Searched refs:D (Results 1 – 6 of 6) sorted by relevance
/crypto/ |
D | khazad.c | 35 u64 D[KHAZAD_ROUNDS + 1]; member 784 ctx->D[0] = ctx->E[KHAZAD_ROUNDS]; in khazad_setkey() 787 ctx->D[r] = T0[(int)S[(int)(K1 >> 56) ] & 0xff] ^ in khazad_setkey() 796 ctx->D[KHAZAD_ROUNDS] = ctx->E[0]; in khazad_setkey() 846 khazad_crypt(ctx->D, dst, src); in khazad_decrypt()
|
D | wp512.c | 1100 u8 D[64]; in wp384_final() local 1102 wp512_final(desc, D); in wp384_final() 1103 memcpy(out, D, WP384_DIGEST_SIZE); in wp384_final() 1104 memzero_explicit(D, WP512_DIGEST_SIZE); in wp384_final() 1111 u8 D[64]; in wp256_final() local 1113 wp512_final(desc, D); in wp256_final() 1114 memcpy(out, D, WP256_DIGEST_SIZE); in wp256_final() 1115 memzero_explicit(D, WP512_DIGEST_SIZE); in wp256_final()
|
D | anubis.c | 49 u32 D[ANUBIS_MAX_ROUNDS + 1][4]; member 555 ctx->D[0][i] = ctx->E[R][i]; in anubis_setkey() 556 ctx->D[R][i] = ctx->E[0][i]; in anubis_setkey() 561 ctx->D[r][i] = in anubis_setkey() 669 anubis_crypt(ctx->D, dst, src, ctx->R); in anubis_decrypt()
|
D | cast6_generic.c | 27 #define F1(D, r, m) ((I = ((m) + (D))), (I = rol32(I, (r))), \ argument 29 #define F2(D, r, m) ((I = ((m) ^ (D))), (I = rol32(I, (r))), \ argument 31 #define F3(D, r, m) ((I = ((m) - (D))), (I = rol32(I, (r))), \ argument
|
D | cast5_generic.c | 295 #define F1(D, m, r) ((I = ((m) + (D))), (I = rol32(I, (r))), \ argument 297 #define F2(D, m, r) ((I = ((m) ^ (D))), (I = rol32(I, (r))), \ argument 299 #define F3(D, m, r) ((I = ((m) - (D))), (I = rol32(I, (r))), \ argument
|
/crypto/asymmetric_keys/ |
D | tpm.asn1 | 3 -- http://david.woodhou.se/draft-woodhouse-cert-best-practice.html#I-D.mavrogiannopoulos-tpmuri
|