Home
last modified time | relevance | path

Searched refs:block (Results 1 – 9 of 9) sorted by relevance

/crypto/
A Dcast6_generic.c156 block[2] ^= F1(block[3], Kr[0], Km[0]); in Q()
157 block[1] ^= F2(block[2], Kr[1], Km[1]); in Q()
158 block[0] ^= F3(block[1], Kr[2], Km[2]); in Q()
159 block[3] ^= F1(block[0], Kr[3], Km[3]); in Q()
166 block[3] ^= F1(block[0], Kr[3], Km[3]); in QBAR()
167 block[0] ^= F3(block[1], Kr[2], Km[2]); in QBAR()
168 block[1] ^= F2(block[2], Kr[1], Km[1]); in QBAR()
169 block[2] ^= F1(block[3], Kr[0], Km[0]); in QBAR()
175 u32 block[4]; in __cast6_encrypt() local
179 block[0] = get_unaligned_be32(inbuf); in __cast6_encrypt()
[all …]
A Dmd5.c144 u32 block[MD5_BLOCK_WORDS]; in md5_update() local
148 memcpy(block, data, sizeof(block)); in md5_update()
150 data += sizeof(block); in md5_update()
151 len -= sizeof(block); in md5_update()
153 memzero_explicit(block, sizeof(block)); in md5_update()
162 u32 block[MD5_BLOCK_WORDS]; in md5_finup() local
167 memcpy(block, data, len); in md5_finup()
170 p = (char *)block + offset; in md5_finup()
177 p = (char *)block; in md5_finup()
185 le32_to_cpu_array(block, (sizeof(block) - sizeof(u64)) / sizeof(u32)); in md5_finup()
[all …]
A Dmd4.c38 u32 block[MD4_BLOCK_WORDS]; member
135 le32_to_cpu_array(ctx->block, ARRAY_SIZE(ctx->block)); in md4_transform_helper()
160 memcpy((char *)mctx->block + (sizeof(mctx->block) - avail), in md4_update()
165 memcpy((char *)mctx->block + (sizeof(mctx->block) - avail), in md4_update()
172 while (len >= sizeof(mctx->block)) { in md4_update()
173 memcpy(mctx->block, data, sizeof(mctx->block)); in md4_update()
175 data += sizeof(mctx->block); in md4_update()
176 len -= sizeof(mctx->block); in md4_update()
179 memcpy(mctx->block, data, len); in md4_update()
195 p = (char *)mctx->block; in md4_final()
[all …]
A Dwp512.c783 u64 block[8]; /* mu(buffer) */ in wp512_process_buffer() local
790 state[0] = block[0] ^ (K[0] = wctx->hash[0]); in wp512_process_buffer()
791 state[1] = block[1] ^ (K[1] = wctx->hash[1]); in wp512_process_buffer()
975 wctx->hash[0] ^= state[0] ^ block[0]; in wp512_process_buffer()
976 wctx->hash[1] ^= state[1] ^ block[1]; in wp512_process_buffer()
977 wctx->hash[2] ^= state[2] ^ block[2]; in wp512_process_buffer()
978 wctx->hash[3] ^= state[3] ^ block[3]; in wp512_process_buffer()
979 wctx->hash[4] ^= state[4] ^ block[4]; in wp512_process_buffer()
980 wctx->hash[5] ^= state[5] ^ block[5]; in wp512_process_buffer()
981 wctx->hash[6] ^= state[6] ^ block[6]; in wp512_process_buffer()
[all …]
A Dblake2b_generic.c71 const u8 block[BLAKE2B_BLOCK_SIZE]) in blake2b_compress_one_generic()
78 m[i] = get_unaligned_le64(block + i * sizeof(m[i])); in blake2b_compress_one_generic()
115 const u8 *block, size_t nblocks, u32 inc) in blake2b_compress_generic() argument
119 blake2b_compress_one_generic(state, block); in blake2b_compress_generic()
120 block += BLAKE2B_BLOCK_SIZE; in blake2b_compress_generic()
A Dsha3_generic.c196 __le64 block[SHA3_224_BLOCK_SIZE / 8] = {}; in crypto_sha3_finup() local
202 p = memcpy(block, src, len); in crypto_sha3_finup()
207 sctx->st[i] ^= le64_to_cpu(block[i]); in crypto_sha3_finup()
208 memzero_explicit(block, sizeof(block)); in crypto_sha3_finup()
A Drmd160.c297 } block = {}; in rmd160_finup() local
304 memcpy(&block, src, len); in rmd160_finup()
305 block.u8[len] = 0x80; in rmd160_finup()
306 block.l64[bit_offset] = cpu_to_le64(rctx->byte_count << 3); in rmd160_finup()
308 rmd160_transform(rctx->state, block.l32); in rmd160_finup()
311 block.l32 + RMD160_BLOCK_SIZE / 4); in rmd160_finup()
312 memzero_explicit(&block, sizeof(block)); in rmd160_finup()
A DKconfig452 Camellia is a symmetric key block cipher developed jointly
518 SEED is a 128-bit symmetric key block cipher that has been
521 It is a 16 round block cipher with the key size of 128 bit.
622 the AES-256 block cipher on a single 16-byte block. On CPUs
627 underlying stream and block ciphers, subject to a security
628 bound. Unlike XTS, Adiantum is a true wide-block encryption
677 This block cipher mode is required for IPSec ESP (XFRM_ESP).
729 narrow block cipher mode for dm-crypt. Use it with cipher
743 This block cipher mode is required for RxRPC.
864 IV, making low entropy IV sources more suitable for block
[all …]
A Dccm.c66 static int set_msg_len(u8 *block, unsigned int msglen, int csize) in set_msg_len() argument
70 memset(block, 0, csize); in set_msg_len()
71 block += csize; in set_msg_len()
79 memcpy(block - csize, (u8 *)&data + 4 - csize, csize); in set_msg_len()

Completed in 18 milliseconds