Home
last modified time | relevance | path

Searched refs:D (Results 1 – 6 of 6) sorted by relevance

/crypto/
A Dkhazad.c35 u64 D[KHAZAD_ROUNDS + 1]; member
782 ctx->D[0] = ctx->E[KHAZAD_ROUNDS]; in khazad_setkey()
785 ctx->D[r] = T0[(int)S[(int)(K1 >> 56) ] & 0xff] ^ in khazad_setkey()
794 ctx->D[KHAZAD_ROUNDS] = ctx->E[0]; in khazad_setkey()
842 khazad_crypt(ctx->D, dst, src); in khazad_decrypt()
A Dwp512.c1065 u8 D[64]; in wp384_finup() local
1067 wp512_finup(desc, src, len, D); in wp384_finup()
1068 memcpy(out, D, WP384_DIGEST_SIZE); in wp384_finup()
1069 memzero_explicit(D, WP512_DIGEST_SIZE); in wp384_finup()
1077 u8 D[64]; in wp256_finup() local
1079 wp512_finup(desc, src, len, D); in wp256_finup()
1080 memcpy(out, D, WP256_DIGEST_SIZE); in wp256_finup()
1081 memzero_explicit(D, WP512_DIGEST_SIZE); in wp256_finup()
A Danubis.c49 u32 D[ANUBIS_MAX_ROUNDS + 1][4]; member
554 ctx->D[0][i] = ctx->E[R][i]; in anubis_setkey()
555 ctx->D[R][i] = ctx->E[0][i]; in anubis_setkey()
560 ctx->D[r][i] = in anubis_setkey()
666 anubis_crypt(ctx->D, dst, src, ctx->R); in anubis_decrypt()
A Dcast6_generic.c27 #define F1(D, r, m) ((I = ((m) + (D))), (I = rol32(I, (r))), \ argument
29 #define F2(D, r, m) ((I = ((m) ^ (D))), (I = rol32(I, (r))), \ argument
31 #define F3(D, r, m) ((I = ((m) - (D))), (I = rol32(I, (r))), \ argument
A Dcast5_generic.c295 #define F1(D, m, r) ((I = ((m) + (D))), (I = rol32(I, (r))), \ argument
297 #define F2(D, m, r) ((I = ((m) ^ (D))), (I = rol32(I, (r))), \ argument
299 #define F3(D, m, r) ((I = ((m) - (D))), (I = rol32(I, (r))), \ argument
A DKconfig824 (GCM Message Authentication Code) (NIST SP800-38D)
920 GCM GHASH function (NIST SP800-38D)

Completed in 16 milliseconds