/third_party/node/deps/openssl/openssl/crypto/modes/ |
H A D | xts128.c | 33 } tweak, scratch; in CRYPTO_xts128_encrypt() local 39 memcpy(tweak.c, iv, 16); in CRYPTO_xts128_encrypt() 41 (*ctx->block2) (tweak.c, tweak.c, ctx->key2); in CRYPTO_xts128_encrypt() 49 scratch.u[0] ^= tweak.u[0]; in CRYPTO_xts128_encrypt() 50 scratch.u[1] ^= tweak.u[1]; in CRYPTO_xts128_encrypt() 52 scratch.u[0] = ((u64_a1 *)inp)[0] ^ tweak.u[0]; in CRYPTO_xts128_encrypt() 53 scratch.u[1] = ((u64_a1 *)inp)[1] ^ tweak.u[1]; in CRYPTO_xts128_encrypt() 57 scratch.u[0] ^= tweak.u[0]; in CRYPTO_xts128_encrypt() 58 scratch.u[1] ^= tweak in CRYPTO_xts128_encrypt() [all...] |
/third_party/openssl/crypto/modes/ |
H A D | xts128.c | 33 } tweak, scratch; in CRYPTO_xts128_encrypt() local 39 memcpy(tweak.c, iv, 16); in CRYPTO_xts128_encrypt() 41 (*ctx->block2) (tweak.c, tweak.c, ctx->key2); in CRYPTO_xts128_encrypt() 49 scratch.u[0] ^= tweak.u[0]; in CRYPTO_xts128_encrypt() 50 scratch.u[1] ^= tweak.u[1]; in CRYPTO_xts128_encrypt() 52 scratch.u[0] = ((u64_a1 *)inp)[0] ^ tweak.u[0]; in CRYPTO_xts128_encrypt() 53 scratch.u[1] = ((u64_a1 *)inp)[1] ^ tweak.u[1]; in CRYPTO_xts128_encrypt() 57 scratch.u[0] ^= tweak.u[0]; in CRYPTO_xts128_encrypt() 58 scratch.u[1] ^= tweak in CRYPTO_xts128_encrypt() [all...] |
/third_party/node/deps/openssl/openssl/crypto/aes/asm/ |
H A D | aesp8-ppc.pl | 1921 # If $key2 is NULL, then a "tweak chaining" mode is engaged, in which # 1922 # input tweak value is assumed to be encrypted already, and last tweak # 1924 # written back to original buffer. In addition, in "tweak chaining" # 1930 my ($tweak,$seven,$eighty7,$tmp,$tweak1) = map("v$_",(8..12)); 1955 lvx $tweak,0,$ivp # load [unaligned] iv 1959 vperm $tweak,$tweak,$inptail,$inpperm 1980 vxor $tweak,$tweak, [all...] |
H A D | aesni-x86_64.pl | 1781 my @tweak=map("%xmm$_",(10..15)); 1782 my ($twmask,$twres,$twtmp)=("%xmm8","%xmm9",@tweak[4]); 1815 movups ($ivp),$inout0 # load clear-text tweak 1819 # generate the tweak 1832 movdqa $inout0,@tweak[5] 1836 # alternative tweak calculation algorithm is based on suggestions 1843 movdqa @tweak[5],@tweak[$i] 1845 paddq @tweak[5],@tweak[ [all...] |
H A D | aesni-x86.pl | 1129 { my ($tweak,$twtmp,$twres,$twmask)=($rndkey1,$rndkey0,$inout0,$inout1); 1133 &mov ($inp,&wparam(5)); # clear-text tweak 1159 &movdqa ($tweak,$inout0); 1162 &pcmpgtd($twtmp,$tweak); # broadcast upper bits 1180 &movdqa (&QWP(16*$i,"esp"),$tweak); 1181 &paddq ($tweak,$tweak); # &psllq($tweak,1); 1183 &pcmpgtd ($twtmp,$tweak); # broadcast upper bits 1184 &pxor ($tweak, [all...] |
H A D | aes-s390x.pl | 1639 my $tweak=16*$SIZE_T+16; # or $stdframe-16, bottom of the frame... 1658 lmg $i2,$i3,$tweak($sp) # put aside the tweak value 1664 la %r1,$tweak-16($sp) 1669 # with the tweak in 128-bit case. 1672 stmg $i2,$i3,$tweak($sp) # "re-seat" the tweak value 1677 lrvg $s0,$tweak+0($sp) # load the last tweak 1678 lrvg $s1,$tweak [all...] |
H A D | bsaes-armv7.pl | 1657 ldr r0, [ip] @ pointer to input tweak 1659 @ generate initial tweak 1664 mov r0,sp @ pointer to initial tweak 1673 sub r12, #`32+16` @ place for tweak[9] 1697 0: sub sp, #0x90 @ place for tweak[9] 1700 vld1.8 {@XMM[8]}, [r0] @ initial tweak 1737 vst1.64 {@XMM[8]}, [r0,:128] @ next round tweak 1770 vld1.64 {@XMM[8]}, [r0,:128] @ next round tweak 1806 vst1.64 {@XMM[15]}, [r0,:128] @ next round tweak 1837 vld1.64 {@XMM[8]}, [r0,:128] @ next round tweak [all...] |
/third_party/openssl/crypto/aes/asm/ |
H A D | aesp8-ppc.pl | 1921 # If $key2 is NULL, then a "tweak chaining" mode is engaged, in which # 1922 # input tweak value is assumed to be encrypted already, and last tweak # 1924 # written back to original buffer. In addition, in "tweak chaining" # 1930 my ($tweak,$seven,$eighty7,$tmp,$tweak1) = map("v$_",(8..12)); 1955 lvx $tweak,0,$ivp # load [unaligned] iv 1959 vperm $tweak,$tweak,$inptail,$inpperm 1980 vxor $tweak,$tweak, [all...] |
H A D | aesni-x86_64.pl | 1781 my @tweak=map("%xmm$_",(10..15)); 1782 my ($twmask,$twres,$twtmp)=("%xmm8","%xmm9",@tweak[4]); 1815 movups ($ivp),$inout0 # load clear-text tweak 1819 # generate the tweak 1832 movdqa $inout0,@tweak[5] 1836 # alternative tweak calculation algorithm is based on suggestions 1843 movdqa @tweak[5],@tweak[$i] 1845 paddq @tweak[5],@tweak[ [all...] |
H A D | aesni-x86.pl | 1129 { my ($tweak,$twtmp,$twres,$twmask)=($rndkey1,$rndkey0,$inout0,$inout1); 1133 &mov ($inp,&wparam(5)); # clear-text tweak 1159 &movdqa ($tweak,$inout0); 1162 &pcmpgtd($twtmp,$tweak); # broadcast upper bits 1180 &movdqa (&QWP(16*$i,"esp"),$tweak); 1181 &paddq ($tweak,$tweak); # &psllq($tweak,1); 1183 &pcmpgtd ($twtmp,$tweak); # broadcast upper bits 1184 &pxor ($tweak, [all...] |
H A D | aes-s390x.pl | 1639 my $tweak=16*$SIZE_T+16; # or $stdframe-16, bottom of the frame... 1658 lmg $i2,$i3,$tweak($sp) # put aside the tweak value 1664 la %r1,$tweak-16($sp) 1669 # with the tweak in 128-bit case. 1672 stmg $i2,$i3,$tweak($sp) # "re-seat" the tweak value 1677 lrvg $s0,$tweak+0($sp) # load the last tweak 1678 lrvg $s1,$tweak [all...] |
H A D | bsaes-armv7.pl | 1657 ldr r0, [ip] @ pointer to input tweak 1659 @ generate initial tweak 1664 mov r0,sp @ pointer to initial tweak 1673 sub r12, #`32+16` @ place for tweak[9] 1697 0: sub sp, #0x90 @ place for tweak[9] 1700 vld1.8 {@XMM[8]}, [r0] @ initial tweak 1737 vst1.64 {@XMM[8]}, [r0,:128] @ next round tweak 1770 vld1.64 {@XMM[8]}, [r0,:128] @ next round tweak 1806 vst1.64 {@XMM[15]}, [r0,:128] @ next round tweak 1837 vld1.64 {@XMM[8]}, [r0,:128] @ next round tweak [all...] |
/third_party/node/deps/openssl/openssl/crypto/perlasm/ |
H A D | sparcv9_modes.pl | 943 ldxa [%l7]0x88, %g3 ! %g3:%g2 is tweak 1008 fxor %f12, %f0, %f0 ! ^= tweak[0] 1016 fxor %f12, %f0, %f0 ! ^= tweak[0] 1019 srax %g3, 63, %l7 ! next tweak value 1089 srax %g3, 63, %l7 ! next tweak value 1109 fxor %f12, %f0, %f0 ! ^= tweak[0] 1111 fxor %f8, %f4, %f4 ! ^= tweak[0] 1122 srax %g3, 63, %l7 ! next tweak value 1131 fxor %f12, %f0, %f0 ! ^= tweak[0] 1221 srax %g3, 63, %l7 ! next tweak valu [all...] |
/third_party/openssl/crypto/perlasm/ |
H A D | sparcv9_modes.pl | 943 ldxa [%l7]0x88, %g3 ! %g3:%g2 is tweak 1008 fxor %f12, %f0, %f0 ! ^= tweak[0] 1016 fxor %f12, %f0, %f0 ! ^= tweak[0] 1019 srax %g3, 63, %l7 ! next tweak value 1089 srax %g3, 63, %l7 ! next tweak value 1109 fxor %f12, %f0, %f0 ! ^= tweak[0] 1111 fxor %f8, %f4, %f4 ! ^= tweak[0] 1122 srax %g3, 63, %l7 ! next tweak value 1131 fxor %f12, %f0, %f0 ! ^= tweak[0] 1221 srax %g3, 63, %l7 ! next tweak valu [all...] |
/third_party/mbedtls/library/ |
H A D | aes.c | 510 mbedtls_aes_init(&ctx->tweak); in mbedtls_aes_xts_init() 520 mbedtls_aes_free(&ctx->tweak); in mbedtls_aes_xts_free() 796 /* Set the tweak key. Always set tweak key for the encryption mode. */ in mbedtls_aes_xts_setkey_enc() 797 ret = mbedtls_aes_setkey_enc(&ctx->tweak, key2, key2bits); in mbedtls_aes_xts_setkey_enc() 820 /* Set the tweak key. Always set tweak key for encryption. */ in mbedtls_aes_xts_setkey_dec() 821 ret = mbedtls_aes_setkey_enc(&ctx->tweak, key2, key2bits); in mbedtls_aes_xts_setkey_dec() 1199 unsigned char tweak[16]; in mbedtls_aes_crypt_xts() local 1217 /* Compute the tweak in mbedtls_aes_crypt_xts() [all...] |
/third_party/skia/tools/fm/ |
H A D | fm.cpp | 143 std::function<void(GrContextOptions*)> tweak = [](GrContextOptions*){}; member 148 source->tweak = [gm](GrContextOptions* options) { gm->modifyGrContextOptions(options); }; in init() 596 source.tweak(&options); in main()
|
/third_party/ffmpeg/tools/ |
H A D | gen-rc | 27 FFmpeg developers to tweak and regenerate all resources files at once.
|
/third_party/mbedtls/include/mbedtls/ |
H A D | aes.h | 90 mbedtls_aes_context MBEDTLS_PRIVATE(tweak); /*!< The AES context used for tweak
|
/third_party/ffmpeg/tests/checkasm/ |
H A D | vc1dsp.c | 140 static void tweak(matrix *a) in tweak() function 196 tweak(R); in generate_inverse_quantized_transform_coefficients()
|
/third_party/node/deps/openssl/openssl/util/ |
H A D | check-format.pl | 377 my $tweak = $in_comment == -2 ? 1 : 0; 378 report("indent = ".($count + $tweak)." != $comment_indent at end of multi-line comment") 379 if $count + $tweak != $comment_indent; 622 $in_comment = -2; # indicate that multi-line comment ends on current line, with tweak
|
/third_party/openssl/util/ |
H A D | check-format.pl | 377 my $tweak = $in_comment == -2 ? 1 : 0; 378 report("indent = ".($count + $tweak)." != $comment_indent at end of multi-line comment") 379 if $count + $tweak != $comment_indent; 622 $in_comment = -2; # indicate that multi-line comment ends on current line, with tweak
|
/third_party/mbedtls/tests/include/test/ |
H A D | ssl_helpers.h | 596 * \param[in] buf Buffer containing the Certificate message to tweak 598 * \param tweak Tweak identifier (from 1 to the number of tweaks). 605 unsigned char *buf, unsigned char **end, int tweak,
|
/third_party/mesa3d/src/gallium/drivers/virgl/ |
H A D | virgl_encode.h | 312 int virgl_encode_tweak(struct virgl_context *ctx, enum vrend_tweak_type tweak, uint32_t value);
|
H A D | virgl_encode.c | 1484 int virgl_encode_tweak(struct virgl_context *ctx, enum vrend_tweak_type tweak, uint32_t value) in virgl_encode_tweak() argument 1487 virgl_encoder_write_dword(ctx->cbuf, tweak); in virgl_encode_tweak()
|
/third_party/mbedtls/tests/src/test_helpers/ |
H A D | ssl_helpers.c | 2364 unsigned char *buf, unsigned char **end, int tweak, in mbedtls_test_tweak_tls13_certificate_msg_vector_len() 2402 switch (tweak) { in mbedtls_test_tweak_tls13_certificate_msg_vector_len() 2472 * way we can tweak easily tickets characteristics to simulate misbehaving 2363 mbedtls_test_tweak_tls13_certificate_msg_vector_len( unsigned char *buf, unsigned char **end, int tweak, int *expected_result, mbedtls_ssl_chk_buf_ptr_args *args) mbedtls_test_tweak_tls13_certificate_msg_vector_len() argument
|