Home
last modified time | relevance | path

Searched refs:g (Results 1 – 12 of 12) sorted by relevance

/crypto/
Dsha512_generic.c101 u64 a, b, c, d, e, f, g, h, t1, t2; in sha512_transform() local
108 e=state[4]; f=state[5]; g=state[6]; h=state[7]; in sha512_transform()
126 t1 = h + e1(e) + Ch(e,f,g) + sha512_K[i ] + W[(i & 15)]; in sha512_transform()
128 t1 = g + e1(d) + Ch(d,e,f) + sha512_K[i+1] + W[(i & 15) + 1]; in sha512_transform()
129 t2 = e0(h) + Maj(h,a,b); c+=t1; g=t1+t2; in sha512_transform()
131 t2 = e0(g) + Maj(g,h,a); b+=t1; f=t1+t2; in sha512_transform()
133 t2 = e0(f) + Maj(f,g,h); a+=t1; e=t1+t2; in sha512_transform()
135 t2 = e0(e) + Maj(e,f,g); h+=t1; d=t1+t2; in sha512_transform()
137 t2 = e0(d) + Maj(d,e,f); g+=t1; c=t1+t2; in sha512_transform()
138 t1 = b + e1(g) + Ch(g,h,a) + sha512_K[i+6] + W[(i & 15) + 6]; in sha512_transform()
[all …]
Dsm3_generic.c44 static inline u32 gg(unsigned int n, u32 e, u32 f, u32 g) in gg() argument
46 return (n < 16) ? (e ^ f ^ g) : ((e & f) | ((~e) & g)); in gg()
78 u32 a, b, c, d, e, f, g, h; in sm3_compress() local
87 g = m[6]; in sm3_compress()
99 tt2 = gg(i, e, f, g) + h + ss1 + *w; in sm3_compress()
106 h = g; in sm3_compress()
107 g = rol32(f, 19); in sm3_compress()
118 m[6] = g ^ m[6]; in sm3_compress()
121 a = b = c = d = e = f = g = h = ss1 = ss2 = tt1 = tt2 = 0; in sm3_compress()
Decrdsa_defs.h50 .g = {
83 .g = {
120 .g = {
169 .g = {
214 .g = {
Decc_curve_defs.h20 .g = {
46 .g = {
78 .g = {
98 .g = {
Ddh.c18 MPI g; /* Value is guaranteed to be set. */ member
26 mpi_free(ctx->g); in dh_clear_ctx()
68 ctx->g = mpi_read_raw_data(params->g, params->g_size); in dh_set_params()
69 if (!ctx->g) in dh_set_params()
176 base = ctx->g; in dh_compute_value()
Decdsa.c82 sig->curve->g.ndigits); in ecdsa_get_signature_r()
91 sig->curve->g.ndigits); in ecdsa_get_signature_s()
97 unsigned int ndigits = curve->g.ndigits; in _ecdsa_verify()
121 ecc_point_mult_shamir(&res, u1, &curve->g, u2, &ctx->pub_key, curve); in _ecdsa_verify()
141 size_t keylen = ctx->curve->g.ndigits * sizeof(u64); in ecdsa_verify()
178 ecc_swap_digits((u64 *)rawhash, hash, ctx->curve->g.ndigits); in ecdsa_verify()
213 ctx->curve->g.ndigits); in ecdsa_ecc_ctx_reset()
242 if (ndigits != ctx->curve->g.ndigits) in ecdsa_set_pub_key()
Decrdsa.c97 req->dst_len != ctx->curve->g.ndigits * sizeof(u64) || in ecrdsa_verify()
98 ctx->pub_key.ndigits != ctx->curve->g.ndigits || in ecrdsa_verify()
138 ecc_point_mult_shamir(&cc, z1, &ctx->curve->g, z2, &ctx->pub_key, in ecrdsa_verify()
229 ctx->curve->g.ndigits * sizeof(u64) != ctx->digest_len) in ecrdsa_set_pub_key()
237 ctx->key_len != ctx->curve->g.ndigits * sizeof(u64) * 2) in ecrdsa_set_pub_key()
Dgf128mul.c260 struct gf128mul_64k *gf128mul_init_64k_bbe(const be128 *g) in gf128mul_init_64k_bbe() argument
278 t->t[0]->t[1] = *g; in gf128mul_init_64k_bbe()
341 struct gf128mul_4k *gf128mul_init_4k_lle(const be128 *g) in gf128mul_init_4k_lle() argument
350 t->t[128] = *g; in gf128mul_init_4k_lle()
363 struct gf128mul_4k *gf128mul_init_4k_bbe(const be128 *g) in gf128mul_init_4k_bbe() argument
372 t->t[1] = *g; in gf128mul_init_4k_bbe()
Ddh_helper.c61 ptr = dh_pack_data(ptr, end, params->g, params->g_size); in crypto_dh_encode_key()
101 params->g = (void *)(ptr + params->key_size + params->p_size + in crypto_dh_decode_key()
Decc.c912 const unsigned int ndigits = curve->g.ndigits; in vli_mmod_fast()
968 vli_mult(product, left, right, curve->g.ndigits); in vli_mod_mult_fast()
978 vli_square(product, left, curve->g.ndigits); in vli_mod_square_fast()
1083 const unsigned int ndigits = curve->g.ndigits; in ecc_point_double_jacobian()
1156 const unsigned int ndigits = curve->g.ndigits; in xycz_initial_double()
1184 const unsigned int ndigits = curve->g.ndigits; in xycz_add()
1229 const unsigned int ndigits = curve->g.ndigits; in xycz_add_c()
1343 unsigned int ndigits = curve->g.ndigits; in ecc_point_add()
1367 unsigned int ndigits = curve->g.ndigits; in ecc_point_mult_shamir()
1422 if (curve->g.ndigits != ndigits) in __ecc_is_key_valid()
[all …]
DKconfig62 for lab evaluation testing of the module, e.g. support for injecting
566 carryless multiplication, e.g. x86 processors with AES-NI and CLMUL, and
592 building for a particular system that requires it (e.g., when
1201 without hardware AES acceleration (e.g. caam crypto). It reduces the
/crypto/async_tx/
Dasync_raid6_recov.c208 struct page *p, *q, *g, *dp, *dq; in __2data_recov_5() local
235 g = blocks[good]; in __2data_recov_5()
248 tx = async_memcpy(dp, g, dp_off, g_off, bytes, submit); in __2data_recov_5()
250 tx = async_mult(dq, dq_off, g, g_off, in __2data_recov_5()
543 struct page *g = blocks[good]; in async_raid6_datap_recov() local
548 tx = async_memcpy(p, g, p_off, g_off, bytes, submit); in async_raid6_datap_recov()
552 tx = async_mult(dq, dq_off, g, g_off, in async_raid6_datap_recov()