| /linux/arch/arm64/crypto/ |
| H A D | aes-ce.S | 38 .macro enc_prepare, rounds, rk, temp 39 load_round_keys \rk, \rounds, \temp 43 .macro enc_switch_key, rounds, rk, temp 44 load_round_keys \rk, \rounds, \temp 48 .macro dec_prepare, rounds, rk, temp 49 load_round_keys \rk, \rounds, \temp 71 /* up to 5 interleaved encryption rounds with the same round key */ 80 /* up to 5 interleaved final rounds */ 107 .macro do_block_Nx, enc, rounds, i0, i1, i2, i3, i4 108 tbz \rounds, #2, .L\@ /* 128 bits */ [all …]
|
| H A D | aes-cipher-glue.c | 12 asmlinkage void __aes_arm64_encrypt(u32 *rk, u8 *out, const u8 *in, int rounds); 13 asmlinkage void __aes_arm64_decrypt(u32 *rk, u8 *out, const u8 *in, int rounds); 18 int rounds = 6 + ctx->key_length / 4; in aes_arm64_encrypt() local 20 __aes_arm64_encrypt(ctx->key_enc, out, in, rounds); in aes_arm64_encrypt() 26 int rounds = 6 + ctx->key_length / 4; in aes_arm64_decrypt() local 28 __aes_arm64_decrypt(ctx->key_dec, out, in, rounds); in aes_arm64_decrypt()
|
| H A D | aes-ce-glue.c | 27 asmlinkage void __aes_ce_encrypt(u32 *rk, u8 *out, const u8 *in, int rounds); 28 asmlinkage void __aes_ce_decrypt(u32 *rk, u8 *out, const u8 *in, int rounds); 37 * # of rounds specified by AES: in num_rounds() 38 * 128 bit key 10 rounds in num_rounds() 39 * 192 bit key 12 rounds in num_rounds() 40 * 256 bit key 14 rounds in num_rounds() 41 * => n byte key => 6 + (n/4) rounds in num_rounds()
|
| H A D | aes-neon.S | 98 .macro do_block, enc, in, rounds, rk, rkp, i 101 mov \i, \rounds 114 .macro encrypt_block, in, rounds, rk, rkp, i 115 do_block 1, \in, \rounds, \rk, \rkp, \i 118 .macro decrypt_block, in, rounds, rk, rkp, i 119 do_block 0, \in, \rounds, \rk, \rkp, \i 205 .macro do_block_4x, enc, in0, in1, in2, in3, rounds, rk, rkp, i 208 mov \i, \rounds 231 .macro encrypt_block4x, in0, in1, in2, in3, rounds, rk, rkp, i 232 do_block_4x 1, \in0, \in1, \in2, \in3, \rounds, \rk, \rkp, \i [all …]
|
| H A D | aes-neonbs-core.S | 23 rounds .req x11 382 * void aesbs_convert_key(u8 out[], u32 const rk[], int rounds) 456 sub rounds, rounds, #1 464 subs rounds, rounds, #1 496 lsl x9, rounds, #7 522 sub rounds, rounds, #1 530 subs rounds, rounds, #1 560 * aesbs_ecb_encrypt(u8 out[], u8 const in[], u8 const rk[], int rounds, 562 * aesbs_ecb_decrypt(u8 out[], u8 const in[], u8 const rk[], int rounds, 597 mov rounds, x22 [all …]
|
| H A D | aes-cipher-core.S | 17 rounds .req x3 102 tbnz rounds, #1, 1f 107 1: subs rounds, rounds, #4
|
| H A D | aes-modes.S | 48 * aes_ecb_encrypt(u8 out[], u8 const in[], u8 const rk[], int rounds, 50 * aes_ecb_decrypt(u8 out[], u8 const in[], u8 const rk[], int rounds, 115 * aes_cbc_encrypt(u8 out[], u8 const in[], u8 const rk[], int rounds, 117 * aes_cbc_decrypt(u8 out[], u8 const in[], u8 const rk[], int rounds, 120 * int rounds, int blocks, u8 iv[], 123 * int rounds, int blocks, u8 iv[], 130 mov w8, #14 /* AES-256: 14 rounds */ 174 mov w8, #14 /* AES-256: 14 rounds */ 240 * int rounds, int bytes, u8 const iv[]) 242 * int rounds, int bytes, u8 const iv[]) [all …]
|
| /linux/tools/power/cpupower/bench/ |
| H A D | benchmark.c | 24 * compute how many rounds of calculation we should do 29 * @retval rounds of calculation 37 unsigned int rounds = 0; in calculate_timespace() local 43 /* get the initial calculation time for a specific number of rounds */ in calculate_timespace() 45 ROUNDS(estimated); in calculate_timespace() 53 rounds = (unsigned int)(load * estimated / timed); in calculate_timespace() 54 dprintf("calibrating with %u rounds\n", rounds); in calculate_timespace() 56 ROUNDS(rounds); in calculate_timespace() 60 estimated = rounds; in calculate_timespace() 91 for (_round = 1; _round <= config->rounds; _round++) in start_benchmark() [all …]
|
| H A D | main.c | 28 {"rounds", 1, 0, 'r'}, 51 printf(" -r, --rounds<int>\t\t\tload/sleep rounds\n"); in usage() 126 sscanf(optarg, "%u", &config->rounds); in main() 127 dprintf("user rounds -> %s\n", optarg); in main() 166 "rounds=%u\n\t" in main() 174 config->rounds, in main()
|
| H A D | README-BENCH | 47 rounds=5 66 This shows expected results of the first two test run rounds from 117 -r, --rounds<int> load/sleep rounds
|
| /linux/arch/powerpc/crypto/ |
| H A D | aes-spe-glue.c | 44 u32 rounds; member 51 u32 rounds; member 54 extern void ppc_encrypt_aes(u8 *out, const u8 *in, u32 *key_enc, u32 rounds); 55 extern void ppc_decrypt_aes(u8 *out, const u8 *in, u32 *key_dec, u32 rounds); 56 extern void ppc_encrypt_ecb(u8 *out, const u8 *in, u32 *key_enc, u32 rounds, 58 extern void ppc_decrypt_ecb(u8 *out, const u8 *in, u32 *key_dec, u32 rounds, 60 extern void ppc_encrypt_cbc(u8 *out, const u8 *in, u32 *key_enc, u32 rounds, 62 extern void ppc_decrypt_cbc(u8 *out, const u8 *in, u32 *key_dec, u32 rounds, 64 extern void ppc_crypt_ctr (u8 *out, const u8 *in, u32 *key_enc, u32 rounds, 66 extern void ppc_encrypt_xts(u8 *out, const u8 *in, u32 *key_enc, u32 rounds, [all …]
|
| H A D | aesp8-ppc.pl | 120 my ($inp,$bits,$out,$ptr,$cnt,$rounds)=map("r$_",(3..8)); 262 li $rounds,10 336 li $rounds,12 344 li $rounds,14 398 stw $rounds,0($out) 418 slwi $cnt,$rounds,4 420 srwi $rounds,$rounds,1 422 mtctr $rounds 460 my ($inp,$out,$key,$rounds,$idx)=map("r$_",(3..7)); 464 lwz $rounds,240($key) [all …]
|
| H A D | aesp10-ppc.pl | 120 my ($inp,$bits,$out,$ptr,$cnt,$rounds)=map("r$_",(3..8)); 261 li $rounds,10 335 li $rounds,12 343 li $rounds,14 397 stw $rounds,0($out) 417 slwi $cnt,$rounds,4 419 srwi $rounds,$rounds,1 421 mtctr $rounds 459 my ($inp,$out,$key,$rounds,$idx)=map("r$_",(3..7)); 463 lwz $rounds,240($key) [all …]
|
| H A D | aes-spe-keys.S | 71 * key itself plus 10 rounds with 16 bytes each 84 li r16,10 /* 10 expansion rounds */ 113 * itself plus 12 rounds with 16 bytes each 130 li r16,8 /* 8 expansion rounds */ 163 * itself plus 14 rounds with 16 bytes each 184 li r16,7 /* 7 expansion rounds */
|
| H A D | aes-spe-modes.S | 159 * u32 rounds) 186 * u32 rounds) 214 * u32 rounds, u32 bytes); 249 * u32 rounds, u32 bytes); 285 * 32 rounds, u32 bytes, u8 *iv); 333 * u32 rounds, u32 bytes, u8 *iv); 408 * u32 rounds, u32 bytes, u8 *iv); 492 * u32 rounds, u32 bytes, u8 *iv, u32 *key_twk); 559 * u32 rounds, u32 blocks, u8 *iv, u32 *key_twk);
|
| /linux/arch/arm/crypto/ |
| H A D | aes-cipher-glue.c | 20 int rounds = 6 + ctx->key_length / 4; in aes_arm_encrypt() local 22 __aes_arm_encrypt(ctx->key_enc, rounds, in, out); in aes_arm_encrypt() 28 int rounds = 6 + ctx->key_length / 4; in aes_arm_decrypt() local 30 __aes_arm_decrypt(ctx->key_dec, rounds, in, out); in aes_arm_decrypt()
|
| H A D | aes-ce-core.S | 110 blo 0f @ AES-128: 10 rounds 113 beq 1f @ AES-192: 12 rounds 135 * r3 : number of rounds 162 .macro prepare_key, rk, rounds argument 163 add ip, \rk, \rounds, lsl #4 169 * aes_ecb_encrypt(u8 out[], u8 const in[], u32 const rk[], int rounds, 171 * aes_ecb_decrypt(u8 out[], u8 const in[], u32 const rk[], int rounds, 227 * aes_cbc_encrypt(u8 out[], u8 const in[], u32 const rk[], int rounds, 229 * aes_cbc_decrypt(u8 out[], u8 const in[], u32 const rk[], int rounds, 291 * int rounds, int bytes, u8 const iv[]) [all …]
|
| H A D | aes-cipher-core.S | 17 rounds .req r1 146 tst rounds, #2 152 1: subs rounds, rounds, #4 171 pop {rounds} // oldcpsr 172 \round r4, r5, r6, r7, r8, r9, r10, r11, \bsz, b, rounds
|
| H A D | aes-neonbs-core.S | 24 rounds .req ip 432 * void aesbs_convert_key(u8 out[], u32 const rk[], int rounds) 507 sub rounds, rounds, #1 521 subs rounds, rounds, #1 551 add bskey, bskey, rounds, lsl #7 576 sub rounds, rounds, #1 590 subs rounds, rounds, #1 618 * aesbs_ecb_encrypt(u8 out[], u8 const in[], u8 const rk[], int rounds, 620 * aesbs_ecb_decrypt(u8 out[], u8 const in[], u8 const rk[], int rounds, 643 mov rounds, r3 [all …]
|
| H A D | aes-cipher.h | 8 asmlinkage void __aes_arm_encrypt(const u32 rk[], int rounds, 10 asmlinkage void __aes_arm_decrypt(const u32 rk[], int rounds,
|
| /linux/lib/crypto/x86/ |
| H A D | sha1-avx2-asm.S | 198 /* message scheduling pre-compute for rounds 0-15 */ 202 * 1 vector iteration per 8 rounds 221 * message scheduling pre-compute for rounds 16-31 226 * "brute force" vectorization for rounds 16-31 only 232 * 1 vector iteration per 8 rounds 274 * 1 vector iteration per 8 rounds 456 * macro implements 80 rounds of SHA-1, for multiple blocks with s/w pipelining 500 * rounds: 0,2,4,6,8 509 * rounds: 526 * rounds [all …]
|
| H A D | sha512-ssse3-asm.S | 151 # Compute rounds t-2 and t-1 154 # Two rounds are computed based on the values for K[t-2]+W[t-2] and 163 # The computation of the message schedule and the rounds are tightly 165 # For clarity, integer instructions (for the rounds calculation) are indented 260 movdqa %xmm0, WK_2(idx) # Store W[t]+K[t] for next rounds 305 # (80 rounds) / (2 rounds/iteration) + (1 iteration) 314 movdqa %xmm0, WK_2(t) # Store into WK for rounds 316 # BSWAP 2 QWORDS# Compute 2 Rounds 325 # Schedule 2 QWORDS# Compute 2 Rounds 328 # Compute 2 Rounds
|
| H A D | sha512-avx-asm.S | 156 # Compute rounds t-2 and t-1 159 # Two rounds are computed based on the values for K[t-2]+W[t-2] and 168 # The computation of the message schedule and the rounds are tightly 250 vmovdqa %xmm0, WK_2(idx) # Store W[t]+K[t] for next rounds 306 # (80 rounds) / (2 rounds/iteration) + (1 iteration) 315 vmovdqa %xmm0, WK_2(t) # Store into WK for rounds 317 # BSWAP 2 QWORDS# Compute 2 Rounds 326 # Schedule 2 QWORDS# Compute 2 Rounds 329 # Compute 2 Rounds
|
| H A D | sha1-ssse3-and-avx.S | 108 * This macro implements 80 rounds of SHA-1 for one 64-byte block 249 * RR does two rounds of SHA-1 back to back with W[] pre-calc 305 .elseif (i < 80) // rounds 32-79 346 /* message scheduling pre-compute for rounds 0-15 */ 361 /* message scheduling pre-compute for rounds 16-31 367 * some "heavy-lifting" vectorization for rounds 16-31 due to w[i]->w[i-3] 372 # vector iteration / 4 scalar rounds 402 /* message scheduling pre-compute for rounds 32-79
|
| /linux/fs/netfs/ |
| H A D | fscache_main.c | 26 * 2 rounds: 1246.4 25475.4 27 * 3 rounds: 1907.1 31295.1 28 * 4 rounds: 2042.3 31718.6
|