Lines Matching defs:data
615 } data;
631 if (count < min || BF_decode(data.binary.salt, &setting[7], 16)) {
634 BF_swap(data.binary.salt, 4);
636 BF_set_key(key, data.expanded_key, data.ctx.s.P,
639 memcpy(data.ctx.s.S, BF_init_state.s.S, sizeof(data.ctx.s.S));
643 BF_word *ptr = &data.ctx.PS[0];
645 L = BF_encrypt(&data.ctx,
646 L ^ data.binary.salt[0], R ^ data.binary.salt[1],
651 if (ptr >= &data.ctx.PS[BF_N + 2 + 4 * 0x100])
654 L = BF_encrypt(&data.ctx,
655 L ^ data.binary.salt[2], R ^ data.binary.salt[3],
666 data.ctx.s.P[i] ^= data.expanded_key[i];
667 data.ctx.s.P[i + 1] ^= data.expanded_key[i + 1];
672 BF_encrypt(&data.ctx, 0, 0,
673 &data.ctx.PS[0],
674 &data.ctx.PS[BF_N + 2 + 4 * 0x100]);
683 tmp1 = data.binary.salt[0];
684 tmp2 = data.binary.salt[1];
685 tmp3 = data.binary.salt[2];
686 tmp4 = data.binary.salt[3];
688 data.ctx.s.P[i] ^= tmp1;
689 data.ctx.s.P[i + 1] ^= tmp2;
690 data.ctx.s.P[i + 2] ^= tmp3;
691 data.ctx.s.P[i + 3] ^= tmp4;
693 data.ctx.s.P[16] ^= tmp1;
694 data.ctx.s.P[17] ^= tmp2;
707 L = BF_encrypt(&data.ctx, L, LR[1],
711 data.binary.output[i] = L;
712 data.binary.output[i + 1] = LR[1];
721 BF_swap(data.binary.output, 6);
722 BF_encode(&output[7 + 22], data.binary.output, 23);
740 * 2. We don't want to leave sensitive data from our actual password hash
771 * which makes the second call overwrite the first call's sensitive data on the