/crypto/ |
D | md5.c | 45 u32 a, b, c, d; in md5_transform() local 50 d = hash[3]; in md5_transform() 52 MD5STEP(F1, a, b, c, d, in[0] + 0xd76aa478, 7); in md5_transform() 53 MD5STEP(F1, d, a, b, c, in[1] + 0xe8c7b756, 12); in md5_transform() 54 MD5STEP(F1, c, d, a, b, in[2] + 0x242070db, 17); in md5_transform() 55 MD5STEP(F1, b, c, d, a, in[3] + 0xc1bdceee, 22); in md5_transform() 56 MD5STEP(F1, a, b, c, d, in[4] + 0xf57c0faf, 7); in md5_transform() 57 MD5STEP(F1, d, a, b, c, in[5] + 0x4787c62a, 12); in md5_transform() 58 MD5STEP(F1, c, d, a, b, in[6] + 0xa8304613, 17); in md5_transform() 59 MD5STEP(F1, b, c, d, a, in[7] + 0xfd469501, 22); in md5_transform() [all …]
|
D | md4.c | 63 #define ROUND1(a,b,c,d,k,s) (a = lshift(a + F(b,c,d) + k, s)) argument 64 #define ROUND2(a,b,c,d,k,s) (a = lshift(a + G(b,c,d) + k + (u32)0x5A827999,s)) argument 65 #define ROUND3(a,b,c,d,k,s) (a = lshift(a + H(b,c,d) + k + (u32)0x6ED9EBA1,s)) argument 69 u32 a, b, c, d; in md4_transform() local 74 d = hash[3]; in md4_transform() 76 ROUND1(a, b, c, d, in[0], 3); in md4_transform() 77 ROUND1(d, a, b, c, in[1], 7); in md4_transform() 78 ROUND1(c, d, a, b, in[2], 11); in md4_transform() 79 ROUND1(b, c, d, a, in[3], 19); in md4_transform() 80 ROUND1(a, b, c, d, in[4], 3); in md4_transform() [all …]
|
D | twofish_generic.c | 53 #define ENCROUND(n, a, b, c, d) \ argument 58 (d) = rol32((d), 1) ^ y 60 #define DECROUND(n, a, b, c, d) \ argument 63 (d) ^= y + ctx->k[2 * (n) + 1]; \ 64 (d) = ror32((d), 1); \ 72 ENCROUND (2 * (n), a, b, c, d); \ 73 ENCROUND (2 * (n) + 1, c, d, a, b) 76 DECROUND (2 * (n) + 1, c, d, a, b); \ 77 DECROUND (2 * (n), a, b, c, d) 102 u32 a, b, c, d; in twofish_encrypt() local [all …]
|
D | sha512_generic.c | 101 u64 a, b, c, d, e, f, g, h, t1, t2; in sha512_transform() local 107 a=state[0]; b=state[1]; c=state[2]; d=state[3]; in sha512_transform() 127 t2 = e0(a) + Maj(a,b,c); d+=t1; h=t1+t2; in sha512_transform() 128 t1 = g + e1(d) + Ch(d,e,f) + sha512_K[i+1] + W[(i & 15) + 1]; in sha512_transform() 130 t1 = f + e1(c) + Ch(c,d,e) + sha512_K[i+2] + W[(i & 15) + 2]; in sha512_transform() 132 t1 = e + e1(b) + Ch(b,c,d) + sha512_K[i+3] + W[(i & 15) + 3]; in sha512_transform() 134 t1 = d + e1(a) + Ch(a,b,c) + sha512_K[i+4] + W[(i & 15) + 4]; in sha512_transform() 135 t2 = e0(e) + Maj(e,f,g); h+=t1; d=t1+t2; in sha512_transform() 137 t2 = e0(d) + Maj(d,e,f); g+=t1; c=t1+t2; in sha512_transform() 139 t2 = e0(c) + Maj(c,d,e); f+=t1; b=t1+t2; in sha512_transform() [all …]
|
D | cts.c | 108 u8 d[MAX_CIPHER_BLOCKSIZE * 2] __aligned(__alignof__(u32)); in cts_cbc_encrypt() local 117 scatterwalk_map_and_copy(d + bsize, sg, 0, bsize, 0); in cts_cbc_encrypt() 119 memset(d, 0, bsize); in cts_cbc_encrypt() 120 scatterwalk_map_and_copy(d, req->src, offset, lastn, 0); in cts_cbc_encrypt() 122 scatterwalk_map_and_copy(d, sg, 0, bsize + lastn, 1); in cts_cbc_encrypt() 123 memzero_explicit(d, sizeof(d)); in cts_cbc_encrypt() 189 u8 d[MAX_CIPHER_BLOCKSIZE * 2] __aligned(__alignof__(u32)); in cts_cbc_decrypt() local 201 scatterwalk_map_and_copy(d + bsize, sg, 0, bsize, 0); in cts_cbc_decrypt() 203 crypto_xor(d + bsize, space, bsize); in cts_cbc_decrypt() 205 memset(d, 0, bsize); in cts_cbc_decrypt() [all …]
|
D | rsa.c | 18 MPI d; member 46 return mpi_powm(m, c, key->d, key->n); in _rsa_dec() 104 if (unlikely(!pkey->n || !pkey->d)) { in rsa_dec() 133 mpi_free(key->d); in rsa_free_mpi_key() 136 key->d = NULL; in rsa_free_mpi_key() 204 mpi_key->d = mpi_read_raw_data(raw_key.d, raw_key.d_sz); in rsa_set_priv_key() 205 if (!mpi_key->d) in rsa_set_priv_key()
|
D | sm3_generic.c | 78 u32 a, b, c, d, e, f, g, h; in sm3_compress() local 84 d = m[3]; in sm3_compress() 96 tt1 = ff(i, a, b, c) + d + ss2 + *wt; in sm3_compress() 102 d = c; in sm3_compress() 115 m[3] = d ^ m[3]; in sm3_compress() 121 a = b = c = d = e = f = g = h = ss1 = ss2 = tt1 = tt2 = 0; in sm3_compress()
|
D | twofish_common.c | 468 #define CALC_S(a, b, c, d, i, w, x, y, z) \ argument 474 (d) ^= exp_to_poly[tmp + (z)]; \ 529 #define CALC_K_2(a, b, c, d, j) \ argument 533 ^ mds[3][q1[d ^ key[(j) + 11]] ^ key[(j) + 3]] 542 #define CALC_K192_2(a, b, c, d, j) \ argument 546 q1[d ^ key[(j) + 19]], j)
|
D | serpent_generic.c | 29 #define keyiter(a, b, c, d, i, j) \ argument 30 ({ b ^= d; b ^= c; b ^= a; b ^= PHI ^ i; b = rol32(b, 11); k[j] = b; }) 456 __le32 *d = (__le32 *)dst; in __serpent_encrypt() local 503 d[0] = cpu_to_le32(r0); in __serpent_encrypt() 504 d[1] = cpu_to_le32(r1); in __serpent_encrypt() 505 d[2] = cpu_to_le32(r2); in __serpent_encrypt() 506 d[3] = cpu_to_le32(r3); in __serpent_encrypt() 521 __le32 *d = (__le32 *)dst; in __serpent_decrypt() local 563 d[0] = cpu_to_le32(r2); in __serpent_decrypt() 564 d[1] = cpu_to_le32(r3); in __serpent_decrypt() [all …]
|
D | rsaprivkey.asn1 | 5 d INTEGER ({ rsa_get_d }),
|
D | rsa_helper.c | 70 key->d = value; in rsa_get_d()
|
D | rmd256.c | 40 #define ROUND(a, b, c, d, f, k, x, s) { \ argument 41 (a) += f((b), (c), (d)) + le32_to_cpup(&(x)) + (k); \
|
D | rmd128.c | 40 #define ROUND(a, b, c, d, f, k, x, s) { \ argument 41 (a) += f((b), (c), (d)) + le32_to_cpup(&(x)) + (k); \
|
D | algapi.c | 973 int d = (((unsigned long)dst ^ (unsigned long)src1) | in __crypto_xor() local 977 relalign = d ? 1 << __ffs(d) : size; in __crypto_xor()
|
D | rmd160.c | 43 #define ROUND(a, b, c, d, e, f, k, x, s) { \ argument 44 (a) += f((b), (c), (d)) + le32_to_cpup(&(x)) + (k); \
|
D | rmd320.c | 43 #define ROUND(a, b, c, d, e, f, k, x, s) { \ argument 44 (a) += f((b), (c), (d)) + le32_to_cpup(&(x)) + (k); \
|
/crypto/async_tx/ |
D | raid6test.c | 44 static char disk_type(int d, int disks) in disk_type() argument 46 if (d == disks - 2) in disk_type() 48 else if (d == disks - 1) in disk_type()
|
D | async_pq.c | 26 #define P(b, d) (b[d-2]) argument 27 #define Q(b, d) (b[d-1]) argument
|
D | async_raid6_recov.c | 91 u8 *d, *s; in async_mult() local 136 d = page_address(dest); in async_mult() 140 *d++ = qmul[*s++]; in async_mult()
|