Home
last modified time | relevance | path

Searched refs:I (Results 1 – 5 of 5) sorted by relevance

/crypto/
Dcast6_generic.c27 #define F1(D, r, m) ((I = ((m) + (D))), (I = rol32(I, (r))), \
28 (((s1[I >> 24] ^ s2[(I>>16)&0xff]) - s3[(I>>8)&0xff]) + s4[I&0xff]))
29 #define F2(D, r, m) ((I = ((m) ^ (D))), (I = rol32(I, (r))), \
30 (((s1[I >> 24] - s2[(I>>16)&0xff]) + s3[(I>>8)&0xff]) ^ s4[I&0xff]))
31 #define F3(D, r, m) ((I = ((m) - (D))), (I = rol32(I, (r))), \
32 (((s1[I >> 24] + s2[(I>>16)&0xff]) ^ s3[(I>>8)&0xff]) - s4[I&0xff]))
95 u32 I; in W() local
159 u32 I; in Q() local
169 u32 I; in QBAR() local
Dcast5_generic.c295 #define F1(D, m, r) ((I = ((m) + (D))), (I = rol32(I, (r))), \
296 (((s1[I >> 24] ^ s2[(I>>16)&0xff]) - s3[(I>>8)&0xff]) + s4[I&0xff]))
297 #define F2(D, m, r) ((I = ((m) ^ (D))), (I = rol32(I, (r))), \
298 (((s1[I >> 24] - s2[(I>>16)&0xff]) + s3[(I>>8)&0xff]) ^ s4[I&0xff]))
299 #define F3(D, m, r) ((I = ((m) - (D))), (I = rol32(I, (r))), \
300 (((s1[I >> 24] + s2[(I>>16)&0xff]) ^ s3[(I>>8)&0xff]) - s4[I&0xff]))
308 u32 I; /* used by the Fx macros */ in __cast5_encrypt() local
365 u32 I; in __cast5_decrypt() local
Dsha512_generic.c88 static inline void LOAD_OP(int I, u64 *W, const u8 *input) in LOAD_OP() argument
90 W[I] = get_unaligned_be64((__u64 *)input + I); in LOAD_OP()
93 static inline void BLEND_OP(int I, u64 *W) in BLEND_OP() argument
95 W[I & 15] += s1(W[(I-2) & 15]) + W[(I-7) & 15] + s0(W[(I-15) & 15]); in BLEND_OP()
Dansi_cprng.c43 unsigned char I[DEFAULT_BLK_SZ]; member
91 hexdump("Input I: ", ctx->I, DEFAULT_BLK_SZ); in _get_more_prng_bytes()
106 output = ctx->I; in _get_more_prng_bytes()
116 xor_vectors(ctx->I, ctx->V, tmp, DEFAULT_BLK_SZ); in _get_more_prng_bytes()
146 xor_vectors(ctx->rand_data, ctx->I, tmp, in _get_more_prng_bytes()
172 hexdump("Output I: ", ctx->I, DEFAULT_BLK_SZ); in _get_more_prng_bytes()
/crypto/asymmetric_keys/
Dtpm.asn13 -- http://david.woodhou.se/draft-woodhouse-cert-best-practice.html#I-D.mavrogiannopoulos-tpmuri