Home
last modified time | relevance | path

Searched refs:D (Results 1 – 6 of 6) sorted by relevance

/crypto/
Dkhazad.c35 u64 D[KHAZAD_ROUNDS + 1]; member
784 ctx->D[0] = ctx->E[KHAZAD_ROUNDS]; in khazad_setkey()
787 ctx->D[r] = T0[(int)S[(int)(K1 >> 56) ] & 0xff] ^ in khazad_setkey()
796 ctx->D[KHAZAD_ROUNDS] = ctx->E[0]; in khazad_setkey()
846 khazad_crypt(ctx->D, dst, src); in khazad_decrypt()
Dwp512.c1100 u8 D[64]; in wp384_final() local
1102 wp512_final(desc, D); in wp384_final()
1103 memcpy(out, D, WP384_DIGEST_SIZE); in wp384_final()
1104 memzero_explicit(D, WP512_DIGEST_SIZE); in wp384_final()
1111 u8 D[64]; in wp256_final() local
1113 wp512_final(desc, D); in wp256_final()
1114 memcpy(out, D, WP256_DIGEST_SIZE); in wp256_final()
1115 memzero_explicit(D, WP512_DIGEST_SIZE); in wp256_final()
Danubis.c49 u32 D[ANUBIS_MAX_ROUNDS + 1][4]; member
555 ctx->D[0][i] = ctx->E[R][i]; in anubis_setkey()
556 ctx->D[R][i] = ctx->E[0][i]; in anubis_setkey()
561 ctx->D[r][i] = in anubis_setkey()
669 anubis_crypt(ctx->D, dst, src, ctx->R); in anubis_decrypt()
Dcast6_generic.c27 #define F1(D, r, m) ((I = ((m) + (D))), (I = rol32(I, (r))), \ argument
29 #define F2(D, r, m) ((I = ((m) ^ (D))), (I = rol32(I, (r))), \ argument
31 #define F3(D, r, m) ((I = ((m) - (D))), (I = rol32(I, (r))), \ argument
Dcast5_generic.c295 #define F1(D, m, r) ((I = ((m) + (D))), (I = rol32(I, (r))), \ argument
297 #define F2(D, m, r) ((I = ((m) ^ (D))), (I = rol32(I, (r))), \ argument
299 #define F3(D, m, r) ((I = ((m) - (D))), (I = rol32(I, (r))), \ argument
/crypto/asymmetric_keys/
Dtpm.asn13 -- http://david.woodhou.se/draft-woodhouse-cert-best-practice.html#I-D.mavrogiannopoulos-tpmuri