| /f-stack/freebsd/contrib/ck/src/ |
| H A D | ck_barrier_tournament.c | 61 struct ck_barrier_tournament_round **rounds, in ck_barrier_tournament_init() argument 71 rounds[i][0].flag = 0; in ck_barrier_tournament_init() 72 rounds[i][0].role = CK_BARRIER_TOURNAMENT_DROPOUT; in ck_barrier_tournament_init() 74 rounds[i][k].flag = 0; in ck_barrier_tournament_init() 81 rounds[i][k].role = CK_BARRIER_TOURNAMENT_BYE; in ck_barrier_tournament_init() 90 rounds[i][k].opponent = &rounds[i - twokm1][k].flag; in ck_barrier_tournament_init() 93 rounds[i][k].opponent = &rounds[i + twokm1][k].flag; in ck_barrier_tournament_init() 97 ck_pr_store_ptr(&barrier->rounds, rounds); in ck_barrier_tournament_init() 112 struct ck_barrier_tournament_round **rounds = ck_pr_load_ptr(&barrier->rounds); in ck_barrier_tournament() local 119 switch (rounds[state->vpid][round].role) { in ck_barrier_tournament() [all …]
|
| /f-stack/freebsd/crypto/aesni/ |
| H A D | aesni_wrap.c | 66 tot = aesni_enc(rounds - 1, key_schedule, in aesni_encrypt_cbc() 140 tot = aesni_enc(rounds - 1, key_schedule, in aesni_encrypt_ecb() 179 tot = aesni_dec(rounds - 1, key_schedule, in aesni_decrypt_ecb() 267 tot = aesni_enc(rounds - 1, key_schedule, tmp1); in aesni_encrypt_icm() 279 tot = aesni_enc(rounds - 1, key_schedule, tmp1); in aesni_encrypt_icm() 316 block = aesni_enc(rounds - 1, key_schedule, block); in aesni_crypt_xts_block() 459 ses->rounds = AES128_ROUNDS; in aesni_cipher_setup_common() 462 ses->rounds = AES192_ROUNDS; in aesni_cipher_setup_common() 465 ses->rounds = AES256_ROUNDS; in aesni_cipher_setup_common() 474 ses->rounds); in aesni_cipher_setup_common() [all …]
|
| H A D | aesencdec.h | 40 aesni_enc8(int rounds, const __m128i *keysched, __m128i a, in aesni_enc8() argument 55 for (i = 0; i < rounds; i++) { in aesni_enc8() 77 aesni_dec8(int rounds, const __m128i *keysched, __m128i a, in aesni_dec8() argument 92 for (i = 0; i < rounds; i++) { in aesni_dec8() 115 aesni_enc(int rounds, const __m128i *keysched, const __m128i from) in aesni_enc() argument 121 for (i = 1; i < rounds; i += 2) { in aesni_enc() 126 tmp = _mm_aesenc_si128(tmp, keysched[rounds]); in aesni_enc() 127 return _mm_aesenclast_si128(tmp, keysched[rounds + 1]); in aesni_enc() 138 for (i = 1; i < rounds; i += 2) { in aesni_dec() 143 tmp = _mm_aesdec_si128(tmp, keysched[rounds]); in aesni_dec() [all …]
|
| H A D | aesni.h | 57 int rounds; member 80 void aesni_encrypt_cbc(int rounds, const void *key_schedule /*__aligned(16)*/, 83 void aesni_decrypt_cbc(int rounds, const void *key_schedule /*__aligned(16)*/, 85 void aesni_encrypt_ecb(int rounds, const void *key_schedule /*__aligned(16)*/, 87 void aesni_decrypt_ecb(int rounds, const void *key_schedule /*__aligned(16)*/, 89 void aesni_encrypt_icm(int rounds, const void *key_schedule /*__aligned(16)*/, 93 void aesni_encrypt_xts(int rounds, const void *data_schedule /*__aligned(16)*/, 97 void aesni_decrypt_xts(int rounds, const void *data_schedule /*__aligned(16)*/,
|
| H A D | aesni.c | 753 aesni_encrypt_cbc(ses->rounds, ses->enc_schedule, in aesni_cipher_crypt() 758 aesni_decrypt_cbc(ses->rounds, ses->dec_schedule, in aesni_cipher_crypt() 764 aesni_encrypt_icm(ses->rounds, ses->enc_schedule, in aesni_cipher_crypt() 769 aesni_encrypt_xts(ses->rounds, ses->enc_schedule, in aesni_cipher_crypt() 773 aesni_decrypt_xts(ses->rounds, ses->dec_schedule, in aesni_cipher_crypt() 782 csp->csp_ivlen, ses->enc_schedule, ses->rounds); in aesni_cipher_crypt() 790 csp->csp_ivlen, ses->enc_schedule, ses->rounds)) in aesni_cipher_crypt() 799 csp->csp_ivlen, ses->enc_schedule, ses->rounds); in aesni_cipher_crypt() 807 csp->csp_ivlen, ses->enc_schedule, ses->rounds)) in aesni_cipher_crypt()
|
| H A D | aeskeys_i386.S | 127 cmpl $12,16(%ebp) # rounds
|
| /f-stack/freebsd/crypto/armv8/ |
| H A D | armv8_crypto_wrap.c | 58 for (i = 0; i < rounds - 1; i += 2) { in armv8_aes_enc() 65 tmp = vaeseq_u8(tmp, keysched[rounds - 1]); in armv8_aes_enc() 67 tmp = vaeseq_u8(tmp, keysched[rounds]); in armv8_aes_enc() 68 tmp = veorq_u8(tmp, keysched[rounds + 1]); in armv8_aes_enc() 80 for (i = 0; i < rounds - 1; i += 2) { in armv8_aes_dec() 87 tmp = vaesdq_u8(tmp, keysched[rounds - 1]); in armv8_aes_dec() 89 tmp = vaesdq_u8(tmp, keysched[rounds]); in armv8_aes_dec() 90 tmp = veorq_u8(tmp, keysched[rounds + 1]); in armv8_aes_dec() 165 block = armv8_aes_enc(rounds - 1, key_schedule, block); in armv8_aes_crypt_xts_block() 167 block = armv8_aes_dec(rounds - 1, key_schedule, block); in armv8_aes_crypt_xts_block() [all …]
|
| /f-stack/freebsd/opencrypto/ |
| H A D | gmac.c | 56 agc->rounds = rijndaelKeySetupEnc(agc->keysched, key, klen * 8); in AES_GMAC_Setkey() 58 rijndaelEncrypt(agc->keysched, agc->rounds, zeros, hbuf); in AES_GMAC_Setkey() 126 rijndaelEncrypt(agc->keysched, agc->rounds, agc->counter, enccntr); in AES_GMAC_Final()
|
| H A D | cbc_mac.c | 55 rijndaelEncrypt(ctx->keysched, ctx->rounds, (void*)temp_block, dst); in xor_and_encrypt() 73 ctx->rounds = rijndaelKeySetupEnc(ctx->keysched, key, klen * 8); in AES_CBC_MAC_Setkey() 128 rijndaelEncrypt(ctx->keysched, ctx->rounds, b0, ctx->block); in AES_CBC_MAC_Reinit() 275 rijndaelEncrypt(ctx->keysched, ctx->rounds, s0, s0); in AES_CBC_MAC_Final()
|
| H A D | gmac.h | 47 int rounds; member
|
| H A D | cbc_mac.h | 57 int rounds; member
|
| /f-stack/freebsd/crypto/siphash/ |
| H A D | siphash.c | 215 int rounds; in SipRounds() local 218 rounds = ctx->rounds_compr; in SipRounds() 220 rounds = ctx->rounds_final; in SipRounds() 222 while (rounds--) { in SipRounds()
|
| /f-stack/freebsd/netinet/ |
| H A D | sctp_ss_functions.c | 600 strq->ss_params.fb.rounds = -1; in sctp_ss_fb_clear() 627 strq->ss_params.fb.rounds = with_strq->ss_params.fb.rounds; in sctp_ss_fb_init_stream() 629 strq->ss_params.fb.rounds = -1; in sctp_ss_fb_init_stream() 645 if (strq->ss_params.fb.rounds < 0) in sctp_ss_fb_add() 713 if ((strqt->ss_params.fb.rounds >= 0) && (strq == NULL || in sctp_ss_fb_select() 714 strqt->ss_params.fb.rounds < strq->ss_params.fb.rounds)) { in sctp_ss_fb_select() 746 subtract = strq->ss_params.fb.rounds; in sctp_ss_fb_scheduled() 748 strqt->ss_params.fb.rounds -= subtract; in sctp_ss_fb_scheduled() 749 if (strqt->ss_params.fb.rounds < 0) in sctp_ss_fb_scheduled() 750 strqt->ss_params.fb.rounds = 0; in sctp_ss_fb_scheduled() [all …]
|
| H A D | sctp_structs.h | 584 int32_t rounds; member
|
| /f-stack/freebsd/crypto/openssl/arm/ |
| H A D | bsaes-armv7.S | 1711 mov r5, r1 @ pass rounds 1823 mov r5, r1 @ pass rounds 1855 mov r5, r1 @ pass rounds 1890 mov r5, r1 @ pass rounds 1918 mov r5, r1 @ pass rounds 1943 mov r5, r1 @ pass rounds 1967 mov r5, r1 @ pass rounds 2202 mov r5, r1 @ pass rounds 2314 mov r5, r1 @ pass rounds 2348 mov r5, r1 @ pass rounds [all …]
|
| H A D | aes-armv4.S | 788 mov r12,r12,lsl#2 @ (rounds-1)*4
|
| /f-stack/freebsd/contrib/libsodium/src/libsodium/crypto_core/salsa/ref/ |
| H A D | core_salsa_ref.c | 13 const int rounds) in crypto_core_salsa() argument 45 for (i = 0; i < rounds; i += 2) { in crypto_core_salsa()
|
| /f-stack/freebsd/contrib/ck/include/ |
| H A D | ck_barrier.h | 125 struct ck_barrier_tournament_round **rounds; member
|
| /f-stack/freebsd/contrib/device-tree/Bindings/pwm/ |
| H A D | pwm-sifive.txt | 6 it can achieve, which the driver rounds to the nearest achievable period.
|
| /f-stack/freebsd/x86/x86/ |
| H A D | identcpu.c | 1945 u_int rounds, regnum; in print_INTEL_info() local 1949 rounds = 0; in print_INTEL_info() 1952 if (rounds == 0 && (rounds = (regs[0] & 0xff)) == 0) in print_INTEL_info() 1964 } while (--rounds > 0); in print_INTEL_info()
|
| /f-stack/freebsd/crypto/skein/amd64/ |
| H A D | skein_block_asm.s | 57 # only display rounds if default size is changed on command line
|
| /f-stack/ |
| H A D | README.md | 21 … Linux kernel, another is to use kernel bypass techniques. After several rounds of investigation; …
|
| /f-stack/freebsd/crypto/openssl/aarch64/ |
| H A D | vpaes-armv8.S | 671 ## Therefore, on each cycle we do 2 rounds and produce 3 round
|
| /f-stack/app/redis-5.0.5/deps/jemalloc/ |
| H A D | ChangeLog | 1075 - Add nallocm(), which rounds a request size up to the nearest size class
|