Searched refs:S (Results 1 – 6 of 6) sorted by relevance
40 static void blake2b_increment_counter(struct blake2b_state *S, const u64 inc) in blake2b_increment_counter() argument42 S->t[0] += inc; in blake2b_increment_counter()43 S->t[1] += (S->t[0] < inc); in blake2b_increment_counter()70 static void blake2b_compress_one_generic(struct blake2b_state *S, in blake2b_compress_one_generic() argument81 v[i] = S->h[i]; in blake2b_compress_one_generic()87 v[12] = BLAKE2B_IV4 ^ S->t[0]; in blake2b_compress_one_generic()88 v[13] = BLAKE2B_IV5 ^ S->t[1]; in blake2b_compress_one_generic()89 v[14] = BLAKE2B_IV6 ^ S->f[0]; in blake2b_compress_one_generic()90 v[15] = BLAKE2B_IV7 ^ S->f[1]; in blake2b_compress_one_generic()108 S->h[i] = S->h[i] ^ v[i] ^ v[i + 8]; in blake2b_compress_one_generic()
302 #define bf_F(x) (((S[GET32_0(x)] + S[256 + GET32_1(x)]) ^ \303 S[512 + GET32_2(x)]) + S[768 + GET32_3(x)])314 const u32 *S = bctx->s; in encrypt_block() local349 u32 *S = ctx->s; in blowfish_setkey() local356 S[count] = bf_sbox[count]; in blowfish_setkey()387 S[count] = data[0]; in blowfish_setkey()388 S[count + 1] = data[1]; in blowfish_setkey()
761 const u64 *S = T7; in khazad_setkey() local785 ctx->D[r] = T0[(int)S[(int)(K1 >> 56) ] & 0xff] ^ in khazad_setkey()786 T1[(int)S[(int)(K1 >> 48) & 0xff] & 0xff] ^ in khazad_setkey()787 T2[(int)S[(int)(K1 >> 40) & 0xff] & 0xff] ^ in khazad_setkey()788 T3[(int)S[(int)(K1 >> 32) & 0xff] & 0xff] ^ in khazad_setkey()789 T4[(int)S[(int)(K1 >> 24) & 0xff] & 0xff] ^ in khazad_setkey()790 T5[(int)S[(int)(K1 >> 16) & 0xff] & 0xff] ^ in khazad_setkey()791 T6[(int)S[(int)(K1 >> 8) & 0xff] & 0xff] ^ in khazad_setkey()792 T7[(int)S[(int)(K1 ) & 0xff] & 0xff]; in khazad_setkey()
32 #define bf_F(x) (((S[GET32_0(x)] + S[256 + GET32_1(x)]) ^ \33 S[512 + GET32_2(x)]) + S[768 + GET32_3(x)])41 const u32 *S = ctx->s; in bf_encrypt() local73 const u32 *S = ctx->s; in bf_decrypt() local
392 8 for decryption), this implementation only uses just two S-boxes of782 select CRYPTO_AES # for AES S-box tables1088 by G. Castagnoli, S. Braeuer and M. Herrman in "Optimization of Cyclic
35 const struct krb5_buffer *S, in crypto_krb5_calc_PRFplus() argument45 n_S.len = 4 + S->len; in crypto_krb5_calc_PRFplus()53 memcpy(n_S.data + 4, S->data, S->len); in crypto_krb5_calc_PRFplus()
Completed in 10 milliseconds