Lines Matching full:step
49 /* 10.4.3 step 2 / 4 */ in drbg_ctr_bcc()
54 /* 10.4.3 step 4.1 */ in drbg_ctr_bcc()
56 /* 10.4.3 step 4.2 */ in drbg_ctr_bcc()
67 /* 10.4.3 step 4.2 for last block */ in drbg_ctr_bcc()
128 /* 10.4.2 step 7 */ in crypto_drbg_ctr_df()
130 /* 10.4.2 step 8 */ in crypto_drbg_ctr_df()
145 /* 10.4.2 step 1 is implicit as we work byte-wise */ in crypto_drbg_ctr_df()
147 /* 10.4.2 step 2 */ in crypto_drbg_ctr_df()
151 /* 10.4.2 step 2 -- calculate the entire length of all input data */ in crypto_drbg_ctr_df()
156 /* 10.4.2 step 3 */ in crypto_drbg_ctr_df()
159 /* 10.4.2 step 5: length is L_N, input_string, one byte, padding */ in crypto_drbg_ctr_df()
172 /* 10.4.2 step 4 -- first fill the linked list and then order it */ in crypto_drbg_ctr_df()
181 /* 10.4.2 step 9 */ in crypto_drbg_ctr_df()
184 * 10.4.2 step 9.1 - the padding is implicit as the buffer in crypto_drbg_ctr_df()
189 /* 10.4.2 step 9.2 -- BCC and concatenation with temp */ in crypto_drbg_ctr_df()
192 /* 10.4.2 step 9.3 */ in crypto_drbg_ctr_df()
197 /* 10.4.2 step 11 */ in crypto_drbg_ctr_df()
201 /* 10.4.2 step 12: overwriting of outval is implemented in next step */ in crypto_drbg_ctr_df()
203 /* 10.4.2 step 13 */ in crypto_drbg_ctr_df()
208 * 10.4.2 step 13.1: the truncation of the key length is in crypto_drbg_ctr_df()
217 /* 10.4.2 step 13.2 and 14 */ in crypto_drbg_ctr_df()