| /f-stack/freebsd/contrib/openzfs/module/icp/asm-x86_64/aes/ |
| H A D | aes_aesni.S | 621 aesenc %KEY, %STATE 623 aesenc %KEY, %STATE 629 aesenc %KEY, %STATE 631 aesenc %KEY, %STATE 637 aesenc %KEY, %STATE 639 aesenc %KEY, %STATE 641 aesenc %KEY, %STATE 643 aesenc %KEY, %STATE 645 aesenc %KEY, %STATE 647 aesenc %KEY, %STATE [all …]
|
| /f-stack/freebsd/crypto/aesni/ |
| H A D | aesni_ghash.c | 296 tmp1 = _mm_xor_si128(X, KEY[0]); in AES_GCM_encrypt() 297 tmp2 = _mm_xor_si128(Y, KEY[0]); in AES_GCM_encrypt() 313 tmp1 = _mm_xor_si128(X, KEY[0]); in AES_GCM_encrypt() 341 tmp1 = _mm_xor_si128(Y, KEY[0]); in AES_GCM_encrypt() 410 tmp1 =_mm_xor_si128(tmp1, KEY[0]); in AES_GCM_encrypt() 411 tmp2 =_mm_xor_si128(tmp2, KEY[0]); in AES_GCM_encrypt() 412 tmp3 =_mm_xor_si128(tmp3, KEY[0]); in AES_GCM_encrypt() 556 tmp1 = _mm_xor_si128(X, KEY[0]); in AES_GCM_decrypt() 557 tmp2 = _mm_xor_si128(Y, KEY[0]); in AES_GCM_decrypt() 573 tmp1 = _mm_xor_si128(X, KEY[0]); in AES_GCM_decrypt() [all …]
|
| /f-stack/dpdk/app/test/ |
| H A D | test_metrics.c | 17 #define KEY 1 macro 61 err = rte_metrics_update_value(RTE_METRICS_GLOBAL, KEY, VALUE); in test_metrics_without_init() 64 err = rte_metrics_update_values(RTE_METRICS_GLOBAL, KEY, &value[0], 4); in test_metrics_without_init() 121 err = rte_metrics_update_value(RTE_METRICS_GLOBAL, KEY, VALUE); in test_metrics_update_value() 127 err = rte_metrics_update_value(9, KEY, VALUE); in test_metrics_update_value() 131 err = rte_metrics_update_value(-2, KEY, VALUE); in test_metrics_update_value() 135 err = rte_metrics_update_value(39, KEY, VALUE); in test_metrics_update_value() 139 err = rte_metrics_update_value(RTE_METRICS_GLOBAL, KEY+12, VALUE); in test_metrics_update_value() 169 KEY, &value[0], RTE_DIM(value)); in test_metrics_update_values() 173 err = rte_metrics_update_values(-2, KEY, &value[0], RTE_DIM(value)); in test_metrics_update_values() [all …]
|
| /f-stack/dpdk/drivers/common/dpaax/caamflib/desc/ |
| H A D | pdcp.h | 497 KEY(p, KEY2, authdata->key_enc_flags, authdata->key, in pdcp_insert_cplane_int_only_op() 533 KEY(p, KEY2, authdata->key_enc_flags, authdata->key, in pdcp_insert_cplane_int_only_op() 651 KEY(p, KEY1, authdata->key_enc_flags, authdata->key, in pdcp_insert_cplane_int_only_op() 763 KEY(p, KEY2, authdata->key_enc_flags, authdata->key, in pdcp_insert_cplane_int_only_op() 1250 KEY(p, KEY2, authdata->key_enc_flags, authdata->key, in pdcp_insert_uplane_aes_aes_op() 1287 KEY(p, KEY1, authdata->key_enc_flags, authdata->key, in pdcp_insert_uplane_aes_aes_op() 1358 KEY(p, KEY1, authdata->key_enc_flags, authdata->key, in pdcp_insert_uplane_aes_aes_op() 3354 KEY(p, KEY2, authdata->key_enc_flags, in cnstr_shdsc_pdcp_u_plane_encap() 3359 KEY(p, KEY1, cipherdata->key_enc_flags, in cnstr_shdsc_pdcp_u_plane_encap() 3547 KEY(p, KEY2, authdata->key_enc_flags, in cnstr_shdsc_pdcp_u_plane_decap() [all …]
|
| H A D | ipsec.h | 714 KEY(program, KEY2, authdata->key_enc_flags, authdata->key, in __gen_auth_key() 779 KEY(p, MDHA_SPLIT_KEY, authdata->key_enc_flags, in cnstr_shdsc_ipsec_encap() 786 KEY(p, KEY1, cipherdata->key_enc_flags, cipherdata->key, in cnstr_shdsc_ipsec_encap() 846 KEY(p, MDHA_SPLIT_KEY, authdata->key_enc_flags, in cnstr_shdsc_ipsec_decap() 853 KEY(p, KEY1, cipherdata->key_enc_flags, cipherdata->key, in cnstr_shdsc_ipsec_decap() 933 KEY(p, MDHA_SPLIT_KEY, 0, authdata->key, 32, INLINE_KEY(authdata)); in cnstr_shdsc_ipsec_encap_des_aes_xcbc() 938 KEY(p, KEY1, cipherdata->key_enc_flags, cipherdata->key, in cnstr_shdsc_ipsec_encap_des_aes_xcbc() 1134 KEY(p, KEY1, cipherdata->key_enc_flags, cipherdata->key, in cnstr_shdsc_ipsec_decap_des_aes_xcbc() 1291 KEY(p, KEY1, cipherdata->key_enc_flags, cipherdata->key, in cnstr_shdsc_ipsec_new_encap() 1380 KEY(p, KEY1, cipherdata->key_enc_flags, cipherdata->key, in cnstr_shdsc_ipsec_new_decap() [all …]
|
| H A D | algo.h | 45 KEY(p, KEY1, cipherdata->key_enc_flags, cipherdata->key, in cnstr_shdsc_zuce() 92 KEY(p, KEY2, authdata->key_enc_flags, authdata->key, in cnstr_shdsc_zuca() 142 KEY(p, KEY1, cipherdata->key_enc_flags, cipherdata->key, in cnstr_shdsc_snow_f8() 248 KEY(p, KEY2, authdata->key_enc_flags, authdata->key, in cnstr_shdsc_snow_f9() 315 KEY(p, KEY1, cipherdata->key_enc_flags, cipherdata->key, in cnstr_shdsc_blkcipher() 434 KEY(p, KEY2, authdata->key_enc_flags, authdata->key, authdata->keylen, in cnstr_shdsc_hmac() 581 KEY(p, KEY1, cipherdata->key_enc_flags, cipherdata->key, in cnstr_shdsc_kasumi_f8() 624 KEY(p, KEY2, authdata->key_enc_flags, authdata->key, in cnstr_shdsc_kasumi_f9() 720 KEY(p, KEY1, cipherdata->key_enc_flags, cipherdata->key, in cnstr_shdsc_gcm_encap() 827 KEY(p, KEY1, cipherdata->key_enc_flags, cipherdata->key, in cnstr_shdsc_gcm_decap()
|
| H A D | sdap.h | 44 KEY(p, KEY1, cipherdata->key_enc_flags, cipherdata->key, in key_loading_opti() 49 KEY(p, KEY2, authdata->key_enc_flags, authdata->key, in key_loading_opti() 602 KEY(p, KEY1, authdata->key_enc_flags, authdata->key, in pdcp_sdap_insert_no_snoop_op() 635 KEY(p, KEY1, cipherdata->key_enc_flags, cipherdata->key, in pdcp_sdap_insert_no_snoop_op() 699 KEY(p, KEY1, cipherdata->key_enc_flags, cipherdata->key, in pdcp_sdap_insert_no_snoop_op() 725 KEY(p, KEY1, authdata->key_enc_flags, authdata->key, in pdcp_sdap_insert_no_snoop_op()
|
| /f-stack/dpdk/examples/pipeline/examples/ |
| H A D | vxlan_table.py | 14 KEY = '0xaabbccdd{0:04x}' variable 49 (KEY.format(i), ACTION,
|
| /f-stack/dpdk/doc/guides/cryptodevs/features/ |
| H A D | openssl.ini | 13 RSA PRIV OP KEY EXP = Y 14 RSA PRIV OP KEY QT = Y
|
| H A D | qat.ini | 18 RSA PRIV OP KEY EXP = Y 19 RSA PRIV OP KEY QT = Y
|
| H A D | default.ini | 26 RSA PRIV OP KEY EXP = 27 RSA PRIV OP KEY QT =
|
| H A D | octeontx.ini | 15 RSA PRIV OP KEY QT = Y
|
| H A D | octeontx2.ini | 16 RSA PRIV OP KEY QT = Y
|
| /f-stack/dpdk/doc/guides/cryptodevs/ |
| H A D | overview.rst | 40 - "RSA PRIV OP KEY EXP" feature flag means PMD support RSA private key 43 - "RSA PRIV OP KEY QT" feature flag means PMD support RSA private key
|
| /f-stack/freebsd/contrib/openzfs/config/ |
| H A D | zfs-meta.m4 | 9 dnl # ^[ ]*KEY:[ \t]+VALUE$ 12 dnl # - KEY is separated from VALUE by a colon and one or more spaces/tabs. 13 dnl # - KEY and VALUE are case sensitive.
|
| /f-stack/dpdk/doc/guides/sample_app_ug/ |
| H A D | fips_validation.rst | 32 # VARIABLE KEY - KAT for CBC / # TDES VARIABLE KEY - KAT for CBC
|
| H A D | l2_forward_crypto.rst | 44 [--cipher_algo ALGO] [--cipher_op ENCRYPT/DECRYPT] [--cipher_key KEY] / 46 [--auth_algo ALGO] [--auth_op GENERATE/VERIFY] [--auth_key KEY] / 48 [--aead_algo ALGO] [--aead_op ENCRYPT/DECRYPT] [--aead_key KEY] /
|
| /f-stack/freebsd/contrib/openzfs/module/icp/algs/skein/ |
| H A D | skein.c | 102 Skein_Start_New_Type(ctx, KEY); in Skein_256_InitExt() 339 Skein_Start_New_Type(ctx, KEY); in Skein_512_InitExt() 571 Skein_Start_New_Type(ctx, KEY); in Skein1024_InitExt()
|
| H A D | skein_impl.h | 79 #define SKEIN_T1_BLK_TYPE_KEY SKEIN_T1_BLK_TYPE(KEY)
|
| /f-stack/freebsd/crypto/skein/ |
| H A D | skein.c | 106 Skein_Start_New_Type(ctx,KEY); /* set tweaks: T0 = 0; T1 = KEY type */ in Skein_256_InitExt() 304 Skein_Start_New_Type(ctx,KEY); /* set tweaks: T0 = 0; T1 = KEY type */ in Skein_512_InitExt() 501 Skein_Start_New_Type(ctx,KEY); /* set tweaks: T0 = 0; T1 = KEY type */ in Skein1024_InitExt()
|
| H A D | skein.h | 182 #define SKEIN_T1_BLK_TYPE_KEY SKEIN_T1_BLK_TYPE(KEY) /* key, for MAC and KDF */
|
| /f-stack/dpdk/drivers/common/dpaax/caamflib/ |
| H A D | rta.h | 432 #define KEY(program, key_dst, encrypt_flags, src, length, flags) \ macro
|