Home
last modified time | relevance | path

Searched full:rounds (Results 1 – 25 of 190) sorted by relevance

12345678

/linux-6.12.1/arch/arm64/crypto/
Daes-ce.S38 .macro enc_prepare, rounds, rk, temp
39 load_round_keys \rk, \rounds, \temp
43 .macro enc_switch_key, rounds, rk, temp
44 load_round_keys \rk, \rounds, \temp
48 .macro dec_prepare, rounds, rk, temp
49 load_round_keys \rk, \rounds, \temp
71 /* up to 5 interleaved encryption rounds with the same round key */
80 /* up to 5 interleaved final rounds */
107 .macro do_block_Nx, enc, rounds, i0, i1, i2, i3, i4
108 tbz \rounds, #2, .L\@ /* 128 bits */
[all …]
Daes-neonbs-glue.c27 asmlinkage void aesbs_convert_key(u8 out[], u32 const rk[], int rounds);
30 int rounds, int blocks);
32 int rounds, int blocks);
35 int rounds, int blocks, u8 iv[]);
38 int rounds, int blocks, u8 iv[]);
41 int rounds, int blocks, u8 iv[]);
43 int rounds, int blocks, u8 iv[]);
47 int rounds, int blocks);
49 int rounds, int blocks, u8 iv[]);
51 int rounds, int bytes, u8 ctr[]);
[all …]
Daes-glue.c78 int rounds, int blocks);
80 int rounds, int blocks);
83 int rounds, int blocks, u8 iv[]);
85 int rounds, int blocks, u8 iv[]);
88 int rounds, int bytes, u8 const iv[]);
90 int rounds, int bytes, u8 const iv[]);
93 int rounds, int bytes, u8 ctr[]);
96 int rounds, int bytes, u8 ctr[], int byte_ctr);
99 int rounds, int bytes, u32 const rk2[], u8 iv[],
102 int rounds, int bytes, u32 const rk2[], u8 iv[],
[all …]
Daes-cipher-glue.c12 asmlinkage void __aes_arm64_encrypt(u32 *rk, u8 *out, const u8 *in, int rounds);
13 asmlinkage void __aes_arm64_decrypt(u32 *rk, u8 *out, const u8 *in, int rounds);
18 int rounds = 6 + ctx->key_length / 4; in aes_arm64_encrypt() local
20 __aes_arm64_encrypt(ctx->key_enc, out, in, rounds); in aes_arm64_encrypt()
26 int rounds = 6 + ctx->key_length / 4; in aes_arm64_decrypt() local
28 __aes_arm64_decrypt(ctx->key_dec, out, in, rounds); in aes_arm64_decrypt()
Daes-ce-ccm-glue.c26 * # of rounds specified by AES: in num_rounds()
27 * 128 bit key 10 rounds in num_rounds()
28 * 192 bit key 12 rounds in num_rounds()
29 * 256 bit key 14 rounds in num_rounds()
30 * => n byte key => 6 + (n/4) rounds in num_rounds()
35 asmlinkage u32 ce_aes_mac_update(u8 const in[], u32 const rk[], int rounds,
40 u32 const rk[], u32 rounds, u8 mac[],
44 u32 const rk[], u32 rounds, u8 mac[],
101 u32 macp, u32 const rk[], u32 rounds) in ce_aes_ccm_auth_data() argument
109 u32 rem = ce_aes_mac_update(in, rk, rounds, blocks, mac, in ce_aes_ccm_auth_data()
Daes-ce-glue.c27 asmlinkage void __aes_ce_encrypt(u32 *rk, u8 *out, const u8 *in, int rounds);
28 asmlinkage void __aes_ce_decrypt(u32 *rk, u8 *out, const u8 *in, int rounds);
37 * # of rounds specified by AES: in num_rounds()
38 * 128 bit key 10 rounds in num_rounds()
39 * 192 bit key 12 rounds in num_rounds()
40 * 256 bit key 14 rounds in num_rounds()
41 * => n byte key => 6 + (n/4) rounds in num_rounds()
Daes-neon.S98 .macro do_block, enc, in, rounds, rk, rkp, i
101 mov \i, \rounds
114 .macro encrypt_block, in, rounds, rk, rkp, i
115 do_block 1, \in, \rounds, \rk, \rkp, \i
118 .macro decrypt_block, in, rounds, rk, rkp, i
119 do_block 0, \in, \rounds, \rk, \rkp, \i
205 .macro do_block_4x, enc, in0, in1, in2, in3, rounds, rk, rkp, i
208 mov \i, \rounds
231 .macro encrypt_block4x, in0, in1, in2, in3, rounds, rk, rkp, i
232 do_block_4x 1, \in0, \in1, \in2, \in3, \rounds, \rk, \rkp, \i
[all …]
Daes-neonbs-core.S23 rounds .req x11
382 * void aesbs_convert_key(u8 out[], u32 const rk[], int rounds)
456 sub rounds, rounds, #1
464 subs rounds, rounds, #1
496 lsl x9, rounds, #7
522 sub rounds, rounds, #1
530 subs rounds, rounds, #1
560 * aesbs_ecb_encrypt(u8 out[], u8 const in[], u8 const rk[], int rounds,
562 * aesbs_ecb_decrypt(u8 out[], u8 const in[], u8 const rk[], int rounds,
597 mov rounds, x22
[all …]
/linux-6.12.1/tools/power/cpupower/bench/
Dbenchmark.c24 * compute how many rounds of calculation we should do
29 * @retval rounds of calculation
37 unsigned int rounds = 0; in calculate_timespace() local
43 /* get the initial calculation time for a specific number of rounds */ in calculate_timespace()
45 ROUNDS(estimated); in calculate_timespace()
53 rounds = (unsigned int)(load * estimated / timed); in calculate_timespace()
54 dprintf("calibrating with %u rounds\n", rounds); in calculate_timespace()
56 ROUNDS(rounds); in calculate_timespace()
60 estimated = rounds; in calculate_timespace()
91 for (_round = 1; _round <= config->rounds; _round++) in start_benchmark()
[all …]
Dmain.c28 {"rounds", 1, 0, 'r'},
51 printf(" -r, --rounds<int>\t\t\tload/sleep rounds\n"); in usage()
126 sscanf(optarg, "%u", &config->rounds); in main()
127 dprintf("user rounds -> %s\n", optarg); in main()
166 "rounds=%u\n\t" in main()
174 config->rounds, in main()
/linux-6.12.1/arch/x86/crypto/
Dsha1_ni_asm.S86 * The indented lines in the loop are instructions related to rounds processing.
115 /* Save hash values for addition after rounds */
119 /* Rounds 0-3 */
126 /* Rounds 4-7 */
134 /* Rounds 8-11 */
143 /* Rounds 12-15 */
153 /* Rounds 16-19 */
161 /* Rounds 20-23 */
169 /* Rounds 24-27 */
177 /* Rounds 28-31 */
[all …]
Dsha1_avx2_x86_64_asm.S201 /* message scheduling pre-compute for rounds 0-15 */
205 * 1 vector iteration per 8 rounds
224 * message scheduling pre-compute for rounds 16-31
229 * "brute force" vectorization for rounds 16-31 only
235 * 1 vector iteration per 8 rounds
277 * 1 vector iteration per 8 rounds
459 * macro implements 80 rounds of SHA-1, for multiple blocks with s/w pipelining
503 * rounds: 0,2,4,6,8
512 * rounds:
529 * rounds
[all …]
Dsha512-ssse3-asm.S152 # Compute rounds t-2 and t-1
155 # Two rounds are computed based on the values for K[t-2]+W[t-2] and
164 # The computation of the message schedule and the rounds are tightly
166 # For clarity, integer instructions (for the rounds calculation) are indented
261 movdqa %xmm0, WK_2(idx) # Store W[t]+K[t] for next rounds
310 # (80 rounds) / (2 rounds/iteration) + (1 iteration)
319 movdqa %xmm0, WK_2(t) # Store into WK for rounds
321 # BSWAP 2 QWORDS# Compute 2 Rounds
330 # Schedule 2 QWORDS# Compute 2 Rounds
333 # Compute 2 Rounds
/linux-6.12.1/arch/powerpc/crypto/
Daes-spe-glue.c44 u32 rounds; member
51 u32 rounds; member
54 extern void ppc_encrypt_aes(u8 *out, const u8 *in, u32 *key_enc, u32 rounds);
55 extern void ppc_decrypt_aes(u8 *out, const u8 *in, u32 *key_dec, u32 rounds);
56 extern void ppc_encrypt_ecb(u8 *out, const u8 *in, u32 *key_enc, u32 rounds,
58 extern void ppc_decrypt_ecb(u8 *out, const u8 *in, u32 *key_dec, u32 rounds,
60 extern void ppc_encrypt_cbc(u8 *out, const u8 *in, u32 *key_enc, u32 rounds,
62 extern void ppc_decrypt_cbc(u8 *out, const u8 *in, u32 *key_dec, u32 rounds,
64 extern void ppc_crypt_ctr (u8 *out, const u8 *in, u32 *key_enc, u32 rounds,
66 extern void ppc_encrypt_xts(u8 *out, const u8 *in, u32 *key_enc, u32 rounds,
[all …]
Daesp8-ppc.pl120 my ($inp,$bits,$out,$ptr,$cnt,$rounds)=map("r$_",(3..8));
262 li $rounds,10
336 li $rounds,12
344 li $rounds,14
398 stw $rounds,0($out)
418 slwi $cnt,$rounds,4
420 srwi $rounds,$rounds,1
422 mtctr $rounds
460 my ($inp,$out,$key,$rounds,$idx)=map("r$_",(3..7));
464 lwz $rounds,240($key)
[all …]
Daesp10-ppc.pl120 my ($inp,$bits,$out,$ptr,$cnt,$rounds)=map("r$_",(3..8));
261 li $rounds,10
335 li $rounds,12
343 li $rounds,14
397 stw $rounds,0($out)
417 slwi $cnt,$rounds,4
419 srwi $rounds,$rounds,1
421 mtctr $rounds
459 my ($inp,$out,$key,$rounds,$idx)=map("r$_",(3..7));
463 lwz $rounds,240($key)
[all …]
Daes-spe-keys.S71 * key itself plus 10 rounds with 16 bytes each
84 li r16,10 /* 10 expansion rounds */
113 * itself plus 12 rounds with 16 bytes each
130 li r16,8 /* 8 expansion rounds */
163 * itself plus 14 rounds with 16 bytes each
184 li r16,7 /* 7 expansion rounds */
/linux-6.12.1/arch/arm/crypto/
Daes-neonbs-glue.c28 asmlinkage void aesbs_convert_key(u8 out[], u32 const rk[], int rounds);
31 int rounds, int blocks);
33 int rounds, int blocks);
36 int rounds, int blocks, u8 iv[]);
39 int rounds, int blocks, u8 ctr[]);
42 int rounds, int blocks, u8 iv[], int);
44 int rounds, int blocks, u8 iv[], int);
47 int rounds; member
78 ctx->rounds = 6 + key_len / 4; in aesbs_setkey()
81 aesbs_convert_key(ctx->rk, rk.key_enc, ctx->rounds); in aesbs_setkey()
[all …]
Daes-ce-glue.c30 int rounds, int blocks);
32 int rounds, int blocks);
35 int rounds, int blocks, u8 iv[]);
37 int rounds, int blocks, u8 iv[]);
39 int rounds, int bytes, u8 const iv[]);
41 int rounds, int bytes, u8 const iv[]);
44 int rounds, int blocks, u8 ctr[]);
47 int rounds, int bytes, u8 iv[],
50 int rounds, int bytes, u8 iv[],
60 * # of rounds specified by AES: in num_rounds()
[all …]
Daes-cipher-glue.c20 int rounds = 6 + ctx->key_length / 4; in aes_arm_encrypt() local
22 __aes_arm_encrypt(ctx->key_enc, rounds, in, out); in aes_arm_encrypt()
28 int rounds = 6 + ctx->key_length / 4; in aes_arm_decrypt() local
30 __aes_arm_decrypt(ctx->key_dec, rounds, in, out); in aes_arm_decrypt()
Daes-cipher-core.S17 rounds .req r1
146 tst rounds, #2
152 1: subs rounds, rounds, #4
171 pop {rounds} // oldcpsr
172 \round r4, r5, r6, r7, r8, r9, r10, r11, \bsz, b, rounds
Daes-ce-core.S110 blo 0f @ AES-128: 10 rounds
113 beq 1f @ AES-192: 12 rounds
135 * r3 : number of rounds
162 .macro prepare_key, rk, rounds argument
163 add ip, \rk, \rounds, lsl #4
169 * aes_ecb_encrypt(u8 out[], u8 const in[], u32 const rk[], int rounds,
171 * aes_ecb_decrypt(u8 out[], u8 const in[], u32 const rk[], int rounds,
227 * aes_cbc_encrypt(u8 out[], u8 const in[], u32 const rk[], int rounds,
229 * aes_cbc_decrypt(u8 out[], u8 const in[], u32 const rk[], int rounds,
291 * int rounds, int bytes, u8 const iv[])
[all …]
Daes-neonbs-core.S24 rounds .req ip
432 * void aesbs_convert_key(u8 out[], u32 const rk[], int rounds)
507 sub rounds, rounds, #1
521 subs rounds, rounds, #1
551 add bskey, bskey, rounds, lsl #7
576 sub rounds, rounds, #1
590 subs rounds, rounds, #1
618 * aesbs_ecb_encrypt(u8 out[], u8 const in[], u8 const rk[], int rounds,
620 * aesbs_ecb_decrypt(u8 out[], u8 const in[], u8 const rk[], int rounds,
643 mov rounds, r3
[all …]
/linux-6.12.1/crypto/
Daria_generic.c155 ctx->dec_key[0][i] = ctx->enc_key[ctx->rounds][i]; in aria_set_decrypt_key()
156 ctx->dec_key[ctx->rounds][i] = ctx->enc_key[0][i]; in aria_set_decrypt_key()
159 for (i = 1; i < ctx->rounds; i++) { in aria_set_decrypt_key()
160 ctx->dec_key[i][0] = aria_m(ctx->enc_key[ctx->rounds - i][0]); in aria_set_decrypt_key()
161 ctx->dec_key[i][1] = aria_m(ctx->enc_key[ctx->rounds - i][1]); in aria_set_decrypt_key()
162 ctx->dec_key[i][2] = aria_m(ctx->enc_key[ctx->rounds - i][2]); in aria_set_decrypt_key()
163 ctx->dec_key[i][3] = aria_m(ctx->enc_key[ctx->rounds - i][3]); in aria_set_decrypt_key()
183 BUILD_BUG_ON(sizeof(int) != sizeof(ctx->rounds)); in aria_set_key()
186 ctx->rounds = (key_len + 32) / 4; in aria_set_key()
201 int rounds, rkidx = 0; in __aria_crypt() local
[all …]
/linux-6.12.1/fs/bcachefs/
Dsiphash.c35 * are the number of compression rounds and the number of finalization rounds.
54 static void SipHash_Rounds(SIPHASH_CTX *ctx, int rounds) in SipHash_Rounds() argument
56 while (rounds--) { in SipHash_Rounds()
77 static void SipHash_CRounds(SIPHASH_CTX *ctx, const void *ptr, int rounds) in SipHash_CRounds() argument
82 SipHash_Rounds(ctx, rounds); in SipHash_CRounds()

12345678