Home
last modified time | relevance | path

Searched refs:y (Results 1 – 21 of 21) sorted by relevance

/crypto/
Dtea.c59 u32 y, z, n, sum = 0; in tea_encrypt() local
65 y = le32_to_cpu(in[0]); in tea_encrypt()
77 y += ((z << 4) + k0) ^ (z + sum) ^ ((z >> 5) + k1); in tea_encrypt()
78 z += ((y << 4) + k2) ^ (y + sum) ^ ((y >> 5) + k3); in tea_encrypt()
81 out[0] = cpu_to_le32(y); in tea_encrypt()
87 u32 y, z, n, sum; in tea_decrypt() local
93 y = le32_to_cpu(in[0]); in tea_decrypt()
106 z -= ((y << 4) + k2) ^ (y + sum) ^ ((y >> 5) + k3); in tea_decrypt()
107 y -= ((z << 4) + k0) ^ (z + sum) ^ ((z >> 5) + k1); in tea_decrypt()
111 out[0] = cpu_to_le32(y); in tea_decrypt()
[all …]
Dstreebog_generic.c852 const struct streebog_uint512 *y, in streebog_xor() argument
855 z->qword[0] = x->qword[0] ^ y->qword[0]; in streebog_xor()
856 z->qword[1] = x->qword[1] ^ y->qword[1]; in streebog_xor()
857 z->qword[2] = x->qword[2] ^ y->qword[2]; in streebog_xor()
858 z->qword[3] = x->qword[3] ^ y->qword[3]; in streebog_xor()
859 z->qword[4] = x->qword[4] ^ y->qword[4]; in streebog_xor()
860 z->qword[5] = x->qword[5] ^ y->qword[5]; in streebog_xor()
861 z->qword[6] = x->qword[6] ^ y->qword[6]; in streebog_xor()
862 z->qword[7] = x->qword[7] ^ y->qword[7]; in streebog_xor()
866 const struct streebog_uint512 *y, in streebog_xlps() argument
[all …]
Dtwofish_common.c468 #define CALC_S(a, b, c, d, i, w, x, y, z) \ argument
473 (c) ^= exp_to_poly[tmp + (y)]; \
537 y = CALC_K_2 (m, n, m, n, 4); \
538 y = rol32(y, 8); \
539 x += y; y += x; ctx->a[j] = x; \
540 ctx->a[(j) + 1] = rol32(y, 9)
550 y = CALC_K192_2 (n, n, m, m, 4); \
551 y = rol32(y, 8); \
552 x += y; y += x; ctx->a[j] = x; \
553 ctx->a[(j) + 1] = rol32(y, 9)
[all …]
Dsm2.c67 MPI x, y; in sm2_ec_ctx_init() local
77 y = mpi_scanval(ecp->g_y); in sm2_ec_ctx_init()
78 if (!x || !y) in sm2_ec_ctx_init()
95 mpi_set(ec->G->y, y); in sm2_ec_ctx_init()
114 mpi_free(y); in sm2_ec_ctx_init()
138 MPI x, y; in sm2_ecc_os2ec() local
161 y = mpi_read_raw_data(buf + 1 + n, n); in sm2_ecc_os2ec()
162 if (!y) in sm2_ecc_os2ec()
166 mpi_normalize(y); in sm2_ecc_os2ec()
168 mpi_set(result->y, y); in sm2_ecc_os2ec()
[all …]
Dtwofish_generic.c54 x = G1 (a); y = G2 (b); \
55 x += y; y += x + ctx->k[2 * (n) + 1]; \
58 (d) = rol32((d), 1) ^ y
61 x = G1 (a); y = G2 (b); \
62 x += y; y += x; \
63 (d) ^= y + ctx->k[2 * (n) + 1]; \
105 u32 x, y; in twofish_encrypt() local
142 u32 x, y; in twofish_decrypt() local
Decrdsa_defs.h52 .y = cp256a_g_y,
85 .y = cp256b_g_y,
122 .y = cp256c_g_y,
171 .y = tc512a_g_y,
216 .y = tc512b_g_y,
Decc.h45 u64 *y; member
49 #define ECC_POINT_INIT(x, y, ndigits) (struct ecc_point) { x, y, ndigits } argument
257 const u64 *y, const struct ecc_point *q,
Dmd5.c32 #define F1(x, y, z) (z ^ (x & (y ^ z))) argument
33 #define F2(x, y, z) F1(z, x, y) argument
34 #define F3(x, y, z) (x ^ y ^ z) argument
35 #define F4(x, y, z) (y ^ (x | ~z)) argument
37 #define MD5STEP(f, w, x, y, z, in, s) \ argument
38 (w += f(x, y, z) + in, w = (w<<s | w>>(32-s)) + x)
Dmd4.c48 static inline u32 F(u32 x, u32 y, u32 z) in F() argument
50 return (x & y) | ((~x) & z); in F()
53 static inline u32 G(u32 x, u32 y, u32 z) in G() argument
55 return (x & y) | (x & z) | (y & z); in G()
58 static inline u32 H(u32 x, u32 y, u32 z) in H() argument
60 return x ^ y ^ z; in H()
Ddh.c110 static int dh_is_pubkey_valid(struct dh_ctx *ctx, MPI y) in dh_is_pubkey_valid() argument
121 if (mpi_cmp_ui(y, 1) < 1 || mpi_cmp(y, ctx->p) >= 0) in dh_is_pubkey_valid()
132 ret = mpi_powm(val, y, ctx->q, ctx->p); in dh_is_pubkey_valid()
Dsha512_generic.c43 static inline u64 Ch(u64 x, u64 y, u64 z) in Ch() argument
45 return z ^ (x & (y ^ z)); in Ch()
48 static inline u64 Maj(u64 x, u64 y, u64 z) in Maj() argument
50 return (x & y) | (z & (x | y)); in Maj()
Decc_curve_defs.h22 .y = nist_p192_g_y,
48 .y = nist_p256_g_y,
Decc.c84 p->y = ecc_alloc_digits_space(ndigits); in ecc_alloc_point()
85 if (!p->y) in ecc_alloc_point()
105 kfree_sensitive(p->y); in ecc_free_point()
939 vli_is_zero(point->y, point->ndigits)); in ecc_point_is_zero()
1163 vli_set(ry[1], point->y, ndigits); in ecc_point_mult()
1192 vli_mod_mult_fast(z, z, point->y, curve_prime, ndigits); in ecc_point_mult()
1202 vli_set(result->y, ry[0], ndigits); in ecc_point_mult()
1216 vli_set(result->y, q->y, ndigits); in ecc_point_add()
1219 vli_set(py, p->y, ndigits); in ecc_point_add()
1220 xycz_add(px, py, result->x, result->y, curve->p, ndigits); in ecc_point_add()
[all …]
Drmd256.c35 #define F1(x, y, z) (x ^ y ^ z) /* XOR */ argument
36 #define F2(x, y, z) (z ^ (x & (y ^ z))) /* x ? y : z */ argument
37 #define F3(x, y, z) ((x | ~y) ^ z) argument
38 #define F4(x, y, z) (y ^ (z & (x ^ y))) /* z ? x : y */ argument
Drmd128.c35 #define F1(x, y, z) (x ^ y ^ z) /* XOR */ argument
36 #define F2(x, y, z) (z ^ (x & (y ^ z))) /* x ? y : z */ argument
37 #define F3(x, y, z) ((x | ~y) ^ z) argument
38 #define F4(x, y, z) (y ^ (z & (x ^ y))) /* z ? x : y */ argument
Drmd160.c37 #define F1(x, y, z) (x ^ y ^ z) /* XOR */ argument
38 #define F2(x, y, z) (z ^ (x & (y ^ z))) /* x ? y : z */ argument
39 #define F3(x, y, z) ((x | ~y) ^ z) argument
40 #define F4(x, y, z) (y ^ (z & (x ^ y))) /* z ? x : y */ argument
41 #define F5(x, y, z) (x ^ (y | ~z)) argument
Drmd320.c37 #define F1(x, y, z) (x ^ y ^ z) /* XOR */ argument
38 #define F2(x, y, z) (z ^ (x & (y ^ z))) /* x ? y : z */ argument
39 #define F3(x, y, z) ((x | ~y) ^ z) argument
40 #define F4(x, y, z) (y ^ (z & (x ^ y))) /* z ? x : y */ argument
41 #define F5(x, y, z) (x ^ (y | ~z)) argument
Dadiantum.c189 u64 y = le64_to_cpu(v2->b); in le128_add() local
191 r->b = cpu_to_le64(x + y); in le128_add()
193 (x + y < x)); in le128_add()
200 u64 y = le64_to_cpu(v2->b); in le128_sub() local
202 r->b = cpu_to_le64(x - y); in le128_sub()
204 (x - y > x)); in le128_sub()
Decrdsa.c243 vli_from_le64(ctx->pub_key.y, ctx->key + ndigits * sizeof(u64), in ecrdsa_set_pub_key()
DKconfig39 def_bool y
154 def_tristate CRYPTO_MANAGER || (CRYPTO_MANAGER!=n && CRYPTO_ALGAPI=y)
172 default y
367 default y
1861 default y
1949 default y
/crypto/asymmetric_keys/
DKconfig90 depends on PKCS7_MESSAGE_PARSER=y