/crypto/ |
D | tea.c | 59 u32 y, z, n, sum = 0; in tea_encrypt() local 65 y = le32_to_cpu(in[0]); in tea_encrypt() 77 y += ((z << 4) + k0) ^ (z + sum) ^ ((z >> 5) + k1); in tea_encrypt() 78 z += ((y << 4) + k2) ^ (y + sum) ^ ((y >> 5) + k3); in tea_encrypt() 81 out[0] = cpu_to_le32(y); in tea_encrypt() 87 u32 y, z, n, sum; in tea_decrypt() local 93 y = le32_to_cpu(in[0]); in tea_decrypt() 106 z -= ((y << 4) + k2) ^ (y + sum) ^ ((y >> 5) + k3); in tea_decrypt() 107 y -= ((z << 4) + k0) ^ (z + sum) ^ ((z >> 5) + k1); in tea_decrypt() 111 out[0] = cpu_to_le32(y); in tea_decrypt() [all …]
|
D | streebog_generic.c | 852 const struct streebog_uint512 *y, in streebog_xor() argument 855 z->qword[0] = x->qword[0] ^ y->qword[0]; in streebog_xor() 856 z->qword[1] = x->qword[1] ^ y->qword[1]; in streebog_xor() 857 z->qword[2] = x->qword[2] ^ y->qword[2]; in streebog_xor() 858 z->qword[3] = x->qword[3] ^ y->qword[3]; in streebog_xor() 859 z->qword[4] = x->qword[4] ^ y->qword[4]; in streebog_xor() 860 z->qword[5] = x->qword[5] ^ y->qword[5]; in streebog_xor() 861 z->qword[6] = x->qword[6] ^ y->qword[6]; in streebog_xor() 862 z->qword[7] = x->qword[7] ^ y->qword[7]; in streebog_xor() 866 const struct streebog_uint512 *y, in streebog_xlps() argument [all …]
|
D | twofish_common.c | 468 #define CALC_S(a, b, c, d, i, w, x, y, z) \ argument 473 (c) ^= exp_to_poly[tmp + (y)]; \ 537 y = CALC_K_2 (m, n, m, n, 4); \ 538 y = rol32(y, 8); \ 539 x += y; y += x; ctx->a[j] = x; \ 540 ctx->a[(j) + 1] = rol32(y, 9) 550 y = CALC_K192_2 (n, n, m, m, 4); \ 551 y = rol32(y, 8); \ 552 x += y; y += x; ctx->a[j] = x; \ 553 ctx->a[(j) + 1] = rol32(y, 9) [all …]
|
D | sm2.c | 67 MPI x, y; in sm2_ec_ctx_init() local 77 y = mpi_scanval(ecp->g_y); in sm2_ec_ctx_init() 78 if (!x || !y) in sm2_ec_ctx_init() 95 mpi_set(ec->G->y, y); in sm2_ec_ctx_init() 114 mpi_free(y); in sm2_ec_ctx_init() 138 MPI x, y; in sm2_ecc_os2ec() local 161 y = mpi_read_raw_data(buf + 1 + n, n); in sm2_ecc_os2ec() 162 if (!y) in sm2_ecc_os2ec() 166 mpi_normalize(y); in sm2_ecc_os2ec() 168 mpi_set(result->y, y); in sm2_ecc_os2ec() [all …]
|
D | twofish_generic.c | 54 x = G1 (a); y = G2 (b); \ 55 x += y; y += x + ctx->k[2 * (n) + 1]; \ 58 (d) = rol32((d), 1) ^ y 61 x = G1 (a); y = G2 (b); \ 62 x += y; y += x; \ 63 (d) ^= y + ctx->k[2 * (n) + 1]; \ 105 u32 x, y; in twofish_encrypt() local 142 u32 x, y; in twofish_decrypt() local
|
D | ecrdsa_defs.h | 52 .y = cp256a_g_y, 85 .y = cp256b_g_y, 122 .y = cp256c_g_y, 171 .y = tc512a_g_y, 216 .y = tc512b_g_y,
|
D | ecc.h | 45 u64 *y; member 49 #define ECC_POINT_INIT(x, y, ndigits) (struct ecc_point) { x, y, ndigits } argument 257 const u64 *y, const struct ecc_point *q,
|
D | md5.c | 32 #define F1(x, y, z) (z ^ (x & (y ^ z))) argument 33 #define F2(x, y, z) F1(z, x, y) argument 34 #define F3(x, y, z) (x ^ y ^ z) argument 35 #define F4(x, y, z) (y ^ (x | ~z)) argument 37 #define MD5STEP(f, w, x, y, z, in, s) \ argument 38 (w += f(x, y, z) + in, w = (w<<s | w>>(32-s)) + x)
|
D | md4.c | 48 static inline u32 F(u32 x, u32 y, u32 z) in F() argument 50 return (x & y) | ((~x) & z); in F() 53 static inline u32 G(u32 x, u32 y, u32 z) in G() argument 55 return (x & y) | (x & z) | (y & z); in G() 58 static inline u32 H(u32 x, u32 y, u32 z) in H() argument 60 return x ^ y ^ z; in H()
|
D | dh.c | 110 static int dh_is_pubkey_valid(struct dh_ctx *ctx, MPI y) in dh_is_pubkey_valid() argument 121 if (mpi_cmp_ui(y, 1) < 1 || mpi_cmp(y, ctx->p) >= 0) in dh_is_pubkey_valid() 132 ret = mpi_powm(val, y, ctx->q, ctx->p); in dh_is_pubkey_valid()
|
D | sha512_generic.c | 43 static inline u64 Ch(u64 x, u64 y, u64 z) in Ch() argument 45 return z ^ (x & (y ^ z)); in Ch() 48 static inline u64 Maj(u64 x, u64 y, u64 z) in Maj() argument 50 return (x & y) | (z & (x | y)); in Maj()
|
D | ecc_curve_defs.h | 22 .y = nist_p192_g_y, 48 .y = nist_p256_g_y,
|
D | ecc.c | 84 p->y = ecc_alloc_digits_space(ndigits); in ecc_alloc_point() 85 if (!p->y) in ecc_alloc_point() 105 kfree_sensitive(p->y); in ecc_free_point() 939 vli_is_zero(point->y, point->ndigits)); in ecc_point_is_zero() 1163 vli_set(ry[1], point->y, ndigits); in ecc_point_mult() 1192 vli_mod_mult_fast(z, z, point->y, curve_prime, ndigits); in ecc_point_mult() 1202 vli_set(result->y, ry[0], ndigits); in ecc_point_mult() 1216 vli_set(result->y, q->y, ndigits); in ecc_point_add() 1219 vli_set(py, p->y, ndigits); in ecc_point_add() 1220 xycz_add(px, py, result->x, result->y, curve->p, ndigits); in ecc_point_add() [all …]
|
D | rmd256.c | 35 #define F1(x, y, z) (x ^ y ^ z) /* XOR */ argument 36 #define F2(x, y, z) (z ^ (x & (y ^ z))) /* x ? y : z */ argument 37 #define F3(x, y, z) ((x | ~y) ^ z) argument 38 #define F4(x, y, z) (y ^ (z & (x ^ y))) /* z ? x : y */ argument
|
D | rmd128.c | 35 #define F1(x, y, z) (x ^ y ^ z) /* XOR */ argument 36 #define F2(x, y, z) (z ^ (x & (y ^ z))) /* x ? y : z */ argument 37 #define F3(x, y, z) ((x | ~y) ^ z) argument 38 #define F4(x, y, z) (y ^ (z & (x ^ y))) /* z ? x : y */ argument
|
D | rmd160.c | 37 #define F1(x, y, z) (x ^ y ^ z) /* XOR */ argument 38 #define F2(x, y, z) (z ^ (x & (y ^ z))) /* x ? y : z */ argument 39 #define F3(x, y, z) ((x | ~y) ^ z) argument 40 #define F4(x, y, z) (y ^ (z & (x ^ y))) /* z ? x : y */ argument 41 #define F5(x, y, z) (x ^ (y | ~z)) argument
|
D | rmd320.c | 37 #define F1(x, y, z) (x ^ y ^ z) /* XOR */ argument 38 #define F2(x, y, z) (z ^ (x & (y ^ z))) /* x ? y : z */ argument 39 #define F3(x, y, z) ((x | ~y) ^ z) argument 40 #define F4(x, y, z) (y ^ (z & (x ^ y))) /* z ? x : y */ argument 41 #define F5(x, y, z) (x ^ (y | ~z)) argument
|
D | adiantum.c | 189 u64 y = le64_to_cpu(v2->b); in le128_add() local 191 r->b = cpu_to_le64(x + y); in le128_add() 193 (x + y < x)); in le128_add() 200 u64 y = le64_to_cpu(v2->b); in le128_sub() local 202 r->b = cpu_to_le64(x - y); in le128_sub() 204 (x - y > x)); in le128_sub()
|
D | ecrdsa.c | 243 vli_from_le64(ctx->pub_key.y, ctx->key + ndigits * sizeof(u64), in ecrdsa_set_pub_key()
|
D | Kconfig | 39 def_bool y 154 def_tristate CRYPTO_MANAGER || (CRYPTO_MANAGER!=n && CRYPTO_ALGAPI=y) 172 default y 367 default y 1861 default y 1949 default y
|
/crypto/asymmetric_keys/ |
D | Kconfig | 90 depends on PKCS7_MESSAGE_PARSER=y
|