android_kernel_xiaomi_sm8350/crypto
Nicolas Pitre cfa8d17cc8 [CRYPTO] sha1: Avoid useless memcpy()
The current code unconditionally copy the first block for every call to
sha1_update().  This can be avoided if there is no pending partial block.
This is always the case on the first call to sha1_update() (if the length
is >= 64 of course.

Furthermore, temp does need to be called if sha_transform is never invoked.
Also consolidate the sha_transform calls into one to reduce code size.

Signed-off-by: Nicolas Pitre <nico@cam.org>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
2006-01-09 14:15:41 -08:00
..
aes.c [CRYPTO] Allow AES C/ASM implementations to coexist 2006-01-09 14:15:39 -08:00
anubis.c [CRYPTO] Use standard byte order macros wherever possible 2006-01-09 14:15:34 -08:00
api.c [CRYPTO] Allow multiple implementations of the same algorithm 2006-01-09 14:15:37 -08:00
arc4.c
blowfish.c [CRYPTO] Use standard byte order macros wherever possible 2006-01-09 14:15:34 -08:00
cast5.c [CRYPTO] Use standard byte order macros wherever possible 2006-01-09 14:15:34 -08:00
cast6.c [CRYPTO] Use standard byte order macros wherever possible 2006-01-09 14:15:34 -08:00
cipher.c
compress.c
crc32c.c [CRYPTO] Use standard byte order macros wherever possible 2006-01-09 14:15:34 -08:00
crypto_null.c
deflate.c
des.c [CRYPTO] Use standard byte order macros wherever possible 2006-01-09 14:15:34 -08:00
digest.c
hmac.c
internal.h [CRYPTO] Allow multiple implementations of the same algorithm 2006-01-09 14:15:37 -08:00
Kconfig [CRYPTO] Allow AES C/ASM implementations to coexist 2006-01-09 14:15:39 -08:00
khazad.c [CRYPTO] Use standard byte order macros wherever possible 2006-01-09 14:15:34 -08:00
Makefile
md4.c [CRYPTO] Use standard byte order macros wherever possible 2006-01-09 14:15:34 -08:00
md5.c [CRYPTO] Use standard byte order macros wherever possible 2006-01-09 14:15:34 -08:00
michael_mic.c [CRYPTO] Use standard byte order macros wherever possible 2006-01-09 14:15:34 -08:00
proc.c [CRYPTO] Allow multiple implementations of the same algorithm 2006-01-09 14:15:37 -08:00
scatterwalk.c
scatterwalk.h
serpent.c [CRYPTO] Use standard byte order macros wherever possible 2006-01-09 14:15:34 -08:00
sha1.c [CRYPTO] sha1: Avoid useless memcpy() 2006-01-09 14:15:41 -08:00
sha256.c [CRYPTO] Use standard byte order macros wherever possible 2006-01-09 14:15:34 -08:00
sha512.c [CRYPTO] Use standard byte order macros wherever possible 2006-01-09 14:15:34 -08:00
tcrypt.c
tcrypt.h
tea.c [CRYPTO] Use standard byte order macros wherever possible 2006-01-09 14:15:34 -08:00
tgr192.c [CRYPTO] Use standard byte order macros wherever possible 2006-01-09 14:15:34 -08:00
twofish.c [CRYPTO] Use standard byte order macros wherever possible 2006-01-09 14:15:34 -08:00
wp512.c [CRYPTO] Use standard byte order macros wherever possible 2006-01-09 14:15:34 -08:00