Home
last modified time | relevance | path

Searched refs:A (Results 1 – 22 of 22) sorted by relevance

/lib/crypto/x86/
A Dsha1-ssse3-and-avx.S127 RR F1,A,B,C,D,E,0
128 RR F1,D,E,A,B,C,2
129 RR F1,B,C,D,E,A,4
130 RR F1,E,A,B,C,D,6
131 RR F1,C,D,E,A,B,8
133 RR F1,A,B,C,D,E,10
134 RR F1,D,E,A,B,C,12
135 RR F1,B,C,D,E,A,14
136 RR F1,E,A,B,C,D,16
191 .set A, REG_A define
[all …]
A Dsha1-avx2-asm.S97 .set A, REG_A define
325 .set TB, A
326 .set A, T_REG define
412 xor B, A
418 xor C, A
429 or A, T1
438 and B, A
439 or T1, A
462 mov (HASH_PTR), A
601 mov A, TA
[all …]
A Dsha512-avx-asm.S33 # MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
A Dsha512-ssse3-asm.S33 # MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
A Dsha256-avx-asm.S32 # MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
A Dsha256-ssse3-asm.S32 # MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
A Dsha256-avx2-asm.S32 # MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
A Dsha512-avx2-asm.S33 # MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
/lib/crypto/
A Dsha1.c64 TEMP = E; E = D; D = C; C = B; B = A; A = TEMP; } while (0)
68 #define T_20_39(t, A, B, C, D, E) SHA_ROUND(t, SHA_MIX, (B^C^D) , 0x6ed9eba1, A, B, C, D, E ) argument
70 #define T_60_79(t, A, B, C, D, E) SHA_ROUND(t, SHA_MIX, (B^C^D) , 0xca62c1d6, A, B, C, D, E ) argument
92 __u32 A, B, C, D, E; in sha1_transform() local
95 A = digest[0]; in sha1_transform()
103 T_0_15(i, A, B, C, D, E); in sha1_transform()
107 T_16_19(i, A, B, C, D, E); in sha1_transform()
111 T_20_39(i, A, B, C, D, E); in sha1_transform()
115 T_40_59(i, A, B, C, D, E); in sha1_transform()
119 T_60_79(i, A, B, C, D, E); in sha1_transform()
[all …]
A Ddes.c588 L ^= S5[0xff & (A >> 8)]; A >>= 16; \
783 u32 L, R, A, B; in des_encrypt() local
789 IP(L, R, A); in des_encrypt()
794 FP(R, L, A); in des_encrypt()
804 u32 L, R, A, B; in des_decrypt() local
810 IP(L, R, A); in des_decrypt()
815 FP(R, L, A); in des_decrypt()
852 IP(L, R, A); in des3_ede_encrypt()
865 FP(R, L, A); in des3_ede_encrypt()
881 IP(L, R, A); in des3_ede_decrypt()
[all …]
/lib/
A Dlocking-selftest.c2097 U(A); in ww_test_spin_nest_unlocked()
2227 L(A); in ww_test_spin_block()
2228 U(A); in ww_test_spin_block()
2231 L(A); in ww_test_spin_block()
2232 U(A); in ww_test_spin_block()
2235 L(A); in ww_test_spin_block()
2238 U(A); in ww_test_spin_block()
2245 L(A); in ww_test_spin_try()
2246 U(A); in ww_test_spin_try()
2250 L(A); in ww_test_spin_try()
[all …]
A Ddynamic_queue_limits.c15 #define POSDIFF(A, B) ((int)((A) - (B)) > 0 ? (A) - (B) : 0) argument
16 #define AFTER_EQ(A, B) ((int)((A) - (B)) >= 0) argument
A DKconfig.kfence82 and allocations/frees. A value of 0 disables stress testing logic.
A DKconfig.kasan191 A KUnit-based KASAN test suite. Triggers different kinds of
A DKconfig.debug230 A kernel debug info option other than "None" has been selected
1081 the kernel panics. If n = 0, then we wait forever. A timeout
1263 A timeout of 0 disables the check. The default is two minutes.
2357 A series of tests are made to verify that the fprobe is functioning
2390 A benchmark measuring the performance of the rbtree library.
2410 A benchmark measuring the performance of the interval tree library
3014 A: has KALLSYSMS_NUMSYMS exported symbols
3015 B: uses one of A's symbols
3022 one symbol it uses from the module A with tons of symbols. This is an
3038 give us projection. Module A only uses one symbol from B so to allow
[all …]
A DKconfig.kcsan130 memory operations are used to set up a watchpoint. A smaller value
/lib/crypto/arm/
A Dsha256-armv4.pl54 $A="r4";
62 @V=($A,$B,$C,$D,$E,$F,$G,$H);
230 ldmia $ctx,{$A,$B,$C,$D,$E,$F,$G,$H}
252 add $A,$A,$t2 @ h+=Maj(a,b,c) from the past
256 add $A,$A,$t0
271 stmia $t3,{$A,$B,$C,$D,$E,$F,$G,$H}
506 ldmia $ctx,{$A-$H}
546 add $A,$A,$t2 @ h+=Maj(a,b,c) from the past
550 add $A,$A,$t0 @ accumulate
559 str $A,[$t1],#4
A Dsha1-armv4-large.S90 add r7,r7,r3,ror#27 @ E+=ROR(A,27)
96 add r7,r7,r3,ror#27 @ E+=ROR(A,27)
115 add r6,r6,r7,ror#27 @ E+=ROR(A,27)
121 add r6,r6,r7,ror#27 @ E+=ROR(A,27)
140 add r5,r5,r6,ror#27 @ E+=ROR(A,27)
146 add r5,r5,r6,ror#27 @ E+=ROR(A,27)
165 add r4,r4,r5,ror#27 @ E+=ROR(A,27)
171 add r4,r4,r5,ror#27 @ E+=ROR(A,27)
190 add r3,r3,r4,ror#27 @ E+=ROR(A,27)
196 add r3,r3,r4,ror#27 @ E+=ROR(A,27)
[all …]
A Dsha512-armv4.pl502 my @V=($A,$B,$C,$D,$E,$F,$G,$H)=map("d$_",(16..23));
606 vldmia $ctx,{$A-$H} @ load context
619 vadd.i64 $A,d30 @ h+=Maj from the past
625 vstmia $ctx,{$A-$H} @ save context
/lib/crypto/arm64/
A Dsha2-armv8.pl103 @V=($A,$B,$C,$D,$E,$F,$G,$H)=map("$reg_t$_",(20..27));
235 ldp $A,$B,[$ctx] // load context
263 add $A,$A,@X[0]
268 stp $A,$B,[$ctx]
458 my @V = ($A,$B,$C,$D,$E,$F,$G,$H) = map("w$_",(3..10));
675 ldp $A,$B,[$ctx]
710 add $A,$A,$t4 // h+=Sigma0(a) from the past
712 add $A,$A,$t2 // h+=Maj(a,b,c) from the past
714 add $A,$A,$t0 // accumulate
723 stp $A,$B,[$ctx,#0]
/lib/crypto/mips/
A Dchacha-core.S182 #define AXR(A, B, C, D, K, L, M, N, V, W, Y, Z, S) \ argument
183 addu X(A), X(K); \
187 xor X(V), X(A); \
/lib/crc/powerpc/
A Dcrc-vpmsum-template.S59 #define VPERM(A, B, C, D) vperm A, B, C, D argument
61 #define VPERM(A, B, C, D) argument

Completed in 33 milliseconds