Lines Matching refs:byte
33 * The following macros are used to move an (un)aligned 16 byte value to/from
37 * since Nehalem (original Core i7) was released. However, the movaps is a byte
277 # Requires the input data be at least 1 byte long because of READ_PARTIAL_BLOCK
407 # GHASH computation for the last <16 byte block
610 pshufb %xmm14, \TMP7 # byte-reflect the AAD data
626 pshufb %xmm14, \TMP7 # byte-reflect the AAD data
637 # Requires the input data be at least 1 byte long due to READ_PARTIAL_BLOCK
812 pshufb %xmm14, %xmm\index # perform a 16 byte swap
878 pshufb %xmm14, \XMM1 # perform a 16 byte swap
882 pshufb %xmm14, \XMM2 # perform a 16 byte swap
886 pshufb %xmm14, \XMM3 # perform a 16 byte swap
890 pshufb %xmm14, \XMM4 # perform a 16 byte swap
963 pshufb %xmm14, \XMM1 # perform a 16 byte swap
966 pshufb %xmm14, \XMM2 # perform a 16 byte swap
967 pshufb %xmm14, \XMM3 # perform a 16 byte swap
968 pshufb %xmm14, \XMM4 # perform a 16 byte swap
1004 pshufb %xmm15, \XMM1 # perform a 16 byte swap
1006 pshufb %xmm15, \XMM2 # perform a 16 byte swap
1007 pshufb %xmm15, \XMM3 # perform a 16 byte swap
1008 pshufb %xmm15, \XMM4 # perform a 16 byte swap
1133 pshufb %xmm15, \XMM1 # perform a 16 byte swap
1134 pshufb %xmm15, \XMM2 # perform a 16 byte swap
1135 pshufb %xmm15, \XMM3 # perform a 16 byte swap
1136 pshufb %xmm15, \XMM4 # perform a 16 byte swap
1212 pshufb %xmm15, \XMM1 # perform a 16 byte swap
1214 pshufb %xmm15, \XMM2 # perform a 16 byte swap
1215 pshufb %xmm15, \XMM3 # perform a 16 byte swap
1216 pshufb %xmm15, \XMM4 # perform a 16 byte swap
1345 pshufb %xmm15, \XMM1 # perform a 16 byte swap
1346 pshufb %xmm15, \XMM2 # perform a 16 byte swap
1347 pshufb %xmm15, \XMM3 # perform a 16 byte swap
1348 pshufb %xmm15, \XMM4 # perform a 16 byte swap
1515 * void aesni_gcm_dec(void *aes_ctx, // AES Key schedule. Starts on a 16 byte boundary.
1521 * u8 *iv, // Pre-counter block j0: 4 byte salt (from Security Association)
1522 * // concatenated with 8 byte Initialisation Vector (from IPSec ESP Payload)
1523 * // concatenated with 0x00000001. 16-byte aligned pointer.
1524 * u8 *hash_subkey, // H, the Hash sub key input. Data starts on a 16-byte boundary.
1606 * void aesni_gcm_enc(void *aes_ctx, // AES Key schedule. Starts on a 16 byte boundary.
1612 * u8 *iv, // Pre-counter block j0: 4 byte salt (from Security Association)
1613 * // concatenated with 8 byte Initialisation Vector (from IPSec ESP Payload)
1614 * // concatenated with 0x00000001. 16-byte aligned pointer.
1615 * u8 *hash_subkey, // H, the Hash sub key input. Data starts on a 16-byte boundary.
1694 * void aesni_gcm_init(void *aes_ctx, // AES Key schedule. Starts on a 16 byte boundary.
1697 * u8 *iv, // Pre-counter block j0: 4 byte salt (from Security Association)
1698 * // concatenated with 8 byte Initialisation Vector (from IPSec ESP Payload)
1699 * // concatenated with 0x00000001. 16-byte aligned pointer.
1700 * u8 *hash_subkey, // H, the Hash sub key input. Data starts on a 16-byte boundary.
1712 * void aesni_gcm_enc_update(void *aes_ctx, // AES Key schedule. Starts on a 16 byte boundary.
1727 * void aesni_gcm_dec_update(void *aes_ctx, // AES Key schedule. Starts on a 16 byte boundary.
1742 * void aesni_gcm_finalize(void *aes_ctx, // AES Key schedule. Starts on a 16 byte boundary.
2584 .byte 15, 14, 13, 12, 11, 10, 9, 8, 7, 6, 5, 4, 3, 2, 1, 0