Home
last modified time | relevance | path

Searched refs:v (Results 1 – 10 of 10) sorted by relevance

/crypto/
Decc.c563 u64 u[ndigits], v[ndigits]; in vli_mod_inv() local
576 vli_clear(v, ndigits); in vli_mod_inv()
593 if (!EVEN(v)) in vli_mod_inv()
594 carry = vli_add(v, v, mod, ndigits); in vli_mod_inv()
596 vli_rshift1(v, ndigits); in vli_mod_inv()
598 v[ndigits - 1] |= 0x8000000000000000ull; in vli_mod_inv()
603 if (vli_cmp(u, v, ndigits) < 0) in vli_mod_inv()
606 vli_sub(u, u, v, ndigits); in vli_mod_inv()
617 if (vli_cmp(v, u, ndigits) < 0) in vli_mod_inv()
618 vli_add(v, v, mod, ndigits); in vli_mod_inv()
[all …]
Dsalsa20_generic.c46 #define U32TO8_LITTLE(p, v) \ argument
47 { (p)[0] = (v >> 0) & 0xff; (p)[1] = (v >> 8) & 0xff; \
48 (p)[2] = (v >> 16) & 0xff; (p)[3] = (v >> 24) & 0xff; }
Danubis.c562 u32 v = ctx->E[R - r][i]; in anubis_setkey() local
564 T0[T4[(v >> 24) ] & 0xff] ^ in anubis_setkey()
565 T1[T4[(v >> 16) & 0xff] & 0xff] ^ in anubis_setkey()
566 T2[T4[(v >> 8) & 0xff] & 0xff] ^ in anubis_setkey()
567 T3[T4[(v ) & 0xff] & 0xff]; in anubis_setkey()
Dinternal.h103 int crypto_probing_notify(unsigned long val, void *v);
147 static inline void crypto_notify(unsigned long val, void *v) in crypto_notify() argument
149 blocking_notifier_call_chain(&crypto_chain, val, v); in crypto_notify()
Dpoly1305_generic.c26 static inline u32 sr(u64 v, u_char n) in sr() argument
28 return v >> n; in sr()
31 static inline u32 and(u32 v, u32 mask) in and() argument
33 return v & mask; in and()
Daes_generic.c1132 v = star_x(u); \
1133 w = star_x(v); \
1135 (y) = u ^ v ^ w; \
1137 ror32(v ^ t, 16) ^ \
1220 u32 i, t, u, v, w, j; in crypto_aes_expand_key() local
Dapi.c236 int crypto_probing_notify(unsigned long val, void *v) in crypto_probing_notify() argument
240 ok = blocking_notifier_call_chain(&crypto_chain, val, v); in crypto_probing_notify()
243 ok = blocking_notifier_call_chain(&crypto_chain, val, v); in crypto_probing_notify()
Dtestmgr.h104 char *v; member
26412 .v = "\x80\x00\x00\x00\x00\x00\x00\x00"
26426 .v = "\xc0\x00\x00\x00\x00\x00\x00\x00"
26440 .v = "\xe0\x00\x00\x00\x00\x00\x00\x00"
26454 .v = "\xf0\x00\x00\x00\x00\x00\x00\x00"
26468 .v = "\xf8\x00\x00\x00\x00\x00\x00\x00"
26482 .v = "\x57\x2c\x8e\x76\x87\x26\x47\x97"
Dtestmgr.c1465 memcpy(seed, template[i].v, template[i].vlen); in test_cprng()
/crypto/asymmetric_keys/
Dx509_cert_parser.c431 const unsigned char *v = value; in x509_process_extension() local
439 if (v[0] != ASN1_OTS || v[1] != vlen - 2) in x509_process_extension()
441 v += 2; in x509_process_extension()
445 ctx->cert->raw_skid = v; in x509_process_extension()
446 kid = asymmetric_key_generate_id(v, vlen, "", 0); in x509_process_extension()
456 ctx->raw_akid = v; in x509_process_extension()