Home
last modified time | relevance | path

Searched refs:tweak (Results 1 - 25 of 29) sorted by relevance

12

/third_party/node/deps/openssl/openssl/crypto/modes/
H A Dxts128.c33 } tweak, scratch; in CRYPTO_xts128_encrypt() local
39 memcpy(tweak.c, iv, 16); in CRYPTO_xts128_encrypt()
41 (*ctx->block2) (tweak.c, tweak.c, ctx->key2); in CRYPTO_xts128_encrypt()
49 scratch.u[0] ^= tweak.u[0]; in CRYPTO_xts128_encrypt()
50 scratch.u[1] ^= tweak.u[1]; in CRYPTO_xts128_encrypt()
52 scratch.u[0] = ((u64_a1 *)inp)[0] ^ tweak.u[0]; in CRYPTO_xts128_encrypt()
53 scratch.u[1] = ((u64_a1 *)inp)[1] ^ tweak.u[1]; in CRYPTO_xts128_encrypt()
57 scratch.u[0] ^= tweak.u[0]; in CRYPTO_xts128_encrypt()
58 scratch.u[1] ^= tweak in CRYPTO_xts128_encrypt()
[all...]
/third_party/openssl/crypto/modes/
H A Dxts128.c33 } tweak, scratch; in CRYPTO_xts128_encrypt() local
39 memcpy(tweak.c, iv, 16); in CRYPTO_xts128_encrypt()
41 (*ctx->block2) (tweak.c, tweak.c, ctx->key2); in CRYPTO_xts128_encrypt()
49 scratch.u[0] ^= tweak.u[0]; in CRYPTO_xts128_encrypt()
50 scratch.u[1] ^= tweak.u[1]; in CRYPTO_xts128_encrypt()
52 scratch.u[0] = ((u64_a1 *)inp)[0] ^ tweak.u[0]; in CRYPTO_xts128_encrypt()
53 scratch.u[1] = ((u64_a1 *)inp)[1] ^ tweak.u[1]; in CRYPTO_xts128_encrypt()
57 scratch.u[0] ^= tweak.u[0]; in CRYPTO_xts128_encrypt()
58 scratch.u[1] ^= tweak in CRYPTO_xts128_encrypt()
[all...]
/third_party/node/deps/openssl/openssl/crypto/aes/asm/
H A Daesp8-ppc.pl1921 # If $key2 is NULL, then a "tweak chaining" mode is engaged, in which #
1922 # input tweak value is assumed to be encrypted already, and last tweak #
1924 # written back to original buffer. In addition, in "tweak chaining" #
1930 my ($tweak,$seven,$eighty7,$tmp,$tweak1) = map("v$_",(8..12));
1955 lvx $tweak,0,$ivp # load [unaligned] iv
1959 vperm $tweak,$tweak,$inptail,$inpperm
1980 vxor $tweak,$tweak,
[all...]
H A Daesni-x86_64.pl1781 my @tweak=map("%xmm$_",(10..15));
1782 my ($twmask,$twres,$twtmp)=("%xmm8","%xmm9",@tweak[4]);
1815 movups ($ivp),$inout0 # load clear-text tweak
1819 # generate the tweak
1832 movdqa $inout0,@tweak[5]
1836 # alternative tweak calculation algorithm is based on suggestions
1843 movdqa @tweak[5],@tweak[$i]
1845 paddq @tweak[5],@tweak[
[all...]
H A Daesni-x86.pl1129 { my ($tweak,$twtmp,$twres,$twmask)=($rndkey1,$rndkey0,$inout0,$inout1);
1133 &mov ($inp,&wparam(5)); # clear-text tweak
1159 &movdqa ($tweak,$inout0);
1162 &pcmpgtd($twtmp,$tweak); # broadcast upper bits
1180 &movdqa (&QWP(16*$i,"esp"),$tweak);
1181 &paddq ($tweak,$tweak); # &psllq($tweak,1);
1183 &pcmpgtd ($twtmp,$tweak); # broadcast upper bits
1184 &pxor ($tweak,
[all...]
H A Daes-s390x.pl1639 my $tweak=16*$SIZE_T+16; # or $stdframe-16, bottom of the frame...
1658 lmg $i2,$i3,$tweak($sp) # put aside the tweak value
1664 la %r1,$tweak-16($sp)
1669 # with the tweak in 128-bit case.
1672 stmg $i2,$i3,$tweak($sp) # "re-seat" the tweak value
1677 lrvg $s0,$tweak+0($sp) # load the last tweak
1678 lrvg $s1,$tweak
[all...]
H A Dbsaes-armv7.pl1657 ldr r0, [ip] @ pointer to input tweak
1659 @ generate initial tweak
1664 mov r0,sp @ pointer to initial tweak
1673 sub r12, #`32+16` @ place for tweak[9]
1697 0: sub sp, #0x90 @ place for tweak[9]
1700 vld1.8 {@XMM[8]}, [r0] @ initial tweak
1737 vst1.64 {@XMM[8]}, [r0,:128] @ next round tweak
1770 vld1.64 {@XMM[8]}, [r0,:128] @ next round tweak
1806 vst1.64 {@XMM[15]}, [r0,:128] @ next round tweak
1837 vld1.64 {@XMM[8]}, [r0,:128] @ next round tweak
[all...]
/third_party/openssl/crypto/aes/asm/
H A Daesp8-ppc.pl1921 # If $key2 is NULL, then a "tweak chaining" mode is engaged, in which #
1922 # input tweak value is assumed to be encrypted already, and last tweak #
1924 # written back to original buffer. In addition, in "tweak chaining" #
1930 my ($tweak,$seven,$eighty7,$tmp,$tweak1) = map("v$_",(8..12));
1955 lvx $tweak,0,$ivp # load [unaligned] iv
1959 vperm $tweak,$tweak,$inptail,$inpperm
1980 vxor $tweak,$tweak,
[all...]
H A Daesni-x86_64.pl1781 my @tweak=map("%xmm$_",(10..15));
1782 my ($twmask,$twres,$twtmp)=("%xmm8","%xmm9",@tweak[4]);
1815 movups ($ivp),$inout0 # load clear-text tweak
1819 # generate the tweak
1832 movdqa $inout0,@tweak[5]
1836 # alternative tweak calculation algorithm is based on suggestions
1843 movdqa @tweak[5],@tweak[$i]
1845 paddq @tweak[5],@tweak[
[all...]
H A Daesni-x86.pl1129 { my ($tweak,$twtmp,$twres,$twmask)=($rndkey1,$rndkey0,$inout0,$inout1);
1133 &mov ($inp,&wparam(5)); # clear-text tweak
1159 &movdqa ($tweak,$inout0);
1162 &pcmpgtd($twtmp,$tweak); # broadcast upper bits
1180 &movdqa (&QWP(16*$i,"esp"),$tweak);
1181 &paddq ($tweak,$tweak); # &psllq($tweak,1);
1183 &pcmpgtd ($twtmp,$tweak); # broadcast upper bits
1184 &pxor ($tweak,
[all...]
H A Daes-s390x.pl1639 my $tweak=16*$SIZE_T+16; # or $stdframe-16, bottom of the frame...
1658 lmg $i2,$i3,$tweak($sp) # put aside the tweak value
1664 la %r1,$tweak-16($sp)
1669 # with the tweak in 128-bit case.
1672 stmg $i2,$i3,$tweak($sp) # "re-seat" the tweak value
1677 lrvg $s0,$tweak+0($sp) # load the last tweak
1678 lrvg $s1,$tweak
[all...]
H A Dbsaes-armv7.pl1657 ldr r0, [ip] @ pointer to input tweak
1659 @ generate initial tweak
1664 mov r0,sp @ pointer to initial tweak
1673 sub r12, #`32+16` @ place for tweak[9]
1697 0: sub sp, #0x90 @ place for tweak[9]
1700 vld1.8 {@XMM[8]}, [r0] @ initial tweak
1737 vst1.64 {@XMM[8]}, [r0,:128] @ next round tweak
1770 vld1.64 {@XMM[8]}, [r0,:128] @ next round tweak
1806 vst1.64 {@XMM[15]}, [r0,:128] @ next round tweak
1837 vld1.64 {@XMM[8]}, [r0,:128] @ next round tweak
[all...]
/third_party/node/deps/openssl/openssl/crypto/perlasm/
H A Dsparcv9_modes.pl943 ldxa [%l7]0x88, %g3 ! %g3:%g2 is tweak
1008 fxor %f12, %f0, %f0 ! ^= tweak[0]
1016 fxor %f12, %f0, %f0 ! ^= tweak[0]
1019 srax %g3, 63, %l7 ! next tweak value
1089 srax %g3, 63, %l7 ! next tweak value
1109 fxor %f12, %f0, %f0 ! ^= tweak[0]
1111 fxor %f8, %f4, %f4 ! ^= tweak[0]
1122 srax %g3, 63, %l7 ! next tweak value
1131 fxor %f12, %f0, %f0 ! ^= tweak[0]
1221 srax %g3, 63, %l7 ! next tweak valu
[all...]
/third_party/openssl/crypto/perlasm/
H A Dsparcv9_modes.pl943 ldxa [%l7]0x88, %g3 ! %g3:%g2 is tweak
1008 fxor %f12, %f0, %f0 ! ^= tweak[0]
1016 fxor %f12, %f0, %f0 ! ^= tweak[0]
1019 srax %g3, 63, %l7 ! next tweak value
1089 srax %g3, 63, %l7 ! next tweak value
1109 fxor %f12, %f0, %f0 ! ^= tweak[0]
1111 fxor %f8, %f4, %f4 ! ^= tweak[0]
1122 srax %g3, 63, %l7 ! next tweak value
1131 fxor %f12, %f0, %f0 ! ^= tweak[0]
1221 srax %g3, 63, %l7 ! next tweak valu
[all...]
/third_party/mbedtls/library/
H A Daes.c510 mbedtls_aes_init(&ctx->tweak); in mbedtls_aes_xts_init()
520 mbedtls_aes_free(&ctx->tweak); in mbedtls_aes_xts_free()
796 /* Set the tweak key. Always set tweak key for the encryption mode. */ in mbedtls_aes_xts_setkey_enc()
797 ret = mbedtls_aes_setkey_enc(&ctx->tweak, key2, key2bits); in mbedtls_aes_xts_setkey_enc()
820 /* Set the tweak key. Always set tweak key for encryption. */ in mbedtls_aes_xts_setkey_dec()
821 ret = mbedtls_aes_setkey_enc(&ctx->tweak, key2, key2bits); in mbedtls_aes_xts_setkey_dec()
1199 unsigned char tweak[16]; in mbedtls_aes_crypt_xts() local
1217 /* Compute the tweak in mbedtls_aes_crypt_xts()
[all...]
/third_party/skia/tools/fm/
H A Dfm.cpp143 std::function<void(GrContextOptions*)> tweak = [](GrContextOptions*){}; member
148 source->tweak = [gm](GrContextOptions* options) { gm->modifyGrContextOptions(options); }; in init()
596 source.tweak(&options); in main()
/third_party/ffmpeg/tools/
H A Dgen-rc27 FFmpeg developers to tweak and regenerate all resources files at once.
/third_party/mbedtls/include/mbedtls/
H A Daes.h90 mbedtls_aes_context MBEDTLS_PRIVATE(tweak); /*!< The AES context used for tweak
/third_party/ffmpeg/tests/checkasm/
H A Dvc1dsp.c140 static void tweak(matrix *a) in tweak() function
196 tweak(R); in generate_inverse_quantized_transform_coefficients()
/third_party/node/deps/openssl/openssl/util/
H A Dcheck-format.pl377 my $tweak = $in_comment == -2 ? 1 : 0;
378 report("indent = ".($count + $tweak)." != $comment_indent at end of multi-line comment")
379 if $count + $tweak != $comment_indent;
622 $in_comment = -2; # indicate that multi-line comment ends on current line, with tweak
/third_party/openssl/util/
H A Dcheck-format.pl377 my $tweak = $in_comment == -2 ? 1 : 0;
378 report("indent = ".($count + $tweak)." != $comment_indent at end of multi-line comment")
379 if $count + $tweak != $comment_indent;
622 $in_comment = -2; # indicate that multi-line comment ends on current line, with tweak
/third_party/mbedtls/tests/include/test/
H A Dssl_helpers.h596 * \param[in] buf Buffer containing the Certificate message to tweak
598 * \param tweak Tweak identifier (from 1 to the number of tweaks).
605 unsigned char *buf, unsigned char **end, int tweak,
/third_party/mesa3d/src/gallium/drivers/virgl/
H A Dvirgl_encode.h312 int virgl_encode_tweak(struct virgl_context *ctx, enum vrend_tweak_type tweak, uint32_t value);
H A Dvirgl_encode.c1484 int virgl_encode_tweak(struct virgl_context *ctx, enum vrend_tweak_type tweak, uint32_t value) in virgl_encode_tweak() argument
1487 virgl_encoder_write_dword(ctx->cbuf, tweak); in virgl_encode_tweak()
/third_party/mbedtls/tests/src/test_helpers/
H A Dssl_helpers.c2364 unsigned char *buf, unsigned char **end, int tweak, in mbedtls_test_tweak_tls13_certificate_msg_vector_len()
2402 switch (tweak) { in mbedtls_test_tweak_tls13_certificate_msg_vector_len()
2472 * way we can tweak easily tickets characteristics to simulate misbehaving
2363 mbedtls_test_tweak_tls13_certificate_msg_vector_len( unsigned char *buf, unsigned char **end, int tweak, int *expected_result, mbedtls_ssl_chk_buf_ptr_args *args) mbedtls_test_tweak_tls13_certificate_msg_vector_len() argument

Completed in 41 milliseconds

12