Home
last modified time | relevance | path

Searched refs:C (Results 1 – 24 of 24) sorted by relevance

/lib/zstd/common/
A Dcpu.h99 C(sse3, 0)
104 C(vmx, 5)
105 C(smx, 6)
106 C(eist, 7)
107 C(tm2, 8)
110 C(fma, 12)
115 C(dca, 18)
122 C(aes, 25)
125 C(avx, 28)
128 #undef C
[all …]
/lib/crypto/
A Dsha1.c64 TEMP = E; E = D; D = C; C = B; B = A; A = TEMP; } while (0)
66 #define T_0_15(t, A, B, C, D, E) SHA_ROUND(t, SHA_SRC, (((C^D)&B)^D) , 0x5a827999, A, B, C, D, E ) argument
67 #define T_16_19(t, A, B, C, D, E) SHA_ROUND(t, SHA_MIX, (((C^D)&B)^D) , 0x5a827999, A, B, C, D, E ) argument
68 #define T_20_39(t, A, B, C, D, E) SHA_ROUND(t, SHA_MIX, (B^C^D) , 0x6ed9eba1, A, B, C, D, E ) argument
69 #define T_40_59(t, A, B, C, D, E) SHA_ROUND(t, SHA_MIX, ((B&C)+(D&(B^C))) , 0x8f1bbcdc, A, B, C, D,… argument
70 #define T_60_79(t, A, B, C, D, E) SHA_ROUND(t, SHA_MIX, (B^C^D) , 0xca62c1d6, A, B, C, D, E ) argument
92 __u32 A, B, C, D, E; in sha1_transform() local
97 C = digest[2]; in sha1_transform()
103 T_0_15(i, A, B, C, D, E); in sha1_transform()
107 T_16_19(i, A, B, C, D, E); in sha1_transform()
[all …]
/lib/crypto/x86/
A Dsha1-ssse3-and-avx.S127 RR F1,A,B,C,D,E,0
128 RR F1,D,E,A,B,C,2
129 RR F1,B,C,D,E,A,4
130 RR F1,E,A,B,C,D,6
131 RR F1,C,D,E,A,B,8
133 RR F1,A,B,C,D,E,10
134 RR F1,D,E,A,B,C,12
135 RR F1,B,C,D,E,A,14
136 RR F1,E,A,B,C,D,16
137 RR F1,C,D,E,A,B,18
[all …]
A Dsha1-avx2-asm.S99 .set C, REG_C define
322 .set D, C
323 .set C, B define
358 and C, TB
382 andn C, A, T1 /* ~b&d */
418 xor C, A
437 and C, T1
464 mov 8(HASH_PTR), C
537 UPDATE_HASH 8(HASH_PTR), C
603 mov C, TB
[all …]
A Dsha512-avx-asm.S4 # Copyright (C) 2013 Intel Corporation.
A Dsha512-ssse3-asm.S4 # Copyright (C) 2013 Intel Corporation.
A Dsha256-avx-asm.S4 # Copyright (C) 2013 Intel Corporation.
A Dsha256-ssse3-asm.S4 # Copyright (C) 2013 Intel Corporation.
A Dsha256-avx2-asm.S4 # Copyright (C) 2013 Intel Corporation.
A Dsha512-avx2-asm.S4 # Copyright (C) 2013 Intel Corporation.
/lib/crypto/arm/
A Dsha1-armv4-large.S105 add r7,r7,r10 @ E+=F_00_19(B,C,D)
130 add r6,r6,r10 @ E+=F_00_19(B,C,D)
155 add r5,r5,r10 @ E+=F_00_19(B,C,D)
180 add r4,r4,r10 @ E+=F_00_19(B,C,D)
205 add r3,r3,r10 @ E+=F_00_19(B,C,D)
233 add r7,r7,r10 @ E+=F_00_19(B,C,D)
250 add r6,r6,r10 @ E+=F_00_19(B,C,D)
267 add r5,r5,r10 @ E+=F_00_19(B,C,D)
284 add r4,r4,r10 @ E+=F_00_19(B,C,D)
301 add r3,r3,r10 @ E+=F_00_19(B,C,D)
[all …]
A Dsha256-armv4.pl56 $C="r6";
62 @V=($A,$B,$C,$D,$E,$F,$G,$H);
230 ldmia $ctx,{$A,$B,$C,$D,$E,$F,$G,$H}
239 eor $t3,$B,$C @ magic
260 add $C,$C,$t2
271 stmia $t3,{$A,$B,$C,$D,$E,$F,$G,$H}
510 eor $t3,$B,$C
554 add $C,$C,$t3
563 str $C,[$t1],#4
574 eorne $t3,$B,$C
A Dsha512-armv4.pl502 my @V=($A,$B,$C,$D,$E,$F,$G,$H)=map("d$_",(16..23));
/lib/crypto/arm64/
A Dsha2-armv8.pl103 @V=($A,$B,$C,$D,$E,$F,$G,$H)=map("$reg_t$_",(20..27));
236 ldp $C,$D,[$ctx,#2*$SZ]
246 eor $t3,$B,$C // magic seed
266 add $C,$C,@X[2]
271 stp $C,$D,[$ctx,#2*$SZ]
458 my @V = ($A,$B,$C,$D,$E,$F,$G,$H) = map("w$_",(3..10));
676 ldp $C,$D,[$ctx,#8]
681 eor $t3,$B,$C
717 add $C,$C,$t2
726 stp $C,$D,[$ctx,#8]
[all …]
/lib/test_fortify/
A Dtest_fortify.sh36 export LANG=C
/lib/tests/module/
A Dgen_test_kallsyms.sh21 * Copyright (C) 2023 Luis Chamberlain <mcgrof@kernel.org>
/lib/crypto/mips/
A Dchacha-core.S182 #define AXR(A, B, C, D, K, L, M, N, V, W, Y, Z, S) \ argument
185 addu X(C), X(M); \
189 xor X(Y), X(C); \
/lib/raid6/
A Dneon.uc5 * Copyright (C) 2012 Rob Herring
6 * Copyright (C) 2015 Linaro Ltd. <ard.biesheuvel@linaro.org>
A Daltivec.uc36 * This is the C data type to use. We use a vector of
A Dint.uc24 * This is the C data type to use
/lib/
A Dlocking-selftest.c562 LOCK_UNLOCK_2(B, C); \
563 LOCK_UNLOCK_2(C, A); /* fail */
595 LOCK_UNLOCK_2(C, A); \
596 LOCK_UNLOCK_2(B, C); /* fail */
628 LOCK_UNLOCK_2(B, C); \
629 LOCK_UNLOCK_2(C, D); \
661 LOCK_UNLOCK_2(C, D); \
694 LOCK_UNLOCK_2(C, D); \
695 LOCK_UNLOCK_2(B, C); \
1402 I1(A); I1(B); I1(C); I1(D);
[all …]
A DKconfig.debug2571 no compiler warnings from C=1 sparse checker or -Wextra
3016 C: adds KALLSYMS_SCALE_FACTOR * KALLSYSMS_NUMSYMS exported
3017 D: adds 2 * the symbols than C
3030 2) The selftests should load C first, before B. Upon B's load towards
3034 That is when we'll force iteration on module C's insane symbol list.
3036 just loading B without C. The amount of time it takes to load C Vs
3039 this scaling in module C to be proportional, if it used more symbols
3043 C so to allow for full projects.
3121 TEST_KALLSYMS_A. If 8, then module C will have 8 * syms
3123 of symbols than C so to allow projections.
/lib/crc/powerpc/
A Dcrc-vpmsum-template.S59 #define VPERM(A, B, C, D) vperm A, B, C, D argument
61 #define VPERM(A, B, C, D) argument
/lib/crypto/powerpc/
A Dsha256-spe-asm.S265 rW7, rW0, rW3, rW4, rW6, C, 56)

Completed in 707 milliseconds