/linux-master/drivers/mtd/nand/ |
H A D | ecc.c | 529 struct nand_page_io_req *orig, *tweak; local 536 tweak = req; 541 tweak->dataoffs = 0; 542 tweak->datalen = nanddev_page_size(nand); 543 tweak->databuf.in = ctx->spare_databuf; 544 memset(tweak->databuf.in, 0xFF, ctx->page_buffer_size); 549 tweak->ooboffs = 0; 550 tweak->ooblen = nanddev_per_page_oobsize(nand); 551 tweak->oobbuf.in = ctx->spare_oobbuf; 552 memset(tweak 571 struct nand_page_io_req *orig, *tweak; local [all...] |
/linux-master/arch/powerpc/crypto/ |
H A D | aesp8-ppc.pl | 1961 # If $key2 is NULL, then a "tweak chaining" mode is engaged, in which # 1962 # input tweak value is assumed to be encrypted already, and last tweak # 1964 # written back to original buffer. In addition, in "tweak chaining" # 1970 my ($tweak,$seven,$eighty7,$tmp,$tweak1) = map("v$_",(8..12)); 1993 lvx $tweak,0,$ivp # load [unaligned] iv 1997 vperm $tweak,$tweak,$inptail,$inpperm 2018 vxor $tweak,$tweak, [all...] |
H A D | aes_xts.c | 84 u8 tweak[AES_BLOCK_SIZE]; local 107 aes_p8_encrypt(walk.iv, tweak, &ctx->tweak_key); 121 &ctx->enc_key, NULL, tweak); 126 &ctx->dec_key, NULL, tweak);
|
/linux-master/crypto/ |
H A D | xts.c | 26 struct crypto_cipher *tweak; member in struct:xts_tfm_ctx 46 struct crypto_cipher *tweak; local 55 /* we need two cipher instances: one to compute the initial 'tweak' 59 /* tweak cipher, uses Key2 i.e. the second half of *key */ 60 tweak = ctx->tweak; 61 crypto_cipher_clear_flags(tweak, CRYPTO_TFM_REQ_MASK); 62 crypto_cipher_set_flags(tweak, crypto_skcipher_get_flags(parent) & 64 err = crypto_cipher_setkey(tweak, key + keylen, keylen); 77 * We compute the tweak mask 301 struct crypto_cipher *tweak; local [all...] |
H A D | lrw.c | 74 const u8 *tweak = key + keylen - bsize; local 89 ctx->table = gf128mul_init_64k_bbe((be128 *)tweak); 135 * We compute the tweak masks twice (both before and after the ECB encryption or
|
/linux-master/arch/s390/kvm/ |
H A D | pv.c | 629 static int unpack_one(struct kvm *kvm, unsigned long addr, u64 tweak, argument 637 .tweak[0] = tweak, 638 .tweak[1] = offset, 652 unsigned long tweak, u16 *rc, u16 *rrc) 664 ret = unpack_one(kvm, addr, tweak, offset, rc, rrc); 729 * Stores buff_len bytes of tweak component values to buff_user 651 kvm_s390_pv_unpack(struct kvm *kvm, unsigned long addr, unsigned long size, unsigned long tweak, u16 *rc, u16 *rrc) argument
|
H A D | kvm-s390.h | 273 unsigned long tweak, u16 *rc, u16 *rrc);
|
H A D | kvm-s390.c | 2738 r = kvm_s390_pv_unpack(kvm, unp.addr, unp.size, unp.tweak,
|
/linux-master/drivers/crypto/intel/qat/qat_common/ |
H A D | qat_algs.c | 92 struct crypto_cipher *tweak; member in struct:qat_alg_skcipher_ctx 430 * to the HW, the second key is used for tweak calculation 994 ret = crypto_cipher_setkey(ctx->tweak, key + (keylen / 2), 1010 crypto_cipher_encrypt_one(ctx->tweak, 1222 ctx->tweak = crypto_alloc_cipher("aes", 0, 0); 1223 if (IS_ERR(ctx->tweak)) { 1225 return PTR_ERR(ctx->tweak); 1270 if (ctx->tweak) 1271 crypto_free_cipher(ctx->tweak);
|
/linux-master/drivers/media/pci/saa7134/ |
H A D | saa7134-tvaudio.c | 243 int acpf, tweak = 0; local 251 tweak = audio_clock_tweak; 258 acpf, tweak); 260 acpf += tweak;
|
/linux-master/arch/riscv/crypto/ |
H A D | aes-riscv64-glue.c | 56 u8 tweak[AES_BLOCK_SIZE]); 61 u8 tweak[AES_BLOCK_SIZE]); 368 /* Encrypt the IV with the tweak key to get the first tweak. */
|
/linux-master/arch/s390/include/asm/ |
H A D | uv.h | 225 u64 tweak[2]; member in struct:uv_cb_unp
|
/linux-master/arch/s390/crypto/ |
H A D | aes_s390.c | 427 u8 tweak[16]; member in struct:__anon18 457 memcpy(pcc_param.tweak, walk.iv, sizeof(pcc_param.tweak));
|
H A D | paes_s390.c | 490 u8 tweak[16]; member in struct:__anon48 508 memcpy(pcc_param.tweak, walk.iv, sizeof(pcc_param.tweak));
|
/linux-master/drivers/video/fbdev/nvidia/ |
H A D | nvidia.c | 166 int tweak = 0; local 169 tweak = par->paneltweak; 179 tweak = -1; 183 tweak = 1; 187 return tweak;
|
/linux-master/arch/s390/include/uapi/asm/ |
H A D | kvm.h | 228 __u64 tweak; member in struct:kvm_s390_pv_unp
|
/linux-master/tools/arch/s390/include/uapi/asm/ |
H A D | kvm.h | 228 __u64 tweak; member in struct:kvm_s390_pv_unp
|
/linux-master/arch/arm64/crypto/ |
H A D | sm4-ce-glue.c | 43 u8 *tweak, unsigned int nbytes, 46 u8 *tweak, unsigned int nbytes,
|
/linux-master/drivers/crypto/ |
H A D | atmel-aes.c | 1633 /* Compute the tweak value from req->iv with ecb(aes). */ 1649 u32 tweak[AES_BLOCK_SIZE / sizeof(u32)]; local 1651 u8 *tweak_bytes = (u8 *)tweak; 1654 /* Read the computed ciphered tweak value. */ 1655 atmel_aes_read_block(dd, AES_ODATAR(0), tweak); 1658 * the order of the ciphered tweak bytes need to be reversed before 1666 atmel_aes_write_block(dd, AES_TWR(0), tweak);
|
/linux-master/arch/arm/crypto/ |
H A D | aes-ce-core.S | 484 vmov.i32 d30, #0x87 @ compose tweak mask vector
|