/crypto/ |
D | aegis128-neon-inner.c | 26 uint8x16_t v[5]; member 44 vst1q_u8(state, st.v[0]); in aegis128_save_state_neon() 45 vst1q_u8(state + 16, st.v[1]); in aegis128_save_state_neon() 46 vst1q_u8(state + 32, st.v[2]); in aegis128_save_state_neon() 47 vst1q_u8(state + 48, st.v[3]); in aegis128_save_state_neon() 48 vst1q_u8(state + 64, st.v[4]); in aegis128_save_state_neon() 66 uint8x16_t v; in aegis_aes_round() local 73 v = vqtbl4q_u8(vld1q_u8_x4(crypto_aes_sbox), w); in aegis_aes_round() 74 v = vqtbx4q_u8(v, vld1q_u8_x4(crypto_aes_sbox + 0x40), w - 0x40); in aegis_aes_round() 75 v = vqtbx4q_u8(v, vld1q_u8_x4(crypto_aes_sbox + 0x80), w - 0x80); in aegis_aes_round() [all …]
|
D | ecc.c | 604 u64 *v[2] = { tmp, product }; in vli_mmod_slow() local 626 u64 diff = v[i][j] - mod_m[j] - borrow; in vli_mmod_slow() 628 if (diff != v[i][j]) in vli_mmod_slow() 629 borrow = (diff > v[i][j]); in vli_mmod_slow() 630 v[1 - i][j] = diff; in vli_mmod_slow() 637 vli_set(result, v[i], ndigits); in vli_mmod_slow() 862 u64 u[ECC_MAX_DIGITS], v[ECC_MAX_DIGITS]; in vli_mod_inv() local 875 vli_clear(v, ndigits); in vli_mod_inv() 892 if (!EVEN(v)) in vli_mod_inv() 893 carry = vli_add(v, v, mod, ndigits); in vli_mod_inv() [all …]
|
D | internal.h | 82 int crypto_probing_notify(unsigned long val, void *v); 126 static inline void crypto_notify(unsigned long val, void *v) in crypto_notify() argument 128 blocking_notifier_call_chain(&crypto_chain, val, v); in crypto_notify()
|
D | anubis.c | 562 u32 v = ctx->E[R - r][i]; in anubis_setkey() local 564 T0[T4[(v >> 24) ] & 0xff] ^ in anubis_setkey() 565 T1[T4[(v >> 16) & 0xff] & 0xff] ^ in anubis_setkey() 566 T2[T4[(v >> 8) & 0xff] & 0xff] ^ in anubis_setkey() 567 T3[T4[(v ) & 0xff] & 0xff]; in anubis_setkey()
|
D | ecrdsa.c | 81 u64 *v = e; /* e^{-1} \mod q */ in ecrdsa_verify() local 129 vli_mod_inv(v, e, ctx->curve->n, ndigits); in ecrdsa_verify() 132 vli_mod_mult_slow(z1, s, v, ctx->curve->n, ndigits); in ecrdsa_verify() 134 vli_mod_mult_slow(z2, _r, v, ctx->curve->n, ndigits); in ecrdsa_verify()
|
D | poly1305_generic.c | 27 static inline u32 sr(u64 v, u_char n) in sr() argument 29 return v >> n; in sr() 32 static inline u32 and(u32 v, u32 mask) in and() argument 34 return v & mask; in and()
|
D | api.c | 245 int crypto_probing_notify(unsigned long val, void *v) in crypto_probing_notify() argument 249 ok = blocking_notifier_call_chain(&crypto_chain, val, v); in crypto_probing_notify() 252 ok = blocking_notifier_call_chain(&crypto_chain, val, v); in crypto_probing_notify()
|
D | skcipher.c | 232 void *v; in skcipher_next_slow() local 258 v = kzalloc(n, skcipher_walk_gfp(walk)); in skcipher_next_slow() 259 if (!v) in skcipher_next_slow() 263 p = v; in skcipher_next_slow() 268 walk->buffer = v; in skcipher_next_slow() 269 buffer = v; in skcipher_next_slow()
|
D | testmgr.h | 119 const char *v; member 19541 .v = "\x80\x00\x00\x00\x00\x00\x00\x00" 19555 .v = "\xc0\x00\x00\x00\x00\x00\x00\x00" 19569 .v = "\xe0\x00\x00\x00\x00\x00\x00\x00" 19583 .v = "\xf0\x00\x00\x00\x00\x00\x00\x00" 19597 .v = "\xf8\x00\x00\x00\x00\x00\x00\x00" 19611 .v = "\x57\x2c\x8e\x76\x87\x26\x47\x97"
|
D | testmgr.c | 3194 memcpy(seed, template[i].v, template[i].vlen); in test_cprng()
|
/crypto/asymmetric_keys/ |
D | x509_cert_parser.c | 482 const unsigned char *v = value; in x509_process_extension() local 490 if (v[0] != ASN1_OTS || v[1] != vlen - 2) in x509_process_extension() 492 v += 2; in x509_process_extension() 496 ctx->cert->raw_skid = v; in x509_process_extension() 497 kid = asymmetric_key_generate_id(v, vlen, "", 0); in x509_process_extension() 507 ctx->raw_akid = v; in x509_process_extension()
|