Home
last modified time | relevance | path

Searched refs:e (Results 1 – 13 of 13) sorted by relevance

/crypto/
Dsha512_generic.c101 u64 a, b, c, d, e, f, g, h, t1, t2; in sha512_transform() local
108 e=state[4]; f=state[5]; g=state[6]; h=state[7]; in sha512_transform()
126 t1 = h + e1(e) + Ch(e,f,g) + sha512_K[i ] + W[(i & 15)]; in sha512_transform()
128 t1 = g + e1(d) + Ch(d,e,f) + sha512_K[i+1] + W[(i & 15) + 1]; in sha512_transform()
130 t1 = f + e1(c) + Ch(c,d,e) + sha512_K[i+2] + W[(i & 15) + 2]; in sha512_transform()
132 t1 = e + e1(b) + Ch(b,c,d) + sha512_K[i+3] + W[(i & 15) + 3]; in sha512_transform()
133 t2 = e0(f) + Maj(f,g,h); a+=t1; e=t1+t2; in sha512_transform()
135 t2 = e0(e) + Maj(e,f,g); h+=t1; d=t1+t2; in sha512_transform()
137 t2 = e0(d) + Maj(d,e,f); g+=t1; c=t1+t2; in sha512_transform()
139 t2 = e0(c) + Maj(c,d,e); f+=t1; b=t1+t2; in sha512_transform()
[all …]
Dsm3_generic.c44 static inline u32 gg(unsigned int n, u32 e, u32 f, u32 g) in gg() argument
46 return (n < 16) ? (e ^ f ^ g) : ((e & f) | ((~e) & g)); in gg()
78 u32 a, b, c, d, e, f, g, h; in sm3_compress() local
85 e = m[4]; in sm3_compress()
92 ss1 = rol32((rol32(a, 12) + e + rol32(t(i), i & 31)), 7); in sm3_compress()
99 tt2 = gg(i, e, f, g) + h + ss1 + *w; in sm3_compress()
108 f = e; in sm3_compress()
109 e = p0(tt2); in sm3_compress()
116 m[4] = e ^ m[4]; in sm3_compress()
121 a = b = c = d = e = f = g = h = ss1 = ss2 = tt1 = tt2 = 0; in sm3_compress()
Drsa.c17 MPI e; member
32 return mpi_powm(c, m, key->e, key->n); in _rsa_enc()
65 if (unlikely(!pkey->n || !pkey->e)) { in rsa_enc()
134 mpi_free(key->e); in rsa_free_mpi_key()
137 key->e = NULL; in rsa_free_mpi_key()
170 mpi_key->e = mpi_read_raw_data(raw_key.e, raw_key.e_sz); in rsa_set_pub_key()
171 if (!mpi_key->e) in rsa_set_pub_key()
208 mpi_key->e = mpi_read_raw_data(raw_key.e, raw_key.e_sz); in rsa_set_priv_key()
209 if (!mpi_key->e) in rsa_set_priv_key()
Decrdsa.c80 u64 e[ECRDSA_MAX_DIGITS]; /* h \mod q */ in ecrdsa_verify() local
81 u64 *v = e; /* e^{-1} \mod q */ in ecrdsa_verify()
84 struct ecc_point cc = ECC_POINT_INIT(s, e, ndigits); /* reuse s, e */ in ecrdsa_verify()
122 vli_from_le64(e, digest, ndigits); in ecrdsa_verify()
123 if (vli_cmp(e, ctx->curve->n, ndigits) == 1) in ecrdsa_verify()
124 vli_sub(e, e, ctx->curve->n, ndigits); in ecrdsa_verify()
125 if (vli_is_zero(e, ndigits)) in ecrdsa_verify()
126 e[0] = 1; in ecrdsa_verify()
129 vli_mod_inv(v, e, ctx->curve->n, ndigits); in ecrdsa_verify()
Drsapubkey.asn13 e INTEGER ({ rsa_get_e })
Dtcrypt.c259 const char *e; in test_mb_aead_speed() local
276 e = "encryption"; in test_mb_aead_speed()
278 e = "decryption"; in test_mb_aead_speed()
333 get_driver_name(crypto_aead, tfm), e); in test_mb_aead_speed()
424 pr_err("%s() failed return code=%d\n", e, ret); in test_mb_aead_speed()
530 const char *e; in test_aead_speed() local
550 e = "encryption"; in test_aead_speed()
552 e = "decryption"; in test_aead_speed()
576 get_driver_name(crypto_aead, tfm), e); in test_aead_speed()
670 pr_err("%s() failed return code=%d\n", e, ret); in test_aead_speed()
[all …]
Drsaprivkey.asn14 e INTEGER ({ rsa_get_e }),
Drsa_helper.c55 key->e = value; in rsa_get_e()
Drmd160.c43 #define ROUND(a, b, c, d, e, f, k, x, s) { \ argument
45 (a) = rol32((a), (s)) + (e); \
Drmd320.c43 #define ROUND(a, b, c, d, e, f, k, x, s) { \ argument
45 (a) = rol32((a), (s)) + (e); \
Dtestmgr.c2354 const char *e; in test_cipher() local
2364 e = "encryption"; in test_cipher()
2366 e = "decryption"; in test_cipher()
2419 "on %s for %s\n", j, e, algo); in test_cipher()
DKconfig514 building for a particular system that requires it (e.g., when
1133 without hardware AES acceleration (e.g. caam crypto). It reduces the
/crypto/asymmetric_keys/
Dasym_tpm.c360 uint8_t e[3] = { 0x01, 0x00, 0x01 }; in derive_pub_key() local
369 cur = encode_tag_length(cur, 0x02, sizeof(e)); in derive_pub_key()
370 memcpy(cur, e, sizeof(e)); in derive_pub_key()
371 cur += sizeof(e); in derive_pub_key()