/openbmc/linux/arch/arm64/crypto/ |
H A D | aes-ce.S | 28 .macro load_round_keys, rounds, rk 29 cmp \rounds, #12 40 .macro enc_prepare, rounds, rk, temp 42 load_round_keys \rounds, \temp 46 .macro enc_switch_key, rounds, rk, temp 48 load_round_keys \rounds, \temp 52 .macro dec_prepare, rounds, rk, temp 54 load_round_keys \rounds, \temp 113 cmp \rounds, #12 127 do_block_Nx e, \rounds, \in [all …]
|
H A D | aes-neonbs-glue.c | 29 int rounds, int blocks); 31 int rounds, int blocks); 34 int rounds, int blocks, u8 iv[]); 37 int rounds, int blocks, u8 iv[]); 46 int rounds, int blocks); 60 int rounds; member 85 ctx->rounds = 6 + key_len / 4; in aesbs_setkey() 96 int rounds, int blocks)) in __ecb_crypt() argument 114 ctx->rounds, blocks); in __ecb_crypt() 144 ctx->key.rounds = 6 + key_len / 4; in aesbs_cbc_ctr_setkey() [all …]
|
H A D | aes-cipher-glue.c | 12 asmlinkage void __aes_arm64_encrypt(u32 *rk, u8 *out, const u8 *in, int rounds); 13 asmlinkage void __aes_arm64_decrypt(u32 *rk, u8 *out, const u8 *in, int rounds); 18 int rounds = 6 + ctx->key_length / 4; in aes_arm64_encrypt() local 20 __aes_arm64_encrypt(ctx->key_enc, out, in, rounds); in aes_arm64_encrypt() 26 int rounds = 6 + ctx->key_length / 4; in aes_arm64_decrypt() local 28 __aes_arm64_decrypt(ctx->key_dec, out, in, rounds); in aes_arm64_decrypt()
|
H A D | aes-glue.c | 78 int rounds, int blocks); 80 int rounds, int blocks); 83 int rounds, int blocks, u8 iv[]); 85 int rounds, int blocks, u8 iv[]); 93 int rounds, int bytes, u8 ctr[]); 192 ctx->key_enc, rounds, blocks); in ecb_encrypt() 212 ctx->key_dec, rounds, blocks); in ecb_decrypt() 584 ctx->key1.key_enc, rounds, nbytes, in xts_encrypt() 822 int rounds = 6 + key_len / 4; in cmac_setkey() local 832 rounds, 1); in cmac_setkey() [all …]
|
H A D | aes-neon.S | 98 .macro do_block, enc, in, rounds, rk, rkp, i 101 mov \i, \rounds 114 .macro encrypt_block, in, rounds, rk, rkp, i 115 do_block 1, \in, \rounds, \rk, \rkp, \i 118 .macro decrypt_block, in, rounds, rk, rkp, i 119 do_block 0, \in, \rounds, \rk, \rkp, \i 208 mov \i, \rounds 231 .macro encrypt_block4x, in0, in1, in2, in3, rounds, rk, rkp, i 232 do_block_4x 1, \in0, \in1, \in2, \in3, \rounds, \rk, \rkp, \i 235 .macro decrypt_block4x, in0, in1, in2, in3, rounds, rk, rkp, i [all …]
|
H A D | aes-cipher-core.S | 17 rounds .req x3 102 tbnz rounds, #1, 1f 107 1: subs rounds, rounds, #4
|
H A D | aes-ce-ccm-glue.c | 31 u32 macp, u32 const rk[], u32 rounds); 34 u32 const rk[], u32 rounds, u8 mac[], 38 u32 const rk[], u32 rounds, u8 mac[], 42 u32 rounds);
|
/openbmc/linux/arch/powerpc/crypto/ |
H A D | aes-spe-glue.c | 44 u32 rounds; member 51 u32 rounds; member 99 ctx->rounds = 4; in ppc_aes_setkey() 103 ctx->rounds = 5; in ppc_aes_setkey() 107 ctx->rounds = 6; in ppc_aes_setkey() 139 ctx->rounds = 4; in ppc_xts_setkey() 144 ctx->rounds = 5; in ppc_xts_setkey() 149 ctx->rounds = 6; in ppc_xts_setkey() 236 ctx->key_enc, ctx->rounds, nbytes, in ppc_cbc_crypt() 240 ctx->key_dec, ctx->rounds, nbytes, in ppc_cbc_crypt() [all …]
|
H A D | aesp10-ppc.pl | 261 li $rounds,10 335 li $rounds,12 343 li $rounds,14 397 stw $rounds,0($out) 417 slwi $cnt,$rounds,4 419 srwi $rounds,$rounds,1 421 mtctr $rounds 463 lwz $rounds,240($key) 480 srwi $rounds,$rounds,1 483 subi $rounds,$rounds,1 [all …]
|
/openbmc/qemu/tests/tcg/multiarch/ |
H A D | test-aes-main.c.inc | 40 static const Round rounds[] = { 128 int i, n = sizeof(rounds) / sizeof(Round); 132 if (test_SB_SR(t.b, rounds[i].start.b)) { 133 verify(&rounds[i].after_sr, &t, "SB+SR"); 138 if (test_MC(t.b, rounds[i].after_sr.b)) { 139 verify(&rounds[i].after_mc, &t, "MC"); 145 if (test_SB_SR_MC_AK(t.b, rounds[i].start.b, rounds[i].round_key.b)) { 151 if (test_ISB_ISR(t.b, rounds[i].after_sr.b)) { 152 verify(&rounds[i].start, &t, "ISB+ISR"); 157 if (test_IMC(t.b, rounds[i].after_mc.b)) { [all …]
|
/openbmc/linux/arch/arm/crypto/ |
H A D | aes-cipher-glue.c | 13 asmlinkage void __aes_arm_encrypt(u32 *rk, int rounds, const u8 *in, u8 *out); 14 asmlinkage void __aes_arm_decrypt(u32 *rk, int rounds, const u8 *in, u8 *out); 19 int rounds = 6 + ctx->key_length / 4; in aes_arm_encrypt() local 21 __aes_arm_encrypt(ctx->key_enc, rounds, in, out); in aes_arm_encrypt() 27 int rounds = 6 + ctx->key_length / 4; in aes_arm_decrypt() local 29 __aes_arm_decrypt(ctx->key_dec, rounds, in, out); in aes_arm_decrypt()
|
H A D | aes-neonbs-glue.c | 32 int rounds, int blocks); 34 int rounds, int blocks); 37 int rounds, int blocks, u8 iv[]); 40 int rounds, int blocks, u8 ctr[]); 43 int rounds, int blocks, u8 iv[], int); 48 int rounds; member 79 ctx->rounds = 6 + key_len / 4; in aesbs_setkey() 90 int rounds, int blocks)) in __ecb_crypt() argument 108 ctx->rounds, blocks); in __ecb_crypt() 138 ctx->key.rounds = 6 + key_len / 4; in aesbs_cbc_setkey() [all …]
|
H A D | aes-ce-glue.c | 30 int rounds, int blocks); 32 int rounds, int blocks); 35 int rounds, int blocks, u8 iv[]); 37 int rounds, int blocks, u8 iv[]); 39 int rounds, int bytes, u8 const iv[]); 41 int rounds, int bytes, u8 const iv[]); 44 int rounds, int blocks, u8 ctr[]); 47 int rounds, int bytes, u8 iv[], 50 int rounds, int bytes, u8 iv[], 448 int err, first, rounds = num_rounds(&ctx->key1); in xts_encrypt() local [all …]
|
H A D | aes-cipher-core.S | 17 rounds .req r1 146 tst rounds, #2 152 1: subs rounds, rounds, #4 171 pop {rounds} // oldcpsr 172 \round r4, r5, r6, r7, r8, r9, r10, r11, \bsz, b, rounds
|
H A D | ghash-ce-glue.c | 48 int rounds; member 367 const char *iv, int rounds, u32 counter); 371 const char *iv, int rounds, u32 counter); 375 const char *iv, int rounds, u32 counter); 379 const char *iv, int rounds, u32 counter, 397 ctx->rounds = 6 + keylen / 4; in gcm_aes_setkey() 520 ctx->rounds, counter); in gcm_encrypt() 561 ctx->rounds, counter); in gcm_encrypt() 616 ctx->rounds, counter); in gcm_decrypt() 648 ctx->rounds, counter, otag, authsize); in gcm_decrypt()
|
/openbmc/linux/tools/power/cpupower/bench/ |
H A D | benchmark.c | 37 unsigned int rounds = 0; in calculate_timespace() local 53 rounds = (unsigned int)(load * estimated / timed); in calculate_timespace() 54 dprintf("calibrating with %u rounds\n", rounds); in calculate_timespace() 56 ROUNDS(rounds); in calculate_timespace() 60 estimated = rounds; in calculate_timespace() 91 for (_round = 1; _round <= config->rounds; _round++) in start_benchmark() 95 for (_round = 0; _round < config->rounds; _round++) { in start_benchmark()
|
H A D | main.c | 126 sscanf(optarg, "%u", &config->rounds); in main() 174 config->rounds, in main()
|
/openbmc/linux/crypto/ |
H A D | aria_generic.c | 155 ctx->dec_key[0][i] = ctx->enc_key[ctx->rounds][i]; in aria_set_decrypt_key() 156 ctx->dec_key[ctx->rounds][i] = ctx->enc_key[0][i]; in aria_set_decrypt_key() 159 for (i = 1; i < ctx->rounds; i++) { in aria_set_decrypt_key() 160 ctx->dec_key[i][0] = aria_m(ctx->enc_key[ctx->rounds - i][0]); in aria_set_decrypt_key() 161 ctx->dec_key[i][1] = aria_m(ctx->enc_key[ctx->rounds - i][1]); in aria_set_decrypt_key() 162 ctx->dec_key[i][2] = aria_m(ctx->enc_key[ctx->rounds - i][2]); in aria_set_decrypt_key() 183 BUILD_BUG_ON(sizeof(int) != sizeof(ctx->rounds)); in aria_set_key() 186 ctx->rounds = (key_len + 32) / 4; in aria_set_key() 201 int rounds, rkidx = 0; in __aria_crypt() local 203 rounds = ctx->rounds; in __aria_crypt() [all …]
|
/openbmc/linux/drivers/crypto/vmx/ |
H A D | aesp8-ppc.pl | 419 srwi $rounds,$rounds,1 480 srwi $rounds,$rounds,1 483 subi $rounds,$rounds,1 573 srwi $rounds,$rounds,1 575 subi $rounds,$rounds,1 1343 srwi $rounds,$rounds,1 1345 subi $rounds,$rounds,1 2009 srwi $rounds,$rounds,1 2010 subi $rounds,$rounds,1 2053 srwi $rounds,$rounds,1 [all …]
|
/openbmc/linux/arch/sparc/crypto/ |
H A D | sha1_glue.c | 28 unsigned int rounds); 42 const unsigned int rounds = (len - done) / SHA1_BLOCK_SIZE; in __sha1_sparc64_update() local 44 sha1_sparc64_transform(sctx->state, data + done, rounds); in __sha1_sparc64_update() 45 done += rounds * SHA1_BLOCK_SIZE; in __sha1_sparc64_update()
|
H A D | md5_glue.c | 30 unsigned int rounds); 58 const unsigned int rounds = (len - done) / MD5_HMAC_BLOCK_SIZE; in __md5_sparc64_update() local 60 md5_sparc64_transform(sctx->hash, data + done, rounds); in __md5_sparc64_update() 61 done += rounds * MD5_HMAC_BLOCK_SIZE; in __md5_sparc64_update()
|
H A D | sha512_glue.c | 27 unsigned int rounds); 42 const unsigned int rounds = (len - done) / SHA512_BLOCK_SIZE; in __sha512_sparc64_update() local 44 sha512_sparc64_transform(sctx->state, data + done, rounds); in __sha512_sparc64_update() 45 done += rounds * SHA512_BLOCK_SIZE; in __sha512_sparc64_update()
|
H A D | sha256_glue.c | 28 unsigned int rounds); 42 const unsigned int rounds = (len - done) / SHA256_BLOCK_SIZE; in __sha256_sparc64_update() local 44 sha256_sparc64_transform(sctx->state, data + done, rounds); in __sha256_sparc64_update() 45 done += rounds * SHA256_BLOCK_SIZE; in __sha256_sparc64_update()
|
/openbmc/openbmc/meta-ampere/meta-jade/recipes-phosphor/images/ |
H A D | obmc-phosphor-image.bbappend | 3 # by command "openssl passwd -6 -salt rounds=1000\$UGMqyqdG 0penBmc" 4 AMPERE_DEFAULT_OPENBMC_PASSWORD = "'\$6\$rounds=1000\$UGMqyqdG\$uaE7HvA2vYhZYpIslelD1bsZMkXWV7YjL3w…
|
/openbmc/qemu/net/ |
H A D | announce.c | 25 (timer->params.rounds - timer->round - 1) * in qemu_announce_timer_step() 86 timer->round = params->rounds; in qemu_announce_timer_reset() 192 if (params->rounds) { in qemu_announce_self()
|