File | Code |
---|---|
perl6/doc…/code.pws :96: |
blake's |
skinkade/p6-crypt-argon2…/Makefile :16: |
SRC = src/argon2.c src/core.c src/blake2/blake2b.c src/thread.c src/encoding.c |
skinkade/p6-crypt-argon2…/Makefile :97: |
cd src/blake2/ && rm -f *.o |
skinkade/p6-crypt-argon2…/Makefile :118: |
-i include/*.h src/*.c src/*.h src/blake2/*.c src/blake2/*.h |
skinkade/p6-crypt-argon2…/blake2.h :12: |
enum blake2b_constant { |
skinkade/p6-crypt-argon2…/blake2.h :21: |
typedef struct __blake2b_param { |
skinkade/p6-crypt-argon2…/blake2.h :33: |
} blake2b_param; |
skinkade/p6-crypt-argon2…/blake2.h :36: |
typedef struct __blake2b_state { |
skinkade/p6-crypt-argon2…/blake2.h :44: |
} blake2b_state; |
skinkade/p6-crypt-argon2…/blake2.h :49: |
blake2_size_check_0 = 1 / !!(CHAR_BIT == 8), |
skinkade/p6-crypt-argon2…/blake2.h :50: |
blake2_size_check_2 = |
skinkade/p6-crypt-argon2…/blake2.h :51: |
1 / !!(sizeof(blake2b_param) == sizeof(uint64_t) * CHAR_BIT) |
skinkade/p6-crypt-argon2…/blake2.h :55: |
int blake2b_init(blake2b_state *S, size_t outlen); |
skinkade/p6-crypt-argon2…/blake2.h :56: |
int blake2b_init_key(blake2b_state *S, size_t outlen, const void *key, |
skinkade/p6-crypt-argon2…/blake2.h :58: |
int blake2b_init_param(blake2b_state *S, const blake2b_param *P); |
skinkade/p6-crypt-argon2…/blake2.h :59: |
int blake2b_update(blake2b_state *S, const void *in, size_t inlen); |
skinkade/p6-crypt-argon2…/blake2.h :60: |
int blake2b_final(blake2b_state *S, void *out, size_t outlen); |
skinkade/p6-crypt-argon2…/blake2.h :63: |
int blake2b(void *out, size_t outlen, const void *in, size_t inlen, |
skinkade/p6-crypt-argon2…/blake2.h :67: |
int blake2b_long(void *out, size_t outlen, const void *in, size_t inlen); |
skinkade/p6-crypt-argon2…/blake2b.c :5: |
#include "blake2.h" |
skinkade/p6-crypt-argon2…/blake2b.c :6: |
#include "blake2-impl.h" |
skinkade/p6-crypt-argon2…/blake2b.c :8: |
static const uint64_t blake2b_IV[8] = { |
skinkade/p6-crypt-argon2…/blake2b.c :14: |
static const unsigned int blake2b_sigma[12][16] = { |
skinkade/p6-crypt-argon2…/blake2b.c :29: |
static BLAKE2_INLINE void blake2b_set_lastnode(blake2b_state *S) { |
skinkade/p6-crypt-argon2…/blake2b.c :33: |
static BLAKE2_INLINE void blake2b_set_lastblock(blake2b_state *S) { |
skinkade/p6-crypt-argon2…/blake2b.c :35: |
blake2b_set_lastnode(S); |
skinkade/p6-crypt-argon2…/blake2b.c :40: |
static BLAKE2_INLINE void blake2b_increment_counter(blake2b_state *S, |
skinkade/p6-crypt-argon2…/blake2b.c :46: |
static BLAKE2_INLINE void blake2b_invalidate_state(blake2b_state *S) { |
skinkade/p6-crypt-argon2…/blake2b.c :48: |
blake2b_set_lastblock(S); /* invalidate for further use */ |
skinkade/p6-crypt-argon2…/blake2b.c :51: |
static BLAKE2_INLINE void blake2b_init0(blake2b_state *S) { |
skinkade/p6-crypt-argon2…/blake2b.c :53: |
memcpy(S->h, blake2b_IV, sizeof(S->h)); |
skinkade/p6-crypt-argon2…/blake2b.c :56: |
int blake2b_init_param(blake2b_state *S, const blake2b_param *P) { |
skinkade/p6-crypt-argon2…/blake2b.c :64: |
blake2b_init0(S); |
skinkade/p6-crypt-argon2…/blake2b.c :73: |
/* Sequential blake2b initialization */ |
skinkade/p6-crypt-argon2…/blake2b.c :74: |
int blake2b_init(blake2b_state *S, size_t outlen) { |
skinkade/p6-crypt-argon2…/blake2b.c :75: |
blake2b_param P; |
skinkade/p6-crypt-argon2…/blake2b.c :82: |
blake2b_invalidate_state(S); |
skinkade/p6-crypt-argon2…/blake2b.c :99: |
return blake2b_init_param(S, &P); |
skinkade/p6-crypt-argon2…/blake2b.c :102: |
int blake2b_init_key(blake2b_state *S, size_t outlen, const void *key, |
skinkade/p6-crypt-argon2…/blake2b.c :104: |
blake2b_param P; |
skinkade/p6-crypt-argon2…/blake2b.c :111: |
blake2b_invalidate_state(S); |
skinkade/p6-crypt-argon2…/blake2b.c :116: |
blake2b_invalidate_state(S); |
skinkade/p6-crypt-argon2…/blake2b.c :133: |
if (blake2b_init_param(S, &P) < 0) { |
skinkade/p6-crypt-argon2…/blake2b.c :134: |
blake2b_invalidate_state(S); |
skinkade/p6-crypt-argon2…/blake2b.c :142: |
blake2b_update(S, block, BLAKE2B_BLOCKBYTES); |
skinkade/p6-crypt-argon2…/blake2b.c :148: |
static void blake2b_compress(blake2b_state *S, const uint8_t *block) { |
skinkade/p6-crypt-argon2…/blake2b.c :161: |
v[8] = blake2b_IV[0]; |
skinkade/p6-crypt-argon2…/blake2b.c :162: |
v[9] = blake2b_IV[1]; |
skinkade/p6-crypt-argon2…/blake2b.c :163: |
v[10] = blake2b_IV[2]; |
skinkade/p6-crypt-argon2…/blake2b.c :164: |
v[11] = blake2b_IV[3]; |
skinkade/p6-crypt-argon2…/blake2b.c :165: |
v[12] = blake2b_IV[4] ^ S->t[0]; |
skinkade/p6-crypt-argon2…/blake2b.c :166: |
v[13] = blake2b_IV[5] ^ S->t[1]; |
skinkade/p6-crypt-argon2…/blake2b.c :167: |
v[14] = blake2b_IV[6] ^ S->f[0]; |
skinkade/p6-crypt-argon2…/blake2b.c :168: |
v[15] = blake2b_IV[7] ^ S->f[1]; |
skinkade/p6-crypt-argon2…/blake2b.c :172: |
a = a + b + m[blake2b_sigma[r][2 * i + 0]]; \ |
skinkade/p6-crypt-argon2…/blake2b.c :176: |
a = a + b + m[blake2b_sigma[r][2 * i + 1]]; \ |
skinkade/p6-crypt-argon2…/blake2b.c :206: |
int blake2b_update(blake2b_state *S, const void *in, size_t inlen) { |
skinkade/p6-crypt-argon2…/blake2b.c :228: |
blake2b_increment_counter(S, BLAKE2B_BLOCKBYTES); |
skinkade/p6-crypt-argon2…/blake2b.c :229: |
blake2b_compress(S, S->buf); |
skinkade/p6-crypt-argon2…/blake2b.c :235: |
blake2b_increment_counter(S, BLAKE2B_BLOCKBYTES); |
skinkade/p6-crypt-argon2…/blake2b.c :236: |
blake2b_compress(S, pin); |
skinkade/p6-crypt-argon2…/blake2b.c :246: |
int blake2b_final(blake2b_state *S, void *out, size_t outlen) { |
skinkade/p6-crypt-argon2…/blake2b.c :260: |
blake2b_increment_counter(S, S->buflen); |
skinkade/p6-crypt-argon2…/blake2b.c :261: |
blake2b_set_lastblock(S); |
skinkade/p6-crypt-argon2…/blake2b.c :263: |
blake2b_compress(S, S->buf); |
skinkade/p6-crypt-argon2…/blake2b.c :276: |
int blake2b(void *out, size_t outlen, const void *in, size_t inlen, |
skinkade/p6-crypt-argon2…/blake2b.c :278: |
blake2b_state S; |
skinkade/p6-crypt-argon2…/blake2b.c :295: |
if (blake2b_init_key(&S, outlen, key, keylen) < 0) { |
skinkade/p6-crypt-argon2…/blake2b.c :299: |
if (blake2b_init(&S, outlen) < 0) { |
skinkade/p6-crypt-argon2…/blake2b.c :304: |
if (blake2b_update(&S, in, inlen) < 0) { |
skinkade/p6-crypt-argon2…/blake2b.c :307: |
ret = blake2b_final(&S, out, outlen); |
skinkade/p6-crypt-argon2…/blake2b.c :315: |
int blake2b_long(void *pout, size_t outlen, const void *in, size_t inlen) { |
skinkade/p6-crypt-argon2…/blake2b.c :317: |
blake2b_state blake_state; |
skinkade/p6-crypt-argon2…/blake2b.c :337: |
TRY(blake2b_init(&blake_state, outlen)); |
skinkade/p6-crypt-argon2…/blake2b.c :338: |
TRY(blake2b_update(&blake_state, outlen_bytes, sizeof(outlen_bytes))); |
skinkade/p6-crypt-argon2…/blake2b.c :339: |
TRY(blake2b_update(&blake_state, in, inlen)); |
skinkade/p6-crypt-argon2…/blake2b.c :340: |
TRY(blake2b_final(&blake_state, out, outlen)); |
skinkade/p6-crypt-argon2…/blake2b.c :345: |
TRY(blake2b_init(&blake_state, BLAKE2B_OUTBYTES)); |
skinkade/p6-crypt-argon2…/blake2b.c :346: |
TRY(blake2b_update(&blake_state, outlen_bytes, sizeof(outlen_bytes))); |
skinkade/p6-crypt-argon2…/blake2b.c :347: |
TRY(blake2b_update(&blake_state, in, inlen)); |
skinkade/p6-crypt-argon2…/blake2b.c :348: |
TRY(blake2b_final(&blake_state, out_buffer, BLAKE2B_OUTBYTES)); |
skinkade/p6-crypt-argon2…/blake2b.c :355: |
TRY(blake2b(out_buffer, BLAKE2B_OUTBYTES, in_buffer, |
skinkade/p6-crypt-argon2…/blake2b.c :363: |
TRY(blake2b(out_buffer, toproduce, in_buffer, BLAKE2B_OUTBYTES, NULL, |
skinkade/p6-crypt-argon2…/blake2b.c :368: |
burn(&blake_state, sizeof(blake_state)); |
skinkade/p6-crypt-argon2…/blamka-round-opt.h :4: |
#include "blake2-impl.h" |
skinkade/p6-crypt-argon2…/blamka-round-ref.h :4: |
#include "blake2.h" |
skinkade/p6-crypt-argon2…/blamka-round-ref.h :5: |
#include "blake2-impl.h" |
skinkade/p6-crypt-argon2…/core.c :31: |
#include "blake2/blake2.h" |
skinkade/p6-crypt-argon2…/core.c :32: |
#include "blake2/blake2-impl.h" |
skinkade/p6-crypt-argon2…/core.c :144: |
blake2b_long(context->out, context->outlen, blockhash_bytes, |
skinkade/p6-crypt-argon2…/core.c :474: |
blake2b_long(blockhash_bytes, ARGON2_BLOCK_SIZE, blockhash, |
skinkade/p6-crypt-argon2…/core.c :480: |
blake2b_long(blockhash_bytes, ARGON2_BLOCK_SIZE, blockhash, |
skinkade/p6-crypt-argon2…/core.c :490: |
blake2b_state BlakeHash; |
skinkade/p6-crypt-argon2…/core.c :497: |
blake2b_init(&BlakeHash, ARGON2_PREHASH_DIGEST_LENGTH); |
skinkade/p6-crypt-argon2…/core.c :500: |
blake2b_update(&BlakeHash, (const uint8_t *)&value, sizeof(value)); |
skinkade/p6-crypt-argon2…/core.c :503: |
blake2b_update(&BlakeHash, (const uint8_t *)&value, sizeof(value)); |
skinkade/p6-crypt-argon2…/core.c :506: |
blake2b_update(&BlakeHash, (const uint8_t *)&value, sizeof(value)); |
skinkade/p6-crypt-argon2…/core.c :509: |
blake2b_update(&BlakeHash, (const uint8_t *)&value, sizeof(value)); |
skinkade/p6-crypt-argon2…/core.c :512: |
blake2b_update(&BlakeHash, (const uint8_t *)&value, sizeof(value)); |
skinkade/p6-crypt-argon2…/core.c :515: |
blake2b_update(&BlakeHash, (const uint8_t *)&value, sizeof(value)); |
skinkade/p6-crypt-argon2…/core.c :518: |
blake2b_update(&BlakeHash, (const uint8_t *)&value, sizeof(value)); |
skinkade/p6-crypt-argon2…/core.c :521: |
blake2b_update(&BlakeHash, (const uint8_t *)context->pwd, |
skinkade/p6-crypt-argon2…/core.c :531: |
blake2b_update(&BlakeHash, (const uint8_t *)&value, sizeof(value)); |
skinkade/p6-crypt-argon2…/core.c :534: |
blake2b_update(&BlakeHash, (const uint8_t *)context->salt, |
skinkade/p6-crypt-argon2…/core.c :539: |
blake2b_update(&BlakeHash, (const uint8_t *)&value, sizeof(value)); |
skinkade/p6-crypt-argon2…/core.c :542: |
blake2b_update(&BlakeHash, (const uint8_t *)context->secret, |
skinkade/p6-crypt-argon2…/core.c :552: |
blake2b_update(&BlakeHash, (const uint8_t *)&value, sizeof(value)); |
skinkade/p6-crypt-argon2…/core.c :555: |
blake2b_update(&BlakeHash, (const uint8_t *)context->ad, |
skinkade/p6-crypt-argon2…/core.c :559: |
blake2b_final(&BlakeHash, blockhash, ARGON2_PREHASH_DIGEST_LENGTH); |
skinkade/p6-crypt-argon2…/opt.c :21: |
#include "blake2/blake2.h" |
skinkade/p6-crypt-argon2…/opt.c :22: |
#include "blake2/blamka-round-opt.h" |
skinkade/p6-crypt-argon2…/ref.c :21: |
#include "blake2/blamka-round-ref.h" |
skinkade/p6-crypt-argon2…/ref.c :22: |
#include "blake2/blake2-impl.h" |
skinkade/p6-crypt-argon2…/ref.c :23: |
#include "blake2/blake2.h" |
Created
February 1, 2019 23:10
-
-
Save Whateverable/dcce1c6d08ed255c0da339a136b5eaee to your computer and use it in GitHub Desktop.
greppable6
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
blake |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment