Home
last modified time | relevance | path

Searched full:tweak (Results 1 – 25 of 194) sorted by relevance

12345678

/linux/arch/powerpc/crypto/
H A Daesp8-ppc.pl1961 # If $key2 is NULL, then a "tweak chaining" mode is engaged, in which #
1962 # input tweak value is assumed to be encrypted already, and last tweak #
1964 # written back to original buffer. In addition, in "tweak chaining" #
1970 my ($tweak,$seven,$eighty7,$tmp,$tweak1) = map("v$_",(8..12));
1993 lvx $tweak,0,$ivp # load [unaligned] iv
1997 vperm $tweak,$tweak,$inptail,$inpperm
2018 vxor $tweak,$tweak,$rndkey0
2025 vcipher $tweak,$tweak,$rndkey1
2029 vcipher $tweak,$tweak,$rndkey0
2035 vcipher $tweak,$tweak,$rndkey1
[all …]
H A Daes_xts.c84 u8 tweak[AES_BLOCK_SIZE]; in p8_aes_xts_crypt() local
107 aes_p8_encrypt(walk.iv, tweak, &ctx->tweak_key); in p8_aes_xts_crypt()
121 &ctx->enc_key, NULL, tweak); in p8_aes_xts_crypt()
126 &ctx->dec_key, NULL, tweak); in p8_aes_xts_crypt()
H A Daes-spe-regs.h15 #define rKT r9 /* pointer to tweak key (XTS mode) */
34 #define rG0 r28 /* endian reversed tweak (XTS mode) */
/linux/crypto/
H A Dxts.c26 struct crypto_cipher *tweak; member
46 struct crypto_cipher *tweak; in xts_setkey() local
55 /* we need two cipher instances: one to compute the initial 'tweak' in xts_setkey()
59 /* tweak cipher, uses Key2 i.e. the second half of *key */ in xts_setkey()
60 tweak = ctx->tweak; in xts_setkey()
61 crypto_cipher_clear_flags(tweak, CRYPTO_TFM_REQ_MASK); in xts_setkey()
62 crypto_cipher_set_flags(tweak, crypto_skcipher_get_flags(parent) & in xts_setkey()
64 err = crypto_cipher_setkey(tweak, key + keylen, keylen); in xts_setkey()
77 * We compute the tweak masks twice (both before and after the ECB encryption or
256 crypto_cipher_encrypt_one(ctx->tweak, (u8 *)&rctx->t, req->iv); in xts_init_crypt()
[all …]
H A Dhctr2.c31 * tweak length for HCTR2 is 16, since that fits into one POLYVAL block for
101 * contains the tweak length and a flag that indicates whether the input is evenly
102 * divisible into blocks. Since this implementation only supports one tweak
187 // Store the hashed tweak, since we need it when computing both in hctr2_hash_tweak()
H A Dadiantum.c27 * formally defined to take two inputs (tweak, message) which makes it difficult
58 * tweak length for Adiantum is 16, since that fits into one Poly1305 block for
97 * (bulk length, tweak)
208 * Apply the Poly1305 ε-∆U hash function to (bulk length, tweak) and save the
217 * give the overall Adiantum hash of the (tweak, left-hand part) pair.
H A Dlrw.c74 const u8 *tweak = key + keylen - bsize; in lrw_setkey() local
89 ctx->table = gf128mul_init_64k_bbe((be128 *)tweak); in lrw_setkey()
135 * We compute the tweak masks twice (both before and after the ECB encryption or
/linux/arch/x86/crypto/
H A Daes-xts-avx-x86_64.S65 // tweak each time a 1 is carried out of the high 64 bits.
68 // exists when there's a carry out of the low 64 bits of the tweak.
91 .set TWEAK, %r8 // Pointer to next tweak define
153 // V6-V9 hold XTS tweaks. Each 128-bit lane holds one tweak.
161 // V10-V13 are used for computing the next values of TWEAK[0-3].
256 // Given a 128-bit XTS tweak in the xmm register \src, compute the next tweak
266 // Given the XTS tweak(s) in the vector \src, compute the next vector of
267 // tweak(s) (by multiplying by the polynomial 'x^(VL/16)') and write it to \dst.
271 // computation without vpclmulqdq, as it's the faster method for a single tweak.
284 // Given the first XTS tweak at (TWEAK), compute the first set of tweaks and
[all …]
H A Daesni-intel_glue.c501 /* second half of xts-key is for tweak */ in xts_setkey_aesni()
509 u8 tweak[AES_BLOCK_SIZE]);
628 u8 tweak[AES_BLOCK_SIZE]) in aesni_xts_encrypt()
630 aesni_xts_enc(key, dst, src, len, tweak); in aesni_xts_encrypt()
635 u8 tweak[AES_BLOCK_SIZE]) in aesni_xts_decrypt()
637 aesni_xts_dec(key, dst, src, len, tweak); in aesni_xts_decrypt()
793 u8 *dst, unsigned int len, u8 tweak[AES_BLOCK_SIZE]); \
796 u8 *dst, unsigned int len, u8 tweak[AES_BLOCK_SIZE]); \
/linux/arch/riscv/crypto/
H A Daes-riscv64-zvkned-zvbb-zvkg.S85 // instruction which does multiplication in this field. Therefore, for tweak
91 // Load the first tweak T.
95 // If there's only one block (or no blocks at all), then skip the tweak
160 // the multiplier required to advance the tweak by one.
199 // Since we compute the tweak multipliers x^N in advance, we require
213 // Compute the next tweak.
216 vslidedown.vx TWEAKS_BREV, TWEAKS_BREV, t0 // Extract last tweak
218 vgmul.vv TWEAKS_BREV, MULTS_BREV // Advance to next tweak
222 // Update *TWEAKP to contain the next tweak.
230 // TWEAKS_BREV now contains the next tweak. Compute the one after that.
[all …]
H A Daes-riscv64-glue.c56 u8 tweak[AES_BLOCK_SIZE]);
61 u8 tweak[AES_BLOCK_SIZE]);
368 /* Encrypt the IV with the tweak key to get the first tweak. */ in riscv64_aes_xts_crypt()
/linux/drivers/mtd/nand/
H A Decc.c529 struct nand_page_io_req *orig, *tweak; in nand_ecc_tweak_req() local
536 tweak = req; in nand_ecc_tweak_req()
541 tweak->dataoffs = 0; in nand_ecc_tweak_req()
542 tweak->datalen = nanddev_page_size(nand); in nand_ecc_tweak_req()
543 tweak->databuf.in = ctx->spare_databuf; in nand_ecc_tweak_req()
544 memset(tweak->databuf.in, 0xFF, ctx->page_buffer_size); in nand_ecc_tweak_req()
549 tweak->ooboffs = 0; in nand_ecc_tweak_req()
550 tweak->ooblen = nanddev_per_page_oobsize(nand); in nand_ecc_tweak_req()
551 tweak->oobbuf.in = ctx->spare_oobbuf; in nand_ecc_tweak_req()
552 memset(tweak->oobbuf.in, 0xFF, ctx->oob_buffer_size); in nand_ecc_tweak_req()
[all …]
/linux/Documentation/devicetree/bindings/net/
H A Dqcom,qca807x.yaml81 and qcom,dac-disable-bias-current-tweak disabled,
93 qcom,dac-disable-bias-current-tweak disabled.
96 qcom,dac-disable-bias-current-tweak:
98 Set Analog MDI driver bias current to disable tweak
101 With this not defined, bias current tweak are enabled
104 With this enabled the following tweak are NOT applied:
/linux/sound/core/
H A Dpcm_iec958.c25 * Drivers may wish to tweak the contents of the buffer after creation.
128 * Drivers may wish to tweak the contents of the buffer after its been
151 * Drivers may wish to tweak the contents of the buffer after its been
172 * Drivers may wish to tweak the contents of the buffer after creation.
198 * Drivers may wish to tweak the contents of the buffer after creation.
/linux/Documentation/dev-tools/
H A Dclang-format.rst26 it is possible that you may want to tweak the defaults for a particular
94 Remember that you can always tweak the changes afterwards in those cases
108 so that you can tweak a few options. See clangformatextra_.
/linux/drivers/crypto/intel/qat/qat_common/
H A Dqat_algs.c92 struct crypto_cipher *tweak; member
430 * to the HW, the second key is used for tweak calculation in qat_alg_skcipher_init_com()
994 ret = crypto_cipher_setkey(ctx->tweak, key + (keylen / 2), in qat_alg_skcipher_xts_setkey()
1010 crypto_cipher_encrypt_one(ctx->tweak, in qat_alg_set_req_iv()
1222 ctx->tweak = crypto_alloc_cipher("aes", 0, 0); in qat_alg_skcipher_init_xts_tfm()
1223 if (IS_ERR(ctx->tweak)) { in qat_alg_skcipher_init_xts_tfm()
1225 return PTR_ERR(ctx->tweak); in qat_alg_skcipher_init_xts_tfm()
1270 if (ctx->tweak) in qat_alg_skcipher_exit_xts_tfm()
1271 crypto_free_cipher(ctx->tweak); in qat_alg_skcipher_exit_xts_tfm()
/linux/arch/s390/kvm/
H A Dpv.c629 static int unpack_one(struct kvm *kvm, unsigned long addr, u64 tweak, in unpack_one() argument
637 .tweak[0] = tweak, in unpack_one()
638 .tweak[1] = offset, in unpack_one()
652 unsigned long tweak, u16 *rc, u16 *rrc) in kvm_s390_pv_unpack() argument
664 ret = unpack_one(kvm, addr, tweak, offset, rc, rrc); in kvm_s390_pv_unpack()
729 * Stores buff_len bytes of tweak component values to buff_user
/linux/arch/arc/plat-hsdk/
H A Dplatform.c120 pr_err("failed to tweak %s to %scoherent\n", path, coherent ? "" : "non"); in hsdk_tweak_node_coherency()
195 * Don't tweak memory bridge configuration if we failed to tweak DTB in hsdk_init_memory_bridge_axi_dmac()
/linux/Documentation/devicetree/bindings/sound/
H A Dcirrus,cs42l42.yaml146 For different hardware setups, a designer might want to tweak this.
184 to tweak default behavior.
/linux/arch/arm64/crypto/
H A Dsm4-ce-core.S525 * x3: tweak (big endian, 128 bit)
535 /* Generate first tweak */
679 /* store new tweak */
692 * x3: tweak (big endian, 128 bit)
702 /* Generate first tweak */
846 /* store new tweak */
/linux/drivers/usb/usbip/
H A Dstub_rx.c184 /* tweak clear_halt */ in tweak_special_requests()
188 /* tweak set_interface */ in tweak_special_requests()
192 /* tweak set_configuration */ in tweak_special_requests()
198 usbip_dbg_stub_rx("no need to tweak\n"); in tweak_special_requests()
/linux/drivers/net/
H A Dloopback.c18 * Larry McVoy : Tiny tweak to double performance
19 * Alan Cox : Backed out LMV's tweak - the linux mm
/linux/include/crypto/
H A Dxts.h29 * Ensure that the AES and tweak key are not identical when in xts_verify_key()
/linux/arch/arm/include/uapi/asm/
H A Dtypes.h16 * supplied by GCC, we can tweak these to align with the kernel's idea of those
/linux/include/linux/mtd/
H A Dnand-ecc-sw-bch.h16 * @req_ctx: Save request context and tweak the original request to fit the

12345678