Searched refs:block (Results 1 – 7 of 7) sorted by relevance
/crypto/ |
D | cast6.c | 431 static void Q (u32 * block, u8 * Kr, u32 * Km) { in Q() argument 433 block[2] ^= F1(block[3], Kr[0], Km[0]); in Q() 434 block[1] ^= F2(block[2], Kr[1], Km[1]); in Q() 435 block[0] ^= F3(block[1], Kr[2], Km[2]); in Q() 436 block[3] ^= F1(block[0], Kr[3], Km[3]); in Q() 440 static void QBAR (u32 * block, u8 * Kr, u32 * Km) { in QBAR() argument 442 block[3] ^= F1(block[0], Kr[3], Km[3]); in QBAR() 443 block[0] ^= F3(block[1], Kr[2], Km[2]); in QBAR() 444 block[1] ^= F2(block[2], Kr[1], Km[1]); in QBAR() 445 block[2] ^= F1(block[3], Kr[0], Km[0]); in QBAR() [all …]
|
D | md4.c | 37 u32 block[MD4_BLOCK_WORDS]; member 151 le32_to_cpu_array(ctx->block, ARRAY_SIZE(ctx->block)); in md4_transform_helper() 152 md4_transform(ctx->hash, ctx->block); in md4_transform_helper() 171 const u32 avail = sizeof(mctx->block) - (mctx->byte_count & 0x3f); in md4_update() 176 memcpy((char *)mctx->block + (sizeof(mctx->block) - avail), in md4_update() 181 memcpy((char *)mctx->block + (sizeof(mctx->block) - avail), in md4_update() 188 while (len >= sizeof(mctx->block)) { in md4_update() 189 memcpy(mctx->block, data, sizeof(mctx->block)); in md4_update() 191 data += sizeof(mctx->block); in md4_update() 192 len -= sizeof(mctx->block); in md4_update() [all …]
|
D | md5.c | 40 u32 block[MD5_BLOCK_WORDS]; member 146 le32_to_cpu_array(ctx->block, sizeof(ctx->block) / sizeof(u32)); in md5_transform_helper() 147 md5_transform(ctx->hash, ctx->block); in md5_transform_helper() 166 const u32 avail = sizeof(mctx->block) - (mctx->byte_count & 0x3f); in md5_update() 171 memcpy((char *)mctx->block + (sizeof(mctx->block) - avail), in md5_update() 176 memcpy((char *)mctx->block + (sizeof(mctx->block) - avail), in md5_update() 183 while (len >= sizeof(mctx->block)) { in md5_update() 184 memcpy(mctx->block, data, sizeof(mctx->block)); in md5_update() 186 data += sizeof(mctx->block); in md5_update() 187 len -= sizeof(mctx->block); in md5_update() [all …]
|
D | wp512.c | 779 u64 block[8]; /* mu(buffer) */ in wp512_process_buffer() local 785 block[i] = be64_to_cpu(buffer[i]); in wp512_process_buffer() 787 state[0] = block[0] ^ (K[0] = wctx->hash[0]); in wp512_process_buffer() 788 state[1] = block[1] ^ (K[1] = wctx->hash[1]); in wp512_process_buffer() 789 state[2] = block[2] ^ (K[2] = wctx->hash[2]); in wp512_process_buffer() 790 state[3] = block[3] ^ (K[3] = wctx->hash[3]); in wp512_process_buffer() 791 state[4] = block[4] ^ (K[4] = wctx->hash[4]); in wp512_process_buffer() 792 state[5] = block[5] ^ (K[5] = wctx->hash[5]); in wp512_process_buffer() 793 state[6] = block[6] ^ (K[6] = wctx->hash[6]); in wp512_process_buffer() 794 state[7] = block[7] ^ (K[7] = wctx->hash[7]); in wp512_process_buffer() [all …]
|
D | Kconfig | 171 This block cipher algorithm is required for IPSec. 180 This block cipher algorithm is required for IPSec. 199 This is the simplest block cipher algorithm. It simply encrypts 200 the input block by block. 210 narrow block cipher mode for dm-crypt. Use it with cipher 213 rest is used to tie each cipher block to its logical position. 221 This block cipher algorithm is required for RxRPC. 230 XTS: IEEE1619/D16 narrow block cipher use with aes-xts-plain, 518 Camellia is a symmetric key block cipher developed jointly 613 SEED is a 128-bit symmetric key block cipher that has been [all …]
|
D | lrw.c | 114 static inline int get_index128(be128 *block) in get_index128() argument 117 __be32 *p = (__be32 *) block; in get_index128()
|
D | ccm.c | 58 static int set_msg_len(u8 *block, unsigned int msglen, int csize) in set_msg_len() argument 62 memset(block, 0, csize); in set_msg_len() 63 block += csize; in set_msg_len() 71 memcpy(block - csize, (u8 *)&data + 4 - csize, csize); in set_msg_len()
|