/kernel/linux/linux-5.10/arch/arm64/crypto/ |
H A D | aes-ce.S | 28 .macro load_round_keys, rounds, rk 29 cmp \rounds, #12 40 .macro enc_prepare, rounds, rk, temp 42 load_round_keys \rounds, \temp 46 .macro enc_switch_key, rounds, rk, temp 48 load_round_keys \rounds, \temp 52 .macro dec_prepare, rounds, rk, temp 54 load_round_keys \rounds, \temp 76 /* up to 5 interleaved encryption rounds with the same round key */ 85 /* up to 5 interleaved final rounds */ [all...] |
H A D | aes-neonbs-glue.c | 26 asmlinkage void aesbs_convert_key(u8 out[], u32 const rk[], int rounds); 29 int rounds, int blocks); 31 int rounds, int blocks); 34 int rounds, int blocks, u8 iv[]); 37 int rounds, int blocks, u8 iv[], u8 final[]); 40 int rounds, int blocks, u8 iv[]); 42 int rounds, int blocks, u8 iv[]); 46 int rounds, int blocks); 48 int rounds, int blocks, u8 iv[]); 50 u32 const rk1[], int rounds, in 58 int rounds; global() member 97 __ecb_crypt(struct skcipher_request *req, void (*fn)(u8 out[], u8 const in[], u8 const rk[], int rounds, int blocks)) __ecb_crypt() argument 318 __xts_crypt(struct skcipher_request *req, bool encrypt, void (*fn)(u8 out[], u8 const in[], u8 const rk[], int rounds, int blocks, u8 iv[])) __xts_crypt() argument [all...] |
H A D | aes-cipher-glue.c | 12 asmlinkage void __aes_arm64_encrypt(u32 *rk, u8 *out, const u8 *in, int rounds); 13 asmlinkage void __aes_arm64_decrypt(u32 *rk, u8 *out, const u8 *in, int rounds); 18 int rounds = 6 + ctx->key_length / 4; in aes_arm64_encrypt() local 20 __aes_arm64_encrypt(ctx->key_enc, out, in, rounds); in aes_arm64_encrypt() 26 int rounds = 6 + ctx->key_length / 4; in aes_arm64_decrypt() local 28 __aes_arm64_decrypt(ctx->key_dec, out, in, rounds); in aes_arm64_decrypt()
|
H A D | aes-glue.c | 75 int rounds, int blocks); 77 int rounds, int blocks); 80 int rounds, int blocks, u8 iv[]); 82 int rounds, int blocks, u8 iv[]); 85 int rounds, int bytes, u8 const iv[]); 87 int rounds, int bytes, u8 const iv[]); 90 int rounds, int blocks, u8 ctr[]); 93 int rounds, int bytes, u32 const rk2[], u8 iv[], 96 int rounds, int bytes, u32 const rk2[], u8 iv[], 100 int rounds, in 177 int err, rounds = 6 + ctx->key_length / 4; ecb_encrypt() local 197 int err, rounds = 6 + ctx->key_length / 4; ecb_decrypt() local 218 int err = 0, rounds = 6 + ctx->key_length / 4; cbc_encrypt_walk() local 247 int err = 0, rounds = 6 + ctx->key_length / 4; cbc_decrypt_walk() local 275 int err, rounds = 6 + ctx->key_length / 4; cts_cbc_encrypt() local 332 int err, rounds = 6 + ctx->key_length / 4; cts_cbc_decrypt() local 405 int err, rounds = 6 + ctx->key1.key_length / 4; essiv_cbc_encrypt() local 427 int err, rounds = 6 + ctx->key1.key_length / 4; essiv_cbc_decrypt() local 449 int err, rounds = 6 + ctx->key_length / 4; ctr_encrypt() local 511 int err, first, rounds = 6 + ctx->key1.key_length / 4; xts_encrypt() local 583 int err, first, rounds = 6 + ctx->key1.key_length / 4; xts_decrypt() local 794 int rounds = 6 + key_len / 4; cmac_setkey() local 823 int rounds = 6 + key_len / 4; xcbc_setkey() local 852 int rounds = 6 + ctx->key_length / 4; mac_do_update() local [all...] |
H A D | aes-neon.S | 98 .macro do_block, enc, in, rounds, rk, rkp, i 101 mov \i, \rounds 114 .macro encrypt_block, in, rounds, rk, rkp, i 115 do_block 1, \in, \rounds, \rk, \rkp, \i 118 .macro decrypt_block, in, rounds, rk, rkp, i 119 do_block 0, \in, \rounds, \rk, \rkp, \i 205 .macro do_block_4x, enc, in0, in1, in2, in3, rounds, rk, rkp, i 208 mov \i, \rounds 231 .macro encrypt_block4x, in0, in1, in2, in3, rounds, rk, rkp, i 232 do_block_4x 1, \in0, \in1, \in2, \in3, \rounds, \r [all...] |
/kernel/linux/linux-6.6/arch/arm64/crypto/ |
H A D | aes-ce.S | 28 .macro load_round_keys, rounds, rk 29 cmp \rounds, #12 40 .macro enc_prepare, rounds, rk, temp 42 load_round_keys \rounds, \temp 46 .macro enc_switch_key, rounds, rk, temp 48 load_round_keys \rounds, \temp 52 .macro dec_prepare, rounds, rk, temp 54 load_round_keys \rounds, \temp 76 /* up to 5 interleaved encryption rounds with the same round key */ 85 /* up to 5 interleaved final rounds */ [all...] |
H A D | aes-neonbs-glue.c | 26 asmlinkage void aesbs_convert_key(u8 out[], u32 const rk[], int rounds); 29 int rounds, int blocks); 31 int rounds, int blocks); 34 int rounds, int blocks, u8 iv[]); 37 int rounds, int blocks, u8 iv[]); 40 int rounds, int blocks, u8 iv[]); 42 int rounds, int blocks, u8 iv[]); 46 int rounds, int blocks); 48 int rounds, int blocks, u8 iv[]); 50 int rounds, in 60 int rounds; global() member 94 __ecb_crypt(struct skcipher_request *req, void (*fn)(u8 out[], u8 const in[], u8 const rk[], int rounds, int blocks)) __ecb_crypt() argument 276 __xts_crypt(struct skcipher_request *req, bool encrypt, void (*fn)(u8 out[], u8 const in[], u8 const rk[], int rounds, int blocks, u8 iv[])) __xts_crypt() argument [all...] |
H A D | aes-cipher-glue.c | 12 asmlinkage void __aes_arm64_encrypt(u32 *rk, u8 *out, const u8 *in, int rounds); 13 asmlinkage void __aes_arm64_decrypt(u32 *rk, u8 *out, const u8 *in, int rounds); 18 int rounds = 6 + ctx->key_length / 4; in aes_arm64_encrypt() local 20 __aes_arm64_encrypt(ctx->key_enc, out, in, rounds); in aes_arm64_encrypt() 26 int rounds = 6 + ctx->key_length / 4; in aes_arm64_decrypt() local 28 __aes_arm64_decrypt(ctx->key_dec, out, in, rounds); in aes_arm64_decrypt()
|
H A D | aes-glue.c | 78 int rounds, int blocks); 80 int rounds, int blocks); 83 int rounds, int blocks, u8 iv[]); 85 int rounds, int blocks, u8 iv[]); 88 int rounds, int bytes, u8 const iv[]); 90 int rounds, int bytes, u8 const iv[]); 93 int rounds, int bytes, u8 ctr[]); 96 int rounds, int bytes, u8 ctr[], int byte_ctr); 99 int rounds, int bytes, u32 const rk2[], u8 iv[], 102 int rounds, in 183 int err, rounds = 6 + ctx->key_length / 4; ecb_encrypt() local 203 int err, rounds = 6 + ctx->key_length / 4; ecb_decrypt() local 224 int err = 0, rounds = 6 + ctx->key_length / 4; cbc_encrypt_walk() local 253 int err = 0, rounds = 6 + ctx->key_length / 4; cbc_decrypt_walk() local 281 int err, rounds = 6 + ctx->key_length / 4; cts_cbc_encrypt() local 338 int err, rounds = 6 + ctx->key_length / 4; cts_cbc_decrypt() local 411 int err, rounds = 6 + ctx->key1.key_length / 4; essiv_cbc_encrypt() local 433 int err, rounds = 6 + ctx->key1.key_length / 4; essiv_cbc_decrypt() local 455 int err, rounds = 6 + ctx->key_length / 4; xctr_encrypt() local 501 int err, rounds = 6 + ctx->key_length / 4; ctr_encrypt() local 545 int err, first, rounds = 6 + ctx->key1.key_length / 4; xts_encrypt() local 617 int err, first, rounds = 6 + ctx->key1.key_length / 4; xts_decrypt() local 822 int rounds = 6 + key_len / 4; cmac_setkey() local 851 int rounds = 6 + key_len / 4; xcbc_setkey() local 880 int rounds = 6 + ctx->key_length / 4; mac_do_update() local [all...] |
H A D | aes-neon.S | 98 .macro do_block, enc, in, rounds, rk, rkp, i 101 mov \i, \rounds 114 .macro encrypt_block, in, rounds, rk, rkp, i 115 do_block 1, \in, \rounds, \rk, \rkp, \i 118 .macro decrypt_block, in, rounds, rk, rkp, i 119 do_block 0, \in, \rounds, \rk, \rkp, \i 205 .macro do_block_4x, enc, in0, in1, in2, in3, rounds, rk, rkp, i 208 mov \i, \rounds 231 .macro encrypt_block4x, in0, in1, in2, in3, rounds, rk, rkp, i 232 do_block_4x 1, \in0, \in1, \in2, \in3, \rounds, \r [all...] |
/kernel/linux/linux-5.10/arch/powerpc/crypto/ |
H A D | aes-spe-glue.c | 44 u32 rounds; member 51 u32 rounds; member 54 extern void ppc_encrypt_aes(u8 *out, const u8 *in, u32 *key_enc, u32 rounds); 55 extern void ppc_decrypt_aes(u8 *out, const u8 *in, u32 *key_dec, u32 rounds); 56 extern void ppc_encrypt_ecb(u8 *out, const u8 *in, u32 *key_enc, u32 rounds, 58 extern void ppc_decrypt_ecb(u8 *out, const u8 *in, u32 *key_dec, u32 rounds, 60 extern void ppc_encrypt_cbc(u8 *out, const u8 *in, u32 *key_enc, u32 rounds, 62 extern void ppc_decrypt_cbc(u8 *out, const u8 *in, u32 *key_dec, u32 rounds, 64 extern void ppc_crypt_ctr (u8 *out, const u8 *in, u32 *key_enc, u32 rounds, 66 extern void ppc_encrypt_xts(u8 *out, const u8 *in, u32 *key_enc, u32 rounds, [all...] |
/kernel/linux/linux-6.6/arch/powerpc/crypto/ |
H A D | aes-spe-glue.c | 44 u32 rounds; member 51 u32 rounds; member 54 extern void ppc_encrypt_aes(u8 *out, const u8 *in, u32 *key_enc, u32 rounds); 55 extern void ppc_decrypt_aes(u8 *out, const u8 *in, u32 *key_dec, u32 rounds); 56 extern void ppc_encrypt_ecb(u8 *out, const u8 *in, u32 *key_enc, u32 rounds, 58 extern void ppc_decrypt_ecb(u8 *out, const u8 *in, u32 *key_dec, u32 rounds, 60 extern void ppc_encrypt_cbc(u8 *out, const u8 *in, u32 *key_enc, u32 rounds, 62 extern void ppc_decrypt_cbc(u8 *out, const u8 *in, u32 *key_dec, u32 rounds, 64 extern void ppc_crypt_ctr (u8 *out, const u8 *in, u32 *key_enc, u32 rounds, 66 extern void ppc_encrypt_xts(u8 *out, const u8 *in, u32 *key_enc, u32 rounds, [all...] |
H A D | aesp10-ppc.pl | 120 my ($inp,$bits,$out,$ptr,$cnt,$rounds)=map("r$_",(3..8)); 261 li $rounds,10 335 li $rounds,12 343 li $rounds,14 397 stw $rounds,0($out) 417 slwi $cnt,$rounds,4 419 srwi $rounds,$rounds,1 421 mtctr $rounds 459 my ($inp,$out,$key,$rounds, [all...] |
/kernel/linux/linux-5.10/arch/arm/crypto/ |
H A D | aes-cipher-glue.c | 13 asmlinkage void __aes_arm_encrypt(u32 *rk, int rounds, const u8 *in, u8 *out); 14 asmlinkage void __aes_arm_decrypt(u32 *rk, int rounds, const u8 *in, u8 *out); 19 int rounds = 6 + ctx->key_length / 4; in aes_arm_encrypt() local 21 __aes_arm_encrypt(ctx->key_enc, rounds, in, out); in aes_arm_encrypt() 27 int rounds = 6 + ctx->key_length / 4; in aes_arm_decrypt() local 29 __aes_arm_decrypt(ctx->key_dec, rounds, in, out); in aes_arm_decrypt()
|
H A D | aes-neonbs-glue.c | 26 asmlinkage void aesbs_convert_key(u8 out[], u32 const rk[], int rounds); 29 int rounds, int blocks); 31 int rounds, int blocks); 34 int rounds, int blocks, u8 iv[]); 37 int rounds, int blocks, u8 ctr[], u8 final[]); 40 int rounds, int blocks, u8 iv[], int); 42 int rounds, int blocks, u8 iv[], int); 45 int rounds; member 76 ctx->rounds = 6 + key_len / 4; in aesbs_setkey() 79 aesbs_convert_key(ctx->rk, rk.key_enc, ctx->rounds); in aesbs_setkey() 85 __ecb_crypt(struct skcipher_request *req, void (*fn)(u8 out[], u8 const in[], u8 const rk[], int rounds, int blocks)) __ecb_crypt() argument 341 __xts_crypt(struct skcipher_request *req, bool encrypt, void (*fn)(u8 out[], u8 const in[], u8 const rk[], int rounds, int blocks, u8 iv[], int)) __xts_crypt() argument [all...] |
H A D | aes-ce-glue.c | 30 int rounds, int blocks); 32 int rounds, int blocks); 35 int rounds, int blocks, u8 iv[]); 37 int rounds, int blocks, u8 iv[]); 39 int rounds, int bytes, u8 const iv[]); 41 int rounds, int bytes, u8 const iv[]); 44 int rounds, int blocks, u8 ctr[]); 47 int rounds, int bytes, u8 iv[], 50 int rounds, int bytes, u8 iv[], 60 * # of rounds specifie in num_rounds() 448 int err, first, rounds = num_rounds(&ctx->key1); xts_encrypt() local 520 int err, first, rounds = num_rounds(&ctx->key1); xts_decrypt() local [all...] |
/kernel/linux/linux-6.6/arch/arm/crypto/ |
H A D | aes-cipher-glue.c | 13 asmlinkage void __aes_arm_encrypt(u32 *rk, int rounds, const u8 *in, u8 *out); 14 asmlinkage void __aes_arm_decrypt(u32 *rk, int rounds, const u8 *in, u8 *out); 19 int rounds = 6 + ctx->key_length / 4; in aes_arm_encrypt() local 21 __aes_arm_encrypt(ctx->key_enc, rounds, in, out); in aes_arm_encrypt() 27 int rounds = 6 + ctx->key_length / 4; in aes_arm_decrypt() local 29 __aes_arm_decrypt(ctx->key_dec, rounds, in, out); in aes_arm_decrypt()
|
H A D | aes-neonbs-glue.c | 29 asmlinkage void aesbs_convert_key(u8 out[], u32 const rk[], int rounds); 32 int rounds, int blocks); 34 int rounds, int blocks); 37 int rounds, int blocks, u8 iv[]); 40 int rounds, int blocks, u8 ctr[]); 43 int rounds, int blocks, u8 iv[], int); 45 int rounds, int blocks, u8 iv[], int); 48 int rounds; member 79 ctx->rounds = 6 + key_len / 4; in aesbs_setkey() 82 aesbs_convert_key(ctx->rk, rk.key_enc, ctx->rounds); in aesbs_setkey() 88 __ecb_crypt(struct skcipher_request *req, void (*fn)(u8 out[], u8 const in[], u8 const rk[], int rounds, int blocks)) __ecb_crypt() argument 337 __xts_crypt(struct skcipher_request *req, bool encrypt, void (*fn)(u8 out[], u8 const in[], u8 const rk[], int rounds, int blocks, u8 iv[], int)) __xts_crypt() argument [all...] |
H A D | aes-ce-glue.c | 30 int rounds, int blocks); 32 int rounds, int blocks); 35 int rounds, int blocks, u8 iv[]); 37 int rounds, int blocks, u8 iv[]); 39 int rounds, int bytes, u8 const iv[]); 41 int rounds, int bytes, u8 const iv[]); 44 int rounds, int blocks, u8 ctr[]); 47 int rounds, int bytes, u8 iv[], 50 int rounds, int bytes, u8 iv[], 60 * # of rounds specifie in num_rounds() 448 int err, first, rounds = num_rounds(&ctx->key1); xts_encrypt() local 520 int err, first, rounds = num_rounds(&ctx->key1); xts_decrypt() local [all...] |
/kernel/linux/linux-5.10/tools/power/cpupower/bench/ |
H A D | benchmark.c | 24 * compute how many rounds of calculation we should do 29 * @retval rounds of calculation 37 unsigned int rounds = 0; in calculate_timespace() local 43 /* get the initial calculation time for a specific number of rounds */ in calculate_timespace() 53 rounds = (unsigned int)(load * estimated / timed); in calculate_timespace() 54 dprintf("calibrating with %u rounds\n", rounds); in calculate_timespace() 56 ROUNDS(rounds); in calculate_timespace() 60 estimated = rounds; in calculate_timespace() 91 for (_round = 1; _round <= config->rounds; _roun in start_benchmark() [all...] |
/kernel/linux/linux-6.6/tools/power/cpupower/bench/ |
H A D | benchmark.c | 24 * compute how many rounds of calculation we should do 29 * @retval rounds of calculation 37 unsigned int rounds = 0; in calculate_timespace() local 43 /* get the initial calculation time for a specific number of rounds */ in calculate_timespace() 53 rounds = (unsigned int)(load * estimated / timed); in calculate_timespace() 54 dprintf("calibrating with %u rounds\n", rounds); in calculate_timespace() 56 ROUNDS(rounds); in calculate_timespace() 60 estimated = rounds; in calculate_timespace() 91 for (_round = 1; _round <= config->rounds; _roun in start_benchmark() [all...] |
/kernel/linux/linux-6.6/crypto/ |
H A D | aria_generic.c | 155 ctx->dec_key[0][i] = ctx->enc_key[ctx->rounds][i]; in aria_set_decrypt_key() 156 ctx->dec_key[ctx->rounds][i] = ctx->enc_key[0][i]; in aria_set_decrypt_key() 159 for (i = 1; i < ctx->rounds; i++) { in aria_set_decrypt_key() 160 ctx->dec_key[i][0] = aria_m(ctx->enc_key[ctx->rounds - i][0]); in aria_set_decrypt_key() 161 ctx->dec_key[i][1] = aria_m(ctx->enc_key[ctx->rounds - i][1]); in aria_set_decrypt_key() 162 ctx->dec_key[i][2] = aria_m(ctx->enc_key[ctx->rounds - i][2]); in aria_set_decrypt_key() 163 ctx->dec_key[i][3] = aria_m(ctx->enc_key[ctx->rounds - i][3]); in aria_set_decrypt_key() 183 BUILD_BUG_ON(sizeof(int) != sizeof(ctx->rounds)); in aria_set_key() 186 ctx->rounds = (key_len + 32) / 4; in aria_set_key() 201 int rounds, rkid in __aria_crypt() local [all...] |
/kernel/linux/linux-5.10/arch/sparc/crypto/ |
H A D | md5_glue.c | 30 unsigned int rounds); 57 const unsigned int rounds = (len - done) / MD5_HMAC_BLOCK_SIZE; in __md5_sparc64_update() local 59 md5_sparc64_transform(sctx->hash, data + done, rounds); in __md5_sparc64_update() 60 done += rounds * MD5_HMAC_BLOCK_SIZE; in __md5_sparc64_update()
|
H A D | sha1_glue.c | 27 unsigned int rounds); 52 const unsigned int rounds = (len - done) / SHA1_BLOCK_SIZE; in __sha1_sparc64_update() local 54 sha1_sparc64_transform(sctx->state, data + done, rounds); in __sha1_sparc64_update() 55 done += rounds * SHA1_BLOCK_SIZE; in __sha1_sparc64_update()
|
/kernel/linux/linux-6.6/arch/sparc/crypto/ |
H A D | md5_glue.c | 30 unsigned int rounds); 58 const unsigned int rounds = (len - done) / MD5_HMAC_BLOCK_SIZE; in __md5_sparc64_update() local 60 md5_sparc64_transform(sctx->hash, data + done, rounds); in __md5_sparc64_update() 61 done += rounds * MD5_HMAC_BLOCK_SIZE; in __md5_sparc64_update()
|