| /OK3568_Linux_fs/kernel/arch/arm64/crypto/ |
| H A D | aes-ce.S | 28 .macro load_round_keys, rounds, rk 29 cmp \rounds, #12 40 .macro enc_prepare, rounds, rk, temp 42 load_round_keys \rounds, \temp 46 .macro enc_switch_key, rounds, rk, temp 48 load_round_keys \rounds, \temp 52 .macro dec_prepare, rounds, rk, temp 54 load_round_keys \rounds, \temp 76 /* up to 5 interleaved encryption rounds with the same round key */ 85 /* up to 5 interleaved final rounds */ [all …]
|
| H A D | aes-neonbs-glue.c | 26 asmlinkage void aesbs_convert_key(u8 out[], u32 const rk[], int rounds); 29 int rounds, int blocks); 31 int rounds, int blocks); 34 int rounds, int blocks, u8 iv[]); 37 int rounds, int blocks, u8 iv[], u8 final[]); 40 int rounds, int blocks, u8 iv[]); 42 int rounds, int blocks, u8 iv[]); 46 int rounds, int blocks); 48 int rounds, int blocks, u8 iv[]); 50 u32 const rk1[], int rounds, int bytes, [all …]
|
| H A D | aes-glue.c | 75 int rounds, int blocks); 77 int rounds, int blocks); 80 int rounds, int blocks, u8 iv[]); 82 int rounds, int blocks, u8 iv[]); 85 int rounds, int bytes, u8 const iv[]); 87 int rounds, int bytes, u8 const iv[]); 90 int rounds, int blocks, u8 ctr[]); 93 int rounds, int bytes, u32 const rk2[], u8 iv[], 96 int rounds, int bytes, u32 const rk2[], u8 iv[], 100 int rounds, int blocks, u8 iv[], [all …]
|
| H A D | aes-cipher-glue.c | 12 asmlinkage void __aes_arm64_encrypt(u32 *rk, u8 *out, const u8 *in, int rounds); 13 asmlinkage void __aes_arm64_decrypt(u32 *rk, u8 *out, const u8 *in, int rounds); 18 int rounds = 6 + ctx->key_length / 4; in aes_arm64_encrypt() local 20 __aes_arm64_encrypt(ctx->key_enc, out, in, rounds); in aes_arm64_encrypt() 26 int rounds = 6 + ctx->key_length / 4; in aes_arm64_decrypt() local 28 __aes_arm64_decrypt(ctx->key_dec, out, in, rounds); in aes_arm64_decrypt()
|
| H A D | aes-neon.S | 98 .macro do_block, enc, in, rounds, rk, rkp, i 101 mov \i, \rounds 114 .macro encrypt_block, in, rounds, rk, rkp, i 115 do_block 1, \in, \rounds, \rk, \rkp, \i 118 .macro decrypt_block, in, rounds, rk, rkp, i 119 do_block 0, \in, \rounds, \rk, \rkp, \i 205 .macro do_block_4x, enc, in0, in1, in2, in3, rounds, rk, rkp, i 208 mov \i, \rounds 231 .macro encrypt_block4x, in0, in1, in2, in3, rounds, rk, rkp, i 232 do_block_4x 1, \in0, \in1, \in2, \in3, \rounds, \rk, \rkp, \i [all …]
|
| H A D | aes-ce-glue.c | 27 asmlinkage void __aes_ce_encrypt(u32 *rk, u8 *out, const u8 *in, int rounds); 28 asmlinkage void __aes_ce_decrypt(u32 *rk, u8 *out, const u8 *in, int rounds); 37 * # of rounds specified by AES: in num_rounds() 38 * 128 bit key 10 rounds in num_rounds() 39 * 192 bit key 12 rounds in num_rounds() 40 * 256 bit key 14 rounds in num_rounds() 41 * => n byte key => 6 + (n/4) rounds in num_rounds()
|
| H A D | aes-ce-ccm-glue.c | 23 * # of rounds specified by AES: in num_rounds() 24 * 128 bit key 10 rounds in num_rounds() 25 * 192 bit key 12 rounds in num_rounds() 26 * 256 bit key 14 rounds in num_rounds() 27 * => n byte key => 6 + (n/4) rounds in num_rounds() 33 u32 *macp, u32 const rk[], u32 rounds); 36 u32 const rk[], u32 rounds, u8 mac[], 40 u32 const rk[], u32 rounds, u8 mac[], 44 u32 rounds);
|
| H A D | aes-ce-ccm-core.S | 16 * u32 *macp, u8 const rk[], u32 rounds); 36 sub w7, w5, #2 /* modified # of rounds */ 88 * u32 rounds); 94 sub w3, w3, #2 /* modified # of rounds */ 136 sub w7, w4, #2 /* get modified # of rounds */ 146 2: /* inner loop: 3 rounds, 2x interleaved */ 209 * u8 const rk[], u32 rounds, u8 mac[], 212 * u8 const rk[], u32 rounds, u8 mac[],
|
| H A D | aes-modes.S | 48 * aes_ecb_encrypt(u8 out[], u8 const in[], u8 const rk[], int rounds, 50 * aes_ecb_decrypt(u8 out[], u8 const in[], u8 const rk[], int rounds, 117 * aes_cbc_encrypt(u8 out[], u8 const in[], u8 const rk[], int rounds, 119 * aes_cbc_decrypt(u8 out[], u8 const in[], u8 const rk[], int rounds, 122 * int rounds, int blocks, u8 iv[], 125 * int rounds, int blocks, u8 iv[], 132 mov w8, #14 /* AES-256: 14 rounds */ 179 mov w8, #14 /* AES-256: 14 rounds */ 247 * int rounds, int bytes, u8 const iv[]) 249 * int rounds, int bytes, u8 const iv[]) [all …]
|
| /OK3568_Linux_fs/kernel/arch/x86/crypto/ |
| H A D | sha1_ni_asm.S | 87 * The indented lines in the loop are instructions related to rounds processing. 116 /* Save hash values for addition after rounds */ 120 /* Rounds 0-3 */ 127 /* Rounds 4-7 */ 135 /* Rounds 8-11 */ 144 /* Rounds 12-15 */ 154 /* Rounds 16-19 */ 162 /* Rounds 20-23 */ 170 /* Rounds 24-27 */ 178 /* Rounds 28-31 */ [all …]
|
| H A D | sha256_ni_asm.S | 88 * The indented lines in the loop are instructions related to rounds processing. 124 /* Save hash values for addition after rounds */ 128 /* Rounds 0-3 */ 137 /* Rounds 4-7 */ 147 /* Rounds 8-11 */ 157 /* Rounds 12-15 */ 171 /* Rounds 16-19 */ 183 /* Rounds 20-23 */ 195 /* Rounds 24-27 */ 207 /* Rounds 28-31 */ [all …]
|
| H A D | sha1_avx2_x86_64_asm.S | 201 /* message scheduling pre-compute for rounds 0-15 */ 205 * 1 vector iteration per 8 rounds 224 * message scheduling pre-compute for rounds 16-31 229 * "brute force" vectorization for rounds 16-31 only 235 * 1 vector iteration per 8 rounds 277 * 1 vector iteration per 8 rounds 459 * macro implements 80 rounds of SHA-1, for multiple blocks with s/w pipelining 503 * rounds: 0,2,4,6,8 515 * rounds: 532 * rounds [all …]
|
| /OK3568_Linux_fs/kernel/tools/power/cpupower/bench/ |
| H A D | benchmark.c | 24 * compute how many rounds of calculation we should do 29 * @retval rounds of calculation 37 unsigned int rounds = 0; in calculate_timespace() local 43 /* get the initial calculation time for a specific number of rounds */ in calculate_timespace() 45 ROUNDS(estimated); in calculate_timespace() 53 rounds = (unsigned int)(load * estimated / timed); in calculate_timespace() 54 dprintf("calibrating with %u rounds\n", rounds); in calculate_timespace() 56 ROUNDS(rounds); in calculate_timespace() 60 estimated = rounds; in calculate_timespace() 91 for (_round = 1; _round <= config->rounds; _round++) in start_benchmark() [all …]
|
| H A D | main.c | 28 {"rounds", 1, 0, 'r'}, 51 printf(" -r, --rounds<int>\t\t\tload/sleep rounds\n"); in usage() 126 sscanf(optarg, "%u", &config->rounds); in main() 127 dprintf("user rounds -> %s\n", optarg); in main() 166 "rounds=%u\n\t" in main() 174 config->rounds, in main()
|
| /OK3568_Linux_fs/kernel/arch/powerpc/crypto/ |
| H A D | aes-spe-glue.c | 44 u32 rounds; member 51 u32 rounds; member 54 extern void ppc_encrypt_aes(u8 *out, const u8 *in, u32 *key_enc, u32 rounds); 55 extern void ppc_decrypt_aes(u8 *out, const u8 *in, u32 *key_dec, u32 rounds); 56 extern void ppc_encrypt_ecb(u8 *out, const u8 *in, u32 *key_enc, u32 rounds, 58 extern void ppc_decrypt_ecb(u8 *out, const u8 *in, u32 *key_dec, u32 rounds, 60 extern void ppc_encrypt_cbc(u8 *out, const u8 *in, u32 *key_enc, u32 rounds, 62 extern void ppc_decrypt_cbc(u8 *out, const u8 *in, u32 *key_dec, u32 rounds, 64 extern void ppc_crypt_ctr (u8 *out, const u8 *in, u32 *key_enc, u32 rounds, 66 extern void ppc_encrypt_xts(u8 *out, const u8 *in, u32 *key_enc, u32 rounds, [all …]
|
| /OK3568_Linux_fs/kernel/arch/arm/crypto/ |
| H A D | aes-neonbs-glue.c | 29 asmlinkage void aesbs_convert_key(u8 out[], u32 const rk[], int rounds); 32 int rounds, int blocks); 34 int rounds, int blocks); 37 int rounds, int blocks, u8 iv[]); 40 int rounds, int blocks, u8 ctr[], u8 final[]); 43 int rounds, int blocks, u8 iv[], int); 45 int rounds, int blocks, u8 iv[], int); 48 int rounds; member 79 ctx->rounds = 6 + key_len / 4; in aesbs_setkey() 82 aesbs_convert_key(ctx->rk, rk.key_enc, ctx->rounds); in aesbs_setkey() [all …]
|
| H A D | aes-cipher-glue.c | 13 asmlinkage void __aes_arm_encrypt(u32 *rk, int rounds, const u8 *in, u8 *out); 14 asmlinkage void __aes_arm_decrypt(u32 *rk, int rounds, const u8 *in, u8 *out); 19 int rounds = 6 + ctx->key_length / 4; in aes_arm_encrypt() local 21 __aes_arm_encrypt(ctx->key_enc, rounds, in, out); in aes_arm_encrypt() 27 int rounds = 6 + ctx->key_length / 4; in aes_arm_decrypt() local 29 __aes_arm_decrypt(ctx->key_dec, rounds, in, out); in aes_arm_decrypt()
|
| H A D | aes-ce-glue.c | 30 int rounds, int blocks); 32 int rounds, int blocks); 35 int rounds, int blocks, u8 iv[]); 37 int rounds, int blocks, u8 iv[]); 39 int rounds, int bytes, u8 const iv[]); 41 int rounds, int bytes, u8 const iv[]); 44 int rounds, int blocks, u8 ctr[]); 47 int rounds, int bytes, u8 iv[], 50 int rounds, int bytes, u8 iv[], 60 * # of rounds specified by AES: in num_rounds() [all …]
|
| H A D | aes-ce-core.S | 110 blo 0f @ AES-128: 10 rounds 113 beq 1f @ AES-192: 12 rounds 135 * r3 : number of rounds 162 .macro prepare_key, rk, rounds argument 163 add ip, \rk, \rounds, lsl #4 169 * aes_ecb_encrypt(u8 out[], u8 const in[], u32 const rk[], int rounds, 171 * aes_ecb_decrypt(u8 out[], u8 const in[], u32 const rk[], int rounds, 227 * aes_cbc_encrypt(u8 out[], u8 const in[], u32 const rk[], int rounds, 229 * aes_cbc_decrypt(u8 out[], u8 const in[], u32 const rk[], int rounds, 291 * int rounds, int bytes, u8 const iv[]) [all …]
|
| H A D | aes-neonbs-core.S | 24 rounds .req ip 432 * void aesbs_convert_key(u8 out[], u32 const rk[], int rounds) 507 sub rounds, rounds, #1 521 subs rounds, rounds, #1 551 add bskey, bskey, rounds, lsl #7 576 sub rounds, rounds, #1 590 subs rounds, rounds, #1 618 * aesbs_ecb_encrypt(u8 out[], u8 const in[], u8 const rk[], int rounds, 620 * aesbs_ecb_decrypt(u8 out[], u8 const in[], u8 const rk[], int rounds, 643 mov rounds, r3 [all …]
|
| H A D | aes-cipher-core.S | 17 rounds .req r1 168 tst rounds, #2 174 1: subs rounds, rounds, #4 193 pop {rounds} // oldcpsr 194 \round r4, r5, r6, r7, r8, r9, r10, r11, \bsz, b, rounds
|
| /OK3568_Linux_fs/buildroot/package/mkpasswd/ |
| H A D | mkpasswd.c | 70 {"rounds", required_argument, NULL, 'R'}, 87 const unsigned int rounds; /* supports a variable number of rounds */ member 92 /* method prefix minlen, maxlen rounds description */ 140 unsigned int rounds = 0; in main() local 171 rounds_support = methods[i].rounds; in main() 192 rounds = strtol(optarg, &p, 10); in main() 193 if (p == NULL || *p != '\0' || rounds < 0) { in main() 238 if (rounds <= 5) in main() 239 rounds = 5; in main() 240 /* actually for 2a/2y it is the logarithm of the number of rounds */ in main() [all …]
|
| /OK3568_Linux_fs/external/security/librkcrypto/test/ |
| H A D | test_throughput.c | 32 uint32_t rounds; in test_otp_key_item_tp() local 52 rounds = 0; in test_otp_key_item_tp() 81 rounds ++; in test_otp_key_item_tp() 87 test_op_name(operation), (data_len * rounds / (1024 * 1024))); in test_otp_key_item_tp() 91 test_op_name(operation), (data_len * rounds / (1024 * 1024))); in test_otp_key_item_tp() 233 uint32_t rounds; in test_cipher_item_tp() local 249 rounds = 0; in test_cipher_item_tp() 289 rounds ++; in test_cipher_item_tp() 295 test_op_name(operation), (data_len * rounds / (1024 * 1024))); in test_cipher_item_tp() 299 test_op_name(operation), (data_len * rounds / (1024 * 1024))); in test_cipher_item_tp() [all …]
|
| /OK3568_Linux_fs/kernel/drivers/crypto/vmx/ |
| H A D | aesp8-ppc.pl | 120 my ($inp,$bits,$out,$ptr,$cnt,$rounds)=map("r$_",(3..8)); 261 li $rounds,10 335 li $rounds,12 343 li $rounds,14 397 stw $rounds,0($out) 417 slwi $cnt,$rounds,4 419 srwi $rounds,$rounds,1 421 mtctr $rounds 459 my ($inp,$out,$key,$rounds,$idx)=map("r$_",(3..7)); 463 lwz $rounds,240($key) [all …]
|
| /OK3568_Linux_fs/buildroot/package/linux-pam/ |
| H A D | 0002-Remove-support-for-legacy-xcrypt.patch | 109 sp = crypt_gensalt_rn(algoid, rounds, NULL, 0, salt, sizeof(salt)); 115 - sp = crypt_gensalt_r (algoid, rounds, 122 - sp += snprintf(sp, sizeof(salt) - (16 + 1 + (sp - salt)), "rounds=%u$", rounds); 128 + sp += snprintf(sp, sizeof(salt) - (16 + 1 + (sp - salt)), "rounds=%u$", rounds);
|