Searched refs:tweak (Results 1 - 20 of 20) sorted by relevance

/linux-master/drivers/mtd/nand/
H A Decc.c529 struct nand_page_io_req *orig, *tweak; local
536 tweak = req;
541 tweak->dataoffs = 0;
542 tweak->datalen = nanddev_page_size(nand);
543 tweak->databuf.in = ctx->spare_databuf;
544 memset(tweak->databuf.in, 0xFF, ctx->page_buffer_size);
549 tweak->ooboffs = 0;
550 tweak->ooblen = nanddev_per_page_oobsize(nand);
551 tweak->oobbuf.in = ctx->spare_oobbuf;
552 memset(tweak
571 struct nand_page_io_req *orig, *tweak; local
[all...]
/linux-master/arch/powerpc/crypto/
H A Daesp8-ppc.pl1961 # If $key2 is NULL, then a "tweak chaining" mode is engaged, in which #
1962 # input tweak value is assumed to be encrypted already, and last tweak #
1964 # written back to original buffer. In addition, in "tweak chaining" #
1970 my ($tweak,$seven,$eighty7,$tmp,$tweak1) = map("v$_",(8..12));
1993 lvx $tweak,0,$ivp # load [unaligned] iv
1997 vperm $tweak,$tweak,$inptail,$inpperm
2018 vxor $tweak,$tweak,
[all...]
H A Daes_xts.c84 u8 tweak[AES_BLOCK_SIZE]; local
107 aes_p8_encrypt(walk.iv, tweak, &ctx->tweak_key);
121 &ctx->enc_key, NULL, tweak);
126 &ctx->dec_key, NULL, tweak);
/linux-master/crypto/
H A Dxts.c26 struct crypto_cipher *tweak; member in struct:xts_tfm_ctx
46 struct crypto_cipher *tweak; local
55 /* we need two cipher instances: one to compute the initial 'tweak'
59 /* tweak cipher, uses Key2 i.e. the second half of *key */
60 tweak = ctx->tweak;
61 crypto_cipher_clear_flags(tweak, CRYPTO_TFM_REQ_MASK);
62 crypto_cipher_set_flags(tweak, crypto_skcipher_get_flags(parent) &
64 err = crypto_cipher_setkey(tweak, key + keylen, keylen);
77 * We compute the tweak mask
301 struct crypto_cipher *tweak; local
[all...]
H A Dlrw.c74 const u8 *tweak = key + keylen - bsize; local
89 ctx->table = gf128mul_init_64k_bbe((be128 *)tweak);
135 * We compute the tweak masks twice (both before and after the ECB encryption or
/linux-master/arch/s390/kvm/
H A Dpv.c629 static int unpack_one(struct kvm *kvm, unsigned long addr, u64 tweak, argument
637 .tweak[0] = tweak,
638 .tweak[1] = offset,
652 unsigned long tweak, u16 *rc, u16 *rrc)
664 ret = unpack_one(kvm, addr, tweak, offset, rc, rrc);
729 * Stores buff_len bytes of tweak component values to buff_user
651 kvm_s390_pv_unpack(struct kvm *kvm, unsigned long addr, unsigned long size, unsigned long tweak, u16 *rc, u16 *rrc) argument
H A Dkvm-s390.h273 unsigned long tweak, u16 *rc, u16 *rrc);
H A Dkvm-s390.c2738 r = kvm_s390_pv_unpack(kvm, unp.addr, unp.size, unp.tweak,
/linux-master/drivers/crypto/intel/qat/qat_common/
H A Dqat_algs.c92 struct crypto_cipher *tweak; member in struct:qat_alg_skcipher_ctx
430 * to the HW, the second key is used for tweak calculation
994 ret = crypto_cipher_setkey(ctx->tweak, key + (keylen / 2),
1010 crypto_cipher_encrypt_one(ctx->tweak,
1222 ctx->tweak = crypto_alloc_cipher("aes", 0, 0);
1223 if (IS_ERR(ctx->tweak)) {
1225 return PTR_ERR(ctx->tweak);
1270 if (ctx->tweak)
1271 crypto_free_cipher(ctx->tweak);
/linux-master/drivers/media/pci/saa7134/
H A Dsaa7134-tvaudio.c243 int acpf, tweak = 0; local
251 tweak = audio_clock_tweak;
258 acpf, tweak);
260 acpf += tweak;
/linux-master/arch/riscv/crypto/
H A Daes-riscv64-glue.c56 u8 tweak[AES_BLOCK_SIZE]);
61 u8 tweak[AES_BLOCK_SIZE]);
368 /* Encrypt the IV with the tweak key to get the first tweak. */
/linux-master/arch/s390/include/asm/
H A Duv.h225 u64 tweak[2]; member in struct:uv_cb_unp
/linux-master/arch/s390/crypto/
H A Daes_s390.c427 u8 tweak[16]; member in struct:__anon18
457 memcpy(pcc_param.tweak, walk.iv, sizeof(pcc_param.tweak));
H A Dpaes_s390.c490 u8 tweak[16]; member in struct:__anon48
508 memcpy(pcc_param.tweak, walk.iv, sizeof(pcc_param.tweak));
/linux-master/drivers/video/fbdev/nvidia/
H A Dnvidia.c166 int tweak = 0; local
169 tweak = par->paneltweak;
179 tweak = -1;
183 tweak = 1;
187 return tweak;
/linux-master/arch/s390/include/uapi/asm/
H A Dkvm.h228 __u64 tweak; member in struct:kvm_s390_pv_unp
/linux-master/tools/arch/s390/include/uapi/asm/
H A Dkvm.h228 __u64 tweak; member in struct:kvm_s390_pv_unp
/linux-master/arch/arm64/crypto/
H A Dsm4-ce-glue.c43 u8 *tweak, unsigned int nbytes,
46 u8 *tweak, unsigned int nbytes,
/linux-master/drivers/crypto/
H A Datmel-aes.c1633 /* Compute the tweak value from req->iv with ecb(aes). */
1649 u32 tweak[AES_BLOCK_SIZE / sizeof(u32)]; local
1651 u8 *tweak_bytes = (u8 *)tweak;
1654 /* Read the computed ciphered tweak value. */
1655 atmel_aes_read_block(dd, AES_ODATAR(0), tweak);
1658 * the order of the ciphered tweak bytes need to be reversed before
1666 atmel_aes_write_block(dd, AES_TWR(0), tweak);
/linux-master/arch/arm/crypto/
H A Daes-ce-core.S484 vmov.i32 d30, #0x87 @ compose tweak mask vector

Completed in 214 milliseconds