + 1]; in des_ekey()
667 b = k[2]; b &= 0xe0; b >>= 4; b |= k[6] & 0xf0; b = pc1[b + 1]; in des_ekey()
668 a = k[3]; a &= 0xe0; a >>= 4; a |= k[7] & 0xf0; a = pc1[a + 1]; in des_ekey()
714 static void dkey(u32 *pe, const u8 *k) in dkey() argument
[all …]
Dsalsa20_generic.c107 static void salsa20_keysetup(struct salsa20_ctx *ctx, const u8 *k, u32 kbytes) in salsa20_keysetup() argument
111 ctx->input[1] = U8TO32_LITTLE(k + 0); in salsa20_keysetup()
112 ctx->input[2] = U8TO32_LITTLE(k + 4); in salsa20_keysetup()
113 ctx->input[3] = U8TO32_LITTLE(k + 8); in salsa20_keysetup()
114 ctx->input[4] = U8TO32_LITTLE(k + 12); in salsa20_keysetup()
116 k += 16; in salsa20_keysetup()
121 ctx->input[11] = U8TO32_LITTLE(k + 0); in salsa20_keysetup()
122 ctx->input[12] = U8TO32_LITTLE(k + 4); in salsa20_keysetup()
123 ctx->input[13] = U8TO32_LITTLE(k + 8); in salsa20_keysetup()
124 ctx->input[14] = U8TO32_LITTLE(k + 12); in salsa20_keysetup()
Darc4.c33 int i, j = 0, k = 0; in arc4_set_key() local
43 j = (j + in_key[k] + a) & 0xff; in arc4_set_key()
46 if (++k >= key_len) in arc4_set_key()
47 k = 0; in arc4_set_key()
Dtwofish_generic.c69 x += y; y += x + ctx->k[2 * (n) + 1]; \
70 (c) ^= x + ctx->k[2 * (n)]; \
77 (d) ^= y + ctx->k[2 * (n) + 1]; \
80 (c) ^= (x + ctx->k[2 * (n)])
Dmd4.c63 #define ROUND1(a,b,c,d,k,s) (a = lshift(a + F(b,c,d) + k, s)) argument
64 #define ROUND2(a,b,c,d,k,s) (a = lshift(a + G(b,c,d) + k + (u32)0x5A827999,s)) argument
65 #define ROUND3(a,b,c,d,k,s) (a = lshift(a + H(b,c,d) + k + (u32)0x6ED9EBA1,s)) argument
Dtcrypt.c251 int k, rem; in sg_init_aead() local
260 for (k = 0; k < np; ++k) { in sg_init_aead()
261 if (k == (np-1)) in sg_init_aead()
262 sg_set_buf(&sg[k], xbuf[k], rem); in sg_init_aead()
264 sg_set_buf(&sg[k], xbuf[k], PAGE_SIZE); in sg_init_aead()
1081 unsigned int ret, i, j, k, iv_len; in test_acipher_speed() local
1157 k = *keysize + *b_size; in test_acipher_speed()
1158 if (k > PAGE_SIZE) { in test_acipher_speed()
1161 k -= PAGE_SIZE; in test_acipher_speed()
1163 while (k > PAGE_SIZE) { in test_acipher_speed()
[all …]
Drmd256.c45 #define ROUND(a, b, c, d, f, k, x, s) { \ argument
46 (a) += f((b), (c), (d)) + le32_to_cpup(&(x)) + (k); \
Drmd128.c45 #define ROUND(a, b, c, d, f, k, x, s) { \ argument
46 (a) += f((b), (c), (d)) + le32_to_cpup(&(x)) + (k); \
Drmd160.c48 #define ROUND(a, b, c, d, e, f, k, x, s) { \ argument
49 (a) += f((b), (c), (d)) + le32_to_cpup(&(x)) + (k); \
Drmd320.c48 #define ROUND(a, b, c, d, e, f, k, x, s) { \ argument
49 (a) += f((b), (c), (d)) + le32_to_cpup(&(x)) + (k); \
/crypto/asymmetric_keys/
Drsa.c163 static int RSA_verify(const u8 *H, const u8 *EM, size_t k, size_t hash_size, in RSA_verify() argument
168 kenter(",,%zu,%zu,%zu", k, hash_size, asn1_size); in RSA_verify()
170 if (k < 2 + 1 + asn1_size + hash_size) in RSA_verify()
179 T_offset = k - (asn1_size + hash_size); in RSA_verify()
220 size_t k; in RSA_verify_signature() local
228 k = mpi_get_nbits(key->rsa.n); in RSA_verify_signature()
236 pr_devel("step 1: k=%zu size(S)=%zu\n", k, tsize); in RSA_verify_signature()
237 if (k < tsize) { in RSA_verify_signature()
243 k = (k + 7) / 8; in RSA_verify_signature()
256 ret = RSA_I2OSP(m, k, &EM); in RSA_verify_signature()
[all …]