Home
last modified time | relevance | path

Searched refs:rounds (Results 1 – 25 of 65) sorted by relevance

123

/linux/arch/arm64/crypto/
H A Daes-ce.S38 .macro enc_prepare, rounds, rk, temp
39 load_round_keys \rk, \rounds, \temp
43 .macro enc_switch_key, rounds, rk, temp
44 load_round_keys \rk, \rounds, \temp
48 .macro dec_prepare, rounds, rk, temp
49 load_round_keys \rk, \rounds, \temp
107 .macro do_block_Nx, enc, rounds, i0, i1, i2, i3, i4
108 tbz \rounds, #2, .L\@ /* 128 bits */
111 tbz \rounds, #1, .L\@ /* 192 bits */
120 .macro encrypt_block, in, rounds, t0, t1, t2
[all …]
H A Daes-neonbs-glue.c27 asmlinkage void aesbs_convert_key(u8 out[], u32 const rk[], int rounds);
30 int rounds, int blocks);
32 int rounds, int blocks);
35 int rounds, int blocks, u8 iv[]);
38 int rounds, int blocks, u8 iv[]);
41 int rounds, int blocks, u8 iv[]);
43 int rounds, int blocks, u8 iv[]);
47 int rounds, int blocks);
49 int rounds, int blocks, u8 iv[]);
51 int rounds, int bytes, u8 ctr[]);
[all …]
H A Daes-glue.c78 int rounds, int blocks);
80 int rounds, int blocks);
83 int rounds, int blocks, u8 iv[]);
85 int rounds, int blocks, u8 iv[]);
88 int rounds, int bytes, u8 const iv[]);
90 int rounds, int bytes, u8 const iv[]);
93 int rounds, int bytes, u8 ctr[]);
96 int rounds, int bytes, u8 ctr[], int byte_ctr);
99 int rounds, int bytes, u32 const rk2[], u8 iv[],
102 int rounds, int bytes, u32 const rk2[], u8 iv[],
[all …]
H A Daes-neon.S98 .macro do_block, enc, in, rounds, rk, rkp, i
101 mov \i, \rounds
114 .macro encrypt_block, in, rounds, rk, rkp, i
115 do_block 1, \in, \rounds, \rk, \rkp, \i
118 .macro decrypt_block, in, rounds, rk, rkp, i
119 do_block 0, \in, \rounds, \rk, \rkp, \i
205 .macro do_block_4x, enc, in0, in1, in2, in3, rounds, rk, rkp, i
208 mov \i, \rounds
231 .macro encrypt_block4x, in0, in1, in2, in3, rounds, rk, rkp, i
232 do_block_4x 1, \in0, \in1, \in2, \in3, \rounds, \rk, \rkp, \i
[all …]
H A Daes-ce-ccm-glue.c34 asmlinkage u32 ce_aes_mac_update(u8 const in[], u32 const rk[], int rounds,
39 u32 const rk[], u32 rounds, u8 mac[],
43 u32 const rk[], u32 rounds, u8 mac[],
100 u32 macp, u32 const rk[], u32 rounds) in ce_aes_ccm_auth_data() argument
108 u32 rem = ce_aes_mac_update(in, rk, rounds, blocks, mac, in ce_aes_ccm_auth_data()
/linux/arch/powerpc/crypto/
H A Daes-spe-glue.c44 u32 rounds; member
51 u32 rounds; member
75 ctx->rounds = 4; in ppc_aes_setkey_skcipher()
79 ctx->rounds = 5; in ppc_aes_setkey_skcipher()
83 ctx->rounds = 6; in ppc_aes_setkey_skcipher()
109 ctx->rounds = 4; in ppc_xts_setkey()
114 ctx->rounds = 5; in ppc_xts_setkey()
119 ctx->rounds = 6; in ppc_xts_setkey()
149 ctx->key_enc, ctx->rounds, nbytes); in ppc_ecb_crypt()
152 ctx->key_dec, ctx->rounds, nbytes); in ppc_ecb_crypt()
[all …]
H A Daesp10-ppc.pl120 my ($inp,$bits,$out,$ptr,$cnt,$rounds)=map("r$_",(3..8));
261 li $rounds,10
335 li $rounds,12
343 li $rounds,14
397 stw $rounds,0($out)
417 slwi $cnt,$rounds,4
419 srwi $rounds,$rounds,1
421 mtctr $rounds
459 my ($inp,$out,$key,$rounds,$idx)=map("r$_",(3..7));
463 lwz $rounds,240($key)
[all …]
H A Daes-gcm-p10.S303 # r23: AES rounds
319 # Pre-load 8 AES rounds to scratch vectors.
328 lwz 23, 240(6) # n rounds
329 addi 22, 23, -9 # remaing AES rounds
405 lwz 23, 240(6) # n rounds
511 lwz 23, 240(6) # n rounds
646 # rounds is at offset 240 in rk
685 # load rounds - 10 (128), 12 (192), 14 (256)
686 lwz 23, 240(6) # n rounds
739 # Pre-compute first 8 AES state and leave 1/3/5 more rounds
[all …]
/linux/arch/arm/crypto/
H A Daes-neonbs-glue.c25 asmlinkage void aesbs_convert_key(u8 out[], u32 const rk[], int rounds);
28 int rounds, int blocks);
30 int rounds, int blocks);
33 int rounds, int blocks, u8 iv[]);
36 int rounds, int blocks, u8 ctr[]);
39 int rounds, int blocks, u8 iv[], int);
41 int rounds, int blocks, u8 iv[], int);
44 int rounds; member
70 ctx->rounds = 6 + key_len / 4; in aesbs_setkey()
73 aesbs_convert_key(ctx->rk, rk.key_enc, ctx->rounds); in aesbs_setkey()
[all …]
H A Daes-ce-glue.c28 int rounds, int blocks);
30 int rounds, int blocks);
33 int rounds, int blocks, u8 iv[]);
35 int rounds, int blocks, u8 iv[]);
37 int rounds, int bytes, u8 const iv[]);
39 int rounds, int bytes, u8 const iv[]);
42 int rounds, int blocks, u8 ctr[]);
45 int rounds, int bytes, u8 iv[],
48 int rounds, int bytes, u8 iv[],
423 int err, first, rounds = num_rounds(&ctx->key1); in xts_encrypt() local
[all …]
H A Dghash-ce-glue.c45 int rounds; member
188 const char *iv, int rounds, u32 counter);
192 const char *iv, int rounds, u32 counter);
196 const char *iv, int rounds, u32 counter);
200 const char *iv, int rounds, u32 counter,
222 ctx->rounds = 6 + keylen / 4; in gcm_aes_setkey()
334 ctx->rounds, counter); in gcm_encrypt()
375 ctx->rounds, counter); in gcm_encrypt()
427 ctx->rounds, counter); in gcm_decrypt()
459 ctx->rounds, counter, otag, authsize); in gcm_decrypt()
/linux/tools/power/cpupower/bench/
H A Dbenchmark.c37 unsigned int rounds = 0; in calculate_timespace() local
53 rounds = (unsigned int)(load * estimated / timed); in calculate_timespace()
54 dprintf("calibrating with %u rounds\n", rounds); in calculate_timespace()
56 ROUNDS(rounds); in calculate_timespace()
60 estimated = rounds; in calculate_timespace()
91 for (_round = 1; _round <= config->rounds; _round++) in start_benchmark()
95 for (_round = 0; _round < config->rounds; _round++) { in start_benchmark()
H A DREADME-BENCH47 rounds=5
66 This shows expected results of the first two test run rounds from
117 -r, --rounds<int> load/sleep rounds
H A Dmain.c126 sscanf(optarg, "%u", &config->rounds); in main()
174 config->rounds, in main()
/linux/crypto/
H A Daria_generic.c155 ctx->dec_key[0][i] = ctx->enc_key[ctx->rounds][i]; in aria_set_decrypt_key()
156 ctx->dec_key[ctx->rounds][i] = ctx->enc_key[0][i]; in aria_set_decrypt_key()
159 for (i = 1; i < ctx->rounds; i++) { in aria_set_decrypt_key()
160 ctx->dec_key[i][0] = aria_m(ctx->enc_key[ctx->rounds - i][0]); in aria_set_decrypt_key()
161 ctx->dec_key[i][1] = aria_m(ctx->enc_key[ctx->rounds - i][1]); in aria_set_decrypt_key()
162 ctx->dec_key[i][2] = aria_m(ctx->enc_key[ctx->rounds - i][2]); in aria_set_decrypt_key()
163 ctx->dec_key[i][3] = aria_m(ctx->enc_key[ctx->rounds - i][3]); in aria_set_decrypt_key()
183 BUILD_BUG_ON(sizeof(int) != sizeof(ctx->rounds)); in aria_set_key()
186 ctx->rounds = (key_len + 32) / 4; in aria_set_key()
199 int rounds, rkidx = 0; in __aria_crypt() local
[all …]
/linux/lib/crypto/powerpc/
H A Daesp8-ppc.pl121 my ($inp,$bits,$out,$ptr,$cnt,$rounds)=map("r$_",(3..8));
263 li $rounds,10
337 li $rounds,12
345 li $rounds,14
399 stw $rounds,0($out)
419 slwi $cnt,$rounds,4
421 srwi $rounds,$rounds,1
423 mtctr $rounds
461 my ($inp,$out,$key,$rounds,$idx)=map("r$_",(3..7));
465 lwz $rounds,240($key)
[all …]
/linux/include/crypto/
H A Daes.h175 void ppc_encrypt_ecb(u8 *out, const u8 *in, u32 *key_enc, u32 rounds,
177 void ppc_decrypt_ecb(u8 *out, const u8 *in, u32 *key_dec, u32 rounds,
179 void ppc_encrypt_cbc(u8 *out, const u8 *in, u32 *key_enc, u32 rounds, u32 bytes,
181 void ppc_decrypt_cbc(u8 *out, const u8 *in, u32 *key_dec, u32 rounds, u32 bytes,
183 void ppc_crypt_ctr(u8 *out, const u8 *in, u32 *key_enc, u32 rounds, u32 bytes,
185 void ppc_encrypt_xts(u8 *out, const u8 *in, u32 *key_enc, u32 rounds, u32 bytes,
187 void ppc_decrypt_xts(u8 *out, const u8 *in, u32 *key_dec, u32 rounds, u32 bytes,
/linux/lib/crypto/arm/
H A Daes-cipher-core.S17 rounds .req r1
146 tst rounds, #2
152 1: subs rounds, rounds, #4
171 pop {rounds} // oldcpsr
172 \round r4, r5, r6, r7, r8, r9, r10, r11, \bsz, b, rounds
H A Daes.h9 asmlinkage void __aes_arm_encrypt(const u32 rk[], int rounds,
12 asmlinkage void __aes_arm_decrypt(const u32 inv_rk[], int rounds,
/linux/lib/crypto/arm64/
H A Daes.h21 const u8 in[AES_BLOCK_SIZE], int rounds);
23 const u8 in[AES_BLOCK_SIZE], int rounds);
25 const u8 in[AES_BLOCK_SIZE], int rounds);
27 const u8 in[AES_BLOCK_SIZE], int rounds);
H A Daes-cipher-core.S17 rounds .req x3
102 tbnz rounds, #1, 1f
107 1: subs rounds, rounds, #4
/linux/drivers/md/
H A Ddm-verity-fec.c33 return offset + mod * (v->fec->rounds << v->data_dev_block_bits); in fec_interleave()
421 res = div64_u64(offset, v->fec->rounds << v->data_dev_block_bits); in verity_fec_decode()
427 rsb = offset - res * (v->fec->rounds << v->data_dev_block_bits); in verity_fec_decode()
673 f->rounds = f->blocks; in verity_fec_ctr()
674 if (sector_div(f->rounds, f->rsn)) in verity_fec_ctr()
675 f->rounds++; in verity_fec_ctr()
681 if (f->blocks < v->data_blocks + hash_blocks || !f->rounds) { in verity_fec_ctr()
709 fec_blocks = div64_u64(f->rounds * f->roots, v->fec->roots << SECTOR_SHIFT); in verity_fec_ctr()
/linux/tools/testing/selftests/bpf/prog_tests/
H A Duprobe_syscall.c657 unsigned long rounds = 0; in worker_trigger() local
661 rounds++; in worker_trigger()
664 printf("tid %ld trigger rounds: %lu\n", sys_gettid(), rounds); in worker_trigger()
672 unsigned long rounds = 0, offset; in worker_attach() local
704 rounds++; in worker_attach()
707 printf("tid %ld attach rounds: %lu hits: %d\n", sys_gettid(), rounds, skel->bss->executed); in worker_attach()
/linux/net/rds/
H A Dtcp_connect.c238 unsigned int rounds; in rds_tcp_conn_path_shutdown() local
260 rounds = 0; in rds_tcp_conn_path_shutdown()
278 ++rounds < 50); in rds_tcp_conn_path_shutdown()
/linux/lib/crypto/x86/
H A Dsha512-ssse3-asm.S151 # Compute rounds t-2 and t-1
154 # Two rounds are computed based on the values for K[t-2]+W[t-2] and
163 # The computation of the message schedule and the rounds are tightly
165 # For clarity, integer instructions (for the rounds calculation) are indented
260 movdqa %xmm0, WK_2(idx) # Store W[t]+K[t] for next rounds
305 # (80 rounds) / (2 rounds/iteration) + (1 iteration)
314 movdqa %xmm0, WK_2(t) # Store into WK for rounds

123