Lines Matching +full:10 +full:base +full:- +full:te
2 * ChaCha20 256-bit cipher algorithm, RFC7539
30 bytes -= CHACHA20_BLOCK_SIZE; in chacha20_docrypt()
43 state[2] = 0x79622d32; /* "2-by" */ in crypto_chacha20_init()
44 state[3] = 0x6b206574; /* "te k" */ in crypto_chacha20_init()
45 state[4] = ctx->key[0]; in crypto_chacha20_init()
46 state[5] = ctx->key[1]; in crypto_chacha20_init()
47 state[6] = ctx->key[2]; in crypto_chacha20_init()
48 state[7] = ctx->key[3]; in crypto_chacha20_init()
49 state[8] = ctx->key[4]; in crypto_chacha20_init()
50 state[9] = ctx->key[5]; in crypto_chacha20_init()
51 state[10] = ctx->key[6]; in crypto_chacha20_init()
52 state[11] = ctx->key[7]; in crypto_chacha20_init()
67 return -EINVAL; in crypto_chacha20_setkey()
69 for (i = 0; i < ARRAY_SIZE(ctx->key); i++) in crypto_chacha20_setkey()
70 ctx->key[i] = get_unaligned_le32(key + i * sizeof(u32)); in crypto_chacha20_setkey()
96 err = skcipher_walk_done(&walk, walk.nbytes - nbytes); in crypto_chacha20_crypt()
104 .base.cra_name = "chacha20",
105 .base.cra_driver_name = "chacha20-generic",
106 .base.cra_priority = 100,
107 .base.cra_blocksize = 1,
108 .base.cra_ctxsize = sizeof(struct chacha20_ctx),
109 .base.cra_module = THIS_MODULE,
137 MODULE_ALIAS_CRYPTO("chacha20-generic");