Home
last modified time | relevance | path

Searched refs:input (Results 1 – 8 of 8) sorted by relevance

/crypto/
Dsha512_generic.c88 static inline void LOAD_OP(int I, u64 *W, const u8 *input) in LOAD_OP() argument
90 W[I] = get_unaligned_be64((__u64 *)input + I); in LOAD_OP()
99 sha512_transform(u64 *state, const u8 *input) in sha512_transform() argument
118 LOAD_OP(i + j, W, input); in sha512_transform()
Dtestmgr.h29529 char input[COMP_BUF_SIZE]; member
29542 .input = "Join us now and share the software "
29552 .input = "This document describes a compression method based on the DEFLATE"
29578 .input = "\x5d\x8d\x31\x0e\xc2\x30\x10\x04"
29600 .input = "\xf3\xca\xcf\xcc\x53\x28\x2d\x56"
29614 .input = "Join us now and share the software "
29625 .input = "This document describes a compression method based on the DEFLATE"
29652 .input = "\x78\x9c\x5d\x8d\x31\x0e\xc2\x30"
29674 .input = "\x78\x9c\xf3\xca\xcf\xcc\x53\x28"
29692 .input = "Join us now and share the software "
[all …]
Ddrbg.c826 unsigned char input[5]; in drbg_hash_df() local
831 input[0] = 1; in drbg_hash_df()
832 drbg_cpu_to_be32((outlen * 8), &input[1]); in drbg_hash_df()
835 drbg_string_fill(&data, input, 5); in drbg_hash_df()
846 input[0]++; in drbg_hash_df()
1706 struct drbg_string *input = NULL; in drbg_kcapi_hash() local
1709 list_for_each_entry(input, in, list) in drbg_kcapi_hash()
1710 crypto_shash_update(&sdesc->shash, input->buf, input->len); in drbg_kcapi_hash()
Dtestmgr.c720 struct iov_iter input; in build_cipher_test_sglists() local
723 iov_iter_kvec(&input, WRITE, inputs, nr_inputs, src_total_len); in build_cipher_test_sglists()
728 &input, NULL); in build_cipher_test_sglists()
1042 struct iov_iter input; in build_hash_sglist() local
1046 iov_iter_kvec(&input, WRITE, &kv, 1, vec->psize); in build_hash_sglist()
1048 &input, divs); in build_hash_sglist()
1855 struct kvec input[2]; in test_aead_vec_cfg() local
1902 input[0].iov_base = (void *)vec->assoc; in test_aead_vec_cfg()
1903 input[0].iov_len = vec->alen; in test_aead_vec_cfg()
1904 input[1].iov_base = enc ? (void *)vec->ptext : (void *)vec->ctext; in test_aead_vec_cfg()
[all …]
Decc.h211 void vli_mod_inv(u64 *result, const u64 *input, const u64 *mod,
Dcrypto_user_base.c482 .input = crypto_netlink_rcv, in crypto_netlink_init()
Decc.c858 void vli_mod_inv(u64 *result, const u64 *input, const u64 *mod, in vli_mod_inv() argument
866 if (vli_is_zero(input, ndigits)) { in vli_mod_inv()
871 vli_set(a, input, ndigits); in vli_mod_inv()
DKconfig394 the input block by block.
498 symmetric key for a block encryption pass applied to the input
506 ESSIV to the input IV. Note that in the aead case, it is assumed
1371 algorithm are provided; regular processing one input block and
1556 The input, output, and key of SMS4 are each 128 bits.