/external/dropbear/libtomcrypt/src/ciphers/ |
noekeon.c | 42 temp = a^c; temp = temp ^ ROLc(temp, 8) ^ RORc(temp, 8); \ 44 temp = b^d; temp = temp ^ ROLc(temp, 8) ^ RORc(temp, 8); \ 48 temp = a^c; temp = temp ^ ROLc(temp, 8) ^ RORc(temp, 8); \ 50 temp = b^d; temp = temp ^ ROLc(temp, 8) ^ RORc(temp, 8); \ 62 a = ROLc(a, 1); c = ROLc(c, 5); d = ROLc(d, 2);
|
rc6.c | 93 A = S[i] = ROLc(S[i] + A + B, 3); 140 t = (b * (b + b + 1)); t = ROLc(t, 5); \ 141 u = (d * (d + d + 1)); u = ROLc(u, 5); \ 194 t = (b * (b + b + 1)); t = ROLc(t, 5); \ 195 u = (d * (d + d + 1)); u = ROLc(u, 5); \
|
rc5.c | 103 A = S[i] = ROLc(S[i] + A + B, 3);
|
des.c | [all...] |
/external/dropbear/libtomcrypt/src/hashes/ |
rmd160.c | 54 (a) = ROLc((a), (s)) + (e);\ 55 (c) = ROLc((c), 10); 59 (a) = ROLc((a), (s)) + (e);\ 60 (c) = ROLc((c), 10); 64 (a) = ROLc((a), (s)) + (e);\ 65 (c) = ROLc((c), 10); 69 (a) = ROLc((a), (s)) + (e);\ 70 (c) = ROLc((c), 10); 74 (a) = ROLc((a), (s)) + (e);\ 75 (c) = ROLc((c), 10) [all...] |
rmd320.c | 48 (a) = ROLc((a), (s)) + (e);\ 49 (c) = ROLc((c), 10); 53 (a) = ROLc((a), (s)) + (e);\ 54 (c) = ROLc((c), 10); 58 (a) = ROLc((a), (s)) + (e);\ 59 (c) = ROLc((c), 10); 63 (a) = ROLc((a), (s)) + (e);\ 64 (c) = ROLc((c), 10); 68 (a) = ROLc((a), (s)) + (e);\ 69 (c) = ROLc((c), 10) [all...] |
sha1.c | 74 #define FF0(a,b,c,d,e,i) e = (ROLc(a, 5) + F0(b,c,d) + e + W[i] + 0x5a827999UL); b = ROLc(b, 30); 75 #define FF1(a,b,c,d,e,i) e = (ROLc(a, 5) + F1(b,c,d) + e + W[i] + 0x6ed9eba1UL); b = ROLc(b, 30); 76 #define FF2(a,b,c,d,e,i) e = (ROLc(a, 5) + F2(b,c,d) + e + W[i] + 0x8f1bbcdcUL); b = ROLc(b, 30); 77 #define FF3(a,b,c,d,e,i) e = (ROLc(a, 5) + F3(b,c,d) + e + W[i] + 0xca62c1d6UL); b = ROLc(b, 30);
|
rmd128.c | 53 (a) = ROLc((a), (s)); 57 (a) = ROLc((a), (s)); 61 (a) = ROLc((a), (s)); 65 (a) = ROLc((a), (s)); 69 (a) = ROLc((a), (s)); 73 (a) = ROLc((a), (s)); 77 (a) = ROLc((a), (s)); 81 (a) = ROLc((a), (s));
|
rmd256.c | 47 (a) = ROLc((a), (s)); 51 (a) = ROLc((a), (s)); 55 (a) = ROLc((a), (s)); 59 (a) = ROLc((a), (s)); 63 (a) = ROLc((a), (s)); 67 (a) = ROLc((a), (s)); 71 (a) = ROLc((a), (s)); 75 (a) = ROLc((a), (s));
|
md5.c | 86 a = (a + F(b,c,d) + M + t); a = ROLc(a, s) + b; 89 a = (a + G(b,c,d) + M + t); a = ROLc(a, s) + b; 92 a = (a + H(b,c,d) + M + t); a = ROLc(a, s) + b; 95 a = (a + I(b,c,d) + M + t); a = ROLc(a, s) + b;
|
md4.c | 57 #define ROTATE_LEFT(x, n) ROLc(x, n)
|
/external/dropbear/libtomcrypt/src/headers/ |
tomcrypt_macros.h | 243 #define ROLc(x,n) _lrotl(x,n) 265 static inline unsigned ROLc(unsigned word, const int i) 283 #define ROLc ROL 308 static inline unsigned ROLc(unsigned word, const int i) 326 #define ROLc ROL 337 #define ROLc(x, y) ( (((unsigned long)(x)<<(unsigned long)((y)&31)) | (((unsigned long)(x)&0xFFFFFFFFUL)>>(unsigned long)(32-((y)&31)))) & 0xFFFFFFFFUL)
|
/external/dropbear/libtomcrypt/src/ciphers/twofish/ |
twofish.c | 323 #define g1_func(x, key) g_func(ROLc(x, 8), key) 404 B = ROLc(B, 8); 410 skey->twofish.K[x+x+1] = ROLc(B + B + A, 9); 507 d = ROLc(d, 1) ^ (t2 + t1 + k[1]); 512 b = ROLc(b, 1) ^ (t2 + t1 + k[3]); 582 a = ROLc(a, 1) ^ (t1 + k[2]); 587 c = ROLc(c, 1) ^ (t1 + k[0]);
|
/external/wpa_supplicant_8/src/crypto/ |
des-internal.c | 38 #define ROLc(x, y) \ 342 right = ROLc(right, 1); 347 leftt = ROLc(leftt, 1);
|
/external/dropbear/libtomcrypt/ |
crypt.tex | 297 \index{ROL} \index{ROR} \index{ROL64} \index{ROR64} \index{ROLc} \index{RORc} \index{ROL64c} \index{ROR64c} 303 \hline ROLc(x, y) & {\bf unsigned long} x, {\bf const unsigned long} y & $x << y, 0 \le y \le 31$ \\ [all...] |