Home
last modified time | relevance | path

Searched refs:d (Results 1 – 19 of 19) sorted by relevance

/crypto/
Dmd5.c45 u32 a, b, c, d; in md5_transform() local
50 d = hash[3]; in md5_transform()
52 MD5STEP(F1, a, b, c, d, in[0] + 0xd76aa478, 7); in md5_transform()
53 MD5STEP(F1, d, a, b, c, in[1] + 0xe8c7b756, 12); in md5_transform()
54 MD5STEP(F1, c, d, a, b, in[2] + 0x242070db, 17); in md5_transform()
55 MD5STEP(F1, b, c, d, a, in[3] + 0xc1bdceee, 22); in md5_transform()
56 MD5STEP(F1, a, b, c, d, in[4] + 0xf57c0faf, 7); in md5_transform()
57 MD5STEP(F1, d, a, b, c, in[5] + 0x4787c62a, 12); in md5_transform()
58 MD5STEP(F1, c, d, a, b, in[6] + 0xa8304613, 17); in md5_transform()
59 MD5STEP(F1, b, c, d, a, in[7] + 0xfd469501, 22); in md5_transform()
[all …]
Dmd4.c63 #define ROUND1(a,b,c,d,k,s) (a = lshift(a + F(b,c,d) + k, s)) argument
64 #define ROUND2(a,b,c,d,k,s) (a = lshift(a + G(b,c,d) + k + (u32)0x5A827999,s)) argument
65 #define ROUND3(a,b,c,d,k,s) (a = lshift(a + H(b,c,d) + k + (u32)0x6ED9EBA1,s)) argument
69 u32 a, b, c, d; in md4_transform() local
74 d = hash[3]; in md4_transform()
76 ROUND1(a, b, c, d, in[0], 3); in md4_transform()
77 ROUND1(d, a, b, c, in[1], 7); in md4_transform()
78 ROUND1(c, d, a, b, in[2], 11); in md4_transform()
79 ROUND1(b, c, d, a, in[3], 19); in md4_transform()
80 ROUND1(a, b, c, d, in[4], 3); in md4_transform()
[all …]
Dtwofish_generic.c53 #define ENCROUND(n, a, b, c, d) \ argument
58 (d) = rol32((d), 1) ^ y
60 #define DECROUND(n, a, b, c, d) \ argument
63 (d) ^= y + ctx->k[2 * (n) + 1]; \
64 (d) = ror32((d), 1); \
72 ENCROUND (2 * (n), a, b, c, d); \
73 ENCROUND (2 * (n) + 1, c, d, a, b)
76 DECROUND (2 * (n) + 1, c, d, a, b); \
77 DECROUND (2 * (n), a, b, c, d)
102 u32 a, b, c, d; in twofish_encrypt() local
[all …]
Dsha512_generic.c101 u64 a, b, c, d, e, f, g, h, t1, t2; in sha512_transform() local
107 a=state[0]; b=state[1]; c=state[2]; d=state[3]; in sha512_transform()
127 t2 = e0(a) + Maj(a,b,c); d+=t1; h=t1+t2; in sha512_transform()
128 t1 = g + e1(d) + Ch(d,e,f) + sha512_K[i+1] + W[(i & 15) + 1]; in sha512_transform()
130 t1 = f + e1(c) + Ch(c,d,e) + sha512_K[i+2] + W[(i & 15) + 2]; in sha512_transform()
132 t1 = e + e1(b) + Ch(b,c,d) + sha512_K[i+3] + W[(i & 15) + 3]; in sha512_transform()
134 t1 = d + e1(a) + Ch(a,b,c) + sha512_K[i+4] + W[(i & 15) + 4]; in sha512_transform()
135 t2 = e0(e) + Maj(e,f,g); h+=t1; d=t1+t2; in sha512_transform()
137 t2 = e0(d) + Maj(d,e,f); g+=t1; c=t1+t2; in sha512_transform()
139 t2 = e0(c) + Maj(c,d,e); f+=t1; b=t1+t2; in sha512_transform()
[all …]
Dcts.c108 u8 d[MAX_CIPHER_BLOCKSIZE * 2] __aligned(__alignof__(u32)); in cts_cbc_encrypt() local
117 scatterwalk_map_and_copy(d + bsize, sg, 0, bsize, 0); in cts_cbc_encrypt()
119 memset(d, 0, bsize); in cts_cbc_encrypt()
120 scatterwalk_map_and_copy(d, req->src, offset, lastn, 0); in cts_cbc_encrypt()
122 scatterwalk_map_and_copy(d, sg, 0, bsize + lastn, 1); in cts_cbc_encrypt()
123 memzero_explicit(d, sizeof(d)); in cts_cbc_encrypt()
189 u8 d[MAX_CIPHER_BLOCKSIZE * 2] __aligned(__alignof__(u32)); in cts_cbc_decrypt() local
201 scatterwalk_map_and_copy(d + bsize, sg, 0, bsize, 0); in cts_cbc_decrypt()
203 crypto_xor(d + bsize, space, bsize); in cts_cbc_decrypt()
205 memset(d, 0, bsize); in cts_cbc_decrypt()
[all …]
Drsa.c18 MPI d; member
46 return mpi_powm(m, c, key->d, key->n); in _rsa_dec()
104 if (unlikely(!pkey->n || !pkey->d)) { in rsa_dec()
133 mpi_free(key->d); in rsa_free_mpi_key()
136 key->d = NULL; in rsa_free_mpi_key()
204 mpi_key->d = mpi_read_raw_data(raw_key.d, raw_key.d_sz); in rsa_set_priv_key()
205 if (!mpi_key->d) in rsa_set_priv_key()
Dsm3_generic.c78 u32 a, b, c, d, e, f, g, h; in sm3_compress() local
84 d = m[3]; in sm3_compress()
96 tt1 = ff(i, a, b, c) + d + ss2 + *wt; in sm3_compress()
102 d = c; in sm3_compress()
115 m[3] = d ^ m[3]; in sm3_compress()
121 a = b = c = d = e = f = g = h = ss1 = ss2 = tt1 = tt2 = 0; in sm3_compress()
Dtwofish_common.c468 #define CALC_S(a, b, c, d, i, w, x, y, z) \ argument
474 (d) ^= exp_to_poly[tmp + (z)]; \
529 #define CALC_K_2(a, b, c, d, j) \ argument
533 ^ mds[3][q1[d ^ key[(j) + 11]] ^ key[(j) + 3]]
542 #define CALC_K192_2(a, b, c, d, j) \ argument
546 q1[d ^ key[(j) + 19]], j)
Dserpent_generic.c29 #define keyiter(a, b, c, d, i, j) \ argument
30 ({ b ^= d; b ^= c; b ^= a; b ^= PHI ^ i; b = rol32(b, 11); k[j] = b; })
456 __le32 *d = (__le32 *)dst; in __serpent_encrypt() local
503 d[0] = cpu_to_le32(r0); in __serpent_encrypt()
504 d[1] = cpu_to_le32(r1); in __serpent_encrypt()
505 d[2] = cpu_to_le32(r2); in __serpent_encrypt()
506 d[3] = cpu_to_le32(r3); in __serpent_encrypt()
521 __le32 *d = (__le32 *)dst; in __serpent_decrypt() local
563 d[0] = cpu_to_le32(r2); in __serpent_decrypt()
564 d[1] = cpu_to_le32(r3); in __serpent_decrypt()
[all …]
Drsaprivkey.asn15 d INTEGER ({ rsa_get_d }),
Drsa_helper.c70 key->d = value; in rsa_get_d()
Drmd256.c40 #define ROUND(a, b, c, d, f, k, x, s) { \ argument
41 (a) += f((b), (c), (d)) + le32_to_cpup(&(x)) + (k); \
Drmd128.c40 #define ROUND(a, b, c, d, f, k, x, s) { \ argument
41 (a) += f((b), (c), (d)) + le32_to_cpup(&(x)) + (k); \
Dalgapi.c973 int d = (((unsigned long)dst ^ (unsigned long)src1) | in __crypto_xor() local
977 relalign = d ? 1 << __ffs(d) : size; in __crypto_xor()
Drmd160.c43 #define ROUND(a, b, c, d, e, f, k, x, s) { \ argument
44 (a) += f((b), (c), (d)) + le32_to_cpup(&(x)) + (k); \
Drmd320.c43 #define ROUND(a, b, c, d, e, f, k, x, s) { \ argument
44 (a) += f((b), (c), (d)) + le32_to_cpup(&(x)) + (k); \
/crypto/async_tx/
Draid6test.c44 static char disk_type(int d, int disks) in disk_type() argument
46 if (d == disks - 2) in disk_type()
48 else if (d == disks - 1) in disk_type()
Dasync_pq.c26 #define P(b, d) (b[d-2]) argument
27 #define Q(b, d) (b[d-1]) argument
Dasync_raid6_recov.c91 u8 *d, *s; in async_mult() local
136 d = page_address(dest); in async_mult()
140 *d++ = qmul[*s++]; in async_mult()