Searched refs:k2 (Results 1 - 45 of 45) sorted by relevance

/linux-4.1.27/include/linux/
H A Dbtree-128.h21 static inline void *btree_lookup128(struct btree_head128 *head, u64 k1, u64 k2) btree_lookup128() argument
23 u64 key[2] = {k1, k2}; btree_lookup128()
28 u64 *k1, u64 *k2) btree_get_prev128()
30 u64 key[2] = {*k1, *k2}; btree_get_prev128()
36 *k2 = key[1]; btree_get_prev128()
40 static inline int btree_insert128(struct btree_head128 *head, u64 k1, u64 k2, btree_insert128() argument
43 u64 key[2] = {k1, k2}; btree_insert128()
48 static inline int btree_update128(struct btree_head128 *head, u64 k1, u64 k2, btree_update128() argument
51 u64 key[2] = {k1, k2}; btree_update128()
56 static inline void *btree_remove128(struct btree_head128 *head, u64 k1, u64 k2) btree_remove128() argument
58 u64 key[2] = {k1, k2}; btree_remove128()
62 static inline void *btree_last128(struct btree_head128 *head, u64 *k1, u64 *k2) btree_last128() argument
70 *k2 = key[1]; btree_last128()
105 #define btree_for_each_safe128(head, k1, k2, val) \
106 for (val = btree_last128(head, &k1, &k2); \
108 val = btree_get_prev128(head, &k1, &k2))
27 btree_get_prev128(struct btree_head128 *head, u64 *k1, u64 *k2) btree_get_prev128() argument
/linux-4.1.27/arch/arm64/crypto/
H A Daes-ce.S71 .macro fin_round_Nx, de, k, k2, i0, i1, i2, i3
80 eor \i0\().16b, \i0\().16b, \k2\().16b
82 eor \i1\().16b, \i1\().16b, \k2\().16b
84 eor \i2\().16b, \i2\().16b, \k2\().16b
85 eor \i3\().16b, \i3\().16b, \k2\().16b
/linux-4.1.27/arch/sh/kernel/cpu/sh3/
H A Dentry.S73 #define k2 r2 define
87 * k2 scratch (Exception code)
197 lds k2, pr ! restore pr
214 ! k2 returns original pr
244 mov.l @r15+, k2 ! original PR
257 lds k2, pr ! restore pr
260 mov k3, k2 ! original SR value
264 and k1, k2 ! Mask original SR value
274 6: or k0, k2 ! Set the IMASK-bits
275 ldc k2, ssr
308 ! k2 trashed
362 mov.l 5f, k2 ! vector register address
365 mov.l @k2, k2 ! read out vector and keep in k2
372 stc r2_bank, r0 ! k2 (vector)
453 mov #-1, k2 ! default vector kept in k2
H A Dswsusp.S18 #define k2 r2 define
69 lds k2, pr
/linux-4.1.27/net/mac80211/
H A Daes_cmac.c150 u8 *k1, u8 *k2) ieee80211_aes_cmac_calculate_k1_k2()
161 memcpy(k2, k1, AES_BLOCK_SIZE); ieee80211_aes_cmac_calculate_k1_k2()
162 gf_mulx(k2); ieee80211_aes_cmac_calculate_k1_k2()
149 ieee80211_aes_cmac_calculate_k1_k2(struct ieee80211_key_conf *keyconf, u8 *k1, u8 *k2) ieee80211_aes_cmac_calculate_k1_k2() argument
/linux-4.1.27/crypto/
H A Dtea.c65 u32 k0, k1, k2, k3; tea_encrypt() local
75 k2 = ctx->KEY[2]; tea_encrypt()
83 z += ((y << 4) + k2) ^ (y + sum) ^ ((y >> 5) + k3); tea_encrypt()
93 u32 k0, k1, k2, k3; tea_decrypt() local
103 k2 = ctx->KEY[2]; tea_decrypt()
111 z -= ((y << 4) + k2) ^ (y + sum) ^ ((y >> 5) + k3); tea_decrypt()
H A Dvmac.c246 #define k2 (*(((u32 *)kh)+INDEX_LOW)) poly_step_func() macro
255 p += MUL32(a0, k2); poly_step_func()
261 p += MUL32(a1, k2); poly_step_func()
269 q += MUL32(a2, k2); poly_step_func()
279 q += MUL32(a3, k2); poly_step_func()
292 #undef k2 poly_step_func() macro
328 static u64 l3hash(u64 p1, u64 p2, u64 k1, u64 k2, u64 len) l3hash() argument
348 /* compute (p1+k1)%p64 and (p2+k2)%p64 */ l3hash()
351 p2 += k2; l3hash()
352 p2 += (0 - (p2 < k2)) & 257; l3hash()
354 /* compute (p1+k1)*(p2+k2)%p64 */ l3hash()
H A Dcamellia_generic.c634 /* k1, k2 */ camellia_setup128()
792 /* k2 */ camellia_setup256()
H A Ddes_generic.c857 * equal (k1 == k2 or k2 == k3), then the DES3 operation is simply the
/linux-4.1.27/drivers/staging/skein/
H A Dthreefish_block.c9 k2 = key_ctx->key[2], k3 = key_ctx->key[3], threefish_encrypt_256() local
19 b2 += b3 + k2 + t1; threefish_encrypt_256()
40 b1 += k2 + t1; threefish_encrypt_256()
68 b0 += b1 + k2; threefish_encrypt_256()
124 b3 += k2 + 4; threefish_encrypt_256()
151 b2 += b3 + k2 + t0; threefish_encrypt_256()
173 b1 += k2 + t0; threefish_encrypt_256()
200 b0 += b1 + k2; threefish_encrypt_256()
256 b3 += k2 + 9; threefish_encrypt_256()
284 b2 += b3 + k2 + t2; threefish_encrypt_256()
305 b1 += k2 + t2; threefish_encrypt_256()
333 b0 += b1 + k2; threefish_encrypt_256()
389 b3 += k2 + 14; threefish_encrypt_256()
416 b2 += b3 + k2 + t1; threefish_encrypt_256()
438 b1 += k2 + t1; threefish_encrypt_256()
465 b0 += b1 + k2; threefish_encrypt_256()
502 k2 = key_ctx->key[2], k3 = key_ctx->key[3], threefish_decrypt_256() local
539 b0 -= b1 + k2; threefish_decrypt_256()
574 b1 -= k2 + t1; threefish_decrypt_256()
613 b2 -= b3 + k2 + t1; threefish_decrypt_256()
648 b3 -= k2 + 14; threefish_decrypt_256()
711 b0 -= b1 + k2; threefish_decrypt_256()
747 b1 -= k2 + t2; threefish_decrypt_256()
785 b2 -= b3 + k2 + t2; threefish_decrypt_256()
821 b3 -= k2 + 9; threefish_decrypt_256()
884 b0 -= b1 + k2; threefish_decrypt_256()
919 b1 -= k2 + t0; threefish_decrypt_256()
958 b2 -= b3 + k2 + t0; threefish_decrypt_256()
993 b3 -= k2 + 4; threefish_decrypt_256()
1056 b0 -= b1 + k2; threefish_decrypt_256()
1092 b1 -= k2 + t1; threefish_decrypt_256()
1130 b2 -= b3 + k2 + t1; threefish_decrypt_256()
1147 k2 = key_ctx->key[2], k3 = key_ctx->key[3], threefish_encrypt_512() local
1159 b2 += b3 + k2; threefish_encrypt_512()
1206 b1 += k2; threefish_encrypt_512()
1259 b0 += b1 + k2; threefish_encrypt_512()
1374 b7 += k2 + 4; threefish_encrypt_512()
1427 b6 += b7 + k2 + t0; threefish_encrypt_512()
1474 b5 += k2 + t0; threefish_encrypt_512()
1527 b4 += b5 + k2; threefish_encrypt_512()
1574 b3 += k2; threefish_encrypt_512()
1627 b2 += b3 + k2; threefish_encrypt_512()
1674 b1 += k2; threefish_encrypt_512()
1727 b0 += b1 + k2; threefish_encrypt_512()
1842 b7 += k2 + 13; threefish_encrypt_512()
1895 b6 += b7 + k2 + t0; threefish_encrypt_512()
1942 b5 += k2 + t0; threefish_encrypt_512()
1995 b4 += b5 + k2; threefish_encrypt_512()
2042 b3 += k2; threefish_encrypt_512()
2092 output[2] = b2 + k2; threefish_encrypt_512()
2108 k2 = key_ctx->key[2], k3 = key_ctx->key[3], threefish_decrypt_512() local
2119 b2 -= k2; threefish_decrypt_512()
2187 b3 -= k2; threefish_decrypt_512()
2249 b4 -= b5 + k2; threefish_decrypt_512()
2318 b5 -= k2 + t0; threefish_decrypt_512()
2380 b6 -= b7 + k2 + t0; threefish_decrypt_512()
2449 b7 -= k2 + 13; threefish_decrypt_512()
2599 b0 -= b1 + k2; threefish_decrypt_512()
2668 b1 -= k2; threefish_decrypt_512()
2730 b2 -= b3 + k2; threefish_decrypt_512()
2799 b3 -= k2; threefish_decrypt_512()
2861 b4 -= b5 + k2; threefish_decrypt_512()
2930 b5 -= k2 + t0; threefish_decrypt_512()
2992 b6 -= b7 + k2 + t0; threefish_decrypt_512()
3061 b7 -= k2 + 4; threefish_decrypt_512()
3211 b0 -= b1 + k2; threefish_decrypt_512()
3280 b1 -= k2; threefish_decrypt_512()
3342 b2 -= b3 + k2; threefish_decrypt_512()
3373 k2 = key_ctx->key[2], k3 = key_ctx->key[3], threefish_encrypt_1024() local
3389 b2 += b3 + k2; threefish_encrypt_1024()
3488 b1 += k2; threefish_encrypt_1024()
3593 b0 += b1 + k2; threefish_encrypt_1024()
3828 b15 += k2 + 4; threefish_encrypt_1024()
3933 b14 += b15 + k2 + t0; threefish_encrypt_1024()
4032 b13 += k2 + t0; threefish_encrypt_1024()
4137 b12 += b13 + k2; threefish_encrypt_1024()
4236 b11 += k2; threefish_encrypt_1024()
4341 b10 += b11 + k2; threefish_encrypt_1024()
4440 b9 += k2; threefish_encrypt_1024()
4545 b8 += b9 + k2; threefish_encrypt_1024()
4644 b7 += k2; threefish_encrypt_1024()
4749 b6 += b7 + k2; threefish_encrypt_1024()
4848 b5 += k2; threefish_encrypt_1024()
4953 b4 += b5 + k2; threefish_encrypt_1024()
5052 b3 += k2; threefish_encrypt_1024()
5157 b2 += b3 + k2; threefish_encrypt_1024()
5256 b1 += k2; threefish_encrypt_1024()
5361 b0 += b1 + k2; threefish_encrypt_1024()
5494 k2 = key_ctx->key[2], k3 = key_ctx->key[3], threefish_decrypt_1024() local
5655 b0 -= b1 + k2; threefish_decrypt_1024()
5792 b1 -= k2; threefish_decrypt_1024()
5922 b2 -= b3 + k2; threefish_decrypt_1024()
6059 b3 -= k2; threefish_decrypt_1024()
6189 b4 -= b5 + k2; threefish_decrypt_1024()
6326 b5 -= k2; threefish_decrypt_1024()
6456 b6 -= b7 + k2; threefish_decrypt_1024()
6593 b7 -= k2; threefish_decrypt_1024()
6723 b8 -= b9 + k2; threefish_decrypt_1024()
6860 b9 -= k2; threefish_decrypt_1024()
6990 b10 -= b11 + k2; threefish_decrypt_1024()
7127 b11 -= k2; threefish_decrypt_1024()
7257 b12 -= b13 + k2; threefish_decrypt_1024()
7394 b13 -= k2 + t0; threefish_decrypt_1024()
7524 b14 -= b15 + k2 + t0; threefish_decrypt_1024()
7661 b15 -= k2 + 4; threefish_decrypt_1024()
7967 b0 -= b1 + k2; threefish_decrypt_1024()
8104 b1 -= k2; threefish_decrypt_1024()
8234 b2 -= b3 + k2; threefish_decrypt_1024()
/linux-4.1.27/sound/pci/ctxfi/
H A Dcthardware.c57 case 0x000B: /* 20k2 device */ destroy_hw_obj()
H A Dcthardware.h38 /* 20k2 models */
H A Dcthw20k2.c11 * This file contains the implementation of hardware access method for 20k2.
50 * The layout of control structures can be directly applied on 20k2 chip.
2061 /* Switch to 20k2 mode from UAA mode. */ hw_card_start()
H A Dctatc.c74 /* 20k2 models */
H A Dcthw20k1.c49 * The layout of control structures can be directly applied on 20k2 chip.
/linux-4.1.27/fs/xfs/libxfs/
H A Dxfs_alloc_btree.c392 union xfs_btree_key *k2) xfs_allocbt_keys_inorder()
396 be32_to_cpu(k2->alloc.ar_startblock); xfs_allocbt_keys_inorder()
399 be32_to_cpu(k2->alloc.ar_blockcount) || xfs_allocbt_keys_inorder()
400 (k1->alloc.ar_blockcount == k2->alloc.ar_blockcount && xfs_allocbt_keys_inorder()
402 be32_to_cpu(k2->alloc.ar_startblock)); xfs_allocbt_keys_inorder()
389 xfs_allocbt_keys_inorder( struct xfs_btree_cur *cur, union xfs_btree_key *k1, union xfs_btree_key *k2) xfs_allocbt_keys_inorder() argument
H A Dxfs_ialloc_btree.c307 union xfs_btree_key *k2) xfs_inobt_keys_inorder()
310 be32_to_cpu(k2->inobt.ir_startino); xfs_inobt_keys_inorder()
304 xfs_inobt_keys_inorder( struct xfs_btree_cur *cur, union xfs_btree_key *k1, union xfs_btree_key *k2) xfs_inobt_keys_inorder() argument
H A Dxfs_btree.h168 /* check that k1 is lower than k2 */
171 union xfs_btree_key *k2);
H A Dxfs_bmap_btree.c732 union xfs_btree_key *k2) xfs_bmbt_keys_inorder()
735 be64_to_cpu(k2->bmbt.br_startoff); xfs_bmbt_keys_inorder()
729 xfs_bmbt_keys_inorder( struct xfs_btree_cur *cur, union xfs_btree_key *k1, union xfs_btree_key *k2) xfs_bmbt_keys_inorder() argument
/linux-4.1.27/fs/hfsplus/
H A Dcatalog.c16 const hfsplus_btree_key *k2) hfsplus_cat_case_cmp_key()
21 k2p = k2->cat.parent; hfsplus_cat_case_cmp_key()
25 return hfsplus_strcasecmp(&k1->cat.name, &k2->cat.name); hfsplus_cat_case_cmp_key()
29 const hfsplus_btree_key *k2) hfsplus_cat_bin_cmp_key()
34 k2p = k2->cat.parent; hfsplus_cat_bin_cmp_key()
38 return hfsplus_strcmp(&k1->cat.name, &k2->cat.name); hfsplus_cat_bin_cmp_key()
15 hfsplus_cat_case_cmp_key(const hfsplus_btree_key *k1, const hfsplus_btree_key *k2) hfsplus_cat_case_cmp_key() argument
28 hfsplus_cat_bin_cmp_key(const hfsplus_btree_key *k1, const hfsplus_btree_key *k2) hfsplus_cat_bin_cmp_key() argument
H A Dattributes.c35 const hfsplus_btree_key *k2) hfsplus_attr_bin_cmp_key()
40 k2_cnid = k2->attr.cnid; hfsplus_attr_bin_cmp_key()
46 (const struct hfsplus_unistr *)&k2->attr.key_name); hfsplus_attr_bin_cmp_key()
34 hfsplus_attr_bin_cmp_key(const hfsplus_btree_key *k1, const hfsplus_btree_key *k2) hfsplus_attr_bin_cmp_key() argument
H A Dextents.c20 const hfsplus_btree_key *k2) hfsplus_ext_cmp_key()
26 k2id = k2->ext.cnid; hfsplus_ext_cmp_key()
30 if (k1->ext.fork_type != k2->ext.fork_type) hfsplus_ext_cmp_key()
31 return k1->ext.fork_type < k2->ext.fork_type ? -1 : 1; hfsplus_ext_cmp_key()
34 k2s = k2->ext.start_block; hfsplus_ext_cmp_key()
19 hfsplus_ext_cmp_key(const hfsplus_btree_key *k1, const hfsplus_btree_key *k2) hfsplus_ext_cmp_key() argument
H A Dhfsplus_fs.h373 const hfsplus_btree_key *k2);
443 const hfsplus_btree_key *k2);
445 const hfsplus_btree_key *k2);
465 const hfsplus_btree_key *k2);
/linux-4.1.27/arch/sparc/crypto/
H A Ddes_glue.c207 u64 k2[DES_EXPKEY_WORDS / 2]; des3_ede_set_key() local
219 des_sparc64_key_expand((const u32 *)key, k2); des3_ede_set_key()
224 encrypt_to_decrypt(&dctx->encrypt_expkey[DES_EXPKEY_WORDS / 2], &k2[0]); des3_ede_set_key()
230 &k2[0], sizeof(k2)); des3_ede_set_key()
/linux-4.1.27/drivers/crypto/ccp/
H A Dccp-crypto-aes-cmac.c302 gk = (__be64 *)ctx->u.aes.k2; ccp_aes_cmac_setkey()
309 sg_init_one(&ctx->u.aes.k2_sg, ctx->u.aes.k2, sizeof(ctx->u.aes.k2)); ccp_aes_cmac_setkey()
H A Dccp-crypto.h92 u8 k2[AES_BLOCK_SIZE]; member in struct:ccp_aes_ctx
/linux-4.1.27/net/core/
H A Dflow.c176 const flow_compare_t *k1, *k1_lim, *k2; flow_key_compare() local
181 k2 = (const flow_compare_t *) key2; flow_key_compare()
184 if (*k1++ != *k2++) flow_key_compare()
/linux-4.1.27/net/ipv4/
H A Dtcp_illinois.c168 * k2 = ---------------- - d1 alpha()
173 * k2 + da alpha()
/linux-4.1.27/drivers/video/fbdev/msm/
H A Dmdp_ppp.c218 int64_t k1, k2, k3, k4, tmp; scale_params() local
242 k2 = (k1 - ONE) >> 1; scale_params()
244 *phase_init = (int)(k2 >> 4); scale_params()
270 os_p = ((k1 * (od_p >> 33)) + k2); scale_params()
/linux-4.1.27/arch/s390/crypto/
H A Ddes_s390.c234 * equal (k1 == k2 or k2 == k3), then the DES3 operation is simply the
/linux-4.1.27/arch/arm/mach-omap2/
H A Dmux34xx.c811 _OMAP3_BALLENTRY(GPMC_D15, "m2", "k2"),
814 _OMAP3_BALLENTRY(GPMC_NBE0_CLE, "k2", NULL),
1150 _OMAP3_BALLENTRY(GPMC_A3, "k2", NULL),
1482 _OMAP3_BALLENTRY(GPMC_D9, "k2", "ac3"),
1910 _OMAP3_BALLENTRY(GPMC_D9, "k2", "ac3"),
/linux-4.1.27/drivers/media/usb/gspca/
H A Dsonixj.c1809 u8 k2; setbrightness() local
1811 k2 = (brightness - 0x80) >> 2; setbrightness()
1814 if (k2 > 0x1f) setbrightness()
1815 k2 = 0; /* only positive Y offset */ setbrightness()
1848 reg_w1(gspca_dev, 0x96, k2); /* color matrix Y offset */ setbrightness()
1854 u8 k2; setcontrast() local
1857 k2 = sd->contrast->val * 37 / (CONTRAST_MAX + 1) setcontrast()
1859 contrast[0] = (k2 + 1) / 2; /* red */ setcontrast()
1861 contrast[2] = k2; /* green */ setcontrast()
1863 contrast[4] = k2 / 5; /* blue */ setcontrast()
/linux-4.1.27/drivers/i2c/busses/
H A Di2c-powermac.c269 if (of_device_is_compatible(busnode, "k2-i2c") && !found_onyx) { i2c_powermac_add_missing()
/linux-4.1.27/fs/reiserfs/
H A Dstree.c37 * form. k2 is pointer to cpu variable. For key of items of the same
62 * form. k2 is pointer to cpu variable.
132 const struct reiserfs_key *k2) comp_le_keys()
134 return memcmp(k1, k2, sizeof(struct reiserfs_key)); comp_le_keys()
131 comp_le_keys(const struct reiserfs_key *k1, const struct reiserfs_key *k2) comp_le_keys() argument
/linux-4.1.27/fs/btrfs/
H A Dctree.c1585 static int comp_keys(struct btrfs_disk_key *disk, struct btrfs_key *k2) comp_keys() argument
1591 return btrfs_comp_cpu_keys(&k1, k2); comp_keys()
1597 int btrfs_comp_cpu_keys(struct btrfs_key *k1, struct btrfs_key *k2) btrfs_comp_cpu_keys() argument
1599 if (k1->objectid > k2->objectid) btrfs_comp_cpu_keys()
1601 if (k1->objectid < k2->objectid) btrfs_comp_cpu_keys()
1603 if (k1->type > k2->type) btrfs_comp_cpu_keys()
1605 if (k1->type < k2->type) btrfs_comp_cpu_keys()
1607 if (k1->offset > k2->offset) btrfs_comp_cpu_keys()
1609 if (k1->offset < k2->offset) btrfs_comp_cpu_keys()
H A Dctree.h3521 int btrfs_comp_cpu_keys(struct btrfs_key *k1, struct btrfs_key *k2);
/linux-4.1.27/arch/ia64/kernel/
H A Divt.S69 * This lets you track the last eight faults that occurred on the CPU. Make sure ar.k2 isn't
72 # define DBG_FAULT(i) mov r16=ar.k2;; shl r16=r16,8;; add r16=(i),r16;;mov ar.k2=r16
/linux-4.1.27/security/selinux/ss/
H A Dpolicydb.c217 static int filenametr_cmp(struct hashtab *h, const void *k1, const void *k2) filenametr_cmp() argument
220 const struct filename_trans *ft2 = k2; filenametr_cmp()
246 static int rangetr_cmp(struct hashtab *h, const void *k1, const void *k2) rangetr_cmp() argument
248 const struct range_trans *key1 = k1, *key2 = k2; rangetr_cmp()
/linux-4.1.27/arch/x86/crypto/
H A Dcamellia_glue.c1074 /* k1, k2 */ camellia_setup128()
1216 /* k2 */ camellia_setup256()
/linux-4.1.27/include/sound/
H A Demu10k1.h91 #define IPR_SPDIFBUFFULL 0x04000000 /* SPDIF capture related, 10k2 only? (RE) */
279 #define A_IOCFG_DISABLE_AC97_FRONT 0x0080 /* turn off ac97 front -> front (10k2.1) */
283 /* + digital for generic 10k2 */
/linux-4.1.27/drivers/net/irda/
H A Dsa1100_ir.c973 * We support original IRDA up to 115k2. (we don't currently sa1100_irda_probe()
/linux-4.1.27/arch/cris/arch-v10/kernel/
H A Dentry.S486 ;; time for an oops-dump over a 115k2 serial wire. Another 100ms should do.
/linux-4.1.27/drivers/net/ethernet/intel/ixgb/
H A Dixgb_main.c38 #define DRV_VERSION "1.0.135-k2" DRIVERNAPI
/linux-4.1.27/drivers/net/ethernet/intel/
H A De100.c179 #define DRV_VERSION "3.5.24-k2"DRV_EXT
/linux-4.1.27/include/net/
H A Dmac80211.h4252 * @k2: a buffer to be filled with the 2nd sub-key
4255 u8 *k1, u8 *k2);

Completed in 3130 milliseconds