Home
last modified time | relevance | path

Searched refs:e (Results 1 – 12 of 12) sorted by relevance

/crypto/
Dsm3_generic.c44 static inline u32 gg(unsigned int n, u32 e, u32 f, u32 g) in gg() argument
46 return (n < 16) ? (e ^ f ^ g) : ((e & f) | ((~e) & g)); in gg()
78 u32 a, b, c, d, e, f, g, h; in sm3_compress() local
85 e = m[4]; in sm3_compress()
92 ss1 = rol32((rol32(a, 12) + e + rol32(t(i), i & 31)), 7); in sm3_compress()
99 tt2 = gg(i, e, f, g) + h + ss1 + *w; in sm3_compress()
108 f = e; in sm3_compress()
109 e = p0(tt2); in sm3_compress()
116 m[4] = e ^ m[4]; in sm3_compress()
121 a = b = c = d = e = f = g = h = ss1 = ss2 = tt1 = tt2 = 0; in sm3_compress()
Dsha512_generic.c101 u64 a, b, c, d, e, f, g, h, t1, t2; in sha512_transform() local
108 e=state[4]; f=state[5]; g=state[6]; h=state[7]; in sha512_transform()
126 t1 = h + e1(e) + Ch(e,f,g) + sha512_K[i ] + W[(i & 15)]; in sha512_transform()
128 t1 = g + e1(d) + Ch(d,e,f) + sha512_K[i+1] + W[(i & 15) + 1]; in sha512_transform()
130 t1 = f + e1(c) + Ch(c,d,e) + sha512_K[i+2] + W[(i & 15) + 2]; in sha512_transform()
132 t1 = e + e1(b) + Ch(b,c,d) + sha512_K[i+3] + W[(i & 15) + 3]; in sha512_transform()
133 t2 = e0(f) + Maj(f,g,h); a+=t1; e=t1+t2; in sha512_transform()
135 t2 = e0(e) + Maj(e,f,g); h+=t1; d=t1+t2; in sha512_transform()
137 t2 = e0(d) + Maj(d,e,f); g+=t1; c=t1+t2; in sha512_transform()
139 t2 = e0(c) + Maj(c,d,e); f+=t1; b=t1+t2; in sha512_transform()
[all …]
Drsa.c17 MPI e; member
32 return mpi_powm(c, m, key->e, key->n); in _rsa_enc()
65 if (unlikely(!pkey->n || !pkey->e)) { in rsa_enc()
134 mpi_free(key->e); in rsa_free_mpi_key()
137 key->e = NULL; in rsa_free_mpi_key()
170 mpi_key->e = mpi_read_raw_data(raw_key.e, raw_key.e_sz); in rsa_set_pub_key()
171 if (!mpi_key->e) in rsa_set_pub_key()
208 mpi_key->e = mpi_read_raw_data(raw_key.e, raw_key.e_sz); in rsa_set_priv_key()
209 if (!mpi_key->e) in rsa_set_priv_key()
Decrdsa.c81 u64 e[ECRDSA_MAX_DIGITS]; /* h \mod q */ in ecrdsa_verify() local
82 u64 *v = e; /* e^{-1} \mod q */ in ecrdsa_verify()
85 struct ecc_point cc = ECC_POINT_INIT(s, e, ndigits); /* reuse s, e */ in ecrdsa_verify()
123 vli_from_le64(e, digest, ndigits); in ecrdsa_verify()
124 if (vli_cmp(e, ctx->curve->n, ndigits) >= 0) in ecrdsa_verify()
125 vli_sub(e, e, ctx->curve->n, ndigits); in ecrdsa_verify()
126 if (vli_is_zero(e, ndigits)) in ecrdsa_verify()
127 e[0] = 1; in ecrdsa_verify()
130 vli_mod_inv(v, e, ctx->curve->n, ndigits); in ecrdsa_verify()
Drsapubkey.asn13 e INTEGER ({ rsa_get_e })
Dtcrypt.c261 const char *e; in test_mb_aead_speed() local
277 e = "encryption"; in test_mb_aead_speed()
279 e = "decryption"; in test_mb_aead_speed()
339 get_driver_name(crypto_aead, tfm), e); in test_mb_aead_speed()
432 pr_err("%s() failed return code=%d\n", e, ret); in test_mb_aead_speed()
538 const char *e; in test_aead_speed() local
558 e = "encryption"; in test_aead_speed()
560 e = "decryption"; in test_aead_speed()
590 get_driver_name(crypto_aead, tfm), e); in test_aead_speed()
684 pr_err("%s() failed return code=%d\n", e, ret); in test_aead_speed()
[all …]
Drsaprivkey.asn14 e INTEGER ({ rsa_get_e }),
Drsa_helper.c55 key->e = value; in rsa_get_e()
Drmd160.c43 #define ROUND(a, b, c, d, e, f, k, x, s) { \ argument
45 (a) = rol32((a), (s)) + (e); \
DKconfig57 for lab evaluation testing of the module, e.g. support for injecting
66 the text and rodata that were used for the integrity check, i.e. the
588 carryless multiplication, e.g. x86 processors with AES-NI and CLMUL, and
614 building for a particular system that requires it (e.g., when
1223 without hardware AES acceleration (e.g. caam crypto). It reduces the
Dtestmgr.c2606 const char *e; in test_cipher() local
2616 e = "encryption"; in test_cipher()
2618 e = "decryption"; in test_cipher()
2671 "on %s for %s\n", j, e, algo); in test_cipher()
/crypto/asymmetric_keys/
Dasym_tpm.c344 uint8_t e[3] = { 0x01, 0x00, 0x01 }; in derive_pub_key() local
353 cur = encode_tag_length(cur, 0x02, sizeof(e)); in derive_pub_key()
354 memcpy(cur, e, sizeof(e)); in derive_pub_key()
355 cur += sizeof(e); in derive_pub_key()