/lib/crypto/x86/ |
A D | sha1-ssse3-and-avx.S | 127 RR F1,A,B,C,D,E,0 128 RR F1,D,E,A,B,C,2 129 RR F1,B,C,D,E,A,4 130 RR F1,E,A,B,C,D,6 131 RR F1,C,D,E,A,B,8 133 RR F1,A,B,C,D,E,10 134 RR F1,D,E,A,B,C,12 135 RR F1,B,C,D,E,A,14 136 RR F1,E,A,B,C,D,16 191 .set A, REG_A define [all …]
|
A D | sha1-avx2-asm.S | 97 .set A, REG_A define 325 .set TB, A 326 .set A, T_REG define 412 xor B, A 418 xor C, A 429 or A, T1 438 and B, A 439 or T1, A 462 mov (HASH_PTR), A 601 mov A, TA [all …]
|
A D | sha512-avx-asm.S | 33 # MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
|
A D | sha512-ssse3-asm.S | 33 # MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
|
A D | sha256-avx-asm.S | 32 # MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
|
A D | sha256-ssse3-asm.S | 32 # MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
|
A D | sha256-avx2-asm.S | 32 # MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
|
A D | sha512-avx2-asm.S | 33 # MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
|
/lib/crypto/ |
A D | sha1.c | 64 TEMP = E; E = D; D = C; C = B; B = A; A = TEMP; } while (0) 68 #define T_20_39(t, A, B, C, D, E) SHA_ROUND(t, SHA_MIX, (B^C^D) , 0x6ed9eba1, A, B, C, D, E ) argument 70 #define T_60_79(t, A, B, C, D, E) SHA_ROUND(t, SHA_MIX, (B^C^D) , 0xca62c1d6, A, B, C, D, E ) argument 92 __u32 A, B, C, D, E; in sha1_transform() local 95 A = digest[0]; in sha1_transform() 103 T_0_15(i, A, B, C, D, E); in sha1_transform() 107 T_16_19(i, A, B, C, D, E); in sha1_transform() 111 T_20_39(i, A, B, C, D, E); in sha1_transform() 115 T_40_59(i, A, B, C, D, E); in sha1_transform() 119 T_60_79(i, A, B, C, D, E); in sha1_transform() [all …]
|
A D | des.c | 588 L ^= S5[0xff & (A >> 8)]; A >>= 16; \ 783 u32 L, R, A, B; in des_encrypt() local 789 IP(L, R, A); in des_encrypt() 794 FP(R, L, A); in des_encrypt() 804 u32 L, R, A, B; in des_decrypt() local 810 IP(L, R, A); in des_decrypt() 815 FP(R, L, A); in des_decrypt() 852 IP(L, R, A); in des3_ede_encrypt() 865 FP(R, L, A); in des3_ede_encrypt() 881 IP(L, R, A); in des3_ede_decrypt() [all …]
|
/lib/ |
A D | locking-selftest.c | 2097 U(A); in ww_test_spin_nest_unlocked() 2227 L(A); in ww_test_spin_block() 2228 U(A); in ww_test_spin_block() 2231 L(A); in ww_test_spin_block() 2232 U(A); in ww_test_spin_block() 2235 L(A); in ww_test_spin_block() 2238 U(A); in ww_test_spin_block() 2245 L(A); in ww_test_spin_try() 2246 U(A); in ww_test_spin_try() 2250 L(A); in ww_test_spin_try() [all …]
|
A D | dynamic_queue_limits.c | 15 #define POSDIFF(A, B) ((int)((A) - (B)) > 0 ? (A) - (B) : 0) argument 16 #define AFTER_EQ(A, B) ((int)((A) - (B)) >= 0) argument
|
A D | Kconfig.kfence | 82 and allocations/frees. A value of 0 disables stress testing logic.
|
A D | Kconfig.kasan | 191 A KUnit-based KASAN test suite. Triggers different kinds of
|
A D | Kconfig.debug | 230 A kernel debug info option other than "None" has been selected 1081 the kernel panics. If n = 0, then we wait forever. A timeout 1263 A timeout of 0 disables the check. The default is two minutes. 2357 A series of tests are made to verify that the fprobe is functioning 2390 A benchmark measuring the performance of the rbtree library. 2410 A benchmark measuring the performance of the interval tree library 3014 A: has KALLSYSMS_NUMSYMS exported symbols 3015 B: uses one of A's symbols 3022 one symbol it uses from the module A with tons of symbols. This is an 3038 give us projection. Module A only uses one symbol from B so to allow [all …]
|
A D | Kconfig.kcsan | 130 memory operations are used to set up a watchpoint. A smaller value
|
/lib/crypto/arm/ |
A D | sha256-armv4.pl | 54 $A="r4"; 62 @V=($A,$B,$C,$D,$E,$F,$G,$H); 230 ldmia $ctx,{$A,$B,$C,$D,$E,$F,$G,$H} 252 add $A,$A,$t2 @ h+=Maj(a,b,c) from the past 256 add $A,$A,$t0 271 stmia $t3,{$A,$B,$C,$D,$E,$F,$G,$H} 506 ldmia $ctx,{$A-$H} 546 add $A,$A,$t2 @ h+=Maj(a,b,c) from the past 550 add $A,$A,$t0 @ accumulate 559 str $A,[$t1],#4
|
A D | sha1-armv4-large.S | 90 add r7,r7,r3,ror#27 @ E+=ROR(A,27) 96 add r7,r7,r3,ror#27 @ E+=ROR(A,27) 115 add r6,r6,r7,ror#27 @ E+=ROR(A,27) 121 add r6,r6,r7,ror#27 @ E+=ROR(A,27) 140 add r5,r5,r6,ror#27 @ E+=ROR(A,27) 146 add r5,r5,r6,ror#27 @ E+=ROR(A,27) 165 add r4,r4,r5,ror#27 @ E+=ROR(A,27) 171 add r4,r4,r5,ror#27 @ E+=ROR(A,27) 190 add r3,r3,r4,ror#27 @ E+=ROR(A,27) 196 add r3,r3,r4,ror#27 @ E+=ROR(A,27) [all …]
|
A D | sha512-armv4.pl | 502 my @V=($A,$B,$C,$D,$E,$F,$G,$H)=map("d$_",(16..23)); 606 vldmia $ctx,{$A-$H} @ load context 619 vadd.i64 $A,d30 @ h+=Maj from the past 625 vstmia $ctx,{$A-$H} @ save context
|
/lib/crypto/arm64/ |
A D | sha2-armv8.pl | 103 @V=($A,$B,$C,$D,$E,$F,$G,$H)=map("$reg_t$_",(20..27)); 235 ldp $A,$B,[$ctx] // load context 263 add $A,$A,@X[0] 268 stp $A,$B,[$ctx] 458 my @V = ($A,$B,$C,$D,$E,$F,$G,$H) = map("w$_",(3..10)); 675 ldp $A,$B,[$ctx] 710 add $A,$A,$t4 // h+=Sigma0(a) from the past 712 add $A,$A,$t2 // h+=Maj(a,b,c) from the past 714 add $A,$A,$t0 // accumulate 723 stp $A,$B,[$ctx,#0]
|
/lib/crypto/mips/ |
A D | chacha-core.S | 182 #define AXR(A, B, C, D, K, L, M, N, V, W, Y, Z, S) \ argument 183 addu X(A), X(K); \ 187 xor X(V), X(A); \
|
/lib/crc/powerpc/ |
A D | crc-vpmsum-template.S | 59 #define VPERM(A, B, C, D) vperm A, B, C, D argument 61 #define VPERM(A, B, C, D) argument
|