Searched refs:rounds (Results 1 - 25 of 62) sorted by relevance

123

/linux-master/arch/arm/crypto/
H A Daes-cipher-glue.c13 asmlinkage void __aes_arm_encrypt(u32 *rk, int rounds, const u8 *in, u8 *out);
14 asmlinkage void __aes_arm_decrypt(u32 *rk, int rounds, const u8 *in, u8 *out);
19 int rounds = 6 + ctx->key_length / 4; local
21 __aes_arm_encrypt(ctx->key_enc, rounds, in, out);
27 int rounds = 6 + ctx->key_length / 4; local
29 __aes_arm_decrypt(ctx->key_dec, rounds, in, out);
H A Daes-neonbs-glue.c29 asmlinkage void aesbs_convert_key(u8 out[], u32 const rk[], int rounds);
32 int rounds, int blocks);
34 int rounds, int blocks);
37 int rounds, int blocks, u8 iv[]);
40 int rounds, int blocks, u8 ctr[]);
43 int rounds, int blocks, u8 iv[], int);
45 int rounds, int blocks, u8 iv[], int);
48 int rounds; member in struct:aesbs_ctx
79 ctx->rounds = 6 + key_len / 4;
82 aesbs_convert_key(ctx->rk, rk.key_enc, ctx->rounds);
88 __ecb_crypt(struct skcipher_request *req, void (*fn)(u8 out[], u8 const in[], u8 const rk[], int rounds, int blocks)) argument
337 __xts_crypt(struct skcipher_request *req, bool encrypt, void (*fn)(u8 out[], u8 const in[], u8 const rk[], int rounds, int blocks, u8 iv[], int)) argument
[all...]
H A Daes-cipher-core.S17 rounds .req r1
146 tst rounds, #2
152 1: subs rounds, rounds, #4
171 pop {rounds} // oldcpsr
172 \round r4, r5, r6, r7, r8, r9, r10, r11, \bsz, b, rounds
H A Dsha1_glue.c25 const u8 *data, int rounds);
H A Daes-ce-glue.c30 int rounds, int blocks);
32 int rounds, int blocks);
35 int rounds, int blocks, u8 iv[]);
37 int rounds, int blocks, u8 iv[]);
39 int rounds, int bytes, u8 const iv[]);
41 int rounds, int bytes, u8 const iv[]);
44 int rounds, int blocks, u8 ctr[]);
47 int rounds, int bytes, u8 iv[],
50 int rounds, int bytes, u8 iv[],
60 * # of rounds specifie
448 int err, first, rounds = num_rounds(&ctx->key1); local
520 int err, first, rounds = num_rounds(&ctx->key1); local
[all...]
/linux-master/arch/arm64/crypto/
H A Daes-cipher-glue.c12 asmlinkage void __aes_arm64_encrypt(u32 *rk, u8 *out, const u8 *in, int rounds);
13 asmlinkage void __aes_arm64_decrypt(u32 *rk, u8 *out, const u8 *in, int rounds);
18 int rounds = 6 + ctx->key_length / 4; local
20 __aes_arm64_encrypt(ctx->key_enc, out, in, rounds);
26 int rounds = 6 + ctx->key_length / 4; local
28 __aes_arm64_decrypt(ctx->key_dec, out, in, rounds);
H A Daes-ce.S28 .macro load_round_keys, rounds, rk
29 cmp \rounds, #12
40 .macro enc_prepare, rounds, rk, temp
42 load_round_keys \rounds, \temp
46 .macro enc_switch_key, rounds, rk, temp
48 load_round_keys \rounds, \temp
52 .macro dec_prepare, rounds, rk, temp
54 load_round_keys \rounds, \temp
76 /* up to 5 interleaved encryption rounds with the same round key */
85 /* up to 5 interleaved final rounds */
[all...]
H A Daes-neonbs-glue.c26 asmlinkage void aesbs_convert_key(u8 out[], u32 const rk[], int rounds);
29 int rounds, int blocks);
31 int rounds, int blocks);
34 int rounds, int blocks, u8 iv[]);
37 int rounds, int blocks, u8 iv[]);
40 int rounds, int blocks, u8 iv[]);
42 int rounds, int blocks, u8 iv[]);
46 int rounds, int blocks);
48 int rounds, int blocks, u8 iv[]);
50 int rounds, in
60 int rounds; member in struct:aesbs_ctx
94 __ecb_crypt(struct skcipher_request *req, void (*fn)(u8 out[], u8 const in[], u8 const rk[], int rounds, int blocks)) argument
276 __xts_crypt(struct skcipher_request *req, bool encrypt, void (*fn)(u8 out[], u8 const in[], u8 const rk[], int rounds, int blocks, u8 iv[])) argument
[all...]
H A Daes-glue.c78 int rounds, int blocks);
80 int rounds, int blocks);
83 int rounds, int blocks, u8 iv[]);
85 int rounds, int blocks, u8 iv[]);
88 int rounds, int bytes, u8 const iv[]);
90 int rounds, int bytes, u8 const iv[]);
93 int rounds, int bytes, u8 ctr[]);
96 int rounds, int bytes, u8 ctr[], int byte_ctr);
99 int rounds, int bytes, u32 const rk2[], u8 iv[],
102 int rounds, in
183 int err, rounds = 6 + ctx->key_length / 4; local
203 int err, rounds = 6 + ctx->key_length / 4; local
224 int err = 0, rounds = 6 + ctx->key_length / 4; local
253 int err = 0, rounds = 6 + ctx->key_length / 4; local
281 int err, rounds = 6 + ctx->key_length / 4; local
338 int err, rounds = 6 + ctx->key_length / 4; local
411 int err, rounds = 6 + ctx->key1.key_length / 4; local
433 int err, rounds = 6 + ctx->key1.key_length / 4; local
455 int err, rounds = 6 + ctx->key_length / 4; local
501 int err, rounds = 6 + ctx->key_length / 4; local
545 int err, first, rounds = 6 + ctx->key1.key_length / 4; local
617 int err, first, rounds = 6 + ctx->key1.key_length / 4; local
822 int rounds = 6 + key_len / 4; local
851 int rounds = 6 + key_len / 4; local
880 int rounds = 6 + ctx->key_length / 4; local
[all...]
H A Daes-neon.S98 .macro do_block, enc, in, rounds, rk, rkp, i
101 mov \i, \rounds
114 .macro encrypt_block, in, rounds, rk, rkp, i
115 do_block 1, \in, \rounds, \rk, \rkp, \i
118 .macro decrypt_block, in, rounds, rk, rkp, i
119 do_block 0, \in, \rounds, \rk, \rkp, \i
205 .macro do_block_4x, enc, in0, in1, in2, in3, rounds, rk, rkp, i
208 mov \i, \rounds
231 .macro encrypt_block4x, in0, in1, in2, in3, rounds, rk, rkp, i
232 do_block_4x 1, \in0, \in1, \in2, \in3, \rounds, \r
[all...]
H A Daes-cipher-core.S17 rounds .req x3
102 tbnz rounds, #1, 1f
107 1: subs rounds, rounds, #4
H A Daes-ce-ccm-glue.c26 * # of rounds specified by AES:
27 * 128 bit key 10 rounds
28 * 192 bit key 12 rounds
29 * 256 bit key 14 rounds
30 * => n byte key => 6 + (n/4) rounds
35 asmlinkage u32 ce_aes_mac_update(u8 const in[], u32 const rk[], int rounds,
40 u32 const rk[], u32 rounds, u8 mac[],
44 u32 const rk[], u32 rounds, u8 mac[],
101 u32 macp, u32 const rk[], u32 rounds)
109 u32 rem = ce_aes_mac_update(in, rk, rounds, block
100 ce_aes_ccm_auth_data(u8 mac[], u8 const in[], u32 abytes, u32 macp, u32 const rk[], u32 rounds) argument
[all...]
/linux-master/tools/power/cpupower/bench/
H A Dparse.h17 unsigned int rounds; /* calculation rounds with iterated sleep/load time */ member in struct:config
H A Dbenchmark.c24 * compute how many rounds of calculation we should do
29 * @retval rounds of calculation
37 unsigned int rounds = 0; local
43 /* get the initial calculation time for a specific number of rounds */
53 rounds = (unsigned int)(load * estimated / timed);
54 dprintf("calibrating with %u rounds\n", rounds);
56 ROUNDS(rounds);
60 estimated = rounds;
91 for (_round = 1; _round <= config->rounds; _roun
[all...]
H A Dmain.c28 {"rounds", 1, 0, 'r'},
51 printf(" -r, --rounds<int>\t\t\tload/sleep rounds\n");
126 sscanf(optarg, "%u", &config->rounds);
127 dprintf("user rounds -> %s\n", optarg);
166 "rounds=%u\n\t"
174 config->rounds,
/linux-master/arch/powerpc/crypto/
H A Daes-spe-glue.c44 u32 rounds; member in struct:ppc_aes_ctx
51 u32 rounds; member in struct:ppc_xts_ctx
54 extern void ppc_encrypt_aes(u8 *out, const u8 *in, u32 *key_enc, u32 rounds);
55 extern void ppc_decrypt_aes(u8 *out, const u8 *in, u32 *key_dec, u32 rounds);
56 extern void ppc_encrypt_ecb(u8 *out, const u8 *in, u32 *key_enc, u32 rounds,
58 extern void ppc_decrypt_ecb(u8 *out, const u8 *in, u32 *key_dec, u32 rounds,
60 extern void ppc_encrypt_cbc(u8 *out, const u8 *in, u32 *key_enc, u32 rounds,
62 extern void ppc_decrypt_cbc(u8 *out, const u8 *in, u32 *key_dec, u32 rounds,
64 extern void ppc_crypt_ctr (u8 *out, const u8 *in, u32 *key_enc, u32 rounds,
66 extern void ppc_encrypt_xts(u8 *out, const u8 *in, u32 *key_enc, u32 rounds,
[all...]
H A Daesp10-ppc.pl120 my ($inp,$bits,$out,$ptr,$cnt,$rounds)=map("r$_",(3..8));
261 li $rounds,10
335 li $rounds,12
343 li $rounds,14
397 stw $rounds,0($out)
417 slwi $cnt,$rounds,4
419 srwi $rounds,$rounds,1
421 mtctr $rounds
459 my ($inp,$out,$key,$rounds,
[all...]
H A Daesp8-ppc.h7 int rounds; member in struct:aes_key
/linux-master/crypto/
H A Daria_generic.c155 ctx->dec_key[0][i] = ctx->enc_key[ctx->rounds][i];
156 ctx->dec_key[ctx->rounds][i] = ctx->enc_key[0][i];
159 for (i = 1; i < ctx->rounds; i++) {
160 ctx->dec_key[i][0] = aria_m(ctx->enc_key[ctx->rounds - i][0]);
161 ctx->dec_key[i][1] = aria_m(ctx->enc_key[ctx->rounds - i][1]);
162 ctx->dec_key[i][2] = aria_m(ctx->enc_key[ctx->rounds - i][2]);
163 ctx->dec_key[i][3] = aria_m(ctx->enc_key[ctx->rounds - i][3]);
183 BUILD_BUG_ON(sizeof(int) != sizeof(ctx->rounds));
186 ctx->rounds = (key_len + 32) / 4;
201 int rounds, rkid local
[all...]
/linux-master/arch/sparc/crypto/
H A Dmd5_glue.c30 unsigned int rounds);
58 const unsigned int rounds = (len - done) / MD5_HMAC_BLOCK_SIZE; local
60 md5_sparc64_transform(sctx->hash, data + done, rounds);
61 done += rounds * MD5_HMAC_BLOCK_SIZE;
H A Dsha256_glue.c28 unsigned int rounds);
42 const unsigned int rounds = (len - done) / SHA256_BLOCK_SIZE; local
44 sha256_sparc64_transform(sctx->state, data + done, rounds);
45 done += rounds * SHA256_BLOCK_SIZE;
H A Dsha512_glue.c27 unsigned int rounds);
42 const unsigned int rounds = (len - done) / SHA512_BLOCK_SIZE; local
44 sha512_sparc64_transform(sctx->state, data + done, rounds);
45 done += rounds * SHA512_BLOCK_SIZE;
H A Dsha1_glue.c28 unsigned int rounds);
42 const unsigned int rounds = (len - done) / SHA1_BLOCK_SIZE; local
44 sha1_sparc64_transform(sctx->state, data + done, rounds);
45 done += rounds * SHA1_BLOCK_SIZE;
/linux-master/fs/bcachefs/
H A Dsiphash.c35 * are the number of compression rounds and the number of finalization rounds.
54 static void SipHash_Rounds(SIPHASH_CTX *ctx, int rounds) argument
56 while (rounds--) {
77 static void SipHash_CRounds(SIPHASH_CTX *ctx, const void *ptr, int rounds) argument
82 SipHash_Rounds(ctx, rounds);
/linux-master/fs/reiserfs/
H A Dhashes.c24 #define TEACORE(rounds) \
27 int n = rounds; \

Completed in 288 milliseconds

123