Home
last modified time | relevance | path

Searched refs:v (Results 1 – 11 of 11) sorted by relevance

/crypto/
Daegis128-neon-inner.c25 uint8x16_t v[5]; member
43 vst1q_u8(state, st.v[0]); in aegis128_save_state_neon()
44 vst1q_u8(state + 16, st.v[1]); in aegis128_save_state_neon()
45 vst1q_u8(state + 32, st.v[2]); in aegis128_save_state_neon()
46 vst1q_u8(state + 48, st.v[3]); in aegis128_save_state_neon()
47 vst1q_u8(state + 64, st.v[4]); in aegis128_save_state_neon()
65 uint8x16_t v; in aegis_aes_round() local
72 v = vqtbl4q_u8(vld1q_u8_x4(crypto_aes_sbox), w); in aegis_aes_round()
73 v = vqtbx4q_u8(v, vld1q_u8_x4(crypto_aes_sbox + 0x40), w - 0x40); in aegis_aes_round()
74 v = vqtbx4q_u8(v, vld1q_u8_x4(crypto_aes_sbox + 0x80), w - 0x80); in aegis_aes_round()
[all …]
Dblake2b_generic.c60 G(r,0,v[ 0],v[ 4],v[ 8],v[12]); \
61 G(r,1,v[ 1],v[ 5],v[ 9],v[13]); \
62 G(r,2,v[ 2],v[ 6],v[10],v[14]); \
63 G(r,3,v[ 3],v[ 7],v[11],v[15]); \
64 G(r,4,v[ 0],v[ 5],v[10],v[15]); \
65 G(r,5,v[ 1],v[ 6],v[11],v[12]); \
66 G(r,6,v[ 2],v[ 7],v[ 8],v[13]); \
67 G(r,7,v[ 3],v[ 4],v[ 9],v[14]); \
74 u64 v[16]; in blake2b_compress_one_generic() local
81 v[i] = S->h[i]; in blake2b_compress_one_generic()
[all …]
Decc.c615 u64 *v[2] = { tmp, product }; in vli_mmod_slow() local
637 u64 diff = v[i][j] - mod_m[j] - borrow; in vli_mmod_slow()
639 if (diff != v[i][j]) in vli_mmod_slow()
640 borrow = (diff > v[i][j]); in vli_mmod_slow()
641 v[1 - i][j] = diff; in vli_mmod_slow()
648 vli_set(result, v[i], ndigits); in vli_mmod_slow()
991 u64 u[ECC_MAX_DIGITS], v[ECC_MAX_DIGITS]; in vli_mod_inv() local
1004 vli_clear(v, ndigits); in vli_mod_inv()
1021 if (!EVEN(v)) in vli_mod_inv()
1022 carry = vli_add(v, v, mod, ndigits); in vli_mod_inv()
[all …]
Danubis.c560 u32 v = ctx->E[R - r][i]; in anubis_setkey() local
562 T0[T4[(v >> 24) ] & 0xff] ^ in anubis_setkey()
563 T1[T4[(v >> 16) & 0xff] & 0xff] ^ in anubis_setkey()
564 T2[T4[(v >> 8) & 0xff] & 0xff] ^ in anubis_setkey()
565 T3[T4[(v ) & 0xff] & 0xff]; in anubis_setkey()
Dinternal.h127 int crypto_probing_notify(unsigned long val, void *v);
171 static inline void crypto_notify(unsigned long val, void *v) in crypto_notify() argument
173 blocking_notifier_call_chain(&crypto_chain, val, v); in crypto_notify()
Decrdsa.c82 u64 *v = e; /* e^{-1} \mod q */ in ecrdsa_verify() local
130 vli_mod_inv(v, e, ctx->curve->n, ndigits); in ecrdsa_verify()
133 vli_mod_mult_slow(z1, s, v, ctx->curve->n, ndigits); in ecrdsa_verify()
135 vli_mod_mult_slow(z2, _r, v, ctx->curve->n, ndigits); in ecrdsa_verify()
Dskcipher.c233 void *v; in skcipher_next_slow() local
259 v = kzalloc(n, skcipher_walk_gfp(walk)); in skcipher_next_slow()
260 if (!v) in skcipher_next_slow()
264 p = v; in skcipher_next_slow()
269 walk->buffer = v; in skcipher_next_slow()
270 buffer = v; in skcipher_next_slow()
Dapi.c286 int crypto_probing_notify(unsigned long val, void *v) in crypto_probing_notify() argument
290 ok = blocking_notifier_call_chain(&crypto_chain, val, v); in crypto_probing_notify()
293 ok = blocking_notifier_call_chain(&crypto_chain, val, v); in crypto_probing_notify()
Dtestmgr.h125 const char *v; member
21363 .v = "\x80\x00\x00\x00\x00\x00\x00\x00"
21377 .v = "\xc0\x00\x00\x00\x00\x00\x00\x00"
21391 .v = "\xe0\x00\x00\x00\x00\x00\x00\x00"
21405 .v = "\xf0\x00\x00\x00\x00\x00\x00\x00"
21419 .v = "\xf8\x00\x00\x00\x00\x00\x00\x00"
21433 .v = "\x57\x2c\x8e\x76\x87\x26\x47\x97"
Dtestmgr.c3463 memcpy(seed, template[i].v, template[i].vlen); in test_cprng()
/crypto/asymmetric_keys/
Dx509_cert_parser.c544 const unsigned char *v = value; in x509_process_extension() local
552 if (v[0] != ASN1_OTS || v[1] != vlen - 2) in x509_process_extension()
554 v += 2; in x509_process_extension()
558 ctx->cert->raw_skid = v; in x509_process_extension()
559 kid = asymmetric_key_generate_id(v, vlen, "", 0); in x509_process_extension()
569 ctx->raw_akid = v; in x509_process_extension()