/crypto/ |
D | sha512_generic.c | 101 u64 a, b, c, d, e, f, g, h, t1, t2; in sha512_transform() local 108 e=state[4]; f=state[5]; g=state[6]; h=state[7]; in sha512_transform() 126 t1 = h + e1(e) + Ch(e,f,g) + sha512_K[i ] + W[(i & 15)]; in sha512_transform() 128 t1 = g + e1(d) + Ch(d,e,f) + sha512_K[i+1] + W[(i & 15) + 1]; in sha512_transform() 129 t2 = e0(h) + Maj(h,a,b); c+=t1; g=t1+t2; in sha512_transform() 131 t2 = e0(g) + Maj(g,h,a); b+=t1; f=t1+t2; in sha512_transform() 133 t2 = e0(f) + Maj(f,g,h); a+=t1; e=t1+t2; in sha512_transform() 135 t2 = e0(e) + Maj(e,f,g); h+=t1; d=t1+t2; in sha512_transform() 137 t2 = e0(d) + Maj(d,e,f); g+=t1; c=t1+t2; in sha512_transform() 138 t1 = b + e1(g) + Ch(g,h,a) + sha512_K[i+6] + W[(i & 15) + 6]; in sha512_transform() [all …]
|
D | sm3_generic.c | 44 static inline u32 gg(unsigned int n, u32 e, u32 f, u32 g) in gg() argument 46 return (n < 16) ? (e ^ f ^ g) : ((e & f) | ((~e) & g)); in gg() 78 u32 a, b, c, d, e, f, g, h; in sm3_compress() local 87 g = m[6]; in sm3_compress() 99 tt2 = gg(i, e, f, g) + h + ss1 + *w; in sm3_compress() 106 h = g; in sm3_compress() 107 g = rol32(f, 19); in sm3_compress() 118 m[6] = g ^ m[6]; in sm3_compress() 121 a = b = c = d = e = f = g = h = ss1 = ss2 = tt1 = tt2 = 0; in sm3_compress()
|
D | ecrdsa_defs.h | 50 .g = { 83 .g = { 120 .g = { 169 .g = { 214 .g = {
|
D | dh.c | 17 MPI g; /* Value is guaranteed to be set. */ member 25 mpi_free(ctx->g); in dh_clear_ctx() 67 ctx->g = mpi_read_raw_data(params->g, params->g_size); in dh_set_params() 68 if (!ctx->g) in dh_set_params() 175 base = ctx->g; in dh_compute_value()
|
D | ecrdsa.c | 96 req->dst_len != ctx->curve->g.ndigits * sizeof(u64) || in ecrdsa_verify() 97 ctx->pub_key.ndigits != ctx->curve->g.ndigits || in ecrdsa_verify() 137 ecc_point_mult_shamir(&cc, z1, &ctx->curve->g, z2, &ctx->pub_key, in ecrdsa_verify() 228 ctx->curve->g.ndigits * sizeof(u64) != ctx->digest_len) in ecrdsa_set_pub_key() 236 ctx->key_len != ctx->curve->g.ndigits * sizeof(u64) * 2) in ecrdsa_set_pub_key()
|
D | ecc_curve_defs.h | 20 .g = { 46 .g = {
|
D | gf128mul.c | 260 struct gf128mul_64k *gf128mul_init_64k_bbe(const be128 *g) in gf128mul_init_64k_bbe() argument 278 t->t[0]->t[1] = *g; in gf128mul_init_64k_bbe() 341 struct gf128mul_4k *gf128mul_init_4k_lle(const be128 *g) in gf128mul_init_4k_lle() argument 350 t->t[128] = *g; in gf128mul_init_4k_lle() 363 struct gf128mul_4k *gf128mul_init_4k_bbe(const be128 *g) in gf128mul_init_4k_bbe() argument 372 t->t[1] = *g; in gf128mul_init_4k_bbe()
|
D | dh_helper.c | 61 ptr = dh_pack_data(ptr, end, params->g, params->g_size); in crypto_dh_encode_key() 101 params->g = (void *)(ptr + params->key_size + params->p_size + in crypto_dh_decode_key()
|
D | ecc.h | 66 struct ecc_point g; member
|
D | ecc.c | 1213 unsigned int ndigits = curve->g.ndigits; in ecc_point_add() 1237 unsigned int ndigits = curve->g.ndigits; in ecc_point_mult_shamir() 1303 if (curve->g.ndigits != ndigits) in __ecc_is_key_valid() 1406 ecc_point_mult(pk, &curve->g, priv, NULL, curve, ndigits); in ecc_make_pub_key() 1428 if (WARN_ON(pk->ndigits != curve->g.ndigits)) in ecc_is_pubkey_valid_partial()
|
D | Kconfig | 514 building for a particular system that requires it (e.g., when 1168 without hardware AES acceleration (e.g. caam crypto). It reduces the
|
/crypto/async_tx/ |
D | async_raid6_recov.c | 189 struct page *p, *q, *g, *dp, *dq; in __2data_recov_5() local 212 g = blocks[good]; in __2data_recov_5() 222 tx = async_memcpy(dp, g, 0, 0, bytes, submit); in __2data_recov_5() 224 tx = async_mult(dq, g, raid6_gfexp[good], bytes, submit); in __2data_recov_5() 474 struct page *g = blocks[good]; in async_raid6_datap_recov() local 478 tx = async_memcpy(p, g, 0, 0, bytes, submit); in async_raid6_datap_recov() 482 tx = async_mult(dq, g, raid6_gfexp[good], bytes, submit); in async_raid6_datap_recov()
|