Home
last modified time | relevance | path

Searched refs:g (Results 1 – 12 of 12) sorted by relevance

/crypto/
Dsha512_generic.c101 u64 a, b, c, d, e, f, g, h, t1, t2; in sha512_transform() local
108 e=state[4]; f=state[5]; g=state[6]; h=state[7]; in sha512_transform()
126 t1 = h + e1(e) + Ch(e,f,g) + sha512_K[i ] + W[(i & 15)]; in sha512_transform()
128 t1 = g + e1(d) + Ch(d,e,f) + sha512_K[i+1] + W[(i & 15) + 1]; in sha512_transform()
129 t2 = e0(h) + Maj(h,a,b); c+=t1; g=t1+t2; in sha512_transform()
131 t2 = e0(g) + Maj(g,h,a); b+=t1; f=t1+t2; in sha512_transform()
133 t2 = e0(f) + Maj(f,g,h); a+=t1; e=t1+t2; in sha512_transform()
135 t2 = e0(e) + Maj(e,f,g); h+=t1; d=t1+t2; in sha512_transform()
137 t2 = e0(d) + Maj(d,e,f); g+=t1; c=t1+t2; in sha512_transform()
138 t1 = b + e1(g) + Ch(g,h,a) + sha512_K[i+6] + W[(i & 15) + 6]; in sha512_transform()
[all …]
Dsm3_generic.c44 static inline u32 gg(unsigned int n, u32 e, u32 f, u32 g) in gg() argument
46 return (n < 16) ? (e ^ f ^ g) : ((e & f) | ((~e) & g)); in gg()
78 u32 a, b, c, d, e, f, g, h; in sm3_compress() local
87 g = m[6]; in sm3_compress()
99 tt2 = gg(i, e, f, g) + h + ss1 + *w; in sm3_compress()
106 h = g; in sm3_compress()
107 g = rol32(f, 19); in sm3_compress()
118 m[6] = g ^ m[6]; in sm3_compress()
121 a = b = c = d = e = f = g = h = ss1 = ss2 = tt1 = tt2 = 0; in sm3_compress()
Decrdsa_defs.h50 .g = {
83 .g = {
120 .g = {
169 .g = {
214 .g = {
Ddh.c17 MPI g; /* Value is guaranteed to be set. */ member
25 mpi_free(ctx->g); in dh_clear_ctx()
67 ctx->g = mpi_read_raw_data(params->g, params->g_size); in dh_set_params()
68 if (!ctx->g) in dh_set_params()
175 base = ctx->g; in dh_compute_value()
Decrdsa.c96 req->dst_len != ctx->curve->g.ndigits * sizeof(u64) || in ecrdsa_verify()
97 ctx->pub_key.ndigits != ctx->curve->g.ndigits || in ecrdsa_verify()
137 ecc_point_mult_shamir(&cc, z1, &ctx->curve->g, z2, &ctx->pub_key, in ecrdsa_verify()
228 ctx->curve->g.ndigits * sizeof(u64) != ctx->digest_len) in ecrdsa_set_pub_key()
236 ctx->key_len != ctx->curve->g.ndigits * sizeof(u64) * 2) in ecrdsa_set_pub_key()
Decc_curve_defs.h20 .g = {
46 .g = {
Dgf128mul.c260 struct gf128mul_64k *gf128mul_init_64k_bbe(const be128 *g) in gf128mul_init_64k_bbe() argument
278 t->t[0]->t[1] = *g; in gf128mul_init_64k_bbe()
341 struct gf128mul_4k *gf128mul_init_4k_lle(const be128 *g) in gf128mul_init_4k_lle() argument
350 t->t[128] = *g; in gf128mul_init_4k_lle()
363 struct gf128mul_4k *gf128mul_init_4k_bbe(const be128 *g) in gf128mul_init_4k_bbe() argument
372 t->t[1] = *g; in gf128mul_init_4k_bbe()
Ddh_helper.c61 ptr = dh_pack_data(ptr, end, params->g, params->g_size); in crypto_dh_encode_key()
101 params->g = (void *)(ptr + params->key_size + params->p_size + in crypto_dh_decode_key()
Decc.h66 struct ecc_point g; member
Decc.c1213 unsigned int ndigits = curve->g.ndigits; in ecc_point_add()
1237 unsigned int ndigits = curve->g.ndigits; in ecc_point_mult_shamir()
1303 if (curve->g.ndigits != ndigits) in __ecc_is_key_valid()
1406 ecc_point_mult(pk, &curve->g, priv, NULL, curve, ndigits); in ecc_make_pub_key()
1428 if (WARN_ON(pk->ndigits != curve->g.ndigits)) in ecc_is_pubkey_valid_partial()
DKconfig514 building for a particular system that requires it (e.g., when
1133 without hardware AES acceleration (e.g. caam crypto). It reduces the
/crypto/async_tx/
Dasync_raid6_recov.c189 struct page *p, *q, *g, *dp, *dq; in __2data_recov_5() local
212 g = blocks[good]; in __2data_recov_5()
222 tx = async_memcpy(dp, g, 0, 0, bytes, submit); in __2data_recov_5()
224 tx = async_mult(dq, g, raid6_gfexp[good], bytes, submit); in __2data_recov_5()
474 struct page *g = blocks[good]; in async_raid6_datap_recov() local
478 tx = async_memcpy(p, g, 0, 0, bytes, submit); in async_raid6_datap_recov()
482 tx = async_mult(dq, g, raid6_gfexp[good], bytes, submit); in async_raid6_datap_recov()