/crypto/ |
D | aegis128-neon-inner.c | 25 uint8x16_t v[5]; member 43 vst1q_u8(state, st.v[0]); in aegis128_save_state_neon() 44 vst1q_u8(state + 16, st.v[1]); in aegis128_save_state_neon() 45 vst1q_u8(state + 32, st.v[2]); in aegis128_save_state_neon() 46 vst1q_u8(state + 48, st.v[3]); in aegis128_save_state_neon() 47 vst1q_u8(state + 64, st.v[4]); in aegis128_save_state_neon() 65 uint8x16_t v; in aegis_aes_round() local 72 v = vqtbl4q_u8(vld1q_u8_x4(crypto_aes_sbox), w); in aegis_aes_round() 73 v = vqtbx4q_u8(v, vld1q_u8_x4(crypto_aes_sbox + 0x40), w - 0x40); in aegis_aes_round() 74 v = vqtbx4q_u8(v, vld1q_u8_x4(crypto_aes_sbox + 0x80), w - 0x80); in aegis_aes_round() [all …]
|
D | blake2b_generic.c | 60 G(r,0,v[ 0],v[ 4],v[ 8],v[12]); \ 61 G(r,1,v[ 1],v[ 5],v[ 9],v[13]); \ 62 G(r,2,v[ 2],v[ 6],v[10],v[14]); \ 63 G(r,3,v[ 3],v[ 7],v[11],v[15]); \ 64 G(r,4,v[ 0],v[ 5],v[10],v[15]); \ 65 G(r,5,v[ 1],v[ 6],v[11],v[12]); \ 66 G(r,6,v[ 2],v[ 7],v[ 8],v[13]); \ 67 G(r,7,v[ 3],v[ 4],v[ 9],v[14]); \ 74 u64 v[16]; in blake2b_compress_one_generic() local 81 v[i] = S->h[i]; in blake2b_compress_one_generic() [all …]
|
D | ecc.c | 615 u64 *v[2] = { tmp, product }; in vli_mmod_slow() local 637 u64 diff = v[i][j] - mod_m[j] - borrow; in vli_mmod_slow() 639 if (diff != v[i][j]) in vli_mmod_slow() 640 borrow = (diff > v[i][j]); in vli_mmod_slow() 641 v[1 - i][j] = diff; in vli_mmod_slow() 648 vli_set(result, v[i], ndigits); in vli_mmod_slow() 991 u64 u[ECC_MAX_DIGITS], v[ECC_MAX_DIGITS]; in vli_mod_inv() local 1004 vli_clear(v, ndigits); in vli_mod_inv() 1021 if (!EVEN(v)) in vli_mod_inv() 1022 carry = vli_add(v, v, mod, ndigits); in vli_mod_inv() [all …]
|
D | anubis.c | 560 u32 v = ctx->E[R - r][i]; in anubis_setkey() local 562 T0[T4[(v >> 24) ] & 0xff] ^ in anubis_setkey() 563 T1[T4[(v >> 16) & 0xff] & 0xff] ^ in anubis_setkey() 564 T2[T4[(v >> 8) & 0xff] & 0xff] ^ in anubis_setkey() 565 T3[T4[(v ) & 0xff] & 0xff]; in anubis_setkey()
|
D | internal.h | 127 int crypto_probing_notify(unsigned long val, void *v); 171 static inline void crypto_notify(unsigned long val, void *v) in crypto_notify() argument 173 blocking_notifier_call_chain(&crypto_chain, val, v); in crypto_notify()
|
D | ecrdsa.c | 82 u64 *v = e; /* e^{-1} \mod q */ in ecrdsa_verify() local 130 vli_mod_inv(v, e, ctx->curve->n, ndigits); in ecrdsa_verify() 133 vli_mod_mult_slow(z1, s, v, ctx->curve->n, ndigits); in ecrdsa_verify() 135 vli_mod_mult_slow(z2, _r, v, ctx->curve->n, ndigits); in ecrdsa_verify()
|
D | skcipher.c | 233 void *v; in skcipher_next_slow() local 259 v = kzalloc(n, skcipher_walk_gfp(walk)); in skcipher_next_slow() 260 if (!v) in skcipher_next_slow() 264 p = v; in skcipher_next_slow() 269 walk->buffer = v; in skcipher_next_slow() 270 buffer = v; in skcipher_next_slow()
|
D | api.c | 286 int crypto_probing_notify(unsigned long val, void *v) in crypto_probing_notify() argument 290 ok = blocking_notifier_call_chain(&crypto_chain, val, v); in crypto_probing_notify() 293 ok = blocking_notifier_call_chain(&crypto_chain, val, v); in crypto_probing_notify()
|
D | testmgr.h | 125 const char *v; member 21363 .v = "\x80\x00\x00\x00\x00\x00\x00\x00" 21377 .v = "\xc0\x00\x00\x00\x00\x00\x00\x00" 21391 .v = "\xe0\x00\x00\x00\x00\x00\x00\x00" 21405 .v = "\xf0\x00\x00\x00\x00\x00\x00\x00" 21419 .v = "\xf8\x00\x00\x00\x00\x00\x00\x00" 21433 .v = "\x57\x2c\x8e\x76\x87\x26\x47\x97"
|
D | testmgr.c | 3463 memcpy(seed, template[i].v, template[i].vlen); in test_cprng()
|
/crypto/asymmetric_keys/ |
D | x509_cert_parser.c | 544 const unsigned char *v = value; in x509_process_extension() local 552 if (v[0] != ASN1_OTS || v[1] != vlen - 2) in x509_process_extension() 554 v += 2; in x509_process_extension() 558 ctx->cert->raw_skid = v; in x509_process_extension() 559 kid = asymmetric_key_generate_id(v, vlen, "", 0); in x509_process_extension() 569 ctx->raw_akid = v; in x509_process_extension()
|