Searched refs:GHASH (Results 1 – 6 of 6) sorted by relevance
747 #ifdef GHASH in CRYPTO_gcm128_aad()822 # if defined(GHASH) in CRYPTO_gcm128_encrypt()854 # if defined(GHASH) in CRYPTO_gcm128_encrypt()946 # if defined(GHASH) in CRYPTO_gcm128_encrypt()1047 # if defined(GHASH) in CRYPTO_gcm128_decrypt()1081 # if defined(GHASH) in CRYPTO_gcm128_decrypt()1174 # if defined(GHASH) in CRYPTO_gcm128_decrypt()1252 #if defined(GHASH) in CRYPTO_gcm128_encrypt_ctr32()1279 # if defined(GHASH) in CRYPTO_gcm128_encrypt_ctr32()1307 # if defined(GHASH) in CRYPTO_gcm128_encrypt_ctr32()[all …]
61 * The GHASH of this value can then be calculated.73 /* Copy the 128 bit GHASH result into J0 and clear the tag */
157 /* Finalize GHASH(AAD) if AAD partial blocks left unprocessed */
96 # 65 1<<62 KIMD-GHASH
1001 my $GHASH = $_[1]; # [out] ghash output1216 @{[XWORD($GHASH)]},4127 my $GHASH = $_[4]; # [in] ZMM with AAD (low 128 bits)4240 if ($GHASH ne "no_ghash") {4243 vpxorq $GHASH,$B00_03,$B00_03
659 * Enable extra Arm64 optimization on Windows for GHASH, RAND and AES.7529 This covers AES, SHA256/512 and GHASH. "Initial" means that most7540 SHA1, SHA256 and GHASH. "Initial" means that most common cases7552 SHA256/512, MD5, GHASH and modular exponentiation.9165 - `*`: GHASH and GF(2^m) multiplication implementations;
Completed in 74 milliseconds