Home
last modified time | relevance | path

Searched refs:v (Results 1 – 11 of 11) sorted by relevance

/crypto/
Daegis128-neon-inner.c26 uint8x16_t v[5]; member
44 vst1q_u8(state, st.v[0]); in aegis128_save_state_neon()
45 vst1q_u8(state + 16, st.v[1]); in aegis128_save_state_neon()
46 vst1q_u8(state + 32, st.v[2]); in aegis128_save_state_neon()
47 vst1q_u8(state + 48, st.v[3]); in aegis128_save_state_neon()
48 vst1q_u8(state + 64, st.v[4]); in aegis128_save_state_neon()
66 uint8x16_t v; in aegis_aes_round() local
73 v = vqtbl4q_u8(vld1q_u8_x4(crypto_aes_sbox), w); in aegis_aes_round()
74 v = vqtbx4q_u8(v, vld1q_u8_x4(crypto_aes_sbox + 0x40), w - 0x40); in aegis_aes_round()
75 v = vqtbx4q_u8(v, vld1q_u8_x4(crypto_aes_sbox + 0x80), w - 0x80); in aegis_aes_round()
[all …]
Decc.c604 u64 *v[2] = { tmp, product }; in vli_mmod_slow() local
626 u64 diff = v[i][j] - mod_m[j] - borrow; in vli_mmod_slow()
628 if (diff != v[i][j]) in vli_mmod_slow()
629 borrow = (diff > v[i][j]); in vli_mmod_slow()
630 v[1 - i][j] = diff; in vli_mmod_slow()
637 vli_set(result, v[i], ndigits); in vli_mmod_slow()
862 u64 u[ECC_MAX_DIGITS], v[ECC_MAX_DIGITS]; in vli_mod_inv() local
875 vli_clear(v, ndigits); in vli_mod_inv()
892 if (!EVEN(v)) in vli_mod_inv()
893 carry = vli_add(v, v, mod, ndigits); in vli_mod_inv()
[all …]
Dinternal.h82 int crypto_probing_notify(unsigned long val, void *v);
126 static inline void crypto_notify(unsigned long val, void *v) in crypto_notify() argument
128 blocking_notifier_call_chain(&crypto_chain, val, v); in crypto_notify()
Danubis.c562 u32 v = ctx->E[R - r][i]; in anubis_setkey() local
564 T0[T4[(v >> 24) ] & 0xff] ^ in anubis_setkey()
565 T1[T4[(v >> 16) & 0xff] & 0xff] ^ in anubis_setkey()
566 T2[T4[(v >> 8) & 0xff] & 0xff] ^ in anubis_setkey()
567 T3[T4[(v ) & 0xff] & 0xff]; in anubis_setkey()
Decrdsa.c81 u64 *v = e; /* e^{-1} \mod q */ in ecrdsa_verify() local
129 vli_mod_inv(v, e, ctx->curve->n, ndigits); in ecrdsa_verify()
132 vli_mod_mult_slow(z1, s, v, ctx->curve->n, ndigits); in ecrdsa_verify()
134 vli_mod_mult_slow(z2, _r, v, ctx->curve->n, ndigits); in ecrdsa_verify()
Dpoly1305_generic.c27 static inline u32 sr(u64 v, u_char n) in sr() argument
29 return v >> n; in sr()
32 static inline u32 and(u32 v, u32 mask) in and() argument
34 return v & mask; in and()
Dapi.c245 int crypto_probing_notify(unsigned long val, void *v) in crypto_probing_notify() argument
249 ok = blocking_notifier_call_chain(&crypto_chain, val, v); in crypto_probing_notify()
252 ok = blocking_notifier_call_chain(&crypto_chain, val, v); in crypto_probing_notify()
Dskcipher.c232 void *v; in skcipher_next_slow() local
258 v = kzalloc(n, skcipher_walk_gfp(walk)); in skcipher_next_slow()
259 if (!v) in skcipher_next_slow()
263 p = v; in skcipher_next_slow()
268 walk->buffer = v; in skcipher_next_slow()
269 buffer = v; in skcipher_next_slow()
Dtestmgr.h119 const char *v; member
19541 .v = "\x80\x00\x00\x00\x00\x00\x00\x00"
19555 .v = "\xc0\x00\x00\x00\x00\x00\x00\x00"
19569 .v = "\xe0\x00\x00\x00\x00\x00\x00\x00"
19583 .v = "\xf0\x00\x00\x00\x00\x00\x00\x00"
19597 .v = "\xf8\x00\x00\x00\x00\x00\x00\x00"
19611 .v = "\x57\x2c\x8e\x76\x87\x26\x47\x97"
Dtestmgr.c3194 memcpy(seed, template[i].v, template[i].vlen); in test_cprng()
/crypto/asymmetric_keys/
Dx509_cert_parser.c482 const unsigned char *v = value; in x509_process_extension() local
490 if (v[0] != ASN1_OTS || v[1] != vlen - 2) in x509_process_extension()
492 v += 2; in x509_process_extension()
496 ctx->cert->raw_skid = v; in x509_process_extension()
497 kid = asymmetric_key_generate_id(v, vlen, "", 0); in x509_process_extension()
507 ctx->raw_akid = v; in x509_process_extension()