/linux-4.1.27/arch/sh/kernel/cpu/sh3/ |
H A D | entry.S | 74 #define k3 r3 define 88 * k3 scratch (Return address) 203 ldc k3, ssr 215 ! k3 returns original sr 245 mov.l @r15+, k3 ! original SR 260 mov k3, k2 ! original SR value 266 mov k3, k0 ! Calculate IMASK-bits 301 sts pr, k3 ! save original pr value in k3 352 sts pr, k3 ! save original pr value in k3 364 bsr save_regs ! needs original pr value in k3 389 ! k3 passes original pr* 400 mov.l k3, @-r15 ! original pr in k3 412 mov.l 0f, k3 ! SR bits to set in k3 419 ! k3 passes bits to set in SR 424 or k3, r8 443 sts pr, k3 ! save original pr value in k3 452 bsr save_regs ! needs original pr value in k3
|
H A D | swsusp.S | 19 #define k3 r3 define 70 ldc k3, ssr 120 stc r0_bank, k3 ! fetch old pr from r0_bank0
|
/linux-4.1.27/crypto/ |
H A D | tea.c | 65 u32 k0, k1, k2, k3; tea_encrypt() local 76 k3 = ctx->KEY[3]; tea_encrypt() 83 z += ((y << 4) + k2) ^ (y + sum) ^ ((y >> 5) + k3); tea_encrypt() 93 u32 k0, k1, k2, k3; tea_decrypt() local 104 k3 = ctx->KEY[3]; tea_decrypt() 111 z -= ((y << 4) + k2) ^ (y + sum) ^ ((y >> 5) + k3); tea_decrypt()
|
H A D | vmac.c | 247 #define k3 (*(((u32 *)kh)+INDEX_HIGH)) poly_step_func() macro 252 p = MUL32(a3, k3); poly_step_func() 260 p += MUL32(a0, k3); poly_step_func() 268 q = MUL32(a1, k3); poly_step_func() 278 q = MUL32(a2, k3); poly_step_func() 293 #undef k3 poly_step_func() macro
|
H A D | camellia_generic.c | 580 /* k3 */ camellia_setup128() 713 /* k3 */ camellia_setup256()
|
H A D | des_generic.c | 857 * equal (k1 == k2 or k2 == k3), then the DES3 operation is simply the
|
/linux-4.1.27/drivers/staging/skein/ |
H A D | threefish_block.c | 9 k2 = key_ctx->key[2], k3 = key_ctx->key[3], threefish_encrypt_256() local 18 b3 += k3; threefish_encrypt_256() 45 b2 += b3 + k3 + t2; threefish_encrypt_256() 67 b1 += k3 + t2; threefish_encrypt_256() 94 b0 += b1 + k3; threefish_encrypt_256() 150 b3 += k3 + 5; threefish_encrypt_256() 178 b2 += b3 + k3 + t1; threefish_encrypt_256() 199 b1 += k3 + t1; threefish_encrypt_256() 227 b0 += b1 + k3; threefish_encrypt_256() 283 b3 += k3 + 10; threefish_encrypt_256() 310 b2 += b3 + k3 + t0; threefish_encrypt_256() 332 b1 += k3 + t0; threefish_encrypt_256() 359 b0 += b1 + k3; threefish_encrypt_256() 415 b3 += k3 + 15; threefish_encrypt_256() 443 b2 += b3 + k3 + t2; threefish_encrypt_256() 464 b1 += k3 + t2; threefish_encrypt_256() 490 output[0] = b0 + k3; threefish_encrypt_256() 502 k2 = key_ctx->key[2], k3 = key_ctx->key[3], threefish_decrypt_256() local 509 b0 -= k3; threefish_decrypt_256() 540 b1 -= k3 + t2; threefish_decrypt_256() 578 b2 -= b3 + k3 + t2; threefish_decrypt_256() 614 b3 -= k3 + 15; threefish_decrypt_256() 677 b0 -= b1 + k3; threefish_decrypt_256() 712 b1 -= k3 + t0; threefish_decrypt_256() 751 b2 -= b3 + k3 + t0; threefish_decrypt_256() 786 b3 -= k3 + 10; threefish_decrypt_256() 849 b0 -= b1 + k3; threefish_decrypt_256() 885 b1 -= k3 + t1; threefish_decrypt_256() 923 b2 -= b3 + k3 + t1; threefish_decrypt_256() 959 b3 -= k3 + 5; threefish_decrypt_256() 1022 b0 -= b1 + k3; threefish_decrypt_256() 1057 b1 -= k3 + t2; threefish_decrypt_256() 1096 b2 -= b3 + k3 + t2; threefish_decrypt_256() 1131 b3 -= k3; threefish_decrypt_256() 1147 k2 = key_ctx->key[2], k3 = key_ctx->key[3], threefish_encrypt_512() local 1158 b3 += k3; threefish_encrypt_512() 1211 b2 += b3 + k3; threefish_encrypt_512() 1258 b1 += k3; threefish_encrypt_512() 1311 b0 += b1 + k3; threefish_encrypt_512() 1426 b7 += k3 + 5; threefish_encrypt_512() 1479 b6 += b7 + k3 + t1; threefish_encrypt_512() 1526 b5 += k3 + t1; threefish_encrypt_512() 1579 b4 += b5 + k3; threefish_encrypt_512() 1626 b3 += k3; threefish_encrypt_512() 1679 b2 += b3 + k3; threefish_encrypt_512() 1726 b1 += k3; threefish_encrypt_512() 1779 b0 += b1 + k3; threefish_encrypt_512() 1894 b7 += k3 + 14; threefish_encrypt_512() 1947 b6 += b7 + k3 + t1; threefish_encrypt_512() 1994 b5 += k3 + t1; threefish_encrypt_512() 2047 b4 += b5 + k3; threefish_encrypt_512() 2093 output[3] = b3 + k3; threefish_encrypt_512() 2108 k2 = key_ctx->key[2], k3 = key_ctx->key[3], threefish_decrypt_512() local 2120 b3 -= k3; threefish_decrypt_512() 2181 b4 -= b5 + k3; threefish_decrypt_512() 2250 b5 -= k3 + t1; threefish_decrypt_512() 2312 b6 -= b7 + k3 + t1; threefish_decrypt_512() 2381 b7 -= k3 + 14; threefish_decrypt_512() 2531 b0 -= b1 + k3; threefish_decrypt_512() 2600 b1 -= k3; threefish_decrypt_512() 2662 b2 -= b3 + k3; threefish_decrypt_512() 2731 b3 -= k3; threefish_decrypt_512() 2793 b4 -= b5 + k3; threefish_decrypt_512() 2862 b5 -= k3 + t1; threefish_decrypt_512() 2924 b6 -= b7 + k3 + t1; threefish_decrypt_512() 2993 b7 -= k3 + 5; threefish_decrypt_512() 3143 b0 -= b1 + k3; threefish_decrypt_512() 3212 b1 -= k3; threefish_decrypt_512() 3274 b2 -= b3 + k3; threefish_decrypt_512() 3343 b3 -= k3; threefish_decrypt_512() 3373 k2 = key_ctx->key[2], k3 = key_ctx->key[3], threefish_encrypt_1024() local 3388 b3 += k3; threefish_encrypt_1024() 3493 b2 += b3 + k3; threefish_encrypt_1024() 3592 b1 += k3; threefish_encrypt_1024() 3697 b0 += b1 + k3; threefish_encrypt_1024() 3932 b15 += k3 + 5; threefish_encrypt_1024() 4037 b14 += b15 + k3 + t1; threefish_encrypt_1024() 4136 b13 += k3 + t1; threefish_encrypt_1024() 4241 b12 += b13 + k3; threefish_encrypt_1024() 4340 b11 += k3; threefish_encrypt_1024() 4445 b10 += b11 + k3; threefish_encrypt_1024() 4544 b9 += k3; threefish_encrypt_1024() 4649 b8 += b9 + k3; threefish_encrypt_1024() 4748 b7 += k3; threefish_encrypt_1024() 4853 b6 += b7 + k3; threefish_encrypt_1024() 4952 b5 += k3; threefish_encrypt_1024() 5057 b4 += b5 + k3; threefish_encrypt_1024() 5156 b3 += k3; threefish_encrypt_1024() 5261 b2 += b3 + k3; threefish_encrypt_1024() 5360 b1 += k3; threefish_encrypt_1024() 5464 output[0] = b0 + k3; threefish_encrypt_1024() 5494 k2 = key_ctx->key[2], k3 = key_ctx->key[3], threefish_decrypt_1024() local 5506 b0 -= k3; threefish_decrypt_1024() 5656 b1 -= k3; threefish_decrypt_1024() 5786 b2 -= b3 + k3; threefish_decrypt_1024() 5923 b3 -= k3; threefish_decrypt_1024() 6053 b4 -= b5 + k3; threefish_decrypt_1024() 6190 b5 -= k3; threefish_decrypt_1024() 6320 b6 -= b7 + k3; threefish_decrypt_1024() 6457 b7 -= k3; threefish_decrypt_1024() 6587 b8 -= b9 + k3; threefish_decrypt_1024() 6724 b9 -= k3; threefish_decrypt_1024() 6854 b10 -= b11 + k3; threefish_decrypt_1024() 6991 b11 -= k3; threefish_decrypt_1024() 7121 b12 -= b13 + k3; threefish_decrypt_1024() 7258 b13 -= k3 + t1; threefish_decrypt_1024() 7388 b14 -= b15 + k3 + t1; threefish_decrypt_1024() 7525 b15 -= k3 + 5; threefish_decrypt_1024() 7831 b0 -= b1 + k3; threefish_decrypt_1024() 7968 b1 -= k3; threefish_decrypt_1024() 8098 b2 -= b3 + k3; threefish_decrypt_1024() 8235 b3 -= k3; threefish_decrypt_1024()
|
/linux-4.1.27/drivers/mmc/host/ |
H A D | dw_mmc-k3.c | 97 MODULE_ALIAS("platform:dwmmc-k3");
|
H A D | Makefile | 47 obj-$(CONFIG_MMC_DW_K3) += dw_mmc-k3.o
|
/linux-4.1.27/arch/sparc/crypto/ |
H A D | des_glue.c | 208 u64 k3[DES_EXPKEY_WORDS / 2]; des3_ede_set_key() local 221 des_sparc64_key_expand((const u32 *)key, k3); des3_ede_set_key() 226 &k3[0], sizeof(k3)); des3_ede_set_key() 228 encrypt_to_decrypt(&dctx->decrypt_expkey[0], &k3[0]); des3_ede_set_key()
|
/linux-4.1.27/drivers/video/fbdev/msm/ |
H A D | mdp_ppp.c | 218 int64_t k1, k2, k3, k4, tmp; scale_params() local 231 k3 = (n + 1) >> 1; scale_params() 232 if ((k3 >> 4) < (1LL << 27) || (k3 >> 4) > (1LL << 31)) { scale_params() 245 k4 = (k3 - ONE) >> 1; scale_params() 256 od = (((k3 * os) >> 1) + k4); scale_params()
|
/linux-4.1.27/net/ipv4/ |
H A D | tcp_illinois.c | 206 * k3 = ------------------- beta() 213 * b = k3 + k4 da beta()
|
/linux-4.1.27/drivers/media/tuners/ |
H A D | tuner-xc2028-types.h | 103 It is not clear where secam/k3 is used, nor we have a feedback of this
|
/linux-4.1.27/arch/ia64/include/asm/ |
H A D | kregs.h | 17 #define IA64_KR_PER_CPU_DATA 3 /* ar.k3: physical per-CPU base */
|
/linux-4.1.27/drivers/dma/ |
H A D | k3dma.c | 26 #define DRIVER_NAME "k3-dma" 653 { .compatible = "hisilicon,k3-dma-1.0", }, 846 MODULE_DESCRIPTION("Hisilicon k3 DMA Driver");
|
/linux-4.1.27/arch/ia64/mm/ |
H A D | contig.c | 116 * Update ar.k3. This move is ensures that percpu for_each_possible_cpu()
|
H A D | discontig.c | 158 * Update ar.k3. This move is ensures that percpu for_each_possible_early_cpu()
|
/linux-4.1.27/arch/s390/crypto/ |
H A D | des_s390.c | 234 * equal (k1 == k2 or k2 == k3), then the DES3 operation is simply the
|
/linux-4.1.27/arch/arm/mach-omap2/ |
H A D | mux34xx.c | 898 _OMAP3_BALLENTRY(SDMMC2_DAT7, "k3", NULL), 1149 _OMAP3_BALLENTRY(GPMC_A2, "k3", NULL), 1465 _OMAP3_BALLENTRY(GPMC_A10, "k3", "ab19"), 1893 _OMAP3_BALLENTRY(GPMC_A10, "k3", "ab19"),
|
/linux-4.1.27/arch/ia64/kernel/ |
H A D | setup.c | 941 * Set ar.k3 so that assembly code in MCA handler can compute cpu_init() 943 * phys = ar.k3 + &per_cpu_var cpu_init()
|
/linux-4.1.27/arch/x86/crypto/ |
H A D | camellia_glue.c | 1018 /* k3 */ camellia_setup128() 1147 /* k3 */ camellia_setup256()
|