/linux/arch/powerpc/crypto/ |
H A D | aesp8-ppc.pl | 1961 # If $key2 is NULL, then a "tweak chaining" mode is engaged, in which # 1962 # input tweak value is assumed to be encrypted already, and last tweak # 1964 # written back to original buffer. In addition, in "tweak chaining" # 1970 my ($tweak,$seven,$eighty7,$tmp,$tweak1) = map("v$_",(8..12)); 1993 lvx $tweak,0,$ivp # load [unaligned] iv 1997 vperm $tweak,$tweak,$inptail,$inpperm 2018 vxor $tweak,$tweak,$rndkey0 2025 vcipher $tweak,$tweak,$rndkey1 2029 vcipher $tweak,$tweak,$rndkey0 2035 vcipher $tweak,$tweak,$rndkey1 [all …]
|
H A D | aes_xts.c | 84 u8 tweak[AES_BLOCK_SIZE]; in p8_aes_xts_crypt() local 107 aes_p8_encrypt(walk.iv, tweak, &ctx->tweak_key); in p8_aes_xts_crypt() 121 &ctx->enc_key, NULL, tweak); in p8_aes_xts_crypt() 126 &ctx->dec_key, NULL, tweak); in p8_aes_xts_crypt()
|
H A D | aes-spe-regs.h | 15 #define rKT r9 /* pointer to tweak key (XTS mode) */ 34 #define rG0 r28 /* endian reversed tweak (XTS mode) */
|
/linux/crypto/ |
H A D | xts.c | 26 struct crypto_cipher *tweak; member 46 struct crypto_cipher *tweak; in xts_setkey() local 55 /* we need two cipher instances: one to compute the initial 'tweak' in xts_setkey() 59 /* tweak cipher, uses Key2 i.e. the second half of *key */ in xts_setkey() 60 tweak = ctx->tweak; in xts_setkey() 61 crypto_cipher_clear_flags(tweak, CRYPTO_TFM_REQ_MASK); in xts_setkey() 62 crypto_cipher_set_flags(tweak, crypto_skcipher_get_flags(parent) & in xts_setkey() 64 err = crypto_cipher_setkey(tweak, key + keylen, keylen); in xts_setkey() 77 * We compute the tweak masks twice (both before and after the ECB encryption or 256 crypto_cipher_encrypt_one(ctx->tweak, (u8 *)&rctx->t, req->iv); in xts_init_crypt() [all …]
|
H A D | hctr2.c | 31 * tweak length for HCTR2 is 16, since that fits into one POLYVAL block for 101 * contains the tweak length and a flag that indicates whether the input is evenly 102 * divisible into blocks. Since this implementation only supports one tweak 187 // Store the hashed tweak, since we need it when computing both in hctr2_hash_tweak()
|
H A D | adiantum.c | 27 * formally defined to take two inputs (tweak, message) which makes it difficult 58 * tweak length for Adiantum is 16, since that fits into one Poly1305 block for 97 * (bulk length, tweak) 208 * Apply the Poly1305 ε-∆U hash function to (bulk length, tweak) and save the 217 * give the overall Adiantum hash of the (tweak, left-hand part) pair.
|
H A D | lrw.c | 74 const u8 *tweak = key + keylen - bsize; in lrw_setkey() local 89 ctx->table = gf128mul_init_64k_bbe((be128 *)tweak); in lrw_setkey() 135 * We compute the tweak masks twice (both before and after the ECB encryption or
|
/linux/arch/x86/crypto/ |
H A D | aes-xts-avx-x86_64.S | 65 // tweak each time a 1 is carried out of the high 64 bits. 68 // exists when there's a carry out of the low 64 bits of the tweak. 91 .set TWEAK, %r8 // Pointer to next tweak define 153 // V6-V9 hold XTS tweaks. Each 128-bit lane holds one tweak. 161 // V10-V13 are used for computing the next values of TWEAK[0-3]. 256 // Given a 128-bit XTS tweak in the xmm register \src, compute the next tweak 266 // Given the XTS tweak(s) in the vector \src, compute the next vector of 267 // tweak(s) (by multiplying by the polynomial 'x^(VL/16)') and write it to \dst. 271 // computation without vpclmulqdq, as it's the faster method for a single tweak. 284 // Given the first XTS tweak at (TWEAK), compute the first set of tweaks and [all …]
|
H A D | aesni-intel_glue.c | 501 /* second half of xts-key is for tweak */ in xts_setkey_aesni() 509 u8 tweak[AES_BLOCK_SIZE]); 628 u8 tweak[AES_BLOCK_SIZE]) in aesni_xts_encrypt() 630 aesni_xts_enc(key, dst, src, len, tweak); in aesni_xts_encrypt() 635 u8 tweak[AES_BLOCK_SIZE]) in aesni_xts_decrypt() 637 aesni_xts_dec(key, dst, src, len, tweak); in aesni_xts_decrypt() 793 u8 *dst, unsigned int len, u8 tweak[AES_BLOCK_SIZE]); \ 796 u8 *dst, unsigned int len, u8 tweak[AES_BLOCK_SIZE]); \
|
/linux/arch/riscv/crypto/ |
H A D | aes-riscv64-zvkned-zvbb-zvkg.S | 85 // instruction which does multiplication in this field. Therefore, for tweak 91 // Load the first tweak T. 95 // If there's only one block (or no blocks at all), then skip the tweak 160 // the multiplier required to advance the tweak by one. 199 // Since we compute the tweak multipliers x^N in advance, we require 213 // Compute the next tweak. 216 vslidedown.vx TWEAKS_BREV, TWEAKS_BREV, t0 // Extract last tweak 218 vgmul.vv TWEAKS_BREV, MULTS_BREV // Advance to next tweak 222 // Update *TWEAKP to contain the next tweak. 230 // TWEAKS_BREV now contains the next tweak. Compute the one after that. [all …]
|
H A D | aes-riscv64-glue.c | 56 u8 tweak[AES_BLOCK_SIZE]); 61 u8 tweak[AES_BLOCK_SIZE]); 368 /* Encrypt the IV with the tweak key to get the first tweak. */ in riscv64_aes_xts_crypt()
|
/linux/drivers/mtd/nand/ |
H A D | ecc.c | 529 struct nand_page_io_req *orig, *tweak; in nand_ecc_tweak_req() local 536 tweak = req; in nand_ecc_tweak_req() 541 tweak->dataoffs = 0; in nand_ecc_tweak_req() 542 tweak->datalen = nanddev_page_size(nand); in nand_ecc_tweak_req() 543 tweak->databuf.in = ctx->spare_databuf; in nand_ecc_tweak_req() 544 memset(tweak->databuf.in, 0xFF, ctx->page_buffer_size); in nand_ecc_tweak_req() 549 tweak->ooboffs = 0; in nand_ecc_tweak_req() 550 tweak->ooblen = nanddev_per_page_oobsize(nand); in nand_ecc_tweak_req() 551 tweak->oobbuf.in = ctx->spare_oobbuf; in nand_ecc_tweak_req() 552 memset(tweak->oobbuf.in, 0xFF, ctx->oob_buffer_size); in nand_ecc_tweak_req() [all …]
|
/linux/Documentation/devicetree/bindings/net/ |
H A D | qcom,qca807x.yaml | 81 and qcom,dac-disable-bias-current-tweak disabled, 93 qcom,dac-disable-bias-current-tweak disabled. 96 qcom,dac-disable-bias-current-tweak: 98 Set Analog MDI driver bias current to disable tweak 101 With this not defined, bias current tweak are enabled 104 With this enabled the following tweak are NOT applied:
|
/linux/sound/core/ |
H A D | pcm_iec958.c | 25 * Drivers may wish to tweak the contents of the buffer after creation. 128 * Drivers may wish to tweak the contents of the buffer after its been 151 * Drivers may wish to tweak the contents of the buffer after its been 172 * Drivers may wish to tweak the contents of the buffer after creation. 198 * Drivers may wish to tweak the contents of the buffer after creation.
|
/linux/Documentation/dev-tools/ |
H A D | clang-format.rst | 26 it is possible that you may want to tweak the defaults for a particular 94 Remember that you can always tweak the changes afterwards in those cases 108 so that you can tweak a few options. See clangformatextra_.
|
/linux/drivers/crypto/intel/qat/qat_common/ |
H A D | qat_algs.c | 92 struct crypto_cipher *tweak; member 430 * to the HW, the second key is used for tweak calculation in qat_alg_skcipher_init_com() 994 ret = crypto_cipher_setkey(ctx->tweak, key + (keylen / 2), in qat_alg_skcipher_xts_setkey() 1010 crypto_cipher_encrypt_one(ctx->tweak, in qat_alg_set_req_iv() 1222 ctx->tweak = crypto_alloc_cipher("aes", 0, 0); in qat_alg_skcipher_init_xts_tfm() 1223 if (IS_ERR(ctx->tweak)) { in qat_alg_skcipher_init_xts_tfm() 1225 return PTR_ERR(ctx->tweak); in qat_alg_skcipher_init_xts_tfm() 1270 if (ctx->tweak) in qat_alg_skcipher_exit_xts_tfm() 1271 crypto_free_cipher(ctx->tweak); in qat_alg_skcipher_exit_xts_tfm()
|
/linux/arch/s390/kvm/ |
H A D | pv.c | 629 static int unpack_one(struct kvm *kvm, unsigned long addr, u64 tweak, in unpack_one() argument 637 .tweak[0] = tweak, in unpack_one() 638 .tweak[1] = offset, in unpack_one() 652 unsigned long tweak, u16 *rc, u16 *rrc) in kvm_s390_pv_unpack() argument 664 ret = unpack_one(kvm, addr, tweak, offset, rc, rrc); in kvm_s390_pv_unpack() 729 * Stores buff_len bytes of tweak component values to buff_user
|
/linux/arch/arc/plat-hsdk/ |
H A D | platform.c | 120 pr_err("failed to tweak %s to %scoherent\n", path, coherent ? "" : "non"); in hsdk_tweak_node_coherency() 195 * Don't tweak memory bridge configuration if we failed to tweak DTB in hsdk_init_memory_bridge_axi_dmac()
|
/linux/Documentation/devicetree/bindings/sound/ |
H A D | cirrus,cs42l42.yaml | 146 For different hardware setups, a designer might want to tweak this. 184 to tweak default behavior.
|
/linux/arch/arm64/crypto/ |
H A D | sm4-ce-core.S | 525 * x3: tweak (big endian, 128 bit) 535 /* Generate first tweak */ 679 /* store new tweak */ 692 * x3: tweak (big endian, 128 bit) 702 /* Generate first tweak */ 846 /* store new tweak */
|
/linux/drivers/usb/usbip/ |
H A D | stub_rx.c | 184 /* tweak clear_halt */ in tweak_special_requests() 188 /* tweak set_interface */ in tweak_special_requests() 192 /* tweak set_configuration */ in tweak_special_requests() 198 usbip_dbg_stub_rx("no need to tweak\n"); in tweak_special_requests()
|
/linux/drivers/net/ |
H A D | loopback.c | 18 * Larry McVoy : Tiny tweak to double performance 19 * Alan Cox : Backed out LMV's tweak - the linux mm
|
/linux/include/crypto/ |
H A D | xts.h | 29 * Ensure that the AES and tweak key are not identical when in xts_verify_key()
|
/linux/arch/arm/include/uapi/asm/ |
H A D | types.h | 16 * supplied by GCC, we can tweak these to align with the kernel's idea of those
|
/linux/include/linux/mtd/ |
H A D | nand-ecc-sw-bch.h | 16 * @req_ctx: Save request context and tweak the original request to fit the
|