/kernel/linux/linux-5.10/drivers/crypto/vmx/ |
H A D | aesp8-ppc.pl | 1960 # If $key2 is NULL, then a "tweak chaining" mode is engaged, in which # 1961 # input tweak value is assumed to be encrypted already, and last tweak # 1963 # written back to original buffer. In addition, in "tweak chaining" # 1969 my ($tweak,$seven,$eighty7,$tmp,$tweak1) = map("v$_",(8..12)); 1992 lvx $tweak,0,$ivp # load [unaligned] iv 1996 vperm $tweak,$tweak,$inptail,$inpperm 2017 vxor $tweak,$tweak, [all...] |
H A D | aes_xts.c | 84 u8 tweak[AES_BLOCK_SIZE]; in p8_aes_xts_crypt() local 107 aes_p8_encrypt(walk.iv, tweak, &ctx->tweak_key); in p8_aes_xts_crypt() 121 &ctx->enc_key, NULL, tweak); in p8_aes_xts_crypt() 126 &ctx->dec_key, NULL, tweak); in p8_aes_xts_crypt()
|
/kernel/linux/linux-6.6/drivers/crypto/vmx/ |
H A D | aesp8-ppc.pl | 1960 # If $key2 is NULL, then a "tweak chaining" mode is engaged, in which # 1961 # input tweak value is assumed to be encrypted already, and last tweak # 1963 # written back to original buffer. In addition, in "tweak chaining" # 1969 my ($tweak,$seven,$eighty7,$tmp,$tweak1) = map("v$_",(8..12)); 1992 lvx $tweak,0,$ivp # load [unaligned] iv 1996 vperm $tweak,$tweak,$inptail,$inpperm 2017 vxor $tweak,$tweak, [all...] |
H A D | aes_xts.c | 84 u8 tweak[AES_BLOCK_SIZE]; in p8_aes_xts_crypt() local 107 aes_p8_encrypt(walk.iv, tweak, &ctx->tweak_key); in p8_aes_xts_crypt() 121 &ctx->enc_key, NULL, tweak); in p8_aes_xts_crypt() 126 &ctx->dec_key, NULL, tweak); in p8_aes_xts_crypt()
|
/kernel/linux/linux-6.6/drivers/mtd/nand/ |
H A D | ecc.c | 529 struct nand_page_io_req *orig, *tweak; in nand_ecc_tweak_req() local 536 tweak = req; in nand_ecc_tweak_req() 541 tweak->dataoffs = 0; in nand_ecc_tweak_req() 542 tweak->datalen = nanddev_page_size(nand); in nand_ecc_tweak_req() 543 tweak->databuf.in = ctx->spare_databuf; in nand_ecc_tweak_req() 544 memset(tweak->databuf.in, 0xFF, ctx->page_buffer_size); in nand_ecc_tweak_req() 549 tweak->ooboffs = 0; in nand_ecc_tweak_req() 550 tweak->ooblen = nanddev_per_page_oobsize(nand); in nand_ecc_tweak_req() 551 tweak->oobbuf.in = ctx->spare_oobbuf; in nand_ecc_tweak_req() 552 memset(tweak in nand_ecc_tweak_req() 571 struct nand_page_io_req *orig, *tweak; nand_ecc_restore_req() local [all...] |
/kernel/linux/linux-5.10/crypto/ |
H A D | xts.c | 25 struct crypto_cipher *tweak; member 45 struct crypto_cipher *tweak; in xts_setkey() local 54 /* we need two cipher instances: one to compute the initial 'tweak' in xts_setkey() 58 /* tweak cipher, uses Key2 i.e. the second half of *key */ in xts_setkey() 59 tweak = ctx->tweak; in xts_setkey() 60 crypto_cipher_clear_flags(tweak, CRYPTO_TFM_REQ_MASK); in xts_setkey() 61 crypto_cipher_set_flags(tweak, crypto_skcipher_get_flags(parent) & in xts_setkey() 63 err = crypto_cipher_setkey(tweak, key + keylen, keylen); in xts_setkey() 76 * We compute the tweak mask 300 struct crypto_cipher *tweak; xts_init_tfm() local [all...] |
H A D | lrw.c | 74 const u8 *tweak = key + keylen - bsize; in lrw_setkey() local 89 ctx->table = gf128mul_init_64k_bbe((be128 *)tweak); in lrw_setkey() 135 * We compute the tweak masks twice (both before and after the ECB encryption or
|
/kernel/linux/linux-6.6/crypto/ |
H A D | xts.c | 26 struct crypto_cipher *tweak; member 46 struct crypto_cipher *tweak; in xts_setkey() local 55 /* we need two cipher instances: one to compute the initial 'tweak' in xts_setkey() 59 /* tweak cipher, uses Key2 i.e. the second half of *key */ in xts_setkey() 60 tweak = ctx->tweak; in xts_setkey() 61 crypto_cipher_clear_flags(tweak, CRYPTO_TFM_REQ_MASK); in xts_setkey() 62 crypto_cipher_set_flags(tweak, crypto_skcipher_get_flags(parent) & in xts_setkey() 64 err = crypto_cipher_setkey(tweak, key + keylen, keylen); in xts_setkey() 77 * We compute the tweak mask 301 struct crypto_cipher *tweak; xts_init_tfm() local [all...] |
H A D | lrw.c | 74 const u8 *tweak = key + keylen - bsize; in lrw_setkey() local 89 ctx->table = gf128mul_init_64k_bbe((be128 *)tweak); in lrw_setkey() 135 * We compute the tweak masks twice (both before and after the ECB encryption or
|
/kernel/linux/linux-5.10/arch/s390/kvm/ |
H A D | pv.c | 237 static int unpack_one(struct kvm *kvm, unsigned long addr, u64 tweak, in unpack_one() argument 245 .tweak[0] = tweak, in unpack_one() 246 .tweak[1] = offset, in unpack_one() 260 unsigned long tweak, u16 *rc, u16 *rrc) in kvm_s390_pv_unpack() 272 ret = unpack_one(kvm, addr, tweak, offset, rc, rrc); in kvm_s390_pv_unpack() 259 kvm_s390_pv_unpack(struct kvm *kvm, unsigned long addr, unsigned long size, unsigned long tweak, u16 *rc, u16 *rrc) kvm_s390_pv_unpack() argument
|
H A D | kvm-s390.h | 219 unsigned long tweak, u16 *rc, u16 *rrc);
|
/kernel/linux/linux-6.6/arch/s390/kvm/ |
H A D | pv.c | 629 static int unpack_one(struct kvm *kvm, unsigned long addr, u64 tweak, in unpack_one() argument 637 .tweak[0] = tweak, in unpack_one() 638 .tweak[1] = offset, in unpack_one() 652 unsigned long tweak, u16 *rc, u16 *rrc) in kvm_s390_pv_unpack() 664 ret = unpack_one(kvm, addr, tweak, offset, rc, rrc); in kvm_s390_pv_unpack() 729 * Stores buff_len bytes of tweak component values to buff_user 651 kvm_s390_pv_unpack(struct kvm *kvm, unsigned long addr, unsigned long size, unsigned long tweak, u16 *rc, u16 *rrc) kvm_s390_pv_unpack() argument
|
/kernel/linux/linux-5.10/drivers/media/pci/saa7134/ |
H A D | saa7134-tvaudio.c | 243 int acpf, tweak = 0; in tvaudio_setmode() local 251 tweak = audio_clock_tweak; in tvaudio_setmode() 258 acpf, tweak); in tvaudio_setmode() 260 acpf += tweak; in tvaudio_setmode()
|
/kernel/linux/linux-6.6/drivers/media/pci/saa7134/ |
H A D | saa7134-tvaudio.c | 243 int acpf, tweak = 0; in tvaudio_setmode() local 251 tweak = audio_clock_tweak; in tvaudio_setmode() 258 acpf, tweak); in tvaudio_setmode() 260 acpf += tweak; in tvaudio_setmode()
|
/kernel/linux/linux-6.6/drivers/crypto/intel/qat/qat_common/ |
H A D | qat_algs.c | 92 struct crypto_cipher *tweak; member 430 * to the HW, the second key is used for tweak calculation in qat_alg_skcipher_init_com() 994 ret = crypto_cipher_setkey(ctx->tweak, key + (keylen / 2), in qat_alg_skcipher_xts_setkey() 1010 crypto_cipher_encrypt_one(ctx->tweak, in qat_alg_set_req_iv() 1222 ctx->tweak = crypto_alloc_cipher("aes", 0, 0); in qat_alg_skcipher_init_xts_tfm() 1223 if (IS_ERR(ctx->tweak)) { in qat_alg_skcipher_init_xts_tfm() 1225 return PTR_ERR(ctx->tweak); in qat_alg_skcipher_init_xts_tfm() 1270 if (ctx->tweak) in qat_alg_skcipher_exit_xts_tfm() 1271 crypto_free_cipher(ctx->tweak); in qat_alg_skcipher_exit_xts_tfm()
|
/kernel/linux/linux-5.10/arch/s390/crypto/ |
H A D | paes_s390.c | 487 u8 tweak[16]; in xts_paes_crypt() member 505 memcpy(pcc_param.tweak, walk.iv, sizeof(pcc_param.tweak)); in xts_paes_crypt()
|
H A D | aes_s390.c | 430 u8 tweak[16]; in xts_aes_crypt() member 460 memcpy(pcc_param.tweak, walk.iv, sizeof(pcc_param.tweak)); in xts_aes_crypt()
|
/kernel/linux/linux-6.6/arch/s390/crypto/ |
H A D | paes_s390.c | 502 u8 tweak[16]; in xts_paes_crypt() member 520 memcpy(pcc_param.tweak, walk.iv, sizeof(pcc_param.tweak)); in xts_paes_crypt()
|
H A D | aes_s390.c | 427 u8 tweak[16]; in xts_aes_crypt() member 457 memcpy(pcc_param.tweak, walk.iv, sizeof(pcc_param.tweak)); in xts_aes_crypt()
|
/kernel/linux/linux-5.10/arch/s390/include/asm/ |
H A D | uv.h | 177 u64 tweak[2]; member
|
/kernel/linux/linux-5.10/drivers/video/fbdev/nvidia/ |
H A D | nvidia.c | 165 int tweak = 0; in nvidia_panel_tweak() local 168 tweak = par->paneltweak; in nvidia_panel_tweak() 178 tweak = -1; in nvidia_panel_tweak() 182 tweak = 1; in nvidia_panel_tweak() 186 return tweak; in nvidia_panel_tweak()
|
/kernel/linux/linux-6.6/drivers/video/fbdev/nvidia/ |
H A D | nvidia.c | 166 int tweak = 0; in nvidia_panel_tweak() local 169 tweak = par->paneltweak; in nvidia_panel_tweak() 179 tweak = -1; in nvidia_panel_tweak() 183 tweak = 1; in nvidia_panel_tweak() 187 return tweak; in nvidia_panel_tweak()
|
/kernel/linux/linux-6.6/arch/s390/include/asm/ |
H A D | uv.h | 225 u64 tweak[2]; member
|
/kernel/linux/linux-6.6/arch/arm64/crypto/ |
H A D | sm4-ce-glue.c | 47 u8 *tweak, unsigned int nbytes, 50 u8 *tweak, unsigned int nbytes,
|
/kernel/linux/linux-5.10/drivers/crypto/ |
H A D | atmel-aes.c | 1794 /* Compute the tweak value from req->iv with ecb(aes). */ in atmel_aes_xts_start() 1810 u32 tweak[AES_BLOCK_SIZE / sizeof(u32)]; in atmel_aes_xts_process_data() local 1812 u8 *tweak_bytes = (u8 *)tweak; in atmel_aes_xts_process_data() 1815 /* Read the computed ciphered tweak value. */ in atmel_aes_xts_process_data() 1816 atmel_aes_read_block(dd, AES_ODATAR(0), tweak); in atmel_aes_xts_process_data() 1819 * the order of the ciphered tweak bytes need to be reversed before in atmel_aes_xts_process_data() 1831 atmel_aes_write_block(dd, AES_TWR(0), tweak); in atmel_aes_xts_process_data()
|