Searched refs:I (Results 1 – 5 of 5) sorted by relevance
/crypto/ |
D | cast6_generic.c | 27 #define F1(D, r, m) ((I = ((m) + (D))), (I = rol32(I, (r))), \ 28 (((s1[I >> 24] ^ s2[(I>>16)&0xff]) - s3[(I>>8)&0xff]) + s4[I&0xff])) 29 #define F2(D, r, m) ((I = ((m) ^ (D))), (I = rol32(I, (r))), \ 30 (((s1[I >> 24] - s2[(I>>16)&0xff]) + s3[(I>>8)&0xff]) ^ s4[I&0xff])) 31 #define F3(D, r, m) ((I = ((m) - (D))), (I = rol32(I, (r))), \ 32 (((s1[I >> 24] + s2[(I>>16)&0xff]) ^ s3[(I>>8)&0xff]) - s4[I&0xff])) 95 u32 I; in W() local 159 u32 I; in Q() local 169 u32 I; in QBAR() local
|
D | cast5_generic.c | 295 #define F1(D, m, r) ((I = ((m) + (D))), (I = rol32(I, (r))), \ 296 (((s1[I >> 24] ^ s2[(I>>16)&0xff]) - s3[(I>>8)&0xff]) + s4[I&0xff])) 297 #define F2(D, m, r) ((I = ((m) ^ (D))), (I = rol32(I, (r))), \ 298 (((s1[I >> 24] - s2[(I>>16)&0xff]) + s3[(I>>8)&0xff]) ^ s4[I&0xff])) 299 #define F3(D, m, r) ((I = ((m) - (D))), (I = rol32(I, (r))), \ 300 (((s1[I >> 24] + s2[(I>>16)&0xff]) ^ s3[(I>>8)&0xff]) - s4[I&0xff])) 308 u32 I; /* used by the Fx macros */ in __cast5_encrypt() local 365 u32 I; in __cast5_decrypt() local
|
D | sha512_generic.c | 88 static inline void LOAD_OP(int I, u64 *W, const u8 *input) in LOAD_OP() argument 90 W[I] = get_unaligned_be64((__u64 *)input + I); in LOAD_OP() 93 static inline void BLEND_OP(int I, u64 *W) in BLEND_OP() argument 95 W[I & 15] += s1(W[(I-2) & 15]) + W[(I-7) & 15] + s0(W[(I-15) & 15]); in BLEND_OP()
|
D | ansi_cprng.c | 43 unsigned char I[DEFAULT_BLK_SZ]; member 91 hexdump("Input I: ", ctx->I, DEFAULT_BLK_SZ); in _get_more_prng_bytes() 106 output = ctx->I; in _get_more_prng_bytes() 116 xor_vectors(ctx->I, ctx->V, tmp, DEFAULT_BLK_SZ); in _get_more_prng_bytes() 146 xor_vectors(ctx->rand_data, ctx->I, tmp, in _get_more_prng_bytes() 172 hexdump("Output I: ", ctx->I, DEFAULT_BLK_SZ); in _get_more_prng_bytes()
|
/crypto/asymmetric_keys/ |
D | tpm.asn1 | 3 -- http://david.woodhou.se/draft-woodhouse-cert-best-practice.html#I-D.mavrogiannopoulos-tpmuri
|