Home
last modified time | relevance | path

Searched refs:input (Results 1 – 7 of 7) sorted by relevance

/crypto/
Dsha512_generic.c88 static inline void LOAD_OP(int I, u64 *W, const u8 *input) in LOAD_OP() argument
90 W[I] = get_unaligned_be64((__u64 *)input + I); in LOAD_OP()
99 sha512_transform(u64 *state, const u8 *input) in sha512_transform() argument
118 LOAD_OP(i + j, W, input); in sha512_transform()
Dtestmgr.h35676 char input[COMP_BUF_SIZE]; member
35689 .input = "Join us now and share the software "
35699 .input = "This document describes a compression method based on the DEFLATE"
35725 .input = "\x5d\x8d\x31\x0e\xc2\x30\x10\x04"
35747 .input = "\xf3\xca\xcf\xcc\x53\x28\x2d\x56"
35761 .input = "Join us now and share the software "
35772 .input = "This document describes a compression method based on the DEFLATE"
35799 .input = "\x78\x9c\x5d\x8d\x31\x0e\xc2\x30"
35821 .input = "\x78\x9c\xf3\xca\xcf\xcc\x53\x28"
35839 .input = "Join us now and share the software "
[all …]
Ddrbg.c828 unsigned char input[5]; in drbg_hash_df() local
833 input[0] = 1; in drbg_hash_df()
834 drbg_cpu_to_be32((outlen * 8), &input[1]); in drbg_hash_df()
837 drbg_string_fill(&data, input, 5); in drbg_hash_df()
848 input[0]++; in drbg_hash_df()
1727 struct drbg_string *input = NULL; in drbg_kcapi_hash() local
1730 list_for_each_entry(input, in, list) in drbg_kcapi_hash()
1731 crypto_shash_update(&sdesc->shash, input->buf, input->len); in drbg_kcapi_hash()
Dtestmgr.c781 struct iov_iter input; in build_cipher_test_sglists() local
784 iov_iter_kvec(&input, ITER_SOURCE, inputs, nr_inputs, src_total_len); in build_cipher_test_sglists()
789 &input, NULL); in build_cipher_test_sglists()
1253 struct iov_iter input; in build_hash_sglist() local
1257 iov_iter_kvec(&input, ITER_SOURCE, &kv, 1, vec->psize); in build_hash_sglist()
1259 &input, divs); in build_hash_sglist()
2114 struct kvec input[2]; in test_aead_vec_cfg() local
2162 input[0].iov_base = (void *)vec->assoc; in test_aead_vec_cfg()
2163 input[0].iov_len = vec->alen; in test_aead_vec_cfg()
2164 input[1].iov_base = enc ? (void *)vec->ptext : (void *)vec->ctext; in test_aead_vec_cfg()
[all …]
Dcrypto_user_base.c483 .input = crypto_netlink_rcv, in crypto_netlink_init()
Decc.c990 void vli_mod_inv(u64 *result, const u64 *input, const u64 *mod, in vli_mod_inv() argument
998 if (vli_is_zero(input, ndigits)) { in vli_mod_inv()
1003 vli_set(a, input, ndigits); in vli_mod_inv()
DKconfig609 The input, output, and key of SMS4 are each 128 bits.
943 symmetric key for a block encryption pass applied to the input
951 ESSIV to the input IV. Note that in the AEAD case, it is assumed