/freebsd-13-stable/crypto/openssl/crypto/modes/ |
H A D | xts128.c | 37 } tweak, scratch; local 43 memcpy(tweak.c, iv, 16); 45 (*ctx->block2) (tweak.c, tweak.c, ctx->key2); 53 scratch.u[0] ^= tweak.u[0]; 54 scratch.u[1] ^= tweak.u[1]; 56 scratch.u[0] = ((u64_a1 *)inp)[0] ^ tweak.u[0]; 57 scratch.u[1] = ((u64_a1 *)inp)[1] ^ tweak.u[1]; 61 scratch.u[0] ^= tweak.u[0]; 62 scratch.u[1] ^= tweak [all...] |
/freebsd-13-stable/sys/opencrypto/ |
H A D | xform_aes_xts.c | 87 * Prepare tweak as E_k2(IV). IV is specified as LE representation 92 ctx->tweak[i] = blocknum & 0xff; 96 bzero(ctx->tweak + AES_XTS_IVSIZE, AES_XTS_IVSIZE); 98 rijndael_encrypt(&ctx->key2, ctx->tweak, ctx->tweak); 109 block[i] = in[i] ^ ctx->tweak[i]; 117 out[i] ^= ctx->tweak[i]; 119 /* Exponentiate tweak */ 122 carry_out = ctx->tweak[i] & 0x80; 123 ctx->tweak[ [all...] |
H A D | xform_enc.h | 96 uint8_t tweak[AES_XTS_BLOCKSIZE]; member in struct:aes_xts_ctx
|
/freebsd-13-stable/crypto/openssl/crypto/aes/asm/ |
H A D | aesp8-ppc.pl | 1917 # If $key2 is NULL, then a "tweak chaining" mode is engaged, in which # 1918 # input tweak value is assumed to be encrypted already, and last tweak # 1920 # written back to original buffer. In addition, in "tweak chaining" # 1926 my ($tweak,$seven,$eighty7,$tmp,$tweak1) = map("v$_",(8..12)); 1951 lvx $tweak,0,$ivp # load [unaligned] iv 1955 vperm $tweak,$tweak,$inptail,$inpperm 1976 vxor $tweak,$tweak, [all...] |
H A D | aesni-x86_64.pl | 1773 my @tweak=map("%xmm$_",(10..15)); 1774 my ($twmask,$twres,$twtmp)=("%xmm8","%xmm9",@tweak[4]); 1806 movups ($ivp),$inout0 # load clear-text tweak 1810 # generate the tweak 1823 movdqa $inout0,@tweak[5] 1827 # alternative tweak calculation algorithm is based on suggestions 1834 movdqa @tweak[5],@tweak[$i] 1836 paddq @tweak[5],@tweak[ [all...] |
H A D | aesni-x86.pl | 1131 { my ($tweak,$twtmp,$twres,$twmask)=($rndkey1,$rndkey0,$inout0,$inout1); 1135 &mov ($inp,&wparam(5)); # clear-text tweak 1161 &movdqa ($tweak,$inout0); 1164 &pcmpgtd($twtmp,$tweak); # broadcast upper bits 1182 &movdqa (&QWP(16*$i,"esp"),$tweak); 1183 &paddq ($tweak,$tweak); # &psllq($tweak,1); 1185 &pcmpgtd ($twtmp,$tweak); # broadcast upper bits 1186 &pxor ($tweak, [all...] |
H A D | aes-s390x.pl | 1637 my $tweak=16*$SIZE_T+16; # or $stdframe-16, bottom of the frame... 1656 lmg $i2,$i3,$tweak($sp) # put aside the tweak value 1662 la %r1,$tweak-16($sp) 1667 # with the tweak in 128-bit case. 1670 stmg $i2,$i3,$tweak($sp) # "re-seat" the tweak value 1675 lrvg $s0,$tweak+0($sp) # load the last tweak 1676 lrvg $s1,$tweak [all...] |
H A D | bsaes-armv7.pl | 1654 ldr r0, [ip] @ pointer to input tweak 1656 @ generate initial tweak 1661 mov r0,sp @ pointer to initial tweak 1670 sub r12, #`32+16` @ place for tweak[9] 1694 0: sub sp, #0x90 @ place for tweak[9] 1697 vld1.8 {@XMM[8]}, [r0] @ initial tweak 1734 vst1.64 {@XMM[8]}, [r0,:128] @ next round tweak 1767 vld1.64 {@XMM[8]}, [r0,:128] @ next round tweak 1803 vst1.64 {@XMM[15]}, [r0,:128] @ next round tweak 1834 vld1.64 {@XMM[8]}, [r0,:128] @ next round tweak [all...] |
/freebsd-13-stable/lib/libsecureboot/ |
H A D | verify_file.c | 270 char *tweak, int *accept_no_fp, 273 if (strcmp(tweak, "off") == 0) { 275 } else if (strcmp(tweak, "strict") == 0) { 283 } else if (strcmp(tweak, "modules") == 0) { 286 } else if (strcmp(tweak, "try") == 0) { 289 } else if (strcmp(tweak, "verbose") == 0) { 291 } else if (strcmp(tweak, "quiet") == 0) { 293 } else if (strncmp(tweak, "trust", 5) == 0) { 303 if (strstr(tweak, "revoke")) { 269 verify_tweak(int fd, off_t off, struct stat *stp, char *tweak, int *accept_no_fp, int *verbose) argument
|
/freebsd-13-stable/sys/crypto/armv8/ |
H A D | armv8_crypto_wrap.c | 165 uint8x16_t *tweak, const uint8_t *from, uint8_t *to, int do_encrypt) 169 block = vld1q_u8(from) ^ *tweak; 176 vst1q_u8(to, block ^ *tweak); 178 *tweak = vreinterpretq_u8_s32(xts_crank_lfsr(vreinterpretq_s32_u8(*tweak))); 187 uint8_t tweak[AES_XTS_BLOCKSIZE] __aligned(16); 191 * Prepare tweak as E_k2(IV). IV is specified as LE representation 195 bcopy(iv, tweak, AES_XTS_IVSIZE); 197 bzero(tweak + AES_XTS_IVSIZE, AES_XTS_IVSIZE); 201 tweakreg = vld1q_u8(tweak); 164 armv8_aes_crypt_xts_block(int rounds, const uint8x16_t *key_schedule, uint8x16_t *tweak, const uint8_t *from, uint8_t *to, int do_encrypt) argument [all...] |
/freebsd-13-stable/sys/crypto/aesni/ |
H A D | aesni_wrap.c | 308 aesni_crypt_xts_block(int rounds, const __m128i *key_schedule, __m128i *tweak, argument 313 block = _mm_loadu_si128((const __m128i *)from) ^ *tweak; 320 _mm_storeu_si128((__m128i *)to, block ^ *tweak); 322 *tweak = xts_crank_lfsr(*tweak); 326 aesni_crypt_xts_block8(int rounds, const __m128i *key_schedule, __m128i *tweak, argument 336 tmptweak = *tweak; 358 *tweak = tmptweak; 384 uint8_t tweak[AES_XTS_BLOCKSIZE] __aligned(16); 388 * Prepare tweak a [all...] |
/freebsd-13-stable/sys/crypto/openssl/arm/ |
H A D | bsaes-armv7.S | 1588 ldr r0, [ip] @ pointer to input tweak 1590 @ generate initial tweak 1595 mov r0,sp @ pointer to initial tweak 1604 sub r12, #48 @ place for tweak[9] 1628 sub sp, #0x90 @ place for tweak[9] 1631 vld1.8 {q8}, [r0] @ initial tweak 1701 vst1.64 {q8}, [r0,:128] @ next round tweak 1734 vld1.64 {q8}, [r0,:128] @ next round tweak 1813 vst1.64 {q15}, [r0,:128] @ next round tweak 1844 vld1.64 {q8}, [r0,:128] @ next round tweak [all...] |
/freebsd-13-stable/sys/crypto/skein/amd64/ |
H A D | skein_block_asm.S | 95 TWEAK = 8 + BCNT #tweak values[0..1] 278 StackVar ksTwk ,8*3 #key schedule: tweak words 297 StackVar bitAdd ,8 #bit count to add to tweak 379 leaq ksTwk +F_O(%rbp),%rax #tweak pointer 482 addq bitAdd+F_O(%rbp) ,%r13 #computed updated tweak value T0 484 xorq %r13 ,%r15 #now %r13.%r15 is set as the tweak 491 movq %r13,TWEAK+0(%rdi) #save updated tweak value ctx->h.T[0] 516 movq %r14,TWEAK+ 8(%rdi) #save updated tweak T[1] (start bit cleared?) 620 leaq 1(%r11,%rdi),%r11 #precompute key + tweak 628 addq ksTwk+8*2+F_O(%rbp,%rdi,8),%r10 #precompute key + tweak [all...] |
/freebsd-13-stable/crypto/openssl/crypto/perlasm/ |
H A D | sparcv9_modes.pl | 943 ldxa [%l7]0x88, %g3 ! %g3:%g2 is tweak 1008 fxor %f12, %f0, %f0 ! ^= tweak[0] 1016 fxor %f12, %f0, %f0 ! ^= tweak[0] 1019 srax %g3, 63, %l7 ! next tweak value 1089 srax %g3, 63, %l7 ! next tweak value 1109 fxor %f12, %f0, %f0 ! ^= tweak[0] 1111 fxor %f8, %f4, %f4 ! ^= tweak[0] 1122 srax %g3, 63, %l7 ! next tweak value 1131 fxor %f12, %f0, %f0 ! ^= tweak[0] 1221 srax %g3, 63, %l7 ! next tweak valu [all...] |
/freebsd-13-stable/contrib/bmake/mk/ |
H A D | dirdeps-targets.mk | 31 # This makes it feasible to tweak options like MK_DIRDEPS_CACHE 139 # some targets want to tweak options we might want to process now
|
H A D | auto.obj.mk | 41 # Use __objdir here so it is easier to tweak without impacting
|
H A D | dirdeps.mk | 569 # we need to tweak _machines
|
/freebsd-13-stable/share/mk/ |
H A D | dirdeps-targets.mk | 32 # This makes it feasible to tweak options like MK_DIRDEPS_CACHE 139 # some targets what to tweak options we might want to process now
|
H A D | auto.obj.mk | 42 # Use __objdir here so it is easier to tweak without impacting
|
H A D | dirdeps.mk | 583 # we need to tweak _machines
|