Searched refs:key2 (Results 1 - 25 of 76) sorted by path

1234

/linux-master/include/linux/
H A Dbtree-128.h88 u64 key1, u64 key2, size_t index);
/linux-master/arch/arm/crypto/
H A Daes-ce-core.S26 .macro enc_dround, key1, key2
28 enc_round q0, \key2
31 .macro dec_dround, key1, key2
33 dec_round q0, \key2
36 .macro enc_fround, key1, key2, key3
38 aese.8 q0, \key2
42 .macro dec_fround, key1, key2, key3
44 aesd.8 q0, \key2
48 .macro enc_dround_4x, key1, key2
53 enc_round q0, \key2
[all...]
H A Daes-ce-glue.c147 struct crypto_aes_ctx __aligned(8) key2; member in struct:crypto_aes_xts_ctx
162 ret = ce_aes_expandkey(&ctx->key2, &in_key[key_len / 2],
488 ctx->key2.key_enc, first);
510 ctx->key2.key_enc, first);
560 ctx->key2.key_enc, first);
582 ctx->key2.key_enc, first);
/linux-master/arch/arm64/crypto/
H A Daes-glue.c118 struct crypto_aes_ctx __aligned(8) key2; member in struct:crypto_aes_xts_ctx
123 struct crypto_aes_ctx __aligned(8) key2; member in struct:crypto_aes_essiv_cbc_ctx
157 ret = aes_expandkey(&ctx->key2, &in_key[key_len / 2],
176 return aes_expandkey(&ctx->key2, digest, sizeof(digest));
422 req->iv, ctx->key2.key_enc);
444 req->iv, ctx->key2.key_enc);
585 ctx->key2.key_enc, walk.iv, first);
607 ctx->key2.key_enc, walk.iv, first);
657 ctx->key2.key_enc, walk.iv, first);
680 ctx->key2
[all...]
H A Dsm4-ce-glue.c58 struct sm4_ctx key2; member in struct:sm4_xts_ctx
102 sm4_ce_expand_key(&key[SM4_KEY_SIZE], ctx->key2.rkey_enc,
103 ctx->key2.rkey_dec, crypto_sm4_fk, crypto_sm4_ck);
326 const u32 *rkey2_enc = ctx->key2.rkey_enc;
563 u8 __aligned(8) key2[SM4_BLOCK_SIZE];
578 sm4_ce_crypt_block(ctx->key.rkey_enc, key2, ks[0]);
581 sm4_ce_expand_key(key2, ctx->key.rkey_enc, ctx->key.rkey_dec,
/linux-master/arch/powerpc/crypto/
H A Daesp8-ppc.h28 const struct aes_key *key1, const struct aes_key *key2, u8 *iv);
30 const struct aes_key *key1, const struct aes_key *key2, u8 *iv);
H A Daesp8-ppc.pl1959 # const AES_KEY *key1, const AES_KEY *key2, #
1961 # If $key2 is NULL, then a "tweak chaining" mode is engaged, in which #
1967 my ($inp,$out,$len,$key1,$key2,$ivp,$rounds,$idx) = map("r$_",(3..10));
1971 my $taillen = $key2;
2005 ${UCMP}i $key2,0 # key2==NULL?
2008 ?lvsl $keyperm,0,$key2 # prepare for unaligned key
2009 lwz $rounds,240($key2)
2014 lvx $rndkey0,0,$key2
2015 lvx $rndkey1,$idx,$key2
[all...]
/linux-master/drivers/crypto/
H A Datmel-aes.c133 u32 key2[AES_KEYSIZE_256 / sizeof(u32)]; member in struct:atmel_aes_xts_ctx
1638 ctx->key2, ctx->base.keylen);
1695 memcpy(ctx->key2, key + keylen/2, keylen/2);
/linux-master/drivers/crypto/cavium/cpt/
H A Dcptvf_algs.c238 const u8 *key2 = key + (keylen / 2); local
245 memcpy(ctx->enc_key + KEY2_OFFSET, key2, keylen / 2);
/linux-master/drivers/crypto/cavium/nitrox/
H A Dnitrox_req.h145 u8 key2[64]; member in union:auth_keys::__anon102
H A Dnitrox_skcipher.c356 memcpy(fctx->auth.u.key2, (key + keylen), keylen);
/linux-master/drivers/crypto/ccree/
H A Dcc_cipher.c266 u8 key2[DES_KEY_SIZE]; member in struct:tdes_keys
360 dev_err(dev, "Unsupported hw key2 number (%d)\n",
475 /* sha256 for key2 - use sw implementation */
/linux-master/drivers/crypto/marvell/octeontx/
H A Dotx_cptvf_algs.c397 const u8 *key2 = key + (keylen / 2); local
406 memcpy(ctx->enc_key + KEY2_OFFSET, key2, keylen / 2);
/linux-master/drivers/crypto/marvell/octeontx2/
H A Dotx2_cptvf_algs.c415 const u8 *key2 = key + (keylen / 2); local
425 memcpy(ctx->enc_key + KEY2_OFFSET, key2, keylen / 2);
/linux-master/drivers/infiniband/hw/mlx5/
H A Dmr.c604 struct mlx5r_cache_rb_key key2)
608 res = key1.ats - key2.ats;
612 res = key1.access_mode - key2.access_mode;
616 res = key1.access_flags - key2.access_flags;
625 return key1.ndescs - key2.ndescs;
603 cache_ent_key_cmp(struct mlx5r_cache_rb_key key1, struct mlx5r_cache_rb_key key2) argument
/linux-master/drivers/infiniband/sw/rxe/
H A Drxe_verbs.h16 static inline int pkey_match(u16 key1, u16 key2) argument
19 ((key1 & 0x7fff) == (key2 & 0x7fff)) &&
20 ((key1 & 0x8000) || (key2 & 0x8000))) ? 1 : 0;
/linux-master/drivers/input/keyboard/
H A Dep93xx_keypad.c76 int key2; member in struct:ep93xx_keypad
88 int keycode, key1, key2; local
96 key2 = keypad->keycodes[keycode];
99 if (keypad->key1 && key1 != keypad->key1 && key2 != keypad->key1)
102 if (keypad->key2 && key1 != keypad->key2 && key2 != keypad->key2)
103 input_report_key(input_dev, keypad->key2, 0);
106 input_report_key(input_dev, key2,
[all...]
/linux-master/drivers/md/dm-vdo/indexer/
H A Dradix-sort.c66 static inline int compare(sort_key_t key1, sort_key_t key2, u16 offset, u16 length) argument
68 return memcmp(&key1[offset], &key2[offset], length);
/linux-master/drivers/media/platform/st/sti/bdisp/
H A Dbdisp-reg.h62 u32 key2; member in struct:bdisp_node
/linux-master/drivers/net/ethernet/intel/ice/
H A Dice_ddp.h354 struct ice_boost_key_value key2; member in struct:ice_boost_key
/linux-master/drivers/net/ethernet/mellanox/mlxsw/
H A Dspectrum_acl_erp.c1223 const struct mlxsw_sp_acl_erp_key *key2 = obj2; local
1229 return memcmp(key1->mask, key2->mask, sizeof(key1->mask));
/linux-master/drivers/net/hippi/
H A Drrunner.h617 u32 key2; member in struct:eeprom_boot
/linux-master/drivers/net/wireless/ath/
H A Dkey.c134 u32 key0, key1, key2, key3, key4; local
186 key2 = get_unaligned_le32(k->kv_val + 6);
212 REG_WRITE(ah, AR_KEYTABLE_KEY2(entry), key2);
230 * key2 [31:0] = RX key [63:32]
269 * key2 [31:0] = TX/RX MIC key [63:32]
323 REG_WRITE(ah, AR_KEYTABLE_KEY2(entry), key2);
/linux-master/drivers/pinctrl/bcm/
H A Dpinctrl-cygnus-mux.c502 CYGNUS_PIN_GROUP(key2, 0x4, 8, 1),
/linux-master/fs/befs/
H A Dbtree.c120 const void *key2, int keylen2);
704 * @key2: pointer to the second key to be compared
705 * @keylen2: length in bytes of key2
707 * Returns 0 if @key1 and @key2 are equal.
709 * Returns <0 if @key2 is greater.
713 const void *key2, int keylen2)
716 int result = strncmp(key1, key2, len);
725 btree_compare_int32(cont void *key1, int keylen1, const void *key2, int keylen2)
727 return *(int32_t *) key1 - *(int32_t *) key2;
732 const void *key2, in
712 befs_compare_strings(const void *key1, int keylen1, const void *key2, int keylen2) argument
[all...]

Completed in 587 milliseconds

1234