Searched refs:D (Results 1 – 6 of 6) sorted by relevance
| /crypto/ |
| A D | khazad.c | 35 u64 D[KHAZAD_ROUNDS + 1]; member 782 ctx->D[0] = ctx->E[KHAZAD_ROUNDS]; in khazad_setkey() 785 ctx->D[r] = T0[(int)S[(int)(K1 >> 56) ] & 0xff] ^ in khazad_setkey() 794 ctx->D[KHAZAD_ROUNDS] = ctx->E[0]; in khazad_setkey() 842 khazad_crypt(ctx->D, dst, src); in khazad_decrypt()
|
| A D | wp512.c | 1065 u8 D[64]; in wp384_finup() local 1067 wp512_finup(desc, src, len, D); in wp384_finup() 1068 memcpy(out, D, WP384_DIGEST_SIZE); in wp384_finup() 1069 memzero_explicit(D, WP512_DIGEST_SIZE); in wp384_finup() 1077 u8 D[64]; in wp256_finup() local 1079 wp512_finup(desc, src, len, D); in wp256_finup() 1080 memcpy(out, D, WP256_DIGEST_SIZE); in wp256_finup() 1081 memzero_explicit(D, WP512_DIGEST_SIZE); in wp256_finup()
|
| A D | anubis.c | 49 u32 D[ANUBIS_MAX_ROUNDS + 1][4]; member 554 ctx->D[0][i] = ctx->E[R][i]; in anubis_setkey() 555 ctx->D[R][i] = ctx->E[0][i]; in anubis_setkey() 560 ctx->D[r][i] = in anubis_setkey() 666 anubis_crypt(ctx->D, dst, src, ctx->R); in anubis_decrypt()
|
| A D | cast6_generic.c | 27 #define F1(D, r, m) ((I = ((m) + (D))), (I = rol32(I, (r))), \ argument 29 #define F2(D, r, m) ((I = ((m) ^ (D))), (I = rol32(I, (r))), \ argument 31 #define F3(D, r, m) ((I = ((m) - (D))), (I = rol32(I, (r))), \ argument
|
| A D | cast5_generic.c | 295 #define F1(D, m, r) ((I = ((m) + (D))), (I = rol32(I, (r))), \ argument 297 #define F2(D, m, r) ((I = ((m) ^ (D))), (I = rol32(I, (r))), \ argument 299 #define F3(D, m, r) ((I = ((m) - (D))), (I = rol32(I, (r))), \ argument
|
| A D | Kconfig | 824 (GCM Message Authentication Code) (NIST SP800-38D) 920 GCM GHASH function (NIST SP800-38D)
|
Completed in 16 milliseconds