| /src/crypto/external/apache2/openssl/dist/crypto/modes/ |
| xts128.c | 33 } tweak, scratch; local 39 memcpy(tweak.c, iv, 16); 41 (*ctx->block2)(tweak.c, tweak.c, ctx->key2); 49 scratch.u[0] ^= tweak.u[0]; 50 scratch.u[1] ^= tweak.u[1]; 52 scratch.u[0] = ((u64_a1 *)inp)[0] ^ tweak.u[0]; 53 scratch.u[1] = ((u64_a1 *)inp)[1] ^ tweak.u[1]; 57 scratch.u[0] ^= tweak.u[0]; 58 scratch.u[1] ^= tweak.u[1] [all...] |
| xts128gb.c | 33 } tweak, scratch; local 39 memcpy(tweak.c, iv, 16); 41 (*ctx->block2)(tweak.c, tweak.c, ctx->key2); 49 scratch.u[0] ^= tweak.u[0]; 50 scratch.u[1] ^= tweak.u[1]; 52 scratch.u[0] = ((u64_a1 *)inp)[0] ^ tweak.u[0]; 53 scratch.u[1] = ((u64_a1 *)inp)[1] ^ tweak.u[1]; 57 scratch.u[0] ^= tweak.u[0]; 58 scratch.u[1] ^= tweak.u[1] [all...] |
| /src/crypto/external/bsd/openssl/dist/crypto/modes/ |
| xts128.c | 33 } tweak, scratch; local 39 memcpy(tweak.c, iv, 16); 41 (*ctx->block2) (tweak.c, tweak.c, ctx->key2); 49 scratch.u[0] ^= tweak.u[0]; 50 scratch.u[1] ^= tweak.u[1]; 52 scratch.u[0] = ((u64_a1 *)inp)[0] ^ tweak.u[0]; 53 scratch.u[1] = ((u64_a1 *)inp)[1] ^ tweak.u[1]; 57 scratch.u[0] ^= tweak.u[0]; 58 scratch.u[1] ^= tweak.u[1] [all...] |
| /src/crypto/external/bsd/openssl.old/dist/crypto/modes/ |
| xts128.c | 37 } tweak, scratch; local 43 memcpy(tweak.c, iv, 16); 45 (*ctx->block2) (tweak.c, tweak.c, ctx->key2); 53 scratch.u[0] ^= tweak.u[0]; 54 scratch.u[1] ^= tweak.u[1]; 56 scratch.u[0] = ((u64_a1 *)inp)[0] ^ tweak.u[0]; 57 scratch.u[1] = ((u64_a1 *)inp)[1] ^ tweak.u[1]; 61 scratch.u[0] ^= tweak.u[0]; 62 scratch.u[1] ^= tweak.u[1] [all...] |
| /src/sys/crypto/aes/arch/x86/ |
| aes_ni.c | 267 uint8_t tweak[16]; local 270 aesni_xts_update(cases[i].in, tweak); 271 if (memcmp(tweak, cases[i].out, 16)) 298 /* Verify that our XTS tweak update logic works. */
|
| /src/crypto/external/apache2/openssl/dist/providers/implementations/ciphers/ |
| cipher_aes_xts.h | 28 unsigned char tweak[16]; member in struct:S390X_km_xts_params_st
|
| /src/sys/crypto/aes/arch/arm/ |
| aes_armv8.c | 163 uint8_t out[static 16], size_t nbytes, uint8_t tweak[static 16], 172 aesarmv8_xts_enc1(enc, in, out, nbytes % 128, tweak, nrounds); 180 aesarmv8_xts_enc8(enc, in, out, nbytes, tweak, nrounds); 187 uint8_t out[static 16], size_t nbytes, uint8_t tweak[static 16], 196 aesarmv8_xts_dec1(dec, in, out, nbytes % 128, tweak, nrounds); 204 aesarmv8_xts_dec8(dec, in, out, nbytes, tweak, nrounds); 269 uint8_t tweak[16]; local 272 aesarmv8_xts_update(cases[i].in, tweak); 273 if (memcmp(tweak, cases[i].out, 16)) 310 /* Verify that our XTS tweak update logic works. * [all...] |
| /src/sys/arch/vax/vsa/ |
| ncr.c | 139 int tweak, target; local 206 tweak = clk_tweak + (va->va_paddr & 0x100 ? 3 : 0); 210 target = (clk_page[0xbc/2] >> tweak) & 7;
|
| /src/sys/dev/ |
| cgd_crypto.c | 265 uint8_t tweak[CGD_AES_BLOCK_SIZE]; local 267 /* Compute the initial tweak as AES_k(blkno). */ 268 aes_enc(&ax->ax_tweakkey, blkno, tweak, ax->ax_nrounds); 272 aes_xts_enc(&ax->ax_enckey, src, dst, nbytes, tweak, 276 aes_xts_dec(&ax->ax_deckey, src, dst, nbytes, tweak,
|
| /src/external/ibm-public/postfix/dist/src/util/ |
| dict_db.c | 619 int type, void *tweak, int dict_flags) 715 if ((db = dbopen(db_path, open_flags, 0644, type, tweak)) == 0) 732 if ((errno = db_open(db_path, type, db_flags, 0644, 0, tweak, &db)) != 0) 834 HASHINFO tweak; local 836 memset((void *) &tweak, 0, sizeof(tweak)); 837 tweak.nelem = DICT_DB_NELM; 838 tweak.cachesize = dict_db_cache_size; 841 DB_INFO tweak; local 843 memset((void *) &tweak, 0, sizeof(tweak)) 848 void *tweak; local 861 BTREEINFO tweak; local 867 DB_INFO tweak; local 873 void *tweak; local [all...] |