Searched refs:block (Results 1 – 9 of 9) sorted by relevance
| /crypto/ |
| A D | cast6_generic.c | 156 block[2] ^= F1(block[3], Kr[0], Km[0]); in Q() 157 block[1] ^= F2(block[2], Kr[1], Km[1]); in Q() 158 block[0] ^= F3(block[1], Kr[2], Km[2]); in Q() 159 block[3] ^= F1(block[0], Kr[3], Km[3]); in Q() 166 block[3] ^= F1(block[0], Kr[3], Km[3]); in QBAR() 167 block[0] ^= F3(block[1], Kr[2], Km[2]); in QBAR() 168 block[1] ^= F2(block[2], Kr[1], Km[1]); in QBAR() 169 block[2] ^= F1(block[3], Kr[0], Km[0]); in QBAR() 175 u32 block[4]; in __cast6_encrypt() local 179 block[0] = get_unaligned_be32(inbuf); in __cast6_encrypt() [all …]
|
| A D | md5.c | 144 u32 block[MD5_BLOCK_WORDS]; in md5_update() local 148 memcpy(block, data, sizeof(block)); in md5_update() 150 data += sizeof(block); in md5_update() 151 len -= sizeof(block); in md5_update() 153 memzero_explicit(block, sizeof(block)); in md5_update() 162 u32 block[MD5_BLOCK_WORDS]; in md5_finup() local 167 memcpy(block, data, len); in md5_finup() 170 p = (char *)block + offset; in md5_finup() 177 p = (char *)block; in md5_finup() 185 le32_to_cpu_array(block, (sizeof(block) - sizeof(u64)) / sizeof(u32)); in md5_finup() [all …]
|
| A D | md4.c | 38 u32 block[MD4_BLOCK_WORDS]; member 135 le32_to_cpu_array(ctx->block, ARRAY_SIZE(ctx->block)); in md4_transform_helper() 160 memcpy((char *)mctx->block + (sizeof(mctx->block) - avail), in md4_update() 165 memcpy((char *)mctx->block + (sizeof(mctx->block) - avail), in md4_update() 172 while (len >= sizeof(mctx->block)) { in md4_update() 173 memcpy(mctx->block, data, sizeof(mctx->block)); in md4_update() 175 data += sizeof(mctx->block); in md4_update() 176 len -= sizeof(mctx->block); in md4_update() 179 memcpy(mctx->block, data, len); in md4_update() 195 p = (char *)mctx->block; in md4_final() [all …]
|
| A D | wp512.c | 783 u64 block[8]; /* mu(buffer) */ in wp512_process_buffer() local 790 state[0] = block[0] ^ (K[0] = wctx->hash[0]); in wp512_process_buffer() 791 state[1] = block[1] ^ (K[1] = wctx->hash[1]); in wp512_process_buffer() 975 wctx->hash[0] ^= state[0] ^ block[0]; in wp512_process_buffer() 976 wctx->hash[1] ^= state[1] ^ block[1]; in wp512_process_buffer() 977 wctx->hash[2] ^= state[2] ^ block[2]; in wp512_process_buffer() 978 wctx->hash[3] ^= state[3] ^ block[3]; in wp512_process_buffer() 979 wctx->hash[4] ^= state[4] ^ block[4]; in wp512_process_buffer() 980 wctx->hash[5] ^= state[5] ^ block[5]; in wp512_process_buffer() 981 wctx->hash[6] ^= state[6] ^ block[6]; in wp512_process_buffer() [all …]
|
| A D | blake2b_generic.c | 71 const u8 block[BLAKE2B_BLOCK_SIZE]) in blake2b_compress_one_generic() 78 m[i] = get_unaligned_le64(block + i * sizeof(m[i])); in blake2b_compress_one_generic() 115 const u8 *block, size_t nblocks, u32 inc) in blake2b_compress_generic() argument 119 blake2b_compress_one_generic(state, block); in blake2b_compress_generic() 120 block += BLAKE2B_BLOCK_SIZE; in blake2b_compress_generic()
|
| A D | sha3_generic.c | 196 __le64 block[SHA3_224_BLOCK_SIZE / 8] = {}; in crypto_sha3_finup() local 202 p = memcpy(block, src, len); in crypto_sha3_finup() 207 sctx->st[i] ^= le64_to_cpu(block[i]); in crypto_sha3_finup() 208 memzero_explicit(block, sizeof(block)); in crypto_sha3_finup()
|
| A D | rmd160.c | 297 } block = {}; in rmd160_finup() local 304 memcpy(&block, src, len); in rmd160_finup() 305 block.u8[len] = 0x80; in rmd160_finup() 306 block.l64[bit_offset] = cpu_to_le64(rctx->byte_count << 3); in rmd160_finup() 308 rmd160_transform(rctx->state, block.l32); in rmd160_finup() 311 block.l32 + RMD160_BLOCK_SIZE / 4); in rmd160_finup() 312 memzero_explicit(&block, sizeof(block)); in rmd160_finup()
|
| A D | Kconfig | 452 Camellia is a symmetric key block cipher developed jointly 518 SEED is a 128-bit symmetric key block cipher that has been 521 It is a 16 round block cipher with the key size of 128 bit. 622 the AES-256 block cipher on a single 16-byte block. On CPUs 627 underlying stream and block ciphers, subject to a security 628 bound. Unlike XTS, Adiantum is a true wide-block encryption 677 This block cipher mode is required for IPSec ESP (XFRM_ESP). 729 narrow block cipher mode for dm-crypt. Use it with cipher 743 This block cipher mode is required for RxRPC. 864 IV, making low entropy IV sources more suitable for block [all …]
|
| A D | ccm.c | 66 static int set_msg_len(u8 *block, unsigned int msglen, int csize) in set_msg_len() argument 70 memset(block, 0, csize); in set_msg_len() 71 block += csize; in set_msg_len() 79 memcpy(block - csize, (u8 *)&data + 4 - csize, csize); in set_msg_len()
|
Completed in 18 milliseconds