/arch/mips/bcm47xx/ |
H A D | setup.c | 105 struct ssb_init_invariants *iv) 110 memset(&(iv->boardinfo), 0 , sizeof(struct ssb_boardinfo)); 113 iv->boardinfo.vendor = (u16)simple_strtoul(buf, NULL, 0); 115 iv->boardinfo.vendor = SSB_BOARDVENDOR_BCM; 117 iv->boardinfo.type = (u16)simple_strtoul(buf, NULL, 0); 119 iv->boardinfo.rev = (u16)simple_strtoul(buf, NULL, 0); 121 bcm47xx_fill_sprom(&iv->sprom, NULL); 124 iv->has_cardbus_slot = !!simple_strtoul(buf, NULL, 10); 104 bcm47xx_get_invariants(struct ssb_bus *bus, struct ssb_init_invariants *iv) argument
|
/arch/x86/crypto/ |
H A D | blowfish_glue.c | 151 u64 *iv = (u64 *)walk->iv; local 154 *dst = *src ^ *iv; 156 iv = dst; 163 *(u64 *)walk->iv = *iv; 245 *dst ^= *(u64 *)walk->iv; 246 *(u64 *)walk->iv = last_iv; 270 u8 *ctrblk = walk->iv; 291 u64 ctrblk = be64_to_cpu(*(__be64 *)walk->iv); [all...] |
H A D | aesni-intel_glue.c | 76 u8 iv[16]; member in struct:aesni_hash_subkey_req_data 96 const u8 *in, unsigned int len, u8 *iv); 98 const u8 *in, unsigned int len, u8 *iv); 105 const u8 *in, unsigned int len, u8 *iv); 112 * u8 *iv, Pre-counter block j0: 4 byte salt (from Security Association) 124 const u8 *in, unsigned long plaintext_len, u8 *iv, 133 * u8 *iv, Pre-counter block j0: 4 byte salt (from Security Association) 145 const u8 *in, unsigned long ciphertext_len, u8 *iv, 366 nbytes & AES_BLOCK_MASK, walk.iv); 390 nbytes & AES_BLOCK_MASK, walk.iv); 1089 u8* iv = (u8 *) PTR_ALIGN((u8 *)iv_tab, AESNI_ALIGN); local 1167 u8 *iv = (u8 *) PTR_ALIGN((u8 *)iv_and_authTag, AESNI_ALIGN); local [all...] |
H A D | twofish_glue_3way.c | 134 u128 *iv = (u128 *)walk->iv; local 137 u128_xor(dst, src, iv); 139 iv = dst; 146 u128_xor((u128 *)walk->iv, (u128 *)walk->iv, iv); 226 u128_xor(dst, dst, (u128 *)walk->iv); 227 *(u128 *)walk->iv = last_iv; 272 u8 *ctrblk = walk->iv; [all...] |
H A D | salsa20_glue.c | 41 asmlinkage void salsa20_ivsetup(struct salsa20_ctx *ctx, const u8 *iv); 65 salsa20_ivsetup(ctx, walk.iv);
|
H A D | serpent_sse2_glue.c | 156 u128 *iv = (u128 *)walk->iv; local 159 u128_xor(dst, src, iv); 161 iv = dst; 168 u128_xor((u128 *)walk->iv, (u128 *)walk->iv, iv); 249 u128_xor(dst, dst, (u128 *)walk->iv); 250 *(u128 *)walk->iv = last_iv; 299 u8 *ctrblk = walk->iv; [all...] |
H A D | camellia_glue.c | 1386 u128 *iv = (u128 *)walk->iv; local 1389 u128_xor(dst, src, iv); 1391 iv = dst; 1398 u128_xor((u128 *)walk->iv, (u128 *)walk->iv, iv); 1476 u128_xor(dst, dst, (u128 *)walk->iv); 1477 *(u128 *)walk->iv = last_iv; 1529 camellia_enc_blk_xor(ctx, keystream, walk->iv); [all...] |
H A D | salsa20-i586-asm_32.S | 1082 # iv = arg2 1086 # in6 = *(uint32 *) (iv + 0) 1088 # in7 = *(uint32 *) (iv + 4)
|
H A D | salsa20-x86_64-asm_64.S | 904 # iv = arg2 908 # in6 = *(uint64 *) (iv + 0)
|
H A D | aesni-intel_asm.S | 1184 * u8 *iv, // Pre-counter block j0: 4 byte salt (from Security Association) 1201 * iv: 1447 * u8 *iv, // Pre-counter block j0: 4 byte salt (from Security Association) 1464 * iv: 2376 * size_t len, u8 *iv) 2393 movups (IVP), STATE # load iv as initial state 2417 * size_t len, u8 *iv) 2561 * size_t len, u8 *iv)
|
/arch/s390/crypto/ |
H A D | des_s390.c | 30 u8 iv[DES_BLOCK_SIZE]; member in struct:s390_des_ctx 108 u8 *iv, struct blkcipher_walk *walk) 116 memcpy(iv, walk->iv, DES_BLOCK_SIZE); 123 ret = crypt_s390_kmc(func, iv, out, in, n); 129 memcpy(walk->iv, iv, DES_BLOCK_SIZE); 186 return cbc_desall_crypt(desc, KMC_DEA_ENCRYPT, ctx->iv, &walk); 197 return cbc_desall_crypt(desc, KMC_DEA_DECRYPT, ctx->iv, &walk); 338 return cbc_desall_crypt(desc, KMC_TDEA_192_ENCRYPT, ctx->iv, 107 cbc_desall_crypt(struct blkcipher_desc *desc, long func, u8 *iv, struct blkcipher_walk *walk) argument [all...] |
H A D | aes_s390.c | 38 u8 iv[AES_BLOCK_SIZE]; member in struct:s390_aes_ctx 454 memcpy(param, walk->iv, AES_BLOCK_SIZE); 467 memcpy(walk->iv, param, AES_BLOCK_SIZE); 484 return cbc_aes_crypt(desc, sctx->enc, sctx->iv, &walk); 498 return cbc_aes_crypt(desc, sctx->dec, sctx->iv, &walk); 628 memcpy(xts_ctx->pcc.tweak, walk->iv, sizeof(xts_ctx->pcc.tweak)); 762 memcpy(ctrblk, walk->iv, AES_BLOCK_SIZE); 800 memcpy(walk->iv, ctrblk, AES_BLOCK_SIZE);
|
/arch/cris/include/arch-v32/arch/ |
H A D | cryptocop.h | 197 u8 iv[CRYPTOCOP_MAX_IV_LENGTH]; member in struct:cryptocop_tfrm_cfg
|
/arch/ia64/include/asm/ |
H A D | pal.h | 517 iv : 1, /* instruction set field valid */ member in struct:pal_cache_check_info_s 554 iv : 1, /* instruction set field valid */ member in struct:pal_tlb_check_info_s 590 iv : 1, /* instruction set field valid */ member in struct:pal_bus_check_info_s 620 iv : 1, /* instruction set field valid */ member in struct:pal_reg_file_check_info_s 650 iv : 1, /* instruction set field valid */ member in struct:pal_uarch_check_info_s
|
/arch/mips/include/asm/octeon/ |
H A D | cvmx-pip.h | 473 pip_crc_ivx.s.iv = initialization_vector;
|
H A D | cvmx-pko-defs.h | 882 uint64_t iv:32; member in struct:cvmx_pko_reg_crc_ivx::cvmx_pko_reg_crc_ivx_s
|
H A D | cvmx-pip-defs.h | 189 uint64_t iv:32; member in struct:cvmx_pip_crc_ivx::cvmx_pip_crc_ivx_s
|
/arch/cris/arch-v32/drivers/ |
H A D | cryptocop.c | 509 iv_desc->dma_descr->buf = (char*)virt_to_phys(tc->tcfg->iv); 1141 cipher_ctx.produced -= cipher_ctx.blocklength; /* Compensate for CBC iv. */ 2619 memcpy(ciph_tcfg.iv, oper.cipher_iv, cblocklen);
|