Searched refs:ROLc (Results 1 - 17 of 17) sorted by relevance

/external/dropbear/libtomcrypt/src/ciphers/
H A Dnoekeon.c42 temp = a^c; temp = temp ^ ROLc(temp, 8) ^ RORc(temp, 8); \
44 temp = b^d; temp = temp ^ ROLc(temp, 8) ^ RORc(temp, 8); \
48 temp = a^c; temp = temp ^ ROLc(temp, 8) ^ RORc(temp, 8); \
50 temp = b^d; temp = temp ^ ROLc(temp, 8) ^ RORc(temp, 8); \
62 a = ROLc(a, 1); c = ROLc(c, 5); d = ROLc(d, 2);
H A Drc6.c93 A = S[i] = ROLc(S[i] + A + B, 3);
140 t = (b * (b + b + 1)); t = ROLc(t, 5); \
141 u = (d * (d + d + 1)); u = ROLc(u, 5); \
194 t = (b * (b + b + 1)); t = ROLc(t, 5); \
195 u = (d * (d + d + 1)); u = ROLc(u, 5); \
H A Drc5.c103 A = S[i] = ROLc(S[i] + A + B, 3);
H A Ddes.c1430 right = ROLc(right, 1);
1435 leftt = ROLc(leftt, 1);
/external/dropbear/libtomcrypt/src/hashes/
H A Drmd160.c54 (a) = ROLc((a), (s)) + (e);\
55 (c) = ROLc((c), 10);
59 (a) = ROLc((a), (s)) + (e);\
60 (c) = ROLc((c), 10);
64 (a) = ROLc((a), (s)) + (e);\
65 (c) = ROLc((c), 10);
69 (a) = ROLc((a), (s)) + (e);\
70 (c) = ROLc((c), 10);
74 (a) = ROLc((a), (s)) + (e);\
75 (c) = ROLc((
[all...]
H A Drmd320.c48 (a) = ROLc((a), (s)) + (e);\
49 (c) = ROLc((c), 10);
53 (a) = ROLc((a), (s)) + (e);\
54 (c) = ROLc((c), 10);
58 (a) = ROLc((a), (s)) + (e);\
59 (c) = ROLc((c), 10);
63 (a) = ROLc((a), (s)) + (e);\
64 (c) = ROLc((c), 10);
68 (a) = ROLc((a), (s)) + (e);\
69 (c) = ROLc((
[all...]
H A Dsha1.c74 #define FF0(a,b,c,d,e,i) e = (ROLc(a, 5) + F0(b,c,d) + e + W[i] + 0x5a827999UL); b = ROLc(b, 30);
75 #define FF1(a,b,c,d,e,i) e = (ROLc(a, 5) + F1(b,c,d) + e + W[i] + 0x6ed9eba1UL); b = ROLc(b, 30);
76 #define FF2(a,b,c,d,e,i) e = (ROLc(a, 5) + F2(b,c,d) + e + W[i] + 0x8f1bbcdcUL); b = ROLc(b, 30);
77 #define FF3(a,b,c,d,e,i) e = (ROLc(a, 5) + F3(b,c,d) + e + W[i] + 0xca62c1d6UL); b = ROLc(b, 30);
H A Drmd128.c53 (a) = ROLc((a), (s));
57 (a) = ROLc((a), (s));
61 (a) = ROLc((a), (s));
65 (a) = ROLc((a), (s));
69 (a) = ROLc((a), (s));
73 (a) = ROLc((a), (s));
77 (a) = ROLc((a), (s));
81 (a) = ROLc((a), (s));
H A Drmd256.c47 (a) = ROLc((a), (s));
51 (a) = ROLc((a), (s));
55 (a) = ROLc((a), (s));
59 (a) = ROLc((a), (s));
63 (a) = ROLc((a), (s));
67 (a) = ROLc((a), (s));
71 (a) = ROLc((a), (s));
75 (a) = ROLc((a), (s));
H A Dmd5.c86 a = (a + F(b,c,d) + M + t); a = ROLc(a, s) + b;
89 a = (a + G(b,c,d) + M + t); a = ROLc(a, s) + b;
92 a = (a + H(b,c,d) + M + t); a = ROLc(a, s) + b;
95 a = (a + I(b,c,d) + M + t); a = ROLc(a, s) + b;
H A Dmd4.c57 #define ROTATE_LEFT(x, n) ROLc(x, n)
/external/dropbear/libtomcrypt/src/headers/
H A Dtomcrypt_macros.h243 #define ROLc(x,n) _lrotl(x,n) macro
265 static inline unsigned ROLc(unsigned word, const int i) function
283 #define ROLc ROL macro
308 static inline unsigned ROLc(unsigned word, const int i) function
326 #define ROLc ROL macro
337 #define ROLc(x, y) ( (((unsigned long)(x)<<(unsigned long)((y)&31)) | (((unsigned long)(x)&0xFFFFFFFFUL)>>(unsigned long)(32-((y)&31)))) & 0xFFFFFFFFUL) macro
/external/dropbear/libtomcrypt/src/ciphers/twofish/
H A Dtwofish.c323 #define g1_func(x, key) g_func(ROLc(x, 8), key)
404 B = ROLc(B, 8);
410 skey->twofish.K[x+x+1] = ROLc(B + B + A, 9);
507 d = ROLc(d, 1) ^ (t2 + t1 + k[1]);
512 b = ROLc(b, 1) ^ (t2 + t1 + k[3]);
582 a = ROLc(a, 1) ^ (t1 + k[2]);
587 c = ROLc(c, 1) ^ (t1 + k[0]);
/external/wpa_supplicant_8/hostapd/src/crypto/
H A Ddes-internal.c38 #define ROLc(x, y) \ macro
342 right = ROLc(right, 1);
347 leftt = ROLc(leftt, 1);
/external/wpa_supplicant_8/src/crypto/
H A Ddes-internal.c38 #define ROLc(x, y) \ macro
342 right = ROLc(right, 1);
347 leftt = ROLc(leftt, 1);
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Ddes-internal.c38 #define ROLc(x, y) \ macro
342 right = ROLc(right, 1);
347 leftt = ROLc(leftt, 1);
/external/dropbear/libtomcrypt/
H A Dcrypt.tex297 \index{ROL} \index{ROR} \index{ROL64} \index{ROR64} \index{ROLc} \index{RORc} \index{ROL64c} \index{ROR64c}
303 \hline ROLc(x, y) & {\bf unsigned long} x, {\bf const unsigned long} y & $x << y, 0 \le y \le 31$ \\

Completed in 94 milliseconds