/crypto/ |
D | sha512_generic.c | 101 u64 a, b, c, d, e, f, g, h, t1, t2; in sha512_transform() local 108 e=state[4]; f=state[5]; g=state[6]; h=state[7]; in sha512_transform() 126 t1 = h + e1(e) + Ch(e,f,g) + sha512_K[i ] + W[(i & 15)]; in sha512_transform() 128 t1 = g + e1(d) + Ch(d,e,f) + sha512_K[i+1] + W[(i & 15) + 1]; in sha512_transform() 130 t1 = f + e1(c) + Ch(c,d,e) + sha512_K[i+2] + W[(i & 15) + 2]; in sha512_transform() 132 t1 = e + e1(b) + Ch(b,c,d) + sha512_K[i+3] + W[(i & 15) + 3]; in sha512_transform() 133 t2 = e0(f) + Maj(f,g,h); a+=t1; e=t1+t2; in sha512_transform() 135 t2 = e0(e) + Maj(e,f,g); h+=t1; d=t1+t2; in sha512_transform() 137 t2 = e0(d) + Maj(d,e,f); g+=t1; c=t1+t2; in sha512_transform() 139 t2 = e0(c) + Maj(c,d,e); f+=t1; b=t1+t2; in sha512_transform() [all …]
|
D | sm3_generic.c | 44 static inline u32 gg(unsigned int n, u32 e, u32 f, u32 g) in gg() argument 46 return (n < 16) ? (e ^ f ^ g) : ((e & f) | ((~e) & g)); in gg() 78 u32 a, b, c, d, e, f, g, h; in sm3_compress() local 85 e = m[4]; in sm3_compress() 92 ss1 = rol32((rol32(a, 12) + e + rol32(t(i), i & 31)), 7); in sm3_compress() 99 tt2 = gg(i, e, f, g) + h + ss1 + *w; in sm3_compress() 108 f = e; in sm3_compress() 109 e = p0(tt2); in sm3_compress() 116 m[4] = e ^ m[4]; in sm3_compress() 121 a = b = c = d = e = f = g = h = ss1 = ss2 = tt1 = tt2 = 0; in sm3_compress()
|
D | rsa.c | 17 MPI e; member 32 return mpi_powm(c, m, key->e, key->n); in _rsa_enc() 65 if (unlikely(!pkey->n || !pkey->e)) { in rsa_enc() 134 mpi_free(key->e); in rsa_free_mpi_key() 137 key->e = NULL; in rsa_free_mpi_key() 170 mpi_key->e = mpi_read_raw_data(raw_key.e, raw_key.e_sz); in rsa_set_pub_key() 171 if (!mpi_key->e) in rsa_set_pub_key() 208 mpi_key->e = mpi_read_raw_data(raw_key.e, raw_key.e_sz); in rsa_set_priv_key() 209 if (!mpi_key->e) in rsa_set_priv_key()
|
D | ecrdsa.c | 80 u64 e[ECRDSA_MAX_DIGITS]; /* h \mod q */ in ecrdsa_verify() local 81 u64 *v = e; /* e^{-1} \mod q */ in ecrdsa_verify() 84 struct ecc_point cc = ECC_POINT_INIT(s, e, ndigits); /* reuse s, e */ in ecrdsa_verify() 122 vli_from_le64(e, digest, ndigits); in ecrdsa_verify() 123 if (vli_cmp(e, ctx->curve->n, ndigits) == 1) in ecrdsa_verify() 124 vli_sub(e, e, ctx->curve->n, ndigits); in ecrdsa_verify() 125 if (vli_is_zero(e, ndigits)) in ecrdsa_verify() 126 e[0] = 1; in ecrdsa_verify() 129 vli_mod_inv(v, e, ctx->curve->n, ndigits); in ecrdsa_verify()
|
D | rsapubkey.asn1 | 3 e INTEGER ({ rsa_get_e })
|
D | tcrypt.c | 259 const char *e; in test_mb_aead_speed() local 276 e = "encryption"; in test_mb_aead_speed() 278 e = "decryption"; in test_mb_aead_speed() 333 get_driver_name(crypto_aead, tfm), e); in test_mb_aead_speed() 424 pr_err("%s() failed return code=%d\n", e, ret); in test_mb_aead_speed() 530 const char *e; in test_aead_speed() local 550 e = "encryption"; in test_aead_speed() 552 e = "decryption"; in test_aead_speed() 576 get_driver_name(crypto_aead, tfm), e); in test_aead_speed() 670 pr_err("%s() failed return code=%d\n", e, ret); in test_aead_speed() [all …]
|
D | rsaprivkey.asn1 | 4 e INTEGER ({ rsa_get_e }),
|
D | rsa_helper.c | 55 key->e = value; in rsa_get_e()
|
D | rmd160.c | 43 #define ROUND(a, b, c, d, e, f, k, x, s) { \ argument 45 (a) = rol32((a), (s)) + (e); \
|
D | rmd320.c | 43 #define ROUND(a, b, c, d, e, f, k, x, s) { \ argument 45 (a) = rol32((a), (s)) + (e); \
|
D | testmgr.c | 2354 const char *e; in test_cipher() local 2364 e = "encryption"; in test_cipher() 2366 e = "decryption"; in test_cipher() 2419 "on %s for %s\n", j, e, algo); in test_cipher()
|
D | Kconfig | 514 building for a particular system that requires it (e.g., when 1133 without hardware AES acceleration (e.g. caam crypto). It reduces the
|
/crypto/asymmetric_keys/ |
D | asym_tpm.c | 360 uint8_t e[3] = { 0x01, 0x00, 0x01 }; in derive_pub_key() local 369 cur = encode_tag_length(cur, 0x02, sizeof(e)); in derive_pub_key() 370 memcpy(cur, e, sizeof(e)); in derive_pub_key() 371 cur += sizeof(e); in derive_pub_key()
|