Home
last modified time | relevance | path

Searched refs:input (Results 1 – 8 of 8) sorted by relevance

/crypto/
Dsha512_generic.c88 static inline void LOAD_OP(int I, u64 *W, const u8 *input) in LOAD_OP() argument
90 W[I] = get_unaligned_be64((__u64 *)input + I); in LOAD_OP()
99 sha512_transform(u64 *state, const u8 *input) in sha512_transform() argument
118 LOAD_OP(i + j, W, input); in sha512_transform()
Dtestmgr.h31194 char input[COMP_BUF_SIZE]; member
31207 .input = "Join us now and share the software "
31217 .input = "This document describes a compression method based on the DEFLATE"
31243 .input = "\x5d\x8d\x31\x0e\xc2\x30\x10\x04"
31265 .input = "\xf3\xca\xcf\xcc\x53\x28\x2d\x56"
31279 .input = "Join us now and share the software "
31290 .input = "This document describes a compression method based on the DEFLATE"
31317 .input = "\x78\x9c\x5d\x8d\x31\x0e\xc2\x30"
31339 .input = "\x78\x9c\xf3\xca\xcf\xcc\x53\x28"
31357 .input = "Join us now and share the software "
[all …]
Ddrbg.c827 unsigned char input[5]; in drbg_hash_df() local
832 input[0] = 1; in drbg_hash_df()
833 drbg_cpu_to_be32((outlen * 8), &input[1]); in drbg_hash_df()
836 drbg_string_fill(&data, input, 5); in drbg_hash_df()
847 input[0]++; in drbg_hash_df()
1700 struct drbg_string *input = NULL; in drbg_kcapi_hash() local
1703 list_for_each_entry(input, in, list) in drbg_kcapi_hash()
1704 crypto_shash_update(&sdesc->shash, input->buf, input->len); in drbg_kcapi_hash()
Decc.h225 void vli_mod_inv(u64 *result, const u64 *input, const u64 *mod,
Dtestmgr.c750 struct iov_iter input; in build_cipher_test_sglists() local
753 iov_iter_kvec(&input, WRITE, inputs, nr_inputs, src_total_len); in build_cipher_test_sglists()
758 &input, NULL); in build_cipher_test_sglists()
1132 struct iov_iter input; in build_hash_sglist() local
1136 iov_iter_kvec(&input, WRITE, &kv, 1, vec->psize); in build_hash_sglist()
1138 &input, divs); in build_hash_sglist()
1947 struct kvec input[2]; in test_aead_vec_cfg() local
1995 input[0].iov_base = (void *)vec->assoc; in test_aead_vec_cfg()
1996 input[0].iov_len = vec->alen; in test_aead_vec_cfg()
1997 input[1].iov_base = enc ? (void *)vec->ptext : (void *)vec->ctext; in test_aead_vec_cfg()
[all …]
Dcrypto_user_base.c483 .input = crypto_netlink_rcv, in crypto_netlink_init()
Decc.c858 void vli_mod_inv(u64 *result, const u64 *input, const u64 *mod, in vli_mod_inv() argument
866 if (vli_is_zero(input, ndigits)) { in vli_mod_inv()
871 vli_set(a, input, ndigits); in vli_mod_inv()
DKconfig447 the input block by block.
551 symmetric key for a block encryption pass applied to the input
559 ESSIV to the input IV. Note that in the AEAD case, it is assumed
1464 algorithm are provided; regular processing one input block and
1659 The input, output, and key of SMS4 are each 128 bits.