/linux-4.1.27/include/linux/ |
H A D | btree-128.h | 21 static inline void *btree_lookup128(struct btree_head128 *head, u64 k1, u64 k2) btree_lookup128() argument 23 u64 key[2] = {k1, k2}; btree_lookup128() 28 u64 *k1, u64 *k2) btree_get_prev128() 30 u64 key[2] = {*k1, *k2}; btree_get_prev128() 36 *k2 = key[1]; btree_get_prev128() 40 static inline int btree_insert128(struct btree_head128 *head, u64 k1, u64 k2, btree_insert128() argument 43 u64 key[2] = {k1, k2}; btree_insert128() 48 static inline int btree_update128(struct btree_head128 *head, u64 k1, u64 k2, btree_update128() argument 51 u64 key[2] = {k1, k2}; btree_update128() 56 static inline void *btree_remove128(struct btree_head128 *head, u64 k1, u64 k2) btree_remove128() argument 58 u64 key[2] = {k1, k2}; btree_remove128() 62 static inline void *btree_last128(struct btree_head128 *head, u64 *k1, u64 *k2) btree_last128() argument 70 *k2 = key[1]; btree_last128() 105 #define btree_for_each_safe128(head, k1, k2, val) \ 106 for (val = btree_last128(head, &k1, &k2); \ 108 val = btree_get_prev128(head, &k1, &k2)) 27 btree_get_prev128(struct btree_head128 *head, u64 *k1, u64 *k2) btree_get_prev128() argument
|
/linux-4.1.27/arch/arm64/crypto/ |
H A D | aes-ce.S | 71 .macro fin_round_Nx, de, k, k2, i0, i1, i2, i3 80 eor \i0\().16b, \i0\().16b, \k2\().16b 82 eor \i1\().16b, \i1\().16b, \k2\().16b 84 eor \i2\().16b, \i2\().16b, \k2\().16b 85 eor \i3\().16b, \i3\().16b, \k2\().16b
|
/linux-4.1.27/arch/sh/kernel/cpu/sh3/ |
H A D | entry.S | 73 #define k2 r2 define 87 * k2 scratch (Exception code) 197 lds k2, pr ! restore pr 214 ! k2 returns original pr 244 mov.l @r15+, k2 ! original PR 257 lds k2, pr ! restore pr 260 mov k3, k2 ! original SR value 264 and k1, k2 ! Mask original SR value 274 6: or k0, k2 ! Set the IMASK-bits 275 ldc k2, ssr 308 ! k2 trashed 362 mov.l 5f, k2 ! vector register address 365 mov.l @k2, k2 ! read out vector and keep in k2 372 stc r2_bank, r0 ! k2 (vector) 453 mov #-1, k2 ! default vector kept in k2
|
H A D | swsusp.S | 18 #define k2 r2 define 69 lds k2, pr
|
/linux-4.1.27/net/mac80211/ |
H A D | aes_cmac.c | 150 u8 *k1, u8 *k2) ieee80211_aes_cmac_calculate_k1_k2() 161 memcpy(k2, k1, AES_BLOCK_SIZE); ieee80211_aes_cmac_calculate_k1_k2() 162 gf_mulx(k2); ieee80211_aes_cmac_calculate_k1_k2() 149 ieee80211_aes_cmac_calculate_k1_k2(struct ieee80211_key_conf *keyconf, u8 *k1, u8 *k2) ieee80211_aes_cmac_calculate_k1_k2() argument
|
/linux-4.1.27/crypto/ |
H A D | tea.c | 65 u32 k0, k1, k2, k3; tea_encrypt() local 75 k2 = ctx->KEY[2]; tea_encrypt() 83 z += ((y << 4) + k2) ^ (y + sum) ^ ((y >> 5) + k3); tea_encrypt() 93 u32 k0, k1, k2, k3; tea_decrypt() local 103 k2 = ctx->KEY[2]; tea_decrypt() 111 z -= ((y << 4) + k2) ^ (y + sum) ^ ((y >> 5) + k3); tea_decrypt()
|
H A D | vmac.c | 246 #define k2 (*(((u32 *)kh)+INDEX_LOW)) poly_step_func() macro 255 p += MUL32(a0, k2); poly_step_func() 261 p += MUL32(a1, k2); poly_step_func() 269 q += MUL32(a2, k2); poly_step_func() 279 q += MUL32(a3, k2); poly_step_func() 292 #undef k2 poly_step_func() macro 328 static u64 l3hash(u64 p1, u64 p2, u64 k1, u64 k2, u64 len) l3hash() argument 348 /* compute (p1+k1)%p64 and (p2+k2)%p64 */ l3hash() 351 p2 += k2; l3hash() 352 p2 += (0 - (p2 < k2)) & 257; l3hash() 354 /* compute (p1+k1)*(p2+k2)%p64 */ l3hash()
|
H A D | camellia_generic.c | 634 /* k1, k2 */ camellia_setup128() 792 /* k2 */ camellia_setup256()
|
H A D | des_generic.c | 857 * equal (k1 == k2 or k2 == k3), then the DES3 operation is simply the
|
/linux-4.1.27/drivers/staging/skein/ |
H A D | threefish_block.c | 9 k2 = key_ctx->key[2], k3 = key_ctx->key[3], threefish_encrypt_256() local 19 b2 += b3 + k2 + t1; threefish_encrypt_256() 40 b1 += k2 + t1; threefish_encrypt_256() 68 b0 += b1 + k2; threefish_encrypt_256() 124 b3 += k2 + 4; threefish_encrypt_256() 151 b2 += b3 + k2 + t0; threefish_encrypt_256() 173 b1 += k2 + t0; threefish_encrypt_256() 200 b0 += b1 + k2; threefish_encrypt_256() 256 b3 += k2 + 9; threefish_encrypt_256() 284 b2 += b3 + k2 + t2; threefish_encrypt_256() 305 b1 += k2 + t2; threefish_encrypt_256() 333 b0 += b1 + k2; threefish_encrypt_256() 389 b3 += k2 + 14; threefish_encrypt_256() 416 b2 += b3 + k2 + t1; threefish_encrypt_256() 438 b1 += k2 + t1; threefish_encrypt_256() 465 b0 += b1 + k2; threefish_encrypt_256() 502 k2 = key_ctx->key[2], k3 = key_ctx->key[3], threefish_decrypt_256() local 539 b0 -= b1 + k2; threefish_decrypt_256() 574 b1 -= k2 + t1; threefish_decrypt_256() 613 b2 -= b3 + k2 + t1; threefish_decrypt_256() 648 b3 -= k2 + 14; threefish_decrypt_256() 711 b0 -= b1 + k2; threefish_decrypt_256() 747 b1 -= k2 + t2; threefish_decrypt_256() 785 b2 -= b3 + k2 + t2; threefish_decrypt_256() 821 b3 -= k2 + 9; threefish_decrypt_256() 884 b0 -= b1 + k2; threefish_decrypt_256() 919 b1 -= k2 + t0; threefish_decrypt_256() 958 b2 -= b3 + k2 + t0; threefish_decrypt_256() 993 b3 -= k2 + 4; threefish_decrypt_256() 1056 b0 -= b1 + k2; threefish_decrypt_256() 1092 b1 -= k2 + t1; threefish_decrypt_256() 1130 b2 -= b3 + k2 + t1; threefish_decrypt_256() 1147 k2 = key_ctx->key[2], k3 = key_ctx->key[3], threefish_encrypt_512() local 1159 b2 += b3 + k2; threefish_encrypt_512() 1206 b1 += k2; threefish_encrypt_512() 1259 b0 += b1 + k2; threefish_encrypt_512() 1374 b7 += k2 + 4; threefish_encrypt_512() 1427 b6 += b7 + k2 + t0; threefish_encrypt_512() 1474 b5 += k2 + t0; threefish_encrypt_512() 1527 b4 += b5 + k2; threefish_encrypt_512() 1574 b3 += k2; threefish_encrypt_512() 1627 b2 += b3 + k2; threefish_encrypt_512() 1674 b1 += k2; threefish_encrypt_512() 1727 b0 += b1 + k2; threefish_encrypt_512() 1842 b7 += k2 + 13; threefish_encrypt_512() 1895 b6 += b7 + k2 + t0; threefish_encrypt_512() 1942 b5 += k2 + t0; threefish_encrypt_512() 1995 b4 += b5 + k2; threefish_encrypt_512() 2042 b3 += k2; threefish_encrypt_512() 2092 output[2] = b2 + k2; threefish_encrypt_512() 2108 k2 = key_ctx->key[2], k3 = key_ctx->key[3], threefish_decrypt_512() local 2119 b2 -= k2; threefish_decrypt_512() 2187 b3 -= k2; threefish_decrypt_512() 2249 b4 -= b5 + k2; threefish_decrypt_512() 2318 b5 -= k2 + t0; threefish_decrypt_512() 2380 b6 -= b7 + k2 + t0; threefish_decrypt_512() 2449 b7 -= k2 + 13; threefish_decrypt_512() 2599 b0 -= b1 + k2; threefish_decrypt_512() 2668 b1 -= k2; threefish_decrypt_512() 2730 b2 -= b3 + k2; threefish_decrypt_512() 2799 b3 -= k2; threefish_decrypt_512() 2861 b4 -= b5 + k2; threefish_decrypt_512() 2930 b5 -= k2 + t0; threefish_decrypt_512() 2992 b6 -= b7 + k2 + t0; threefish_decrypt_512() 3061 b7 -= k2 + 4; threefish_decrypt_512() 3211 b0 -= b1 + k2; threefish_decrypt_512() 3280 b1 -= k2; threefish_decrypt_512() 3342 b2 -= b3 + k2; threefish_decrypt_512() 3373 k2 = key_ctx->key[2], k3 = key_ctx->key[3], threefish_encrypt_1024() local 3389 b2 += b3 + k2; threefish_encrypt_1024() 3488 b1 += k2; threefish_encrypt_1024() 3593 b0 += b1 + k2; threefish_encrypt_1024() 3828 b15 += k2 + 4; threefish_encrypt_1024() 3933 b14 += b15 + k2 + t0; threefish_encrypt_1024() 4032 b13 += k2 + t0; threefish_encrypt_1024() 4137 b12 += b13 + k2; threefish_encrypt_1024() 4236 b11 += k2; threefish_encrypt_1024() 4341 b10 += b11 + k2; threefish_encrypt_1024() 4440 b9 += k2; threefish_encrypt_1024() 4545 b8 += b9 + k2; threefish_encrypt_1024() 4644 b7 += k2; threefish_encrypt_1024() 4749 b6 += b7 + k2; threefish_encrypt_1024() 4848 b5 += k2; threefish_encrypt_1024() 4953 b4 += b5 + k2; threefish_encrypt_1024() 5052 b3 += k2; threefish_encrypt_1024() 5157 b2 += b3 + k2; threefish_encrypt_1024() 5256 b1 += k2; threefish_encrypt_1024() 5361 b0 += b1 + k2; threefish_encrypt_1024() 5494 k2 = key_ctx->key[2], k3 = key_ctx->key[3], threefish_decrypt_1024() local 5655 b0 -= b1 + k2; threefish_decrypt_1024() 5792 b1 -= k2; threefish_decrypt_1024() 5922 b2 -= b3 + k2; threefish_decrypt_1024() 6059 b3 -= k2; threefish_decrypt_1024() 6189 b4 -= b5 + k2; threefish_decrypt_1024() 6326 b5 -= k2; threefish_decrypt_1024() 6456 b6 -= b7 + k2; threefish_decrypt_1024() 6593 b7 -= k2; threefish_decrypt_1024() 6723 b8 -= b9 + k2; threefish_decrypt_1024() 6860 b9 -= k2; threefish_decrypt_1024() 6990 b10 -= b11 + k2; threefish_decrypt_1024() 7127 b11 -= k2; threefish_decrypt_1024() 7257 b12 -= b13 + k2; threefish_decrypt_1024() 7394 b13 -= k2 + t0; threefish_decrypt_1024() 7524 b14 -= b15 + k2 + t0; threefish_decrypt_1024() 7661 b15 -= k2 + 4; threefish_decrypt_1024() 7967 b0 -= b1 + k2; threefish_decrypt_1024() 8104 b1 -= k2; threefish_decrypt_1024() 8234 b2 -= b3 + k2; threefish_decrypt_1024()
|
/linux-4.1.27/sound/pci/ctxfi/ |
H A D | cthardware.c | 57 case 0x000B: /* 20k2 device */ destroy_hw_obj()
|
H A D | cthardware.h | 38 /* 20k2 models */
|
H A D | cthw20k2.c | 11 * This file contains the implementation of hardware access method for 20k2. 50 * The layout of control structures can be directly applied on 20k2 chip. 2061 /* Switch to 20k2 mode from UAA mode. */ hw_card_start()
|
H A D | ctatc.c | 74 /* 20k2 models */
|
H A D | cthw20k1.c | 49 * The layout of control structures can be directly applied on 20k2 chip.
|
/linux-4.1.27/fs/xfs/libxfs/ |
H A D | xfs_alloc_btree.c | 392 union xfs_btree_key *k2) xfs_allocbt_keys_inorder() 396 be32_to_cpu(k2->alloc.ar_startblock); xfs_allocbt_keys_inorder() 399 be32_to_cpu(k2->alloc.ar_blockcount) || xfs_allocbt_keys_inorder() 400 (k1->alloc.ar_blockcount == k2->alloc.ar_blockcount && xfs_allocbt_keys_inorder() 402 be32_to_cpu(k2->alloc.ar_startblock)); xfs_allocbt_keys_inorder() 389 xfs_allocbt_keys_inorder( struct xfs_btree_cur *cur, union xfs_btree_key *k1, union xfs_btree_key *k2) xfs_allocbt_keys_inorder() argument
|
H A D | xfs_ialloc_btree.c | 307 union xfs_btree_key *k2) xfs_inobt_keys_inorder() 310 be32_to_cpu(k2->inobt.ir_startino); xfs_inobt_keys_inorder() 304 xfs_inobt_keys_inorder( struct xfs_btree_cur *cur, union xfs_btree_key *k1, union xfs_btree_key *k2) xfs_inobt_keys_inorder() argument
|
H A D | xfs_btree.h | 168 /* check that k1 is lower than k2 */ 171 union xfs_btree_key *k2);
|
H A D | xfs_bmap_btree.c | 732 union xfs_btree_key *k2) xfs_bmbt_keys_inorder() 735 be64_to_cpu(k2->bmbt.br_startoff); xfs_bmbt_keys_inorder() 729 xfs_bmbt_keys_inorder( struct xfs_btree_cur *cur, union xfs_btree_key *k1, union xfs_btree_key *k2) xfs_bmbt_keys_inorder() argument
|
/linux-4.1.27/fs/hfsplus/ |
H A D | catalog.c | 16 const hfsplus_btree_key *k2) hfsplus_cat_case_cmp_key() 21 k2p = k2->cat.parent; hfsplus_cat_case_cmp_key() 25 return hfsplus_strcasecmp(&k1->cat.name, &k2->cat.name); hfsplus_cat_case_cmp_key() 29 const hfsplus_btree_key *k2) hfsplus_cat_bin_cmp_key() 34 k2p = k2->cat.parent; hfsplus_cat_bin_cmp_key() 38 return hfsplus_strcmp(&k1->cat.name, &k2->cat.name); hfsplus_cat_bin_cmp_key() 15 hfsplus_cat_case_cmp_key(const hfsplus_btree_key *k1, const hfsplus_btree_key *k2) hfsplus_cat_case_cmp_key() argument 28 hfsplus_cat_bin_cmp_key(const hfsplus_btree_key *k1, const hfsplus_btree_key *k2) hfsplus_cat_bin_cmp_key() argument
|
H A D | attributes.c | 35 const hfsplus_btree_key *k2) hfsplus_attr_bin_cmp_key() 40 k2_cnid = k2->attr.cnid; hfsplus_attr_bin_cmp_key() 46 (const struct hfsplus_unistr *)&k2->attr.key_name); hfsplus_attr_bin_cmp_key() 34 hfsplus_attr_bin_cmp_key(const hfsplus_btree_key *k1, const hfsplus_btree_key *k2) hfsplus_attr_bin_cmp_key() argument
|
H A D | extents.c | 20 const hfsplus_btree_key *k2) hfsplus_ext_cmp_key() 26 k2id = k2->ext.cnid; hfsplus_ext_cmp_key() 30 if (k1->ext.fork_type != k2->ext.fork_type) hfsplus_ext_cmp_key() 31 return k1->ext.fork_type < k2->ext.fork_type ? -1 : 1; hfsplus_ext_cmp_key() 34 k2s = k2->ext.start_block; hfsplus_ext_cmp_key() 19 hfsplus_ext_cmp_key(const hfsplus_btree_key *k1, const hfsplus_btree_key *k2) hfsplus_ext_cmp_key() argument
|
H A D | hfsplus_fs.h | 373 const hfsplus_btree_key *k2); 443 const hfsplus_btree_key *k2); 445 const hfsplus_btree_key *k2); 465 const hfsplus_btree_key *k2);
|
/linux-4.1.27/arch/sparc/crypto/ |
H A D | des_glue.c | 207 u64 k2[DES_EXPKEY_WORDS / 2]; des3_ede_set_key() local 219 des_sparc64_key_expand((const u32 *)key, k2); des3_ede_set_key() 224 encrypt_to_decrypt(&dctx->encrypt_expkey[DES_EXPKEY_WORDS / 2], &k2[0]); des3_ede_set_key() 230 &k2[0], sizeof(k2)); des3_ede_set_key()
|
/linux-4.1.27/drivers/crypto/ccp/ |
H A D | ccp-crypto-aes-cmac.c | 302 gk = (__be64 *)ctx->u.aes.k2; ccp_aes_cmac_setkey() 309 sg_init_one(&ctx->u.aes.k2_sg, ctx->u.aes.k2, sizeof(ctx->u.aes.k2)); ccp_aes_cmac_setkey()
|
H A D | ccp-crypto.h | 92 u8 k2[AES_BLOCK_SIZE]; member in struct:ccp_aes_ctx
|
/linux-4.1.27/net/core/ |
H A D | flow.c | 176 const flow_compare_t *k1, *k1_lim, *k2; flow_key_compare() local 181 k2 = (const flow_compare_t *) key2; flow_key_compare() 184 if (*k1++ != *k2++) flow_key_compare()
|
/linux-4.1.27/net/ipv4/ |
H A D | tcp_illinois.c | 168 * k2 = ---------------- - d1 alpha() 173 * k2 + da alpha()
|
/linux-4.1.27/drivers/video/fbdev/msm/ |
H A D | mdp_ppp.c | 218 int64_t k1, k2, k3, k4, tmp; scale_params() local 242 k2 = (k1 - ONE) >> 1; scale_params() 244 *phase_init = (int)(k2 >> 4); scale_params() 270 os_p = ((k1 * (od_p >> 33)) + k2); scale_params()
|
/linux-4.1.27/arch/s390/crypto/ |
H A D | des_s390.c | 234 * equal (k1 == k2 or k2 == k3), then the DES3 operation is simply the
|
/linux-4.1.27/arch/arm/mach-omap2/ |
H A D | mux34xx.c | 811 _OMAP3_BALLENTRY(GPMC_D15, "m2", "k2"), 814 _OMAP3_BALLENTRY(GPMC_NBE0_CLE, "k2", NULL), 1150 _OMAP3_BALLENTRY(GPMC_A3, "k2", NULL), 1482 _OMAP3_BALLENTRY(GPMC_D9, "k2", "ac3"), 1910 _OMAP3_BALLENTRY(GPMC_D9, "k2", "ac3"),
|
/linux-4.1.27/drivers/media/usb/gspca/ |
H A D | sonixj.c | 1809 u8 k2; setbrightness() local 1811 k2 = (brightness - 0x80) >> 2; setbrightness() 1814 if (k2 > 0x1f) setbrightness() 1815 k2 = 0; /* only positive Y offset */ setbrightness() 1848 reg_w1(gspca_dev, 0x96, k2); /* color matrix Y offset */ setbrightness() 1854 u8 k2; setcontrast() local 1857 k2 = sd->contrast->val * 37 / (CONTRAST_MAX + 1) setcontrast() 1859 contrast[0] = (k2 + 1) / 2; /* red */ setcontrast() 1861 contrast[2] = k2; /* green */ setcontrast() 1863 contrast[4] = k2 / 5; /* blue */ setcontrast()
|
/linux-4.1.27/drivers/i2c/busses/ |
H A D | i2c-powermac.c | 269 if (of_device_is_compatible(busnode, "k2-i2c") && !found_onyx) { i2c_powermac_add_missing()
|
/linux-4.1.27/fs/reiserfs/ |
H A D | stree.c | 37 * form. k2 is pointer to cpu variable. For key of items of the same 62 * form. k2 is pointer to cpu variable. 132 const struct reiserfs_key *k2) comp_le_keys() 134 return memcmp(k1, k2, sizeof(struct reiserfs_key)); comp_le_keys() 131 comp_le_keys(const struct reiserfs_key *k1, const struct reiserfs_key *k2) comp_le_keys() argument
|
/linux-4.1.27/fs/btrfs/ |
H A D | ctree.c | 1585 static int comp_keys(struct btrfs_disk_key *disk, struct btrfs_key *k2) comp_keys() argument 1591 return btrfs_comp_cpu_keys(&k1, k2); comp_keys() 1597 int btrfs_comp_cpu_keys(struct btrfs_key *k1, struct btrfs_key *k2) btrfs_comp_cpu_keys() argument 1599 if (k1->objectid > k2->objectid) btrfs_comp_cpu_keys() 1601 if (k1->objectid < k2->objectid) btrfs_comp_cpu_keys() 1603 if (k1->type > k2->type) btrfs_comp_cpu_keys() 1605 if (k1->type < k2->type) btrfs_comp_cpu_keys() 1607 if (k1->offset > k2->offset) btrfs_comp_cpu_keys() 1609 if (k1->offset < k2->offset) btrfs_comp_cpu_keys()
|
H A D | ctree.h | 3521 int btrfs_comp_cpu_keys(struct btrfs_key *k1, struct btrfs_key *k2);
|
/linux-4.1.27/arch/ia64/kernel/ |
H A D | ivt.S | 69 * This lets you track the last eight faults that occurred on the CPU. Make sure ar.k2 isn't 72 # define DBG_FAULT(i) mov r16=ar.k2;; shl r16=r16,8;; add r16=(i),r16;;mov ar.k2=r16
|
/linux-4.1.27/security/selinux/ss/ |
H A D | policydb.c | 217 static int filenametr_cmp(struct hashtab *h, const void *k1, const void *k2) filenametr_cmp() argument 220 const struct filename_trans *ft2 = k2; filenametr_cmp() 246 static int rangetr_cmp(struct hashtab *h, const void *k1, const void *k2) rangetr_cmp() argument 248 const struct range_trans *key1 = k1, *key2 = k2; rangetr_cmp()
|
/linux-4.1.27/arch/x86/crypto/ |
H A D | camellia_glue.c | 1074 /* k1, k2 */ camellia_setup128() 1216 /* k2 */ camellia_setup256()
|
/linux-4.1.27/include/sound/ |
H A D | emu10k1.h | 91 #define IPR_SPDIFBUFFULL 0x04000000 /* SPDIF capture related, 10k2 only? (RE) */ 279 #define A_IOCFG_DISABLE_AC97_FRONT 0x0080 /* turn off ac97 front -> front (10k2.1) */ 283 /* + digital for generic 10k2 */
|
/linux-4.1.27/drivers/net/irda/ |
H A D | sa1100_ir.c | 973 * We support original IRDA up to 115k2. (we don't currently sa1100_irda_probe()
|
/linux-4.1.27/arch/cris/arch-v10/kernel/ |
H A D | entry.S | 486 ;; time for an oops-dump over a 115k2 serial wire. Another 100ms should do.
|
/linux-4.1.27/drivers/net/ethernet/intel/ixgb/ |
H A D | ixgb_main.c | 38 #define DRV_VERSION "1.0.135-k2" DRIVERNAPI
|
/linux-4.1.27/drivers/net/ethernet/intel/ |
H A D | e100.c | 179 #define DRV_VERSION "3.5.24-k2"DRV_EXT
|
/linux-4.1.27/include/net/ |
H A D | mac80211.h | 4252 * @k2: a buffer to be filled with the 2nd sub-key 4255 u8 *k1, u8 *k2);
|