Home
last modified time | relevance | path

Searched refs:F2 (Results 1 – 7 of 7) sorted by relevance

/crypto/
Drmd256.c36 #define F2(x, y, z) (z ^ (x & (y ^ z))) /* x ? y : z */ macro
101 ROUND(aa, bb, cc, dd, F2, K2, in[7], 7); in rmd256_transform()
102 ROUND(dd, aa, bb, cc, F2, K2, in[4], 6); in rmd256_transform()
103 ROUND(cc, dd, aa, bb, F2, K2, in[13], 8); in rmd256_transform()
104 ROUND(bb, cc, dd, aa, F2, K2, in[1], 13); in rmd256_transform()
105 ROUND(aa, bb, cc, dd, F2, K2, in[10], 11); in rmd256_transform()
106 ROUND(dd, aa, bb, cc, F2, K2, in[6], 9); in rmd256_transform()
107 ROUND(cc, dd, aa, bb, F2, K2, in[15], 7); in rmd256_transform()
108 ROUND(bb, cc, dd, aa, F2, K2, in[3], 15); in rmd256_transform()
109 ROUND(aa, bb, cc, dd, F2, K2, in[12], 7); in rmd256_transform()
[all …]
Drmd128.c36 #define F2(x, y, z) (z ^ (x & (y ^ z))) /* x ? y : z */ macro
80 ROUND(aa, bb, cc, dd, F2, K2, in[7], 7); in rmd128_transform()
81 ROUND(dd, aa, bb, cc, F2, K2, in[4], 6); in rmd128_transform()
82 ROUND(cc, dd, aa, bb, F2, K2, in[13], 8); in rmd128_transform()
83 ROUND(bb, cc, dd, aa, F2, K2, in[1], 13); in rmd128_transform()
84 ROUND(aa, bb, cc, dd, F2, K2, in[10], 11); in rmd128_transform()
85 ROUND(dd, aa, bb, cc, F2, K2, in[6], 9); in rmd128_transform()
86 ROUND(cc, dd, aa, bb, F2, K2, in[15], 7); in rmd128_transform()
87 ROUND(bb, cc, dd, aa, F2, K2, in[3], 15); in rmd128_transform()
88 ROUND(aa, bb, cc, dd, F2, K2, in[12], 7); in rmd128_transform()
[all …]
Dmd5.c33 #define F2(x, y, z) F1(z, x, y) macro
66 MD5STEP(F2, a, b, c, d, in[1] + 0xf61e2562, 5); in md5_transform()
67 MD5STEP(F2, d, a, b, c, in[6] + 0xc040b340, 9); in md5_transform()
68 MD5STEP(F2, c, d, a, b, in[11] + 0x265e5a51, 14); in md5_transform()
69 MD5STEP(F2, b, c, d, a, in[0] + 0xe9b6c7aa, 20); in md5_transform()
70 MD5STEP(F2, a, b, c, d, in[5] + 0xd62f105d, 5); in md5_transform()
71 MD5STEP(F2, d, a, b, c, in[10] + 0x02441453, 9); in md5_transform()
72 MD5STEP(F2, c, d, a, b, in[15] + 0xd8a1e681, 14); in md5_transform()
73 MD5STEP(F2, b, c, d, a, in[4] + 0xe7d3fbc8, 20); in md5_transform()
74 MD5STEP(F2, a, b, c, d, in[9] + 0x21e1cde6, 5); in md5_transform()
[all …]
Drmd160.c38 #define F2(x, y, z) (z ^ (x & (y ^ z))) /* x ? y : z */ macro
86 ROUND(ee, aa, bb, cc, dd, F2, K2, in[7], 7); in rmd160_transform()
87 ROUND(dd, ee, aa, bb, cc, F2, K2, in[4], 6); in rmd160_transform()
88 ROUND(cc, dd, ee, aa, bb, F2, K2, in[13], 8); in rmd160_transform()
89 ROUND(bb, cc, dd, ee, aa, F2, K2, in[1], 13); in rmd160_transform()
90 ROUND(aa, bb, cc, dd, ee, F2, K2, in[10], 11); in rmd160_transform()
91 ROUND(ee, aa, bb, cc, dd, F2, K2, in[6], 9); in rmd160_transform()
92 ROUND(dd, ee, aa, bb, cc, F2, K2, in[15], 7); in rmd160_transform()
93 ROUND(cc, dd, ee, aa, bb, F2, K2, in[3], 15); in rmd160_transform()
94 ROUND(bb, cc, dd, ee, aa, F2, K2, in[12], 7); in rmd160_transform()
[all …]
Drmd320.c38 #define F2(x, y, z) (z ^ (x & (y ^ z))) /* x ? y : z */ macro
107 ROUND(ee, aa, bb, cc, dd, F2, K2, in[7], 7); in rmd320_transform()
108 ROUND(dd, ee, aa, bb, cc, F2, K2, in[4], 6); in rmd320_transform()
109 ROUND(cc, dd, ee, aa, bb, F2, K2, in[13], 8); in rmd320_transform()
110 ROUND(bb, cc, dd, ee, aa, F2, K2, in[1], 13); in rmd320_transform()
111 ROUND(aa, bb, cc, dd, ee, F2, K2, in[10], 11); in rmd320_transform()
112 ROUND(ee, aa, bb, cc, dd, F2, K2, in[6], 9); in rmd320_transform()
113 ROUND(dd, ee, aa, bb, cc, F2, K2, in[15], 7); in rmd320_transform()
114 ROUND(cc, dd, ee, aa, bb, F2, K2, in[3], 15); in rmd320_transform()
115 ROUND(bb, cc, dd, ee, aa, F2, K2, in[12], 7); in rmd320_transform()
[all …]
Dcast5_generic.c297 #define F2(D, m, r) ((I = ((m) ^ (D))), (I = rol32(I, (r))), \ macro
330 t = l; l = r; r = t ^ F2(r, Km[1], Kr[1]); in __cast5_encrypt()
333 t = l; l = r; r = t ^ F2(r, Km[4], Kr[4]); in __cast5_encrypt()
336 t = l; l = r; r = t ^ F2(r, Km[7], Kr[7]); in __cast5_encrypt()
339 t = l; l = r; r = t ^ F2(r, Km[10], Kr[10]); in __cast5_encrypt()
343 t = l; l = r; r = t ^ F2(r, Km[13], Kr[13]); in __cast5_encrypt()
378 t = l; l = r; r = t ^ F2(r, Km[13], Kr[13]); in __cast5_decrypt()
382 t = l; l = r; r = t ^ F2(r, Km[10], Kr[10]); in __cast5_decrypt()
385 t = l; l = r; r = t ^ F2(r, Km[7], Kr[7]); in __cast5_decrypt()
388 t = l; l = r; r = t ^ F2(r, Km[4], Kr[4]); in __cast5_decrypt()
[all …]
Dcast6_generic.c29 #define F2(D, r, m) ((I = ((m) ^ (D))), (I = rol32(I, (r))), \ macro
97 key[5] ^= F2(key[6], Tr[i % 4][1], Tm[i][1]); in W()
100 key[2] ^= F2(key[3], Tr[i % 4][4], Tm[i][4]); in W()
103 key[7] ^= F2(key[0], Tr[i % 4][7], Tm[i][7]); in W()
157 block[1] ^= F2(block[2], Kr[1], Km[1]); in Q()
168 block[1] ^= F2(block[2], Kr[1], Km[1]); in QBAR()