/linux-master/arch/x86/crypto/ |
H A D | aria-avx.h | 22 u8 *keystream, u8 *iv); 29 u8 *keystream, u8 *iv); 37 u8 *keystream, u8 *iv); 44 u8 *keystream, u8 *iv); 50 u8 *keystream, u8 *iv); 54 u8 *keystream, u8 *iv); 58 u8 *keystream, u8 *iv);
|
H A D | aria_aesni_avx2_glue.c | 27 u8 *keystream, u8 *iv); 38 u8 *keystream, u8 *iv); 45 u8 keystream[ARIA_AESNI_AVX2_PARALLEL_BLOCK_SIZE]; member in struct:aria_avx2_request_ctx 106 &req_ctx->keystream[0], 117 &req_ctx->keystream[0], 126 memcpy(&req_ctx->keystream[0], walk.iv, ARIA_BLOCK_SIZE); 129 aria_encrypt(ctx, &req_ctx->keystream[0], 130 &req_ctx->keystream[0]); 132 crypto_xor_cpy(dst, src, &req_ctx->keystream[0], 140 memcpy(&req_ctx->keystream[ [all...] |
H A D | aria_gfni_avx512_glue.c | 25 u8 *keystream, u8 *iv); 30 u8 keystream[ARIA_GFNI_AVX512_PARALLEL_BLOCK_SIZE]; member in struct:aria_avx512_request_ctx 93 &req_ctx->keystream[0], 104 &req_ctx->keystream[0], 115 &req_ctx->keystream[0], 124 memcpy(&req_ctx->keystream[0], walk.iv, 128 aria_encrypt(ctx, &req_ctx->keystream[0], 129 &req_ctx->keystream[0]); 131 crypto_xor_cpy(dst, src, &req_ctx->keystream[0], 139 memcpy(&req_ctx->keystream[ [all...] |
H A D | aria_aesni_avx_glue.c | 27 u8 *keystream, u8 *iv); 38 u8 *keystream, u8 *iv); 45 u8 keystream[ARIA_AESNI_PARALLEL_BLOCK_SIZE]; member in struct:aria_avx_request_ctx 104 &req_ctx->keystream[0], 113 memcpy(&req_ctx->keystream[0], walk.iv, ARIA_BLOCK_SIZE); 116 aria_encrypt(ctx, &req_ctx->keystream[0], 117 &req_ctx->keystream[0]); 119 crypto_xor_cpy(dst, src, &req_ctx->keystream[0], 127 memcpy(&req_ctx->keystream[0], walk.iv, 131 aria_encrypt(ctx, &req_ctx->keystream[ [all...] |
H A D | sm4_aesni_avx_glue.c | 149 u8 keystream[SM4_BLOCK_SIZE * 8]; local 154 sm4_aesni_avx_crypt8(ctx->rkey_dec, keystream, 163 &keystream[i * SM4_BLOCK_SIZE], 168 crypto_xor_cpy(dst, walk.iv, keystream, SM4_BLOCK_SIZE); 214 u8 keystream[SM4_BLOCK_SIZE * 8]; local 219 memcpy(&keystream[i * SM4_BLOCK_SIZE], 223 sm4_aesni_avx_crypt8(ctx->rkey_enc, keystream, 224 keystream, nblocks); 226 crypto_xor_cpy(dst, src, keystream, 237 u8 keystream[SM4_BLOCK_SIZ local [all...] |
H A D | aesni-intel_glue.c | 509 u8 keystream[AES_BLOCK_SIZE]; local 526 aesni_enc(ctx, keystream, walk.iv); 529 keystream, nbytes); 558 u8 keystream[AES_BLOCK_SIZE]; local 579 aesni_enc(ctx, keystream, (u8 *)block); 582 - nbytes, keystream, nbytes);
|
/linux-master/crypto/ |
H A D | xctr.c | 12 * generates the keystream using E(CTR + IV) whereas XCTR generates the 13 * keystream using E(CTR ^ IV). This allows implementations to avoid dealing 37 u8 keystream[XCTR_BLOCKSIZE]; local 44 crypto_cipher_encrypt_one(tfm, keystream, walk->iv); 45 crypto_xor_cpy(dst, keystream, src, nbytes); 83 u8 *keystream = PTR_ALIGN(tmp + 0, alignmask + 1); local 88 fn(crypto_cipher_tfm(tfm), keystream, walk->iv); local 89 crypto_xor(data, keystream, XCTR_BLOCKSIZE);
|
H A D | ctr.c | 35 u8 *keystream = PTR_ALIGN(tmp + 0, alignmask + 1); local 40 crypto_cipher_encrypt_one(tfm, keystream, ctrblk); 41 crypto_xor_cpy(dst, keystream, src, nbytes); 58 /* create keystream */ 83 u8 *keystream = PTR_ALIGN(tmp + 0, alignmask + 1); local 86 /* create keystream */ 87 fn(crypto_cipher_tfm(tfm), keystream, ctrblk); local 88 crypto_xor(src, keystream, bsize);
|
/linux-master/arch/powerpc/crypto/ |
H A D | aes_ctr.c | 73 u8 keystream[AES_BLOCK_SIZE]; local 81 aes_p8_encrypt(ctrblk, keystream, &ctx->enc_key); 86 crypto_xor_cpy(dst, keystream, src, nbytes);
|
/linux-master/drivers/net/ethernet/microchip/vcap/ |
H A D | vcap_api_debugfs_kunit.c | 96 memset(admin->cache.keystream, 0, test_cache_erase_count); 121 keystr = &admin->cache.keystream[start]; 162 keystr = &admin->cache.keystream[start]; 308 .keystream = keydata, 325 admin.cache.keystream = &keydata[idx]; 333 admin.cache.keystream = &keydata[idx]; 355 .keystream = keydata, 504 .keystream = keydata,
|
H A D | vcap_api_private.h | 115 u32 *keystream, u32 *mskstream, bool mask,
|
H A D | vcap_api.h | 129 u32 *keystream; member in struct:vcap_cache_data
|
H A D | vcap_api_kunit.c | 87 memset(admin->cache.keystream, 0, test_cache_erase_count); 112 keystr = &admin->cache.keystream[start]; 153 keystr = &admin->cache.keystream[start]; 584 .keystream = keywords, 645 .keystream = keywords, 830 .keystream = keywords, 1346 .keystream = keydata, 1585 .keystream = keydata, 1623 .keystream = keydata, 1686 .keystream [all...] |
H A D | vcap_api.c | 220 u32 *keystream, 265 vcap_decode_field(keystream, &iter, typefld->width, (u8 *)&value); 335 u32 *keystream, 343 sw_count = vcap_find_keystream_typegroup_sw(vctrl, vt, keystream, mask, 353 if (vcap_verify_keystream_keyset(vctrl, vt, keystream, 383 key |= ~admin->cache.keystream[idx]; 389 return vcap_find_keystream_keysets(vctrl, vt, admin->cache.keystream, 494 vcap_encode_field(cache->keystream, &iter, rf->width, value); 509 vcap_encode_typegroups(cache->keystream, sw_width, tgt, false); 1487 u32 *keystream; local 218 vcap_verify_keystream_keyset(struct vcap_control *vctrl, enum vcap_type vt, u32 *keystream, u32 *mskstream, enum vcap_keyfield_set keyset) argument 333 vcap_find_keystream_keysets(struct vcap_control *vctrl, enum vcap_type vt, u32 *keystream, u32 *mskstream, bool mask, int sw_max, struct vcap_keyset_list *kslist) argument [all...] |
H A D | vcap_api_debugfs.c | 174 admin->cache.keystream,
|
/linux-master/arch/arm64/crypto/ |
H A D | sm4-neon-glue.c | 174 u8 keystream[SM4_BLOCK_SIZE]; local 176 sm4_crypt_block(ctx->rkey_enc, keystream, walk.iv); 178 crypto_xor_cpy(dst, src, keystream, nbytes);
|
H A D | sm4-ce-glue.c | 305 u8 keystream[SM4_BLOCK_SIZE]; local 307 sm4_ce_crypt_block(ctx->rkey_enc, keystream, walk.iv); 309 crypto_xor_cpy(dst, src, keystream, nbytes);
|
/linux-master/drivers/net/ethernet/microchip/sparx5/ |
H A D | sparx5_vcap_impl.c | 912 memset(admin->cache.keystream, 0, STREAMSIZE); 927 keystr = &admin->cache.keystream[start]; 968 keystr = &admin->cache.keystream[start]; 1028 keystr = &admin->cache.keystream[start]; 1069 keystr = &admin->cache.keystream[start]; 1140 keystr = &admin->cache.keystream[start]; 1175 keystr = &admin->cache.keystream[start]; 1230 keystr = &admin->cache.keystream[start]; 1265 keystr = &admin->cache.keystream[start]; 1945 kfree(admin->cache.keystream); [all...] |
/linux-master/drivers/net/ethernet/microchip/lan966x/ |
H A D | lan966x_vcap_impl.c | 390 memset(admin->cache.keystream, 0, STREAMSIZE); 440 keystr = &admin->cache.keystream[start]; 482 keystr = &admin->cache.keystream[start]; 601 kfree(admin->cache.keystream); 635 admin->cache.keystream = kzalloc(STREAMSIZE, GFP_KERNEL); 638 if (!admin->cache.keystream ||
|
/linux-master/arch/sparc/crypto/ |
H A D | aes_glue.c | 323 u64 keystream[AES_BLOCK_SIZE / sizeof(u64)]; local 329 keystream, AES_BLOCK_SIZE); 330 crypto_xor_cpy(dst, (u8 *) keystream, src, nbytes);
|