| /crypto/ |
| D | aes_generic.c | 1300 #define f_rn(bo, bi, n, k) do { \ argument 1307 #define f_nround(bo, bi, k) do {\ argument 1315 #define f_rl(bo, bi, n, k) do { \ argument 1322 #define f_lround(bo, bi, k) do {\ argument 1372 #define i_rn(bo, bi, n, k) do { \ argument 1379 #define i_nround(bo, bi, k) do {\ argument 1387 #define i_rl(bo, bi, n, k) do { \ argument 1394 #define i_lround(bo, bi, k) do {\ argument
|
| D | speck.c | 35 static __always_inline void speck128_round(u64 *x, u64 *y, u64 k) in speck128_round() 44 static __always_inline void speck128_unround(u64 *x, u64 *y, u64 k) in speck128_unround() 97 u64 k; in crypto_speck128_setkey() local 147 static __always_inline void speck64_round(u32 *x, u32 *y, u32 k) in speck64_round() 156 static __always_inline void speck64_unround(u32 *x, u32 *y, u32 k) in speck64_unround() 209 u32 k; in crypto_speck64_setkey() local
|
| D | gf128mul.c | 333 int i, j, k; in gf128mul_init_64k_lle() local 375 int i, j, k; in gf128mul_init_64k_bbe() local 469 int j, k; in gf128mul_init_4k_lle() local 491 int j, k; in gf128mul_init_4k_bbe() local 513 int j, k; in gf128mul_init_4k_ble() local
|
| D | twofish_common.c | 549 #define CALC_K(a, j, k, l, m, n) \ argument 562 #define CALC_K192(a, j, k, l, m, n) \ argument 575 #define CALC_K256(a, j, k, l, m, n) \ argument 586 int i, j, k; in __twofish_setkey() local
|
| D | md4.c | 63 #define ROUND1(a,b,c,d,k,s) (a = lshift(a + F(b,c,d) + k, s)) argument 64 #define ROUND2(a,b,c,d,k,s) (a = lshift(a + G(b,c,d) + k + (u32)0x5A827999,s)) argument 65 #define ROUND3(a,b,c,d,k,s) (a = lshift(a + H(b,c,d) + k + (u32)0x6ED9EBA1,s)) argument
|
| D | fcrypt.c | 66 #define ror56_64(k, n) \ argument 311 u64 k; /* k holds all 56 non-parity bits */ in fcrypt_setkey() local
|
| D | cast5_generic.c | 412 static void key_schedule(u32 *x, u32 *z, u32 *k) in key_schedule() 493 u32 k[16]; in cast5_setkey() local
|
| D | ghash-generic.c | 37 be128 k; in ghash_setkey() local
|
| D | salsa20_generic.c | 107 static void salsa20_keysetup(struct salsa20_ctx *ctx, const u8 *k, u32 kbytes) in salsa20_keysetup()
|
| D | arc4.c | 33 int i, j = 0, k = 0; in arc4_set_key() local
|
| D | serpent_generic.c | 235 u32 *k = ctx->expkey; in __serpent_setkey() local 447 const u32 *k = ctx->expkey; in __serpent_encrypt() local 512 const u32 *k = ctx->expkey; in __serpent_decrypt() local
|
| D | des_generic.c | 631 unsigned long des_ekey(u32 *pe, const u8 *k) in des_ekey() 714 static void dkey(u32 *pe, const u8 *k) in dkey()
|
| D | rmd128.c | 45 #define ROUND(a, b, c, d, f, k, x, s) { \ argument
|
| D | rmd256.c | 45 #define ROUND(a, b, c, d, f, k, x, s) { \ argument
|
| D | testmgr.c | 206 unsigned int i, j, k, temp; in __test_hash() local 432 unsigned int i, j, k, n, temp; in __test_aead() local 855 unsigned int i, j, k; in test_cipher() local 932 unsigned int i, j, k, n, temp; in __test_skcipher() local
|
| D | rmd160.c | 48 #define ROUND(a, b, c, d, e, f, k, x, s) { \ argument
|
| D | rmd320.c | 48 #define ROUND(a, b, c, d, e, f, k, x, s) { \ argument
|
| D | tcrypt.c | 284 int k, rem; in sg_init_aead() local 1117 unsigned int ret, i, j, k, iv_len; in test_acipher_speed() local
|
| D | jitterentropy.c | 477 unsigned int k = 0; in jent_gen_entropy() local
|
| /crypto/asymmetric_keys/ |
| D | rsa.c | 163 static int RSA_verify(const u8 *H, const u8 *EM, size_t k, size_t hash_size, in RSA_verify() 220 size_t k; in RSA_verify_signature() local
|