Searched refs:h (Results 1 – 9 of 9) sorted by relevance
/crypto/asymmetric_keys/ |
D | Makefile | 27 $(obj)/x509.asn1.h \ 28 $(obj)/x509_akid.asn1.h 30 $(obj)/x509.asn1.o: $(obj)/x509.asn1.c $(obj)/x509.asn1.h 31 $(obj)/x509_akid.asn1.o: $(obj)/x509_akid.asn1.c $(obj)/x509_akid.asn1.h 41 $(obj)/pkcs8_parser.o: $(obj)/pkcs8.asn1.h 42 $(obj)/pkcs8-asn1.o: $(obj)/pkcs8.asn1.c $(obj)/pkcs8.asn1.h 44 clean-files += pkcs8.asn1.c pkcs8.asn1.h 56 $(obj)/pkcs7_parser.o: $(obj)/pkcs7.asn1.h 57 $(obj)/pkcs7.asn1.o: $(obj)/pkcs7.asn1.c $(obj)/pkcs7.asn1.h 76 $(obj)/mscode_parser.o: $(obj)/mscode.asn1.h $(obj)/mscode.asn1.h [all …]
|
/crypto/ |
D | sha512_generic.c | 101 u64 a, b, c, d, e, f, g, h, t1, t2; in sha512_transform() local 108 e=state[4]; f=state[5]; g=state[6]; h=state[7]; in sha512_transform() 126 t1 = h + e1(e) + Ch(e,f,g) + sha512_K[i ] + W[(i & 15)]; in sha512_transform() 127 t2 = e0(a) + Maj(a,b,c); d+=t1; h=t1+t2; in sha512_transform() 129 t2 = e0(h) + Maj(h,a,b); c+=t1; g=t1+t2; in sha512_transform() 131 t2 = e0(g) + Maj(g,h,a); b+=t1; f=t1+t2; in sha512_transform() 133 t2 = e0(f) + Maj(f,g,h); a+=t1; e=t1+t2; in sha512_transform() 135 t2 = e0(e) + Maj(e,f,g); h+=t1; d=t1+t2; in sha512_transform() 136 t1 = c + e1(h) + Ch(h,a,b) + sha512_K[i+5] + W[(i & 15) + 5]; in sha512_transform() 138 t1 = b + e1(g) + Ch(g,h,a) + sha512_K[i+6] + W[(i & 15) + 6]; in sha512_transform() [all …]
|
D | streebog_generic.c | 917 ctx->h.qword[i] = cpu_to_le64(0x0101010101010101ULL); in streebog_init() 951 static void streebog_g(struct streebog_uint512 *h, in streebog_g() argument 958 streebog_xlps(h, N, &data); in streebog_g() 971 streebog_xor(&data, h, &data); in streebog_g() 972 streebog_xor(&data, m, h); in streebog_g() 981 streebog_g(&ctx->h, &ctx->N, &m); in streebog_stage2() 994 streebog_g(&ctx->h, &ctx->N, &ctx->m); in streebog_stage3() 997 streebog_g(&ctx->h, &buffer0, &ctx->N); in streebog_stage3() 998 streebog_g(&ctx->h, &buffer0, &ctx->Sigma); in streebog_stage3() 999 memcpy(&ctx->hash, &ctx->h, sizeof(struct streebog_uint512)); in streebog_stage3()
|
D | Makefile | 34 $(obj)/rsapubkey.asn1.o: $(obj)/rsapubkey.asn1.c $(obj)/rsapubkey.asn1.h 35 $(obj)/rsaprivkey.asn1.o: $(obj)/rsaprivkey.asn1.c $(obj)/rsaprivkey.asn1.h 36 $(obj)/rsa_helper.o: $(obj)/rsapubkey.asn1.h $(obj)/rsaprivkey.asn1.h 45 $(obj)/sm2signature.asn1.o: $(obj)/sm2signature.asn1.c $(obj)/sm2signature.asn1.h 46 $(obj)/sm2.o: $(obj)/sm2signature.asn1.h 53 $(obj)/ecdsasignature.asn1.o: $(obj)/ecdsasignature.asn1.c $(obj)/ecdsasignature.asn1.h 54 $(obj)/ecdsa.o: $(obj)/ecdsasignature.asn1.h 186 $(obj)/ecrdsa_params.asn1.o: $(obj)/ecrdsa_params.asn1.c $(obj)/ecrdsa_params.asn1.h 187 $(obj)/ecrdsa_pub_key.asn1.o: $(obj)/ecrdsa_pub_key.asn1.c $(obj)/ecrdsa_pub_key.asn1.h 188 $(obj)/ecrdsa.o: $(obj)/ecrdsa_params.asn1.h $(obj)/ecrdsa_pub_key.asn1.h [all …]
|
D | sm3_generic.c | 78 u32 a, b, c, d, e, f, g, h; in sm3_compress() local 88 h = m[7]; in sm3_compress() 99 tt2 = gg(i, e, f, g) + h + ss1 + *w; in sm3_compress() 106 h = g; in sm3_compress() 119 m[7] = h ^ m[7]; in sm3_compress() 121 a = b = c = d = e = f = g = h = ss1 = ss2 = tt1 = tt2 = 0; in sm3_compress()
|
D | blake2b_generic.c | 81 v[i] = S->h[i]; in blake2b_compress_one_generic() 108 S->h[i] = S->h[i] ^ v[i] ^ v[i + 8]; in blake2b_compress_one_generic()
|
D | poly1305_generic.c | 26 poly1305_core_init(&dctx->h); in crypto_poly1305_init() 68 poly1305_core_blocks(&dctx->h, &dctx->core_r, src, in poly1305_blocks()
|
D | sm2.c | 45 unsigned int h; /* Cofactor. */ member 60 .h = 1 106 ec->h = ecp->h; in sm2_ec_ctx_init()
|
D | Kconfig | 616 combined with ESSIV the only feasible mode for h/w accelerated
|