Home
last modified time | relevance | path

Searched refs:rk (Results 1 – 14 of 14) sorted by relevance

/linux-4.4.14/arch/arm64/crypto/
Daes-ce.S20 .macro load_round_keys, rounds, rk
24 ld1 {v17.16b-v18.16b}, [\rk], #32
25 1111: ld1 {v19.16b-v20.16b}, [\rk], #32
26 2222: ld1 {v21.16b-v24.16b}, [\rk], #64
27 ld1 {v25.16b-v28.16b}, [\rk], #64
28 ld1 {v29.16b-v31.16b}, [\rk]
32 .macro enc_prepare, rounds, rk, ignore
33 load_round_keys \rounds, \rk
37 .macro enc_switch_key, rounds, rk, ignore
38 load_round_keys \rounds, \rk
[all …]
Daes-neon.S85 .macro do_block, enc, in, rounds, rk, rkp, i
86 ld1 {v15.16b}, [\rk]
87 add \rkp, \rk, #16
104 .macro encrypt_block, in, rounds, rk, rkp, i
105 do_block 1, \in, \rounds, \rk, \rkp, \i
108 .macro decrypt_block, in, rounds, rk, rkp, i
109 do_block 0, \in, \rounds, \rk, \rkp, \i
231 .macro do_block_2x, enc, in0, in1 rounds, rk, rkp, i
232 ld1 {v15.16b}, [\rk]
233 add \rkp, \rk, #16
[all …]
Daes-ce-ccm-glue.c34 u32 *macp, u32 const rk[], u32 rounds);
37 u32 const rk[], u32 rounds, u8 mac[],
41 u32 const rk[], u32 rounds, u8 mac[],
44 asmlinkage void ce_aes_ccm_final(u8 mac[], u8 const ctr[], u32 const rk[],
Daes-glue.c57 asmlinkage void aes_ecb_encrypt(u8 out[], u8 const in[], u8 const rk[],
59 asmlinkage void aes_ecb_decrypt(u8 out[], u8 const in[], u8 const rk[],
62 asmlinkage void aes_cbc_encrypt(u8 out[], u8 const in[], u8 const rk[],
64 asmlinkage void aes_cbc_decrypt(u8 out[], u8 const in[], u8 const rk[],
67 asmlinkage void aes_ctr_encrypt(u8 out[], u8 const in[], u8 const rk[],
/linux-4.4.14/arch/arm/crypto/
Daes-armv4.S479 eor r0,r0,r5 @ rk[4]=rk[0]^...
480 eor r1,r1,r0 @ rk[5]=rk[1]^rk[4]
482 eor r2,r2,r1 @ rk[6]=rk[2]^rk[5]
484 eor r3,r3,r2 @ rk[7]=rk[3]^rk[6]
543 eor r0,r0,r9 @ rk[6]=rk[0]^...
544 eor r1,r1,r0 @ rk[7]=rk[1]^rk[6]
546 eor r2,r2,r1 @ rk[8]=rk[2]^rk[7]
548 eor r3,r3,r2 @ rk[9]=rk[3]^rk[8]
557 eor r7,r7,r3 @ rk[10]=rk[4]^rk[9]
558 eor r9,r8,r7 @ rk[11]=rk[5]^rk[10]
[all …]
Dsha2-ce-core.S20 rk .req r3
37 vld1.32 {k\ev}, [rk, :128]!
92 adr rk, .Lsha256_rcon
93 vld1.32 {k0}, [rk, :128]!
Daesbs-glue.c22 struct AES_KEY rk; member
67 ctx->dec.rk = ctx->enc; in aesbs_cbc_set_key()
68 private_AES_set_decrypt_key(in_key, bits, &ctx->dec.rk); in aesbs_cbc_set_key()
79 if (private_AES_set_encrypt_key(in_key, bits, &ctx->enc.rk)) { in aesbs_ctr_set_key()
93 if (private_AES_set_encrypt_key(in_key, bits, &ctx->enc.rk)) { in aesbs_xts_set_key()
97 ctx->dec.rk = ctx->enc.rk; in aesbs_xts_set_key()
98 private_AES_set_decrypt_key(in_key, bits, &ctx->dec.rk); in aesbs_xts_set_key()
174 AES_decrypt(src, dst, &ctx->dec.rk); in aesbs_cbc_decrypt()
243 AES_encrypt(walk.iv, ks, &ctx->enc.rk); in aesbs_ctr_encrypt()
Daes-ce-glue.c27 asmlinkage void ce_aes_ecb_encrypt(u8 out[], u8 const in[], u8 const rk[],
29 asmlinkage void ce_aes_ecb_decrypt(u8 out[], u8 const in[], u8 const rk[],
32 asmlinkage void ce_aes_cbc_encrypt(u8 out[], u8 const in[], u8 const rk[],
34 asmlinkage void ce_aes_cbc_decrypt(u8 out[], u8 const in[], u8 const rk[],
37 asmlinkage void ce_aes_ctr_encrypt(u8 out[], u8 const in[], u8 const rk[],
Daes-ce-core.S153 .macro prepare_key, rk, rounds
154 add ip, \rk, \rounds, lsl #4
155 vld1.8 {q8-q9}, [\rk] @ load first 2 round keys
/linux-4.4.14/drivers/net/ethernet/stmicro/stmmac/
DMakefile12 obj-$(CONFIG_DWMAC_ROCKCHIP) += dwmac-rk.o
/linux-4.4.14/Documentation/devicetree/bindings/misc/
Datmel-ssc.txt21 - atmel,clk-from-rk-pin: bool property.
/linux-4.4.14/arch/arm/boot/dts/
Dsama5d3xmb.dtsi38 atmel,clk-from-rk-pin;
/linux-4.4.14/drivers/input/joystick/iforce/
Diforce-ff.c148 __u16 rsat, __u16 lsat, __s16 rk, __s16 lk, u16 db, __s16 center) in make_condition_modifier() argument
166 …data[2] = (100 * rk) >> 15; /* Dangerous: the sign is extended by gcc on plateforms providing an a… in make_condition_modifier()
/linux-4.4.14/drivers/staging/rtl8188eu/core/
Drtw_security.c1677 d##0 = TE0(s##0) ^ TE1(s##1) ^ TE2(s##2) ^ TE3(s##3) ^ rk[4 * i]; \
1678 d##1 = TE0(s##1) ^ TE1(s##2) ^ TE2(s##3) ^ TE3(s##0) ^ rk[4 * i + 1]; \
1679 d##2 = TE0(s##2) ^ TE1(s##3) ^ TE2(s##0) ^ TE3(s##1) ^ rk[4 * i + 2]; \
1680 d##3 = TE0(s##3) ^ TE1(s##0) ^ TE2(s##1) ^ TE3(s##2) ^ rk[4 * i + 3]; \