| /lib/crypto/mips/ |
| A D | poly1305-mips.pl | 505 sb $in0,0($mac) 507 sb $tmp0,1($mac) 509 sb $tmp1,2($mac) 511 sb $tmp2,3($mac) 513 sb $tmp3,4($mac) 515 sb $tmp0,5($mac) 517 sb $tmp1,6($mac) 519 sb $tmp2,7($mac) 521 sb $in1,8($mac) 523 sb $tmp3,9($mac) [all …]
|
| /lib/crypto/tests/ |
| A D | poly1305_kunit.c | 85 u8 mac[POLY1305_DIGEST_SIZE]; in test_poly1305_allones_keys_and_message() local 98 poly1305_final(&tmp_ctx, mac); in test_poly1305_allones_keys_and_message() 99 poly1305_update(&macofmacs_ctx, mac, in test_poly1305_allones_keys_and_message() 103 poly1305_final(&macofmacs_ctx, mac); in test_poly1305_allones_keys_and_message() 104 KUNIT_ASSERT_MEMEQ(test, mac, poly1305_allones_macofmacs, in test_poly1305_allones_keys_and_message()
|
| A D | hash-test-template.h | 607 u8 mac[HASH_SIZE]; in test_hmac() local 630 HMAC_USINGRAWKEY(raw_key, key_len, test_buf, data_len, mac); in test_hmac() 631 HMAC_UPDATE(&ctx, mac, HASH_SIZE); in test_hmac() 637 test, mac, mac2, HASH_SIZE, in test_hmac() 640 HMAC_FINAL(&ctx, mac); in test_hmac() 641 KUNIT_EXPECT_MEMEQ_MSG(test, mac, hmac_testvec_consolidated, HASH_SIZE, in test_hmac()
|
| /lib/crypto/ |
| A D | chacha20poly1305.c | 136 u8 mac[POLY1305_DIGEST_SIZE]; in __chacha20poly1305_decrypt() member 159 poly1305_final(&poly1305_state, b.mac); in __chacha20poly1305_decrypt() 161 ret = crypto_memneq(b.mac, src + dst_len, POLY1305_DIGEST_SIZE); in __chacha20poly1305_decrypt() 233 u8 mac[2][POLY1305_DIGEST_SIZE]; in chacha20poly1305_crypt_sg_inplace() member 312 poly1305_final(&poly1305_state, b.mac[0]); in chacha20poly1305_crypt_sg_inplace() 313 ret = !crypto_memneq(b.mac[0], in chacha20poly1305_crypt_sg_inplace() 322 poly1305_final(&poly1305_state, b.mac[1]); in chacha20poly1305_crypt_sg_inplace() 323 sg_copy_buffer(src, sg_nents(src), b.mac[encrypt], in chacha20poly1305_crypt_sg_inplace() 324 sizeof(b.mac[1]), src_len, !encrypt); in chacha20poly1305_crypt_sg_inplace() 326 !crypto_memneq(b.mac[0], b.mac[1], POLY1305_DIGEST_SIZE); in chacha20poly1305_crypt_sg_inplace()
|
| A D | poly1305-donna32.c | 124 u8 *mac = dst; in poly1305_core_emit() local 201 put_unaligned_le32(h0, &mac[0]); in poly1305_core_emit() 202 put_unaligned_le32(h1, &mac[4]); in poly1305_core_emit() 203 put_unaligned_le32(h2, &mac[8]); in poly1305_core_emit() 204 put_unaligned_le32(h3, &mac[12]); in poly1305_core_emit()
|
| A D | poly1305-donna64.c | 115 u8 *mac = dst; in poly1305_core_emit() local 182 put_unaligned_le64(h0, &mac[0]); in poly1305_core_emit() 183 put_unaligned_le64(h1, &mac[8]); in poly1305_core_emit()
|
| /lib/crypto/arm/ |
| A D | poly1305-armv4.pl | 446 str $h0,[$mac,#0] 447 str $h1,[$mac,#4] 448 str $h2,[$mac,#8] 449 str $h3,[$mac,#12] 451 strb $h0,[$mac,#0] 453 strb $h1,[$mac,#4] 455 strb $h2,[$mac,#8] 460 strb $h0,[$mac,#1] 462 strb $h1,[$mac,#5] 464 strb $h2,[$mac,#9] [all …]
|
| /lib/crypto/x86/ |
| A D | poly1305_glue.c | 72 u8 mac[POLY1305_DIGEST_SIZE], 75 u8 mac[POLY1305_DIGEST_SIZE], 135 u8 mac[POLY1305_DIGEST_SIZE], const u32 nonce[4]) in poly1305_emit_arch() 138 poly1305_emit_x86_64(ctx, mac, nonce); in poly1305_emit_arch() 140 poly1305_emit_avx(ctx, mac, nonce); in poly1305_emit_arch()
|
| A D | poly1305-x86_64-cryptogams.pl | 191 my ($mac,$nonce)=($inp,$len); # *_emit arguments 411 mov %rax,0($mac) # write result 412 mov %rcx,8($mac) 1520 mov %rax,0($mac) # write result 1521 mov %rcx,8($mac) 3865 mov %rax,0($mac) # write result 3866 mov %rcx,8($mac)
|
| /lib/ |
| A D | net_utils.c | 8 bool mac_pton(const char *s, u8 *mac) in mac_pton() argument 23 mac[i] = (hex_to_bin(s[i * 3]) << 4) | hex_to_bin(s[i * 3 + 1]); in mac_pton()
|
| /lib/crypto/arm64/ |
| A D | poly1305-armv8.pl | 45 my ($mac,$nonce)=($inp,$len); 257 stp $h0,$h1,[$mac] // write result
|
| /lib/tests/ |
| A D | printf_kunit.c | 409 mac(struct kunit *kunittest) in mac() function 800 KUNIT_CASE(mac),
|
| /lib/crypto/powerpc/ |
| A D | poly1305-p10le_64.S | 1030 # Input: r3 = h, r4 = s, r5 = mac 1031 # mac = h + s
|