Home
last modified time | relevance | path

Searched refs:block (Results 1 – 9 of 9) sorted by relevance

/crypto/
Dcast6_generic.c153 static inline void Q(u32 *block, const u8 *Kr, const u32 *Km) in Q() argument
156 block[2] ^= F1(block[3], Kr[0], Km[0]); in Q()
157 block[1] ^= F2(block[2], Kr[1], Km[1]); in Q()
158 block[0] ^= F3(block[1], Kr[2], Km[2]); in Q()
159 block[3] ^= F1(block[0], Kr[3], Km[3]); in Q()
163 static inline void QBAR(u32 *block, const u8 *Kr, const u32 *Km) in QBAR() argument
166 block[3] ^= F1(block[0], Kr[3], Km[3]); in QBAR()
167 block[0] ^= F3(block[1], Kr[2], Km[2]); in QBAR()
168 block[1] ^= F2(block[2], Kr[1], Km[1]); in QBAR()
169 block[2] ^= F1(block[3], Kr[0], Km[0]); in QBAR()
[all …]
Dkeywrap.c128 struct crypto_kw_block block; in crypto_kw_decrypt() local
142 memcpy(&block.A, req->iv, SEMIBSIZE); in crypto_kw_decrypt()
160 scatterwalk_copychunks(&block.R, &src_walk, SEMIBSIZE, in crypto_kw_decrypt()
164 block.A ^= cpu_to_be64(t); in crypto_kw_decrypt()
167 crypto_cipher_decrypt_one(cipher, (u8 *)&block, in crypto_kw_decrypt()
168 (u8 *)&block); in crypto_kw_decrypt()
173 scatterwalk_copychunks(&block.R, &dst_walk, SEMIBSIZE, in crypto_kw_decrypt()
185 if (block.A != cpu_to_be64(0xa6a6a6a6a6a6a6a6ULL)) in crypto_kw_decrypt()
188 memzero_explicit(&block, sizeof(struct crypto_kw_block)); in crypto_kw_decrypt()
197 struct crypto_kw_block block; in crypto_kw_encrypt() local
[all …]
Dmd4.c38 u32 block[MD4_BLOCK_WORDS]; member
135 le32_to_cpu_array(ctx->block, ARRAY_SIZE(ctx->block)); in md4_transform_helper()
136 md4_transform(ctx->hash, ctx->block); in md4_transform_helper()
155 const u32 avail = sizeof(mctx->block) - (mctx->byte_count & 0x3f); in md4_update()
160 memcpy((char *)mctx->block + (sizeof(mctx->block) - avail), in md4_update()
165 memcpy((char *)mctx->block + (sizeof(mctx->block) - avail), in md4_update()
172 while (len >= sizeof(mctx->block)) { in md4_update()
173 memcpy(mctx->block, data, sizeof(mctx->block)); in md4_update()
175 data += sizeof(mctx->block); in md4_update()
176 len -= sizeof(mctx->block); in md4_update()
[all …]
Dmd5.c125 le32_to_cpu_array(ctx->block, sizeof(ctx->block) / sizeof(u32)); in md5_transform_helper()
126 md5_transform(ctx->hash, ctx->block); in md5_transform_helper()
145 const u32 avail = sizeof(mctx->block) - (mctx->byte_count & 0x3f); in md5_update()
150 memcpy((char *)mctx->block + (sizeof(mctx->block) - avail), in md5_update()
155 memcpy((char *)mctx->block + (sizeof(mctx->block) - avail), in md5_update()
162 while (len >= sizeof(mctx->block)) { in md5_update()
163 memcpy(mctx->block, data, sizeof(mctx->block)); in md5_update()
165 data += sizeof(mctx->block); in md5_update()
166 len -= sizeof(mctx->block); in md5_update()
169 memcpy(mctx->block, data, len); in md5_update()
[all …]
Dwp512.c785 u64 block[8]; /* mu(buffer) */ in wp512_process_buffer() local
791 block[i] = be64_to_cpu(buffer[i]); in wp512_process_buffer()
793 state[0] = block[0] ^ (K[0] = wctx->hash[0]); in wp512_process_buffer()
794 state[1] = block[1] ^ (K[1] = wctx->hash[1]); in wp512_process_buffer()
795 state[2] = block[2] ^ (K[2] = wctx->hash[2]); in wp512_process_buffer()
796 state[3] = block[3] ^ (K[3] = wctx->hash[3]); in wp512_process_buffer()
797 state[4] = block[4] ^ (K[4] = wctx->hash[4]); in wp512_process_buffer()
798 state[5] = block[5] ^ (K[5] = wctx->hash[5]); in wp512_process_buffer()
799 state[6] = block[6] ^ (K[6] = wctx->hash[6]); in wp512_process_buffer()
800 state[7] = block[7] ^ (K[7] = wctx->hash[7]); in wp512_process_buffer()
[all …]
Dblake2b_generic.c71 const u8 block[BLAKE2B_BLOCK_SIZE]) in blake2b_compress_one_generic()
78 m[i] = get_unaligned_le64(block + i * sizeof(m[i])); in blake2b_compress_one_generic()
115 const u8 *block, size_t nblocks, u32 inc) in blake2b_compress_generic() argument
119 blake2b_compress_one_generic(state, block); in blake2b_compress_generic()
120 block += BLAKE2B_BLOCK_SIZE; in blake2b_compress_generic()
DKconfig434 This block cipher algorithm is required for IPSec.
442 This block cipher algorithm is required for TPM2 Cryptography.
450 This block cipher algorithm is required for IPSec.
473 This is the simplest block cipher algorithm. It simply encrypts
474 the input block by block.
483 narrow block cipher mode for dm-crypt. Use it with cipher
486 rest is used to tie each cipher block to its logical position.
493 OFB: the Output Feedback mode makes a block cipher into a synchronous
506 This block cipher algorithm is required for RxRPC.
523 XTS: IEEE1619/D16 narrow block cipher use with aes-xts-plain,
[all …]
Dfips140-selftests.c202 u8 block[AES_BLOCK_SIZE]; in fips_test_aes_library() local
213 aes_encrypt(&ctx, block, vec->plaintext); in fips_test_aes_library()
214 err = fips_check_result(block, vec->ciphertext, AES_BLOCK_SIZE, in fips_test_aes_library()
218 aes_decrypt(&ctx, block, block); in fips_test_aes_library()
219 return fips_check_result(block, vec->plaintext, AES_BLOCK_SIZE, in fips_test_aes_library()
Dccm.c69 static int set_msg_len(u8 *block, unsigned int msglen, int csize) in set_msg_len() argument
73 memset(block, 0, csize); in set_msg_len()
74 block += csize; in set_msg_len()
82 memcpy(block - csize, (u8 *)&data + 4 - csize, csize); in set_msg_len()