Home
last modified time | relevance | path

Searched refs:h (Results 1 – 9 of 9) sorted by relevance

/crypto/asymmetric_keys/
DMakefile27 $(obj)/x509.asn1.h \
28 $(obj)/x509_akid.asn1.h
30 $(obj)/x509.asn1.o: $(obj)/x509.asn1.c $(obj)/x509.asn1.h
31 $(obj)/x509_akid.asn1.o: $(obj)/x509_akid.asn1.c $(obj)/x509_akid.asn1.h
41 $(obj)/pkcs8_parser.o: $(obj)/pkcs8.asn1.h
42 $(obj)/pkcs8-asn1.o: $(obj)/pkcs8.asn1.c $(obj)/pkcs8.asn1.h
44 clean-files += pkcs8.asn1.c pkcs8.asn1.h
56 $(obj)/pkcs7_parser.o: $(obj)/pkcs7.asn1.h
57 $(obj)/pkcs7.asn1.o: $(obj)/pkcs7.asn1.c $(obj)/pkcs7.asn1.h
76 $(obj)/mscode_parser.o: $(obj)/mscode.asn1.h $(obj)/mscode.asn1.h
[all …]
/crypto/
Dsha512_generic.c101 u64 a, b, c, d, e, f, g, h, t1, t2; in sha512_transform() local
108 e=state[4]; f=state[5]; g=state[6]; h=state[7]; in sha512_transform()
126 t1 = h + e1(e) + Ch(e,f,g) + sha512_K[i ] + W[(i & 15)]; in sha512_transform()
127 t2 = e0(a) + Maj(a,b,c); d+=t1; h=t1+t2; in sha512_transform()
129 t2 = e0(h) + Maj(h,a,b); c+=t1; g=t1+t2; in sha512_transform()
131 t2 = e0(g) + Maj(g,h,a); b+=t1; f=t1+t2; in sha512_transform()
133 t2 = e0(f) + Maj(f,g,h); a+=t1; e=t1+t2; in sha512_transform()
135 t2 = e0(e) + Maj(e,f,g); h+=t1; d=t1+t2; in sha512_transform()
136 t1 = c + e1(h) + Ch(h,a,b) + sha512_K[i+5] + W[(i & 15) + 5]; in sha512_transform()
138 t1 = b + e1(g) + Ch(g,h,a) + sha512_K[i+6] + W[(i & 15) + 6]; in sha512_transform()
[all …]
Dstreebog_generic.c917 ctx->h.qword[i] = cpu_to_le64(0x0101010101010101ULL); in streebog_init()
951 static void streebog_g(struct streebog_uint512 *h, in streebog_g() argument
958 streebog_xlps(h, N, &data); in streebog_g()
971 streebog_xor(&data, h, &data); in streebog_g()
972 streebog_xor(&data, m, h); in streebog_g()
981 streebog_g(&ctx->h, &ctx->N, &m); in streebog_stage2()
994 streebog_g(&ctx->h, &ctx->N, &ctx->m); in streebog_stage3()
997 streebog_g(&ctx->h, &buffer0, &ctx->N); in streebog_stage3()
998 streebog_g(&ctx->h, &buffer0, &ctx->Sigma); in streebog_stage3()
999 memcpy(&ctx->hash, &ctx->h, sizeof(struct streebog_uint512)); in streebog_stage3()
DMakefile34 $(obj)/rsapubkey.asn1.o: $(obj)/rsapubkey.asn1.c $(obj)/rsapubkey.asn1.h
35 $(obj)/rsaprivkey.asn1.o: $(obj)/rsaprivkey.asn1.c $(obj)/rsaprivkey.asn1.h
36 $(obj)/rsa_helper.o: $(obj)/rsapubkey.asn1.h $(obj)/rsaprivkey.asn1.h
45 $(obj)/sm2signature.asn1.o: $(obj)/sm2signature.asn1.c $(obj)/sm2signature.asn1.h
46 $(obj)/sm2.o: $(obj)/sm2signature.asn1.h
53 $(obj)/ecdsasignature.asn1.o: $(obj)/ecdsasignature.asn1.c $(obj)/ecdsasignature.asn1.h
54 $(obj)/ecdsa.o: $(obj)/ecdsasignature.asn1.h
186 $(obj)/ecrdsa_params.asn1.o: $(obj)/ecrdsa_params.asn1.c $(obj)/ecrdsa_params.asn1.h
187 $(obj)/ecrdsa_pub_key.asn1.o: $(obj)/ecrdsa_pub_key.asn1.c $(obj)/ecrdsa_pub_key.asn1.h
188 $(obj)/ecrdsa.o: $(obj)/ecrdsa_params.asn1.h $(obj)/ecrdsa_pub_key.asn1.h
[all …]
Dsm3_generic.c78 u32 a, b, c, d, e, f, g, h; in sm3_compress() local
88 h = m[7]; in sm3_compress()
99 tt2 = gg(i, e, f, g) + h + ss1 + *w; in sm3_compress()
106 h = g; in sm3_compress()
119 m[7] = h ^ m[7]; in sm3_compress()
121 a = b = c = d = e = f = g = h = ss1 = ss2 = tt1 = tt2 = 0; in sm3_compress()
Dblake2b_generic.c81 v[i] = S->h[i]; in blake2b_compress_one_generic()
108 S->h[i] = S->h[i] ^ v[i] ^ v[i + 8]; in blake2b_compress_one_generic()
Dpoly1305_generic.c26 poly1305_core_init(&dctx->h); in crypto_poly1305_init()
68 poly1305_core_blocks(&dctx->h, &dctx->core_r, src, in poly1305_blocks()
Dsm2.c45 unsigned int h; /* Cofactor. */ member
60 .h = 1
106 ec->h = ecp->h; in sm2_ec_ctx_init()
DKconfig616 combined with ESSIV the only feasible mode for h/w accelerated