/crypto/ |
D | rmd256.c | 36 #define F2(x, y, z) (z ^ (x & (y ^ z))) /* x ? y : z */ macro 101 ROUND(aa, bb, cc, dd, F2, K2, in[7], 7); in rmd256_transform() 102 ROUND(dd, aa, bb, cc, F2, K2, in[4], 6); in rmd256_transform() 103 ROUND(cc, dd, aa, bb, F2, K2, in[13], 8); in rmd256_transform() 104 ROUND(bb, cc, dd, aa, F2, K2, in[1], 13); in rmd256_transform() 105 ROUND(aa, bb, cc, dd, F2, K2, in[10], 11); in rmd256_transform() 106 ROUND(dd, aa, bb, cc, F2, K2, in[6], 9); in rmd256_transform() 107 ROUND(cc, dd, aa, bb, F2, K2, in[15], 7); in rmd256_transform() 108 ROUND(bb, cc, dd, aa, F2, K2, in[3], 15); in rmd256_transform() 109 ROUND(aa, bb, cc, dd, F2, K2, in[12], 7); in rmd256_transform() [all …]
|
D | rmd128.c | 36 #define F2(x, y, z) (z ^ (x & (y ^ z))) /* x ? y : z */ macro 80 ROUND(aa, bb, cc, dd, F2, K2, in[7], 7); in rmd128_transform() 81 ROUND(dd, aa, bb, cc, F2, K2, in[4], 6); in rmd128_transform() 82 ROUND(cc, dd, aa, bb, F2, K2, in[13], 8); in rmd128_transform() 83 ROUND(bb, cc, dd, aa, F2, K2, in[1], 13); in rmd128_transform() 84 ROUND(aa, bb, cc, dd, F2, K2, in[10], 11); in rmd128_transform() 85 ROUND(dd, aa, bb, cc, F2, K2, in[6], 9); in rmd128_transform() 86 ROUND(cc, dd, aa, bb, F2, K2, in[15], 7); in rmd128_transform() 87 ROUND(bb, cc, dd, aa, F2, K2, in[3], 15); in rmd128_transform() 88 ROUND(aa, bb, cc, dd, F2, K2, in[12], 7); in rmd128_transform() [all …]
|
D | md5.c | 33 #define F2(x, y, z) F1(z, x, y) macro 66 MD5STEP(F2, a, b, c, d, in[1] + 0xf61e2562, 5); in md5_transform() 67 MD5STEP(F2, d, a, b, c, in[6] + 0xc040b340, 9); in md5_transform() 68 MD5STEP(F2, c, d, a, b, in[11] + 0x265e5a51, 14); in md5_transform() 69 MD5STEP(F2, b, c, d, a, in[0] + 0xe9b6c7aa, 20); in md5_transform() 70 MD5STEP(F2, a, b, c, d, in[5] + 0xd62f105d, 5); in md5_transform() 71 MD5STEP(F2, d, a, b, c, in[10] + 0x02441453, 9); in md5_transform() 72 MD5STEP(F2, c, d, a, b, in[15] + 0xd8a1e681, 14); in md5_transform() 73 MD5STEP(F2, b, c, d, a, in[4] + 0xe7d3fbc8, 20); in md5_transform() 74 MD5STEP(F2, a, b, c, d, in[9] + 0x21e1cde6, 5); in md5_transform() [all …]
|
D | rmd160.c | 38 #define F2(x, y, z) (z ^ (x & (y ^ z))) /* x ? y : z */ macro 86 ROUND(ee, aa, bb, cc, dd, F2, K2, in[7], 7); in rmd160_transform() 87 ROUND(dd, ee, aa, bb, cc, F2, K2, in[4], 6); in rmd160_transform() 88 ROUND(cc, dd, ee, aa, bb, F2, K2, in[13], 8); in rmd160_transform() 89 ROUND(bb, cc, dd, ee, aa, F2, K2, in[1], 13); in rmd160_transform() 90 ROUND(aa, bb, cc, dd, ee, F2, K2, in[10], 11); in rmd160_transform() 91 ROUND(ee, aa, bb, cc, dd, F2, K2, in[6], 9); in rmd160_transform() 92 ROUND(dd, ee, aa, bb, cc, F2, K2, in[15], 7); in rmd160_transform() 93 ROUND(cc, dd, ee, aa, bb, F2, K2, in[3], 15); in rmd160_transform() 94 ROUND(bb, cc, dd, ee, aa, F2, K2, in[12], 7); in rmd160_transform() [all …]
|
D | rmd320.c | 38 #define F2(x, y, z) (z ^ (x & (y ^ z))) /* x ? y : z */ macro 107 ROUND(ee, aa, bb, cc, dd, F2, K2, in[7], 7); in rmd320_transform() 108 ROUND(dd, ee, aa, bb, cc, F2, K2, in[4], 6); in rmd320_transform() 109 ROUND(cc, dd, ee, aa, bb, F2, K2, in[13], 8); in rmd320_transform() 110 ROUND(bb, cc, dd, ee, aa, F2, K2, in[1], 13); in rmd320_transform() 111 ROUND(aa, bb, cc, dd, ee, F2, K2, in[10], 11); in rmd320_transform() 112 ROUND(ee, aa, bb, cc, dd, F2, K2, in[6], 9); in rmd320_transform() 113 ROUND(dd, ee, aa, bb, cc, F2, K2, in[15], 7); in rmd320_transform() 114 ROUND(cc, dd, ee, aa, bb, F2, K2, in[3], 15); in rmd320_transform() 115 ROUND(bb, cc, dd, ee, aa, F2, K2, in[12], 7); in rmd320_transform() [all …]
|
D | cast5_generic.c | 297 #define F2(D, m, r) ((I = ((m) ^ (D))), (I = rol32(I, (r))), \ macro 330 t = l; l = r; r = t ^ F2(r, Km[1], Kr[1]); in __cast5_encrypt() 333 t = l; l = r; r = t ^ F2(r, Km[4], Kr[4]); in __cast5_encrypt() 336 t = l; l = r; r = t ^ F2(r, Km[7], Kr[7]); in __cast5_encrypt() 339 t = l; l = r; r = t ^ F2(r, Km[10], Kr[10]); in __cast5_encrypt() 343 t = l; l = r; r = t ^ F2(r, Km[13], Kr[13]); in __cast5_encrypt() 378 t = l; l = r; r = t ^ F2(r, Km[13], Kr[13]); in __cast5_decrypt() 382 t = l; l = r; r = t ^ F2(r, Km[10], Kr[10]); in __cast5_decrypt() 385 t = l; l = r; r = t ^ F2(r, Km[7], Kr[7]); in __cast5_decrypt() 388 t = l; l = r; r = t ^ F2(r, Km[4], Kr[4]); in __cast5_decrypt() [all …]
|
D | cast6_generic.c | 29 #define F2(D, r, m) ((I = ((m) ^ (D))), (I = rol32(I, (r))), \ macro 97 key[5] ^= F2(key[6], Tr[i % 4][1], Tm[i][1]); in W() 100 key[2] ^= F2(key[3], Tr[i % 4][4], Tm[i][4]); in W() 103 key[7] ^= F2(key[0], Tr[i % 4][7], Tm[i][7]); in W() 157 block[1] ^= F2(block[2], Kr[1], Km[1]); in Q() 168 block[1] ^= F2(block[2], Kr[1], Km[1]); in QBAR()
|