Searched refs:k3 (Results 1 - 21 of 21) sorted by relevance

/linux-4.1.27/arch/sh/kernel/cpu/sh3/
H A Dentry.S74 #define k3 r3 define
88 * k3 scratch (Return address)
203 ldc k3, ssr
215 ! k3 returns original sr
245 mov.l @r15+, k3 ! original SR
260 mov k3, k2 ! original SR value
266 mov k3, k0 ! Calculate IMASK-bits
301 sts pr, k3 ! save original pr value in k3
352 sts pr, k3 ! save original pr value in k3
364 bsr save_regs ! needs original pr value in k3
389 ! k3 passes original pr*
400 mov.l k3, @-r15 ! original pr in k3
412 mov.l 0f, k3 ! SR bits to set in k3
419 ! k3 passes bits to set in SR
424 or k3, r8
443 sts pr, k3 ! save original pr value in k3
452 bsr save_regs ! needs original pr value in k3
H A Dswsusp.S19 #define k3 r3 define
70 ldc k3, ssr
120 stc r0_bank, k3 ! fetch old pr from r0_bank0
/linux-4.1.27/crypto/
H A Dtea.c65 u32 k0, k1, k2, k3; tea_encrypt() local
76 k3 = ctx->KEY[3]; tea_encrypt()
83 z += ((y << 4) + k2) ^ (y + sum) ^ ((y >> 5) + k3); tea_encrypt()
93 u32 k0, k1, k2, k3; tea_decrypt() local
104 k3 = ctx->KEY[3]; tea_decrypt()
111 z -= ((y << 4) + k2) ^ (y + sum) ^ ((y >> 5) + k3); tea_decrypt()
H A Dvmac.c247 #define k3 (*(((u32 *)kh)+INDEX_HIGH)) poly_step_func() macro
252 p = MUL32(a3, k3); poly_step_func()
260 p += MUL32(a0, k3); poly_step_func()
268 q = MUL32(a1, k3); poly_step_func()
278 q = MUL32(a2, k3); poly_step_func()
293 #undef k3 poly_step_func() macro
H A Dcamellia_generic.c580 /* k3 */ camellia_setup128()
713 /* k3 */ camellia_setup256()
H A Ddes_generic.c857 * equal (k1 == k2 or k2 == k3), then the DES3 operation is simply the
/linux-4.1.27/drivers/staging/skein/
H A Dthreefish_block.c9 k2 = key_ctx->key[2], k3 = key_ctx->key[3], threefish_encrypt_256() local
18 b3 += k3; threefish_encrypt_256()
45 b2 += b3 + k3 + t2; threefish_encrypt_256()
67 b1 += k3 + t2; threefish_encrypt_256()
94 b0 += b1 + k3; threefish_encrypt_256()
150 b3 += k3 + 5; threefish_encrypt_256()
178 b2 += b3 + k3 + t1; threefish_encrypt_256()
199 b1 += k3 + t1; threefish_encrypt_256()
227 b0 += b1 + k3; threefish_encrypt_256()
283 b3 += k3 + 10; threefish_encrypt_256()
310 b2 += b3 + k3 + t0; threefish_encrypt_256()
332 b1 += k3 + t0; threefish_encrypt_256()
359 b0 += b1 + k3; threefish_encrypt_256()
415 b3 += k3 + 15; threefish_encrypt_256()
443 b2 += b3 + k3 + t2; threefish_encrypt_256()
464 b1 += k3 + t2; threefish_encrypt_256()
490 output[0] = b0 + k3; threefish_encrypt_256()
502 k2 = key_ctx->key[2], k3 = key_ctx->key[3], threefish_decrypt_256() local
509 b0 -= k3; threefish_decrypt_256()
540 b1 -= k3 + t2; threefish_decrypt_256()
578 b2 -= b3 + k3 + t2; threefish_decrypt_256()
614 b3 -= k3 + 15; threefish_decrypt_256()
677 b0 -= b1 + k3; threefish_decrypt_256()
712 b1 -= k3 + t0; threefish_decrypt_256()
751 b2 -= b3 + k3 + t0; threefish_decrypt_256()
786 b3 -= k3 + 10; threefish_decrypt_256()
849 b0 -= b1 + k3; threefish_decrypt_256()
885 b1 -= k3 + t1; threefish_decrypt_256()
923 b2 -= b3 + k3 + t1; threefish_decrypt_256()
959 b3 -= k3 + 5; threefish_decrypt_256()
1022 b0 -= b1 + k3; threefish_decrypt_256()
1057 b1 -= k3 + t2; threefish_decrypt_256()
1096 b2 -= b3 + k3 + t2; threefish_decrypt_256()
1131 b3 -= k3; threefish_decrypt_256()
1147 k2 = key_ctx->key[2], k3 = key_ctx->key[3], threefish_encrypt_512() local
1158 b3 += k3; threefish_encrypt_512()
1211 b2 += b3 + k3; threefish_encrypt_512()
1258 b1 += k3; threefish_encrypt_512()
1311 b0 += b1 + k3; threefish_encrypt_512()
1426 b7 += k3 + 5; threefish_encrypt_512()
1479 b6 += b7 + k3 + t1; threefish_encrypt_512()
1526 b5 += k3 + t1; threefish_encrypt_512()
1579 b4 += b5 + k3; threefish_encrypt_512()
1626 b3 += k3; threefish_encrypt_512()
1679 b2 += b3 + k3; threefish_encrypt_512()
1726 b1 += k3; threefish_encrypt_512()
1779 b0 += b1 + k3; threefish_encrypt_512()
1894 b7 += k3 + 14; threefish_encrypt_512()
1947 b6 += b7 + k3 + t1; threefish_encrypt_512()
1994 b5 += k3 + t1; threefish_encrypt_512()
2047 b4 += b5 + k3; threefish_encrypt_512()
2093 output[3] = b3 + k3; threefish_encrypt_512()
2108 k2 = key_ctx->key[2], k3 = key_ctx->key[3], threefish_decrypt_512() local
2120 b3 -= k3; threefish_decrypt_512()
2181 b4 -= b5 + k3; threefish_decrypt_512()
2250 b5 -= k3 + t1; threefish_decrypt_512()
2312 b6 -= b7 + k3 + t1; threefish_decrypt_512()
2381 b7 -= k3 + 14; threefish_decrypt_512()
2531 b0 -= b1 + k3; threefish_decrypt_512()
2600 b1 -= k3; threefish_decrypt_512()
2662 b2 -= b3 + k3; threefish_decrypt_512()
2731 b3 -= k3; threefish_decrypt_512()
2793 b4 -= b5 + k3; threefish_decrypt_512()
2862 b5 -= k3 + t1; threefish_decrypt_512()
2924 b6 -= b7 + k3 + t1; threefish_decrypt_512()
2993 b7 -= k3 + 5; threefish_decrypt_512()
3143 b0 -= b1 + k3; threefish_decrypt_512()
3212 b1 -= k3; threefish_decrypt_512()
3274 b2 -= b3 + k3; threefish_decrypt_512()
3343 b3 -= k3; threefish_decrypt_512()
3373 k2 = key_ctx->key[2], k3 = key_ctx->key[3], threefish_encrypt_1024() local
3388 b3 += k3; threefish_encrypt_1024()
3493 b2 += b3 + k3; threefish_encrypt_1024()
3592 b1 += k3; threefish_encrypt_1024()
3697 b0 += b1 + k3; threefish_encrypt_1024()
3932 b15 += k3 + 5; threefish_encrypt_1024()
4037 b14 += b15 + k3 + t1; threefish_encrypt_1024()
4136 b13 += k3 + t1; threefish_encrypt_1024()
4241 b12 += b13 + k3; threefish_encrypt_1024()
4340 b11 += k3; threefish_encrypt_1024()
4445 b10 += b11 + k3; threefish_encrypt_1024()
4544 b9 += k3; threefish_encrypt_1024()
4649 b8 += b9 + k3; threefish_encrypt_1024()
4748 b7 += k3; threefish_encrypt_1024()
4853 b6 += b7 + k3; threefish_encrypt_1024()
4952 b5 += k3; threefish_encrypt_1024()
5057 b4 += b5 + k3; threefish_encrypt_1024()
5156 b3 += k3; threefish_encrypt_1024()
5261 b2 += b3 + k3; threefish_encrypt_1024()
5360 b1 += k3; threefish_encrypt_1024()
5464 output[0] = b0 + k3; threefish_encrypt_1024()
5494 k2 = key_ctx->key[2], k3 = key_ctx->key[3], threefish_decrypt_1024() local
5506 b0 -= k3; threefish_decrypt_1024()
5656 b1 -= k3; threefish_decrypt_1024()
5786 b2 -= b3 + k3; threefish_decrypt_1024()
5923 b3 -= k3; threefish_decrypt_1024()
6053 b4 -= b5 + k3; threefish_decrypt_1024()
6190 b5 -= k3; threefish_decrypt_1024()
6320 b6 -= b7 + k3; threefish_decrypt_1024()
6457 b7 -= k3; threefish_decrypt_1024()
6587 b8 -= b9 + k3; threefish_decrypt_1024()
6724 b9 -= k3; threefish_decrypt_1024()
6854 b10 -= b11 + k3; threefish_decrypt_1024()
6991 b11 -= k3; threefish_decrypt_1024()
7121 b12 -= b13 + k3; threefish_decrypt_1024()
7258 b13 -= k3 + t1; threefish_decrypt_1024()
7388 b14 -= b15 + k3 + t1; threefish_decrypt_1024()
7525 b15 -= k3 + 5; threefish_decrypt_1024()
7831 b0 -= b1 + k3; threefish_decrypt_1024()
7968 b1 -= k3; threefish_decrypt_1024()
8098 b2 -= b3 + k3; threefish_decrypt_1024()
8235 b3 -= k3; threefish_decrypt_1024()
/linux-4.1.27/drivers/mmc/host/
H A Ddw_mmc-k3.c97 MODULE_ALIAS("platform:dwmmc-k3");
H A DMakefile47 obj-$(CONFIG_MMC_DW_K3) += dw_mmc-k3.o
/linux-4.1.27/arch/sparc/crypto/
H A Ddes_glue.c208 u64 k3[DES_EXPKEY_WORDS / 2]; des3_ede_set_key() local
221 des_sparc64_key_expand((const u32 *)key, k3); des3_ede_set_key()
226 &k3[0], sizeof(k3)); des3_ede_set_key()
228 encrypt_to_decrypt(&dctx->decrypt_expkey[0], &k3[0]); des3_ede_set_key()
/linux-4.1.27/drivers/video/fbdev/msm/
H A Dmdp_ppp.c218 int64_t k1, k2, k3, k4, tmp; scale_params() local
231 k3 = (n + 1) >> 1; scale_params()
232 if ((k3 >> 4) < (1LL << 27) || (k3 >> 4) > (1LL << 31)) { scale_params()
245 k4 = (k3 - ONE) >> 1; scale_params()
256 od = (((k3 * os) >> 1) + k4); scale_params()
/linux-4.1.27/net/ipv4/
H A Dtcp_illinois.c206 * k3 = ------------------- beta()
213 * b = k3 + k4 da beta()
/linux-4.1.27/drivers/media/tuners/
H A Dtuner-xc2028-types.h103 It is not clear where secam/k3 is used, nor we have a feedback of this
/linux-4.1.27/arch/ia64/include/asm/
H A Dkregs.h17 #define IA64_KR_PER_CPU_DATA 3 /* ar.k3: physical per-CPU base */
/linux-4.1.27/drivers/dma/
H A Dk3dma.c26 #define DRIVER_NAME "k3-dma"
653 { .compatible = "hisilicon,k3-dma-1.0", },
846 MODULE_DESCRIPTION("Hisilicon k3 DMA Driver");
/linux-4.1.27/arch/ia64/mm/
H A Dcontig.c116 * Update ar.k3. This move is ensures that percpu for_each_possible_cpu()
H A Ddiscontig.c158 * Update ar.k3. This move is ensures that percpu for_each_possible_early_cpu()
/linux-4.1.27/arch/s390/crypto/
H A Ddes_s390.c234 * equal (k1 == k2 or k2 == k3), then the DES3 operation is simply the
/linux-4.1.27/arch/arm/mach-omap2/
H A Dmux34xx.c898 _OMAP3_BALLENTRY(SDMMC2_DAT7, "k3", NULL),
1149 _OMAP3_BALLENTRY(GPMC_A2, "k3", NULL),
1465 _OMAP3_BALLENTRY(GPMC_A10, "k3", "ab19"),
1893 _OMAP3_BALLENTRY(GPMC_A10, "k3", "ab19"),
/linux-4.1.27/arch/ia64/kernel/
H A Dsetup.c941 * Set ar.k3 so that assembly code in MCA handler can compute cpu_init()
943 * phys = ar.k3 + &per_cpu_var cpu_init()
/linux-4.1.27/arch/x86/crypto/
H A Dcamellia_glue.c1018 /* k3 */ camellia_setup128()
1147 /* k3 */ camellia_setup256()

Completed in 1305 milliseconds